COMPREHENDING THE PURPOSE OF KMS PICO IN COMPUTER SOFTWARE PIRACY