
You should already be familiar with the data. [data: information without context, for example, a list of students with serial numbers, is data. When these figures represent the placement in a 100 meter race, the data becomes an information] and improper use of the computer [the data stored electronically is easier to access]; with software [software: a general term used to describe an application or program]which cannot be reproduced without permission. The consequences lead to software piracy [piracy: the acquisition, benefit from the use or making changes to copyright material without prior permission]; and hack, and may cause data corruption; accidental or deliberate.
Types of computer ailments
Incorrect use of computers and communications can be in different forms:
Breaking
Hacking is when an unauthorized user uses the network. [Network: A group of interconnected computers] and internet modem [modem: a piece of hardware that connects the computer to the Internet] to access security passwords or other data security stored on another computer. Hackers sometimes use software hacking tools and often target some sites on the Internet. Their operation extends not only to private networks, but also to government and corporate computer networks.
Misuse of data and unauthorized transfer or copying
Copying and illegally transferring data quickly and easily online using computers and large storage devices such as hard drives [HDD: a device used to store large volumes of data, on a hard disk], memory cards [memory stick: a thumb-sized portable storage device mainly used for transferring files between computers] and DVDs [Digital Versatile Disc- used to store data, for example, a film], Personal data, company research and written work, such as novels and textbooks, may not be reproduced without permission of the copyright owner.
Copying and distribution of copyright software, music and movies
This also applies to copying music and movies for distribution on the Internet without copyright. [copyright: Indicates the creator of an original piece of work and controller of the publication, distribution, and adaptation] authorization holder. This is a widespread abuse of both computers and the Internet, which do not take into account copyright rules and regulations.
pornography
Most of the indecent material and pornography is available on the Internet and can be stored electronically. There have been several instances of materials that are classified as illegal or that show illegal activities found on computers that are subject to prosecution for storing these materials.
Identity and Financial Abuses
This section deals with the abuse of stolen credit card numbers to receive goods or services on the Internet and the use of computers in financial fraud. These can range from sophisticated, well-designed frauds to simple applications such as printing fake currency using color printers.
Viruses
Viruses: an ultramicroscopic non-cellular organism that replicates itself in host files and programs is relatively simple programs. [program: a list of instructions written in sequence] written by men and intended to harm or harm the computer system or their files.

