• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

What is Software Piracy?

Extracts from this document...


What is Software Piracy? Software Piracy refers to the unauthorized use or copying of software. When a user purchases a software program, he does not purchase the software itself, but the right to use the software. This right is governed by a licence. When you purchase a boxed software product, you receive a CD, manuals and a licence agreement. This licence generally allows you to use the software on one workstation. In the work place, it may be tempting to install this software onto all of your workstations. Where the user acts in a manner contradictory to the terms of the licence, he has probably committed software piracy. Advantages of Piracy: There are certainly advantages to pirating software. Main benefits include: * Cost: Pirated software costs nothing, or close to nothing, to obtain. When a consumer wants to buy a software package which costs upwards of � 2,000 (example: AutoCAD, Starry Night), the amount of money saved by pirating software is certainly really big. ...read more.


And most of the times we all have seen our mailbox full of junk e-mails and we try to understand how did these people got our e-mail address... * Profit: Although most software pirates do not profit directly from pirating software, the temptation to make money by selling illegal programs is strong. All one needs to become a software pirate is a CD burner, which now cost as little as �100, and the pirate's computer can become a virtual cash cow. Even selling a pirate cd on the cost of 1/3 of the originals cd price, the profit is really huge. Especially some technical programs which their cost is not affordable by everyone, it is easier to sell it even at the 1/5 of the originals cd price and gain a really high profit, concerning time you "worked" and money you got. * Experience gained: Many universities give their students the software and the serial number they use at the university, in order to install it on their computers and get involved learning the software better, studying the lessons working straight on the software, without buying it or need to go to the library to study. ...read more.


* Software Programmers learn by their mistakes : It might kinda sound like irony but since the software is pirated that means that the programmer did not take all the precautions to secure the software from being pirated. But it also means that there might be more problems, even inside the software's code. So that gives the challenge to the programmer to construct a software that is the best that it can be. Conclusion Software piracy is not as bad as the companies want to appear it. They just want to gain as much money they can get without really care about the consumers. There are millions of programmers that construct a software, dedicate hours and hours to their software and then they just upload it on a website on the Internet for free, with the source code, in order to help other people to do their job or even other programmers to develop a better software. And what do they only ask? Just some credits and a thankful e-mail... That is something that must all make us think. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE Hardware section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related GCSE Hardware essays

  1. Peer reviewed

    Hardware and Software -IT

    5 star(s)

    This is because an internal hard drive has a larger capacity, stores and finds data without losing them and is cheaper per megabyte than an external storage device. It is quicker than them but slower than a RAM and they can crash to stop the computer working, which can damage the disk and lose data stored in that area.

  2. Computer Hardware, uses, advantages and disadvantages.

    are much faster. If I used CLI (Command Line Interface) then it would require the user to know the exact commands needed to use it and to have some experience of using computers. It would be difficult to use it because I don't have any experience in using it.

  1. Choosing the best harware for my system.

    Data Effect Way it can be prevented Name spelt incorrectly The ticket could be given to the wrong person or else when the person calls in to book another flight the customer will be told that the staff member could not find his/her account this will result in wasting further

  2. Make a website.

    paper this is called the tablet it is connected to the computer so that the image that you draw appears on the screen. The pen acts as your pencil used for drawing the image you create on the tablet appears on the monitor.

  1. Hardware and Software

    This will be used for word processing letters of confirmation, letters of payment, and mail merging letters. * MS access - A database application. This will be used for taking details such as personal information, booking details, and payment details.

  2. Hardware & Software - User Requirements of Burgers away.

    position of the on-screen cursor by moving the mouse around on a surface such as a desk. To select items (such as words or icons) the user positions the mouse pointer and presses one of the mouse buttons. This produces a 'mouse click'.

  1. Designing a system for an IT user - He needs to have a good ...

    And he uses a microphone to record the sound of videos. If John has a good microphone it will be able to detect all the sounds and voices that John wants to input in the computer. Webcam and Digital Camera They are both used to record or take pictures.

  2. Hardware and Software

    As the key is pressed a signal is recognised by the computer. The Human Resources use it to do many things like, Send e-mails to employees, enter new product details, enter user ID into the computer and function keys to turn off the computer. This is used for web communication.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work