involves courses which include viruses, worms and/or Trojan horses or almost every other computer code, data files or courses created to interrupt, demolish or Restrict the operation of any computer application or components or telecommunications;Most insurance policies policies have demanding limitations concerning the compensation they could prov