For security control, a SkyDrive requires a ________
A) Windows Live ID B) Windows Live Drive
C) Windows Live Cloud D) Windows Live Sky
A
Computer Science & Information Technology
You might also like to view...
________ is the process of modifying a presentation by adding and deleting slides or by changing the contents of individual slides
A) Editing B) Saving C) Presenting D) Formatting
Computer Science & Information Technology
The firewall follows the classic military doctrine of _________ because it provides an additional layer of defense.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology