What is the basic security feature included with Windows 8.1?

What will be an ideal response?


Windows Defender

Computer Science & Information Technology

You might also like to view...

To add an item to a stack, we call the ______ function

a. pop b. top c. push d. empty

Computer Science & Information Technology

To demote an item in an outline, you can press ________

A) Tab B) Alt+Tab C) Shift+Tab D) Ctrl+Tab

Computer Science & Information Technology

A ____ is a TCP/IP-based concept (container) within Active Directory that is linked to IP subnets.

A. forest B. domain C. site D. tree

Computer Science & Information Technology

A program that controls how many times a loop is executed is called a task-controlled loop.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology