THE AUTHORIZED IMPLICATIONS OF APPLYING KMS-PICO FOR SOFTWARE ACTIVATION