When connecting wirelessly to a network, the ________ option configures Windows to limit data usage on the connection

a. Show my estimated data usage
b. Set as a metered connection
c. Forget this network
d. Turn sharing on or off


B. When the Show my estimated data use in the Networks list option is turned on, the network connection displays the amount of data transferred over the connection when selected from the Networks charm.

Computer Science & Information Technology

You might also like to view...

Match the type of cybercrime with its description

I. Spoofing A. Unauthorized access causes damage II. Techno-vandalism B. Phony Web sites III. Techno-trespass C. Criminal trespass IV. Root access D. Gives the user Admin rights

Computer Science & Information Technology

What command can be used to encrypt / decrypt files from the command line?

A. encrypt B. crypto C. cipher D. crypt-file

Computer Science & Information Technology

The array char message[81]; can be used to store a string of up to ____ characters.

A. 79 B. 80 C. 81 D. 82

Computer Science & Information Technology

This technique is rigidly specified as in exact password matching.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology