When connecting wirelessly to a network, the ________ option configures Windows to limit data usage on the connection
a. Show my estimated data usage
b. Set as a metered connection
c. Forget this network
d. Turn sharing on or off
B. When the Show my estimated data use in the Networks list option is turned on, the network connection displays the amount of data transferred over the connection when selected from the Networks charm.
You might also like to view...
Match the type of cybercrime with its description
I. Spoofing A. Unauthorized access causes damage II. Techno-vandalism B. Phony Web sites III. Techno-trespass C. Criminal trespass IV. Root access D. Gives the user Admin rights
What command can be used to encrypt / decrypt files from the command line?
A. encrypt B. crypto C. cipher D. crypt-file
The array char message[81]; can be used to store a string of up to ____ characters.
A. 79 B. 80 C. 81 D. 82
This technique is rigidly specified as in exact password matching.
Fill in the blank(s) with the appropriate word(s).