When connecting wirelessly to a network, the ________ option configures Windows to display the amount of data transferred over the connection

a. Show estimated data usage
b. Set as a metered connection
c. Forget this network
d. Turn sharing on or off


A. The set as a metered connection option configures Windows to limit data usage on the connection. When using a metered connection, Windows attempts to use less bandwidth by requesting low-resolution images and videos, pause updates to Start screen tiles, defer downloading of nonpriority Windows updates, and stop automatic synchronization of offline files.

Computer Science & Information Technology

You might also like to view...

To clear an area of the worksheet selected for printing you should use the _____ button.

A. Deselect Area B. Worksheet Area C. Clear Area D. Print Area

Computer Science & Information Technology

A kilobyte is exactly ________ bytes

Fill in the blank(s) with correct word

Computer Science & Information Technology

Draw an inheritance hierarchy for students at a university similar to the hierarchy shown in Fig. 12.2. Use Student as the base class of the hierarchy, then include classes UndergraduateStudent and GraduateStudent that derive from Student. Continue to extend the hierarchy as deep (i.e., as many levels) as possible. For example, Freshman, Sophomore, Junior and Senior might derive from UndergraduateStudent, and DoctoralStudent and MastersStudent might derive from Graduate-Student. After drawing the hierarchy, discuss the relationships that exist between the classes. [Note: You do not need to write any code for this exercise.]

What will be an ideal response?

Computer Science & Information Technology

Match the following terms to their meanings:

I. Replicates itself by spreading from computer to computer A. custom scan II. Repair program that closes security holes B. full scan III. A scan that checks only folders/drives that you specify C. patch IV. A scan that checks every file on your hard drive(s) D. quick scan V. A scan that checks areas on your hard drive where E. virus malware programs are likely found

Computer Science & Information Technology