Windows 10

  1. You are restarting this computer while there are other users still using it. Those users may lose data. Do you want to continue? ...
  2. You are running a version of Microsoft SQL Server 2000 or Microsoft SQL Server 2000 Desktop Engine (also called MSDE) that ...
  3. You are running an out-of-date version of Adobe Reader. Adobe strongly recommends that you update this version to resolve ...
  4. You are saving a multi-page picture in a single page format. If you continue, only the current page will be saved in the ...
  5. You are setting a deny permissions entry. Deny entries take precedence over allow entries. This means that if a user is a ...
  6. You are sharing %1 as %2. Others may be using files in this folder. If you delete the folder, it will no longer be shared. ...
  7. You are shutting down this computer while there are other users still using it. Those users may lose data. Do you want to ...
  8. You are using Kerberos authentication option for live migration which requires setting up credential delegation. The access ...
  9. You are viewing a feed that contains frequently updated content. When you subscribe to a feed, it is added to the Common ...
  10. You can 'cycle through' each item on a cover page until you select the one you want. To do this, click an item, and then ...
  11. You can add hard drives and CD/DVD drives to your SCSI controller or remove the SCSI controller from the virtual machine. ...
  12. You can add multiple filters to build an IP filter list that matches on IP packets for multiple source or destination computers, ...
  13. You can adjust how precisely you want to perform your flick gestures. Note: Using the Relaxed setting may cause accidental ...
  14. You can adjust the maximum disk space used for system protection. As space fills up, older restore points will be deleted ...
  15. You can align a group of items to the left, right, top, or bottom. To align items, select the group, click the Layout menu, ...
  16. You can allow communication with this app from any computer, including those on the Internet or just from computers on your ...
  17. You can allow family members to sign in to this PC. Adults can manage family settings online and see recent activity to help ...
  18. You can allow Hyper-V to manage the amount of memory assigned to this virtual machine dynamically within the specified range. ...
  19. You can allow pop-ups from specific websites by adding the sites to the exception list. If you enable this policy setting, ...
  20. You can also configure the network connections with the preferred DNS server to be used for DNS name resolution. To do so, ...
  21. You can also turn on Windows Defender right now to help protect your PC. If you do this, %1 will automatically be turned ...
  22. You can also use the Initiator and Source IP lists to restrict the tunnel mode outer address to specific initiators and source ...
  23. You can arrange the order in which this computer accesses information on the network. Providers and other connections are ...
  24. You can change how OneDrive uses metered connections if your Internet service provider charges for the amount of data you ...
  25. You can change how this virtual hard disk is attached to the virtual machine. If an operating system is installed on this ...
  26. You can change the name and workgroup membership of this computer. You cannot join a computer running this edition of %WINDOWS_SHORT% ...
  27. You can change the name of this computer. You must start the Workstation service before you can change this computer's domain ...
  28. You can change where files in this folder are stored to another place on this hard drive, another drive, or another computer ...
  29. You can change where menus and scroll bars appear without affecting your handwriting recognition. (Not all programs respond ...
  30. You can choose the order in which your screen rotates. This sequence occurs when you use a tablet button to change your screen ...
  31. You can choose to store only the latest recovery point of the primary virtual machine on the Replica server or to add additional ...
  32. You can choose to store only the latest recovery point of the primary virtual machine on the Replica server or to add additional ...
  33. You can choose whether to reset all drives or just the one with Windows installed on it. Any drives that Windows doesn't ...
  34. You can clear all check boxes that hide pages and messages when checked. This action restores Hyper-V confirmation messages ...
  35. You can close this dialog box at any time. The search will continue (although it will take more time) and any files that ...
  36. You can compact, convert, expand, merge, reconnect or shrink a virtual hard disk by editing the associated file. Specify ...
  37. You can compact, convert, or expand a shared virtual hard disk by editing the associated file. Specify the full path to the ...
  38. You can configure a DVD drive to use a CD image (.iso) file or a physical CD/DVD drive after you attach the drive to the ...
  39. You can configure a hard drive to use a virtual hard disk or a physical hard disk after you attach the drive to the controller. ...
  40. You can configure Hyper-V to allow virtual machines to span non-uniform memory architecture (NUMA) nodes. When the physical ...
  41. You can configure the virtual COM port to communicate with the physical computer through a named pipe. If the named pipe ...
  42. You can convert the existing one-way trust into a two-way trust. Two-way trusts consist of two one-way trusts between the ...
  43. You can create a comprehensive information system that displays all the subjects that are available. Or you can customize ...
  44. You can create a folder or use an existing folder to store the virtual machine. If you don't select a folder, the virtual ...
  45. You can create a new Briefcase folder to sync files with another computer. The primary purpose of Briefcase is to sync files ...
  46. You can create a separate virtual machine to verify that a recovery point is able to start successfully, and that the virtual ...
  47. You can create an invitation and send it to your helper. You can also use Easy Connect to simplify connections to your helper. ...
  48. You can define the range of media access control (MAC) addresses that can be assigned dynamically to virtual network adapters. ...
  49. You can define the range of World Wide Port Name (WWPN) addresses that can be assigned dynamically to a virtual Fibre Channel ...
  50. You can delegate control of any folder. It is recommended that you delegate control at the level of the domain or organizational ...
  51. You can duplicate most objects as you drag them. Select the object (to select multiple objects, press the Ctrl key as you ...
  52. You can enable logging to create log files to record connection errors. To view or save log files as one report or send them ...
  53. You can enable or disable file name completion for a particular invocation of CMD.EXE with the /F:ON or /F:OFF switch. You ...
  54. You can establish NIC Teaming in the guest operating system to aggregate bandwidth and provide redundancy. This is useful ...
  55. You can exclude specific file types from a scan. Excluding items can make scans faster, but your PC might be less protected ...
  56. You can get IP settings assigned automatically if your network supports this capability. Otherwise, you need to ask your ...
  57. You can get IPv6 settings assigned automatically if your network supports this capability. Otherwise, you need to ask your ...
  58. You can get this password from the person requesting assistance. A Remote Assistance session will start after you type the ...
  59. You can have assistive technologies start automatically when you sign in, after you sign in, or both. Select the check boxes ...
  60. You can help Microsoft improve speech recognition accuracy in future releases of Windows by sharing the data that is used ...
  61. You can import data from Lightweight Directory Interchange Format (LDIF) files into your AD LDS application directory partition. ...
  62. You can improve the computer's ability to recognize spoken words by allowing the computer to review documents and e-mail ...
  63. You can increase the storage available to a virtual machine by adding a SCSI controller and attaching virtual hard disks ...
  64. You can increase the storage available to a virtual machine by adding a SCSI controller and attaching virtual hard disks ...
  65. You can increase the storage available to a virtual machine by adding a SCSI controller and attaching virtual hard disks ...
  66. You can increase the storage available to a virtual machine by adding a SCSI controller and attaching virtual hard disks ...
  67. You can install additional drivers so that users on the following systems can download them automatically when they connect. ...
  68. You can install only one device at a time. Another device installation is underway, when it is finished you can try this ...
  69. You can limit the processor features that a virtual machine can use. This improves the virtual machine's compatibility with ...
  70. You can listen to a portable music player or other device through this %1 jack. If you connect a microphone, you may hear ...
  71. You can map UNIX identities to Windows identities by including UNIX identity data in a directory service, such as Active ...
  72. You can modify the number of virtual processors based on the number of processors on the physical computer. You can also ...
  73. You can move an item quickly in front of or behind others. To do this, click the item, click the Layout menu, and then click ...
  74. You can never change the UserName parameter for the primary Microsoft account on the device. For any other account, you can't ...
  75. You can now configure or analyze your computer by using the security settings in this database. To Configure Your Computer ...