Windows 7

  1. You can keep working while the drive is being encrypted. Your computer's performance will be affected and free space will ...
  2. You can let the wizard choose a replication partner for the installation of this domain controller or you can specify a domain ...
  3. You can limit the number of users that can access the share at the same time. This can be useful for managing the server ...
  4. You can limit the number of users who can connect to the share at the same time. This can be useful to limit server load. ...
  5. You can limit the processor features that a virtual machine can use. This improves the virtual machine's compatibility with ...
  6. You can listen to a portable music player or other device through this %1 jack. If you connect a microphone, you may hear ...
  7. You can make programs on an RD Session Host server available to users through RemoteApp. When a user starts a RemoteApp program, ...
  8. You can make this Windows Mail page, including Tips, appear anytime you are working by clicking on Windows Mail at the very ...
  9. You can make video look as good as possible by adjusting the controls on your display. To see a list of controls you can ...
  10. You can make Web applications, which are hosted on an Active Directory Federation Services (AD FS)-enabled Web server in ...
  11. You can make Web applications, which are hosted on an Active Directory Federation Services (AD FS)-enabled Web server in ...
  12. You can make Web applications, which are hosted on an Active Directory Federation Services (AD FS)-enabled Web server in ...
  13. You can manage this remote installation server and control the way it interacts with existing and potential client computers. ...
  14. You can map UNIX identities to Windows identities by including UNIX identity data in a directory service, such as Active ...
  15. You can modify the number of virtual processors based on the number of processors on the physical machine. You can also modify ...
  16. You can monitor the amount of space used on each volume on this computer and generate storage reports when a volume reaches ...
  17. You can move an item quickly in front of or behind others. To do this, click the item, click the Layout menu, and then click ...
  18. You can move more than one card at a time only if all of those cards are in correct descending order and within the same ...
  19. You can move more than one card at a time only if all of those cards are in correct descending order in alternating red and ...
  20. You can not save a profile with a period, slash, or back slash in the name. Please enter a name without those characters. ...
  21. You can not send digitally signed mail using the certificate. This might be because it is not enabled for the purpose of ...
  22. You can not sort the list while the Active Registrations are being downloaded from the server. Try after the Active Registrations ...
  23. You can now configure or analyze your computer by using the security settings in this database. To Configure Your Computer ...
  24. You can now enable BranchCache on individual shared folders by using Share and Storage Management or Group Policy. For more ...
  25. You can only access ports properties on servers running Windows 2000 server family and servers running Windows Server 2003. ...
  26. You can only extend the volume to the available space shown below because your disk cannot be converted to dynamic or the ...
  27. You can only pass three cards. If you want to change your selection, first click on a selected card to return it to your ...
  28. You can only read and copy files from the BitLocker To Go Reader. To save or change files on your drive, insert it into a ...
  29. You can only save this log in .evt format on %s. If you want to save the log on %s, you must save it as a .txt or .csv file. ...
  30. You can open files that are already on the drive but can't save new files on it. If you want to save files on this drive, ...
  31. You can override referral ordering for this target by selecting the following check box, and then specifying where this target ...
  32. You can prevent some versions of an AD RMS-enabled application from accessing protected content. To do this, you need to ...
  33. You can prevent specific user accounts from obtaining use licenses by adding users' rights account certificates to the user ...
  34. You can prevent specific user accounts from obtaining use licenses by adding users' rights account certificates to the user ...
  35. You can prevent specific user accounts from obtaining use licenses by adding users' rights account certificates to the user ...
  36. You can prevent users from adding new trusted publishers while using the browser. Enabling this lockdown does not prevent ...
  37. You can provide a default location for programs to use when a location sensor, such as a GPS receiver, is unavailable. All ...
  38. You can provide either a port number or an approved application, but not both. Clear the data from the option that you do ...
  39. You can provision storage by creating a new volume on an existing disk with unallocated space, or by creating a new logical ...
  40. You can publish an SMB share to a DFS namespace by specifying an existing namespace and the folders you want to create in ...
  41. You can rate pictures and music more easily as they play by using shortcut keys, which are the 0-5 keys on the remote control ...
  42. You can read, move and compose e-mail when disconnected from the Internet. Any e-mail you send when offline will go in the ...
  43. You can record no&tes about this virtual machine. Notes are displayed in the Hyper-V Manager when a virtual machine is selected. ...
  44. You can reduce the disk space used to store downloaded newsgroup messages. Click the Tools menu, then click Options . Select ...
  45. You can replace the animated Internet Explorer logo in the upper-right corner of the Internet Explorer window with an animated ...
  46. You can replace the static Internet Explorer logo in the upper-right corner of the Internet Explorer window with a static ...
  47. You can require a password for this identity. This provides a moderate level of security. However, other users may still ...
  48. You can require a personal identification number (PIN) or a startup key on a USB flash drive be used every time you start ...
  49. You can restrict the authentication methods that apply to this application. If you do not select any of the following check ...
  50. You can return to this wizard at any time. To access the Display Configuration wizard after the preferred display is in use, ...
  51. You can route authentication requests that use name suffixes that do not exist in the local forest to the specified forest. ...
  52. You can route authentication requests that use name suffixes that do not exist in the specified forest to the local forest. ...
  53. You can save your phone number settings with a unique name. For example, travelers can save and reuse settings for particular ...
  54. You can schedule updates in a way that minimizes network traffic and causes the least disruption to users by setting Automatic ...
  55. You can select an existing interface or create a new demand-dial interface for client computers to connect to the Internet. ...
  56. You can select folders for each media library, and the media files within these folders will appear in Windows Media Center. ...
  57. You can select libraries and folders and whether to include a system image in the backup. The items you choose will be backed ...
  58. You can select multiple items as a unit. Click above the group, drag diagonally to create a temporary box around the group, ...
  59. You can select snap-ins for this console from those available on your computer and configure the selected set of snap-ins. ...
  60. You can select which items to show on the Windows Media Center Start page from the list below. If no items are listed, the ...
  61. You can send and receive mail from multiple e-mail accounts. Click the Tools menu and then click Accounts . Click Add then ...
  62. You can set permissions for an individual file on an NFS share in Microsoft Windows Explorer by right-clicking the file, ...
  63. You can set the action to 'Allow all connections' or 'Block' only when the User and Computer authorizations are not selected. ...
  64. You can set the default program for the following Internet services: HTML editor, E-mail, Newsgroups, Internet call, Calendar, ...
  65. You can set the ENUM_CESSETUPPROP_USE_IISAPPPOOLIDENTITY property to FALSE only by calling the SetApplicationPoolCredentials ...
  66. You can set the interval in minutes for when Automatic Configuration will happen. If you leave this value blank, or at zero, ...
  67. You can set up a hierarchy of WSUS servers to help you deploy updates to offices in different departments, organizational ...
  68. You can set up either one or two tuners for use with Windows Media Center. With two tuners, you can watch TV on one channel ...
  69. You can set up your computer so that users do not have to type a user name and password to log on. To do this, specify a ...
  70. You can setup the DHCP server to automatically update authoritative DNS servers with the host (A) and pointer (PTR) records ...
  71. You can setup the DHCP server to automatically update authoritative DNS servers with the host (AAAA) and pointer (PTR) records ...
  72. You can share files and printers with other computers running Windows 7. You can also stream media to devices. The homegroup ...
  73. You can share this printer with other users on your network. The printer will not be available when the computer is sleeping ...
  74. You can sign .rdp files that are used for RemoteApp connections by using a digital certificate. This will allow clients to ...
  75. You can sign data by using a private key in a file (.pvk) or by using a private from a cryptographic service provider (CSP). ...