Windows 7

  1. Select this to restore only the drives from your backup that are required to run Windows. If you have separate data drives, ...
  2. Select whether you wish to submit a request for a certificate, or to encode or decode a file between base 64 text and binary ...
  3. Select which language (system locale) to use when displaying text in programs that do not support Unicode. This setting affects ...
  4. Select word wrapping option to change how text appears on your screen. This does not affect how document looks when you print ...
  5. Select YES to make these changes on all hosts in the cluster. Traffic to the entire cluster will be affected. Select NO to ...
  6. Select your connection from the list. The connection must have a saved user name and password, and be available to all users. ...
  7. Selected classification rule scope paths: {0}. You have chosen an invalid combination of paths for the classification rule ...
  8. Selected directory schema information for object type %2 is not available (specifically: Class GUID) because: %1Extension ...
  9. Selected directory schema information for object type %2 is not available (specifically: Naming Attribute) because: %1You ...
  10. Selected file management scope paths: {0}. You have chosen an invalid combination of paths for the file management scope. ...
  11. Selected report scope paths: {0}. You have chosen an invalid combination of paths for the report scope. On clustered deployments, ...
  12. Selecting a different print processor may result in different options being available for default data types. If your service ...
  13. Selecting audio and video playback or desktop composition will install the Desktop Experience feature on the RD Session Host ...
  14. Selecting both Write and Execute permissions could be dangerous. Are you sure you want to select both these permissions? ...
  15. Selecting File Data Source creates a file-based data source which is shareable between all users with access to the database. ...
  16. Selecting or clearing the "Index encrypted files" check box will immediately rebuild the index. Depending on how many files ...
  17. Selecting or clearing the "Index encrypted files" check box will immediately rebuild the index. Depending on how many files ...
  18. Selecting System Data Source creates a data source which is specific to this machine, and usable by any user who logs onto ...
  19. Selecting to install the latest updates and run Malicious Software Removal Tool and setting Internet Explorer as the default ...
  20. Selection does not appear with current information type settings or in the current subset. Please select a different set ...
  21. Selection does not appear with current information type settings. Please select a different set of information type settings. ...
  22. Selections made in this wizard may overwrite your existing wireless network settings. Select No to use your existing wireless ...
  23. Selective application of QoS policies based on domain or non-domain network category has been disabled on this machine. QoS ...
  24. Selective authentication After you finish this wizard, grant individual access to each domain and server that you want to ...
  25. Selective authentication On finishing the wizard, grant individual access to each domain and server that you want to make ...
  26. Selective authentication Windows will not automatically authenticate users from the local domain for any resources in the ...
  27. Selective authentication Windows will not automatically authenticate users from the local forest for any resources in the ...
  28. Selective authentication Windows will not automatically authenticate users from the specified domain for any resources in ...
  29. Selective authentication Windows will not automatically authenticate users from the specified domain for any resources in ...
  30. Selective authentication Windows will not automatically authenticate users from the specified forest for any resources in ...
  31. Selective authentication Windows will not automatically authenticate users from the specified forest for any resources in ...
  32. Selects the specified disk and shifts the focus to it. Syntax: SELECT DISK= SELECT DISK=SYSTEM SELECT DISK=NEXT SELECT DISK= ...
  33. Selects the specified partition and shifts the focus to it. Syntax: SELECT PARTITION= PARTITION= The number of the partition ...
  34. Selects the specified virtual disk by filename and shifts the focus to it. Syntax: SELECT VDISK FILE= NOERR FILE= Specifies ...
  35. Selects the specified volume and shifts the focus to it. Syntax: SELECT VOLUME={ | } VOLUME= The number of the volume to ...
  36. Self healing is enabled for volume %1!s! with flags 2!x!. flags: 0x01 - enable general repair 0x08 - warn about potential ...
  37. Self healing is enabled for volume %1!s! with flags 2!x!. flags: 1 - enable general repair 8 - warn about potential data ...
  38. Self healing is now enabled for volume %1!s! with flags 2!x!. flags: 0x01 - enable general repair 0x08 - warn about potential ...
  39. Self healing is now enabled for volume %1!s! with flags 2!x!. flags: 1 - enable general repair 8 - warn about potential data ...
  40. Self-propagating malicious code that can automatically distribute itself from one computer to another through network connections. ...
  41. self-test implemented bit) - If this bit is cleared to zero, the device does not implement the Short and Extended self-test ...
  42. Semaphores is the number of semaphores in the computer at the time of data collection. This is an instantaneous count, not ...
  43. Semicolon separated computer group names. This value can be empty. If some value is specified, then the client's computer ...
  44. Semicolon separated protocol names that are enabled for this policy. Names would match Win32_TSGatewayServerSettings.GetProtocolName ...
  45. SEND - Secure Neighbor Discovery - Certificate Path Advertisement is a secure version of Neighbor Discovery Advertisement. ...
  46. Send basic information to Microsoft about software it detects, including where the software came from, and actions that you ...
  47. Send Complete Calls/sec is the average rate, in incidents per second, at which NDIS received a transmit-complete notification ...
  48. Send Request Calls/sec is the average rate, in incidents per second, at which stack requested a transmit on an interface. ...
  49. Sender: %1 Caller ID: %2 Recipient name: %3 Pages: %4!ld! Transmission start time: %5 Transmission duration: %6 Device name: ...
  50. Sending information can help Microsoft create solutions. To see what types of information Windows can send, read our privacy ...
  51. Sending these files can help Microsoft improve the effectiveness of this program. If you do not want to send a file, clear ...
  52. Sends a print job to a network printer Usage: lpr -S server -P printer -C class -J job -o option -x -d filename Options: ...
  53. Sends and receives faxes and allows you to manage fax resources such as jobs, settings, reports, and fax devices on this ...
  54. Sends logging messages to the logging database when logging is enabled for the Active Directory Rights Management Services ...
  55. Sends the message to the queue or queues specified by an MSMQDestination object, an MSMQQueue object, or an IADs object that ...
  56. Sensors can detect information about your computer's current location, surroundings, and more. Once a sensor is enabled, ...
  57. Sensors can detect information about your computer's current location, surroundings, and more. Once a sensor is enabled, ...
  58. Sensors can detect information about your computer's current location, surroundings, and more. Once a sensor is enabled, ...
  59. Sensors can detect information about your computer's current location, surroundings, and more. Once a sensor is enabled, ...
  60. Sent Complete Packets/sec is the average rate, in packets per second, at which NDIS received a transmit-complete notification ...
  61. Sent faxes cannot be archived, because the Fax service cannot access the folder %1 specified as the Sent Items archive location. ...
  62. Separator pages are used at the beginning of each document to make it easy to find a document among others at the printer. ...
  63. Serial IOCTL Complete} A serial I/O operation was completed by another write to a serial port. (The IOCTL_SERIAL_XOFF_COUNTER ...
  64. Serial IOCTL Timeout} A serial I/O operation completed because the time-out period expired. (The IOCTL_SERIAL_XOFF_COUNTER ...
  65. Serialization depth has been overriden. Serialized type name: %1 Original depth: %2 Overriden depth: %3 Current depth below ...
  66. Serialization of a property has been skipped, because property getter failed. Property name: %1 Property owner's type name: ...
  67. Serialization of a script property has been skipped, because there is no runspace to use for evaluation of the property. ...
  68. Serialization of an enumerable object might not be complete, because object being enumerated threw an exception. Type of ...
  69. Serialization of specified properties failed, because one of the specified properties was missing. Type of object: %1 Property ...
  70. SerialNumber - Comma separated list of certificate serial numbers to revoke Reason - numeric or symbolic revocation reason: ...
  71. Server %1 resolved to these IP addresses: %2, but none of the addresses could be reached (pinged). Please check the network. ...
  72. Server Announce Allocations Failed/sec is the rate at which server (or domain) announcements have failed due to lack of memory. ...
  73. Server Application Error Server Application Error The server has encountered an error while loading an application during ...
  74. Server Application Error Server Application Error The server has reached the maximum recovery limit for the application during ...
  75. Server application is attempting to receive the SSL client certificate, which will be provided if available. If the client ...