Windows 8.1

  1. Select the USB flash drive from the drop down list. If you do not see the USB flash drive in the list, verify that it is ...
  2. Select the USB flash drive in the drop-down list. If your USB flash drive does not appear in the list, make sure that the ...
  3. Select the User Folders to be redirected. Folder Redirection enables you to redirect the path of the User Folders to a new ...
  4. Select the users you want to designate as recovery agents. You may select the users directly from Active Directory if the ...
  5. Select this check box to make the button on the right the one you use for primary functions such as selecting and dragging. ...
  6. Select this checkbox if you are using the IFM feature to copy the system state files to install an Active Directory database. ...
  7. Select this option for domain controllers unless you have completely eliminated NetBIOS name resolution from your network. ...
  8. Select this option if the application that you plan to install creates an application directory upon installation, or if ...
  9. Select this option if the application that you plan to install does not create an application directory partition upon installation. ...
  10. Select this option if the license server is used by Remote Desktop Session Host or Remote Desktop Virtualization Host servers ...
  11. Select this option if you are the only person who uses this computer. Your server will allow a longer period of inactivity ...
  12. Select this option if you have an existing certificate on this computer or if you want to import a certificate and use its ...
  13. Select this option if you have retained private keys from a previous installation or want to use a private key from an alternate ...
  14. Select this option if you use RD Web Access on a public computer. Be sure to log off when you have finished using RD Web ...
  15. Select this option if you want to create a custom topology after you finish this wizard. No replication will take place until ...
  16. Select this option to provide quick access to the documents you opened most recently. Clearing this list does not delete ...
  17. Select this option to undo the System Restore done at the time listed, if you think it didn't fix problems or caused more ...
  18. Select this option when you have multiple network connections or when you need routing protocols or demand-dial connections. ...
  19. Select this to delete any existing partitions and reformat all disks on this computer to match the layout of the system image. ...
  20. Select this to restore only the drives from your backup that are required to run Windows. If you have separate data drives, ...
  21. Select whether to assign the volume to a drive letter or a folder. When you assign a volume to a folder, the volume appears ...
  22. Select whether you wish to submit a request for a certificate, or to encode or decode a file between base 64 text and binary ...
  23. Select which language (system locale) to use when displaying text in programs that do not support Unicode. This setting affects ...
  24. Select which types of media you want to save to %1 by default. We'll create a folder for each type you select, but we won't ...
  25. Select which types of media you want to save to this drive by default. We'll create a folder for each type you select, but ...
  26. Select word wrapping option to change how text appears on your screen. This does not affect how document looks when you print ...
  27. Select YES to make these changes on all hosts in the cluster. Traffic to the entire cluster will be affected. Select NO to ...
  28. Select your connection from the list. The connection must have a saved user name and password, and be available to all users. ...
  29. Selected directory schema information for object type %2 is not available (specifically: Class GUID) because: %1Extension ...
  30. Selected directory schema information for object type %2 is not available (specifically: Naming Attribute) because: %1You ...
  31. Selected report scope paths: {0}. You have chosen an invalid combination of paths for the report scope. On clustered deployments, ...
  32. Selecting a different print processor may result in different options being available for default data types. If your service ...
  33. Selecting or clearing the "Index encrypted files" check box will immediately rebuild the index. Depending on how many files ...
  34. Selecting or clearing the "Index encrypted files" check box will immediately rebuild the index. Depending on how many files ...
  35. Selecting the option to use a hardware load balancer will disable NLB on the cluster. Until the hardware load balancer is ...
  36. Selecting the recovery option below will delete all state information from an Updating Run on this cluster, when the wizard ...
  37. Selecting these disks will create a shared pool. To create a clustered storage pool, select three or more disks on a shared ...
  38. Selecting this option enables all DirectAccess features, including client access and remote client management, force tunnelling, ...
  39. Selecting this option enables remote client management, and disables some DirectAccess features, including client access ...
  40. Selecting this option enables remote client management, and disables some DirectAccess features, including client access ...
  41. Selecting to install the latest updates and run Malicious Software Removal Tool and setting Internet Explorer as the default ...
  42. Selection does not appear with current information type settings or in the current subset. Please select a different set ...
  43. Selection does not appear with current information type settings. Please select a different set of information type settings. ...
  44. SelectionItemIsSelected} {Pause} {Name} {Pause} {ExpandCollapseState} {Pause} {CheckState} {LocalizedControlType} {Pause} ...
  45. SelectionItemIsSelected} {Pause} {Name} {Pause} {ValueIsReadOnly} {Pause} column {GridItemColumn} row {GridItemRow} {Pause} ...
  46. SelectionItemIsSelected} {Pause} {Name} {Pause} {ValueIsReadOnly} {Pause} column {TableItemColumn} row {TableItemRow} {Pause} ...
  47. SelectionItemIsSelected} {Pause} {ToggleState} {Pause} {Name} {Pause} {ItemType} {Pause} {ItemIndex} of {ItemCount} {Pause} ...
  48. SelectionItemIsSelected} {Pause} {ToggleState} {Pause} {Name} {Pause} {ItemType} {Pause} {ListItemSubitemNames} {Pause} {ItemIndex} ...
  49. SelectionItemIsSelected} {Pause} {ToggleState} {Pause} {Name} {Pause} {ItemType} {Pause} {Value} {Pause} {Formula} {Pause} ...
  50. Selections made in this wizard may overwrite your existing wireless network settings. Select No to use your existing wireless ...
  51. Selective application of legacy QoS policies based on domain or non-domain network category has been disabled on this machine. ...
  52. Selective application of QoS policies based on domain or non-domain network category has been disabled on this machine. QoS ...
  53. Selective authentication After you finish this wizard, grant individual access to each domain and server that you want to ...
  54. Selective authentication On finishing the wizard, grant individual access to each domain and server that you want to make ...
  55. Selective authentication Windows will not automatically authenticate users from the local domain for any resources in the ...
  56. Selective authentication Windows will not automatically authenticate users from the local forest for any resources in the ...
  57. Selective authentication Windows will not automatically authenticate users from the specified domain for any resources in ...
  58. Selective authentication Windows will not automatically authenticate users from the specified domain for any resources in ...
  59. Selective authentication Windows will not automatically authenticate users from the specified forest for any resources in ...
  60. Selective authentication Windows will not automatically authenticate users from the specified forest for any resources in ...
  61. Selects the specified disk and shifts the focus to it. Syntax: SELECT DISK= SELECT DISK=SYSTEM SELECT DISK=NEXT SELECT DISK= ...
  62. Selects the specified partition and shifts the focus to it. Syntax: SELECT PARTITION= PARTITION= The number of the partition ...
  63. Selects the specified virtual disk by filename and shifts the focus to it. Syntax: SELECT VDISK FILE= NOERR FILE= Specifies ...
  64. Selects the specified volume and shifts the focus to it. Syntax: SELECT VOLUME={ | } VOLUME= The number of the volume to ...
  65. Self healing state on %1!s! has been changed to: 2!x! Values: 0x1 - Enable general repair. 0x9 - Enable repair and warn about ...
  66. Self healing state on %1!s! is: 2!x! Values: 0x1 - Enable general repair. 0x9 - Enable repair and warn about potential data ...
  67. Self-propagating malicious code that can automatically distribute itself from one computer to another through network connections. ...
  68. Semaphores is the number of semaphores in the computer at the time of data collection. This is an instantaneous count, not ...
  69. Semicolon separated computer group names. This value can be empty. If some value is specified, then the client's computer ...
  70. Semicolon separated protocol names that are enabled for this policy. Names would match Win32_TSGatewayServerSettings.GetProtocolName ...
  71. SEND - Secure Neighbor Discovery - Certificate Path Advertisement is a secure version of Neighbor Discovery Advertisement. ...
  72. Send Complete Calls/sec is the average rate, in incidents per second, at which NDIS received a transmit-complete notification ...
  73. Send information to Microsoft about malware and potentially unwanted software that has been detected on your PC, including ...
  74. Send Microsoft info about how I use my PC, as part of the Customer Experience Improvement Program (a file will periodically ...
  75. Send Request Calls/sec is the average rate, in incidents per second, at which the stack requested a transmit on an interface. ...