Windows Server 2008

  1. What the notations mean: h = hour m = minute s = second tt = A.M. or P.M. h = 12 hour H = 24 hour hh, mm, ss = display leading ...
  2. What type of display is attached to your computer? If more than one display is connected to the computer select the display ...
  3. What you can try: If you want access to this website, you will need permission. Ask an administrator for permission. If you ...
  4. What you'll need: a USB flash drive (this requires a USB port on each computer) or an external hard disk that is compatible ...
  5. What you'll need: writable DVD or CD drives on both computers and enough discs to store all of the files that you want to ...
  6. When %s logs onto this computer, should the operating system use the roaming profile or just the locally cached copy of the ...
  7. When a block of memory is allotted for future updates, such as the memory allocated to hold discretionary access control ...
  8. When a quota or file screening event generates incident reports, default report settings are used. To modify the default ...
  9. When a trust exists between two forests, the authentication mechanisms for each forest trust the authentications that come ...
  10. When a user is connected through this Connection Manager profile, Connection Manager displays an icon in the notification ...
  11. When administrator accounts have no passwords, they can be used by anyone to bypass or turn off parental controls. If you ...
  12. When all the DCs are not SP1 or above and you enable this feature there is a possibility that any authenticated user on this ...
  13. When an add-on, such as a toolbar, is installed on your computer, it becomes part of your browser and operating system. In ...
  14. When an encoder is providing a stream for your broadcast, it can initiate the connection to your streaming media server (push) ...
  15. When an object identifier begins with either the number 0 or the number 1, the second number must be in the range of 0 to ...
  16. When asking for client authentication, this server sends a list of trusted certificate authorities to the client. The client ...
  17. When Chkdsk checks your disk drive for errors, it might save lost file fragments as files in your disk drive's root folder. ...
  18. When clearing volume flags that have been set using revert on close, the same combination of HIDDEN, READ ONLY, NO DRIVE ...
  19. When clients obtain an address, they are given DHCP options such as the IP addresses of routers (default gateways), DNS servers, ...
  20. When clients obtain an IP address from the DHCP server, they can be given DHCP options such as the IP addresses of DNS servers ...
  21. When clients obtain an IP address from the DHCP server, they can be given DHCP options such as the IP addresses of DNS servers ...
  22. When clients obtain an IP address from the DHCP server, they can be given DHCP options such as the IP addresses of WINS servers. ...
  23. When communicating with clients, AD FS uses the Secure Sockets Layer (SSL) protocol to encrypt network traffic. Choose a ...
  24. When communicating with clients, AD RMS uses the Secure Sockets Layer (SSL) protocol to encrypt network traffic. Choose a ...
  25. When communicating with clients, HRA and HCAP can use the Secure Sockets Layer (SSL) protocol to encrypt network traffic. ...
  26. When communicating with clients, TS Gateway uses the Secure Sockets Layer (SSL) protocol to encrypt network traffic. Choose ...
  27. When communicating with clients, WS-Atomic Transactions (WS-AT) uses the Secure Sockets Layer (SSL) protocol to encrypt network ...
  28. When Credential Roaming is disabled, the folders in which the user's credentials are stored are automatically removed from ...
  29. When Credential Roaming is enabled, the folders in which the user's credentials are stored are automatically added to the ...
  30. When file sharing is on, files and printers that you have shared from this computer can be accessed by people on the network. ...
  31. When forwarding events from local machine to itself, the query of the subscription can't contain target log of the subscription. ...
  32. When generating a cross realm referal from domain %1 the KDC was not able to find the suitable key to verify the ticket. ...
  33. When giving a presentation, your computer stays awake, system notifications are turned off, and the following settings are ...
  34. When going to a website with an address such as https://example.com, try adding the 'www' to the address, https://www.example.com. ...
  35. When Group Policy is selecting a domain controller, it will use the option chosen below. There is a policy that may override ...
  36. When I enter a password using Input Panel: - Require use of the on-screen keyboard - Do not show the cursor and which keys ...
  37. When I enter a password using Input Panel: - Show the on-screen keyboard - Do not show the cursor and which keys are tapped ...
  38. When installing from the CD autorun screen, you can have a HTML file opened by the browser in kiosk mode after system restart. ...
  39. When installing HP OpenView 3.0, do not install the included version of pcAnywhere. It installs a version of pcAnywhere that ...
  40. When installing this version of Visual Studio/InterDev, do not install Active Server Pages. If you install Active Server ...
  41. When instructed below, enter the passkey using your Bluetooth device. For more information about entering a passkey, see ...
  42. When Internet Connection Sharing is enabled, your LAN adapter will be set to use IP address %1. Your computer may lose connectivity ...
  43. When Internet Connection Sharing is enabled, your network adapter will be set to use IP address 192.168.0.1. This might cause ...
  44. When Internet Explorer Enhanced Security Configuration is enabled on your server, the security settings for all Internet ...
  45. When Internet Explorer Enhanced Security Configuration is enabled, the security settings for all intranet sites are set to ...
  46. When Internet Explorer navigates to a page which requires an ActiveX control or Java code that is not already on the machine, ...
  47. When lookups are case sensitive, the case of returned filenames are always preserved. The CDFScase, FATcase and NTFScase ...
  48. When media sharing is on, people and devices on the network can access shared music, pictures, and videos on this computer, ...
  49. When network discovery is on, this computer can see other network computers and devices and is visible to other network computers. ...
  50. When network discovery is on, this computer can see other network computers and devices and is visible to other network computers. ...
  51. When password protection is on, only people who have a user account and password on this computer can access shared files, ...
  52. When playing WM Audio Professional content over an S/PDIF connection, some enhancements are not available, including visualizations, ...
  53. When policy is no longer applied, would you like to remove the group or the members added to the group? Choose 'Yes' to remove ...
  54. When policy was applied to this machine, the user's machine was in the Internet Explorer enhanced security configuration. ...
  55. When preparing a new volume shadow copy for volume %2, the shadow copy storage on volume %3 could not be located in non-critical ...
  56. When preparing a new volume shadow copy for volume %2, the shadow copy storage on volume %3 did not have sufficiently large ...
  57. When preparing a new volume shadow copy for volume %2, the shadow copy storage on volume %3 did not have sufficiently large ...
  58. When processing the topology for partition %1, a shortest-path with non-intersecting schedules was found. The path originated ...
  59. When Public folder sharing is on, people on the network can access files in the Public folder. What is the Public folder? ...
  60. When Public folder sharing is on, people on the network can access files in the Public folder. What is the Public folder? ...
  61. When requesting multiple copies, the first copy will print.The remaining copies will be held on the printer until you release ...
  62. When RSM attempted to eject the media in drive %1 of library %2, the drive reported that it contained no media. Most likely, ...
  63. When searching for a control, Internet Explorer will first try the location specified in the CODEBASE attribute of the HTML ...
  64. When several bus and/or connection data widths are possible, the NegotiatedDataWidth property defines the one in use between ...
  65. When several bus and/or connection speeds are possible, the NegotiatedSpeed property defines the one in use between the devices. ...
  66. When should I select the " I am using a private computer that complies with my organization's security policy" check box? ...
  67. When should I select the "I am using a private computer that complies with my organization's security policy" check box? ...
  68. When snapshot volume %1 was restarted in the system, the restart failed. The volume is no longer found in the system. Try ...
  69. When software (an ActiveX control) is signed, it is possible to tell who published it. Do you want to allow signed software ...
  70. When specifying the executable that you want to trace, you must specify a full path to the executable and not just a filename. ...
  71. When the black or color ink out light is on or flashing, the print head cannot be cleaned until the ink cartridge is replaced. ...
  72. When the federation server issues a token to a client, it digitally signs the token using a token-signing certificate. When ...
  73. When the installation has ended (successfully or not), please click the Finish button or the Cancel button. DO NOT CLICK ...
  74. When the media access device supports multiple individual media, this property defines the maximum number which can be supported ...
  75. When the user clicks Help in the browser menu bar, and then clicks Online support, the URL you specify below will be displayed ...