Windows 10
- By default, Add features to Windows 10 is available for all administrators. If you enable this policy setting, the wizard ...
- By default, connections to wireless networks from your computer can be accessed by anyone with a user account on the computer ...
- By default, most drivers and services that did not come preinstalled with Windows are not started in Safe Mode. They should ...
- By default, only share permissions are set on this folder. To control local access permissions to this folder or objects ...
- By default, Room Calibration assumes a directional microphone with unspecified frequency response. Check the box below if ...
- By default, snap-ins are added under the console root node. Selecting this check box enables you to choose the parent snap-in ...
- By default, the Printers folder includes a link to the Microsoft Support Web page called "Get help with printing". It can ...
- By default, when a Peer Group is created that allows for password-authentication (or the password for such a Group is changed), ...
- By joining our Customer Experience Improvement Program, you can help make this a better product. No information is collected ...
- By unchecking this box, Windows will not control wired LAN. Consequently no wired LAN connection and security settings will ...
- By unchecking this box, Windows will not control wireless LAN. Consequently no wireless LAN connection and security settings ...
- Bypass traverse checking This user right determines which users can traverse directory trees even though the user may not ...
- Bytes of read I/Os that are received by ReadyBoost. This counter includes all reads whether or not they were satisfied by ...
- Bytes Received/sec is the rate at which bytes are received by the local computer over an NBT connection to some remote computer. ...
- Bytes Received/sec is the rate at which bytes are received over each network adapter, including framing characters. Network ...
- Bytes Received/sec is the rate of bytes coming in to the Redirector from the network. It includes all application data as ...
- Bytes sent or received by '%1' is larger than what can fit inside of a 64-bit integer. Record and then reset the metric value ...
- Bytes Sent/sec is the rate at which bytes are sent by the local computer over an NBT connection to some remote computer. ...
- Bytes Sent/sec is the rate at which bytes are sent over each network adapter, including framing characters. Network Interface\Bytes ...
- Bytes Total/sec is the rate at which bytes are sent and received over each network adapter, including framing characters. ...
- Bytes Total/sec is the rate at which bytes are sent or received by the local computer over an NBT connection to some remote ...
- Bytes Total/sec is the rate the Redirector is processing data bytes. This includes all application and file data in addition ...
- Bytes Total/sec is the total rate of bytes sent to or received from the network by the protocol, but only for the frames ...
- Bytes Transmitted/sec is the rate at which bytes are leaving the Redirector to the network. It includes all application data ...
- C) Microsoft Corporation. . Welcome to {0}. This kit will help validate application compliance with {0} requirements. For ...
- C1 Time is the percentage of time the processor spends in the C1 low-power idle state. % C1 Time is a subset of the total ...
- C1 Time is the percentage of time the processor spends in the C1 low-power idle state. % C1 Time is a subset of the total ...
- C1 Transitions/sec is the rate that the CPU enters the C1 low-power idle state. The CPU enters the C1 state when it is sufficiently ...
- C2 Time is the percentage of time the processor spends in the C2 low-power idle state. % C2 Time is a subset of the total ...
- C2 Time is the percentage of time the processor spends in the C2 low-power idle state. % C2 Time is a subset of the total ...
- C2 Transitions/sec is the rate that the CPU enters the C2 low-power idle state. The CPU enters the C2 state when it is sufficiently ...
- C3 Time is the percentage of time the processor spends in the C3 low-power idle state. % C3 Time is a subset of the total ...
- C3 Time is the percentage of time the processor spends in the C3 low-power idle state. % C3 Time is a subset of the total ...
- C3 Transitions/sec is the rate that the CPU enters the C3 low-power idle state. The CPU enters the C3 state when it is sufficiently ...
- C:\WINDOWS> dir Directory of C:\WINDOWS SYSTEM 03-01-95 WIN COM 22,087 03-01-95 WIN INI 11,728 03-01-95 WELCOME EXE 19,539 ...
- CA failure - Failed to set continuously available property on a new or existing file share as Resume Key filter is not started ...
- CA failure - Failed to set continuously available property on a new or existing file share as the file share is not a cluster ...
- CableManagementStrategy is a free-form string that contains information on how the various cables are connected and bundled ...
- Cables and links utilize physical connectors to actually 'connect' physical elements. This association explicitly defines ...
- Cache Bytes Peak is the maximum number of bytes used by the system file cache since the system was last restarted. This might ...
- Cache Bytes the size, in bytes, of the portion of the system file cache which is currently resident and active in physical ...
- Cache Faults/sec is the rate at which faults occur when a page sought in the file system cache is not found and must be retrieved ...
- Cache size in bytes : 1 Cache allocated in bytes : 2 Cache populated in bytes : 3 Cache bytes in error : 4 Cache allocation ...
- Cached (%1.0f MB) Amount of memory (including standby and modified memory) containing cached data and code for rapid access ...
- Cached printer %1 has been scavenged and deleted. This printer's age (%2 seconds) has surpassed the expiry age of %3 seconds. ...
- Cached printer %1 has been scheduled for deletion due to a logon scavenging operation. This printer is no longer referenced ...
- Cached: Amount of memory (including Standby and Modified memory) containing cached data and code for rapid access by processes, ...
- Calibration sends test tones to your speakers, and analyzes those tones using a microphone. The results of this analysis ...
- Call DataRequest.GetDeferral() before setting DataRequest.Data on an asynchronous method inside the delegate. Call DataR ...
- Call one of these numbers. The automated phone system will ask for your installation ID (IID). Some charges may be applied ...
- Calls one batch program from another. CALL drive:][path]filename batch-parameters batch-parameters Specifies any command-line ...
- CAMachineList - Comma-separated CA machine name list For a single machine, use a terminating comma Displays the site cost ...
- Can be used to determine which changes have not yet been replicated between two replication partners or track statistics ...
- can't be added to a compressed (zipped) folder because it's online-only. Do you want to make it available offline and continue? ...
- Can't connect to %1!s!. Make sure the printer is on and you are connected to the printer's network, or try a different printer. ...
- Can't connect to the remote PC. Make sure the PC is turned on and connected to the network, and that remote access is enabled. ...
- Can't connect to the remote PC. There seems to be a problem with the remote PC. Contact technical support or ask your network ...
- Can't connect to the remote PC. There's a date or time difference between your PC and the remote PC. Make sure your PC's ...
- Can't connect to the remote PC. This might be because of a network connection problem. Try connecting again. If that doesn't ...
- Can't connect to the remote PC. This might be because of a network connection problem. Try connecting again. If this keeps ...
- Can't connect to the remote PC. You might not have permissions to sign in remotely. Ask your network administrator for help. ...
- Can't determine the age of the cross-ref %1 for the partition %2, so following errors relating to this cross-ref/partition ...
- Can't load because it uses an HTTP connection and the ms-https-connections-only meta element is present. Only HTTPS connections ...
- Can't match World Wide Port Names to World Wide Node Names. The number of World Wide Port Names should be equal to the number ...
- Can't move objects with memberships across domain boundaries as once moved, this would violate the membership conditions ...
- Can't navigate to from because the destination URI is in a higher security zone. You can't navigate from a zone with lower ...
- can't run because it isn't compatible with Internet Explorer's enhanced security features. These settings are managed by ...
- Can't specify StandardOutputPath, StandardInputPath or WorkingDirectory when trying to run a process under a user context. ...
- Canceling Alarm Toast with Notification Id : %1 to replace it wilth Alarm Toast with Notification Id : %2. Cancel result ...
- Canceling failover will result in the loss of any changes that have occurred in the Replica virtual machine after the failover ...
- Cancelling all print jobs to clear the queue might allow printing to resume. However, these print jobs will need to be resubmitted ...
- Cannot accept replication request from primary server '%3' as it is not authorized to replicate to this server: %1 (%2). ...
- Cannot accept replication request from primary server '%5' for virtual machine '%1' as the primary server belongs to a different ...
- Cannot accept replication request from primary server '%5' for virtual machine '%1' as the virtual machine does not have ...
- Cannot accept replication request from primary server '%5' for virtual machine '%1'. %3 (%4). An authorization entry for ...