Windows 8.1
- By default, snap-ins are added under the console root node. Selecting this check box enables you to choose the parent snap-in ...
- By default, the current DNS server is chosen to be the Key Master. You can also choose another DNS server as the Key Master ...
- By default, when each virtual machine is turned on, it will automatically select a virtual network switch, and this wizard ...
- By default, Windows Server Essentials is set up as the first server in your environment. Click Next to continue. The configuration ...
- By deploying as a virtual machine, you can have increased flexibility in the future for integrating with services that require ...
- By forcing the removal of Active Directory Domain Services (AD DS), you remove AD DS from this domain controller, including ...
- By joining our Customer Experience Improvement Program, you can help make this a better product. No information is collected ...
- By joining the Customer Experience Improvement Program (CEIP) Windows will periodically collect and upload statistical information ...
- By joining the Customer Experience Improvement Program (CEIP) Windows will periodically collect and upload statistical information ...
- By resetting ADFS URL to empty, the default Rights Account Certification (RAC) URL will be used for ADFS trust. The current ...
- By selecting this option you can save your credentials so that they can be used in the future when connecting to these programs. ...
- By subscribing to a newsgroup, the newsgroup will remain in your Folders list for easy access. Click the Tools menu and then ...
- By unchecking this box, Windows will not control wired LAN. Consequently no wired LAN connection and security settings will ...
- By unchecking this box, Windows will not control wireless LAN. Consequently no wireless LAN connection and security settings ...
- By using the DNS MMC snap-in, configure a forward lookup zone for these domains or configure the correct domain name on the ...
- By using the DNS MMC snap-in, configure an Active Directory-integrated DNS zone for the domain and enable secure (only) dynamic ...
- Bypass traverse checking This user right determines which users can traverse directory trees even though the user may not ...
- Bypassing SCSI command filtering poses a security risk. This configuration should be enabled only if it is required for compatibility ...
- bytes could not be read due to the presence of bad clusters on your hard disks, and so have not been backed up. Run CHKDSK ...
- bytes could not be restored because of bad clusters on the backup image. We recommend that you run the recovery again from ...
- bytes could not be written to the restored volume because of bad clusters on the recovered volume. We recommend that you ...
- Bytes of read I/Os that are received by ReadyBoost. This counter includes all reads whether or not they were satisfied by ...
- Bytes Received Per Second shows an estimate of the average number of bytes that were received each second over the past 30 ...
- Bytes Received/sec is the rate at which bytes are received by the local computer over an NBT connection to some remote computer. ...
- Bytes Received/sec is the rate at which bytes are received over each network adapter, including framing characters. Network ...
- Bytes Received/sec is the rate of bytes coming in to the Redirector from the network. It includes all application data as ...
- Bytes sent or received by '%1' is larger than what can fit inside of a 64-bit integer. Record and then reset the metric value ...
- Bytes Sent/sec is the rate at which bytes are sent by the local computer over an NBT connection to some remote computer. ...
- Bytes Sent/sec is the rate at which bytes are sent over each network adapter, including framing characters. Network Interface\Bytes ...
- Bytes Total/sec is the rate at which bytes are sent and received over each network adapter, including framing characters. ...
- Bytes Total/sec is the rate at which bytes are sent or received by the local computer over an NBT connection to some remote ...
- Bytes Total/sec is the rate the Redirector is processing data bytes. This includes all application and file data in addition ...
- Bytes Total/sec is the total rate of bytes sent to or received from the network by the protocol, but only for the frames ...
- Bytes Transmitted/sec is the rate at which bytes are leaving the Redirector to the network. It includes all application data ...
- C) Microsoft Corporation. . Welcome to {0}. This kit will help validate application compliance with {0} requirements. For ...
- C1 Time is the percentage of time the processor spends in the C1 low-power idle state. % C1 Time is a subset of the total ...
- C1 Time is the percentage of time the processor spends in the C1 low-power idle state. % C1 Time is a subset of the total ...
- C1 Transitions/sec is the rate that the CPU enters the C1 low-power idle state. The CPU enters the C1 state when it is sufficiently ...
- C2 Time is the percentage of time the processor spends in the C2 low-power idle state. % C2 Time is a subset of the total ...
- C2 Time is the percentage of time the processor spends in the C2 low-power idle state. % C2 Time is a subset of the total ...
- C2 Transitions/sec is the rate that the CPU enters the C2 low-power idle state. The CPU enters the C2 state when it is sufficiently ...
- C3 Time is the percentage of time the processor spends in the C3 low-power idle state. % C3 Time is a subset of the total ...
- C3 Time is the percentage of time the processor spends in the C3 low-power idle state. % C3 Time is a subset of the total ...
- C3 Transitions/sec is the rate that the CPU enters the C3 low-power idle state. The CPU enters the C3 state when it is sufficiently ...
- C:\WINDOWS> dir Directory of C:\WINDOWS SYSTEM 03-01-95 WIN COM 22,087 03-01-95 WIN INI 11,728 03-01-95 WELCOME EXE 19,539 ...
- CA failure - Failed to set continuously available property on a new or existing file share as Resume Key filter is not started ...
- CA failure - Failed to set continuously available property on a new or existing file share as the file share is not a cluster ...
- CableManagementStrategy is a free-form string that contains information on how the various cables are connected and bundled ...
- Cables and links utilize physical connectors to actually 'connect' physical elements. This association explicitly defines ...
- Cache Bytes Peak is the maximum number of bytes used by the system file cache since the system was last restarted. This might ...
- Cache Bytes the size, in bytes, of the portion of the system file cache which is currently resident and active in physical ...
- Cache Faults/sec is the rate at which faults occur when a page sought in the file system cache is not found and must be retrieved ...
- Cache Stats: - Checks where cache exceeded limit = %1!10lu! Successful cache enforcement passes = %2!10lu! Failed cache enforcement ...
- Cached (%1.0f MB) Amount of memory (including standby and modified memory) containing cached data and code for rapid access ...
- Cached printer %1 has been scavenged and deleted. This printer's age (%2 seconds) has surpassed the expiry age of %3 seconds. ...
- Cached printer %1 has been scheduled for deletion due to a logon scavenging operation. This printer is no longer referenced ...
- Cached: Amount of memory (including Standby and Modified memory) containing cached data and code for rapid access by processes, ...
- Caching makes the contents of the share available to offline users. If the BranchCache for Network Files role service is ...
- Calibration sends test tones to your speakers, and analyzes those tones using a microphone. The results of this analysis ...
- Call DataRequest.GetDeferral() before setting DataRequest.Data on an asynchronous method inside the delegate. Call DataR ...
- Call one of these numbers. The automated phone system will ask for your installation ID (IID). Some charges may be applied ...
- Calls one batch program from another. CALL drive:][path]filename batch-parameters batch-parameters Specifies any command-line ...
- CAMachineList - Comma-separated CA machine name list For a single machine, use a terminating comma Displays the site cost ...
- Can be used to determine which changes have not yet been replicated between two replication partners or track statistics ...
- can contain the following options: /Cert /Store /Type /FriendlyName /Subject /Issuer /Serial - the name of the certificate ...
- can now access the server. To connect this user's computer to the server, go to the user's computer, browse to http://{2}/connect, ...
- can only be used to manage Windows Server 2008 and Windows Server 2008 R2 systems. Server Manager can be used to manage Windows ...
- Can sustain failures of all nodes except 1. Cannot sustain a failure of the quorum disk. This configuration is not recommended ...
- Can sustain failures of {0} node(s) if the file share witness remains available. Can sustain failures of {1} node(s) if the ...
- Can sustain failures of {0} node(s) with the disk witness online. Can sustain failures of {1} node(s) if the disk witness ...
- Can't connect to the remote PC. Make sure the PC is turned on and connected to the network, and that remote access is enabled. ...
- Can't connect to the remote PC. There seems to be a problem with the remote PC. Contact technical support or ask your network ...
- Can't connect to the remote PC. There's a date or time difference between your PC and the remote PC. Make sure your PC's ...
- Can't connect to the remote PC. This might be because of a network connection problem. Try connecting again. If that doesn't ...
- Can't connect to the remote PC. This might be because of a network connection problem. Try connecting again. If this keeps ...