Windows 8.1

  1. By default, snap-ins are added under the console root node. Selecting this check box enables you to choose the parent snap-in ...
  2. By default, the current DNS server is chosen to be the Key Master. You can also choose another DNS server as the Key Master ...
  3. By default, when each virtual machine is turned on, it will automatically select a virtual network switch, and this wizard ...
  4. By default, Windows Server Essentials is set up as the first server in your environment. Click Next to continue. The configuration ...
  5. By deploying as a virtual machine, you can have increased flexibility in the future for integrating with services that require ...
  6. By forcing the removal of Active Directory Domain Services (AD DS), you remove AD DS from this domain controller, including ...
  7. By joining our Customer Experience Improvement Program, you can help make this a better product. No information is collected ...
  8. By joining the Customer Experience Improvement Program (CEIP) Windows will periodically collect and upload statistical information ...
  9. By joining the Customer Experience Improvement Program (CEIP) Windows will periodically collect and upload statistical information ...
  10. By resetting ADFS URL to empty, the default Rights Account Certification (RAC) URL will be used for ADFS trust. The current ...
  11. By selecting this option you can save your credentials so that they can be used in the future when connecting to these programs. ...
  12. By subscribing to a newsgroup, the newsgroup will remain in your Folders list for easy access. Click the Tools menu and then ...
  13. By unchecking this box, Windows will not control wired LAN. Consequently no wired LAN connection and security settings will ...
  14. By unchecking this box, Windows will not control wireless LAN. Consequently no wireless LAN connection and security settings ...
  15. By using the DNS MMC snap-in, configure a forward lookup zone for these domains or configure the correct domain name on the ...
  16. By using the DNS MMC snap-in, configure an Active Directory-integrated DNS zone for the domain and enable secure (only) dynamic ...
  17. Bypass traverse checking This user right determines which users can traverse directory trees even though the user may not ...
  18. Bypassing SCSI command filtering poses a security risk. This configuration should be enabled only if it is required for compatibility ...
  19. bytes could not be read due to the presence of bad clusters on your hard disks, and so have not been backed up. Run CHKDSK ...
  20. bytes could not be restored because of bad clusters on the backup image. We recommend that you run the recovery again from ...
  21. bytes could not be written to the restored volume because of bad clusters on the recovered volume. We recommend that you ...
  22. Bytes of read I/Os that are received by ReadyBoost. This counter includes all reads whether or not they were satisfied by ...
  23. Bytes Received Per Second shows an estimate of the average number of bytes that were received each second over the past 30 ...
  24. Bytes Received/sec is the rate at which bytes are received by the local computer over an NBT connection to some remote computer. ...
  25. Bytes Received/sec is the rate at which bytes are received over each network adapter, including framing characters. Network ...
  26. Bytes Received/sec is the rate of bytes coming in to the Redirector from the network. It includes all application data as ...
  27. Bytes sent or received by '%1' is larger than what can fit inside of a 64-bit integer. Record and then reset the metric value ...
  28. Bytes Sent/sec is the rate at which bytes are sent by the local computer over an NBT connection to some remote computer. ...
  29. Bytes Sent/sec is the rate at which bytes are sent over each network adapter, including framing characters. Network Interface\Bytes ...
  30. Bytes Total/sec is the rate at which bytes are sent and received over each network adapter, including framing characters. ...
  31. Bytes Total/sec is the rate at which bytes are sent or received by the local computer over an NBT connection to some remote ...
  32. Bytes Total/sec is the rate the Redirector is processing data bytes. This includes all application and file data in addition ...
  33. Bytes Total/sec is the total rate of bytes sent to or received from the network by the protocol, but only for the frames ...
  34. Bytes Transmitted/sec is the rate at which bytes are leaving the Redirector to the network. It includes all application data ...
  35. C) Microsoft Corporation. . Welcome to {0}. This kit will help validate application compliance with {0} requirements. For ...
  36. C1 Time is the percentage of time the processor spends in the C1 low-power idle state. % C1 Time is a subset of the total ...
  37. C1 Time is the percentage of time the processor spends in the C1 low-power idle state. % C1 Time is a subset of the total ...
  38. C1 Transitions/sec is the rate that the CPU enters the C1 low-power idle state. The CPU enters the C1 state when it is sufficiently ...
  39. C2 Time is the percentage of time the processor spends in the C2 low-power idle state. % C2 Time is a subset of the total ...
  40. C2 Time is the percentage of time the processor spends in the C2 low-power idle state. % C2 Time is a subset of the total ...
  41. C2 Transitions/sec is the rate that the CPU enters the C2 low-power idle state. The CPU enters the C2 state when it is sufficiently ...
  42. C3 Time is the percentage of time the processor spends in the C3 low-power idle state. % C3 Time is a subset of the total ...
  43. C3 Time is the percentage of time the processor spends in the C3 low-power idle state. % C3 Time is a subset of the total ...
  44. C3 Transitions/sec is the rate that the CPU enters the C3 low-power idle state. The CPU enters the C3 state when it is sufficiently ...
  45. C:\WINDOWS> dir Directory of C:\WINDOWS SYSTEM 03-01-95 WIN COM 22,087 03-01-95 WIN INI 11,728 03-01-95 WELCOME EXE 19,539 ...
  46. CA failure - Failed to set continuously available property on a new or existing file share as Resume Key filter is not started ...
  47. CA failure - Failed to set continuously available property on a new or existing file share as the file share is not a cluster ...
  48. CableManagementStrategy is a free-form string that contains information on how the various cables are connected and bundled ...
  49. Cables and links utilize physical connectors to actually 'connect' physical elements. This association explicitly defines ...
  50. Cache Bytes Peak is the maximum number of bytes used by the system file cache since the system was last restarted. This might ...
  51. Cache Bytes the size, in bytes, of the portion of the system file cache which is currently resident and active in physical ...
  52. Cache Faults/sec is the rate at which faults occur when a page sought in the file system cache is not found and must be retrieved ...
  53. Cache Stats: - Checks where cache exceeded limit = %1!10lu! Successful cache enforcement passes = %2!10lu! Failed cache enforcement ...
  54. Cached (%1.0f MB) Amount of memory (including standby and modified memory) containing cached data and code for rapid access ...
  55. Cached printer %1 has been scavenged and deleted. This printer's age (%2 seconds) has surpassed the expiry age of %3 seconds. ...
  56. Cached printer %1 has been scheduled for deletion due to a logon scavenging operation. This printer is no longer referenced ...
  57. Cached: Amount of memory (including Standby and Modified memory) containing cached data and code for rapid access by processes, ...
  58. Caching makes the contents of the share available to offline users. If the BranchCache for Network Files role service is ...
  59. Calibration sends test tones to your speakers, and analyzes those tones using a microphone. The results of this analysis ...
  60. Call DataRequest.GetDeferral() before setting DataRequest.Data on an asynchronous method inside the delegate. Call DataR ...
  61. Call one of these numbers. The automated phone system will ask for your installation ID (IID). Some charges may be applied ...
  62. Calls one batch program from another. CALL drive:][path]filename batch-parameters batch-parameters Specifies any command-line ...
  63. CAMachineList - Comma-separated CA machine name list For a single machine, use a terminating comma Displays the site cost ...
  64. Can be used to determine which changes have not yet been replicated between two replication partners or track statistics ...
  65. can contain the following options: /Cert /Store /Type /FriendlyName /Subject /Issuer /Serial - the name of the certificate ...
  66. can now access the server. To connect this user's computer to the server, go to the user's computer, browse to http://{2}/connect, ...
  67. can only be used to manage Windows Server 2008 and Windows Server 2008 R2 systems. Server Manager can be used to manage Windows ...
  68. Can sustain failures of all nodes except 1. Cannot sustain a failure of the quorum disk. This configuration is not recommended ...
  69. Can sustain failures of {0} node(s) if the file share witness remains available. Can sustain failures of {1} node(s) if the ...
  70. Can sustain failures of {0} node(s) with the disk witness online. Can sustain failures of {1} node(s) if the disk witness ...
  71. Can't connect to the remote PC. Make sure the PC is turned on and connected to the network, and that remote access is enabled. ...
  72. Can't connect to the remote PC. There seems to be a problem with the remote PC. Contact technical support or ask your network ...
  73. Can't connect to the remote PC. There's a date or time difference between your PC and the remote PC. Make sure your PC's ...
  74. Can't connect to the remote PC. This might be because of a network connection problem. Try connecting again. If that doesn't ...
  75. Can't connect to the remote PC. This might be because of a network connection problem. Try connecting again. If this keeps ...