Windows 10

  1. Follow the instructions for wireless projection for your Miracast enabled device. If you're using Windows 8 or newer, press ...
  2. Following is the summary of warnings and errors encountered by File Replication Service while polling the Domain Controller ...
  3. Following successful promotion of the domain controller, restart your computer. Then allow dynamic updates to these zones ...
  4. Font name. For TrueType Fonts and TrueType Collections if NULL the installer registers the font after reading the correct ...
  5. For a ProtectedSpaceExtent that is allocated to a VolumeSet, (i.e. is named in a CIM_VolumeSetBasedOnPSExtent association), ...
  6. For added security, you can require users to press Ctrl+Alt+Delete before signing in. This guarantees that the authentic ...
  7. For additional information, double-click a permission entry. To modify a permission entry, select the entry and click Edit ...
  8. For additional information, double-click an audit entry. To modify an audit entry, select the entry and click Edit (if available). ...
  9. For assigned applications, whether or not a lightweight install or an actual install is performed 1 = This is not an assigned ...
  10. For best results, write as many sentences as possible. If you want to stop before you reach the end of the group of sentences, ...
  11. For best results, write as many sentences as possible. If you want to stop before you reach the end of the group of sentences, ...
  12. For better speech recognition, make sure that the microphone is positioned correctly, that you are speaking in a quiet environment, ...
  13. For certificate-based authentication of users and computers the client computers must use CAs registered in the Active Directory ...
  14. For certificate-based authentication of users and computers, along with CAs that are registered in Active Directory, the ...
  15. For Counter '%1', bad descriptionID %2!u!( 2!x!) was specified. descriptionID attribute is required, and must be globally ...
  16. For Counter '%1', bad nameID %2!u!( 2!x!) was specified. nameID attribute is required, and must be globally unique. In addition, ...
  17. For CounterSet '%1', bad descriptionID %2!u!( 2!x!) was specified. descriptionID attribute is required, and must be globally ...
  18. For CounterSet '%1', bad nameID %2!u!( 2!x!) was specified. nameID attribute is required, and must be globally unique. In ...
  19. For directory paths, indicates if the operation is to apply to the entire directory tree or only to the directory entry itself. ...
  20. For each selected item, Windows will check for problems and send you a message if problems are found. How does Security and ...
  21. For each selected item, Windows will check for problems and send you a message if problems are found. How does Security and ...
  22. For each zone, the Binary and Scripted Behavior security restrictions may be configured to allow only a list of admin-approved ...
  23. For each zone, the Network Protocol Lockdown security restriction may be configured to prevent active content obtained through ...
  24. For element with Id %1!u!( 1!x!), under '%2', attribute 'aggregate' is not allowed since the parent counterSet has either ...
  25. For element with Id %1!u!( 1!x!), under '%2', attribute 'baseID' is required. Here is the list of counter types that require ...
  26. For element with Id %1!u!( 1!x!), under '%2', attribute 'multiCounterID' is required, and the counter referenced by that ...
  27. For element with Id %1!u!( 1!x!), under '%2', attributes 'perfTimeID' and 'perfFreqID' are required, and the counters referenced ...
  28. For event '%1', with Id %2!u!( 2!x!), a property insert in the event message is referencing a non-existent property. Event ...
  29. For event '%1', with Id %2!u!( 2!x!), level must be specified and it should be one of Critical, Error, Warning, or Informational, ...
  30. For event '%1', with Id %2!u!( 2!x!), Opcode '%3' is global, and its value collides with that of local Opcode '%4' of the ...
  31. For example, file-based applications would typically have scope names based on file paths, whereas Web-based applications ...
  32. For example, to specify a device that has a VID 058F, PID 6387 and Revision 0142, type the value in the following format ...
  33. For file access across network domains to function properly, each UNIX user or group identity should map to a Windows user ...
  34. For help solving this problem with additional wireless software, contact the manufacturer of the wireless hardware or your ...
  35. For help solving this problem with additional wireless software, contact the manufacturer of the wireless hardware or your ...
  36. For HTTP header authentication, either WS_SSL_TRANSPORT_SECURITY_BINDING must also be included in the security description ...
  37. For information on command line arguments specific to Windows Deployment Services, see the Windows Deployment Services documentation. ...
  38. For machine certificates, please read help and contact a system administrator if this warning reappears the next time you ...
  39. For more detailed information, review the event log or run GPRESULT /H GPReport.html from the command line to access information ...
  40. For more information about these DISM options and their arguments, specify an option immediately before /?. Examples: DISM.exe ...
  41. For more information about these servicing commands and their arguments, specify a command immediately before /?. Examples: ...
  42. For more information about these servicing commands and their arguments, specify a command immediately before /?. Examples: ...
  43. For more information on how to obtain the manufacturer and product ID from the device search for "Enhanced Storage Access" ...
  44. For more information on how to set a silo type identifier for this policy search for "Enhanced Storage Access" on Microsoft ...
  45. For sharing and discovery to work properly, make sure the settings in your firewall program match the following settings. ...
  46. For template '%1', invalid Custom Xml specified. Custom Xml must have a top-level element and it should be in its own namespace. ...
  47. For the operation to complete, the user needs to log off and log on. Could not log the user off. Error - %s. Please log off. ...
  48. For Windows Installer packages, this is the file system path to the Windows installer package. For ZAP packages, this is ...
  49. For Windows NT only) The WinstationDesktop property specifies either the name of the desktop only or the name of both the ...
  50. For your computer's security, Internet Explorer does not allow you to drag web content to a program outside Protected mode ...
  51. For your computer's security, this file was saved to the Temporary Internet Files folder Do you want to open this folder? ...
  52. Force device Read/Write permissions to match the permission necessary for all IOCTLs. This compatibility fix enables SecureROM ...
  53. Force shutdown from a remote system This security setting determines which users are allowed to shut down a computer from ...
  54. Forces a transaction that has an undetermined outcome to either a committed or a rolled-back outcome. Usage : ktmutil tx ...
  55. Forces the application to use the WAVE_MAPPER device instead of device 0. It is only safe to apply this compatibility fix ...
  56. Forces the KCC on targeted domain controller(s) to immediately recalculate its inbound replication topology. By default, ...
  57. Forces the Start screen to use one of the available backgrounds, 1 through 20, and prevents the user from changing it. If ...
  58. Forces Windows to use the specified colors for the background and accent. The color values are specified in hex as #RGB. ...
  59. Forcing the user to restart their computer right after they install the app can cause them to lose data from other apps that ...
  60. Forcing the user to restart their computer right after they uninstall the app can cause them to lose data from other apps ...
  61. Foreground optimizations (prefetching) took longer to complete, resulting in a performance degradation in the system start ...
  62. Forest trust A forest trust is a transitive trust between two forests that allows users in any of the domains in one forest ...
  63. Forest-wide authentication Users in the %s forest can have access to all computers in the local forest. This option is preferred ...
  64. Forest-wide authentication Users in the local forest can have access to all computers in the %s forest. This option is preferred ...
  65. Forest-wide authentication Windows will automatically authenticate users from the local forest for all resources in the %s ...
  66. Forest-wide authentication Windows will automatically authenticate users from the specified forest for all resources in the ...
  67. Forgets a transaction that is waiting for a response from a subordinate enlistment or tm Usage : ktmutil tx forget {TmGuid} ...
  68. Form factor of memory installed on the computer system. This map is defined in Table 72 in section 7.18.1 (SMBIOS Reference ...
  69. Formal assessments cannot be run over a terminal server session. Please try again by running directly on the system's physical ...
  70. Formal assessments cannot be run when the system is on battery power. Please try again when the system is running AC power. ...
  71. Format cannot run because the volume is in use by another process. Format may run if this volume is dismounted first. ALL ...
  72. Format version: %1!d! CSid: %2!s! LinkIndex: 3!08x!.%4!08x! LinkFileNtfsID: 5!08x!.%6!08x! CSFileNtfsID: 7!08x!.%8!08x! CSChecksum: ...
  73. FORMAT volume /FS:file-system /V:label /Q /L /A:size /C /I:state /X /P:passes /S:state FORMAT volume /V:label /Q /F:size ...
  74. FORMAT volume /Q volume Specifies the drive letter (followed by a colon), mount point, or volume name. /FS:filesystem Specifies ...
  75. FORMAT volume /Q volume Specifies the drive letter (followed by a colon), mount point, or volume name. /FS:filesystem Specifies ...