Windows Server 2003

  1. Segment Load} A virtual DOS machine (VDM) is loading, unloading, or moving an MS-DOS or Win16 program segment image. An exception ...
  2. Segments Received/sec is the rate at which segments are received, including those received in error. This count includes ...
  3. Segments Retransmitted/sec is the rate at which segments are retransmitted, that is, segments transmitted containing one ...
  4. Segments Sent/sec is the rate at which segments are sent, including those on current connections, but excluding those containing ...
  5. Select "Cancel Printing" button. Change your driver setting to Manual Feed or install the optional Auto Sheet Feeder and ...
  6. Select "Continue" button to continue printing in Manual Feed mode. Load a single sheet in the manual feed slot and select ...
  7. Select "Continue" button to continue printing. To continue printing, plug the AC adapter output into the AC adapter socket ...
  8. Select 'Download log', 'Clear log', or 'Log properties' to perform tasks on the entire log. To view the details of a specific ...
  9. Select a certificate from the following list and then click "Register" to register it in Active Directory. You can then use ...
  10. Select a certificate type for your request. You can access only certificate types that you have permissions for and that ...
  11. Select a computer naming format for new client computers, and set the location in the directory service where client computer ...
  12. Select a cover page template, and type a subject line and note if required by the template. This information is automatically ...
  13. Select a domain controller from the list below by either name or site. (You can refresh the list by either clicking "Find ...
  14. Select a drive where Windows can store an "image" of the CD to be written. The image file may use up to 1 GB of disk space. ...
  15. Select a file and a section of the file, and then select the key that you want to modify. Type a new value, and then click ...
  16. Select a game controller from the list below, and then click OK. If your game controller does not appear in the list, click ...
  17. Select a line on your ISDN adapter, and type its multiple subscriber numbers, as provided by your phone company. After entering ...
  18. Select a line on your ISDN adapter. Then, select each channel, and type its phone number and SPID, as provided by your phone ...
  19. Select a line on your ISDN adapter. Then, select each channel, and type its phone number, as provided by your phone company. ...
  20. Select a line on your ISDN adapter. Then, select each logical terminal, and type its subaddress and phone number Repeat for ...
  21. Select a particular font or piece of stationery to be used every time you start a new e-mail message. Click the Tools menu, ...
  22. Select a role. If the role has not been added, you can add it. If it has already been added, you can remove it. If the role ...
  23. Select a server to use as a baseline for this security policy. You can apply this policy to the selected server or to any ...
  24. Select a service provider. If you do not have a membership with the provider you select, the wizard will help you create ...
  25. Select a tModel that represents an appropriate identification scheme and then type a identifier name and value. If you are ...
  26. Select a VPN server from the list below. You might choose a server closest to your current location, or a server closest ...
  27. Select if your Web Server supports Internet Printing. Internet Printing enables HTTP-based printing and web-based print queue ...
  28. Select Internet Explorer Enhanced Security Configuration , click the check box to clear the selection, and then click OK ...
  29. Select No if you plan to use an Internet service provider, or \"ISP\" for short, that requires you to install its own software. ...
  30. Select one of the devices below to associate with your color profile. If none of the devices are appropriate, cancel and ...
  31. Select only one file to rename, or use MS-DOS wildcards (for example, *.txt) to rename a group of files with similar names. ...
  32. Select or type the name of the domain in which the cluster is a member. Only computers in this domain can be members of the ...
  33. Select or type the name of the domain in which the cluster will be created. Only computers in this domain can be members ...
  34. Select or type your organization's name and your organizational unit. This is typically the legal name of your organization ...
  35. Select self-register to document the available interfaces within this UDDI Services site. When deploying multiple web servers ...
  36. Select the attribute to which the following rules will be applied. Rules are processed in the order they appear in the list. ...
  37. Select the c ountry/region where you are now. Click the down arrow, or press the ALT + &"DOWN ARROW&" keys to view the list ...
  38. Select the c ountry/region where you are now. Click the down arrow, or press the ALT + &"DOWN ARROW&" keys to view the list ...
  39. Select the c ountry/region where you are now. Click the down arrow, or press the ALT + &"DOWN ARROW&" keys to view the list ...
  40. Select the certificate the server should use to prove its identity to the client. A certificate that is configured for Protected ...
  41. Select the certificate the server should use to prove its identity to the client. This certificate will override the certificate ...
  42. Select the check box next to each user who should be allowed a connection to this computer. Note that other factors, such ...
  43. Select the computer that hosts the UDDI Services database components for this site, and then select the instance that hosts ...
  44. Select the computers hosting the UDDI Services database components that will be used for read (inquiry) and write (publish) ...
  45. Select the connections that the DHCP server supports for servicing clients. If this list is empty, verify that a static IP ...
  46. Select the country/region where you are now. Click the down arrow, or press the ALT + &"DOWN ARROW&" keys to view the list ...
  47. Select the device you want to unplug or eject, and then click Stop. When Windows notifies you that it is safe to do so unplug ...
  48. Select the devices that you want to use for sending faxes. Use the arrows to the right of the list to set the order in which ...
  49. Select the devices that you want to use to send or receive faxes. This version of Microsoft Windows allows only %d devices ...
  50. Select the encryption certificate and algorithm. These are included with your digitally signed messages so others can send ...
  51. Select the IP addresses that will serve DNS requests. The server can listen for DNS queries on all IP addresses defined for ...
  52. Select the items you want to set when you switch between themes. These settings will only take effect on future theme selections. ...
  53. Select the job category that best describes your organizational role in using computers and making software purchasing decisions. ...
  54. Select the manufacturer and model of the Windows XP and Windows Server 2003 printer driver you want to install. If your printer ...
  55. Select the manufacturer and model of your device. If your device is not on this list, and you have an install disk (or you ...
  56. Select the manufacturer and model of your hardware device and then click Next. If you have a disk that contains the driver ...
  57. Select the manufacturer and model of your modem. If your modem is not listed, or if you have an installation disk, click ...
  58. Select the manufacturer and model of your printer. If your printer came with an installation disk, click Have Disk. If your ...
  59. Select the manufacturer and model of your printer. If your printer came with an installation disk, click Have Disk. If your ...
  60. Select the manufacturer and model of your printer. If your printer is not listed, consult your printer documentation for ...
  61. Select the method you would like to use to configure your proxy settings. If you are not sure which option to select, select ...
  62. Select the picture or pictures and click on "Get Pictures." For multiple pictures, hold Shift or Control while selecting ...
  63. Select the picture or pictures and click on "Get Pictures." To copy multiple pictures, hold the Shift or Control keys while ...
  64. Select the power scheme with the most appropriate settings for this computer. Note that changing the settings below will ...
  65. Select the server that was used as a baseline for this security policy. You can apply this policy to the selected server ...
  66. Select the services on your network to which you want to provide access for internet users. This will create exceptions in ...
  67. Select the services that you want for each input language shown in the list. Use the Add and Remove buttons to modify this ...
  68. Select the type of file you want to download and then choose Download. Select Back to return to the previous page without ...
  69. Select the user group(s) that you want to apply the enhanced security configuration to & Administrators, Users, or both & ...
  70. Select the users you want to designate as recovery agents. You may select the users directly from Active Directory if the ...
  71. Select this check box to make the button on the right the one you use for primary functions such as selecting and dragging. ...
  72. Select this check box to turn off advanced text services in all programs. Not recommended for East Asian users because this ...
  73. Select this check box to turn on advanced text services in Notepad and other programs that do not normally support speech ...
  74. Select this computer's Internet connection. The selected connection, %1!.1023ws!, is most likely to be the Internet connection. ...
  75. Select this option for domain controllers unless you have completely eliminated NetBIOS name resolution from your network. ...