Windows 10

  1. See if we have secure channels from all of the DC's in the domain the domains specified by /testdomain:. /nositerestriction ...
  2. Segment Load} A virtual DOS machine (VDM) is loading, unloading, or moving an MS-DOS or Win16 program segment image. An exception ...
  3. Segments Received/sec is the rate at which segments are received, including those received in error. This count includes ...
  4. Segments Retransmitted/sec is the rate at which segments are retransmitted, that is, segments transmitted containing one ...
  5. Segments Sent/sec is the rate at which segments are sent, including those on current connections, but excluding those containing ...
  6. Select a contact from the contact list below. Your contact will be able to connect to you securely without using a password. ...
  7. Select a cover page template, and type a subject line and note if required by the template. This information is automatically ...
  8. Select a game controller from the list below, and then click OK. If your game controller does not appear in the list, click ...
  9. Select a hard disk drive with enough free space to temporarily store files you're burning to a disc. The drive might need ...
  10. Select a language below to get started. Only languages that are currently installed and can be personalized are listed. What ...
  11. Select a line on your ISDN adapter, and type its multiple subscriber numbers, as provided by your phone company. After entering ...
  12. Select a line on your ISDN adapter. Then, select each channel, and type its phone number and SPID, as provided by your phone ...
  13. Select a line on your ISDN adapter. Then, select each channel, and type its phone number, as provided by your phone company. ...
  14. Select a line on your ISDN adapter. Then, select each logical terminal, and type its subaddress and phone number Repeat for ...
  15. Select a service provider. If you do not have a membership with the provider you select, the wizard will help you create ...
  16. Select a service provider. If you do not have a membership with the provider you select, the wizard will help you create ...
  17. Select a VPN server from the list below. You might choose a server closest to your current location, or a server closest ...
  18. Select an Active Directory Domain Controller from the list below by either name or site. (You can refresh the list by either ...
  19. Select an existing file encryption certificate or create a new one. If you have already encrypted files, you can update them ...
  20. Select how long Server for NFS will wait for clients to reclaims locks when Server for NFS recovers from a disruption in ...
  21. Select how long you would like to keep your download history. You can also purge your download history by clicking Clear ...
  22. Select one of these options to determine which action Windows Firewall with Advanced Security will take for the incoming ...
  23. Select one or more sync conflicts. Then click Resolve to view the details of each conflict and decide how to resolve them. ...
  24. Select one preferred network Windows Help and Support can provide more information about how to prevent your computer from ...
  25. Select one preferred network Windows Help and Support can provide more information about how to prevent your computer from ...
  26. Select only one file to rename, or use MS-DOS wildcards (for example, *.txt) to rename a group of files with similar names. ...
  27. Select options below to enable and change or disable types of global filters that will be applied to the Administrative Templates ...
  28. Select the action to use and the user or group that this rule should apply to. An allow action permits affected files to ...
  29. Select the application directory partitions you want to copy from the configuration set to the selected server. If you do ...
  30. Select the certificate the server should use to prove its identity to the client. A certificate that is configured for Protected ...
  31. Select the certificate the server should use to prove its identity to the client. This certificate will override the certificate ...
  32. Select the certificate you want to use as network unlock certificate. You may select the certificate directly from Active ...
  33. Select the certificate you want to use as recovery agent certificate. You may select the certificate directly from Active ...
  34. Select the criteria that you want to change in the auto playlist. The auto playlist is updated automatically each time you ...
  35. Select the DCOM network protocol sequence that you want to add. Enter the endpoint details and click OK when you have finished. ...
  36. Select the device you want to unplug or eject, and then click Stop. When Windows notifies you that it is safe to do so unplug ...
  37. Select the enhancements to apply for your current speaker configuration. Changes may not take effect until the next time ...
  38. Select the file from which the file hash will be created. Click Browse Files to select a specific file or click Browse Folders ...
  39. Select the file or folder path that this rule should affect. If you specify a folder path, all files underneath that path ...
  40. Select the folders containing encrypted files that you want to associate with the new certificate and key. Updating now helps ...
  41. Select the location of the application information you want to copy. Copying the information from backup files is usually ...
  42. Select the manufacturer and model of the printer driver to install. If the driver you want is not listed, click Have Disk ...
  43. Select the manufacturer and model of your device. If your device is not on this list, and you have an install disk (or you ...
  44. Select the manufacturer and model of your hardware device and then click Next. If you have a disk that contains the driver ...
  45. Select the manufacturer and model of your modem. If your modem is not listed, or if you have an installation disk, click ...
  46. Select the manufacturer and model of your printer. If your printer came with an installation disk, click Have Disk. If your ...
  47. Select the maximum number of processors and memory allowed on a single virtual non-uniform memory architecture (NUMA) node. ...
  48. Select the picture or pictures and click on "Get Pictures." For multiple pictures, hold Shift or Control while selecting ...
  49. Select the picture or pictures and click on "Get Pictures." To copy multiple pictures, hold the Shift or Control keys while ...
  50. Select the power plan that you want to customize, and then choose settings that reflect how you want your computer to manage ...
  51. Select the security option that you want to apply. This setting applies to the connections between the scan server and the ...
  52. Select the services that you want Hyper-V to offer to this virtual machine. To use the services you select, they must be ...
  53. Select the services that you want Hyper-V to offer to this virtual machine. To use the services you select, you must install ...
  54. Select the type of rules that you want to create. You should only create file hash rules when necessary. A file hash rule ...
  55. Select the users you want to designate as recovery agents. You may select the users directly from Active Directory if the ...
  56. Select this check box to make the button on the right the one you use for primary functions such as selecting and dragging. ...
  57. Select this option if the application that you plan to install creates an application directory upon installation, or if ...
  58. Select this option if the application that you plan to install does not create an application directory partition upon installation. ...
  59. Select this option to undo the System Restore done at the time listed, if you think it didn't fix problems or caused more ...
  60. Select this to delete any existing partitions and reformat all disks on this computer to match the layout of the system image. ...
  61. Select this to restore only the drives from your backup that are required to run Windows. If you have separate data drives, ...
  62. Select whether you wish to submit a request for a certificate, or to encode or decode a file between base 64 text and binary ...
  63. Select which language (system locale) to use when displaying text in programs that do not support Unicode. This setting affects ...
  64. Select word wrapping option to change how text appears on your screen. This does not affect how document looks when you print ...
  65. Selected directory schema information for object type %2 is not available (specifically: Class GUID) because: %1Extension ...
  66. Selected directory schema information for object type %2 is not available (specifically: Naming Attribute) because: %1You ...
  67. Selecting a different print processor may result in different options being available for default data types. If your service ...
  68. Selecting or clearing the "Index encrypted files" check box will immediately rebuild the index. Depending on how many files ...
  69. Selecting or clearing the "Index encrypted files" check box will immediately rebuild the index. Depending on how many files ...
  70. Selection does not appear with current information type settings or in the current subset. Please select a different set ...
  71. Selection does not appear with current information type settings. Please select a different set of information type settings. ...
  72. SelectionItemIsSelected} {Pause} {Name} {Pause} {ExpandCollapseState} {Pause} {CheckState} {LocalizedControlType} {Pause} ...
  73. SelectionItemIsSelected} {Pause} {Name} {Pause} {ValueIsReadOnly} {Pause} column {GridItemColumn} row {GridItemRow} {Pause} ...
  74. SelectionItemIsSelected} {Pause} {Name} {Pause} {ValueIsReadOnly} {Pause} column {TableItemColumn} row {TableItemRow} {Pause} ...
  75. SelectionItemIsSelected} {Pause} {ToggleState} {Pause} {Name} {Pause} {ItemType} {Pause} {ItemIndex} of {ItemCount} {Pause} ...