Windows 10

  1. To specify a key combination for a custom shortcut, tap the shortcut you want to customize, tap in the Key combination box, ...
  2. To specify the size of the command history buffer under Window NT, use the /listsize switch which sets the number of commands ...
  3. To start Windows normally and undo the changes you made, select Normal Startup mode on the General tab and restart your computer. ...
  4. To sync some protected files, your device's clock must be updated. Do you want to retrieve the current time from the Internet ...
  5. To transfer the operations master role to the following computer, click Change. The current operations master is offline. ...
  6. To try and fix the problem, Windows has applied compatibility settings to this program. Windows will use these settings the ...
  7. To turn a feature on, select its check box. To turn a feature off, clear its check box. A filled box means that only part ...
  8. To turn on BitLocker with a SID-based Identity protector on this volume, you must provide at least one additional protector ...
  9. To turn on logging for one or more modules, click Show, and then type the module names in the list. Wildcards are supported. ...
  10. To turn on sharing, you must be logged on as an administrator or a member of the Administrators group. Once sharing is turned ...
  11. To uninstall devices or to change device properties or drivers, you must run Device Manager on the computer where you wish ...
  12. To upgrade from one edition of Windows to another edition of Windows, use Windows Anytime Upgrade. Cancel the upgrade, open ...
  13. To upgrade to Windows Server Technical Preview 2, the computer needs to be running Windows Server 2008, or Windows Server ...
  14. To upgrade Windows with Windows Media Player, you must be logged on to this computer as an administrator or a member of the ...
  15. To upgrade Windows, the Users, Program Files, and Windows directories need to be on the same partition. Upgrading when these ...
  16. To use a certificate in a certificate-based credential, it needs to be saved in your Personal store in Certificate Manager. ...
  17. To use all %16 features, such as %18; get the latest updates; and receive product support, your copy of %16 must be validated ...
  18. To use Insider Hub, make sure you're connected to the Internet and signed in with a Microsoft Account that's registered in ...
  19. To use Internet Explorer Enhanced Configuration when all other users are logged on, under Users click On (Recommended) . ...
  20. To use Internet Explorer Enhanced Configuration when members of the local Administrators group are logged on, under Administrators ...
  21. To use IPsec, both the target and initiator must support it. The Microsoft iSCSI initiator supports IPsec. See your system ...
  22. To use SR-IOV on this computer, the BIOS must be updated because it contains incorrect information describing the hardware ...
  23. To use SR-IOV on this system, the system BIOS must be updated to allow Windows to control PCI Express. Contact your system ...
  24. To use System Restore, you must specify which Windows installation to restore. Restart this computer, select an operating ...
  25. To use the Language bar later, check "Show the Language bar on the desktop" in the Language Bar Settings dialog, which you ...
  26. To use the Persist switch parameter, the drive name must be supported by the operating system (for example, drive letters ...
  27. To use the product key you entered, start the installation on a computer that is running a genuine version of Windows.%0 ...
  28. To use the shortcut %1# to dial %2 from your SIM card, select Call. To dial a different number, select Cancel and continue ...
  29. To use the shortcut %1# to dial %2 from your SIM/UIM card, select Call. To dial a different number, select Cancel and continue ...
  30. To use the shortcut %1# to dial %2 from your UIM card, select Call. To dial a different number, select Cancel and continue ...
  31. To use the shortcut %1# to dial %3 at %2 from your SIM card, select Call. To dial a different number, select Cancel and continue ...
  32. To use the shortcut %1# to dial %3 at %2 from your SIM/UIM card, select Call. To dial a different number, select Cancel and ...
  33. To use the shortcut %1# to dial %3 at %2 from your UIM card, select Call. To dial a different number, select Cancel and continue ...
  34. To use these settings, you must be a computer administrator and you must use the bcdedit.exe file. For more information, ...
  35. To use this application, the URL for Sun's Java must be added to the Trusted Sites zone in Internet Explorer. Adding the ...
  36. To use this application, you must add the URL of the Biztalk Server to the Local Intranet zone in Internet Explorer. If you ...
  37. To use this application, you must ensure that the setting that allows browser extensions from companies other than Microsoft ...
  38. To use this application, you must install it from a CD, or you must add the install point to the Local Intranet zone in Internet ...
  39. To use this method, specify an e-mail recipient address, and on the Receipts tab of the Fax Properties sheet, verify SMTP ...
  40. To use this program or computer, you must first log on to an authentication website. Contact your network administrator for ...
  41. To use this program or PC, you must first log on to an authentication website. Contact your network administrator for assistance. ...
  42. To use this program, you need to install the latest updates for your computer. For information on installing updates, see ...
  43. To use two-pass encoding, you must enable device control and setup an edit decision list (EDL) that has at least one entry.%0 ...
  44. To use, specify the same name and CHAP secret that was configured on the target for this initiator. The name will default ...
  45. To view a PDF, you need some media functionality that you don't currently have. You can install the Media Feature Pack to ...
  46. To view content on other homegroup computers, those computers must be turned on, on the same private network, and sharing ...
  47. To view events that have occurred on your computer, select the appropriate source, log or custom view node in the console ...
  48. To view purchase information about the media you have selected, you must change your Privacy settings in Tools, Options. ...
  49. To work with subscriptions, the Windows Event Collector Service must be running and configured. Do you want to start the ...
  50. to4: Configuring interface %1 with following parameters: ICS PrivateInterface = %2 AdvertiseDefaultRoute = %3 Advertises ...
  51. Toggle Keys causes a tone to sound when you press the CAPS LOCK, NUM LOCK, or SCROLL LOCK keys. The keyboard shortcut to ...
  52. Too many apps are running in the background. You'll need to stop an app before %s can run in the background and stay up to ...
  53. Too many files are opened on a remote server. This error should only be returned by the Windows redirector on a remote drive. ...
  54. Too many other files are currently in use by 16-bit programs. Exit one or more 16-bit programs, or increase the value of ...
  55. Too many repair events have occurred in a short period of time. Temporarily suspending posting of further repair events. ...
  56. TOO MANY REQUESTS - The server is refusing to service the request because too many requests have been submitted by the client. ...
  57. Too many USB hubs are connected together. A USB hub will not function when it's connected more than 5 hubs away from the ...
  58. Too many users have been granted access to this protected content. Reduce the number of users or replace users with user ...
  59. Tools to record system events by using Event Tracing for Windows, and a tool to analyze performance data in a graphical user ...
  60. Top Directory Search returning {result} objects. Consider the use of paged searches or setting the maximum objects read per ...
  61. Top directory search visited {result} objects and consumed {cpu} percent CPU. The search may need a new index or an adjusted ...
  62. TOPICS IN THIS HELP FILE To display help for a topic, run "bcdedit /? " where is one of the following: bootdebug /bootdebug ...
  63. Total Bytes/sec is the rate the Server is reading and writing data to and from the files for the clients on this CPU. This ...
  64. Total DPC Rate is the combined rate at which deferred procedure calls (DPCs) are added to the DPC queues of all processors ...
  65. Total DPC Time is the average percentage of time that all processors spend receiving and servicing deferred procedure calls ...
  66. Total DPCs Queued/sec is the combined rate at which deferred procedure calls (DPCs) are added to the DPC queue of all processors ...
  67. Total Inbound Packets Dropped is the total number of inbound packets dropped by IPsec, since the computer was last started. ...
  68. Total Inbound Packets Received is the total number of inbound packets successfully processed by IPsec, since the computer ...
  69. Total Interrupt Time is the average percentage of time that all processors spend receiving and servicing hardware interrupts ...
  70. Total Interrupts/sec is the combined rate of hardware interrupts received and serviced by all processors on the computer ...
  71. Total mSec - Kernel mode shows the time, in milliseconds, of kernel mode processor time used by all the processes in the ...
  72. Total mSec - Processor shows the time, in milliseconds, of processor time used by all the processes in the Job object, including ...
  73. Total mSec - User mode shows the time, in milliseconds, of user mode processor time used by all the processes in the Job ...
  74. Total number of blocks (including the check data blocks) contained in this aggregate physical extent. The block size (an ...
  75. Total number of bytes replicated in. Sum of the number of uncompressed bytes (never compressed) and the number of compressed ...