Windows 10

  1. Use email to send an invitation If you use a compatible email program this will start the email program and attach the invitation ...
  2. Use Family Safety to get reports of your kids' PC activities, choose what they see online, and set time limits, app restrictions, ...
  3. Use flicks to quickly navigate and perform shortcuts on your computer. If you have a Tablet PC, you can perform flicks using ...
  4. Use Media Player to play, edit, link, and embed a variety of multimedia files including video, audio, and animation files. ...
  5. Use my previous Bing searches, and location (if available) to improve search suggestions and provide more relevant web results. ...
  6. Use NetBIOS setting from the DHCP server. If static IP address is used or the DHCP server does not provide NetBIOS setting, ...
  7. Use of parentheses is not valid in the expression because identifier grouping is not allowed. Try removing the parentheses, ...
  8. Use offline files to keep copies on your computer of files stored on the network. This allows you to work with them even ...
  9. Use page prediction to improve reading, speed up browsing, and make your overall experience better in Windows browsers. Your ...
  10. Use random hardware addresses to make it harder for people to track your location when you connect to different Wi-Fi networks. ...
  11. Use random hardware addresses to make it harder for people to track your location when you connect to different WLAN networks. ...
  12. Use random hardware addresses to make it harder for people to track your location when you connect to this Wi-Fi network. ...
  13. Use random hardware addresses to make it harder for people to track your location when you connect to this WLAN network. ...
  14. Use recovery tools that can help fix problems starting Windows. Select an operating system to repair. If your operating system ...
  15. Use Remote Assistance on a trusted home or work network Your computer doesn't have a public IP address because your current ...
  16. Use rules to override the default security level. Click Browse to select a certificate, and then select a security level. ...
  17. Use SmartScreen online services to help protect against malicious content and downloads in sites loaded by Windows browsers ...
  18. Use Storage Spaces to save files to two or more drives to help protect you from a drive failure. Storage Spaces also lets ...
  19. Use tab to move between sections, including the first and second panes and the power buttons. Use up and down arrows to move ...
  20. Use the buttons below to enter the dialing steps for making international calls. Enter these steps in the exact order as ...
  21. Use the buttons below to enter the dialing steps for making local calls. Enter these steps in the exact order as they appear ...
  22. Use the buttons below to enter the dialing steps for making long-distance calls. Enter these steps in the exact order as ...
  23. Use the check boxes to choose the items you want to burn. Clear the check boxes of the items you do not want to burn. Click ...
  24. Use the check boxes to choose the items you want to rip. Clear the check boxes of the items you do not want to rip. Click ...
  25. Use the check boxes to choose the items you want to sync. Clear the check boxes of the items you do not want to sync. Click ...
  26. Use the correct SIM for your mobile broadband device This device is configured to only work with a SIM from a specific company. ...
  27. Use the correct SIM for your mobile broadband device This device is configured to only work with a SIM from a specific company. ...
  28. Use the correct SIM for your mobile broadband device This device is configured to only work with a SIM from a specific mobile ...
  29. Use the correct SIM for your mobile broadband device This device is configured to only work with a SIM from a specific mobile ...
  30. Use the correct SIM for your mobile broadband device This device is configured to only work with a specific SIM. If you don't ...
  31. Use the correct SIM for your mobile broadband device This device is configured to only work with a specific SIM. If you don't ...
  32. Use the correct SIM for your mobile broadband device This device is configured to only work with the first SIM. If you don't ...
  33. Use the correct SIM for your mobile broadband device This device is configured to only work with the first SIM. If you don't ...
  34. Use the correct SIM or contact your mobile operator This device is locked with a custom PIN. Contact your mobile operator ...
  35. Use the correct SIM or contact your mobile operator This device is locked with a custom PIN. Contact your mobile operator ...
  36. Use the Description field to specify a name or a detailed explanation of the IP filter. Select the Mirrored check box to ...
  37. Use the enforcement settings for each rule collection to configure whether rules are enforced or audited. If rule enforcement ...
  38. Use the local computer as a tunnel endpoint at one end of the tunnel. Specify the computers that can be reached through the ...
  39. Use the local computer as one endpoint. Specify the remote tunnel endpoint and the computers that can be reached through ...
  40. Use the port ranges controls to add or remove port ranges from the port categories for use with packet filtering or firewall ...
  41. Use the switch on the front or side of the computer, or function keys if available, to enable wireless capability on this ...
  42. Use the Windows Feedback app to tell us which features you love, which features you could do without, or when something could ...
  43. Use these options to automatically remove the application when it is no longer managed, publish OLE information in the active ...
  44. Use these settings to open a port through Windows Firewall. Choose a meaningful name you'll remember. To find the port number ...
  45. Use this option if there are computers on your network that do not support IPsec or have an incompatible IPsec configuration. ...
  46. Use this policy setting to configure the use of digits in the Microsoft Passport for work PIN. If you configure this policy ...
  47. Use this policy setting to configure the use of lowercase letters in the Microsoft Passport for work PIN. If you configure ...
  48. Use this policy setting to configure the use of special characters in the Microsoft Passport for work PIN gesture. Valid ...
  49. Use this policy setting to configure the use of uppercase letters in the Microsoft Passport for work PIN. If you configure ...
  50. Use this template to create a basic Data Collector Set. You can add or remove counters and change the scheduling options ...
  51. Use this to indicate if the template associated with this event contains valid WinRT types i.e. the event payload fields ...
  52. Use this wizard to determine how much content to make available offline. You can also set up a schedule to synchronize the ...
  53. Use this wizard to quickly schedule a common task. For more advanced options or settings such as multiple task actions or ...
  54. Use this workflow to build a customization package that targets a Windows edition. You may then use this package to build ...
  55. Use to flash to final retail devices. All content, including packages, binaries, and apps, must be Microsoft-signed for this ...
  56. Use to test the OS and drivers on the device. This image is unlocked and doesn't contain security enforcements or test content ...
  57. Use your favorite email address to sign in to Windows. If you already use an email address to sign in to PCs running Windows, ...
  58. Use your natural handwriting style. For example, if you normally write in cursive, copy the sentences in cursive. If you ...
  59. UseCustomSorting requires an object that implements IResultNodeComparer and the MMCListView.Sorter property set to the object. ...
  60. Used Average is the current number of resources (buffers) in use at this time. The number in parentheses following the resource ...
  61. used Dynamic Signature Service to discard obsolete signatures. Current Signature Version:%b%3 Signature Type:%b%12 Current ...
  62. used Dynamic Signature Service to retrieve additional signatures to help protect your machine. Current Signature Version:%b%3 ...
  63. Used Maximum is the maximum number of NetBEUI resources (buffers) in use at any point in time. This value is useful in sizing ...
  64. Used to add sites to their respective Trusted' or Intranet' zones. This is to mitigate some of the problems that the applications ...
  65. Used to discover and locate other PCs, devices, and network infrastructure components on the network. Also used to determine ...
  66. Used to modify the options attribute of an NTDS Site Settings Object. SYNTAX /siteoptions DSA /site: {+|-}IS_AUTO_TOPOLOGY_DISABLED ...
  67. Useful for tools that must always be available, such as remote administration tools. If you specify this option, you must ...
  68. User "%1" is currently logged on. If you delete the user, they will not be able to log on to the computer again, unlock the ...
  69. User %1 cannot be authenticated with OTP. Ensure that a DN is defined for the user name in Active Directory. Error code: ...
  70. User %1 cannot be authenticated with OTP. Ensure that a UPN is defined for the user name in Active Directory. Error code: ...
  71. User '[2]' has previously initiated an install for product '[3]'. That user will need to run that install again before they ...
  72. User '[2]' has previously initiated an install for product '[3]'. That user will need to run that install again before they ...
  73. User / Device claims information. Subject: Security ID: %1 Account Name: %2 Account Domain: %3 Logon ID: %4 Logon Type: %9 ...
  74. User / Device Claims This policy allows you to audit user and device claims information in the user's logon token. Events ...
  75. User Account Changed: Target Account Name: %2 Target Domain: %3 Target Account ID: %4 Caller User Name: %5 Caller Domain: ...