Windows 10

  1. Website addresses will be sent to Microsoft to be checked against a list of reported unsafe websites. Information received ...
  2. Websites you visit won't show up in your browsing history, and Microsoft Edge won't save cookies, temporary internet files, ...
  3. Welcome to Narrator, a screen reader from Microsoft that reads aloud text and gives you information about objects on your ...
  4. Wersquo;ve got you covered, but we recommend that you do not continue to this website, because it has been reported to Microsoft ...
  5. WFPv4 is the set of Windows Filtering Platform counters that apply to traffic and connections over Internet Protocol version ...
  6. WFPv6 is the set of Windows Filtering Platform counters that apply to traffic and connections over Internet Protocol version ...
  7. What email address would this person like to use to sign in to Windows? (If you know the email address they use to sign in ...
  8. What the notations mean: h = hour m = minute s = second (long time only) tt = A.M. or P.M. h/H = 12/24 hour hh, mm, ss = ...
  9. When %s logs onto this computer, should the operating system use the roaming profile or just the locally cached copy of the ...
  10. When a block of memory is allotted for future updates, such as the memory allocated to hold discretionary access control ...
  11. When a file or folder is deleted in File Explorer, a copy of the file or folder is placed in the Recycle Bin. Using this ...
  12. When a Web page is opened in Internet Explorer, Internet Explorer puts restrictions on what the page can do, based on where ...
  13. When a website causes a failure or crash, Internet Explorer attempts to restore the site. It stops after two tries to avoid ...
  14. When adjusting the brightness on the next page, try to get the image to look like the sample image labeled Good brightness ...
  15. When adjusting the contrast on the next page, try to get the image to look like the sample image labeled Good contrast below. ...
  16. When Advanced Audit Policy Configuration settings are used, the "Audit: Force audit policy subcategory settings (Windows ...
  17. When an add-on, such as a toolbar, is installed on your computer, it becomes part of your browser and operating system. In ...
  18. When asking for client authentication, this server sends a list of trusted certificate authorities to the client. The client ...
  19. When Chkdsk checks your disk drive for errors, it might save lost file fragments as files in your disk drive's root folder. ...
  20. When clearing volume flags that have been set using revert on close, the same combination of HIDDEN, READ ONLY, NO DRIVE ...
  21. When completing the pending VM preservation operation, a restore of the virtual machine '%1' could not be initiated: %3 (%4). ...
  22. When completing the pending VM preservation operation, a restore of the virtual machine '%1' failed: %3 (%4). (Virtual machine ...
  23. When Credential Roaming is disabled, the folders in which the user's credentials are stored are automatically removed from ...
  24. When Credential Roaming is enabled, the folders in which the user's credentials are stored are automatically added to the ...
  25. When file and printer sharing is on, files and printers that you have shared from this computer can be accessed by people ...
  26. When forwarding events from local machine to itself, the query of the subscription can't contain target log of the subscription. ...
  27. When giving a presentation, your computer stays awake, system notifications are turned off, and the following settings are ...
  28. When going to a website with an address such as https://example.com, try adding the 'www' to the address, https://www.example.com. ...
  29. When Group Policy is selecting a domain controller, it will use the option chosen below. There is a policy that might override ...
  30. When installing HP OpenView 3.0, do not install the included version of pcAnywhere. It installs a version of pcAnywhere that ...
  31. When installing this version of Visual Studio/InterDev, do not install Active Server Pages. If you install Active Server ...
  32. When Internet Connection Sharing is enabled, your LAN adapter will be set to use IP address %1. Your computer may lose connectivity ...
  33. When Internet Connection Sharing is enabled, your network adapter will be set to use IP address 192.168.0.1. This might cause ...
  34. When Internet Explorer opens a Web page, it places restrictions on what the page can do, based on the location of the Web ...
  35. When location is on, the locations obtained to meet the needs of your apps and services will be stored for a limited time ...
  36. When media streaming is on, people and devices on the network can access pictures, music, and videos on this computer. This ...
  37. When network discovery is on, this computer can see other network computers and devices and is visible to other network computers. ...
  38. When operating system support ends, Defender will no longer be supported and your PC might be unprotected. To make sure your ...
  39. When password protected sharing is on, only people who have a user account and password on this computer can access shared ...
  40. When permissions on the Windows Search data directories are set incorrectly, the search service might not be able to access ...
  41. When playing WM Audio Professional content over an S/PDIF connection, some enhancements are not available, including visualizations, ...
  42. When preparing a new volume shadow copy for volume %1, the shadow copy storage on volume %2 could not be located in non-critical ...
  43. When preparing a new volume shadow copy for volume %1, the shadow copy storage on volume %2 did not have sufficiently large ...
  44. When preparing a new volume shadow copy for volume %1, the shadow copy storage on volume %2 did not have sufficiently large ...
  45. When preparing a new volume shadow copy for volume %2, the shadow copy storage on volume %3 could not be located in non-critical ...
  46. When preparing a new volume shadow copy for volume %2, the shadow copy storage on volume %3 did not have sufficiently large ...
  47. When preparing a new volume shadow copy for volume %2, the shadow copy storage on volume %3 did not have sufficiently large ...
  48. When printing through a print server, determines whether the print spooler on the client will process print jobs itself, ...
  49. When problem reporting is turned off, your computer cannot send new reports or check for solutions to existing problems. ...
  50. When processing the topology for partition %1, a shortest-path with non-intersecting schedules was found. The path originated ...
  51. When Public folder sharing is on, people on the network, including homegroup members, can access files in the Public folders. ...
  52. When restoring a system image from this volume, the disks on your computer cannot be formatted to match the layout of the ...
  53. When RunAs is enabled in a Windows PowerShell session configuration, the Windows security model cannot enforce a security ...
  54. When running in restricted mode, participating apps do not expose credentials to remote computers (regardless of the delegation ...
  55. When set to true, AM Service will not initiate definition update on start-up, regardless of whether an Engine is present ...
  56. When set, Windows Defender will check for new signatures before running a scan. If new signatures are found they will be ...
  57. When several bus and/or connection data widths are possible, the NegotiatedDataWidth property defines the one in use between ...
  58. When several bus and/or connection speeds are possible, the NegotiatedSpeed property defines the one in use between the devices. ...
  59. When shutting down, the virtual machine management service timed out waiting for a pending VM preservation operation to complete. ...
  60. When snapshot volume %1 was restarted in the system, the restart failed. The volume is no longer found in the system. Try ...
  61. When software (an ActiveX control) is signed, it is possible to tell who published it. Do you want to allow signed software ...
  62. When specifying channel property 'WS_CHANNEL_PROPERTY_HTTP_PROXY_SETTING_MODE' to 'WS_HTTP_PROXY_SETTING_MODE_CUSTOM', channel ...
  63. When specifying multiple certificate authentication proposals, all the certificate proposals with the same signing method ...
  64. When specifying the executable that you want to trace, you must specify a full path to the executable and not just a filename. ...
  65. When specifying tunnel endpoints in both IPv4 and IPv6, a tunnel endpoint may not be dynamic for one address family and explicit ...
  66. When starting a VM preservation operation, a fast save of the virtual machine '%1' could not be initiated since Dynamic Memory ...
  67. When starting a VM preservation operation, a save of the virtual machine '%1' could not be initiated: %3 (%4). (Virtual machine ...
  68. When sufficient hardware resources are not available, the security associations are not offloaded and are handled in software ...
  69. When the job is executing or has terminated without error, then this method returns no CIM_Error instance. However, if the ...
  70. When the media access device supports multiple individual media, this property defines the maximum number which can be supported ...
  71. When the Print Spooler service isn't running, you may not be able to install printers, connect to a network printer, or print ...
  72. When the runspace is set to use the current thread, the apartment state in the invocation settings must match that of the ...
  73. When the system time is set incorrectly, features that rely on time measurement such as Product Activation, malware scanners, ...
  74. When the Windows Search service is forcibly shut down while performing maintenance, searches might fail or return incomplete ...
  75. When this check box is selected, this app will alert all users if spyware or other potentially unwanted software attempts ...