Windows 8

  1. When using a cascading RealTimeStylus configuration, the parent RealTimeStylus object must be created with a valid control ...
  2. When using both AH and ESP protocols in a qmsecmethods proposal, the same integrity value must be used for both protocols. ...
  3. When using Enterprise Certification Authorities, both Authenticated and Anonymous certificate templates need to be set at ...
  4. When using fixed provisioning and storage layouts other than simple stripe sets, the virtual disk consumes more free space ...
  5. When using the cmdlet New-Item to create a new rights template, the optional parameter "name" and its value "{0}" are not ...
  6. When using the Mastered format, you can only burn once to this kind of disc. If you want to add files to this disc more than ...
  7. When using this command, do not specify both the /PackagePath and /PackageName options. Re-enter the command, specifying ...
  8. When using WS_SSL_TRANSPORT_SECURITY_BINDING on the server, localCertCredential must be NULL. The server certificate must ...
  9. When viewing or setting load balance policies with the '-d' switch, the MPIO disk number is used to address the disk. For ...
  10. When WINS replicated with its partners, one of the partners showed there was more data that actually existed. WINS adjusted ...
  11. When working offline on a slow connection, you can work online again by pressing the "Work online" button in File Explorer. ...
  12. When you apply a template to existing file screens, the current properties of the template overwrite all properties of the ...
  13. When you apply a template to existing quotas, the current properties of the template overwrite all properties of the quotas. ...
  14. When you apply an auto apply quota to existing quotas, the current auto apply quota template properties overwrite all properties ...
  15. When you change the default parameters for a report, the changes affect all incident reports and any existing report tasks ...
  16. When you choose manual activation mode, Windows Speech Recognition turns off when you say "Stop Listening" and must be turned ...
  17. When you click Finish, this wizard creates the interface and enables it on the router. To edit the interface, in the Routing ...
  18. When you click Finish, you will be directed to the Audio Devices and Sound Themes control panel to help you plug in a microphone. ...
  19. When you click Finish, your device will be updated to mirror your Windows Media Player library. In the future, the device ...
  20. When you click Next, this wizard will start the Routing and Remote Access service and then start the Demand-Dial Interface ...
  21. When you click OK or Apply on the Properties dialog, you will be asked if you want the changes to affect all subfolders and ...
  22. When you click Revert Now, all changes to files and folders on this volume made after the selected shadow copy time will ...
  23. When you configure NPS as a NAP health policy server, you create health policies that allow NPS to validate the configuration ...
  24. When you configure NPS as a RADIUS server for 802.1X connections, you create network policies that allow NPS to authenticate ...
  25. When you configure NPS as a RADIUS server for Dial-Up or VPN connections, you create network policies that allow NPS to authenticate ...
  26. When you configure SQL Logging, you set up the data link between NPS and SQL Server. You also select an existing database ...
  27. When you create a custom recovery image, recimg will store it in the specified directory, and set it as the active recovery ...
  28. When you create a task, you can specify the conditions that will trigger the task. To change these triggers, open the task ...
  29. When you create a task, you must specify the action that will occur when your task starts. To change these actions, open ...
  30. When you decide how much memory to assign to a virtual machine, consider how you intend to use the virtual machine and the ...
  31. When you deploy 802.1X authenticating switches on your network, NPS can authenticate and authorize connection requests made ...
  32. When you deploy 802.1X wireless access points on your network, NPS can authenticate and authorize connection requests made ...
  33. When you deploy Dial-up servers on your network, NPS can authenticate and authorize connection requests made by dial-up clients ...
  34. When you deploy VPN servers on your network, NPS can authenticate and authorize connection requests made by VPN clients connecting ...
  35. When you dial into a router, it can offer to call you back to reduce your phone charges or to increase security. Specify ...
  36. When you dial into a server, it can offer to call you back to reduce your phone charges. Specify your callback preferences. ...
  37. When you dictate to the computer, remember to speak in full sentences, or in meaningful sentence fragments. The computer ...
  38. When you dictate, take care to pronounce words clearly. Try to speak in full sentences or meaningful sentence fragments. ...
  39. When you export RADIUS client and remote RADIUS server shared secrets, ensure that the exported file is stored in a secure ...
  40. When you finish this wizard, the selected disks will be reformatted and all the existing volumes and data on the disks will ...
  41. When you give commands to the computer, remember to speak in short phrases that the computer understands. The computer does ...
  42. When you include a folder in a library, the files appear in the library, but continue to be stored in their original locations. ...
  43. When you install Active Directory Certificate Services (AD CS), you are creating or extending a public key infrastructure ...
  44. When you open Media Guide, you can access the latest music, movie trailers, and news updates, but your computer must be connected ...
  45. When you opt into the Microsoft Update Improvement Program, your WSUS server will send information to Microsoft about the ...
  46. When you opt into the Microsoft Update Improvement Program, your WSUS server will send information to Microsoft about the ...
  47. When you renew a Certification Authority, you may reuse the existing keys. Select "Yes" to reuse keys and "No" to generate ...
  48. When you send problem reports to Microsoft, you will receive solutions when they are available. You can adjust how much information ...
  49. When you set up Windows Media Center for use with a CableCARD to access premium channels, information about your computer ...
  50. When you speak to the computer, you will see that the audio meter next to the microphone button will move up and down. This ...
  51. When you specify a Dynamic Link Library as a connect action, you must provide the function name that will be called as the ...
  52. When you specify one or more NAP-enabled scopes, NPS evaluates client health and performs authorization for client computers ...
  53. When you try to specify one set of rights for all users or groups, you are not allowed to specify array of rights inside ...
  54. When you use a remote shared folder as the storage destination for scheduled backups, each backup will erase the previous ...
  55. When you use InfoCenter, you can view information about the currently playing media, but your computer must be connected ...
  56. When you visit multiple websites that contain content from the same provider, such as a map, advertisement, or web measurement ...
  57. When your computer wakes from sleep, no one can access your data without entering the correct password to unlock the computer. ...
  58. When your computer wakes from sleep, no one can access your data without entering the correct password to unlock the computer. ...
  59. When your PC is online, Windows can automatically check for important updates and install them using these settings. When ...
  60. Whenever you audit start and stop events, Active Directory Certificate Services must calculate a cryptographic hash of the ...
  61. Where do you want to recover the system state to of this backup of the Active Directory database, registry, and SYSVOL state? ...
  62. where Is the path to a file to be created or loaded. Is the password to protect the invitation. Is the computer name or IP ...
  63. Where the Network Location Server is configured - on the DA server itself or on a different server 2. URL used for detecting ...
  64. which has timestamp %2 was not copied to %3 which has timestamp %4 since it is older than the file it would be overwriting. ...
  65. While a server is restarting, no services that are provided by the server are available. This operation cannot be canceled ...
  66. While adding the disk ('%1') to Cluster Shared Volumes, setting explicit snapshot diff area association for volume ('%2') ...
  67. While attempting to publish the printer to the Active Directory directory service, the print spooler could not create or ...
  68. While attempting to publish the printer to the Active Directory directory service, the print spooler could not create or ...
  69. While attempting to publish the printer to the Active Directory directory service, the print spooler could not create print ...
  70. While attempting to publish the printer to the Active Directory directory service, the print spooler could not find the appropriate ...
  71. While attempting to publish the printer to the Active Directory directory service, the print spooler could not find the appropriate ...
  72. While attempting to publish the printer to the Active Directory directory service, the print spooler could not find the appropriate ...
  73. While attempting to publish the printer to the Active Directory directory service, the print spooler failed to create or ...
  74. While attempting to publish the printer to the Active Directory directory service, Windows failed to publish property %1 ...
  75. While attempting to remove the printer from the Active Directory directory service, the print spooler failed to delete print ...