Windows 10

  1. If Command Extensions are enabled DEL and ERASE change as follows: The display semantics of the /S switch are reversed in ...
  2. If Command Extensions are enabled ENDLOCAL changes as follows: If the corresponding SETLOCAL enable or disabled command extensions ...
  3. If Command Extensions are enabled GOTO changes as follows: GOTO command now accepts a target label of :EOF which transfers ...
  4. If Command Extensions are enabled IF changes as follows: IF /I string1 compare-op string2 command IF CMDEXTVERSION number ...
  5. If Command Extensions are enabled MKDIR changes as follows: MKDIR creates any intermediate directories in the path, if needed. ...
  6. If Command Extensions are enabled SET changes as follows: SET command invoked with just a variable name, no equal sign or ...
  7. If Command Extensions are enabled SETLOCAL changes as follows: SETLOCAL batch command now accepts optional arguments: ENABLEEXTENSIONS ...
  8. If Command Extensions are enabled the DATE command supports the /T switch which tells the command to just output the current ...
  9. If Command Extensions are enabled the POPD command will delete any temporary drive letter created by PUSHD when you POPD ...
  10. If Command Extensions are enabled the PROMPT command supports the following additional formatting characters: $+ zero or ...
  11. If Command Extensions are enabled the PUSHD command accepts network paths in addition to the normal drive letter and path. ...
  12. If Command Extensions are enabled the SHIFT command supports the /n switch which tells the command to start shifting at the ...
  13. If Command Extensions are enabled the TIME command supports the /T switch which tells the command to just output the current ...
  14. If Command Extensions are enabled, and running on the Windows platform, then the BREAK command will enter a hard coded breakpoint ...
  15. If Command Extensions are enabled, external command invocation through the command line or the START command changes as follows: ...
  16. If Command Extensions are enabled, the following additional forms of the FOR command are supported: FOR /D %variable IN (set) ...
  17. If Command Extensions are enabled, then there are several dynamic environment variables that can be expanded but which don't ...
  18. If enabled (value = 4), the ComputerSystem can be reset via hardware (e.g. the power and reset buttons). If disabled (value ...
  19. If enabled (value = 4), the unitary computer system can be reset via hardware (e.g. the power and reset buttons). If disabled ...
  20. If enabled then discovered targets may not be manually configured. If disabled then discovered targets may be manually configured. ...
  21. If enabled then do not allow the initiator CHAP secret to be changed. If disabled then the initiator CHAP secret may be changed. ...
  22. If enabled then do not allow the initiator iqn name to be changed. If disabled then the initiator iqn name may be changed. ...
  23. If enabled then new iSNS servers may not be added and thus new targets discovered via those iSNS servers; existing iSNS servers ...
  24. If enabled then new target portals may not be added and thus new targets discovered on those portals; existing target portals ...
  25. If enabled then new targets may not be manually configured by entering the target name and target portal; already discovered ...
  26. If enabled then only those connections that are configured for IPSec may be established. If disabled then connections that ...
  27. If enabled then only those sessions that are configured for mutual CHAP may be established. If disabled then sessions that ...
  28. If enabled then only those sessions that are configured for one-way CHAP may be established. If disabled then sessions that ...
  29. If enabled then only those sessions that are established via a persistent login will be established and no new persistent ...
  30. If enabled, all ASP scripts will access Windows Management services using the account under which IIS is run (most commonly ...
  31. If enabled, clients will be unable to query this computer's index remotely. Thus, when they are browsing network shares that ...
  32. If enabled, files on network shares made available offline are not indexed. Otherwise they are indexed. Disabled by default. ...
  33. If enabled, Search and Indexing Options in Control Panel does not allow opening the Modify Locations dialog. Otherwise it ...
  34. If enabled, the indexer pauses whenever the computer is running on battery. If disabled, the indexing follows the default ...
  35. If enabled, the search indexer backoff feature will be disabled. Indexing will continue at full speed even when system activity ...
  36. If file locations are corrected during install, the uninstall program should attempt to find the file in its new location ...
  37. If necessary, move the position of the on-screen display menu by using the monitor buttons, so the menu doesn't cover the ...
  38. If new child domains were recently added to the specified forest, this forest might not have detected them yet. To ensure ...
  39. If no filter action in the following list matches your needs, click Add to create a new one. Select Use Add Wizard to create ...
  40. If only a single line connected, the server might not be configured to accept multi-link calls. to avoid unnecessary connection ...
  41. If open programs are associated with the selected processes and you suspend them, you might lose any unsaved data. If you ...
  42. If open programs are associated with the selected processes, they will close and you will lose any unsaved data. If you end ...
  43. If open programs or processes are associated with the selected process trees, they will close and you will lose any unsaved ...
  44. If open programs or processes are associated with this process tree, they will close and you will lose any unsaved data. ...
  45. If power was interrupted try again using the same restore point. If a system error or reset occurred, try choosing a different ...
  46. If problems are found, Startup Repair will fix them automatically. Your computer might restart several times during this ...
  47. If provider is configured for Per Local Initialization, then the Locale property refers to Locale's particular instantiation ...
  48. If provider is configured for Per User Initialization, then the User property refers to User's particular instantiation of ...
  49. If remote media connection is turned on, the following Microsoft accounts will be able to access your shared music, pictures ...
  50. If routing is enabled for a particular name suffix, all authentication requests in the local forest that use that suffix ...
  51. If routing is enabled for a particular name suffix, all authentication requests in the specified forest that use that suffix ...
  52. If routing is enabled for a particular name suffix, all authentication requests using that suffix are routed to the specified ...
  53. If session limit is reached or connection is broken, one of the following actions is taken: Disconnect - User is disconnected ...
  54. If set to true: once the file system is mounted, NFS requests are retried until the hosting system responds. If set to false: ...
  55. If set to true: retries are performed in the foreground. If set to false: if the first mount attempt fails, retries are performed ...
  56. If set, APIs that open OLE Structured Storage docfiles for writing (StgOpenStorageEx, etc.) will revert to passing FILE_SHARE_WRITE ...
  57. If set, combase will allow a restricted process to call into a non-restricted process for apps that implement some sort of ...
  58. If set, NDR will not check that an Interface Pointer returned in a call has the same IID as was requested by iid_is]. NB: ...
  59. If set, oleaut32 will use the legacy search logic for relative type library file names instead of the safe search path when ...
  60. If the app does not call Trim on its Direct3D device, the app will not release memory allocated for its earlier 3D work. ...
  61. If the app doesn't use the available Windows protections, it can increase the vulnerability of the customer's computer to ...
  62. If the app doesn't use the available Windows protections, it can increase the vulnerability of the customer's device to malware. ...
  63. If the app is a firewall, it might not be adequately protecting your computer. Uninstall your firewall, but to help make ...
  64. If the application was installed via on-demand installation by a file extension, this is the file extension that caused that ...
  65. If the application was installed via on-demand installation through a COM activation, this is the CLSID that caused the installation ...
  66. If the application was installed via on-demand installation through a COM activation, this is the ProgId that caused the ...
  67. If the backup location you want is not listed below, connect the drive with the backup to this computer, and then click Refresh. ...
  68. If the component was imported, no interface information is available. If the component was installed, the interface information ...
  69. If the Create method fails to start, the ErrorControl parameter passes the severity of the error. The value indicates the ...
  70. If the DefaultSeparateVDM switch in the Windows section of WIN.INI is TRUE, this flag causes the CreateProcess function to ...
  71. If the DNS resolver is configured with its own IP address and the DNS server is not running locally, the Active Directory ...
  72. If the DNS server cannot be configured to allow underscore characters in the host names, then the computer name must be modified. ...
  73. If the domain exists but is unavailable, try again when it is available. If it no longer exists as a Windows domain, then ...
  74. If the driver is not compatible, your hardware will not work correctly and your computer might become unstable or stop working ...
  75. If the expression passed to the Where() operator is null then you must specify a non-Default value for the selection mode ...