RAM
invalid page faults, 5–44
Office system requirements, 6–5, 6–19
rating website content, 5–12 to 5–13
Read and Execute permissions, 9–10
Read and Write permissions, 9–12
read messages, hiding, 7–42
Read permissions, 9–7, 9–10
readability statistics, Office, 6–45
reading ICF log entries, 10–12
Reading Layout option, 6–32
Reading panes, Outlook, 4–40
read–only files, 6–34
rearranging Office menu commands, 6–28
receiving e–mail. See e–mail
receiving protocols, e–mail, 4–3
recently opened documents, 7–15
recipients, e–mail, 4–34
recommended requirements, Office, 6–4 to 6–5
records, problems and resolutions, 2–18
recovering e–mails, 7–42, 7–49 to 7–50
recovering files
AutoRecover, 6–33
damaged or corrupted, 7–15
lost, 7–14 to 7–15, 7–29, 7–35
recovery. See restores
re–creating connections, 8–17 to 8–19
Recycle Bin, 5–19 to 5–20, 7–42
redial attempt options, 8–12
redial problems, 8–10 to 8–13
redirecting network data, 10–15
reducing service calls, 2–24 to 2–26
reference sources, 13–3, 14–2, 15–3, 16–3, 17–2
Refresh button, 5–23
refreshing background, 3–11
regional settings
changing, 3–22 to 3–23
common problems, 3–24 to 3–25
customizing, 3–23
input languages, 3–23 to 3–24
overview, 3–21 to 3–22
regular maintenance
Disk Cleanup, 2–28
Disk Defragmenter, 2–29
related sites, viewing, 5–8 to 5–9
relocating
Quick Launch icons, 3–10
taskbars, 3–8, 3–11
reminders management, Outlook
missing items, 7–47
overview, 7–46
past meeting reminders, 7–46
removing
All Programs list items, 3–14
frequently used programs, 3–14
Internet Connection Firewall, 10–19
notification area items, 3–5 to 3–7
Office components, 7–16
programs, 3–14
Quick Launch icons, 3–10
Start menu items, 3–14 to 3–16
viruses, 10–24 to 10–25
reordering
All Programs list items, 3–14
frequently used programs area, 3–14
Repair Broken Text, 7–5
repairing documents, 7–15
replacing system files, 3–45
reply e–mail addresses, 4–6
reporting Office application errors, 7–51
reports
critical updates, scanning for, 10–4
e–mail imports, 4–12
Group Policy settings, 9–38
Internet Explorer Reporting tool, 5–43
Microsoft Baseline Security Analyzer, 10–27 to 10–30
Network Troubleshooter, 8–24
Windows errors, 9–38
reproducing problems, 2–4
requirements
Office components, 6–3
Office installations, 6–4 to 6–5
verifying system, 6–11
Reset Account Lockout Counter option, 9–27
Reset Menu And Toolbar Usage Data option, 6–25
resetting
account lockout counters, 9–27
passwords, 9–28
toolbar default states, 6–29
Word interface items, 7–3 to 7–4
resizing
e–mail folders, 7–42
embedded objects, 7–13
Internet Explorer button icons, 5–4
linked objects, 7–13
Office icons, 6–25
Quick Launch, 3–9
taskbars, 3–8, 3–11
Web page text, 5–2
Word toolbars, 7–4
resolutions, screen, 5–42
resolving names
DNS, 8–40 to 8–42
HOSTS, 8–44
LMHOSTS, 8–43
overview, 8–40
WINS, 8–42 to 8–43
resolving service calls
overview, 2–1
questions to ask
overview, 2–2
scripts, 2–4
types, 2–2 to 2–4
reproducing problems, 2–4
solutions
documenting service calls, 2–18
implementing, 2–16 to 2–18
overview, 2–7
personal knowledge bases, 2–18
procedures, 2–7 to 2–8
researching, 2–9 to 2–16
task prioritization, 2–17
resource allocations, 2–24 to 2–26
resource sharing. See sharing files
response times, fragmentation, 3–44
restarting applications, 7–14
restore points
creating, 6–9
overview, 6–9
reverting to previous, 6–10
restores
AutoRecover, 6–33
damaged or corrupted files, 7–15
defaults, 3–29
e–mails, 7–42, 7–49 to 7–50
lost files, 7–14 to 7–15, 7–29
Outlook Express, 4–46
permissions, 9–16
System Restore, 6–9 to 6–10, 6–11
virus attacks, 10–24 to 10–25
Word interface items, 7–3 to 7–4
Word menu settings, 7–16
Restricted Sites zone, 5–38 to 5–39
reusing passwords, 9–26
Reverse Print Order option, 6–32
reversible encryption, 9–27
reverting restore points, 6–10
risks, cautioning users about, 2–28
routers. See also firewalls
Internet Control Message Protocol, 10–13 to 10–15
TCP/IP issues, 8–35
rows. See Excel
Run, Start menu list, 3–15
Run All From My Computer option, 6–15
Run From My Computer option, 6–15