Windows 8.1
- Often, a cooling device is installed in a package such as a chassis or a rack, not for a specific device, but to assist in ...
- Often, a temperature sensor is installed in a package such as a chassis or a rack, not to measure any particular device, ...
- Often, an alarm device is installed as part of a package, not to indicate issues with any particular logical device or physical ...
- OID "%1" defined for object %2 conflicts with the schema extensions needed for Windows Server 2008 R2. Status/Consequence ...
- OldInputObject for resource record has an invalid value. Failed to set the resource record on %1 server. Please check extended ...
- OLE (Object Linking and Embedding) in the application "%1" was trying to convert embedded content in a document; however, ...
- Omitted duplicate property. Keeping: '%1' (%2) Publisher: '%3' Product: '%4' URL: '%5' Omitting: '%6' (%7) Publisher: '%8' ...
- on %2 could not remove the print job submitted by %3 on %4 because the user does not have the Manage Documents permission. ...
- On a computer that is running Windows Server 2012 R2, SmigDeploy.exe creates a Windows Server Migration Tools deployment ...
- On a computer with Windows Vista or a later version of Windows, this option allows unsecured communication to be sent anytime ...
- On a domain joined computer, the TPM owner password file may no longer be valid if the Active Directory backup of TPM owner ...
- On a domain joined computer, the TPM owner password may no longer be valid if the Active Directory backup of TPM owner information ...
- On a Windows 2000, Windows XP, or Windows 2003 computer, this option allows unsecured communications to be sent only when ...
- On basic GUID partition table (GPT) disks, assigns the GPT attribute(s) to the partition with focus. Syntax: GPT ATTRIBUTES= ...
- On demand retrieval of data exceeds the maximum limit of 10 servers. Please select no more than 10 servers at a time to perform ...
- On demand retrieval of data exceeds the maximum limit of 10 servers. Please select ranges that belong to no more than 10 ...
- On directory servers, Ntds.dit and Edb.log should be the most active files. In this case, {file} has the highest I/O rate ...
- On disks with master boot record (MBR) disk formatting, marks the partition with focus as active. Syntax: ACTIVE Writes a ...
- On disks with master boot record (MBR) disk formatting, marks the partition with focus as inactive. Syntax: INACTIVE The ...
- On domain controllers this service enables users to log on to the network using the Kerberos authentication protocol. If ...
- On input, RequestLength is the length (in octets) of the Descriptor that should be returned. If this value is less than the ...
- On node '{0}' there is a network resource pool, '{1}', that does not contain any virtual Ethernet switches. Ensure that all ...
- On node '{0}', the virtual Fibre Channel storage area network (SAN) called '{1}' does not contain any Fibre Channel adapters. ...
- On return, if this value is True, a restart of the system is necessary for Offline Files to transition to the requested state. ...
- On Test Disk {0}, the inquiry data (SCSI page 83h VPD descriptor) seen by nodes {1} and {2} does not match. This disk will ...
- On the Dashboard, click the Users tab, and then click Add a user account in the Task pane. Follow the instructions in the ...
- On the next page some training text will be displayed. When the training text appears, read it aloud in a natural and even ...
- On the next screen, you will be asked to press one or more buttons on your set-top box remote control. If the set-top box ...
- On the server on which you are deploying the Quick Start, you must select a valid location for the virtual desktop template. ...
- On the Sync tab, create a list of items you want to add to your device, and then click Start Sync. Repeat this step every ...
- on the wire, this top level tune:Tuning element would be implicitly specified and not literally present. but, having the ...
- On the wizard page (by default), only the disk you are most likely to use is shown. In the list below, all the disks that ...
- On UNIX computers, passwords are stored in an encrypted form. All the UNIX computers in the domain must use the same encryption ...
- On Windows 9x when you copy a high color bitmap onto the clipboard, it always gets converted to a 24-bit DIB when the CF_DIB ...
- On-Screen Keyboard makes it possible to type using the mouse or another pointing device by clicking keys on a picture of ...
- Once a transaction is started, only commands that get called with the -UseTransaction flag become part of that transaction. ...
- Once applied, any security descriptors for registry or file system objects in these security templates cannot be removed ...
- Once encryption is enabled, it cannot be disabled. Make sure you have a current Emergency Repair Disk before continuing. ...
- Once removed, the cluster will not be able to grant use licenses for content protected against this trusted publishing domain. ...
- Once removed, the cluster will not be able to grant use licenses to users with rights account certificates issued by the ...
- Once removed, users will not be able to obtain licenses for content created using this template. Are you sure you want to ...
- Once selected this will enable classification to clear the previous system defined property value if it no longer applies ...
- Once selected this will enable classification to clear the previous user defined property value if it no longer applies to ...
- Once started, System Restore may not be interrupted Do you want to continue? System Restore cannot be undone until after ...
- Once the database is converted to higher version, you will not be able to revert it back to lower version. Do you want to ...
- Once you uninstall a display language Windows cannot display text in that language. Any supported speech and handwriting ...
- OnDemandInterfaceStateChanged. OnDemandType:%1, Interface: %2, OnDemandInfo:%3, ProviderID:%4, NewState:%5, Ref counter:%6 ...
- One Briefcase cannot be added to another. To add files from another Briefcase, select specific files and drag them to this ...
- One of the backup source volumes is deduped. Unoptimized backup of files to the volume failed because the target ran out ...
- One of the certificates in the certificate trust chain does not have a valid signature (CERT_TRUST_IS_NOT_SIGNATURE_VALID) ...
- One of the certificates in the certificate trust chain has a basic constraints extension, and either the certificate cannot ...
- One of the certificates in the certificate trust chain has a name constraints extension and a name constraint is missing ...
- One of the certificates in the certificate trust chain has a name constraints extension that contains unsupported fields ...
- One of the certificates in the certificate trust chain has a name constraints extension that is not valid (CERT_TRUST_INVALID_NAME_CONSTRAINTS) ...
- One of the certificates in the certificate trust chain has a name constraints extension, and one of the name choices in the ...
- One of the certificates in the certificate trust chain has a name constraints extension, and there is not a permitted name ...
- One of the certificates in the certificate trust chain has a policy constraints extension, and one of the issued certificates ...
- One of the certificates in the certificate trust chain has an extension that is not valid (CERT_TRUST_INVALID_EXTENSION) ...
- One of the certificates in the certificate trust chain was issued by a certification authority that the original certificate ...
- One of the Description values is invalid. The Description cannot be empty and cannot exceed the maximum length of 10240 characters. ...
- One of the DisplayName values is invalid. The DisplayName cannot be empty and cannot exceed the maximum length of 256 characters. ...
- One of the file paths specified for backup is that of a remote shared folder. Backup of a remote shared folder is not allowed. ...
- One of the file paths specified for backup is under a reparse point. Backup of files under a reparse point is not supported. ...
- One of the file paths specified for the recovery operation is under a reparse point. Recovery of files under a reparse point ...
- One of the files in the registry database had to be recovered by use of a log or alternate copy. The recovery was successful. ...
- One of the Max (maximum) values specified is not valid; it must be greater than or equal to the corresponding value in the ...
- One of the objects you are trying to edit has changed recently. Please use the RESCAN command to scan your configuration ...
- One of the options VssFullBackup or VssCopyBackup needs to be specified. Choose to create VSS full backups if you are not ...
- One of the rights template name already exists in AD RMS database. Please run Update-RmsCluster cmdlet to refresh the cluster ...
- One of the source volumes specified has an invalid format and cannot be protected using Windows Backup. Only volumes formatted ...
- One of the time components is out of range. The number of days must be less than %1, hours less than 24, minutes less than ...
- One of the volume corruption logs comes from a newer version of Windows and contains corruption records. The log will be ...
- One of the volume corruption logs is internally corrupted and needs to be recreated. The volume may contain undetected corruptions ...
- One of the volume corruption logs was deleted while still having corruption records in them. The volume contains detected ...
- One of the volumes specified for backup is invalid because it is either not on a fixed drive, is not formatted NTFS/ReFS, ...