Windows 8.1

  1. Often, a cooling device is installed in a package such as a chassis or a rack, not for a specific device, but to assist in ...
  2. Often, a temperature sensor is installed in a package such as a chassis or a rack, not to measure any particular device, ...
  3. Often, an alarm device is installed as part of a package, not to indicate issues with any particular logical device or physical ...
  4. OID "%1" defined for object %2 conflicts with the schema extensions needed for Windows Server 2008 R2. Status/Consequence ...
  5. OldInputObject for resource record has an invalid value. Failed to set the resource record on %1 server. Please check extended ...
  6. OLE (Object Linking and Embedding) in the application "%1" was trying to convert embedded content in a document; however, ...
  7. Omitted duplicate property. Keeping: '%1' (%2) Publisher: '%3' Product: '%4' URL: '%5' Omitting: '%6' (%7) Publisher: '%8' ...
  8. on %2 could not remove the print job submitted by %3 on %4 because the user does not have the Manage Documents permission. ...
  9. On a computer that is running Windows Server 2012 R2, SmigDeploy.exe creates a Windows Server Migration Tools deployment ...
  10. On a computer with Windows Vista or a later version of Windows, this option allows unsecured communication to be sent anytime ...
  11. On a domain joined computer, the TPM owner password file may no longer be valid if the Active Directory backup of TPM owner ...
  12. On a domain joined computer, the TPM owner password may no longer be valid if the Active Directory backup of TPM owner information ...
  13. On a Windows 2000, Windows XP, or Windows 2003 computer, this option allows unsecured communications to be sent only when ...
  14. On basic GUID partition table (GPT) disks, assigns the GPT attribute(s) to the partition with focus. Syntax: GPT ATTRIBUTES= ...
  15. On demand retrieval of data exceeds the maximum limit of 10 servers. Please select no more than 10 servers at a time to perform ...
  16. On demand retrieval of data exceeds the maximum limit of 10 servers. Please select ranges that belong to no more than 10 ...
  17. On directory servers, Ntds.dit and Edb.log should be the most active files. In this case, {file} has the highest I/O rate ...
  18. On disks with master boot record (MBR) disk formatting, marks the partition with focus as active. Syntax: ACTIVE Writes a ...
  19. On disks with master boot record (MBR) disk formatting, marks the partition with focus as inactive. Syntax: INACTIVE The ...
  20. On domain controllers this service enables users to log on to the network using the Kerberos authentication protocol. If ...
  21. On input, RequestLength is the length (in octets) of the Descriptor that should be returned. If this value is less than the ...
  22. On node '{0}' there is a network resource pool, '{1}', that does not contain any virtual Ethernet switches. Ensure that all ...
  23. On node '{0}', the virtual Fibre Channel storage area network (SAN) called '{1}' does not contain any Fibre Channel adapters. ...
  24. On return, if this value is True, a restart of the system is necessary for Offline Files to transition to the requested state. ...
  25. On Test Disk {0}, the inquiry data (SCSI page 83h VPD descriptor) seen by nodes {1} and {2} does not match. This disk will ...
  26. On the Dashboard, click the Users tab, and then click Add a user account in the Task pane. Follow the instructions in the ...
  27. On the next page some training text will be displayed. When the training text appears, read it aloud in a natural and even ...
  28. On the next screen, you will be asked to press one or more buttons on your set-top box remote control. If the set-top box ...
  29. On the server on which you are deploying the Quick Start, you must select a valid location for the virtual desktop template. ...
  30. On the Sync tab, create a list of items you want to add to your device, and then click Start Sync. Repeat this step every ...
  31. on the wire, this top level tune:Tuning element would be implicitly specified and not literally present. but, having the ...
  32. On the wizard page (by default), only the disk you are most likely to use is shown. In the list below, all the disks that ...
  33. On UNIX computers, passwords are stored in an encrypted form. All the UNIX computers in the domain must use the same encryption ...
  34. On Windows 9x when you copy a high color bitmap onto the clipboard, it always gets converted to a 24-bit DIB when the CF_DIB ...
  35. On-Screen Keyboard makes it possible to type using the mouse or another pointing device by clicking keys on a picture of ...
  36. Once a transaction is started, only commands that get called with the -UseTransaction flag become part of that transaction. ...
  37. Once applied, any security descriptors for registry or file system objects in these security templates cannot be removed ...
  38. Once encryption is enabled, it cannot be disabled. Make sure you have a current Emergency Repair Disk before continuing. ...
  39. Once removed, the cluster will not be able to grant use licenses for content protected against this trusted publishing domain. ...
  40. Once removed, the cluster will not be able to grant use licenses to users with rights account certificates issued by the ...
  41. Once removed, users will not be able to obtain licenses for content created using this template. Are you sure you want to ...
  42. Once selected this will enable classification to clear the previous system defined property value if it no longer applies ...
  43. Once selected this will enable classification to clear the previous user defined property value if it no longer applies to ...
  44. Once started, System Restore may not be interrupted Do you want to continue? System Restore cannot be undone until after ...
  45. Once the database is converted to higher version, you will not be able to revert it back to lower version. Do you want to ...
  46. Once you uninstall a display language Windows cannot display text in that language. Any supported speech and handwriting ...
  47. OnDemandInterfaceStateChanged. OnDemandType:%1, Interface: %2, OnDemandInfo:%3, ProviderID:%4, NewState:%5, Ref counter:%6 ...
  48. One Briefcase cannot be added to another. To add files from another Briefcase, select specific files and drag them to this ...
  49. One of the backup source volumes is deduped. Unoptimized backup of files to the volume failed because the target ran out ...
  50. One of the certificates in the certificate trust chain does not have a valid signature (CERT_TRUST_IS_NOT_SIGNATURE_VALID) ...
  51. One of the certificates in the certificate trust chain has a basic constraints extension, and either the certificate cannot ...
  52. One of the certificates in the certificate trust chain has a name constraints extension and a name constraint is missing ...
  53. One of the certificates in the certificate trust chain has a name constraints extension that contains unsupported fields ...
  54. One of the certificates in the certificate trust chain has a name constraints extension that is not valid (CERT_TRUST_INVALID_NAME_CONSTRAINTS) ...
  55. One of the certificates in the certificate trust chain has a name constraints extension, and one of the name choices in the ...
  56. One of the certificates in the certificate trust chain has a name constraints extension, and there is not a permitted name ...
  57. One of the certificates in the certificate trust chain has a policy constraints extension, and one of the issued certificates ...
  58. One of the certificates in the certificate trust chain has an extension that is not valid (CERT_TRUST_INVALID_EXTENSION) ...
  59. One of the certificates in the certificate trust chain was issued by a certification authority that the original certificate ...
  60. One of the Description values is invalid. The Description cannot be empty and cannot exceed the maximum length of 10240 characters. ...
  61. One of the DisplayName values is invalid. The DisplayName cannot be empty and cannot exceed the maximum length of 256 characters. ...
  62. One of the file paths specified for backup is that of a remote shared folder. Backup of a remote shared folder is not allowed. ...
  63. One of the file paths specified for backup is under a reparse point. Backup of files under a reparse point is not supported. ...
  64. One of the file paths specified for the recovery operation is under a reparse point. Recovery of files under a reparse point ...
  65. One of the files in the registry database had to be recovered by use of a log or alternate copy. The recovery was successful. ...
  66. One of the Max (maximum) values specified is not valid; it must be greater than or equal to the corresponding value in the ...
  67. One of the objects you are trying to edit has changed recently. Please use the RESCAN command to scan your configuration ...
  68. One of the options VssFullBackup or VssCopyBackup needs to be specified. Choose to create VSS full backups if you are not ...
  69. One of the rights template name already exists in AD RMS database. Please run Update-RmsCluster cmdlet to refresh the cluster ...
  70. One of the source volumes specified has an invalid format and cannot be protected using Windows Backup. Only volumes formatted ...
  71. One of the time components is out of range. The number of days must be less than %1, hours less than 24, minutes less than ...
  72. One of the volume corruption logs comes from a newer version of Windows and contains corruption records. The log will be ...
  73. One of the volume corruption logs is internally corrupted and needs to be recreated. The volume may contain undetected corruptions ...
  74. One of the volume corruption logs was deleted while still having corruption records in them. The volume contains detected ...
  75. One of the volumes specified for backup is invalid because it is either not on a fixed drive, is not formatted NTFS/ReFS, ...