Windows 8.1

  1. The change you just made may have resulted in an access control list that exceeds the maximum size. If this is the problem, ...
  2. The change you just made resulted in an access control list that exceeds the maximum size. You must remove approximately ...
  3. The changes to the open object property page(s) are not saved. Close all object property pages before closing Active Directory ...
  4. The changes to the spool folder will occur immediately and any currently active documents will not print. It is recommended ...
  5. The changes you made to this page are not valid. If you continue, your changes will be lost. Are you sure you want to leave ...
  6. The ChangeSecurityPermissions method changes the security permissions for the logical file specified in the object path. ...
  7. The ChangeSecurityPermissionsEx method changes the security permissions for the logical file specified in the object path. ...
  8. The ChangeStartMode method modifies the StartMode of a service. It returns one of the following integer values: 0 - The request ...
  9. The channel may not be supported. If you cannot tune to any other channel, restart Windows Media Center or restart the computer, ...
  10. The CHAP of the target %1 could not be decrypted, the initiator will not be able to connect to the target. To ensure the ...
  11. The character '{0}' is not a valid regular expression option for the 'flags' parameter of the mssmlfn:matches() or mssmlfn:replace() ...
  12. The character length ({1}) of the argument is too short. Specify an argument with a length that is greater than or equal ...
  13. The character length of the {1} argument is too long. Shorten the character length of the argument so it is fewer than or ...
  14. The characters '%1' either cannot be parsed as a 128 bit fixed point number, or its value is out of range of a 128 bit fixed ...
  15. The characters '%1' either cannot be parsed as a 64 bit floating point number, or its value is out of range of a 64 bit floating ...
  16. The characters '%1' either cannot be parsed as a signed 32 bit integer, or its value is out of range of a signed 32 bit integer. ...
  17. The characters '%1' either cannot be parsed as a signed 64 bit integer, or its value is out of range of a signed 64 bit integer. ...
  18. The characters '%1' either cannot be parsed as an unsigned 32 bit integer encoded in hexadecimal, or its value is out of ...
  19. The characters '%1' either cannot be parsed as an unsigned 32 bit integer, or its value is out of range of an unsigned 32 ...
  20. The characters '%1' either cannot be parsed as an unsigned 64 bit integer, or its value is out of range of an unsigned 64 ...
  21. The check and repair process will analyze the {0} hard drive to detect and repair any issues with file system data. The hard ...
  22. The check to verify that management server IP addresses do not conflict with the IP addresses associated with the web probe ...
  23. The CheckAccess method verifies that the user possesses the specified permissions. The method returns a uint32 which is 0 ...
  24. The CheckMode property is used to indicate whether the condition is expected to exist or not exist in the environment. When ...
  25. The checkpoint cannot be enabled, because the content index is not idle. Wait until the index is idle, and then try again. ...
  26. The checkpoint configuration file '%3' has been restored to a different location than the other checkpoint configuration ...
  27. The checkpoint configuration file '%3' has been restored to an unsupported location. The location must be in the format \Snapshots\ ...
  28. The checkpoint configuration of virtual machine '%1' could not be read. The data might be corrupt or not valid. (Virtual ...
  29. The checkpoint name is out of range for '%1' because new name is not between 1 and 100 characters '%4'. (CheckpointID %2) ...
  30. The CheckPoint property specifies a value that the service increments periodically to report its progress during a lengthy ...
  31. The checkpoint record cannot be read, and this action cannot be completed. If the problem persists, restart the service, ...
  32. The checkpoint record cannot be updated, and this action cannot be completed. The gatherer will attempt to update the checkpoint ...
  33. The child can view websites on the Allow list, websites designed for children, and websites from the general interest category. ...
  34. The child can view websites on the Allow list, websites designed for children, and websites from the general interest, social ...
  35. The child domain name "%1" has an invalid format. This name may contain letters, numbers, and hyphens, but not spaces or ...
  36. The CIM status code that characterizes this instance. This property defines the status codes that MAY be return by a conforming ...
  37. The CIM_ActionSequence association is used to define a series of operations that either transitions the software element, ...
  38. The CIM_ActsAsSpare association indicates which elements can spare or replace the other aggregated elements. The fact that ...
  39. The CIM_AggregatePExtent class provides summary information about the addressable logical blocks which are in the same storage ...
  40. The CIM_ApplicationSystem class is used to represent an application or a software system that supports a particular business ...
  41. The CIM_ApplicationSystemSoftwareFeature associations identifies the software features that make up a particular application ...
  42. The CIM_Card class represents a type of physical container that can be plugged into another card or hosting board, or is ...
  43. The CIM_CDROMDrive class represents a CD-ROM drive on the system. Note: The name of the drive does not correspond to the ...
  44. The CIM_Chassis class represents the physical elements that enclose other elements and provide definable functionality, such ...
  45. The CIM_ClusteringService class represents the functionality provided by a cluster. For example, failover functionality may ...
  46. The CIM_ComputerSystem object and its derivatives are Top Level Objects of CIM. They provide the scope for numerous components. ...
  47. The CIM_ComputerSystem object and its derivatives are Top Level Objects of CIM. They provide the scope for numerous components. ...
  48. The CIM_Container association represents the relationship between a contained and a containing physical element. A containing ...
  49. The CIM_ControlledBy relationship indicates which devices are commanded by or accessed through the controller logical device. ...
  50. The CIM_CopyFileAction specifies files that exist on a computer system, and to move or copy those files to a new location. ...
  51. The CIM_DatabaseParameter class extends from CIM_ScopedSettingData. This abstract class specifies the database and service ...
  52. The CIM_DeviceSoftware relationship identifies any software that is associated with a device - such as drivers, configuration ...
  53. The CIM_DirectoryAction is an abstract class that is used for directories to be managed. Creation of directories is handled ...
  54. The CIM_DirectoryContainsFile class represents an association between a directory and files contained within that directory. ...
  55. The CIM_DirectorySpecification class captures the major directory structure of a software element. This class is used to ...
  56. The CIM_DirectorySpecificationFile association identifies the directorythat contains the file being specified by referencing ...
  57. The CIM_DiskDrive class represents a physical disk drive as seen by the operating system. The features of the drive seen ...
  58. The CIM_ElementConformsToProfile association defines the RegisteredProfiles to which the referenced ManagedElement is conformant. ...
  59. The CIM_FileAction allows the author to locate files that already exist on the users machine, and move or copy those files ...
  60. The CIM_FromDirectoryAction association identifies the source directory for the file action. When this association is used, ...
  61. The CIM_FromDirectorySpecification association identifies the source directory for the file action. When this association ...
  62. The CIM_FRU class is a vendor-defined collection of products and/or physical elements that is associated with a product for ...
  63. The CIM_InstalledSoftwareElement association allows one to identify the computer system a particular software element is ...
  64. The CIM_LogicalDevice dependent reference represents the CIM_LogicalDevice connected to the Universal Serial Bus (USB) controller. ...
  65. The CIM_LogicalElement class is the base class for all the components of the system that represent abstract system components. ...
  66. The CIM_LogicalFile class represents a named collection of data (this can be executable code) located in a file system on ...
  67. The CIM_ManagedSystemElement class is the base class for the system element hierarchy. Membership criteria: Any distinguishable ...
  68. The CIM_ManagedSystemElement class is the base class for the system element hierarchy. Membership criteria: Any distinguishable ...
  69. The CIM_ManagedSystemElement reference represents the role of the CIM_ManagedSystemElement object of the CIM_ElementSetting ...
  70. The CIM_OSVersionCheck class specifies the versions of the OS that can support this software element. This check can be for ...
  71. The CIM_PhysicalComponent class represents any low-level or basic component within a package. Any physical element that is ...
  72. The CIM_PhysicalConnector class represents any physical element that is used to connect to other elements. Any object that ...
  73. The CIM_PhysicalLink class represents the cabling of physical elements together. For example, serial or Ethernet cables, ...
  74. The CIM_PhysicalMedia class represents any type of documentation or storage medium, such as tapes, CD ROMs, etc. This class ...
  75. The CIM_PhysicalPackage class represents physical elements that contain or host other components. Examples are a rack enclosure ...