Windows 8.1

  1. There were not enough sample documents to train the Topic Assistant. Try again when more sample documents are available. ...
  2. There were problems while trying to gather diagnostic information from {0}. Examine the InnerException field of returned ...
  3. There were some orphaned entries deleted in the configuration due to the deletion of a class or an option definition. Please ...
  4. There were some orphaned entries deleted in the configuration due to the deletion of a class or an option definition. Please ...
  5. There were some warnings when querying quota templates and datascreen templates. The relevant pages will not be shown. Do ...
  6. There won't be enough space in the new location for the currently downloaded content. Please either delete these files first ...
  7. There's a problem connecting to the Windows Store service. Check Windows Update to make sure the most recent updates are ...
  8. There's a problem with the app you're trying to run, but it can't be repaired by Windows Store. Contact your system administrator ...
  9. There's a problem with the app you're trying to run, but it can't be repaired by Windows Store. You can refresh Windows on ...
  10. There's a problem with the app you're trying to run, but it can't be repaired by Windows Store. You can refresh Windows on ...
  11. There's a problem with the app you're trying to run, but it can't be repaired by Windows Store. You can try to install the ...
  12. There's a problem with the app you're trying to run, but it can't be repaired by Windows Store. You can try to install the ...
  13. There's a problem with the app you're trying to run, but Windows Store isn't available on this PC to repair it. Contact your ...
  14. There's a problem with the drive configuration. Resetting the drive makes it usable again, but permanently deletes the files ...
  15. There's a problem with the permissions of your folder on the server. Email your organization's tech support and ask them ...
  16. Therefore, try to remove AD DS normally by running the Active Directory Domain Services Installation Wizard (dcpromo.exe) ...
  17. These add-ons increase the time it takes to start the browser, open a new tab or navigate to web sites by an average of %1 ...
  18. These add-ons increase the time it takes to start the browser, open a new tab or navigate to websites by an average of %.2f ...
  19. These add-ons increase the time it takes to start the browser, open a new tab or navigate to websites by an average of %1 ...
  20. These applications might not work properly in Hyper-V Server. We recommend you close Setup and uninstall these applications ...
  21. These applications might not work properly in Storage Server. We recommend you close Setup and uninstall these applications ...
  22. These applications might not work properly in Windows. We recommend you close Windows Setup and uninstall these applications ...
  23. These are the configuration values used to replicate the virtual machine. You can only change these values on the primary ...
  24. These are the connection parameters used to replicate this virtual machine. You can only change these values on the primary ...
  25. These are the old deprecated commands, that are being phased out, but are still presently supported for backwards compatibility. ...
  26. These are the servers that the DNS client will use when matching this name. If you do not configure this field, then the ...
  27. These are your current KMS configuration options. To modify the KMS configuration, click Next. To accept this configuration, ...
  28. These authentication settings are used rather than the constraints and authentication settings in network policy. For VPN ...
  29. These authentication settings are used rather than the constraints and authentication settings in network policy. For VPN ...
  30. These changes may cause currently connected administrative clients to temporarily lose their connection to this cluster. ...
  31. These changes may cause currently connected clients to temporarily lose their connection to this clustered role. Are you ...
  32. These computers include all domain members, all domain members in trusted domains, and all computers that need to make LDAP ...
  33. These controls might be buttons on the front of your display, or they might be settings that are shown in the on-screen display ...
  34. These credentials will be used to connect to %s. However, if %s does not support Network Level Authentication, it will not ...
  35. These credentials will be used to connect to %s. If %s does not support Network Level Authentication, it will not accept ...
  36. These credentials will be used to connect to %s. If %s does not support Network Level Authentication, it will not accept ...
  37. These devices might not work properly in Hyper-V Server. We recommend updating the drivers for these devices before you continue. ...
  38. These devices might not work properly in Hyper-V Server. We recommend you close Windows Setup and update device drivers before ...
  39. These devices might not work properly in Storage Server. We recommend updating the drivers for these devices before you continue. ...
  40. These devices might not work properly in Storage Server. We recommend you close Windows Setup and update device drivers before ...
  41. These devices might not work properly in Windows. We recommend updating the drivers for these devices before you continue. ...
  42. These devices might not work properly in Windows. We recommend you close Windows Setup and update device drivers before you ...
  43. These devices won't work until their drivers are updated. After Hyper-V Server installs, check Windows Update for device ...
  44. These devices won't work until their drivers are updated. After Storage Server installs, check Windows Update for device ...
  45. These devices won't work until their drivers are updated. After Windows installs, check Windows Update for device drivers. ...
  46. These disks have conflicting information about the volumes contained on them. Review the list of volumes that will be imported ...
  47. These files are used by the operating system and by various programs. Editing or modifying them could damage your system. ...
  48. These iSCSI target servers are running in a standalone mode on the following clustered server(s): {0}. You cannot manage ...
  49. These password synchronization settings override any settings for individual computers participating in password synchronization. ...
  50. These policies are being excluded since they are only defined with override-only attribute. Policy Names=%1 App Id=%2 Sku ...
  51. These program files are currently being used by one or more programs. Please close some programs, and try again. You may ...
  52. These selected virtual machine(s) cannot shutdown while they are locked, unless the shutdown is forced. Forcing a shutdown ...
  53. These selected virtual machines cannot be exported because their names are identical. Please rename them first then retry ...
  54. These settings affect the RequireSecuritySignature value in HKLM\System\CurrentControlSet\Services\LanManServer\Parameters. ...
  55. These settings are disabled because one or more namespace servers are running Windows Server 2003 without Service Pack 1 ...
  56. These settings can be changed without restarting this computer. Any changes made here will be lost when this computer is ...
  57. These settings can be exported to an answer file for use with other unattended operations. More about using an answer file ...
  58. These settings can be useful in reducing the cost of supporting applications in your corporation. Using the settings in this ...
  59. These settings can help you set up your computer to meet your needs. Review the recommended settings below and select the ...
  60. These settings determine how Server Manager gathers event data from servers in the server group that you are currently managing. ...
  61. These settings were applied only by GPOs that contain Internet Explorer Enhanced Security Configuration (ESC) settings because ...
  62. These settings were applied only by GPOs that do not contain Internet Explorer Enhanced Security Configuration (ESC) settings ...
  63. These settings will not apply to users that log on to computers that have the Internet Explorer Enhanced Security Configuration ...
  64. These settings will only apply to users when they log on to computers that have the Internet Explorer Enhanced Security Configuration ...
  65. These tests verify that the storage is configured properly and supports clusters. These tests may require Chksdk.exe to be ...
  66. These TFTP settings are not available on this server. Install the latest version of Windows Deployment Services to access ...
  67. These versions of Microsoft IntelliPoint were released prior to this version of Windows, and are therefore incompatible with ...
  68. This 32-bit version of Windows cannot be installed to an EFI-based computer. Installation cannot proceed. Use a 64-bit version ...
  69. This abstract class represents any resources that are used by the MSI installer durring the course of an installation, patch ...
  70. This account belongs to some other groups. The access permission is controlled by the settings of those group memberships. ...
  71. This account is an administrator account and its password was NOT reset. The password for this account should be manually ...
  72. This action allows you to set the access mode of a Cluster Shared Volume. Changing the access mode is useful for certain ...
  73. This action cannot be completed because the other program is busy. Choose 'Switch To' to activate the busy program and correct ...
  74. This action cannot be performed because Cluster-Aware Updating detected state information from an Updating Run that is active ...
  75. This action causes a simulated failure of the resource. This is useful for testing failover settings for a clustered role. ...