Windows 7

  1. Check your wireless network settings Make sure your computer is in range of "%ws" and that the network settings match the ...
  2. Check your wireless security type View your wireless security settings to verify that the correct security type is selected. ...
  3. Checking for compatibility %0Windows Easy Transfer is checking to ensure that a transfer can be performed from your old PC ...
  4. Checks for new signatures before running scheduled scans. If you enable this policy setting, the scheduled scan checks for ...
  5. Checks if the TS is allowed to request CALs from license server based on the the license server security group policy on ...
  6. Checks whether each DSA is advertising itself, and whether it is advertising itself as having the capabilities of a DSA. ...
  7. Checks whether License Server is a member of Terminal Server License Servers group at domain controller of given domainIf ...
  8. Checks whether License Server is published in Active Directory or not.If license server is published, it shall be automatically ...
  9. Checks whether the given Terminal Server is allowed to request CALs from the License Server based on group policy - License ...
  10. Chinese (Simplified)$Chinese (Simplified)$People's Republic of China$Greek$$Algeria$Democratic and Popular Republic of Algeria ...
  11. Chkdsk cannot dismount the volume because it is a system drive or there is an active paging file on it. Would you like to ...
  12. Chkdsk cannot run because the volume is in use by another process. Chkdsk may run if this volume is dismounted first. ALL ...
  13. Chkdsk cannot run because the volume is in use by another process. Would you like to schedule this volume to be checked the ...
  14. Chkdsk is copying last valid VAT at block %1 to the end of the volume. This will revert the volume to its state at %2:%3 ...
  15. Chkdsk is running on media that does not support writes in place. On such media chkdsk operation is limited to verifying ...
  16. Chkdsk was executed in read-only mode. A volume snapshot was not used. Extra errors and warnings may be reported as the volume ...
  17. Chobit 3D has a known compatibility issue with this version of Windows. For an update that is compatible with this version ...
  18. Choose "Microsoft Open License Program" if your company purchases Microsoft products through the Open License program. You ...
  19. Choose "Microsoft Select or Microsoft Enterprise Agreement" if your company purchases Microsoft products through either the ...
  20. Choose a computer name to distinguish it on the network. Your user account is managed by your organization's system administrator. ...
  21. Choose a different and valid certificate for authentication with this network.%rIf this is not helpful, contact your network ...
  22. Choose a location other than the failing disk so that you can access the instructions later. For example, save to a CD, USB ...
  23. Choose a name and location for this virtual machine. The name is displayed in Hyper-V Manager. We recommend that you use ...
  24. Choose a new password for this user account. This password will replace the old one; everything else about the user account ...
  25. Choose a server authentication certificate suitable for SSL encryption to add to the default site in Internet Information ...
  26. Choose a smaller scale to fit more information on the screen or a larger scale to make text more readable. How do I know ...
  27. Choose a video file or picture The file you have chosen for the background is not a valid picture or video file. Choose another ...
  28. Choose a video file or picture The file you have chosen for the foreground is not a valid picture or video file. Choose another ...
  29. Choose a word or phrase that helps you remember your password. If you forget your password, Windows will show you your hint. ...
  30. Choose between running all tests or running selected tests. The tests include Inventory tasks, Network tests, Storage tests, ...
  31. Choose the action that you want to display or apply when items with these alert levels are detected. What are actions and ...
  32. Choose the power settings that you want for your computer. The changes you make to the settings on this page apply to all ...
  33. Choose the settings for the scan ticket. A scan ticket includes the description and processing information of a scan job. ...
  34. Choose the type of cable that connects your primary display to your computer. If you are not sure what type of cable that ...
  35. Choose the type of cable that connects your speakers or audio receiver to your computer. If you are not sure what type of ...
  36. Choose the volume or drive that contains the backup. An external disk attached to this server is listed as a volume. If your ...
  37. Choose this option for the safest way to store backups. The hard disk that you use will be formatted and then dedicated to ...
  38. Choose this option if all of your backup storage disks are lost or damaged and cannot be brought back online. All of the ...
  39. Choose this option if the associated resource type DLL needs to be debugged or is likely to conflict with other resource ...
  40. Choose this option if you are not using any other product to back up applications. This option updates the backup history ...
  41. Choose this option if you are using another product to back up applications that are on the volumes included in the backup. ...
  42. Choose this option if you can enter a passkey on your Bluetooth device. Examples are: Bluetooth keyboards, mobile phones, ...
  43. Choose this option if you cannot dedicate an entire disk for backups. Note that the performance of the volume may be reduced ...
  44. Choose this option if you do not want to store backups locally on the server. Note that you will only have one backup at ...
  45. Choose this option if you have not created a scheduled backup or to specify a location or items for this backup that are ...
  46. Choose this option if you have set up the Active Directory on your network, or if you have DHCP or DNS servers in your network. ...
  47. Choose this option if you want to add this server to an existing root or licensing-only cluster to increase capacity. You ...
  48. Choose this option if you want to create an AD RMS root cluster as part of a new AD RMS deployment, or if you want to create ...
  49. Choose this option if your Bluetooth device does not have a place to enter a passkey and the documentation does not specify ...
  50. Choose this option if your device documentation specifies a passkey to use. Devices such as Bluetooth headsets and mice typically ...
  51. Choose what is streamed by default to all computers and devices on your network. These settings can be modified for each ...
  52. Choose what to transfer %0.You can transfer files and settings in these user accounts. To choose how you want the user accounts ...
  53. Choose what to transfer to this computer %0.You can transfer files and settings in these user accounts from your old computer. ...
  54. Choose which programs you want Windows to use for activities like web browsing, editing photos, sending e-mail, and playing ...
  55. Choose which system services should be monitored for this role. Monitored services which are stopped display an error condition. ...
  56. Choose your printer from the list. Click Windows Update to see more models. To install the driver from an installation CD, ...
  57. CIM_Account is the information held by a SecurityService to track identity and privileges managed by that service. Common ...
  58. CIM_AdjacentSlots describes the layout of slots on a hosting board or adapter card. Information like the distance between ...
  59. CIM_AggregatePExtent is realized on a physical media. This relationship is made explicit by the CIM_RealizesAggregatePExtent ...
  60. CIM_AggregatePSExtent defines the number of addressable logical blocks on a single storage device, excluding any logical ...
  61. CIM_BasedOn is an association describing how storage extents can be assembled from lower level extents. For example, protected ...
  62. CIM_BIOSElement represents the low-level software that is loaded into non-volatile storage and used to bring up and configure ...
  63. CIM_BIOSFeature represents the capabilities of the low-level software that is used to bring up and configure a computer system. ...
  64. CIM_BootService represents the functionality provided by a device, software or via a network to load an operating system ...
  65. CIM_ClusteringService represents the functionality provided by a cluster. For example, failover functionality may be modeled ...
  66. CIM_CollectedCollections is an aggregation association representing that a CollectionOfMSEs may itself be contained in a ...
  67. CIM_CompatibleProduct is an association between products that can indicate a wide variety of information. For example, it ...
  68. CIM_Component is a generic association used to establish 'part of' relationships between Managed Elements. For example, it ...
  69. CIM_Component is a generic association used to establish 'part of' relationships between Managed System Elements. For example, ...
  70. CIM_ConcreteComponent is a generic association used to establish 'part of' relationships between ManagedElements. It is defined ...
  71. CIM_DataFile is a type of logical file that is a named collection of data or executable code. The behavior of the provider ...
  72. CIM_DeviceErrorCounts is a statistical class containing error-related counters for a logical device. The types of errors ...
  73. CIM_DiskSpaceCheck checks the amount of disk space the needs to be available on the system. The amount is specified in the ...
  74. CIM_ElementCapacity associates a CIM_PhysicalCapacity object with one or more physical elements. It serves to associate a ...
  75. CIM_HostedAccessPoint is an association between a serviceaccess point and the system on which it is provided. The cardinality ...