Windows 8.1

  1. Changing the Primary Domain DNS name of this computer to "%1" failed. The name will remain "%2". Please check if "%1" is ...
  2. Changing the scan server name might disable actions you have selected for this scan process. If you change this name, we ...
  3. Changing the start IP address, end IP address, network ID or prefix length for an IP address block will reset its utilization ...
  4. Changing the transaction isolation level from 'Serialized' or 'Any' requires that all components called from this component ...
  5. Changing this setting does not affect Fibre Channel ports that have already been configured. To apply a new setting to an ...
  6. Changing this setting does not affect network adapters that have already been configured. To apply a new setting to an existing ...
  7. Changing to Node Majority quorum configuration is not allowed at this time, as it will cause the cluster to lose quorum and ...
  8. Changing virtualization for a process may lead to undesired results including loss of data. You should do this only for debugging. ...
  9. Channel management commands: ch List all channels. Status Legend: (AB) A: Channel operational status 'A' = Channel is active. ...
  10. Channel property %1!s! contains invalid value. The value has invalid type, is outside of valid range, can't be updated or ...
  11. Channels at endpoint at URL: %3 have reached maximum number of created messages which is %4 per channel. This event was encountered ...
  12. Channels were found but not added to the Guide because they lack channel data. To review them, go to Tasks > Settings > TV ...
  13. CHAP secrets, CHAP passwords and IPSEC preshared keys can be specified as a text string or as a sequence of hexadecimal values. ...
  14. Characters "\/:*?"<>|[]+=;," are not allowed in the namespace name. The namespace name should also have at least one character ...
  15. Check below if you want to help make Microsoft software and services even better by sending Windows Media Center usage data ...
  16. Check connectivity between Web Application Proxy and the AD FS servers. If the problem persists, consider running the Install-WebApplicationProxy ...
  17. Check for latest components via Automatic Version Synchronization (if you installed the IEAK from the Internet, AVS must ...
  18. Check for network connectivity and service related problems. For troubleshooting RPC issues see and for additional troubleshooting ...
  19. Check for network connectivity problems, for troubleshooting RPC issues see and for additional troubleshooting information, ...
  20. Check for relevant errors in the Windows Event Viewer. 2. Ensure that OTP is configured correctly in the Remote Access Management ...
  21. Check for relevant errors in the Windows Event Viewer. 2. Ensure that OTP is configured correctly in the Remote Access Management ...
  22. Check for updates from %1!s!, instead of from your system admin (this will turn off automatically when updates are done). ...
  23. Check if the application installs a WHQL signed FS Filter driver and an ELAM driver This task will never be displayed to ...
  24. Check network status and change settings, set preferences for sharing files and computers, configure Internet display and ...
  25. Check that Machine Account (AD only) and DSA objects have replicated. Use /objectdn: with /n: to specify an additional object ...
  26. Check that the version of the license server supports issuing licenses to the Remote Desktop Session Host server. The license ...
  27. Check that you have network connectivity between the Remote Desktop Session Host server and the license server. Also check ...
  28. Check the account(s) for which you would like to use signature '%s'. Only one signature may be selected for an account, and ...
  29. Check the button to use 16 bit MCIAVI code in preference to 32 bit code. This provides the highest level of compatibility, ...
  30. Check the columns that you would like visible in this view. Use the Move Up and Move Down buttons to reorder the columns ...
  31. Check the following: Do you have the correct permissions on the remote computer? Is the remote computer turned on, and is ...
  32. Check the server for indications of an authenticated attack. If an attack is detected, use mitigation measures to stop it. ...
  33. Check the spelling of the cluster name. Otherwise, there might be a problem with your network. Make sure the cluster nodes ...
  34. Check the spelling of the name. Otherwise, there might be a problem with your network. To try to identify and resolve network ...
  35. Check the status of the following services on the RD Connection Broker server: Remote Desktop Connection Broker, Windows ...
  36. Check the Windows event log for event 12008 to identify the application. Check the Kerberos configuration on the domain controller ...
  37. Check to see if the Machine Account has the proper information. Use /RecreateMachineAccount to attempt a repair if the local ...
  38. Check to see that the disk and drive are connected properly, make sure that the disk is not read-only, and then try again. ...
  39. Check your Internet connection and try again. To always be able to open this file, even if you aren't connected to the Internet, ...
  40. Check your Internet connection and try again. To avoid this problem in the future, you can make the file available offline. ...
  41. Check your Internet connection and try again. To avoid this problem in the future, you can make the files available offline. ...
  42. Check your wireless network settings Make sure your computer is in range of "%ws" and that the network settings match the ...
  43. Check your wireless security type View your wireless security settings to verify that the correct security type is selected. ...
  44. Checkpoint creation failed for '%1' because an invalid backup type for the app consistent checkpoint has been specified. ...
  45. Checks if the TS is allowed to request CALs from license server based on the the license server security group policy on ...
  46. Checks that every metadata row in the database has corresponding content stored in the file system. If content is missing ...
  47. Checks whether each DSA is advertising itself, and whether it is advertising itself as having the capabilities of a DSA. ...
  48. Checks whether License Server is a member of Terminal Server License Servers group at domain controller of given domainIf ...
  49. Checks whether License Server is published in Active Directory or not.If license server is published, it shall be automatically ...
  50. Checks whether the given Terminal Server is allowed to request CALs from the License Server based on group policy - License ...
  51. Chkdsk cannot dismount the volume because it is a system drive or there is an active paging file on it. Would you like to ...
  52. Chkdsk cannot run because the volume is in use by another process. Chkdsk may run if this volume is dismounted first. ALL ...
  53. Chkdsk cannot run because the volume is in use by another process. Would you like to schedule this volume to be checked the ...
  54. Chkdsk is copying last valid VAT at block %1 to the end of the volume. This will revert the volume to its state at %2:%3 ...
  55. Chkdsk is running on media that does not support writes in place. On such media chkdsk operation is limited to verifying ...
  56. Chkdsk scan speed is being throttled to reduce impact on system and application performance. Given the number of files and ...
  57. Chkdsk was executed in read-only mode. A volume snapshot was not used. Extra errors and warnings may be reported as the volume ...
  58. Chobit 3D has a known compatibility issue with this version of Windows. For an update that is compatible with this version ...
  59. Choose "Microsoft Open License Program" if your company purchases Microsoft products through the Open License program. You ...
  60. Choose "Microsoft Select or Microsoft Enterprise Agreement" if your company purchases Microsoft products through either the ...
  61. Choose "This is my new computer" this time. - Follow the instructions to complete the wizard and import the saved profile ...
  62. Choose a different and valid certificate for authentication with this network.%rIf this is not helpful, contact your network ...
  63. Choose a different location or free up %1 of space on this drive. Work Folders can't use the last few gigabytes of free space ...
  64. Choose a folder-naming format based on whether you have to maintain user folder compatibility or want to support identical ...
  65. Choose a location other than the failing disk so that you can access the instructions later. For example, save to a CD, USB ...
  66. Choose a location that's on a fixed or removable drive, such as a hard drive or microSD card. You can't choose a network ...
  67. Choose a name and location for this virtual machine. The name is displayed in Hyper-V Manager. We recommend that you use ...
  68. Choose a new password for this user account. This password will replace the old one; everything else about the user account ...
  69. Choose a password that will be easy for you to remember but hard for others to guess. If you forget, we'll show the hint. ...
  70. Choose between running all tests or running selected tests. The tests examine the Cluster Configuration, Hyper-V Configuration, ...
  71. Choose how you want the user accounts on your old PC to get transferred to user accounts on your new PC. To create a new ...
  72. Choose the action to display or apply by default when potential threats with the following alert levels are detected. What ...
  73. Choose the power settings that you want for your computer. The changes you make to the settings on this page apply to all ...
  74. Choose the settings for the scan ticket. A scan ticket includes the description and processing information of a scan job. ...
  75. Choose the size of your desktop for interacting with the virtual machine. Drag the slider all the way to the right to use ...