Windows 8.1

  1. Compacts the virtual disk file to reduce the physical size of the file. Compact operation can be performed on a detached ...
  2. Compaq Insight Manager has a known compatibility issue due to security enhancements in this version of Windows. For an update ...
  3. Compares the contents of two files or sets of files. COMP data1 data2 /D /A /L /N=number /C /OFF[LINE data1 Specifies location ...
  4. Compares the properties of specified domain controllers to determine if they are up to date with each other. The source domain ...
  5. Compares two files or sets of files and displays the differences between them FC /A /C /L /LBn /N /OFF[LINE /T /U /W /nnnn ...
  6. Compatibility flag for 16 bit applications. This flag attempts to give the focus to the application. This flag should normally ...
  7. Compatibility flag for 16 bit applications. This flag fixes divide by zero problems resulting from 2 consecutive timegettime ...
  8. Compatibility flag for 16 bit applications. This flag fixes window placement problems resulting from themes. Apps calculate ...
  9. Compatibility flag for 16 bit applications. This flag forces the display mode to 256 colors. It does not change the screen ...
  10. Compatibility flag for 16 bit applications. This flag prevents the application from syncing when sending DDE messages. This ...
  11. Compatibility flag for 16 bit applications. This flag redirects the applications file open calls from %windir%\system to ...
  12. Compatibility flag for 16 bit applications. This flag tells WOW to strip out most of the NT specific environment vars from ...
  13. Compatibility flag for 16 bit applications. This flag version lies to the application by turning off a winflag bit specifying ...
  14. Compatibility flag for 16 bit applications. This flag will prevent the application from waiting on a spawned process after ...
  15. Compatibility flag for 16 bit applications. This flag will prevent the WM_DEVMODECHANGE message from being sent to the application. ...
  16. Compatibility flag for 16 bit applications. This flag will version lie to the application by changing the parameters in the ...
  17. Compatibility flag for 16 bit applications. This forces DPMI memory allocations to use ever increasing linear addresses. ...
  18. Compatibility lists are downloaded to make Internet Explorer 11 features work better with changing websites and older PC ...
  19. Compatibility View controls how Internet Explorer identifies itself to a Web server and determines whether content is rendered ...
  20. Compatibility view controls how the Internet Explorer 11 user agent string is used to identify itself to a Web server and ...
  21. Compatibility View helps make websites designed for older browsers look better in Internet Explorer 8. You can stop using ...
  22. CompatibilityDescription is a free-form string defining how the two referenced products interoperate or are compatible, any ...
  23. Compatible TPM cannot be found on this computer. Verify that this computer has a 1.2 TPM or later and it is turned on in ...
  24. Compatible Trusted Platform Module (TPM) cannot be found on this computer. Verify that this computer has a 1.2 TPM or later ...
  25. Compete with - and against - online opponents at the classic trick-taking, partnership card game of Spades. Score the most ...
  26. Complete the logon process Start your web browser to view the sign-up page, and then follow the instructions to connect to ...
  27. Completing this wizard will delete all existing settings and security attributes in this GPO and replace them with the backup's ...
  28. Completing this wizard will delete all existing settings and security attributes in this Starter GPO and replace them with ...
  29. Completion is invoked when you type either of the two control characters. The completion function takes the path string to ...
  30. Complex networking devices often are chassis-based. These chassis allow for enhancement and/or augmentation of their base ...
  31. Complex regular expressions can reduce classification speed and consume large amounts of memory. See MSDN for more information ...
  32. Component "%1" from writer "%2" is excluded from backup because it requires a volume that cannot be found on this system. ...
  33. Component "%1" from writer "%2" is excluded from backup, because it requires volume %3 which is not in the shadow copy set. ...
  34. Component '%1' setup failed to queue an operation for completion on the next computer restart. This is most likely due to ...
  35. Component Services (COM+ 1.0) are not installed on this computer. This installation requires Component Services in order ...
  36. Composable class %1 in file %2 does not specify a base class to compose. Specify a base class to compose when using ComposableAttribute.%0 ...
  37. Compose a new e-mail message by clicking New Mail on the toolbar. Reply to a message by selecting a message and clicking ...
  38. Composites two bitmaps based on the following algorithm: Output = Coefficients_1 Source Destination + Coefficients_2 Source+ ...
  39. Compressed (zipped) folders do not support encryption. %1!u! items will be copied without encryption. Do you want to continue? ...
  40. Compressed (zipped) Folders was unable to create the specified directory. Ensure that the directory does not already exist, ...
  41. Compressed : %1!I64d! Total allocated : %2!I64d! bytes Total size : %3!I64d! bytes. Savings : %4!s! % Sparse : %5!I64d! Total ...
  42. Compressed, image, and archive format files that contain other files, such as .zip, .cab, .iso, .wim, and .vhd. This category ...
  43. Compresses and decompresses audio data conforming to the ETSI-GSM (European Telecommunications Standards Institute-Groupe ...
  44. Computer "{0}" is not responding. The target computer is either turned off or Remote Scheduled Tasks Management Firewall ...
  45. Computer %1 cannot be managed. Verify that the network path is correct, the computer is available on the network, and that ...
  46. Computer '{0}' cannot be connected. Verify that the network path is correct, the computer is available on the network, and ...
  47. Computer '{0}' successfully joined the workgroup '{1}', but could not be renamed to '{2}' with the following error message: ...
  48. Computer '{0}' was successfully joined to the new domain '{1}', but renaming it to '{2}' failed with the following error ...
  49. Computer '{0}' was successfully unjoined from domain '{1}', but failed to join the new domain '{2}' with the following error ...
  50. Computer '{0}' was successfully unjoined from the domain '{1}', but it failed to join the workgroup '{2}' with the following ...
  51. Computer ({0}) cannot be managed because it is running an operating system which is not supported by Share and Storage Management. ...
  52. Computer Account Changed: %1 Target Account Name: %2 Target Domain: %3 Target Account ID: %4 Caller User Name: %5 Caller ...
  53. Computer Account Created: New Account Name: %1 New Domain: %2 New Account ID: %3 Caller User Name: %4 Caller Domain: %5 Caller ...
  54. Computer Account Deleted: Target Account Name: %1 Target Domain: %2 Target Account ID: %3 Caller User Name: %4 Caller Domain: ...
  55. Computer Account Management This policy setting allows you to audit events generated by changes to computer accounts such ...
  56. Computer Control Panel settings configure options that are manually configurable via the Windows Control Panel and affect ...
  57. Computer is booting, SAC started and initialized. Use the "ch -?" command for information about using channels. Use the "?" ...
  58. Computer name %2 is not a valid computer name. It may contain illegal characters. Standard names contain letters (a-z, A-Z), ...
  59. Computer object %1 is already assigned to server %2 in site %3. Are you sure you want to change it to reference the new server ...
  60. Computer object %1 is disabled on a read-only domain controller %2. The account for the cluster computer object must be manually ...
  61. Computer object %1 is enabled and may be in use. Ensure that this is not being used and disable the computer object if it ...
  62. Computer object %1 is not found on read only domain controller %2. The computer object needs to be pre-created and enabled. ...
  63. Computer \%1 cannot be managed because the computer was not found on the network. It may be powered down or otherwise not ...
  64. Computer \%1 cannot be managed because the network is unreachable. Verify that your network cabling is securely attached. ...
  65. Computers running Windows 2000 Service Pack 4 or earlier must have clocks within 30 minutes of the selected server's clock. ...
  66. Computers will connect to this instance of AD LDS using specific ports on all of the IP addresses associated with this computer. ...
  67. Computers will not be able to access shared folders and other Server Message Block (SMB)-based network services on this server. ...
  68. Conditional expressions are not supported for object audit access control entries. Remove all conditions, then save your ...
  69. Conditional expressions cannot be applied to computers that are not members of a domain. Remove all conditions before saving ...
  70. Conditional expressions cannot be applied to computers that are not members of a domain. Use caution when saving this ACE ...
  71. Conditional forwarders are DNS servers that this server can use to resolve DNS queries for records in a specific domain. ...
  72. Conditions are invalid on computers that are not members of a domain. Remove any conditions and click OK. Use caution when ...
  73. Config file expects {0} parameter's name in method '{1}', to be '{2}'. Same method in Test assembly has name '{3}'. Please ...
  74. ConfigString Server\CertificationAuthority or for an https: connection: Enrollment Server URL or use a single minus sign ...
  75. Configuration completed successfully, but some server properties were not updated. Update these settings using Server properties ...