Windows Server 2003

  1. A categorization scheme is a predefined set of categories, derived from an internal or external hierarchy, that can be used ...
  2. A Certificate can be used to digitally sign a piece of information so that you can determine the author of the information. ...
  3. A certificate could not be found. Connections that use the L2TP protocol over IPSec require the installation of a machine ...
  4. A certificate could not be found. Connections that use the L2TP protocol over IPSec require the installation of a machine ...
  5. A certificate found in the local Active Directory claims to be from a domain controller with the following computer account. ...
  6. A certificate in the chain for CA certificate %3 for %1 could not be verified because no information is available describing ...
  7. A certificate is a confirmation of your identity issued by a certification authority. Certificates contain information used ...
  8. A certificate presented to Active Directory claims to be from a domain controller with the following computer account. This ...
  9. A certificate template is a set of predefined properties for certificates issued to computers. Select a template from the ...
  10. A certificate trust list (CTL) is a signed list of root certification authority (CA) certificates that have been judged reputable ...
  11. A certificate, which is issued by a certification authority, is a confirmation of your identity and contains information ...
  12. A certificate, which is issued by a certification authority, is a confirmation of your identity and contains information ...
  13. A certification authority with the same name was found in the Active Directory. Do you want to overwrite the existing CA ...
  14. A change has been made to the system that requires that you restart the computer. Do you want to restart the computer now? ...
  15. A character that is not valid was found at the following position and string while processing an event log override registry ...
  16. A chassis can contain other packages, such as other chassis and cards. The CIM_PackageInChassis association makes explicit ...
  17. A check is a condition or characteristic that is expected to be true in an environment defined or scoped by an instance of ...
  18. A child node without a properly formed parent node was found. Ignoring it. Check spelling and format of location properties.%1%2%3%4%5%0 ...
  19. A CIM_Action is an operation that is part of a process to either create a software element in its next state or to eliminate ...
  20. A CIM_Cluster is composed of two or more computer system's, operating together. A computer system may participate in multiple ...
  21. A CIM_FileSpecification identifies a file that is either to be on or off the system. The file is to be located in the directory ...
  22. A CIM_Service is a Logical Element that contains the information necessary to represent and manage the functionality provided ...
  23. A CIM_System is a LogicalElement that aggregates an enumerable set of Managed System Elements. The aggregation operates as ...
  24. A class derived from CIM_ComputerSystem that 'is made up of' two or more computer systems which operate together as an atomic, ...
  25. A class derived from CIM_ComputerSystem that represents a desktop, mobile, network PC, server or other type of a single node ...
  26. A class derived from CIM_LogicalElement that is a special collection of managed system elements. This collection indicates ...
  27. A class derived from CIM_System that is a special collection of CIM_ManagedSystemElement instances. This collection provides ...
  28. A class derived from FileSystem that represents access of the FileSystem via a network-related service. In this case, the ...
  29. A class derived from FileSystem that represents the file store controlled by a ComputerSystem through local means (e.g., ...
  30. A class derived from redundancy group containing mass storage-related redundancy information. Storage redundancy groups are ...
  31. A class derived from redundancy group indicating that the aggregated elements have more capacity or capability than is needed. ...
  32. A class derived from RedundancyGroup indicating that one or more of the aggregated elements can be spared. (The actual Spares ...
  33. A class derived from RemoteFileSystem representing that the FileSystem is mounted, using the NFS protocol, from a ComputerSystem. ...
  34. A cleaning cartridge is needed in %1 %2 before it can finish a drive cleaning. Please place a cleaning cartridge in the %1. ...
  35. A client access license assigned to a particular device that allows access to a Windows 2000 Server via Teminal Services ...
  36. A client access license assigned to a particular device that allows access to a Windows Server 2003 via the Terminal Server ...
  37. A client access license assigned to each individual Terminal Server User on Windows 2003 Terminal Server. There is no license ...
  38. A cluster can only be created using nodes that have the same processor architecture. Your cluster has a "%1!ws!" processor ...
  39. A cluster cannot be created with the specified cluster name because that cluster name is already in use. Specify a different ...
  40. A cluster server is a member of a cluster, which is group of independent servers managed as a single system. Clusters provide ...
  41. A component cannot be moved (or copied) from the System Application, an application proxy or a non-changeable application ...
  42. A component is typically contained by a physical package, such as a chassis or card. The CIM_PackagedComponent association ...
  43. A component that is checked below will be shown in the Customize Component Options screen during Setup. Unchecking a component ...
  44. A computer account with that name already exists in the directory service. Please enter a different name for this computer. ...
  45. A conditional statement which evaluates to TRUE or FALSE to determine whether the associated software element should is installed. ...
  46. A conditional statement which evaluates to TRUE or FALSE to determine whether the Level value should be applied to the associated ...
  47. A configuration error on this computer is preventing this connection. For further assistance, click More Info or search Help ...
  48. A configuration registry node representing a driver service entry was ill-formed and did not contain required value entries. ...
  49. A conflict has been detected between two drivers which claimed equivalent DMA channels. Driver %2, with device , claimed ...
  50. A conflict has been detected between two drivers which claimed equivalent IRQs. Driver %2, with device , claimed an interrupt ...
  51. A conflict has been detected between two drivers which claimed two overlapping Io port regions. Driver %2, with device , ...
  52. A conflict has been detected between two drivers which claimed two overlapping memory regions. Driver %2, with device , claimed ...
  53. A connection attempt failed because the connected party did not properly respond after a period of time, or established connection ...
  54. A connection attempt failed because the connected party did not properly respond after a period of time, or the established ...
  55. A connection between the VPN server and the VPN client %1 has been established, but the VPN connection cannot be completed. ...
  56. A connection between your computer and the VPN server has been established, but the VPN connection cannot be completed. The ...
  57. A connection cannot be added at this time because Dial-Up Networking is not installed. You must either install Dial-Up Networking ...
  58. A connection could not be made with the media type in the persistent graph,%0 but has been made with a negotiated media type.%0 ...
  59. A connection that is created for your use only is saved in your user account and is not available unless you are logged on. ...
  60. A connection to the remote computer could not be completed. You might need to adjust the protocols on this computer. For ...
  61. A connection to the remote computer could not be established because the modem was not found or was busy. For further assistance, ...
  62. A connection to the remote computer could not be established, so the port used for this connection was closed. For further ...
  63. A connection to the remote computer could not be established. You might need to change the network settings for this connection. ...
  64. A connection to the server could not be made because the limit on the number of concurrent connections for this account has ...
  65. A connection with %2 could not be established. Please verify that the PortServer's IP address, TCP port number, network cables ...
  66. A connection with Active Directory cannot be established. Verify that there are sufficient permissions to perform this operation. ...
  67. A consistent help cannot be provided while connected to several nodes. Specify one node only to obtain help for this operation. ...
  68. A contact is a human or automated resource that provides support for a provider and its services. Publish one or more contacts ...
  69. A contact is a human or automated resource that provides support for a provider and its services. Use types define the type ...
  70. A container for the keyset already exists on the smart card. If you want to create a new container, either: (1) first delete ...
  71. A corrupt Creator/Type pair with creator "%2" and type "%1" was detected in the Registry. This value was ignored and processing ...
  72. A corrupt extension "%1" was detected in the Registry. This value was ignored and processing was continued. Change the value ...
  73. A creation wizard for this object type could not be found. A generic creation wizard will be used instead. The object that ...
  74. A critical alarm occurs when the UPS battery is almost exhausted or, optionally, after a specified time on battery power. ...
  75. A critical error has occurred in the main operating system. The server is now running a backup operating system. Contact ...