Windows 10
- Number of scopes being added to the failover relationship exceeds the max number of scopes which can be added to a failover ...
- Number of SCSI retries that have occurred since last hard or soft reset related to the controlled Device. The time of last ...
- Number of SCSI timeouts that have occurred since last hard or soft reset related to the controlled Device. The time of last ...
- Number of search suboperations per second. One search operation is made up of many sub operations. A sub operation roughly ...
- Number of Security Descriptor Propagation suboperations per second. One Security Descriptor Propagation operation is made ...
- Number of soft resets issued by the controller. A soft reset does not completely clear current device state and/or data. ...
- Number of successfully established RDMA connections on which an error occurred before being disconnected by local or remote ...
- Number of system state backups found: %1!lu! Number of copies to keep: %2!lu! Because the number of backups found is less ...
- Number of transport security binding %1 is invalid. One and only one transport security binding must be specified in security ...
- Number of unique tracing providers that are registered with the tracing subsystem but are not actively enabled to any trace ...
- o fileaccess=mode To specify the permission mode of the file. These are used for new files created on NFS servers. Specified ...
- o lang=euc-jp|euc-tw|euc-kr|shift-jis|big5|ksc5601|gb2312-80|ansi To specify the encoding used for file and directory names. ...
- o rsize=size To set the size of the read buffer in kilobytes. -o wsize=size To set the size of the write buffer in kilobytes. ...
- Object "%1" cannot be deleted because an open window is displaying its properties. To delete this object, close that window ...
- Object "{0}" is the wrong type to return from the dynamicparam block. The dynamicparam block must return either $null, or ...
- Object %1 is a Trusted domain object. To remove trusts use the Active Directory Domains and Trusts snapin. Do you want to ...
- Object Access Attempt: Object Server: %1 Handle ID: %2 Object Type: %3 Process ID: %4 Image File Name: %5 Accesses: %6 Access ...
- Object being moved across-domains is already known to be deleted by the destination server. The source server does not have ...
- Object Open for Delete: Object Server: %1 Object Type: %2 Object Name: %3 Handle ID: %4 Operation ID: {%5,%6} Process ID: ...
- Object Open: Object Server: %1 Object Type: %2 Object Name: %3 Handle ID: %4 Operation ID: %5 Process ID: %6 Image File Name: ...
- Object Open: Object Server: %1 Object Type: %2 Object Name: %3 Handle ID: %4 Operation ID: {%5,%6} Process ID: %7 Process ...
- Object Operation: Object Server: %1 Operation Type: %2 Object Type: %3 Object Name: %4 Handle ID: %5 Primary User Name: %6 ...
- Object's implementation of IInspectable::GetTrustLevel returned a value that is different from the trust level configured ...
- ObjectId - ObjectId to display or to add display name GroupId - decimal GroupId number for ObjectIds to enumerate AlgId - ...
- ObjectId cannot be less than or equal to 0. This can happen if the fragments are not properly constructed by the remote computer, ...
- OBJECTID Commands Supported - create Create the object identifier delete Delete the object identifier query Query the object ...
- Obscured or implied sexual acts and visible sexual touching in an artistic, medical, educational, sports or news context. ...
- Obscured or implied sexual acts, visible sexual touching, and passionate kissing in any context. Explicit sexual context ...
- Obtain an updated certificate from your network administrator The certificate required to connect to this network can't be ...
- OCSP Revocation Provider successfully updated the revocation information. CA Configuration ID: %1 Base CRL Number: %2 Base ...
- Of %1 files within %2 directories %3 are compressed and %4 are not compressed. %5 total bytes of data are stored in %6 bytes. ...
- of %3 instances of system store corruption have been repaired. Unrepaired corruptions may lead to failures in future system ...
- Offers the latest critical and security updates, device drivers, and other features that are available for your Windows computer. ...
- OfficeScan Corporate Edition is incompatible with this version of Windows. For more information, contact Trend Micro, INC. ...
- Offline Files allows you to access network files while working offline. To set up Offline Files open a network folder, right ...
- Offline Files configuration is being controlled by WMI configuration classes Win32_OfflineFilesUserConfiguration and Win ...
- Offline files on this computer will not be available until the computer is connected to the server after the upgrade. Offline ...
- Offline items were not updated because a connection to the Internet could not be made because File Sharing for Microsoft ...
- Offline pages are webpages that are stored on your computer so you can view them without being connected to the Internet. ...
- Offloaded Bytes Received per Second is the rate of bytes received using IPsec hardware offload. Certain network adapters ...
- Offloaded Bytes Sent per Second is the rate of bytes sent using IPsec hardware offload. Certain network adapters can accelerate ...
- Offloaded Connections is the number of TCP connections (over both IPv4 and IPv6) that are currently handled by the TCP chimney ...
- Offloaded Security Associations is the number of active quick mode security associations offloaded to hardware. Certain network ...
- Offset and length were out of bounds for the array or count is greater than the number of elements from index to the end ...
- Often, a cooling device is installed in a package such as a chassis or a rack, not for a specific device, but to assist in ...
- Often, a temperature sensor is installed in a package such as a chassis or a rack, not to measure any particular device, ...
- Often, an alarm device is installed as part of a package, not to indicate issues with any particular logical device or physical ...
- OLE (Object Linking and Embedding) in the application "%1" was trying to convert embedded content in a document; however, ...
- Omitted duplicate property. Keeping: '%1' (%2) Publisher: '%3' Product: '%4' URL: '%5' Omitting: '%6' (%7) Publisher: '%8' ...
- on %2 could not remove the print job submitted by %3 on %4 because the user does not have the Manage Documents permission. ...
- On a computer with Windows Vista or a later version of Windows, this option allows unsecured communication to be sent anytime ...
- On a domain joined computer, the TPM owner password file may no longer be valid if the Active Directory backup of TPM owner ...
- On a domain joined computer, the TPM owner password may no longer be valid if the Active Directory backup of TPM owner information ...
- On a Windows 2000, Windows XP, or Windows 2003 computer, this option allows unsecured communications to be sent only when ...
- On basic GUID partition table (GPT) disks, assigns the GPT attribute(s) to the partition with focus. Syntax: GPT ATTRIBUTES= ...
- On directory servers, Ntds.dit and Edb.log should be the most active files. In this case, {file} has the highest I/O rate ...
- On disks with master boot record (MBR) disk formatting, marks the partition with focus as active. Syntax: ACTIVE Writes a ...
- On disks with master boot record (MBR) disk formatting, marks the partition with focus as inactive. Syntax: INACTIVE The ...
- On input, RequestLength is the length (in octets) of the Descriptor that should be returned. If this value is less than the ...
- On return, if this value is True, a restart of the system is necessary for Offline Files to transition to the requested state. ...
- On the next page some training text will be displayed. When the training text appears, read it aloud in a natural and even ...
- On the Sync tab, create a list of items you want to add to your device, and then click Start Sync. Repeat this step every ...
- on the wire, this top level tune:Tuning element would be implicitly specified and not literally present. but, having the ...
- On Windows 9x when you copy a high color bitmap onto the clipboard, it always gets converted to a 24-bit DIB when the CF_DIB ...
- On-Screen Keyboard makes it possible to type using the mouse or another pointing device by clicking keys on a picture of ...
- Once a transaction is started, only commands that get called with the -UseTransaction flag become part of that transaction. ...
- Once encryption is enabled, it cannot be disabled. Make sure you have a current Emergency Repair Disk before continuing. ...
- Once started, System Restore may not be interrupted Do you want to continue? System Restore cannot be undone until after ...
- Once you uninstall a display language Windows cannot display text in that language. Any supported speech and handwriting ...
- OnDemandInterfaceStateChanged. OnDemandType:%1, Interface: %2, OnDemandInfo:%3, ProviderID:%4, NewState:%5, Ref counter:%6 ...
- One Briefcase cannot be added to another. To add files from another Briefcase, select specific files and drag them to this ...
- One of the backup criteria for determining a file type is the result of the MIME sniff. By examining (or sniffing) a file, ...
- One of the backup source volumes is deduped. Unoptimized backup of files to the volume failed because the target ran out ...
- One of the certificates in the certificate trust chain does not have a valid signature (CERT_TRUST_IS_NOT_SIGNATURE_VALID) ...
- One of the certificates in the certificate trust chain has a basic constraints extension, and either the certificate cannot ...