Windows 10

  1. Number of scopes being added to the failover relationship exceeds the max number of scopes which can be added to a failover ...
  2. Number of SCSI retries that have occurred since last hard or soft reset related to the controlled Device. The time of last ...
  3. Number of SCSI timeouts that have occurred since last hard or soft reset related to the controlled Device. The time of last ...
  4. Number of search suboperations per second. One search operation is made up of many sub operations. A sub operation roughly ...
  5. Number of Security Descriptor Propagation suboperations per second. One Security Descriptor Propagation operation is made ...
  6. Number of soft resets issued by the controller. A soft reset does not completely clear current device state and/or data. ...
  7. Number of successfully established RDMA connections on which an error occurred before being disconnected by local or remote ...
  8. Number of system state backups found: %1!lu! Number of copies to keep: %2!lu! Because the number of backups found is less ...
  9. Number of transport security binding %1 is invalid. One and only one transport security binding must be specified in security ...
  10. Number of unique tracing providers that are registered with the tracing subsystem but are not actively enabled to any trace ...
  11. o fileaccess=mode To specify the permission mode of the file. These are used for new files created on NFS servers. Specified ...
  12. o lang=euc-jp|euc-tw|euc-kr|shift-jis|big5|ksc5601|gb2312-80|ansi To specify the encoding used for file and directory names. ...
  13. o rsize=size To set the size of the read buffer in kilobytes. -o wsize=size To set the size of the write buffer in kilobytes. ...
  14. Object "%1" cannot be deleted because an open window is displaying its properties. To delete this object, close that window ...
  15. Object "{0}" is the wrong type to return from the dynamicparam block. The dynamicparam block must return either $null, or ...
  16. Object %1 is a Trusted domain object. To remove trusts use the Active Directory Domains and Trusts snapin. Do you want to ...
  17. Object Access Attempt: Object Server: %1 Handle ID: %2 Object Type: %3 Process ID: %4 Image File Name: %5 Accesses: %6 Access ...
  18. Object being moved across-domains is already known to be deleted by the destination server. The source server does not have ...
  19. Object Open for Delete: Object Server: %1 Object Type: %2 Object Name: %3 Handle ID: %4 Operation ID: {%5,%6} Process ID: ...
  20. Object Open: Object Server: %1 Object Type: %2 Object Name: %3 Handle ID: %4 Operation ID: %5 Process ID: %6 Image File Name: ...
  21. Object Open: Object Server: %1 Object Type: %2 Object Name: %3 Handle ID: %4 Operation ID: {%5,%6} Process ID: %7 Process ...
  22. Object Operation: Object Server: %1 Operation Type: %2 Object Type: %3 Object Name: %4 Handle ID: %5 Primary User Name: %6 ...
  23. Object's implementation of IInspectable::GetTrustLevel returned a value that is different from the trust level configured ...
  24. ObjectId - ObjectId to display or to add display name GroupId - decimal GroupId number for ObjectIds to enumerate AlgId - ...
  25. ObjectId cannot be less than or equal to 0. This can happen if the fragments are not properly constructed by the remote computer, ...
  26. OBJECTID Commands Supported - create Create the object identifier delete Delete the object identifier query Query the object ...
  27. Obscured or implied sexual acts and visible sexual touching in an artistic, medical, educational, sports or news context. ...
  28. Obscured or implied sexual acts, visible sexual touching, and passionate kissing in any context. Explicit sexual context ...
  29. Obtain an updated certificate from your network administrator The certificate required to connect to this network can't be ...
  30. OCSP Revocation Provider successfully updated the revocation information. CA Configuration ID: %1 Base CRL Number: %2 Base ...
  31. Of %1 files within %2 directories %3 are compressed and %4 are not compressed. %5 total bytes of data are stored in %6 bytes. ...
  32. of %3 instances of system store corruption have been repaired. Unrepaired corruptions may lead to failures in future system ...
  33. Offers the latest critical and security updates, device drivers, and other features that are available for your Windows computer. ...
  34. OfficeScan Corporate Edition is incompatible with this version of Windows. For more information, contact Trend Micro, INC. ...
  35. Offline Files allows you to access network files while working offline. To set up Offline Files open a network folder, right ...
  36. Offline Files configuration is being controlled by WMI configuration classes Win32_OfflineFilesUserConfiguration and Win ...
  37. Offline files on this computer will not be available until the computer is connected to the server after the upgrade. Offline ...
  38. Offline items were not updated because a connection to the Internet could not be made because File Sharing for Microsoft ...
  39. Offline pages are webpages that are stored on your computer so you can view them without being connected to the Internet. ...
  40. Offloaded Bytes Received per Second is the rate of bytes received using IPsec hardware offload. Certain network adapters ...
  41. Offloaded Bytes Sent per Second is the rate of bytes sent using IPsec hardware offload. Certain network adapters can accelerate ...
  42. Offloaded Connections is the number of TCP connections (over both IPv4 and IPv6) that are currently handled by the TCP chimney ...
  43. Offloaded Security Associations is the number of active quick mode security associations offloaded to hardware. Certain network ...
  44. Offset and length were out of bounds for the array or count is greater than the number of elements from index to the end ...
  45. Often, a cooling device is installed in a package such as a chassis or a rack, not for a specific device, but to assist in ...
  46. Often, a temperature sensor is installed in a package such as a chassis or a rack, not to measure any particular device, ...
  47. Often, an alarm device is installed as part of a package, not to indicate issues with any particular logical device or physical ...
  48. OLE (Object Linking and Embedding) in the application "%1" was trying to convert embedded content in a document; however, ...
  49. Omitted duplicate property. Keeping: '%1' (%2) Publisher: '%3' Product: '%4' URL: '%5' Omitting: '%6' (%7) Publisher: '%8' ...
  50. on %2 could not remove the print job submitted by %3 on %4 because the user does not have the Manage Documents permission. ...
  51. On a computer with Windows Vista or a later version of Windows, this option allows unsecured communication to be sent anytime ...
  52. On a domain joined computer, the TPM owner password file may no longer be valid if the Active Directory backup of TPM owner ...
  53. On a domain joined computer, the TPM owner password may no longer be valid if the Active Directory backup of TPM owner information ...
  54. On a Windows 2000, Windows XP, or Windows 2003 computer, this option allows unsecured communications to be sent only when ...
  55. On basic GUID partition table (GPT) disks, assigns the GPT attribute(s) to the partition with focus. Syntax: GPT ATTRIBUTES= ...
  56. On directory servers, Ntds.dit and Edb.log should be the most active files. In this case, {file} has the highest I/O rate ...
  57. On disks with master boot record (MBR) disk formatting, marks the partition with focus as active. Syntax: ACTIVE Writes a ...
  58. On disks with master boot record (MBR) disk formatting, marks the partition with focus as inactive. Syntax: INACTIVE The ...
  59. On input, RequestLength is the length (in octets) of the Descriptor that should be returned. If this value is less than the ...
  60. On return, if this value is True, a restart of the system is necessary for Offline Files to transition to the requested state. ...
  61. On the next page some training text will be displayed. When the training text appears, read it aloud in a natural and even ...
  62. On the Sync tab, create a list of items you want to add to your device, and then click Start Sync. Repeat this step every ...
  63. on the wire, this top level tune:Tuning element would be implicitly specified and not literally present. but, having the ...
  64. On Windows 9x when you copy a high color bitmap onto the clipboard, it always gets converted to a 24-bit DIB when the CF_DIB ...
  65. On-Screen Keyboard makes it possible to type using the mouse or another pointing device by clicking keys on a picture of ...
  66. Once a transaction is started, only commands that get called with the -UseTransaction flag become part of that transaction. ...
  67. Once encryption is enabled, it cannot be disabled. Make sure you have a current Emergency Repair Disk before continuing. ...
  68. Once started, System Restore may not be interrupted Do you want to continue? System Restore cannot be undone until after ...
  69. Once you uninstall a display language Windows cannot display text in that language. Any supported speech and handwriting ...
  70. OnDemandInterfaceStateChanged. OnDemandType:%1, Interface: %2, OnDemandInfo:%3, ProviderID:%4, NewState:%5, Ref counter:%6 ...
  71. One Briefcase cannot be added to another. To add files from another Briefcase, select specific files and drag them to this ...
  72. One of the backup criteria for determining a file type is the result of the MIME sniff. By examining (or sniffing) a file, ...
  73. One of the backup source volumes is deduped. Unoptimized backup of files to the volume failed because the target ran out ...
  74. One of the certificates in the certificate trust chain does not have a valid signature (CERT_TRUST_IS_NOT_SIGNATURE_VALID) ...
  75. One of the certificates in the certificate trust chain has a basic constraints extension, and either the certificate cannot ...