Windows 8

  1. Information from the primary domain controller (PDC) for the domain %2 cannot be obtained because: %1 Make sure that the ...
  2. Information generated by browsing the Web site, such as which pages are visited, and how long an individual stays on each ...
  3. Information generated from or reflecting explicit interactions with the Web site, such as queries to a search engine, or ...
  4. Information is no longer available about this task because the object that monitors the progress no longer exists. This may ...
  5. Information is retained beyond the time it takes to complete the stated purpose because of a legal requirement or liability. ...
  6. Information may be archived or stored for the purpose of preserving social history as governed by an existing law or policy. ...
  7. Information may be used by the Web site to complete the activity for which it was provided, whether the activity is a one-time ...
  8. Information may be used for the technical support of the Web site and its computer system. For example, to process computer ...
  9. Information may be used to contact an individual, through a communications channel other than voice telephone, for the promotion ...
  10. Information may be used to tailor or modify the content or design of the Web site during a single visit to the site. For ...
  11. Information regarding the validation of the server URI will be presented below. Ensure that the properties returned from ...
  12. Information that allows an individual to be contacted or located in the physical world, such as a telephone number or a postal ...
  13. Information that allows an individual to be contacted or located on the Internet, such as an e-mail address. Often, this ...
  14. Information that can be linked to an individual may be used for research, analysis, and reporting. For example, data about ...
  15. Information that can be linked to an individual may be used to make a decision that directly affects that individual. For ...
  16. Information that is based upon a unique identifier but that cannot be linked an individual may be used to make a decision ...
  17. Information that is based upon a unique identifier but that cannot be linked to an individual may be used for research, analysis, ...
  18. Information you exchange with this site cannot be viewed or changed by others. However, there are the following problems ...
  19. Information you exchange with this site cannot be viewed or changed by others. However, there is problem with the site's ...
  20. Information, such as global positioning data, that can be used to identify an individual's current physical location and ...
  21. Informational callback to request complete. (PendingCount %2) (InformationRoutine %3) (InformationContext %4) (Type %5) (Information ...
  22. Infrared Camera Service (IrTran-P) received only part of a picture file before the transmission from the camera ended. The ...
  23. Infrared Camera Support (IrTran-P) failed to start listening on the IrCOMM port. This is probably because another application ...
  24. Ini File policy allows an administrator to configure ini file settings in any type of ini file. Ini files are widely used ...
  25. Initial connection to Bluetooth HID device %2 failed. The device has been removed as a personal or paired device. You must ...
  26. Initial replication deleted file %3 for Replica virtual machine '%1' to complete initial replication. (Virtual Machine ID ...
  27. Initial replication has not completed yet. The virtual machine '%1' will be ready for fail over after initial replication. ...
  28. Initialization commands may lead to the exposure of sensitive information in the modem log. Consult your modem's instruction ...
  29. Initialization could not complete because the minimum number of connections required to initialize the Ldap connection pool ...
  30. Initialization failed because of a system execution failure on path %1. There is not enough memory to start the process. ...
  31. Initialization failed because the driver device could not be created. Use the string "%2" to identify the interface for which ...
  32. Initialization of the High Precision Event Timer failed due to a BIOS configuration problem. The operating system will use ...
  33. Initialization of the High Precision Event Timer failed due to an interrupt configuration problem. The operating system will ...
  34. Initialization of the High Precision Event Timer failed due to unsupported hardware. The operating system will use another ...
  35. Initialization parameters controlling resource usage other than net buffers are sized so that too much memory is needed. ...
  36. InitializePrintProvider failed for provider %1. This can occur because of system instability or a lack of system resources. ...
  37. InitializeProvider cannot allocate memory for %1. This can occur because of system instability or a lack of system resources. ...
  38. InitializeSecurityContext - Credential Handle(%2:%3) Context Handle (%4:%5) (Hostname %6) (InputFlags %7) (Buffer %8 %9/%10]) ...
  39. InitializeSecurityContext returned - (%14) Credential Handle(%2:%3) Context Handle (%4:%5) (OutputFlags %11) (Buffer %8 %9/%10]) ...
  40. Initiate rollover for the signing key %1 for the zone %2 on server %3. This is not a reversible action. Do you want to continue? ...
  41. Initiate scan to update quota usage. The syntax for this command is: Dirquota Quota Scan /Path:PATH /Remote:REMOTE /Path:PATH ...
  42. Initiates a new transaction and returns an MSMQ transaction object representing the new underlying transaction object created ...
  43. Initiator CHAP secret given is invalid. Maximum size of CHAP secret is 16 bytes. Minimum size is 12 bytes if IPSec is not ...
  44. Initiator CHAP secret is smaller than the minimum size (12 bytes) required by the spec. Dump data contains the given CHAP ...
  45. Initiator could not find a match for the initiator task tag in the received PDU. Dump data contains the entire iSCSI header. ...
  46. Initiator/Target combinations that belong to the same storage group (masking set) will be selected or deselected together. ...
  47. Ink and Handwriting Services includes Ink Support and Handwriting Recognition. Ink Support provides pen/stylus support, including ...
  48. Ink is not working on your computer right now. Restart your computer, and then try again. If you still have this problem, ...
  49. Ink Support provides pen/stylus support, including pen flicks support and application programming interfaces (APIs) for calling ...
  50. Inpass, Qmpfs, Soft and Qmsec options are not valid for the Permit or Block type FilterAction. 'action = negotiate' needs ...
  51. InPrivate Browsing helps prevent Internet Explorer from storing data about your browsing session. This includes cookies, ...
  52. InPrivate Browsing helps prevent Internet Explorer from storing data about your browsing session. This includes cookies, ...
  53. Input dsset file could not be opened. Please verify the specified path and ensure that a fully qualified path name is given. ...
  54. Input file: %1!s! Output file: %2!s! Filter: %3!s! Overwrite: %4!s! RetainCorrelationEvents: %5!s! RetainPII: %6!s! RetainGlobalEvents: ...
  55. Input keyset file could not be opened. Please verify the specified path and ensure that a fully qualified path name is given. ...
  56. Input Panel automatically converts your ink to text as you are writing. You can adjust the settings for how this happens. ...
  57. Input Panel can't run on a computer that you're connecting to remotely. Try running Input Panel on your local computer instead. ...
  58. InputObject for resource record has an invalid value. Failed to add the resource record on %1 server. Please check extended ...
  59. InputObject for resource record has an invalid value. Failed to remove the resource record on %1 server. Please check extended ...
  60. Insert a blank, formatted disk into the drive you want to use, and then select that drive from the list below. I want to ...
  61. Insert a compatible SIM in the mobile broadband device There is no SIM in the device or it is blocked by a PIN unblock key ...
  62. Insert a new storage device %3 is needed to copy these files. %2 is full. Please insert a new storage device to continue ...
  63. Insert data chunk body to chunk container (%1 - %2.%3.ccc) at offset %4 (Chunk: IsBatched %5 IsCorrupted %6, DataSize %7) ...
  64. Insert data chunk header to chunk container (%1 - %2.%3.ccc) at offset %4 (Chunk: IsBatched %5 IsCorupted %6, DataSize %7) ...
  65. Insert hotspot chunk body to chunk container (%1 - %2.%3.ccc) at offset %4 (Chunk: IsBatched %5 IsCorrupted %6, DataSize ...
  66. Insert hotspot chunk header to chunk container (%1 - %2.%3.ccc) at offset %4 (Chunk: IsBatched %5 IsCorrupted %6, DataSize ...
  67. Insert padding chunk body to chunk container (%1 - %2.%3.ccc) at offset %4 (Chunk: IsBatched %5 IsCorrupted %6, DataSize ...
  68. Insert padding chunk header to chunk container (%1 - %2.%3.ccc) at offset %4 (Chunk: IsBatched %5 IsCorupted %6, DataSize ...
  69. Insert stream map chunk body to chunk container (%1 - %2.%3.ccc) at offset %4 (Chunk: IsBatched %5 IsCorrupted %6, DataSize ...
  70. Insert stream map chunk header to chunk container (%1 - %2.%3.ccc) at offset %4 (Chunk: IsBatched %5 IsCorrupted %6, DataSize ...
  71. Insert the media with the following label into %2!s! %1!s! You can use a blank media or current media in the drive %2!s! ...
  72. Insert the password reset disk into the drive you want to use, and then select that drive from the list below. The password ...
  73. Insert the product's first installation floppy disk or CD-ROM, and then click Next. The application will be installed in ...
  74. Inserts a picture of the clipboard contents into your document. The picture is linked to the source file so that changes ...
  75. Inserts a picture of the file contents into your document. The picture will be linked to the file so that changes to the ...