Windows 8
- Information from the primary domain controller (PDC) for the domain %2 cannot be obtained because: %1 Make sure that the ...
- Information generated by browsing the Web site, such as which pages are visited, and how long an individual stays on each ...
- Information generated from or reflecting explicit interactions with the Web site, such as queries to a search engine, or ...
- Information is no longer available about this task because the object that monitors the progress no longer exists. This may ...
- Information is retained beyond the time it takes to complete the stated purpose because of a legal requirement or liability. ...
- Information may be archived or stored for the purpose of preserving social history as governed by an existing law or policy. ...
- Information may be used by the Web site to complete the activity for which it was provided, whether the activity is a one-time ...
- Information may be used for the technical support of the Web site and its computer system. For example, to process computer ...
- Information may be used to contact an individual, through a communications channel other than voice telephone, for the promotion ...
- Information may be used to tailor or modify the content or design of the Web site during a single visit to the site. For ...
- Information regarding the validation of the server URI will be presented below. Ensure that the properties returned from ...
- Information that allows an individual to be contacted or located in the physical world, such as a telephone number or a postal ...
- Information that allows an individual to be contacted or located on the Internet, such as an e-mail address. Often, this ...
- Information that can be linked to an individual may be used for research, analysis, and reporting. For example, data about ...
- Information that can be linked to an individual may be used to make a decision that directly affects that individual. For ...
- Information that is based upon a unique identifier but that cannot be linked an individual may be used to make a decision ...
- Information that is based upon a unique identifier but that cannot be linked to an individual may be used for research, analysis, ...
- Information you exchange with this site cannot be viewed or changed by others. However, there are the following problems ...
- Information you exchange with this site cannot be viewed or changed by others. However, there is problem with the site's ...
- Information, such as global positioning data, that can be used to identify an individual's current physical location and ...
- Informational callback to request complete. (PendingCount %2) (InformationRoutine %3) (InformationContext %4) (Type %5) (Information ...
- Infrared Camera Service (IrTran-P) received only part of a picture file before the transmission from the camera ended. The ...
- Infrared Camera Support (IrTran-P) failed to start listening on the IrCOMM port. This is probably because another application ...
- Ini File policy allows an administrator to configure ini file settings in any type of ini file. Ini files are widely used ...
- Initial connection to Bluetooth HID device %2 failed. The device has been removed as a personal or paired device. You must ...
- Initial replication deleted file %3 for Replica virtual machine '%1' to complete initial replication. (Virtual Machine ID ...
- Initial replication has not completed yet. The virtual machine '%1' will be ready for fail over after initial replication. ...
- Initialization commands may lead to the exposure of sensitive information in the modem log. Consult your modem's instruction ...
- Initialization could not complete because the minimum number of connections required to initialize the Ldap connection pool ...
- Initialization failed because of a system execution failure on path %1. There is not enough memory to start the process. ...
- Initialization failed because the driver device could not be created. Use the string "%2" to identify the interface for which ...
- Initialization of the High Precision Event Timer failed due to a BIOS configuration problem. The operating system will use ...
- Initialization of the High Precision Event Timer failed due to an interrupt configuration problem. The operating system will ...
- Initialization of the High Precision Event Timer failed due to unsupported hardware. The operating system will use another ...
- Initialization parameters controlling resource usage other than net buffers are sized so that too much memory is needed. ...
- InitializePrintProvider failed for provider %1. This can occur because of system instability or a lack of system resources. ...
- InitializeProvider cannot allocate memory for %1. This can occur because of system instability or a lack of system resources. ...
- InitializeSecurityContext - Credential Handle(%2:%3) Context Handle (%4:%5) (Hostname %6) (InputFlags %7) (Buffer %8 %9/%10]) ...
- InitializeSecurityContext returned - (%14) Credential Handle(%2:%3) Context Handle (%4:%5) (OutputFlags %11) (Buffer %8 %9/%10]) ...
- Initiate rollover for the signing key %1 for the zone %2 on server %3. This is not a reversible action. Do you want to continue? ...
- Initiate scan to update quota usage. The syntax for this command is: Dirquota Quota Scan /Path:PATH /Remote:REMOTE /Path:PATH ...
- Initiates a new transaction and returns an MSMQ transaction object representing the new underlying transaction object created ...
- Initiator CHAP secret given is invalid. Maximum size of CHAP secret is 16 bytes. Minimum size is 12 bytes if IPSec is not ...
- Initiator CHAP secret is smaller than the minimum size (12 bytes) required by the spec. Dump data contains the given CHAP ...
- Initiator could not find a match for the initiator task tag in the received PDU. Dump data contains the entire iSCSI header. ...
- Initiator/Target combinations that belong to the same storage group (masking set) will be selected or deselected together. ...
- Ink and Handwriting Services includes Ink Support and Handwriting Recognition. Ink Support provides pen/stylus support, including ...
- Ink is not working on your computer right now. Restart your computer, and then try again. If you still have this problem, ...
- Ink Support provides pen/stylus support, including pen flicks support and application programming interfaces (APIs) for calling ...
- Inpass, Qmpfs, Soft and Qmsec options are not valid for the Permit or Block type FilterAction. 'action = negotiate' needs ...
- InPrivate Browsing helps prevent Internet Explorer from storing data about your browsing session. This includes cookies, ...
- InPrivate Browsing helps prevent Internet Explorer from storing data about your browsing session. This includes cookies, ...
- Input dsset file could not be opened. Please verify the specified path and ensure that a fully qualified path name is given. ...
- Input file: %1!s! Output file: %2!s! Filter: %3!s! Overwrite: %4!s! RetainCorrelationEvents: %5!s! RetainPII: %6!s! RetainGlobalEvents: ...
- Input keyset file could not be opened. Please verify the specified path and ensure that a fully qualified path name is given. ...
- Input Panel automatically converts your ink to text as you are writing. You can adjust the settings for how this happens. ...
- Input Panel can't run on a computer that you're connecting to remotely. Try running Input Panel on your local computer instead. ...
- InputObject for resource record has an invalid value. Failed to add the resource record on %1 server. Please check extended ...
- InputObject for resource record has an invalid value. Failed to remove the resource record on %1 server. Please check extended ...
- Insert a blank, formatted disk into the drive you want to use, and then select that drive from the list below. I want to ...
- Insert a compatible SIM in the mobile broadband device There is no SIM in the device or it is blocked by a PIN unblock key ...
- Insert a new storage device %3 is needed to copy these files. %2 is full. Please insert a new storage device to continue ...
- Insert data chunk body to chunk container (%1 - %2.%3.ccc) at offset %4 (Chunk: IsBatched %5 IsCorrupted %6, DataSize %7) ...
- Insert data chunk header to chunk container (%1 - %2.%3.ccc) at offset %4 (Chunk: IsBatched %5 IsCorupted %6, DataSize %7) ...
- Insert hotspot chunk body to chunk container (%1 - %2.%3.ccc) at offset %4 (Chunk: IsBatched %5 IsCorrupted %6, DataSize ...
- Insert hotspot chunk header to chunk container (%1 - %2.%3.ccc) at offset %4 (Chunk: IsBatched %5 IsCorrupted %6, DataSize ...
- Insert padding chunk body to chunk container (%1 - %2.%3.ccc) at offset %4 (Chunk: IsBatched %5 IsCorrupted %6, DataSize ...
- Insert padding chunk header to chunk container (%1 - %2.%3.ccc) at offset %4 (Chunk: IsBatched %5 IsCorupted %6, DataSize ...
- Insert stream map chunk body to chunk container (%1 - %2.%3.ccc) at offset %4 (Chunk: IsBatched %5 IsCorrupted %6, DataSize ...
- Insert stream map chunk header to chunk container (%1 - %2.%3.ccc) at offset %4 (Chunk: IsBatched %5 IsCorrupted %6, DataSize ...
- Insert the media with the following label into %2!s! %1!s! You can use a blank media or current media in the drive %2!s! ...
- Insert the password reset disk into the drive you want to use, and then select that drive from the list below. The password ...
- Insert the product's first installation floppy disk or CD-ROM, and then click Next. The application will be installed in ...
- Inserts a picture of the clipboard contents into your document. The picture is linked to the source file so that changes ...
- Inserts a picture of the file contents into your document. The picture will be linked to the file so that changes to the ...