Windows 10

  1. Profiles store information about how to recognize your voice. Change a profile to recognize a different voice or a different ...
  2. Program %1 with instanceID=%2 was removed from the Security Center reporting database because the program was either uninstalled, ...
  3. Program that stopped working: %ws Repair status: Success - Restart required Damaged file: %ws Type: %ws Version: %ws Created ...
  4. Program(s) or devices(s) requesting attention. Message title: %s Program path: %s Received: %s This problem occurs when a ...
  5. Programs and drivers that might be restored. These programs might not work correctly after restore and might need to be reinstalled: ...
  6. Programs on the remote computer will continue to run after you have disconnected. You can reconnect to this remote session ...
  7. Programs sometimes store temporary information in a TEMP folder. Before a program closes, it usually deletes this information. ...
  8. Programs that might affect your privacy or make changes to your computer that could negatively impact your computing experience, ...
  9. Programs that might collect your personal information and negatively affect your privacy or damage your computer, for example, ...
  10. Progress to '%1': %2 stage; %3 retries; %4 bytes sent; %5 total bytes to send; %6 bytes received; %7 total bytes to receive. ...
  11. Prohibits use of Internet Connection Firewall on your DNS domain network. Determines whether users can enable the Internet ...
  12. Promotion of the local domain controller to a global catalog has been delayed because the directory partition occupancy requirements ...
  13. Promotion of this domain controller to a global catalog will be delayed for the following interval. Interval (minutes): %1 ...
  14. Prompts users for alternate logon credentials during network-based installations. This setting displays the "Install Program ...
  15. Propagation stopped because the propagation state for search server cannot be read. Try propagation again. If this error ...
  16. Properties for this program cannot be verified. Another program may be using the APPS.INF file. Close your other programs ...
  17. Properties for this program cannot be verified. The APPS.INF file is missing. Copy the APPS.INF file from your Windows Setup ...
  18. Property Store is not found in the indexer. The possible causes are that the call came during a catalog reset or that the ...
  19. Property {0} of PowerShell class {1} is not declared as array type, but defined in its configuration instance as instance ...
  20. PropertyName is a string property and is either DeleteTempFolders or UseTempFolders.They are flags that are either set to ...
  21. PropertyName is an enumeration of the properties: 0 = LPTPortMapping, 1 = COMPortMapping, 2 = AudioMapping, 3 = ClipboardMapping, ...
  22. PropertyName is an enumeration of the properties: 0 = SessionDirectoryLocation and 1 = SessionDirectoryClusterNamewhich are ...
  23. Proposed Central Access Policy does not grant the same access permissions as the current Central Access Policy. Subject: ...
  24. Protect data from modification and preserve confidentiality on the network with these integrity and encryption algorithms. ...
  25. Protect Key operation failed. Cryptographic Parameters: Protector Name: %1 Protector Attributes: %2 Flags: %3 Failure Information: ...
  26. Protected content was recently transferred to this computer. Type the password for your user account on the old computer ...
  27. Protected Mode Internet Explorer Shim - intercepts and elevates CreateProcess, WinExec, CoCreateInstance, CoGetClassObject. ...
  28. Protected Mode Internet Explorer Shim - intercepts save-to-file dialogs and prompts the user with an appropriate location. ...
  29. Protected Mode Internet Explorer Shim - intercepts save-to-file dialogs and prompts the user with the redirected low location. ...
  30. Protected Storage helps safeguard data you want to keep private. These details show which program is attempting to access ...
  31. Protection has not been enabled on the volume. Enabling protection requires a connected account. If you already have a connected ...
  32. Protection is enabled on the volume but has been suspended. This is likely to have happened due to an update being applied ...
  33. Protection of auditable protected data was attempted. Subject: Security ID: %1 Account Name: %2 Account Domain: %3 Logon ...
  34. Protection of auditable protected data. Data Description: %2 Key Identifier: %1 Protected Data Flags: %3 Protection Algorithms: ...
  35. Provide a hint to help you remember your password. Set the hint so that others cannot use it to easily guess your password. ...
  36. Provide a PIN that contains characters limited to unaccented letters (A-Z, a-z), numbers (0-9), space, and the following ...
  37. Provide an encryption certificate to be used by Protected Event Logging. You may provide either: - The content of a base-64 ...
  38. Provide new credentials for "%ws" Open the Save/Replace credentials dialog box to replace the existing credentials or delete ...
  39. Provide the user name and password to use for scheduling the backup. The user account must have write permission to the remote ...
  40. Provided payload does not match with the template that was defined for event id {0}. The defined template is following: {1} ...
  41. Provider returned incorrect type for property, ignoring (custom property may have been registered with different types on ...
  42. provider`p`provider flags level]`A single Event Trace provider to enable. The terms 'Flags' and 'Keywords' are synonymous ...
  43. Provides a common interface and object model to access management information about operating system, devices, applications ...
  44. Provides a mechanism to exchange data between the virtual machine and the operating system running on the physical computer. ...
  45. Provides a mechanism to shut down the operating system of this virtual machine from the management interfaces on the physical ...
  46. Provides a network service that processes requests to simulate application of Group Policy settings for a target user or ...
  47. Provides a platform for communication between the virtual machine and the operating system running on the physical computer. ...
  48. Provides a space for you to type a server name or a domain name. You can use wildcards in the domain name. Some examples ...
  49. Provides a way to add comments to a script. Syntax: REM Example: In this example script, REM is used to provide a comment ...
  50. Provides apps access to structured user data, including contact info, calendars, messages, and other content. If you stop ...
  51. Provides file system-specific information about an item in the Offline Files cache. This information is available only for ...
  52. Provides for setting a more granular set of auditing permissions to the existing account specified.The permissions are set ...
  53. Provides identity services for the Peer Name Resolution Protocol (PNRP) and Peer-to-Peer Grouping services. If disabled, ...
  54. Provides infrastructure support for deploying Store applications. This service is started on demand and if disabled Store ...
  55. Provides infrastructure support for the Microsoft Store. This service is started on demand and if disabled applications bought ...
  56. Provides infrastructure support for the Windows Store. This service is started on demand and if disabled then content acquired ...
  57. Provides infrastructure support for Windows Store.This service is started on demand and if disabled applications bought using ...
  58. Provides local station and session host interfaces, and discovers other servers on the network that are running MultiPoint ...
  59. Provides management services for disks, volumes, file systems, and, hardware array objects such as subsystems, luns, controllers, ...
  60. Provides network address translation, addressing, name resolution and/or intrusion prevention services for a home or small ...
  61. Provides no integrity protection for the packet payload or IP header. Use this option only to support network devices and ...
  62. Provides performance library information from Windows Management Instrumentation (WMI) providers to clients on the network. ...
  63. Provides process isolation for cryptographic keys used to authenticate to a user's associated identity providers. If this ...
  64. Provides support for the NetBIOS over TCP/IP (NetBT) service and NetBIOS name resolution for clients on the network, therefore ...
  65. Provides support for the Secure Socket Tunneling Protocol (SSTP) to connect to remote computers using VPN. If this service ...
  66. Provides Telephony API (TAPI) support for programs that control telephony devices on the local computer and, through the ...
  67. Provides the ability to debug the application prelaunch of a specific application by triggering the prelaunch to occur and ...
  68. Provides the capability to disable any combination of the following: 1. Application Launch Prefetching 2. Operation API Prefetching ...
  69. Provides the capability to enable any combination of the following: 1. Application Launch Prefetching 2. Operation API Prefetching ...
  70. Provides the core file encryption technology used to store encrypted files on NTFS file system volumes. If this service is ...
  71. Provides three management services: Catalog Database Service, which confirms the signatures of Windows files and allows new ...
  72. Provides tunnel connectivity using IPv6 transition technologies (6to4, ISATAP, Port Proxy, and Teredo), and IP-HTTPS. If ...
  73. Provides User Account Control validation for the installation of ActiveX controls from the Internet and enables management ...
  74. Providing 'Deny delete' and 'Deny delete subtree' permissions to protect computer object %1 from accidental deletion failed. ...
  75. Providing samples of your handwriting increases the likelihood of your writing being recognized correctly. For best results, ...