Windows 10

  1. The Certificates snap-in allows you to browse the contents of the certificate stores for yourself, a service, or a computer. ...
  2. The certificates you are about to copy refer to private keys. The private keys will not be copied with the certificates. ...
  3. The certification authority cannot interpret or verify the endorsement key information supplied in the request, or the information ...
  4. The Certification Authority Service is installed on this computer. You must remove that service before you can change the ...
  5. The chain of virtual hard disks is broken. The system cannot locate the parent virtual hard disk '{0}' for the child virtual ...
  6. The chain of virtual hard disks is broken. The system cannot locate the parent virtual hard disk for the differencing disk. ...
  7. The chain of virtual hard disks is corrupted for virtual machine '%1'. There is a mismatch in the identifiers of the parent ...
  8. The chain of virtual hard disks is corrupted. The time stamp of the parent virtual hard disk does not match the time stamp ...
  9. The chain of virtual hard disks is corrupted. There is a mismatch in the identifiers of the parent virtual hard disk and ...
  10. The chain of virtual hard disks is corrupted. There is a mismatch in the virtual sizes of the parent virtual hard disk and ...
  11. The chain of virtual hard disks is inaccessible. The process has not been granted access rights to the parent virtual hard ...
  12. The change log cache maintained by the Netlogon service for %1 database changes is inconsistent. The Netlogon service is ...
  13. The Change method modifies a service. The Win32_LoadOrderGroup parameter represents a grouping of system services defining ...
  14. The change tracking file for VHD %1 is corrupted and cannot be read. No change tracking information will be available for ...
  15. The change was not immediately replicated to the read-only domain controller. The following Active Directory Domain Services ...
  16. The change you are about to make will result in 9 or more permissions that propagate to child objects being added to the ...
  17. The change you just made resulted in an access control list that exceeds the maximum size. You must remove approximately ...
  18. The changes to the spool folder will occur immediately and any currently active documents will not print. It is recommended ...
  19. The changes were applied but may not be available immediately. You may need to refresh the page for the changes to reliably ...
  20. The changes were applied but may not be available immediately: {0}. You may need to refresh the page for the changes to reliably ...
  21. The ChangeSecurityPermissions method changes the security permissions for the logical file specified in the object path. ...
  22. The ChangeSecurityPermissionsEx method changes the security permissions for the logical file specified in the object path. ...
  23. The ChangeStartMode method modifies the StartMode of a service. It returns one of the following integer values: 0 - The request ...
  24. The character length ({1}) of the argument is too short. Specify an argument with a length that is greater than or equal ...
  25. The character length of the {1} argument is too long. Shorten the character length of the argument so it is fewer than or ...
  26. The characters '%1' either cannot be parsed as a 128 bit fixed point number, or its value is out of range of a 128 bit fixed ...
  27. The characters '%1' either cannot be parsed as a 64 bit floating point number, or its value is out of range of a 64 bit floating ...
  28. The characters '%1' either cannot be parsed as a signed 32 bit integer, or its value is out of range of a signed 32 bit integer. ...
  29. The characters '%1' either cannot be parsed as a signed 64 bit integer, or its value is out of range of a signed 64 bit integer. ...
  30. The characters '%1' either cannot be parsed as an unsigned 32 bit integer encoded in hexadecimal, or its value is out of ...
  31. The characters '%1' either cannot be parsed as an unsigned 32 bit integer, or its value is out of range of an unsigned 32 ...
  32. The characters '%1' either cannot be parsed as an unsigned 64 bit integer, or its value is out of range of an unsigned 64 ...
  33. The CheckAccess method verifies that the user possesses the specified permissions. The method returns a uint32 which is 0 ...
  34. The CheckMode property is used to indicate whether the condition is expected to exist or not exist in the environment. When ...
  35. The checkpoint cannot be enabled, because the content index is not idle. Wait until the index is idle, and then try again. ...
  36. The checkpoint configuration file '%3' has been restored to a different location than the other checkpoint configuration ...
  37. The checkpoint configuration file '%3' has been restored to an unsupported location. The location must be in the format \Snapshots\ ...
  38. The checkpoint configuration of virtual machine '%1' could not be read. The data might be corrupt or not valid. (Virtual ...
  39. The checkpoint name is out of range for '%1' because new name is not between 1 and 100 characters '%4'. (CheckpointID %2) ...
  40. The CheckPoint property specifies a value that the service increments periodically to report its progress during a lengthy ...
  41. The checkpoint record cannot be read, and this action cannot be completed. If the problem persists, restart the service, ...
  42. The checkpoint record cannot be updated, and this action cannot be completed. The gatherer will attempt to update the checkpoint ...
  43. The CIM status code that characterizes this instance. This property defines the status codes that MAY be return by a conforming ...
  44. The CIM_ActionSequence association is used to define a series of operations that either transitions the software element, ...
  45. The CIM_ActsAsSpare association indicates which elements can spare or replace the other aggregated elements. The fact that ...
  46. The CIM_AggregatePExtent class provides summary information about the addressable logical blocks which are in the same storage ...
  47. The CIM_ApplicationSystem class is used to represent an application or a software system that supports a particular business ...
  48. The CIM_ApplicationSystemSoftwareFeature associations identifies the software features that make up a particular application ...
  49. The CIM_Card class represents a type of physical container that can be plugged into another card or hosting board, or is ...
  50. The CIM_CDROMDrive class represents a CD-ROM drive on the system. Note: The name of the drive does not correspond to the ...
  51. The CIM_Chassis class represents the physical elements that enclose other elements and provide definable functionality, such ...
  52. The CIM_ClusteringService class represents the functionality provided by a cluster. For example, failover functionality may ...
  53. The CIM_ComputerSystem object and its derivatives are Top Level Objects of CIM. They provide the scope for numerous components. ...
  54. The CIM_Container association represents the relationship between a contained and a containing physical element. A containing ...
  55. The CIM_ControlledBy relationship indicates which devices are commanded by or accessed through the controller logical device. ...
  56. The CIM_CopyFileAction specifies files that exist on a computer system, and to move or copy those files to a new location. ...
  57. The CIM_DeviceSoftware relationship identifies any software that is associated with a device - such as drivers, configuration ...
  58. The CIM_DirectoryAction is an abstract class that is used for directories to be managed. Creation of directories is handled ...
  59. The CIM_DirectoryContainsFile class represents an association between a directory and files contained within that directory. ...
  60. The CIM_DirectorySpecification class captures the major directory structure of a software element. This class is used to ...
  61. The CIM_DirectorySpecificationFile association identifies the directorythat contains the file being specified by referencing ...
  62. The CIM_DiskDrive class represents a physical disk drive as seen by the operating system. The features of the drive seen ...
  63. The CIM_ElementConformsToProfile association defines the RegisteredProfiles to which the referenced ManagedElement is conformant. ...
  64. The CIM_FileAction allows the author to locate files that already exist on the users machine, and move or copy those files ...
  65. The CIM_FromDirectoryAction association identifies the source directory for the file action. When this association is used, ...
  66. The CIM_FromDirectorySpecification association identifies the source directory for the file action. When this association ...
  67. The CIM_FRU class is a vendor-defined collection of products and/or physical elements that is associated with a product for ...
  68. The CIM_InstalledSoftwareElement association allows one to identify the computer system a particular software element is ...
  69. The CIM_LogicalDevice dependent reference represents the CIM_LogicalDevice connected to the Universal Serial Bus (USB) controller. ...
  70. The CIM_LogicalElement class is the base class for all the components of the system that represent abstract system components. ...
  71. The CIM_LogicalFile class represents a named collection of data (this can be executable code) located in a file system on ...
  72. The CIM_ManagedSystemElement class is the base class for the system element hierarchy. Membership criteria: Any distinguishable ...
  73. The CIM_OSVersionCheck class specifies the versions of the OS that can support this software element. This check can be for ...
  74. The CIM_PhysicalComponent class represents any low-level or basic component within a package. Any physical element that is ...
  75. The CIM_PhysicalConnector class represents any physical element that is used to connect to other elements. Any object that ...