Windows 10
- The Certificates snap-in allows you to browse the contents of the certificate stores for yourself, a service, or a computer. ...
- The certificates you are about to copy refer to private keys. The private keys will not be copied with the certificates. ...
- The certification authority cannot interpret or verify the endorsement key information supplied in the request, or the information ...
- The Certification Authority Service is installed on this computer. You must remove that service before you can change the ...
- The chain of virtual hard disks is broken. The system cannot locate the parent virtual hard disk '{0}' for the child virtual ...
- The chain of virtual hard disks is broken. The system cannot locate the parent virtual hard disk for the differencing disk. ...
- The chain of virtual hard disks is corrupted for virtual machine '%1'. There is a mismatch in the identifiers of the parent ...
- The chain of virtual hard disks is corrupted. The time stamp of the parent virtual hard disk does not match the time stamp ...
- The chain of virtual hard disks is corrupted. There is a mismatch in the identifiers of the parent virtual hard disk and ...
- The chain of virtual hard disks is corrupted. There is a mismatch in the virtual sizes of the parent virtual hard disk and ...
- The chain of virtual hard disks is inaccessible. The process has not been granted access rights to the parent virtual hard ...
- The change log cache maintained by the Netlogon service for %1 database changes is inconsistent. The Netlogon service is ...
- The Change method modifies a service. The Win32_LoadOrderGroup parameter represents a grouping of system services defining ...
- The change tracking file for VHD %1 is corrupted and cannot be read. No change tracking information will be available for ...
- The change was not immediately replicated to the read-only domain controller. The following Active Directory Domain Services ...
- The change you are about to make will result in 9 or more permissions that propagate to child objects being added to the ...
- The change you just made resulted in an access control list that exceeds the maximum size. You must remove approximately ...
- The changes to the spool folder will occur immediately and any currently active documents will not print. It is recommended ...
- The changes were applied but may not be available immediately. You may need to refresh the page for the changes to reliably ...
- The changes were applied but may not be available immediately: {0}. You may need to refresh the page for the changes to reliably ...
- The ChangeSecurityPermissions method changes the security permissions for the logical file specified in the object path. ...
- The ChangeSecurityPermissionsEx method changes the security permissions for the logical file specified in the object path. ...
- The ChangeStartMode method modifies the StartMode of a service. It returns one of the following integer values: 0 - The request ...
- The character length ({1}) of the argument is too short. Specify an argument with a length that is greater than or equal ...
- The character length of the {1} argument is too long. Shorten the character length of the argument so it is fewer than or ...
- The characters '%1' either cannot be parsed as a 128 bit fixed point number, or its value is out of range of a 128 bit fixed ...
- The characters '%1' either cannot be parsed as a 64 bit floating point number, or its value is out of range of a 64 bit floating ...
- The characters '%1' either cannot be parsed as a signed 32 bit integer, or its value is out of range of a signed 32 bit integer. ...
- The characters '%1' either cannot be parsed as a signed 64 bit integer, or its value is out of range of a signed 64 bit integer. ...
- The characters '%1' either cannot be parsed as an unsigned 32 bit integer encoded in hexadecimal, or its value is out of ...
- The characters '%1' either cannot be parsed as an unsigned 32 bit integer, or its value is out of range of an unsigned 32 ...
- The characters '%1' either cannot be parsed as an unsigned 64 bit integer, or its value is out of range of an unsigned 64 ...
- The CheckAccess method verifies that the user possesses the specified permissions. The method returns a uint32 which is 0 ...
- The CheckMode property is used to indicate whether the condition is expected to exist or not exist in the environment. When ...
- The checkpoint cannot be enabled, because the content index is not idle. Wait until the index is idle, and then try again. ...
- The checkpoint configuration file '%3' has been restored to a different location than the other checkpoint configuration ...
- The checkpoint configuration file '%3' has been restored to an unsupported location. The location must be in the format \Snapshots\ ...
- The checkpoint configuration of virtual machine '%1' could not be read. The data might be corrupt or not valid. (Virtual ...
- The checkpoint name is out of range for '%1' because new name is not between 1 and 100 characters '%4'. (CheckpointID %2) ...
- The CheckPoint property specifies a value that the service increments periodically to report its progress during a lengthy ...
- The checkpoint record cannot be read, and this action cannot be completed. If the problem persists, restart the service, ...
- The checkpoint record cannot be updated, and this action cannot be completed. The gatherer will attempt to update the checkpoint ...
- The CIM status code that characterizes this instance. This property defines the status codes that MAY be return by a conforming ...
- The CIM_ActionSequence association is used to define a series of operations that either transitions the software element, ...
- The CIM_ActsAsSpare association indicates which elements can spare or replace the other aggregated elements. The fact that ...
- The CIM_AggregatePExtent class provides summary information about the addressable logical blocks which are in the same storage ...
- The CIM_ApplicationSystem class is used to represent an application or a software system that supports a particular business ...
- The CIM_ApplicationSystemSoftwareFeature associations identifies the software features that make up a particular application ...
- The CIM_Card class represents a type of physical container that can be plugged into another card or hosting board, or is ...
- The CIM_CDROMDrive class represents a CD-ROM drive on the system. Note: The name of the drive does not correspond to the ...
- The CIM_Chassis class represents the physical elements that enclose other elements and provide definable functionality, such ...
- The CIM_ClusteringService class represents the functionality provided by a cluster. For example, failover functionality may ...
- The CIM_ComputerSystem object and its derivatives are Top Level Objects of CIM. They provide the scope for numerous components. ...
- The CIM_Container association represents the relationship between a contained and a containing physical element. A containing ...
- The CIM_ControlledBy relationship indicates which devices are commanded by or accessed through the controller logical device. ...
- The CIM_CopyFileAction specifies files that exist on a computer system, and to move or copy those files to a new location. ...
- The CIM_DeviceSoftware relationship identifies any software that is associated with a device - such as drivers, configuration ...
- The CIM_DirectoryAction is an abstract class that is used for directories to be managed. Creation of directories is handled ...
- The CIM_DirectoryContainsFile class represents an association between a directory and files contained within that directory. ...
- The CIM_DirectorySpecification class captures the major directory structure of a software element. This class is used to ...
- The CIM_DirectorySpecificationFile association identifies the directorythat contains the file being specified by referencing ...
- The CIM_DiskDrive class represents a physical disk drive as seen by the operating system. The features of the drive seen ...
- The CIM_ElementConformsToProfile association defines the RegisteredProfiles to which the referenced ManagedElement is conformant. ...
- The CIM_FileAction allows the author to locate files that already exist on the users machine, and move or copy those files ...
- The CIM_FromDirectoryAction association identifies the source directory for the file action. When this association is used, ...
- The CIM_FromDirectorySpecification association identifies the source directory for the file action. When this association ...
- The CIM_FRU class is a vendor-defined collection of products and/or physical elements that is associated with a product for ...
- The CIM_InstalledSoftwareElement association allows one to identify the computer system a particular software element is ...
- The CIM_LogicalDevice dependent reference represents the CIM_LogicalDevice connected to the Universal Serial Bus (USB) controller. ...
- The CIM_LogicalElement class is the base class for all the components of the system that represent abstract system components. ...
- The CIM_LogicalFile class represents a named collection of data (this can be executable code) located in a file system on ...
- The CIM_ManagedSystemElement class is the base class for the system element hierarchy. Membership criteria: Any distinguishable ...
- The CIM_OSVersionCheck class specifies the versions of the OS that can support this software element. This check can be for ...
- The CIM_PhysicalComponent class represents any low-level or basic component within a package. Any physical element that is ...
- The CIM_PhysicalConnector class represents any physical element that is used to connect to other elements. Any object that ...