Windows 7

  1. Returns or sets the Ink object that is associated with an InkCollector object, an InkOverlay object, or a InkPicture control.This ...
  2. Returns or sets the length of time, in milliseconds, between the last ink stroke collected and the beginning of text recognition.This ...
  3. Returns the collection of strokes that are currently selected inside the control.This property returns the collection of ...
  4. Returns the computer name of the Intersite Topology Generator (ISTG) server for a specified site. SYNTAX /istg DSA_LIST /verbose ...
  5. Returns the cursor to the start of the collection of queues returned by MSMQQuery.LookupQueue and returns the element at ...
  6. Returns the globally unique identifier (GUID) for a specified computer, which can be used to create a private format name ...
  7. Returns the ITransaction interface on the underlying transaction object that is used by the MSMQTransaction object as a Variant ...
  8. Returns the original destination queue of the message, which is typically used when reading response messages, or messages ...
  9. REVERT Reverts the volume to a specified shadow copy of it. The shadow copy must be a persistent shadow copy. The operation ...
  10. Reverting this shadow copy will cause you to permanently lose all changes made to volume %s since the shadow copy was created. ...
  11. Reverting to the parent configuration will result in the loss of all settings in the local configuration file for this feature. ...
  12. Reverts the original storage volume to this shadow copy. After Revert is done, the original volume will be identical to this ...
  13. Review actions taken on potentially unwanted software. To review or monitor software that you've permitted to run on your ...
  14. Review the Action column for each replicated folder. If a shared folder is needed, click Edit to specify the new shared folder ...
  15. Review the alert details to see why the software was detected. If you do not like how the software operates or if you do ...
  16. Review the component and subcomponent definitions. Also, verify list of volumes to be shadow copied and the existing writers ...
  17. Review the settings that you have chosen. You can go back to change these settings or click Finish to complete this wizard. ...
  18. Revocation information is signed before it is sent to a client. The Online Responder can select a signing certificate automatically, ...
  19. Revocation status for a certificate in the chain for CA certificate %3 for %1 could not be verified because a server is currently ...
  20. Revokes the TS CAL represented by the Win32_TSIssuedLicense object. NOT a static functionRevokableCals returns number of ...
  21. Right-click the People Near Me icon in the notification area of your taskbar, and then click Exit. To continue using People ...
  22. Rights policy templates can support clients with different languages. Configure this template's identification information ...
  23. RIP Global Configuration Information - Logging Level : %1!s! Max Receive Queue Size : %2!d! Max Send Queue Size : %3!d! Min ...
  24. RIP Interface Configuration Information for %1!s! - State : %2!s! %3!s! Metric : %4!d! Update Mode : %5!s! Accept Mode : ...
  25. Roaming user profiles across forests are disabled. Windows did not load your roaming profile and is logging you on with a ...
  26. RODC SpecifiC Local Group Member Added: Member Name: %1 Member ID: %2 Target Account Name: %3 Target Domain: %4 Target Account ...
  27. RODC Specific Local Group Member Removed: Member Name: %1 Member ID: %2 Target Account Name: %3 Target Domain: %4 Target ...
  28. Rogue detection has been disabled for this server. The Windows Deployment Services server is authorized as a valid DHCP/PXE ...
  29. RoleOfNode indicates whether the Cluster nodes are peers (value = 2), connected in a master-slave/primary-secondary relationship ...
  30. RoleOfNode indicates whether the cluster nodes are peers (value = 3), connected in a master-slave/primary-secondary relationship ...
  31. Roles or features are currently being added or removed on this computer. Only one user can add or remove roles or features ...
  32. Rollback has completed successfully. %s has been successfully removed from this system and previous versions of files have ...
  33. rollback is complete. For your changes to take effect, you must restart Windows. Save your work and exit all programs, and ...
  34. Rollback needs to purge your dllcache directory in order to ensure that your system remains in a consistent state. This can ...
  35. Rollercoaster Tycoon - Corkscrew Follies is incompatible with this version of Windows. For more information, contact Hasbro ...
  36. Rollercoaster Tycoon - Loopy Landscapes has a known compatibility issue with this version of Windows. For an update that ...
  37. Rolling back to older driver software may reduce the functionality or security of your device. If this doesn't resolve the ...
  38. Root domain check did not pass because error %1 occurred in function %2.%r%3%rMake sure that the domain that this computer ...
  39. Root hints resolve queries for zones that do not exist on the local DNS server. They are only used if forwarders are not ...
  40. Root target can be added only to existing namespaces. To create a new namespace use the command "dfsutil root adddom/addstd". ...
  41. Rotates, in 90 degree increments, and Flips, horizontally or vertically. RotationAngle - Set the RotationAngle property to ...
  42. Route Through (RT) Route Through (RT) record. Provides an intermediate-route-through binding for internal hosts that do not ...
  43. Router Advertisement settings have been changed on the network adapter %1. The current M - Managed Address Configuration ...
  44. Router Discovery Information for %6!s! - Router Discovery is: %1!s! Minimum Advertisement Interval: %3!-3d! minutes Maximum ...
  45. Router received a general query from RAS Client(%1) on interface with IP address %2. RAS clients are not supposed to send ...
  46. Routes from sources at lower ranks are preferred over routes from sources at higher ranks. To change the rank of a selected ...
  47. Routing and Remote Access assigns addresses automatically and forwards name resolution requests to a DNS server on the Internet. ...
  48. Routing and Remote Access cannot be installed because of the following error. Please see event log for more information: ...
  49. Routing and Remote Access cannot verify that the currently configured Remote Access Policy on this server matches the default ...
  50. Routing and Remote Access cannot verify that the default Remote Access Policy matches the settings for the server. The following ...
  51. Routing and Remote Access could not repair the authentication and accounting providers settings. To repair the settings, ...
  52. Routing and Remote Access has created a default connection request policy called Microsoft Routing and Remote Access Service ...
  53. Routing and Remote Access provides integrated multiprotocol routing, remote access, and virtual private network (VPN) capabilities. ...
  54. Routing and Remote Access Services provides remote users access to resources on your private network over virtual private ...
  55. Routing and Remote Access will not work properly until you set up a demand-dial interface, so the Routing and Remote Access ...
  56. Routing and Remote Access will provide an address to any computer on your network which requests one. These addresses will ...
  57. Routing assistants are users who have access to the fax server inbox and are responsible for directing faxes to the intended ...
  58. RPC detected an integrity violation while decrypting an incoming message. Peer Name: %1 Protocol Sequence: %2 Security Error: ...
  59. RPC detected an integrity violation while decrypting an incoming message. Peer Name: %1 Protocol Sequence: %2 Security Error: ...
  60. RPC Events This policy setting allows you to audit inbound remote procedure call (RPC) connections. If you configure this ...
  61. RPC Extended Error Info not available. Use group policy on the local machine at "Computer Configuration/Administrative Templates/System/Remote ...
  62. RPC Proxy load balancing module (PID: %1) cannot process configuration entry for resource UUID %2: ServerFarm is %3. User ...
  63. RPC Proxy load balancing module (PID: %1) cannot process registry key %2 as a valid UUID. User Action Verify that the registry ...
  64. RPC Proxy load balancing module (PID: %1) does not recognize configuration type for key %2. User Action Verify that the registry ...
  65. rpcinfo -T tcp|udp host program version rpcinfo -T tcp|udp -p host rpcinfo -T tcp|udp -b program version rpcinfo -T tcp|udp ...
  66. RR Signature (RRSIG) Cryptographic signature (RRSIG) record. Authenticates a resource record set of a particular type, class, ...
  67. RSASHA1 key size can start from 512 bits with 64 bit increment up to 4096 bits. The public exponent cannot be more than 4096 ...
  68. RSS Indirection Table Change Calls/sec is the average rate, in incidents per second, at which stack submitted a request to ...
  69. Rule evaluation or execution failed for the transactional trigger %3 with the ID %4. A rule condition or action parameter ...
  70. Rules in the Domain Profile apply when connected to the domain of which the computer is a member. Rules in the Standard Profile ...
  71. Run a file management task. The syntax for this command is: Storrept FileMgmt Run /Task:TASK /Nowait /Task:TASK Run the file ...
  72. Run a file management task. The syntax for this command is: Storrept FileMgmt Run This command will execute a particular ...
  73. Run as administrator This option allows you to run this shortcut as an administrator, while protecting your computer from ...
  74. Run automatic classification. The syntax for this command is: Storrept Classification Run This command will execute all the ...
  75. Run inf install (with inf dependency). In the example, prnbr002.inf depends on ntprint.inf rundll32 printui.dll, PrintUIEntry ...