Windows 10
- This application caused a delay in the system shutdown process: File Name : %3 Friendly Name : %5 Version : %7 Total Time ...
- This application file refers to components that were originally imported into the application. These components must be manually ...
- This application file version is not supported. The catalog into which you are attempting to install this application file ...
- This application is configured to work with your organization's cloud based Rights Management Service, but your computer ...
- This application is not trusted to consume rights managed content. The application's rights management manifest is missing ...
- This application is not trusted to consume rights managed content. The Authenticode signature for the application is not ...
- This application took longer than usual to start up, resulting in a performance degradation in the system startup process: ...
- This application updated your Taskbar and Start menu items. Not all of the changes will take effect until the next time you ...
- This application was set to run forever when the listener was enabled. You may wish to go to the advanced page and modify ...
- This association relates a CIM_Configuration object to one or more managed system elements. The CIM_Configuration object ...
- This association relates a MSI Check with any locational information it requires. The location is in the form of a file and/or ...
- This association relates an MSI action with any locational information it requires. This location is in the form of a file ...
- This auditing entry is inherited from the parent object. Make changes here to create a new auditing entry that overrides ...
- This AutoComplete feature can remember and suggest User names and passwords on Forms. If you enable this setting, the user ...
- This AutoComplete feature suggests possible matches when users are entering Web addresses in the browser address bar. If ...
- This AutoComplete feature suggests possible matches when users are filling up forms. If you enable this setting, the user ...
- This backup will include only logon credentials that you've asked Windows to remember. It will not include any credentials ...
- This Briefcase database is corrupt. The files in the Briefcase are okay, but they are no longer in a sync relationship with ...
- This build of Windows has expired, so your PC will restart every few hours, and eventually will fail to start. Go online ...
- This business rule application group does not have a script loaded. Please load a script that defines the members of this ...
- This CA Root certificate is not trusted. To enable trust, install this certificate in the Trusted Root Certification Authorities ...
- This call requires the parameters to specify one extent per disk. A single disk cannot contribute to multiple members or ...
- This calling card is missing some required information. To use this card, click Edit to provide more information, or select ...
- This can occur if you don't have permission to access the file or folder, or if your computer doesn't meet security policy ...
- This Central Access Policy cannot be displayed on this version of Windows. To view this Central Access Policy, go to Security ...
- This central access policy could not be found. It may have been deleted from Active Directory or have invalid settings. Restore ...
- This certificate already exists in the certificate store you selected. Do you want to overwrite the existing certificate? ...
- This certificate cannot be renewed because it does not contain enough information to generate a renewal request. Please request ...
- This certificate cannot be used to verify the authenticity of downloaded software because it does not have the appropriate ...
- This certificate has been validated on your computer. The remote computer was not used to verify this certificate. To ensure ...
- This certificate is not valid because one of the certification authorities in the certification path does not appear to be ...
- This certificate trust list cannot be verified. The certificate that countersigned this CTL is not available for verification. ...
- This certificate trust list is not valid. The countersignature cannot be verified and the CTL may have been tampered with. ...
- This certificate validates to a root certificate that appears to be trusted by the remote computer. To ensure this certificate ...
- This change affects the entire domain. After you raise the domain functional level, it is possible that you may not be able ...
- This change affects the entire forest. After you raise the forest functional level, it is possible that you may not be able ...
- This change might cause any digital media content that is playing or paused to restart. Do you want to continue with the ...
- This channel includes content for display by the Channel Screen Saver. Would you like to replace your current screen saver ...
- This channel is password-protected. You will not be able to synchronize this channel without a username and password. If ...
- This channel requires a user name and password before you can download its content. You should have received this information ...
- This checkbox only applies when you are connected to a local network and a dial-up network simultaneously. When checked, ...
- This class contains the .INI information that the application needs to set in an .INI file. The .INI file information is ...
- This class encapsulates a VM Network Adapter, that corresponds to a port on a virtual switch, on which the traffic is to ...
- This class exists for backward compatibility to earlier CIM Schema definitions. With additions to Sensor and NumericSensor ...
- This class exists for backward compatibility to earlier CIM Schema definitions. With additions to Sensor and NumericSensor ...
- This class exists for backward compatibility to earlier CIM Schema definitions. With additions to Sensor and NumericSensor ...
- This class exists for backward compatibility to earlier CIM Schema definitions. With additions to Sensor and NumericSensor ...
- This class exposes attribute information associated with a fibre channel adapter. There should be one instance of this class ...
- This class exposes attribute information associated with a Fibre Channel port. There should be one instance of this class ...
- This class exposes FC3 Management information associated with a fibre channel adapter. There should be one instance of this ...
- This class exposes operations associated with FCP on a Fibre Channel adapter. There should be one instance of this class ...
- This class exposes operations that can be performed on a Fibre Channel port. There should be one instance of this class for ...
- This class exposes port discovery operations that can be by a fibre channel adapter. There should be one instance of this ...
- This class exposes port information operations that can be determined from the adapter. There should be one instance of this ...
- This class exposes statistical information associated with a Fibre Channel port. There should be one instance of this class ...
- This class extends LogicalElement to abstract the concept of an element that is enabled and disabled, such as a LogicalDevice ...
- This class represents an association between a managed system element collection and the class representing statistical information ...
- This class represents the association between an operating system and the autochk settings that apply to the disks on the ...
- This class represents the directory layout for the product. Each instance of the class represents a directory in both the ...
- This class represents the settings for the autochk operation for a disk. The setting applies to all disks on the computer ...
- This class specifies information needed to check a particular setting file for a specific entry that contains a value that ...
- This class specifies the information to be used to modify a particular setting file for a specific entry with a specific ...
- This cluster cannot be destroyed. It has non-core application groups which must be deleted before the cluster can be destroyed. ...
- This cmdlet supports the common parameters: Verbose, Debug, ErrorAction, ErrorVariable, WarningAction, WarningVariable, OutBuffer, ...
- This cmdlet supports the workflow common parameters: PSComputerName, JobName, PSApplicationName, PSCredential, PSPort, PSConfigurationName, ...
- This collection includes the Random, Swirl, Warp, Anon, Falloff, Water, Bubble, Dizzy, Windmill, Niagara, Blender, X Marks ...
- This color profile is a system default profile. It is also a read-only file. Are you sure you want to remove it from the ...
- This column is a list of names of services or load ordering groups that the system must start before this service. Names ...
- This column specifies the action taken by the startup program if the service fails to start during startup. One of the following ...
- This COM name is being used by another device (such as another com port or modem). Using duplicate names can lead to inaccessible ...
- This command activates or deactivates the TPM. This command requires physical presence at the computer and cannot be run ...
- This command allows an admin to view or modify the password replication policy for RODCs. /prp ADDITIONAL_ARGS can be either ...
- This command allows an entity with knowledge of the migration authorization ticket (as generated by TPM_CMK_CreateTicket) ...
- This command allows an entity with knowledge of the migration authorization ticket of a key (as created with TPM_CMK_CreateTicket) ...
- This command allows an owner of a loaded key to obtain the public key value of that key. The loaded key is created using ...