Windows 10

  1. This application caused a delay in the system shutdown process: File Name : %3 Friendly Name : %5 Version : %7 Total Time ...
  2. This application file refers to components that were originally imported into the application. These components must be manually ...
  3. This application file version is not supported. The catalog into which you are attempting to install this application file ...
  4. This application is configured to work with your organization's cloud based Rights Management Service, but your computer ...
  5. This application is not trusted to consume rights managed content. The application's rights management manifest is missing ...
  6. This application is not trusted to consume rights managed content. The Authenticode signature for the application is not ...
  7. This application took longer than usual to start up, resulting in a performance degradation in the system startup process: ...
  8. This application updated your Taskbar and Start menu items. Not all of the changes will take effect until the next time you ...
  9. This application was set to run forever when the listener was enabled. You may wish to go to the advanced page and modify ...
  10. This association relates a CIM_Configuration object to one or more managed system elements. The CIM_Configuration object ...
  11. This association relates a MSI Check with any locational information it requires. The location is in the form of a file and/or ...
  12. This association relates an MSI action with any locational information it requires. This location is in the form of a file ...
  13. This auditing entry is inherited from the parent object. Make changes here to create a new auditing entry that overrides ...
  14. This AutoComplete feature can remember and suggest User names and passwords on Forms. If you enable this setting, the user ...
  15. This AutoComplete feature suggests possible matches when users are entering Web addresses in the browser address bar. If ...
  16. This AutoComplete feature suggests possible matches when users are filling up forms. If you enable this setting, the user ...
  17. This backup will include only logon credentials that you've asked Windows to remember. It will not include any credentials ...
  18. This Briefcase database is corrupt. The files in the Briefcase are okay, but they are no longer in a sync relationship with ...
  19. This build of Windows has expired, so your PC will restart every few hours, and eventually will fail to start. Go online ...
  20. This business rule application group does not have a script loaded. Please load a script that defines the members of this ...
  21. This CA Root certificate is not trusted. To enable trust, install this certificate in the Trusted Root Certification Authorities ...
  22. This call requires the parameters to specify one extent per disk. A single disk cannot contribute to multiple members or ...
  23. This calling card is missing some required information. To use this card, click Edit to provide more information, or select ...
  24. This can occur if you don't have permission to access the file or folder, or if your computer doesn't meet security policy ...
  25. This Central Access Policy cannot be displayed on this version of Windows. To view this Central Access Policy, go to Security ...
  26. This central access policy could not be found. It may have been deleted from Active Directory or have invalid settings. Restore ...
  27. This certificate already exists in the certificate store you selected. Do you want to overwrite the existing certificate? ...
  28. This certificate cannot be renewed because it does not contain enough information to generate a renewal request. Please request ...
  29. This certificate cannot be used to verify the authenticity of downloaded software because it does not have the appropriate ...
  30. This certificate has been validated on your computer. The remote computer was not used to verify this certificate. To ensure ...
  31. This certificate is not valid because one of the certification authorities in the certification path does not appear to be ...
  32. This certificate trust list cannot be verified. The certificate that countersigned this CTL is not available for verification. ...
  33. This certificate trust list is not valid. The countersignature cannot be verified and the CTL may have been tampered with. ...
  34. This certificate validates to a root certificate that appears to be trusted by the remote computer. To ensure this certificate ...
  35. This change affects the entire domain. After you raise the domain functional level, it is possible that you may not be able ...
  36. This change affects the entire forest. After you raise the forest functional level, it is possible that you may not be able ...
  37. This change might cause any digital media content that is playing or paused to restart. Do you want to continue with the ...
  38. This channel includes content for display by the Channel Screen Saver. Would you like to replace your current screen saver ...
  39. This channel is password-protected. You will not be able to synchronize this channel without a username and password. If ...
  40. This channel requires a user name and password before you can download its content. You should have received this information ...
  41. This checkbox only applies when you are connected to a local network and a dial-up network simultaneously. When checked, ...
  42. This class contains the .INI information that the application needs to set in an .INI file. The .INI file information is ...
  43. This class encapsulates a VM Network Adapter, that corresponds to a port on a virtual switch, on which the traffic is to ...
  44. This class exists for backward compatibility to earlier CIM Schema definitions. With additions to Sensor and NumericSensor ...
  45. This class exists for backward compatibility to earlier CIM Schema definitions. With additions to Sensor and NumericSensor ...
  46. This class exists for backward compatibility to earlier CIM Schema definitions. With additions to Sensor and NumericSensor ...
  47. This class exists for backward compatibility to earlier CIM Schema definitions. With additions to Sensor and NumericSensor ...
  48. This class exposes attribute information associated with a fibre channel adapter. There should be one instance of this class ...
  49. This class exposes attribute information associated with a Fibre Channel port. There should be one instance of this class ...
  50. This class exposes FC3 Management information associated with a fibre channel adapter. There should be one instance of this ...
  51. This class exposes operations associated with FCP on a Fibre Channel adapter. There should be one instance of this class ...
  52. This class exposes operations that can be performed on a Fibre Channel port. There should be one instance of this class for ...
  53. This class exposes port discovery operations that can be by a fibre channel adapter. There should be one instance of this ...
  54. This class exposes port information operations that can be determined from the adapter. There should be one instance of this ...
  55. This class exposes statistical information associated with a Fibre Channel port. There should be one instance of this class ...
  56. This class extends LogicalElement to abstract the concept of an element that is enabled and disabled, such as a LogicalDevice ...
  57. This class represents an association between a managed system element collection and the class representing statistical information ...
  58. This class represents the association between an operating system and the autochk settings that apply to the disks on the ...
  59. This class represents the directory layout for the product. Each instance of the class represents a directory in both the ...
  60. This class represents the settings for the autochk operation for a disk. The setting applies to all disks on the computer ...
  61. This class specifies information needed to check a particular setting file for a specific entry that contains a value that ...
  62. This class specifies the information to be used to modify a particular setting file for a specific entry with a specific ...
  63. This cluster cannot be destroyed. It has non-core application groups which must be deleted before the cluster can be destroyed. ...
  64. This cmdlet supports the common parameters: Verbose, Debug, ErrorAction, ErrorVariable, WarningAction, WarningVariable, OutBuffer, ...
  65. This cmdlet supports the workflow common parameters: PSComputerName, JobName, PSApplicationName, PSCredential, PSPort, PSConfigurationName, ...
  66. This collection includes the Random, Swirl, Warp, Anon, Falloff, Water, Bubble, Dizzy, Windmill, Niagara, Blender, X Marks ...
  67. This color profile is a system default profile. It is also a read-only file. Are you sure you want to remove it from the ...
  68. This column is a list of names of services or load ordering groups that the system must start before this service. Names ...
  69. This column specifies the action taken by the startup program if the service fails to start during startup. One of the following ...
  70. This COM name is being used by another device (such as another com port or modem). Using duplicate names can lead to inaccessible ...
  71. This command activates or deactivates the TPM. This command requires physical presence at the computer and cannot be run ...
  72. This command allows an admin to view or modify the password replication policy for RODCs. /prp ADDITIONAL_ARGS can be either ...
  73. This command allows an entity with knowledge of the migration authorization ticket (as generated by TPM_CMK_CreateTicket) ...
  74. This command allows an entity with knowledge of the migration authorization ticket of a key (as created with TPM_CMK_CreateTicket) ...
  75. This command allows an owner of a loaded key to obtain the public key value of that key. The loaded key is created using ...