Windows 10

  1. Check your Internet connection and try again. To avoid this problem in the future, you can make the file available offline. ...
  2. Check your Internet connection and try again. To avoid this problem in the future, you can make the files available offline. ...
  3. Check your proxy settings . Go to Tools > Internet Options > Connections. If you are on a LAN, click ldquo;LAN settings . ...
  4. Check your wireless network settings Make sure your computer is in range of "%ws" and that the network settings match the ...
  5. Check your wireless security type View your wireless security settings to verify that the correct security type is selected. ...
  6. Checkpoint '%3' of virtual machine '%1' is not a recovery checkpoint. Cannot export it for backup. (Virtual machine ID %2) ...
  7. Checkpoint creation failed for '%1' because an invalid backup type for the app consistent checkpoint has been specified. ...
  8. Checks if the TS is allowed to request CALs from license server based on the the license server security group policy on ...
  9. Checks whether each DSA is advertising itself, and whether it is advertising itself as having the capabilities of a DSA. ...
  10. Chkdsk cannot dismount the volume because it is a system drive or there is an active paging file on it. Would you like to ...
  11. Chkdsk cannot run because the volume is in use by another process. Chkdsk may run if this volume is dismounted first. ALL ...
  12. Chkdsk cannot run because the volume is in use by another process. Would you like to schedule this volume to be checked the ...
  13. Chkdsk is copying last valid VAT at block %1 to the end of the volume. This will revert the volume to its state at %2:%3 ...
  14. Chkdsk is running on media that does not support writes in place. On such media chkdsk operation is limited to verifying ...
  15. Chkdsk scan speed is being throttled to reduce impact on system and application performance. Given the number of files and ...
  16. Chkdsk was executed in read-only mode. A volume snapshot was not used. Extra errors and warnings may be reported as the volume ...
  17. Chobit 3D has a known compatibility issue with this version of Windows. For an update that is compatible with this version ...
  18. Choose a different and valid certificate for authentication with this network.%rIf this is not helpful, contact your network ...
  19. Choose a different location or free up %1 of space on this drive. Work Folders can't use the last few gigabytes of free space ...
  20. Choose a location other than the failing disk so that you can access the instructions later. For example, save to a CD, USB ...
  21. Choose a location that's on a fixed or removable drive, such as a hard drive or microSD card. You can't choose a network ...
  22. Choose a name and location for this virtual machine. The name is displayed in Hyper-V Manager. We recommend that you use ...
  23. Choose a new password for this user account. This password will replace the old one; everything else about the user account ...
  24. Choose a password that will be easy for you to remember but hard for others to guess. If you forget, we'll show the hint. ...
  25. Choose drive encryption method and cipher strength (Windows Vista, Windows Server 2008, Windows 7, Windows Server 2008 R2) ...
  26. Choose the action to display or apply by default when potential threats with the following alert levels are detected. What ...
  27. Choose the days and times that the device won't typically be used so updates can be downloaded and installed without interrupting ...
  28. Choose the power settings that you want for your computer. The changes you make to the settings on this page apply to all ...
  29. Choose the settings for the scan ticket. A scan ticket includes the description and processing information of a scan job. ...
  30. Choose the size of your desktop for interacting with the virtual machine. Drag the slider all the way to the right to use ...
  31. Choose this option if you have restored a copy of this virtual machine on the Replica server. The restored virtual machine ...
  32. Choose this option if you have restored a copy of this virtual machine on the Replica server. The restored virtual machine ...
  33. Choose what is streamed by default to all computers and devices on your network. These settings can be modified for each ...
  34. Choose when to restrict background data to help reduce your data usage. When it's used, this limits the things apps and features ...
  35. Choose which apps can receive info, send notifications, and stay up-to-date, even when you're not using them. Turning background ...
  36. Choose which apps can sync with wireless devices that don't explicitly pair with your PC, tablet, or phone. Data can be shared ...
  37. Choose which programs you want Windows to use for activities like web browsing, editing photos, sending e-mail, and playing ...
  38. Choose your printer from the list. Click Windows Update to see more models. To install the driver from an installation CD, ...
  39. CIM cmdlets do not support the {0} parameter together with the AsJob parameter. Remove one of these parameters and retry. ...
  40. CIM query for enumerating instances of the {0} class on the {1} CIM server, that are associated with the following instance: ...
  41. CimSessionOptions instance is invalid: unsupported protocol or unrecognized custom option. Verify parameter passed to the ...
  42. CIM_Account is the information held by a SecurityService to track identity and privileges managed by that service. Common ...
  43. CIM_AdjacentSlots describes the layout of slots on a hosting board or adapter card. Information like the distance between ...
  44. CIM_AggregatePExtent is realized on a physical media. This relationship is made explicit by the CIM_RealizesAggregatePExtent ...
  45. CIM_AggregatePSExtent defines the number of addressable logical blocks on a single storage device, excluding any logical ...
  46. CIM_BasedOn is an association describing how storage extents can be assembled from lower level extents. For example, protected ...
  47. CIM_BIOSElement represents the low-level software that is loaded into non-volatile storage and used to bring up and configure ...
  48. CIM_BIOSFeature represents the capabilities of the low-level software that is used to bring up and configure a computer system. ...
  49. CIM_BootService represents the functionality provided by a device, software or via a network to load an operating system ...
  50. CIM_CollectedCollections is an aggregation association representing that a CollectionOfMSEs may itself be contained in a ...
  51. CIM_CompatibleProduct is an association between products that can indicate a wide variety of information. For example, it ...
  52. CIM_Component is a generic association used to establish 'part of' relationships between Managed System Elements. For example, ...
  53. CIM_Component is a generic association used to establish \'part of\' relationships between Managed Elements. For example, ...
  54. CIM_DataFile is a type of logical file that is a named collection of data or executable code. The behavior of the provider ...
  55. CIM_DeviceErrorCounts is a statistical class containing error-related counters for a logical device. The types of errors ...
  56. CIM_DiskSpaceCheck checks the amount of disk space the needs to be available on the system. The amount is specified in the ...
  57. CIM_ElementCapacity associates a CIM_PhysicalCapacity object with one or more physical elements. It serves to associate a ...
  58. CIM_Error is a specialized class that contains information about the severity, cause, recommended actions and other data ...
  59. CIM_HostedAccessPoint is an association between a serviceaccess point and the system on which it is provided. The cardinality ...
  60. CIM_HostedBootSAP defines the hosting unitary computer system for a CIM_BootSAP. Since this relationship is subclassed from ...
  61. CIM_HostedBootService defines the hosting system for a boot service. Since this relationship is subclassed from CIM_HostedService, ...
  62. CIM_HostedService is an association between a service and the system on which the functionality resides. The cardinality ...
  63. CIM_Job is a logical element representing a unit of work for a system, such as a print job. A job is distinct from a process ...
  64. CIM_JobDestination is a logical element representing where a job is submitted for processing. It can refer to a queue that ...
  65. CIM_LogicalElement is a base class for all the components of a System that represent abstract system components, such as ...
  66. CIM_LogicalIdentity is an abstract and generic association, indicating that two LogicalElements represent different aspects ...
  67. CIM_ManagedSystemElement is the base class for the System Element hierarchy. Any distinguishable component of a System is ...
  68. CIM_MemoryCapacity describes the type of memory that can be installed on a physical element and its minimum/maximum configurations. ...
  69. CIM_MemoryCheck specifies a condition for the minimum amount of memory that needs to be available on a system. The amount ...
  70. CIM_MemoryWithMedia indicates that memory is associated with a physical media and its cartridge. The memory provides media ...
  71. CIM_MonitorResolution describes the relationship between horizontal and vertical resolutions, refresh rate and scan mode ...
  72. CIM_PhysicalCapacity describes the minimum and maximum requirements and ability to support different types of hardware for ...
  73. CIM_PhysicalCapacity is an abstract class describing a physical element's minimum/maximum requirements and ability to support ...
  74. CIM_PhysicalElementLocation associates a physical element with a CIM_Location object for inventory or replacement purposes. ...
  75. CIM_PhysicalFrame is a superclass of rack, chassis and other frame enclosures, as they are defined in extension classes. ...