Windows 10

  1. CIM_PhysicalMemory is a subclass of CIM_Chip, representing low level memory devices - SIMMS, DIMMs, raw memory chips, etc. ...
  2. CIM_Product is a concrete class that is a collection of physical elements, software features and/or other products, acquired ...
  3. CIM_ProductFRU is an association between product and FRU that provides information regarding what product components have ...
  4. CIM_ProductProductDependency is an association between two products, indicating that one must be installed, or must be absent, ...
  5. CIM_ProductSupport is an association between product and support Access that conveys how support is obtained for the product. ...
  6. CIM_ProtectedSpaceExtent define addressable logical block addresses, treated as a single storage extent, located on a single ...
  7. CIM_Realizes is the association that defines the mapping between a logical device and the physical component that implements ...
  8. CIM_RelatedStatistics is an association that defines hierarchies and/or dependencies of related CIM_StatisticalInformation ...
  9. CIM_RunningOS indicates the currently executing operating system. At most one operating system can execute at any time on ...
  10. CIM_SAPSAPDependency is an association between a service access point and another service access point indicating that the ...
  11. CIM_SCSIInterface is a CIM_ControlledBy relationship indicating which devices are accessed through a SCSI controller and ...
  12. CIM_SerialInterface is a CIM_ControlledBy relationship indicating which devices are accessed through the serial controller ...
  13. CIM_ServiceAccessBySAP is an association that identifies the access points for a service. For example, a printer may be accessed ...
  14. CIM_ServiceAccessPoint represents the ability to utilize or invoke a service. Access points represent that a service is made ...
  15. CIM_ServiceSAPDependency is an association between a service and a service access point indicating that the referenced SAP ...
  16. CIM_ServiceServiceDependency is an association between a service and another service, indicating that the latter is required ...
  17. CIM_SettingData is used to represent configuration and and operational parameters for CIM_ManagedElement instances. There ...
  18. CIM_StatisticalInformation is a root class for any arbitrary collection of statistical data and/or metrics applicable to ...
  19. CIM_StorageError defines blocks of media or memory space that are mapped 'out of use' due to errors. The Key of the class ...
  20. CIM_StorageError references the Error object, defining the starting and ending addresses that are 'mapped out' of the storage ...
  21. CIM_System represents an entity made up of component parts (defined by the SystemComponent relationship), that operates as ...
  22. CIM_SystemComponent is a specialization of the CIM_Component association that establishes 'part of' relationships between ...
  23. CIM_VideoBIOSElement represents the low-level software that is loaded into non-volatile storage and used to bring up, configure ...
  24. CIM_VideoBIOSFeature represents the capabilities of the low-level software that is used to bring up, configure and use a ...
  25. CIM_VideoControllerResolution describes the various video modes that a video controller can support. Video modes are defined ...
  26. CIM_VolumeSet represents a contiguous range of logical blocks presented to the operating environment for reading and writing ...
  27. Cisco/Aironet WinDGS or ACU program versions earlier than 4.14.002 have a known compatibility issue with this version of ...
  28. Claims assigned to a new logon. New Logon: Security ID: %1 Account Name: %2 Account Domain: %3 Logon ID: %4 Logon GUID: %5 ...
  29. Clarify 9.0 requires the latest Visual Basic 5.0 run-time files (Msvbvm50.exe) in order to run properly. For more information, ...
  30. Class %1 in file %2 does not derive from a Windows base class. All composable classes must ultimately derive from a type ...
  31. Class %1 in file %2 implements interface %3, which has an ExclusiveToAttribute that references class %4. Windows Runtime ...
  32. Class Name = %1 Method Name = %2 Workflow GUID = %3 Message = %4 %5 Activity Name = %6 Activity GUID = %7 Parameters = %8 ...
  33. Class not registered' error received while trying to instantiate the replication provider for virtual machine '%1apos. Review ...
  34. Classic, Analytic and Debug event logs are easier to navigate and manipulate when converted to the new event log format. ...
  35. Classification is not supported on the specified reparse point. File Server Resource Manager does not recognize the reparse ...
  36. Classification properties will not be stored because a failure occurred while loading or classifying the file properties. ...
  37. Clear events from an event log and, optionally, back up cleared events. Usage: wevtutil { cl | clear-log } /OPTION:VALUE ...
  38. Clear history of recently opened documents on exit. If you enable this setting, the system deletes shortcuts to recently ...
  39. Clear the check boxes of any virtual hard disks (VHDs) that you do not want to replicate (for example, a VHD used for a dedicated ...
  40. Clear the specific DNS domain in which all KMS SRV records can be found. The specific KMS host will be used if set via /skms. ...
  41. Clear the TPM Clearing the TPM resets it to factory defaults. You will lose all created keys and data protected by those ...
  42. Clearing the policy returns all AppLocker settings to not configured and deletes all existing rules. Do you want to continue? ...
  43. Clearing the policy returns all Windows Firewall with Advanced Security settings to not configured and deletes all connection ...
  44. Clearing this check box allows you to select display modes that this monitor cannot display correctly. This may lead to an ...
  45. Clears the specified event log, and optionally saves the current copy of the logfile to a backup file. The method returns ...
  46. ClearType is a software technology developed by Microsoft that improves the readability of text on existing LCDs (Liquid ...
  47. Click a contact from the list below to connect securely without using a password. Click Help someone new to connect to someone ...
  48. Click Add to choose the application file(s) to install. All component files for a given application must be in the same directory ...
  49. Click Add to choose the file(s) to install. All component files for a given partition must be in the same directory as the ...
  50. Click Add to connect to a target portal identified by its IP address or DNS name. The initiator will connect to the portal, ...
  51. Click Advanced to customize verification options. Click Start to check for any system files that are not digitally signed. ...
  52. Click an item from the library to add it to the playlist. Click View library by if you want to change how items are sorted ...
  53. Click Browse to select a file that is signed by a publisher, and then use the slider bar to adjust the scope of the rule. ...
  54. Click Browse to select the file you want to hash. The file's attributes, such as its size and the date and time it was created, ...
  55. Click Cancel, check your internet connection, and then restart Order Prints to try to place your order again. If you continue ...
  56. Click Change to view available Central Access Policies that can be applied to this object, or view details of the applied ...
  57. Click Configure Security Settings to set access permissions. If you do not change the security settings, the default settings ...
  58. Click Event Processing Complete - Error Code: %1, Impression GUID: %2, Target ID: %3, Input Method: %4, First Item ID: %5, ...
  59. Click Fail Over to start the planned failover process for '{0}'. Any changes on the primary virtual machine that have not ...
  60. Click Fail Over to start the planned failover process for '{0}'. Any changes on the primary virtual machine that have not ...
  61. Click Fail Over to start the planned failover process for {0}. Any changes on the primary virtual machine that have not already ...
  62. Click Fail Over to start the planned failover process for {0}. Any changes on the primary virtual machine that have not already ...
  63. Click Finish after selecting the drivers to verify. The current settings will be saved and this program will exit. Click ...
  64. Click Finish to close this wizard, and a control panel will open so you can select the Bluetooth devices you want to add ...
  65. Click Finish to verify all the drivers installed on this computer. The current settings will be saved and this program will ...
  66. Click Finish to verify this list of drivers. The current settings will be saved and this program will exit. Click Back to ...
  67. Click here and then select a color from the color palette. This color is used with the pencil and with brushes, as well as ...
  68. Click Next after you have selected the settings you want to create. You will then be asked to select the drivers to verify. ...
  69. Click Next to create custom settings. You will then be asked to select the custom settings and list of drivers to verify. ...
  70. Click Next to display counters specific to each of the currently verified drivers. Click Back to redisplay the current verifier ...
  71. Click Next to manually select the drivers to verify from a list of all the drivers installed on this computer. Click Back ...
  72. Click Next to manually select verifier settings from a full list. You will then be asked to select the drivers to verify. ...
  73. Click Next to use the current Randomized low resources simulation settings. You will then be asked to select the drivers ...
  74. Click Next to use the options already selected for this template, or click Details to customize the certificate request, ...
  75. Click Next to verify all the drivers installed on this computer that are built for older versions of Windows. A list of these ...