Windows Server 2008

  1. Information may be archived or stored for the purpose of preserving social history as governed by an existing law or policy. ...
  2. Information may be used by the Web site to complete the activity for which it was provided, whether the activity is a one-time ...
  3. Information may be used for the technical support of the Web site and its computer system. For example, to process computer ...
  4. Information may be used to contact an individual, through a communications channel other than voice telephone, for the promotion ...
  5. Information may be used to tailor or modify the content or design of the Web site during a single visit to the site. For ...
  6. Information that allows an individual to be contacted or located in the physical world, such as a telephone number or a postal ...
  7. Information that allows an individual to be contacted or located on the Internet, such as an e-mail address. Often, this ...
  8. Information that can be linked to an individual may be used for research, analysis, and reporting. For example, data about ...
  9. Information that can be linked to an individual may be used to make a decision that directly affects that individual. For ...
  10. Information that is based upon a unique identifier but that cannot be linked an individual may be used to make a decision ...
  11. Information that is based upon a unique identifier but that cannot be linked to an individual may be used for research, analysis, ...
  12. Information you exchange with this site cannot be viewed or changed by others. However, there is a problem with the site's ...
  13. Information you exchange with this site cannot be viewed or changed by others. However, there is problem with the site's ...
  14. Information, such as global positioning data, that can be used to identify an individual's current physical location and ...
  15. Infrared Camera Service (IrTran-P) received only part of a picture file before the transmission from the camera ended. The ...
  16. Infrared Camera Support (IrTran-P) failed to start listening on the IrCOMM port. This is probably because another application ...
  17. Ini File policy allows an administrator to configure ini file settings in any type of ini file. Ini files are widely used ...
  18. Initial connection to Bluetooth HID device %2 failed. The device has been removed as a personal or paired device. You must ...
  19. Initialization commands may lead to the exposure of sensitive information in the modem log. Consult your modem's instruction ...
  20. Initialization could not complete because the minimum number of connections required to initialize the Ldap connection pool ...
  21. Initialization failed because of a system execution failure on path %1. There is not enough memory to start the process. ...
  22. Initialization failed because the driver device could not be created. Use the string "%2" to identify the interface for which ...
  23. Initialization of the High Precision Event Timer failed due to a BIOS configuration problem. The operating system will use ...
  24. Initialization of the High Precision Event Timer failed due to an interrupt configuration problem. The operating system will ...
  25. Initialization of the High Precision Event Timer failed due to unsupported hardware. The operating system will use another ...
  26. InitializePrintProvider failed for provider %1. This can occur because of system instability or a lack of system resources. ...
  27. InitializeProvider cannot allocate memory for %1. This can occur because of system instability or a lack of system resources. ...
  28. Initializing the offline Windows PE image specified failed with status 2!08x!. Please ensure this is a valid Windows PE image ...
  29. Initiate scan to update quota usage. The syntax for this command is: Dirquota Quota Scan /Path:PATH /Remote:REMOTE /Path:PATH ...
  30. Initiates a new transaction and returns an MSMQ transaction object representing the new underlying transaction object created ...
  31. Initiator CHAP secret given is invalid. Maximum size of CHAP secret is 16 bytes. Minimum size is 12 bytes if IPSec is not ...
  32. Initiator CHAP secret is smaller than the minimum size (12 bytes) required by the spec. Dump data contains the given CHAP ...
  33. Initiator could not find a match for the initiator task tag in the received PDU. Dump data contains the entire iSCSI header. ...
  34. Injury, torture, killing or blood and dismemberment of fantasy characters in any context. That of humans or animals in artistic, ...
  35. Injury, torture, killing or blood and dismemberment of fantasy characters only in artistic, medical, educational, sports ...
  36. Ink is not working on your computer right now. Restart your computer, and then try again. If you still have this problem, ...
  37. InkBall is not working on your computer right now. Restart your computer, and then try again. If the problem persists, contact ...
  38. Inpass, Qmpfs, Soft and Qmsec options are not valid for the Permit or Block type FilterAction. 'action = negotiate' needs ...
  39. Input Panel can automatically convert your characters to text after a pause, even before you move your pen to a different ...
  40. Input Panel includes more features than those described in Tablet PC Pen Training. For example, it includes an on-screen ...
  41. Input Panel offers several ways to change or correct your text. For example, you can scratch out the handwriting that you ...
  42. Insert a blank, formatted disk into the drive you want to use, and then select that drive from the list below. I want to ...
  43. Insert a labeled disk into the DVD drive to continue. Write the following information on the disk, insert the disk, and then ...
  44. Insert a new disc %3 is needed to copy these files. %1 is full. Please insert a new disc to continue copying these files. ...
  45. Insert a USB flash drive, CD, or other removable media that you can take back to the computer with internet access, or choose ...
  46. Insert a USB flash drive, CD, or other removable media that you can take to the computer with the problem, or choose a network ...
  47. Insert or connect the removable media to your new computer. Windows will automatically detect it. When prompted, open the ...
  48. Insert the bottom-near corner of the cartridge first, making sure that the large tab on this corner fits into the slot in ...
  49. Insert the disk with the following label into %2!s! %1!s! You can use a blank disk or current disk in the drive %2!s! if ...
  50. Insert the new media into drive %1. To continue, click C after inserting new media. To exit, click E]. C Continue E Exit ...
  51. Insert the new media into drive %1. To continue, press C after inserting new media. To exit, press E]. C Continue E Exit ...
  52. Insert the password reset disk into the drive you want to use, and then select that drive from the list below. The password ...
  53. Insert the product's first installation floppy disk or CD-ROM, and then click Next. The application will be installed in ...
  54. Insert the USB flash drive into a USB port on the device or the computer. (Computers must be running Windows XP or Windows ...
  55. Insert your storage device (a USB flash drive or a floppy disk for example) into the computer you are using right now. Be ...
  56. Inserts a picture of the clipboard contents into your document. The picture is linked to the source file so that changes ...
  57. Inserts a picture of the file contents into your document. The picture will be linked to the file so that changes to the ...
  58. Inserts a shortcut which points to the location of the clipboard contents. The shortcut is linked to the source file so that ...
  59. Inserts a shortcut which represents the file. The shortcut will be linked to the file so that changes to the file will be ...
  60. Inserts the contents of the clipboard into your document as %s. The data is linked to the source file so that changes to ...
  61. Inserts the contents of the clipboard into your document so that you may activate it using %s. It will be displayed as an ...
  62. Inserts the contents of the file as an object into your document so that you may activate it using the program which created ...
  63. Inserts the contents of the file as an object into your document so that you may activate it using the program which created ...
  64. Inspect the printed high resolution pattern and determine the number of the pattern where the black and red lines appear ...
  65. Inspect the printed high-resolution pattern and determine the number of the pattern where the black and red lines appear ...
  66. Inspect the printed high-resolution pattern and determine the number of the pattern where the upper and lower lines appear ...
  67. Install a clean copy of Windows, select where you want to install it, or make changes to disks and partitions. This option ...
  68. Install a driver Locate and install a driver for a device that is attached to the computer but does not list available backups. ...
  69. Install and configure the roles, or primary functions, you want this server to perform, such as file sharing with the File ...
  70. Install event publishers and logs from manifest. Usage: wevtutil { im | install-manifest } MANIFEST MANIFEST File path to ...
  71. Install important and recommended updates, help make Internet browsing safer, and check online for solutions to problems. ...
  72. Install the certificate in the Local Computer certificate store Select this option if the certificate is intended for the ...
  73. Install the features, or supporting functions, you want this server to perform, such as backing up files with the Windows ...
  74. Install the latest updates for Internet Explorer, and download and run the Microsoft Windows Malicious Software Removal Tool. ...
  75. Install this driver software anyway Only install driver software obtained from your manufacturer's website or disc. Unsigned ...