B
KB
MB
GB
TB
PB
%1$s%2$s
<untitled>
\u2026
\u2025
(No phone number)
(Unknown)
Voicemail
MSISDN1
Connection problem or invalid MMI code.
Operation is restricted to fixed dialing numbers only.
Service was enabled.
Service was enabled for:
Service has been disabled.
Registration was successful.
Erasure was successful.
Incorrect password.
MMI complete.
The old PIN you typed is not correct.
The PUK you typed is not correct.
The PINs you entered do not match.
Type a PIN that is 4 to 8 numbers.
Type a PUK that is 8 numbers or longer.
Your SIM card is PUK-locked. Type the PUK code to unlock it.
Type PUK2 to unblock SIM card.
Incoming Caller ID
Outgoing Caller ID
Call forwarding
Call waiting
Call barring
Password change
PIN change
Calling number present
Calling number restricted
Three way calling
Rejection of undesired annoying calls
Calling number delivery
Do not disturb
Caller ID defaults to restricted. Next call: Restricted
Caller ID defaults to restricted. Next call: Not restricted
Caller ID defaults to not restricted. Next call: Restricted
Caller ID defaults to not restricted. Next call: Not restricted
Service not provisioned.
The caller ID setting cannot be changed.
Restricted access changed
Data service is blocked.
Emergency service is blocked.
Voice service is blocked.
All Voice services are blocked.
SMS service is blocked.
Voice/Data services are blocked.
Voice/SMS services are blocked.
All Voice/Data/SMS services are blocked.
Voice
Data
FAX
SMS
Async
Sync
Packet
PAD
Roaming Indicator On
Roaming Indicator Off
Roaming Indicator Flashing
Out of Neighborhood
Out of Building
Roaming - Preferred System
Roaming - Available System
Roaming - Alliance Partner
Roaming - Premium Partner
Roaming - Full Service Functionality
Roaming - Partial Service Functionality
Roaming Banner On
Roaming Banner Off
Searching for Service
{0}: Not forwarded
{0}: {1}
{0}: {1} after {2} seconds
{0}: Not forwarded
{0}: Not forwarded
Feature code complete.
Connection problem or invalid feature code.
OK
A network error occurred.
The URL could not be found.
The site authentication scheme is not supported.
Authentication was unsuccessful.
Authentication via the proxy server was unsuccessful.
The connection to the server was unsuccessful.
The server couldn\'t communicate. Try again later.
The connection to the server timed out.
The page contains too many server redirects.
The protocol is not supported.
A secure connection could not be established.
The page could not be opened because the URL is invalid.
The file could not be accessed.
The requested file was not found.
Too many requests are being processed. Try again later.
Sign-in error for %1$s
Sync
Sync
Too many %s deletes.
Tablet storage is full! Delete some files to free space.
Phone storage is full! Delete some files to free space.
Me
Tablet options
Phone options
Silent mode
Turn on wireless
Turn off wireless
Screen lock
Power off
Ringer off
Ringer vibrate
Ringer on
Shutting down\u2026
Your tablet will shut down.
Your phone will shut down.
Would you like to shut down?
Recent
No recent applications.
Tablet options
Phone options
Screen lock
Power off
Silent mode
Sound is OFF
Sound is ON
Airplane mode
Airplane mode is ON
Airplane mode is OFF
999+
Safe mode
Android System
Services that cost you money
Allow applications to do things
that can cost you money.
Your messages
Read and write your SMS,
e-mail, and other messages.
Your personal information
Direct access to your contacts
and calendar stored on the tablet.
Direct access to your contacts
and calendar stored on the phone.
Your location
Monitor your physical location
Network communication
Allow applications to access
various network features.
Your accounts
Access the available accounts.
Hardware controls
Direct access to hardware on
the handset.
Phone calls
Monitor, record, and process
phone calls.
System tools
Lower-level access and control
of the system.
Development tools
Features only needed for
application developers.
Storage
Access the USB storage.
Access the SD card.
disable or modify status bar
Allows application to disable
the status bar or add and remove system icons.
status bar
Allows the application to be the status bar.
expand/collapse status bar
Allows application to
expand or collapse the status bar.
intercept outgoing calls
Allows application to
process outgoing calls and change the number to be dialed. Malicious
applications may monitor, redirect, or prevent outgoing calls.
receive SMS
Allows application to receive
and process SMS messages. Malicious applications may monitor
your messages or delete them without showing them to you.
receive MMS
Allows application to receive
and process MMS messages. Malicious applications may monitor
your messages or delete them without showing them to you.
receive emergency broadcasts
Allows application to receive
and process emergency broadcast messages. This permission is only available
to system applications.
send SMS messages
Allows application to send SMS
messages. Malicious applications may cost you money by sending
messages without your confirmation.
send SMS messages with no confirmation
Allows application to send SMS
messages. Malicious applications may cost you money by sending
messages without your confirmation.
read SMS or MMS
Allows application to read
SMS messages stored on your tablet or SIM card. Malicious applications
may read your confidential messages.
Allows application to read
SMS messages stored on your phone or SIM card. Malicious applications
may read your confidential messages.
edit SMS or MMS
Allows application to write
to SMS messages stored on your tablet or SIM card. Malicious applications
may delete your messages.
Allows application to write
to SMS messages stored on your phone or SIM card. Malicious applications
may delete your messages.
receive WAP
Allows application to receive
and process WAP messages. Malicious applications may monitor
your messages or delete them without showing them to you.
retrieve running applications
Allows application to retrieve
information about currently and recently running tasks. May allow
malicious applications to discover private information about other applications.
reorder running applications
Allows an application to move
tasks to the foreground and background. Malicious applications can force
themselves to the front without your control.
stop running applications
Allows an application to remove
tasks and kill their applications. Malicious applications can disrupt
the behavior of other applications.
enable application debugging
Allows an application to turn
on debugging for another application. Malicious applications can use this
to kill other applications.
change your UI settings
Allows an application to
change the current configuration, such as the locale or overall font
size.
enable car mode
Allows an application to
enable the car mode.
kill background processes
Allows an application to
kill background processes of other applications, even if memory
isn\'t low.
force stop other applications
Allows an application to
forcibly stop other applications.
force application to close
Allows an application to force any
activity that is in the foreground to close and go back.
Should never be needed for normal applications.
retrieve system internal state
Allows application to retrieve
internal state of the system. Malicious applications may retrieve
a wide variety of private and secure information that they should
never normally need.
retrieve screen content
Allows application to retrieve
the content of the active window. Malicious applications may retrieve
the entire window content and examine all its text except passwords.
partial shutdown
Puts the activity manager into a shutdown
state. Does not perform a complete shutdown.
prevent app switches
Prevents the user from switching to
another application.
monitor and control all application launching
Allows an application to
monitor and control how the system launches activities.
Malicious applications may completely compromise the system. This
permission is only needed for development, never for normal
use.
send package removed broadcast
Allows an application to
broadcast a notification that an application package has been removed.
Malicious applications may use this to kill any other running
application.
send SMS-received broadcast
Allows an application to
broadcast a notification that an SMS message has been received.
Malicious applications may use this to forge incoming SMS messages.
send WAP-PUSH-received broadcast
Allows an application to
broadcast a notification that a WAP PUSH message has been received.
Malicious applications may use this to forge MMS message receipt or to
silently replace the content of any web page with malicious variants.
limit number of running processes
Allows an application
to control the maximum number of processes that will run. Never
needed for normal applications.
make all background applications close
Allows an application
to control whether activities are always finished as soon as they
go to the background. Never needed for normal applications.
modify battery statistics
Allows the modification of
collected battery statistics. Not for use by normal applications.
control system backup and restore
Allows the application to control the system\'s backup and restore mechanism. Not for use by normal applications.
confirm a full backup or restore operation
Allows the application to launch the full backup confirmation UI. Not to be used by any application.
display unauthorized windows
Allows the creation of
windows that are intended to be used by the internal system
user interface. Not for use by normal applications.
display system-level alerts
Allows an application to
show system alert windows. Malicious applications can take over the
entire screen.
modify global animation speed
Allows an application to change
the global animation speed (faster or slower animations) at any time.
manage application tokens
Allows applications to
create and manage their own tokens, bypassing their normal
Z-ordering. Should never be needed for normal applications.
press keys and control buttons
Allows an application to deliver
its own input events (key presses, etc.) to other applications. Malicious
applications can use this to take over the tablet.
Allows an application to deliver
its own input events (key presses, etc.) to other applications. Malicious
applications can use this to take over the phone.
record what you type and actions you take
Allows applications to watch the
keys you press even when interacting with another application (such
as entering a password). Should never be needed for normal applications.
bind to an input method
Allows the holder to bind to the top-level
interface of an input method. Should never be needed for normal applications.
bind to a text service
Allows the holder to bind to the top-level
interface of a text service(e.g. SpellCheckerService). Should never be needed for normal applications.
bind to a VPN service
Allows the holder to bind to the top-level
interface of a Vpn service. Should never be needed for normal applications.
bind to a wallpaper
Allows the holder to bind to the top-level
interface of a wallpaper. Should never be needed for normal applications.
bind to a widget service
Allows the holder to bind to the top-level
interface of a widget service. Should never be needed for normal applications.
interact with a device admin
Allows the holder to send intents to
a device administrator. Should never be needed for normal applications.
change screen orientation
Allows an application to change
the rotation of the screen at any time. Should never be needed for
normal applications.
change pointer speed
Allows an application to change
the mouse or trackpad pointer speed at any time. Should never be needed for
normal applications.
send Linux signals to applications
Allows application to request that the
supplied signal be sent to all persistent processes.
make application always run
Allows an application to make
parts of itself persistent, so the system can\'t use it for other
applications.
delete applications
Allows an application to delete
Android packages. Malicious applications can use this to delete important applications.
delete other applications\' data
Allows an application to clear user data.
delete other applications\' caches
Allows an application to delete
cache files.
measure application storage space
Allows an application to retrieve
its code, data, and cache sizes
directly install applications
Allows an application to install new or updated
Android packages. Malicious applications can use this to add new applications with arbitrarily
powerful permissions.
delete all application cache data
Allows an application to free tablet storage
by deleting files in application cache directory. Access is very
restricted usually to system process.
Allows an application to free phone storage
by deleting files in application cache directory. Access is very
restricted usually to system process.
Move application resources
Allows an application to move application resources from internal to external media and vice versa.
read sensitive log data
Allows an application to read from the
system\'s various log files. This allows it to discover general
information about what you are doing with the tablet, potentially
including personal or private information.
Allows an application to read from the
system\'s various log files. This allows it to discover general
information about what you are doing with the phone, potentially
including personal or private information.
use any media decoder for playback
Allows an application to use any installed
media decoder to decode for playback.
read/write to resources owned by diag
Allows an application to read and write to
any resource owned by the diag group; for example, files in /dev. This could
potentially affect system stability and security. This should be ONLY be used
for hardware-specific diagnostics by the manufacturer or operator.
enable or disable application components
Allows an application to change whether a
component of another application is enabled or not. Malicious applications can use this
to disable important tablet capabilities. Care must be used with this permission, as it is
possible to get application components into an unusable, inconsistent, or unstable state.
Allows an application to change whether a
component of another application is enabled or not. Malicious applications can use this
to disable important phone capabilities. Care must be used with this permission, as it is
possible to get application components into an unusable, inconsistent, or unstable state.
set preferred applications
Allows an application to
modify your preferred applications. This can allow malicious applications
to silently change the applications that are run, spoofing your
existing applications to collect private data from you.
modify global system settings
Allows an application to modify the
system\'s settings data. Malicious applications can corrupt your system\'s
configuration.
modify secure system settings
Allows an application to modify the
system\'s secure settings data. Not for use by normal applications.
modify the Google services map
Allows an application to modify the
Google services map. Not for use by normal applications.
automatically start at boot
Allows an application to
have itself started as soon as the system has finished booting.
This can make it take longer to start the tablet and allow the
application to slow down the overall tablet by always running.
Allows an application to
have itself started as soon as the system has finished booting.
This can make it take longer to start the phone and allow the
application to slow down the overall phone by always running.
send sticky broadcast
Allows an application to send
sticky broadcasts, which remain after the broadcast ends.
Malicious applications can make the tablet slow or unstable by causing it
to use too much memory.
Allows an application to send
sticky broadcasts, which remain after the broadcast ends.
Malicious applications can make the phone slow or unstable by causing it
to use too much memory.
read contact data
Allows an application to read all
of the contact (address) data stored on your tablet. Malicious applications
can use this to send your data to other people.
Allows an application to read all
of the contact (address) data stored on your phone. Malicious applications
can use this to send your data to other people.
write contact data
Allows an application to modify the
contact (address) data stored on your tablet. Malicious
applications can use this to erase or modify your contact data.
Allows an application to modify the
contact (address) data stored on your phone. Malicious
applications can use this to erase or modify your contact data.
read your profile data
Allows the application to read personal
profile information stored on your device, such as your name and contact information. This
means the application can identify you and send your profile information to others.
write to your profile data
Allows the application to change or add
to personal profile information stored on your device, such as your name and contact
information. This means other applications can identify you and send your profile
information to others.
read your social stream
Allows the application to access
and sync social updates from you and your friends. Malicious apps can use this to read
private communications between you and your friends on social networks.
write to your social stream
Allows the application to display
social updates from your friends. Malicious apps can use this to pretend to be a friend
and trick you into revealing passwords or other confidential information.
read calendar events plus confidential information
Allows an application to read all calendar
events stored on your tablet, including those of friends or coworkers. A malicious application with
this permission can extract personal information from these calendars without the owners\' knowledge.
Allows an application to read all calendar
events stored on your phone, including those of friends or coworkers. A malicious application with
this permission can extract personal information from these calendars without the owners\' knowledge.
add or modify calendar events and send email to guests without owners\' knowledge
Allows an application to send event invitations as the calendar owner and add, remove,
change events that you can modify on your device, including those of friends or co-workers. A malicious application with this permission
can send spam emails that appear to come from calendar owners, modify events without the owners\' knowledge, or add fake events.
mock location sources for testing
Create mock location sources for testing.
Malicious applications can use this to override the location and/or status returned by real
location sources such as GPS or Network providers.
access extra location provider commands
Access extra location provider commands.
Malicious applications could use this to interfere with the operation of the GPS
or other location sources.
permission to install a location provider
Create mock location sources for testing.
Malicious applications can use this to override the location and/or status returned by real
location sources such as GPS or Network providers or monitor and report your location to an external source.
fine (GPS) location
Access fine location sources such as the
Global Positioning System on the tablet, where available.
Malicious applications can use this to determine where you are, and may
consume additional battery power.
Access fine location sources such as the
Global Positioning System on the phone, where available.
Malicious applications can use this to determine where you are, and may
consume additional battery power.
coarse (network-based) location
Access coarse location sources such as the cellular
network database to determine an approximate tablet location, where available. Malicious
applications can use this to determine approximately where you are.
Access coarse location sources such as the cellular
network database to determine an approximate phone location, where available. Malicious
applications can use this to determine approximately where you are.
access SurfaceFlinger
Allows application to use
SurfaceFlinger low-level features.
read frame buffer
Allows application to
read the content of the frame buffer.
change your audio settings
Allows application to modify
global audio settings such as volume and routing.
record audio
Allows application to access
the audio record path.
take pictures and videos
Allows application to take pictures and videos
with the camera. This allows the application at any time to collect
images the camera is seeing.
permanently disable tablet
permanently disable phone
Allows the application to
disable the entire tablet permanently. This is very dangerous.
Allows the application to
disable the entire phone permanently. This is very dangerous.
force tablet reboot
force phone reboot
Allows the application to
force the tablet to reboot.
Allows the application to
force the phone to reboot.
mount and unmount filesystems
Allows the application to mount and
unmount filesystems for removable storage.
format external storage
Allows the application to format removable storage.
get information on internal storage
Allows the application to get information on internal storage.
create internal storage
Allows the application to create internal storage.
destroy internal storage
Allows the application to destroy internal storage.
mount / unmount internal storage
Allows the application to mount / unmount internal storage.
rename internal storage
Allows the application to rename internal storage.
control vibrator
Allows the application to control
the vibrator.
control flashlight
Allows the application to control
the flashlight.
manage preferences and permissions for USB devices
Allows the application to manage preferences and permissions for USB devices.
implement MTP protocol
Allows access to the kernel MTP driver to implement the MTP USB protocol.
test hardware
Allows the application to control
various peripherals for the purpose of hardware testing.
directly call phone numbers
Allows the application to call
phone numbers without your intervention. Malicious applications may
cause unexpected calls on your phone bill. Note that this does not
allow the application to call emergency numbers.
directly call any phone numbers
Allows the application to call
any phone number, including emergency numbers, without your intervention.
Malicious applications may place unnecessary and illegal calls to emergency
services.
directly start CDMA tablet setup
directly start CDMA phone setup
Allows the application to start CDMA provisioning.
Malicious applications may unnecessarily start CDMA provisioning
control location update notifications
Allows enabling/disabling location
update notifications from the radio. Not for use by normal applications.
access checkin properties
Allows read/write access to
properties uploaded by the checkin service. Not for use by normal
applications.
choose widgets
Allows the application to tell the system
which widgets can be used by which application. With this permission,
applications can give access to personal data to other applications.
Not for use by normal applications.
modify phone state
Allows the application to control the
phone features of the device. An application with this permission can switch
networks, turn the phone radio on and off and the like without ever notifying
you.
read phone state and identity
Allows the application to access the phone
features of the device. An application with this permission can determine the phone
number and serial number of this phone, whether a call is active, the number that call
is connected to and the like.
prevent tablet from sleeping
prevent phone from sleeping
Allows an application to prevent
the tablet from going to sleep.
Allows an application to prevent
the phone from going to sleep.
power tablet on or off
power phone on or off
Allows the application to turn the
tablet on or off.
Allows the application to turn the
phone on or off.
run in factory test mode
Run as a low-level manufacturer test,
allowing complete access to the tablet hardware. Only available
when a tablet is running in manufacturer test mode.
Run as a low-level manufacturer test,
allowing complete access to the phone hardware. Only available
when a phone is running in manufacturer test mode.
set wallpaper
Allows the application
to set the system wallpaper.
set wallpaper size hints
Allows the application
to set the system wallpaper size hints.
reset system to factory defaults
Allows an application to completely
reset the system to its factory settings, erasing all data,
configuration, and installed applications.
set time
Allows an application to change
the tablet\'s clock time.
Allows an application to change
the phone\'s clock time.
set time zone
Allows an application to change
the tablet\'s time zone.
Allows an application to change
the phone\'s time zone.
act as the AccountManagerService
Allows an
application to make calls to AccountAuthenticators
discover known accounts
Allows an application to get
the list of accounts known by the tablet.
Allows an application to get
the list of accounts known by the phone.
act as an account authenticator
Allows an application
to use the account authenticator capabilities of the
AccountManager, including creating accounts and getting and
setting their passwords.
manage the accounts list
Allows an application to
perform operations like adding, and removing accounts and deleting
their password.
use the authentication
credentials of an account
Allows an application to
request authentication tokens.
view network state
Allows an application to view
the state of all networks.
full Internet access
Allows an application to
create network sockets.
change/intercept network settings and traffic
Allows an application to change network settings and to intercept and inspect all network traffic,
for example to change the proxy and port of any APN. Malicious applications could monitor, redirect, or modify network
packets without your knowledge.
change network connectivity
Allows an application to change
the state of network connectivity.
Change tethered connectivity
Allows an application to change
the state of tethered network connectivity.
change background data usage setting
Allows an application to change
the background data usage setting.
view Wi-Fi state
Allows an application to view
the information about the state of Wi-Fi.
change Wi-Fi state
Allows an application to connect
to and disconnect from Wi-Fi access points, and to make changes to
configured Wi-Fi networks.
allow Wi-Fi Multicast
reception
Allows an application to
receive packets not directly addressed to your device. This can be
useful when discovering services offered near by. It uses more power
than the non-multicast mode.
view WiMAX state
Allows an application to view
the information about the state of WiMAX.
change WiMAX state
Allows an application to connect
to and disconnect from WiMAX network.
bluetooth administration
Allows an application to configure
the local Bluetooth tablet, and to discover and pair with remote
devices.
Allows an application to configure
the local Bluetooth phone, and to discover and pair with remote
devices.
create Bluetooth connections
Allows an application to view
configuration of the local Bluetooth tablet, and to make and accept
connections with paired devices.
Allows an application to view
configuration of the local Bluetooth phone, and to make and accept
connections with paired devices.
control Near Field Communication
Allows an application to communicate
with Near Field Communication (NFC) tags, cards, and readers.
disable keylock
Allows an application to disable
the keylock and any associated password security. A legitimate example of
this is the phone disabling the keylock when receiving an incoming phone call,
then re-enabling the keylock when the call is finished.
read sync settings
Allows an application to read the sync settings,
such as whether sync is enabled for Contacts.
write sync settings
Allows an application to modify the sync
settings, such as whether sync is enabled for Contacts.
read sync statistics
Allows an application to read the sync stats; e.g., the
history of syncs that have occurred.
read subscribed feeds
Allows an application to get details about the currently synced feeds.
write subscribed feeds
Allows an application to modify
your currently synced feeds. This could allow a malicious application to
change your synced feeds.
read user defined dictionary
Allows an application to read any private
words, names and phrases that the user may have stored in the user dictionary.
write to user defined dictionary
Allows an application to write new words into the
user dictionary.
modify/delete USB storage contents
modify/delete SD card contents
Allows an application to write to the USB storage.
Allows an application to write to the SD card.
modify/delete internal media storage contents
Allows an application to modify the contents of the internal media storage.
access the cache filesystem
Allows an application to read and write the cache filesystem.
make/receive Internet calls
Allows an application to use the SIP service to make/receive Internet calls.
read historical network usage
Allows an application to read historical network usage for specific networks and applications.
manage network policy
Allows an application to manage network policies and define application-specific rules.
modify network usage accounting
Allows modification of how network usage is accounted against applications. Not for use by normal applications.
Set password rules
Control the length and the characters
allowed in screen-unlock passwords
Monitor screen-unlock attempts
Monitor the number of incorrect passwords
entered when unlocking the screen, and lock the tablet or erase all the tablet\'s
data if too many incorrect passwords are entered
Monitor the number of incorrect passwords
entered when unlocking the screen, and lock the phone or erase all the phone\'s
data if too many incorrect passwords are entered
Change the screen-unlock password
Change the screen-unlock password
Lock the screen
Control how and when the screen locks
Erase all data
Erase the tablet\'s data without warning,
by performing a factory data reset
Erase the phone\'s data without warning,
by performing a factory data reset
Set the device global proxy
Set the device global proxy
to be used while policy is enabled. Only the first device admin
sets the effective global proxy.
Set lock-screen password expiration
Control how frequently the lock-screen password must be
changed
Set storage encryption
Require that stored application data be encrypted
Disable cameras
Prevent use of all device cameras
- Home
- Mobile
- Work
- Work Fax
- Home Fax
- Pager
- Other
- Custom
- Home
- Work
- Other
- Custom
- Home
- Work
- Other
- Custom
- Home
- Work
- Other
- Custom
- Work
- Other
- Custom
- AIM
- Windows Live
- Yahoo
- Skype
- QQ
- Google Talk
- ICQ
- Jabber
Custom
Home
Mobile
Work
Work Fax
Home Fax
Pager
Other
Callback
Car
Company Main
ISDN
Main
Other Fax
Radio
Telex
TTY TDD
Work Mobile
Work Pager
Assistant
MMS
Custom
Birthday
Anniversary
Other
Custom
Home
Work
Other
Mobile
Custom
Home
Work
Other
Custom
Home
Work
Other
Custom
AIM
Windows Live
Yahoo
Skype
QQ
Google Talk
ICQ
Jabber
NetMeeting
Work
Other
Custom
Custom
Assistant
Brother
Child
Domestic Partner
Father
Friend
Manager
Mother
Parent
Partner
Referred by
Relative
Sister
Spouse
Custom
Home
Work
Other
Enter PIN code
Enter PUK and new PIN code
PUK code
New Pin Code
Touch to enter password
Enter password to unlock
Enter PIN to unlock
Incorrect PIN code!
To unlock, press Menu then 0.
Emergency number
No service.
Screen locked.
Press Menu to unlock or place emergency call.
Press Menu to unlock.
Draw pattern to unlock
Emergency call
Return to call
Correct!
Sorry, try again
Sorry, try again
Charging, %d%%
Charged.
%d%%
Connect your charger.
No SIM card.
No SIM card in tablet.
No SIM card in phone.
Please insert a SIM card.
The SIM card is missing or not readable. Please insert a SIM card.
Your SIM card is permanently disabled.\n
Please contact your wireless service provider to obtain another SIM card.
Previous track button
Next track button
Pause button
Play button
Stop button
Emergency calls only
Network locked
SIM card is PUK-locked.
Please see the User Guide or contact Customer Care.
SIM card is locked.
Unlocking SIM card\u2026
You have incorrectly drawn your unlock pattern %d times.
\n\nPlease try again in %d seconds.
You have incorrectly entered your password %d times.
\n\nPlease try again in %d seconds.
You have incorrectly entered your PIN %d times.
\n\nPlease try again in %d seconds.
You have incorrectly drawn your unlock pattern %d times.
After %d more unsuccessful attempts,
you will be asked to unlock your tablet using your Google sign-in.\n\n
Please try again in %d seconds.
You have incorrectly drawn your unlock pattern %d times.
After %d more unsuccessful attempts,
you will be asked to unlock your phone using your Google sign-in.\n\n
Please try again in %d seconds.
You have incorrectly attempted to unlock the tablet %d times.
After %d more unsuccessful attempts,
the tablet will be reset to factory default and all user data will be lost.
You have incorrectly attempted to unlock the phone %d times.
After %d more unsuccessful attempts,
the phone will be reset to factory default and all user data will be lost.
You have incorrectly attempted to unlock the tablet %d times.
The tablet will now be reset to factory default.
You have incorrectly attempted to unlock the phone %d times.
The phone will now be reset to factory default.
Try again in %d seconds.
Forgot pattern?
Account unlock
Too many pattern attempts!
To unlock, sign in with your Google account
Username (email)
Password
Sign in
Invalid username or password.
Forgot your username or password\?\nVisit google.com/accounts/recovery
Checking...
Unlock
Sound on
Sound off
Pattern started
Pattern cleared
Cell added
Pattern completed
\?123
ABC
ALT
"%-l%P"
"%-l%p"
Factory test failed
The FACTORY_TEST action
is only supported for packages installed in /system/app.
No package was found that provides the
FACTORY_TEST action.
Reboot
Mozilla/5.0 (Linux; U; Android %s)
AppleWebKit/534.30 (KHTML, like Gecko) Version/4.0 %sSafari/534.30
"Mobile "
The page at \'%s\' says:
JavaScript
Navigate away from this page?\n\n%s\n\nSelect OK to continue, or Cancel to stay on the current page.
Confirm
Tip: double-tap to zoom in and out.
AutoFill
Setup AutoFill
\u0020
$1$2$3
,\u0020
$1$2$3
attention|attn
province|region|other|provincia|bairro|suburb
company|business|organization|organisation|department|firma|firmenname|empresa|societe|société|ragione.?sociale|会社|название.?компании|单位|公司
address.?line|address1|addr1|street|strasse|straße|hausnummer|housenumber|house.?name|direccion|dirección|adresse|indirizzo|住所1|morada|endereço|Адрес|地址
address|adresse|indirizzo|住所|地址
address.?line2|address2|addr2|street|suite|unit|adresszusatz|ergänzende.?angaben|direccion2|colonia|adicional|addresssuppl|complementnom|appartement|indirizzo2|住所2
address.?line3|address3|addr3|street|line3|municipio|batiment|residence|indirizzo3
country|location|国|国家
zip|postal|post code|pcode|^1z$|postleitzahl|cp|cdp|cap|郵便番号|codigo|codpos|cep|Почтовый.?Индекс|邮政编码|邮编|郵遞區號
zip|^-$|post2|codpos2
city|town|ort|stadt|suburb|ciudad|provincia|localidad|poblacion|ville|commune|localita|市区町村|cidade|Город|市|分區
state|county|region|province|land|county|principality|都道府県|estado|provincia|область|省|地區
same as
use my
bill
ship
e.?mail|メールアドレス|Электронной.?Почты|邮件|邮箱|電郵地址
user.?name|user.?id|vollständiger.?name|用户名
^name|full.?name|your.?name|customer.?name|firstandlastname|nombre.*y.*apellidos|^nom|お名前|氏名|^nome|姓名
^name|^nom|^nome
irst.*name|initials|fname|first$|vorname|nombre|forename|prénom|prenom|名|nome|Имя
middle.*initial|m\\.i\\.|mi$
middle.*name|mname|middle$|apellido.?materno|lastlastname
last.*name|lname|surname|last$|nachname|apellidos|famille|^nom|cognome|姓|morada|apelidos|surename|sobrenome|Фамилия
phone|telefonnummer|telefono|teléfono|telfixe|電話|telefone|telemovel|телефон|电话
area.*code|acode|area
prefix|preselection|ddd
suffix
ext|ramal
card.?holder|name.?on.?card|ccname|owner|karteninhaber|nombre.*tarjeta|nom.*carte|nome.*cart|名前|Имя.*карты|信用卡开户名|开户名|持卡人姓名|持卡人姓名
name
verification|card identification|cvn|security code|cvv code|cvc
number|card.?#|card.?no|ccnum|nummer|credito|numero|número|numéro|カード番号|Номер.*карты|信用卡号|信用卡号码|信用卡卡號
expir|exp.*month|exp.*date|ccmonth|gueltig|gültig|monat|fecha|date.*exp|scadenza|有効期限|validade|Срок действия карты|月
exp|^/|year|ablaufdatum|gueltig|gültig|yahr|fecha|scadenza|有効期限|validade|Срок действия карты|年|有效期
^card
fax|télécopie|telecopie|ファックス|факс|传真|傳真
country.*code|ccode|_cc
^\\($
^-$|^\\)$
^-$
Province
Postal code
State
ZIP code
County
Island
District
Department
Prefecture
Parish
Area
Emirate
read Browser\'s history and bookmarks
Allows the application to read all
the URLs that the Browser has visited, and all of the Browser\'s bookmarks.
write Browser\'s history and bookmarks
Allows an application to modify the
Browser\'s history or bookmarks stored on your tablet. Malicious applications
can use this to erase or modify your Browser\'s data.
Allows an application to modify the
Browser\'s history or bookmarks stored on your phone. Malicious applications
can use this to erase or modify your Browser\'s data.
set alarm in alarm clock
Allows the application to set an alarm in
an installed alarm clock application. Some alarm clock applications may
not implement this feature.
add voicemail
Allows the application to add messages
to your voicemail inbox.
Modify Browser geolocation permissions
Allows an application to modify the
Browser\'s geolocation permissions. Malicious applications
can use this to allow sending location information to arbitrary web sites.
verify packages
Allows the application to verify a package is
installable.
bind to a package verifier
Allows the holder to make requests of
package verifiers. Should never be needed for normal applications.
Do you want the browser to remember this password?
Not now
Remember
Never
You do not have permission to open this page.
Text copied to clipboard.
More
Menu+
space
enter
delete
Search
Search
Search query
Clear query
Submit query
Voice search
1 month ago
Before 1 month ago
- 1 second ago
- %d seconds ago
- 1 minute ago
- %d minutes ago
- 1 hour ago
- %d hours ago
- Last %d days
Last month
Older
- yesterday
- %d days ago
- in 1 second
- in %d seconds
- in 1 minute
- in %d minutes
- in 1 hour
- in %d hours
- tomorrow
- in %d days
- 1 sec ago
- %d secs ago
- 1 min ago
- %d mins ago
- 1 hour ago
- %d hours ago
- yesterday
- %d days ago
- in 1 sec
- in %d secs
- in 1 min
- in %d mins
- in 1 hour
- in %d hours
- tomorrow
- in %d days
on %s
at %s
in %s
day
days
hour
hours
min
mins
sec
secs
week
weeks
year
years
Cannot play video
Sorry, this video is not valid for streaming to this device.
Sorry, this video cannot be played.
OK
"%1$s, %2$s"
"noon"
"Noon"
"midnight"
"Midnight"
%1$02d:%2$02d
%1$d:%2$02d:%3$02d
Select all
Cut
Copy
Paste
Replace\u2026
Delete
Copy URL
Select text...
Text selection
add to dictionary
delete
Input method
Text actions
Low on space
Tablet storage space is getting low.
Phone storage space is getting low.
OK
Cancel
OK
Cancel
Attention
Loading...
ON
OFF
Complete action using
Use by default for this action.
Clear default in Home Settings > Applications > Manage applications.
Select an action
Select an application for the USB device
No applications can perform this action.
Unfortunately, %1$s has stopped.
Unfortunately, the process %1$s has
stopped.
%2$s is not responding.\n\nWould you like to close it?
Activity %1$s is not responding.\n\nWould you like to close it?
%1$s is not responding. Would you like to close it?
Process %1$s is not responding.\n\nWould you like to close it?
OK
Report
Wait
Application redirected
%1$s is now running.
%1$s was originally launched.
Scale
Always show
Re-enable this with Settings > Applications > Manage applications.
The application %1$s
(process %2$s) has violated its self-enforced StrictMode policy.
The process %1$s has
has violated its self-enforced StrictMode policy.
Android is upgrading...
Optimizing application
%1$d of
%2$d.
Starting applications.
Finishing boot.
%1$s running
Select to switch to application
Switch applications?
Another application is already running
that must be stopped before you can start a new one.
Return to %1$s
Don\'t start the new application.
Start %1$s
Stop the old application without saving.
Select an action for text
Ringer volume
Media volume
Playing through Bluetooth
Silent ringtone selected
In-call volume
Bluetooth in-call volume
Alarm volume
Notification volume
Volume
Bluetooth volume
Ringtone volume
Call volume
Media volume
Notification volume
Default ringtone
Default ringtone (%1$s)
Silent
Ringtones
Unknown ringtone
- Wi-Fi network available
- Wi-Fi networks available
- Open Wi-Fi network available
- Open Wi-Fi networks available
Sign in to Wi-Fi network
%1$s
Couldn\'t connect to Wi-Fi
\u0020has a poor internet connection.
AndroidAP
Wi-Fi Direct
Start Wi-Fi Direct operation. This will turn off Wi-Fi client/hotspot operation.
Couldn\'t start Wi-Fi Direct
Wi-Fi Direct connection setup request from %1$s. Click OK to accept.
Wi-Fi Direct connection setup request from %1$s. Enter pin to proceed.
WPS pin %1$s needs to be entered on the peer device %2$s for connection setup to proceed
Wi-Fi Direct is on
Touch for settings
Insert character
Unknown application
Sending SMS messages
A large number of SMS messages are being sent. Select \"OK\" to continue, or \"Cancel\" to stop sending.
OK
Cancel
SIM card removed
The mobile network will be unavailable until you restart with a valid SIM card inserted.
Done
SIM card added
You must restart your device to access the mobile network.
Restart
Set time
Set date
Set
Default
%1$s, %2$s
No permissions required
Hide
Show all
USB Mass Storage
USB connected
You have connected to your computer via USB. Touch the button below if you want to copy files between your computer and your Android\u2018s USB storage.
You have connected to your computer via USB. Touch the button below if you want to copy files between your computer and your Android\u2018s SD card.
Turn on USB storage
There is a problem using your USB storage for USB mass storage.
There is a problem using your SD card for USB mass storage.
USB connected
Select to copy files to/from your computer.
Turn off USB storage
Select to turn off USB storage.
USB storage in use
Before turning off USB storage, make sure you have unmounted (\u201cejected\u201d) your Android\u2018s USB storage from your computer.
Before turning off USB storage, make sure you have unmounted (\u201cejected\u201d) your Android\u2018s SD card from your computer.
Turn off USB storage
There was a problem turning off USB storage. Check to make sure you have unmounted the USB host, then try again.
Turn on USB storage
If you turn on USB storage, some applications you are using will stop and may be unavailable until you turn off USB storage.
USB operation unsuccessful
OK
Connected as a media device
Connected as a camera
Connected as an installer
Connected to a USB accessory
Touch for other USB options
Format USB storage
Format SD card
Format USB storage, erasing all files stored there? Action cannot be reversed!
Are you sure you want to format the SD card? All data on your card will be lost.
Format
USB debugging connected
Select to disable USB debugging.
""
Select input method
Configure input methods
\u0020ABCDEFGHIJKLMNOPQRSTUVWXYZ
\u00200123456789ABCDEFGHIJKLMNOPQRSTUVWXYZ
candidates
Preparing USB storage
Preparing SD card
Checking for errors.
Blank USB storage
Blank SD card
USB storage blank or has unsupported filesystem.
SD card blank or has unsupported filesystem.
Damaged USB storage
Damaged SD card
USB storage damaged. You may have to reformat it.
SD card damaged. You may have to reformat it.
USB storage unexpectedly removed
SD card unexpectedly removed
Unmount USB storage before removing to avoid data loss.
Unmount SD card before removing to avoid data loss.
USB storage safe to remove
SD card safe to remove
You can safely remove USB storage.
You can safely remove SD card.
Removed USB storage
Removed SD card
USB storage removed. Insert new media.
SD card removed. Insert a new one.
No matching activities found
update component usage statistics
Allows the modification of collected component usage statistics. Not for use by normal applications.
Allows to invoke default container service to copy content. Not for use by normal applications.
Allows to invoke default container service to copy content. Not for use by normal applications.
Tap twice for zoom control
Error inflating widget
Go
Search
Send
Next
Done
Prev
Execute
Dial number\nusing %s
Create contact\nusing %s
The following one or more applications request permission to access your account, now and in the future.
Do you want to allow this request?
Access Request
Allow
Deny
Permission Requested
Permission Requested\nfor account %s
Input method
Sync
Accessibility
Wallpaper
Change wallpaper
/data/eri.xml
VPN is activated.
VPN is activated by %s
Tap to manage the network.
Connected to %s. Tap to manage the network.
Choose file
No file chosen
Reset
Submit
Car mode enabled
Select to exit car mode.
Tethering or hotspot active
Touch to configure
Back
Next
Skip
High mobile data use
Touch to learn more about mobile data use
Mobile data limit exceeded
Touch to learn more about mobile data use
No matches
Find on page
- 1 match
- %d of %d
Done
Unmounting USB storage...
Unmounting SD card...
Erasing USB storage...
Erasing SD card...
Couldn\'t erase USB storage.
Couldn\'t erase SD card.
SD card was removed before being unmounted.
USB storage is currently being checked.
SD card is currently being checked.
SD card has been removed.
USB storage is currently in use by a computer.
SD card is currently in use by a computer.
External media in unknown state.
Share
Find
Web Search
Location request from %s
Location request
Requested by %1$s (%2$s)
Yes
No
Delete limit exceeded
There are %1$d deleted items for %2$s, account %3$s. What would you like to do?
Delete the items.
Undo the deletes.
Do nothing for now.
Select an account
"Add an account"
"Which account would you like to use?"
Add account
Increment
Decrement
%s tap and hold.
Slide up to increment and down to decrement.
Increment minute
Decrement minute
Increment hour
Decrement hour
Set PM
Set AM
Increment month
Decrement month
Increment day
Decrement day
Increment year
Decrement year
checked
not checked
selected
not selected
on
off
pressed
not pressed
Alt
Cancel
Delete
Done
Mode change
Shift
Enter
Choose an application
Share with
Share with %s
"Sliding handle. Tap and hold."
Up for %s.
Down for %s.
"Left for %s.
Right for %s.
Unlock
Camera
Silent
Sound on
Swipe to unlock.
Plug in a headset to hear password keys spoken aloud.
Dot.
Navigate home
Navigate up
More options
Internal Storage
SD Card
USB storage
Edit...
Data usage warning
Touch to view usage and settings
2G-3G data disabled
4G data disabled
Mobile data disabled
Wi-Fi data disabled
Touch to enable
2G-3G data limit exceeded
4G data limit exceeded
Mobile data limit exceeded
Wi-Fi data limit exceeded
%s over specified limit
Background data restricted
Touch to remove restriction
Security certificate
This certificate is valid.
Issued to:
Common name:
Organization:
Organizational unit:
Issued by:
Validity:
Issued on:
Expires on:
Serial number:
Fingerprints:
SHA-256 fingerprint:
SHA-1 fingerprint:
See all...
Select activity
Share with...
Device locked.
", "
Sending...
Launch Browser?
Accept Call?