B KB MB GB TB PB %1$s%2$s <untitled> \u2026 \u2025 (No phone number) (Unknown) Voicemail MSISDN1 Connection problem or invalid MMI code. Operation is restricted to fixed dialing numbers only. Service was enabled. Service was enabled for: Service has been disabled. Registration was successful. Erasure was successful. Incorrect password. MMI complete. The old PIN you typed is not correct. The PUK you typed is not correct. The PINs you entered do not match. Type a PIN that is 4 to 8 numbers. Type a PUK that is 8 numbers or longer. Your SIM card is PUK-locked. Type the PUK code to unlock it. Type PUK2 to unblock SIM card. Incoming Caller ID Outgoing Caller ID Call forwarding Call waiting Call barring Password change PIN change Calling number present Calling number restricted Three way calling Rejection of undesired annoying calls Calling number delivery Do not disturb Caller ID defaults to restricted. Next call: Restricted Caller ID defaults to restricted. Next call: Not restricted Caller ID defaults to not restricted. Next call: Restricted Caller ID defaults to not restricted. Next call: Not restricted Service not provisioned. The caller ID setting cannot be changed. Restricted access changed Data service is blocked. Emergency service is blocked. Voice service is blocked. All Voice services are blocked. SMS service is blocked. Voice/Data services are blocked. Voice/SMS services are blocked. All Voice/Data/SMS services are blocked. Voice Data FAX SMS Async Sync Packet PAD Roaming Indicator On Roaming Indicator Off Roaming Indicator Flashing Out of Neighborhood Out of Building Roaming - Preferred System Roaming - Available System Roaming - Alliance Partner Roaming - Premium Partner Roaming - Full Service Functionality Roaming - Partial Service Functionality Roaming Banner On Roaming Banner Off Searching for Service {0}: Not forwarded {0}: {1} {0}: {1} after {2} seconds {0}: Not forwarded {0}: Not forwarded Feature code complete. Connection problem or invalid feature code. OK A network error occurred. The URL could not be found. The site authentication scheme is not supported. Authentication was unsuccessful. Authentication via the proxy server was unsuccessful. The connection to the server was unsuccessful. The server couldn\'t communicate. Try again later. The connection to the server timed out. The page contains too many server redirects. The protocol is not supported. A secure connection could not be established. The page could not be opened because the URL is invalid. The file could not be accessed. The requested file was not found. Too many requests are being processed. Try again later. Sign-in error for %1$s Sync Sync Too many %s deletes. Tablet storage is full! Delete some files to free space. Phone storage is full! Delete some files to free space. Me Tablet options Phone options Silent mode Turn on wireless Turn off wireless Screen lock Power off Ringer off Ringer vibrate Ringer on Shutting down\u2026 Your tablet will shut down. Your phone will shut down. Would you like to shut down? Recent No recent applications. Tablet options Phone options Screen lock Power off Silent mode Sound is OFF Sound is ON Airplane mode Airplane mode is ON Airplane mode is OFF 999+ Safe mode Android System Services that cost you money Allow applications to do things that can cost you money. Your messages Read and write your SMS, e-mail, and other messages. Your personal information Direct access to your contacts and calendar stored on the tablet. Direct access to your contacts and calendar stored on the phone. Your location Monitor your physical location Network communication Allow applications to access various network features. Your accounts Access the available accounts. Hardware controls Direct access to hardware on the handset. Phone calls Monitor, record, and process phone calls. System tools Lower-level access and control of the system. Development tools Features only needed for application developers. Storage Access the USB storage. Access the SD card. disable or modify status bar Allows application to disable the status bar or add and remove system icons. status bar Allows the application to be the status bar. expand/collapse status bar Allows application to expand or collapse the status bar. intercept outgoing calls Allows application to process outgoing calls and change the number to be dialed. Malicious applications may monitor, redirect, or prevent outgoing calls. receive SMS Allows application to receive and process SMS messages. Malicious applications may monitor your messages or delete them without showing them to you. receive MMS Allows application to receive and process MMS messages. Malicious applications may monitor your messages or delete them without showing them to you. receive emergency broadcasts Allows application to receive and process emergency broadcast messages. This permission is only available to system applications. send SMS messages Allows application to send SMS messages. Malicious applications may cost you money by sending messages without your confirmation. send SMS messages with no confirmation Allows application to send SMS messages. Malicious applications may cost you money by sending messages without your confirmation. read SMS or MMS Allows application to read SMS messages stored on your tablet or SIM card. Malicious applications may read your confidential messages. Allows application to read SMS messages stored on your phone or SIM card. Malicious applications may read your confidential messages. edit SMS or MMS Allows application to write to SMS messages stored on your tablet or SIM card. Malicious applications may delete your messages. Allows application to write to SMS messages stored on your phone or SIM card. Malicious applications may delete your messages. receive WAP Allows application to receive and process WAP messages. Malicious applications may monitor your messages or delete them without showing them to you. retrieve running applications Allows application to retrieve information about currently and recently running tasks. May allow malicious applications to discover private information about other applications. reorder running applications Allows an application to move tasks to the foreground and background. Malicious applications can force themselves to the front without your control. stop running applications Allows an application to remove tasks and kill their applications. Malicious applications can disrupt the behavior of other applications. enable application debugging Allows an application to turn on debugging for another application. Malicious applications can use this to kill other applications. change your UI settings Allows an application to change the current configuration, such as the locale or overall font size. enable car mode Allows an application to enable the car mode. kill background processes Allows an application to kill background processes of other applications, even if memory isn\'t low. force stop other applications Allows an application to forcibly stop other applications. force application to close Allows an application to force any activity that is in the foreground to close and go back. Should never be needed for normal applications. retrieve system internal state Allows application to retrieve internal state of the system. Malicious applications may retrieve a wide variety of private and secure information that they should never normally need. retrieve screen content Allows application to retrieve the content of the active window. Malicious applications may retrieve the entire window content and examine all its text except passwords. partial shutdown Puts the activity manager into a shutdown state. Does not perform a complete shutdown. prevent app switches Prevents the user from switching to another application. monitor and control all application launching Allows an application to monitor and control how the system launches activities. Malicious applications may completely compromise the system. This permission is only needed for development, never for normal use. send package removed broadcast Allows an application to broadcast a notification that an application package has been removed. Malicious applications may use this to kill any other running application. send SMS-received broadcast Allows an application to broadcast a notification that an SMS message has been received. Malicious applications may use this to forge incoming SMS messages. send WAP-PUSH-received broadcast Allows an application to broadcast a notification that a WAP PUSH message has been received. Malicious applications may use this to forge MMS message receipt or to silently replace the content of any web page with malicious variants. limit number of running processes Allows an application to control the maximum number of processes that will run. Never needed for normal applications. make all background applications close Allows an application to control whether activities are always finished as soon as they go to the background. Never needed for normal applications. modify battery statistics Allows the modification of collected battery statistics. Not for use by normal applications. control system backup and restore Allows the application to control the system\'s backup and restore mechanism. Not for use by normal applications. confirm a full backup or restore operation Allows the application to launch the full backup confirmation UI. Not to be used by any application. display unauthorized windows Allows the creation of windows that are intended to be used by the internal system user interface. Not for use by normal applications. display system-level alerts Allows an application to show system alert windows. Malicious applications can take over the entire screen. modify global animation speed Allows an application to change the global animation speed (faster or slower animations) at any time. manage application tokens Allows applications to create and manage their own tokens, bypassing their normal Z-ordering. Should never be needed for normal applications. press keys and control buttons Allows an application to deliver its own input events (key presses, etc.) to other applications. Malicious applications can use this to take over the tablet. Allows an application to deliver its own input events (key presses, etc.) to other applications. Malicious applications can use this to take over the phone. record what you type and actions you take Allows applications to watch the keys you press even when interacting with another application (such as entering a password). Should never be needed for normal applications. bind to an input method Allows the holder to bind to the top-level interface of an input method. Should never be needed for normal applications. bind to a text service Allows the holder to bind to the top-level interface of a text service(e.g. SpellCheckerService). Should never be needed for normal applications. bind to a VPN service Allows the holder to bind to the top-level interface of a Vpn service. Should never be needed for normal applications. bind to a wallpaper Allows the holder to bind to the top-level interface of a wallpaper. Should never be needed for normal applications. bind to a widget service Allows the holder to bind to the top-level interface of a widget service. Should never be needed for normal applications. interact with a device admin Allows the holder to send intents to a device administrator. Should never be needed for normal applications. change screen orientation Allows an application to change the rotation of the screen at any time. Should never be needed for normal applications. change pointer speed Allows an application to change the mouse or trackpad pointer speed at any time. Should never be needed for normal applications. send Linux signals to applications Allows application to request that the supplied signal be sent to all persistent processes. make application always run Allows an application to make parts of itself persistent, so the system can\'t use it for other applications. delete applications Allows an application to delete Android packages. Malicious applications can use this to delete important applications. delete other applications\' data Allows an application to clear user data. delete other applications\' caches Allows an application to delete cache files. measure application storage space Allows an application to retrieve its code, data, and cache sizes directly install applications Allows an application to install new or updated Android packages. Malicious applications can use this to add new applications with arbitrarily powerful permissions. delete all application cache data Allows an application to free tablet storage by deleting files in application cache directory. Access is very restricted usually to system process. Allows an application to free phone storage by deleting files in application cache directory. Access is very restricted usually to system process. Move application resources Allows an application to move application resources from internal to external media and vice versa. read sensitive log data Allows an application to read from the system\'s various log files. This allows it to discover general information about what you are doing with the tablet, potentially including personal or private information. Allows an application to read from the system\'s various log files. This allows it to discover general information about what you are doing with the phone, potentially including personal or private information. use any media decoder for playback Allows an application to use any installed media decoder to decode for playback. read/write to resources owned by diag Allows an application to read and write to any resource owned by the diag group; for example, files in /dev. This could potentially affect system stability and security. This should be ONLY be used for hardware-specific diagnostics by the manufacturer or operator. enable or disable application components Allows an application to change whether a component of another application is enabled or not. Malicious applications can use this to disable important tablet capabilities. Care must be used with this permission, as it is possible to get application components into an unusable, inconsistent, or unstable state. Allows an application to change whether a component of another application is enabled or not. Malicious applications can use this to disable important phone capabilities. Care must be used with this permission, as it is possible to get application components into an unusable, inconsistent, or unstable state. set preferred applications Allows an application to modify your preferred applications. This can allow malicious applications to silently change the applications that are run, spoofing your existing applications to collect private data from you. modify global system settings Allows an application to modify the system\'s settings data. Malicious applications can corrupt your system\'s configuration. modify secure system settings Allows an application to modify the system\'s secure settings data. Not for use by normal applications. modify the Google services map Allows an application to modify the Google services map. Not for use by normal applications. automatically start at boot Allows an application to have itself started as soon as the system has finished booting. This can make it take longer to start the tablet and allow the application to slow down the overall tablet by always running. Allows an application to have itself started as soon as the system has finished booting. This can make it take longer to start the phone and allow the application to slow down the overall phone by always running. send sticky broadcast Allows an application to send sticky broadcasts, which remain after the broadcast ends. Malicious applications can make the tablet slow or unstable by causing it to use too much memory. Allows an application to send sticky broadcasts, which remain after the broadcast ends. Malicious applications can make the phone slow or unstable by causing it to use too much memory. read contact data Allows an application to read all of the contact (address) data stored on your tablet. Malicious applications can use this to send your data to other people. Allows an application to read all of the contact (address) data stored on your phone. Malicious applications can use this to send your data to other people. write contact data Allows an application to modify the contact (address) data stored on your tablet. Malicious applications can use this to erase or modify your contact data. Allows an application to modify the contact (address) data stored on your phone. Malicious applications can use this to erase or modify your contact data. read your profile data Allows the application to read personal profile information stored on your device, such as your name and contact information. This means the application can identify you and send your profile information to others. write to your profile data Allows the application to change or add to personal profile information stored on your device, such as your name and contact information. This means other applications can identify you and send your profile information to others. read your social stream Allows the application to access and sync social updates from you and your friends. Malicious apps can use this to read private communications between you and your friends on social networks. write to your social stream Allows the application to display social updates from your friends. Malicious apps can use this to pretend to be a friend and trick you into revealing passwords or other confidential information. read calendar events plus confidential information Allows an application to read all calendar events stored on your tablet, including those of friends or coworkers. A malicious application with this permission can extract personal information from these calendars without the owners\' knowledge. Allows an application to read all calendar events stored on your phone, including those of friends or coworkers. A malicious application with this permission can extract personal information from these calendars without the owners\' knowledge. add or modify calendar events and send email to guests without owners\' knowledge Allows an application to send event invitations as the calendar owner and add, remove, change events that you can modify on your device, including those of friends or co-workers. A malicious application with this permission can send spam emails that appear to come from calendar owners, modify events without the owners\' knowledge, or add fake events. mock location sources for testing Create mock location sources for testing. Malicious applications can use this to override the location and/or status returned by real location sources such as GPS or Network providers. access extra location provider commands Access extra location provider commands. Malicious applications could use this to interfere with the operation of the GPS or other location sources. permission to install a location provider Create mock location sources for testing. Malicious applications can use this to override the location and/or status returned by real location sources such as GPS or Network providers or monitor and report your location to an external source. fine (GPS) location Access fine location sources such as the Global Positioning System on the tablet, where available. Malicious applications can use this to determine where you are, and may consume additional battery power. Access fine location sources such as the Global Positioning System on the phone, where available. Malicious applications can use this to determine where you are, and may consume additional battery power. coarse (network-based) location Access coarse location sources such as the cellular network database to determine an approximate tablet location, where available. Malicious applications can use this to determine approximately where you are. Access coarse location sources such as the cellular network database to determine an approximate phone location, where available. Malicious applications can use this to determine approximately where you are. access SurfaceFlinger Allows application to use SurfaceFlinger low-level features. read frame buffer Allows application to read the content of the frame buffer. change your audio settings Allows application to modify global audio settings such as volume and routing. record audio Allows application to access the audio record path. take pictures and videos Allows application to take pictures and videos with the camera. This allows the application at any time to collect images the camera is seeing. permanently disable tablet permanently disable phone Allows the application to disable the entire tablet permanently. This is very dangerous. Allows the application to disable the entire phone permanently. This is very dangerous. force tablet reboot force phone reboot Allows the application to force the tablet to reboot. Allows the application to force the phone to reboot. mount and unmount filesystems Allows the application to mount and unmount filesystems for removable storage. format external storage Allows the application to format removable storage. get information on internal storage Allows the application to get information on internal storage. create internal storage Allows the application to create internal storage. destroy internal storage Allows the application to destroy internal storage. mount / unmount internal storage Allows the application to mount / unmount internal storage. rename internal storage Allows the application to rename internal storage. control vibrator Allows the application to control the vibrator. control flashlight Allows the application to control the flashlight. manage preferences and permissions for USB devices Allows the application to manage preferences and permissions for USB devices. implement MTP protocol Allows access to the kernel MTP driver to implement the MTP USB protocol. test hardware Allows the application to control various peripherals for the purpose of hardware testing. directly call phone numbers Allows the application to call phone numbers without your intervention. Malicious applications may cause unexpected calls on your phone bill. Note that this does not allow the application to call emergency numbers. directly call any phone numbers Allows the application to call any phone number, including emergency numbers, without your intervention. Malicious applications may place unnecessary and illegal calls to emergency services. directly start CDMA tablet setup directly start CDMA phone setup Allows the application to start CDMA provisioning. Malicious applications may unnecessarily start CDMA provisioning control location update notifications Allows enabling/disabling location update notifications from the radio. Not for use by normal applications. access checkin properties Allows read/write access to properties uploaded by the checkin service. Not for use by normal applications. choose widgets Allows the application to tell the system which widgets can be used by which application. With this permission, applications can give access to personal data to other applications. Not for use by normal applications. modify phone state Allows the application to control the phone features of the device. An application with this permission can switch networks, turn the phone radio on and off and the like without ever notifying you. read phone state and identity Allows the application to access the phone features of the device. An application with this permission can determine the phone number and serial number of this phone, whether a call is active, the number that call is connected to and the like. prevent tablet from sleeping prevent phone from sleeping Allows an application to prevent the tablet from going to sleep. Allows an application to prevent the phone from going to sleep. power tablet on or off power phone on or off Allows the application to turn the tablet on or off. Allows the application to turn the phone on or off. run in factory test mode Run as a low-level manufacturer test, allowing complete access to the tablet hardware. Only available when a tablet is running in manufacturer test mode. Run as a low-level manufacturer test, allowing complete access to the phone hardware. Only available when a phone is running in manufacturer test mode. set wallpaper Allows the application to set the system wallpaper. set wallpaper size hints Allows the application to set the system wallpaper size hints. reset system to factory defaults Allows an application to completely reset the system to its factory settings, erasing all data, configuration, and installed applications. set time Allows an application to change the tablet\'s clock time. Allows an application to change the phone\'s clock time. set time zone Allows an application to change the tablet\'s time zone. Allows an application to change the phone\'s time zone. act as the AccountManagerService Allows an application to make calls to AccountAuthenticators discover known accounts Allows an application to get the list of accounts known by the tablet. Allows an application to get the list of accounts known by the phone. act as an account authenticator Allows an application to use the account authenticator capabilities of the AccountManager, including creating accounts and getting and setting their passwords. manage the accounts list Allows an application to perform operations like adding, and removing accounts and deleting their password. use the authentication credentials of an account Allows an application to request authentication tokens. view network state Allows an application to view the state of all networks. full Internet access Allows an application to create network sockets. change/intercept network settings and traffic Allows an application to change network settings and to intercept and inspect all network traffic, for example to change the proxy and port of any APN. Malicious applications could monitor, redirect, or modify network packets without your knowledge. change network connectivity Allows an application to change the state of network connectivity. Change tethered connectivity Allows an application to change the state of tethered network connectivity. change background data usage setting Allows an application to change the background data usage setting. view Wi-Fi state Allows an application to view the information about the state of Wi-Fi. change Wi-Fi state Allows an application to connect to and disconnect from Wi-Fi access points, and to make changes to configured Wi-Fi networks. allow Wi-Fi Multicast reception Allows an application to receive packets not directly addressed to your device. This can be useful when discovering services offered near by. It uses more power than the non-multicast mode. view WiMAX state Allows an application to view the information about the state of WiMAX. change WiMAX state Allows an application to connect to and disconnect from WiMAX network. bluetooth administration Allows an application to configure the local Bluetooth tablet, and to discover and pair with remote devices. Allows an application to configure the local Bluetooth phone, and to discover and pair with remote devices. create Bluetooth connections Allows an application to view configuration of the local Bluetooth tablet, and to make and accept connections with paired devices. Allows an application to view configuration of the local Bluetooth phone, and to make and accept connections with paired devices. control Near Field Communication Allows an application to communicate with Near Field Communication (NFC) tags, cards, and readers. disable keylock Allows an application to disable the keylock and any associated password security. A legitimate example of this is the phone disabling the keylock when receiving an incoming phone call, then re-enabling the keylock when the call is finished. read sync settings Allows an application to read the sync settings, such as whether sync is enabled for Contacts. write sync settings Allows an application to modify the sync settings, such as whether sync is enabled for Contacts. read sync statistics Allows an application to read the sync stats; e.g., the history of syncs that have occurred. read subscribed feeds Allows an application to get details about the currently synced feeds. write subscribed feeds Allows an application to modify your currently synced feeds. This could allow a malicious application to change your synced feeds. read user defined dictionary Allows an application to read any private words, names and phrases that the user may have stored in the user dictionary. write to user defined dictionary Allows an application to write new words into the user dictionary. modify/delete USB storage contents modify/delete SD card contents Allows an application to write to the USB storage. Allows an application to write to the SD card. modify/delete internal media storage contents Allows an application to modify the contents of the internal media storage. access the cache filesystem Allows an application to read and write the cache filesystem. make/receive Internet calls Allows an application to use the SIP service to make/receive Internet calls. read historical network usage Allows an application to read historical network usage for specific networks and applications. manage network policy Allows an application to manage network policies and define application-specific rules. modify network usage accounting Allows modification of how network usage is accounted against applications. Not for use by normal applications. Set password rules Control the length and the characters allowed in screen-unlock passwords Monitor screen-unlock attempts Monitor the number of incorrect passwords entered when unlocking the screen, and lock the tablet or erase all the tablet\'s data if too many incorrect passwords are entered Monitor the number of incorrect passwords entered when unlocking the screen, and lock the phone or erase all the phone\'s data if too many incorrect passwords are entered Change the screen-unlock password Change the screen-unlock password Lock the screen Control how and when the screen locks Erase all data Erase the tablet\'s data without warning, by performing a factory data reset Erase the phone\'s data without warning, by performing a factory data reset Set the device global proxy Set the device global proxy to be used while policy is enabled. Only the first device admin sets the effective global proxy. Set lock-screen password expiration Control how frequently the lock-screen password must be changed Set storage encryption Require that stored application data be encrypted Disable cameras Prevent use of all device cameras Home Mobile Work Work Fax Home Fax Pager Other Custom Home Work Other Custom Home Work Other Custom Home Work Other Custom Work Other Custom AIM Windows Live Yahoo Skype QQ Google Talk ICQ Jabber Custom Home Mobile Work Work Fax Home Fax Pager Other Callback Car Company Main ISDN Main Other Fax Radio Telex TTY TDD Work Mobile Work Pager Assistant MMS Custom Birthday Anniversary Other Custom Home Work Other Mobile Custom Home Work Other Custom Home Work Other Custom AIM Windows Live Yahoo Skype QQ Google Talk ICQ Jabber NetMeeting Work Other Custom Custom Assistant Brother Child Domestic Partner Father Friend Manager Mother Parent Partner Referred by Relative Sister Spouse Custom Home Work Other Enter PIN code Enter PUK and new PIN code PUK code New Pin Code Touch to enter password Enter password to unlock Enter PIN to unlock Incorrect PIN code! To unlock, press Menu then 0. Emergency number No service. Screen locked. Press Menu to unlock or place emergency call. Press Menu to unlock. Draw pattern to unlock Emergency call Return to call Correct! Sorry, try again Sorry, try again Charging, %d%% Charged. %d%% Connect your charger. No SIM card. No SIM card in tablet. No SIM card in phone. Please insert a SIM card. The SIM card is missing or not readable. Please insert a SIM card. Your SIM card is permanently disabled.\n Please contact your wireless service provider to obtain another SIM card. Previous track button Next track button Pause button Play button Stop button Emergency calls only Network locked SIM card is PUK-locked. Please see the User Guide or contact Customer Care. SIM card is locked. Unlocking SIM card\u2026 You have incorrectly drawn your unlock pattern %d times. \n\nPlease try again in %d seconds. You have incorrectly entered your password %d times. \n\nPlease try again in %d seconds. You have incorrectly entered your PIN %d times. \n\nPlease try again in %d seconds. You have incorrectly drawn your unlock pattern %d times. After %d more unsuccessful attempts, you will be asked to unlock your tablet using your Google sign-in.\n\n Please try again in %d seconds. You have incorrectly drawn your unlock pattern %d times. After %d more unsuccessful attempts, you will be asked to unlock your phone using your Google sign-in.\n\n Please try again in %d seconds. You have incorrectly attempted to unlock the tablet %d times. After %d more unsuccessful attempts, the tablet will be reset to factory default and all user data will be lost. You have incorrectly attempted to unlock the phone %d times. After %d more unsuccessful attempts, the phone will be reset to factory default and all user data will be lost. You have incorrectly attempted to unlock the tablet %d times. The tablet will now be reset to factory default. You have incorrectly attempted to unlock the phone %d times. The phone will now be reset to factory default. Try again in %d seconds. Forgot pattern? Account unlock Too many pattern attempts! To unlock, sign in with your Google account Username (email) Password Sign in Invalid username or password. Forgot your username or password\?\nVisit google.com/accounts/recovery Checking... Unlock Sound on Sound off Pattern started Pattern cleared Cell added Pattern completed \?123 ABC ALT "%-l%P" "%-l%p" Factory test failed The FACTORY_TEST action is only supported for packages installed in /system/app. No package was found that provides the FACTORY_TEST action. Reboot Mozilla/5.0 (Linux; U; Android %s) AppleWebKit/534.30 (KHTML, like Gecko) Version/4.0 %sSafari/534.30 "Mobile " The page at \'%s\' says: JavaScript Navigate away from this page?\n\n%s\n\nSelect OK to continue, or Cancel to stay on the current page. Confirm Tip: double-tap to zoom in and out. AutoFill Setup AutoFill \u0020 $1$2$3 ,\u0020 $1$2$3 attention|attn province|region|other|provincia|bairro|suburb company|business|organization|organisation|department|firma|firmenname|empresa|societe|société|ragione.?sociale|会社|название.?компании|单位|公司 address.?line|address1|addr1|street|strasse|straße|hausnummer|housenumber|house.?name|direccion|dirección|adresse|indirizzo|住所1|morada|endereço|Адрес|地址 address|adresse|indirizzo|住所|地址 address.?line2|address2|addr2|street|suite|unit|adresszusatz|ergänzende.?angaben|direccion2|colonia|adicional|addresssuppl|complementnom|appartement|indirizzo2|住所2 address.?line3|address3|addr3|street|line3|municipio|batiment|residence|indirizzo3 country|location|国|国家 zip|postal|post code|pcode|^1z$|postleitzahl|cp|cdp|cap|郵便番号|codigo|codpos|cep|Почтовый.?Индекс|邮政编码|邮编|郵遞區號 zip|^-$|post2|codpos2 city|town|ort|stadt|suburb|ciudad|provincia|localidad|poblacion|ville|commune|localita|市区町村|cidade|Город|市|分區 state|county|region|province|land|county|principality|都道府県|estado|provincia|область|省|地區 same as use my bill ship e.?mail|メールアドレス|Электронной.?Почты|邮件|邮箱|電郵地址 user.?name|user.?id|vollständiger.?name|用户名 ^name|full.?name|your.?name|customer.?name|firstandlastname|nombre.*y.*apellidos|^nom|お名前|氏名|^nome|姓名 ^name|^nom|^nome irst.*name|initials|fname|first$|vorname|nombre|forename|prénom|prenom|名|nome|Имя middle.*initial|m\\.i\\.|mi$ middle.*name|mname|middle$|apellido.?materno|lastlastname last.*name|lname|surname|last$|nachname|apellidos|famille|^nom|cognome|姓|morada|apelidos|surename|sobrenome|Фамилия phone|telefonnummer|telefono|teléfono|telfixe|電話|telefone|telemovel|телефон|电话 area.*code|acode|area prefix|preselection|ddd suffix ext|ramal card.?holder|name.?on.?card|ccname|owner|karteninhaber|nombre.*tarjeta|nom.*carte|nome.*cart|名前|Имя.*карты|信用卡开户名|开户名|持卡人姓名|持卡人姓名 name verification|card identification|cvn|security code|cvv code|cvc number|card.?#|card.?no|ccnum|nummer|credito|numero|número|numéro|カード番号|Номер.*карты|信用卡号|信用卡号码|信用卡卡號 expir|exp.*month|exp.*date|ccmonth|gueltig|gültig|monat|fecha|date.*exp|scadenza|有効期限|validade|Срок действия карты|月 exp|^/|year|ablaufdatum|gueltig|gültig|yahr|fecha|scadenza|有効期限|validade|Срок действия карты|年|有效期 ^card fax|télécopie|telecopie|ファックス|факс|传真|傳真 country.*code|ccode|_cc ^\\($ ^-$|^\\)$ ^-$ Province Postal code State ZIP code County Island District Department Prefecture Parish Area Emirate read Browser\'s history and bookmarks Allows the application to read all the URLs that the Browser has visited, and all of the Browser\'s bookmarks. write Browser\'s history and bookmarks Allows an application to modify the Browser\'s history or bookmarks stored on your tablet. Malicious applications can use this to erase or modify your Browser\'s data. Allows an application to modify the Browser\'s history or bookmarks stored on your phone. Malicious applications can use this to erase or modify your Browser\'s data. set alarm in alarm clock Allows the application to set an alarm in an installed alarm clock application. Some alarm clock applications may not implement this feature. add voicemail Allows the application to add messages to your voicemail inbox. Modify Browser geolocation permissions Allows an application to modify the Browser\'s geolocation permissions. Malicious applications can use this to allow sending location information to arbitrary web sites. verify packages Allows the application to verify a package is installable. bind to a package verifier Allows the holder to make requests of package verifiers. Should never be needed for normal applications. Do you want the browser to remember this password? Not now Remember Never You do not have permission to open this page. Text copied to clipboard. More Menu+ space enter delete Search Search Search query Clear query Submit query Voice search 1 month ago Before 1 month ago 1 second ago %d seconds ago 1 minute ago %d minutes ago 1 hour ago %d hours ago Last %d days Last month Older yesterday %d days ago in 1 second in %d seconds in 1 minute in %d minutes in 1 hour in %d hours tomorrow in %d days 1 sec ago %d secs ago 1 min ago %d mins ago 1 hour ago %d hours ago yesterday %d days ago in 1 sec in %d secs in 1 min in %d mins in 1 hour in %d hours tomorrow in %d days on %s at %s in %s day days hour hours min mins sec secs week weeks year years Cannot play video Sorry, this video is not valid for streaming to this device. Sorry, this video cannot be played. OK "%1$s, %2$s" "noon" "Noon" "midnight" "Midnight" %1$02d:%2$02d %1$d:%2$02d:%3$02d Select all Cut Copy Paste Replace\u2026 Delete Copy URL Select text... Text selection add to dictionary delete Input method Text actions Low on space Tablet storage space is getting low. Phone storage space is getting low. OK Cancel OK Cancel Attention Loading... ON OFF Complete action using Use by default for this action. Clear default in Home Settings > Applications > Manage applications. Select an action Select an application for the USB device No applications can perform this action. Unfortunately, %1$s has stopped. Unfortunately, the process %1$s has stopped. %2$s is not responding.\n\nWould you like to close it? Activity %1$s is not responding.\n\nWould you like to close it? %1$s is not responding. Would you like to close it? Process %1$s is not responding.\n\nWould you like to close it? OK Report Wait Application redirected %1$s is now running. %1$s was originally launched. Scale Always show Re-enable this with Settings > Applications > Manage applications. The application %1$s (process %2$s) has violated its self-enforced StrictMode policy. The process %1$s has has violated its self-enforced StrictMode policy. Android is upgrading... Optimizing application %1$d of %2$d. Starting applications. Finishing boot. %1$s running Select to switch to application Switch applications? Another application is already running that must be stopped before you can start a new one. Return to %1$s Don\'t start the new application. Start %1$s Stop the old application without saving. Select an action for text Ringer volume Media volume Playing through Bluetooth Silent ringtone selected In-call volume Bluetooth in-call volume Alarm volume Notification volume Volume Bluetooth volume Ringtone volume Call volume Media volume Notification volume Default ringtone Default ringtone (%1$s) Silent Ringtones Unknown ringtone Wi-Fi network available Wi-Fi networks available Open Wi-Fi network available Open Wi-Fi networks available Sign in to Wi-Fi network %1$s Couldn\'t connect to Wi-Fi \u0020has a poor internet connection. AndroidAP Wi-Fi Direct Start Wi-Fi Direct operation. This will turn off Wi-Fi client/hotspot operation. Couldn\'t start Wi-Fi Direct Wi-Fi Direct connection setup request from %1$s. Click OK to accept. Wi-Fi Direct connection setup request from %1$s. Enter pin to proceed. WPS pin %1$s needs to be entered on the peer device %2$s for connection setup to proceed Wi-Fi Direct is on Touch for settings Insert character Unknown application Sending SMS messages A large number of SMS messages are being sent. Select \"OK\" to continue, or \"Cancel\" to stop sending. OK Cancel SIM card removed The mobile network will be unavailable until you restart with a valid SIM card inserted. Done SIM card added You must restart your device to access the mobile network. Restart Set time Set date Set Default %1$s, %2$s No permissions required Hide Show all USB Mass Storage USB connected You have connected to your computer via USB. Touch the button below if you want to copy files between your computer and your Android\u2018s USB storage. You have connected to your computer via USB. Touch the button below if you want to copy files between your computer and your Android\u2018s SD card. Turn on USB storage There is a problem using your USB storage for USB mass storage. There is a problem using your SD card for USB mass storage. USB connected Select to copy files to/from your computer. Turn off USB storage Select to turn off USB storage. USB storage in use Before turning off USB storage, make sure you have unmounted (\u201cejected\u201d) your Android\u2018s USB storage from your computer. Before turning off USB storage, make sure you have unmounted (\u201cejected\u201d) your Android\u2018s SD card from your computer. Turn off USB storage There was a problem turning off USB storage. Check to make sure you have unmounted the USB host, then try again. Turn on USB storage If you turn on USB storage, some applications you are using will stop and may be unavailable until you turn off USB storage. USB operation unsuccessful OK Connected as a media device Connected as a camera Connected as an installer Connected to a USB accessory Touch for other USB options Format USB storage Format SD card Format USB storage, erasing all files stored there? Action cannot be reversed! Are you sure you want to format the SD card? All data on your card will be lost. Format USB debugging connected Select to disable USB debugging. "" Select input method Configure input methods \u0020ABCDEFGHIJKLMNOPQRSTUVWXYZ \u00200123456789ABCDEFGHIJKLMNOPQRSTUVWXYZ candidates Preparing USB storage Preparing SD card Checking for errors. Blank USB storage Blank SD card USB storage blank or has unsupported filesystem. SD card blank or has unsupported filesystem. Damaged USB storage Damaged SD card USB storage damaged. You may have to reformat it. SD card damaged. You may have to reformat it. USB storage unexpectedly removed SD card unexpectedly removed Unmount USB storage before removing to avoid data loss. Unmount SD card before removing to avoid data loss. USB storage safe to remove SD card safe to remove You can safely remove USB storage. You can safely remove SD card. Removed USB storage Removed SD card USB storage removed. Insert new media. SD card removed. Insert a new one. No matching activities found update component usage statistics Allows the modification of collected component usage statistics. Not for use by normal applications. Allows to invoke default container service to copy content. Not for use by normal applications. Allows to invoke default container service to copy content. Not for use by normal applications. Tap twice for zoom control Error inflating widget Go Search Send Next Done Prev Execute Dial number\nusing %s Create contact\nusing %s The following one or more applications request permission to access your account, now and in the future. Do you want to allow this request? Access Request Allow Deny Permission Requested Permission Requested\nfor account %s Input method Sync Accessibility Wallpaper Change wallpaper /data/eri.xml VPN is activated. VPN is activated by %s Tap to manage the network. Connected to %s. Tap to manage the network. Choose file No file chosen Reset Submit Car mode enabled Select to exit car mode. Tethering or hotspot active Touch to configure Back Next Skip High mobile data use Touch to learn more about mobile data use Mobile data limit exceeded Touch to learn more about mobile data use No matches Find on page 1 match %d of %d Done Unmounting USB storage... Unmounting SD card... Erasing USB storage... Erasing SD card... Couldn\'t erase USB storage. Couldn\'t erase SD card. SD card was removed before being unmounted. USB storage is currently being checked. SD card is currently being checked. SD card has been removed. USB storage is currently in use by a computer. SD card is currently in use by a computer. External media in unknown state. Share Find Web Search Location request from %s Location request Requested by %1$s (%2$s) Yes No Delete limit exceeded There are %1$d deleted items for %2$s, account %3$s. What would you like to do? Delete the items. Undo the deletes. Do nothing for now. Select an account "Add an account" "Which account would you like to use?" Add account Increment Decrement %s tap and hold. Slide up to increment and down to decrement. Increment minute Decrement minute Increment hour Decrement hour Set PM Set AM Increment month Decrement month Increment day Decrement day Increment year Decrement year checked not checked selected not selected on off pressed not pressed Alt Cancel Delete Done Mode change Shift Enter Choose an application Share with Share with %s "Sliding handle. Tap and hold." Up for %s. Down for %s. "Left for %s. Right for %s. Unlock Camera Silent Sound on Swipe to unlock. Plug in a headset to hear password keys spoken aloud. Dot. Navigate home Navigate up More options Internal Storage SD Card USB storage Edit... Data usage warning Touch to view usage and settings 2G-3G data disabled 4G data disabled Mobile data disabled Wi-Fi data disabled Touch to enable 2G-3G data limit exceeded 4G data limit exceeded Mobile data limit exceeded Wi-Fi data limit exceeded %s over specified limit Background data restricted Touch to remove restriction Security certificate This certificate is valid. Issued to: Common name: Organization: Organizational unit: Issued by: Validity: Issued on: Expires on: Serial number: Fingerprints: SHA-256 fingerprint: SHA-1 fingerprint: See all... Select activity Share with... Device locked. ", " Sending... Launch Browser? Accept Call?