From 0688d9b792be3ee4418bfae65f214070e305f10a Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Kasz=C3=A1s=20Ferenc?= Date: Wed, 15 Dec 2010 21:31:20 +0100 Subject: New translation: hungarian added Change-Id: I05f80ad890001c2e9598b3bc7414f7618d148492 --- core/res/res/values-hu-rHU/strings.xml | 2295 ++++++++++++++++++++++++++++++++ 1 file changed, 2295 insertions(+) create mode 100644 core/res/res/values-hu-rHU/strings.xml diff --git a/core/res/res/values-hu-rHU/strings.xml b/core/res/res/values-hu-rHU/strings.xml new file mode 100644 index 0000000..9a3fbde --- /dev/null +++ b/core/res/res/values-hu-rHU/strings.xml @@ -0,0 +1,2295 @@ + + + + + B + + KB + + MB + + GB + + TB + + PB + + %1$s%2$s + + + <Névtelen> + + + \u2026 + + + (Nincs szám) + + + (Ismeretlen) + + + Hangposta + + + MSISDN1 + + + + Csatlakozási probléma, vagy MMI kód. + + Szolgáltatás engedélyezve. + + Szolgáltatás engedélyezve a következőkre: + + Szolgáltatás tiltva. + + Siekres regisztráció. + + Erasure was successful. + + Incorrect password. + + MMI complete. + + The old PIN you typed is not correct. + + The PUK you typed is not correct. + + The PINs you entered do not match. + + Type a PIN that is 4 to 8 numbers. + + Your SIM card is PUK-locked. Type the PUK code to unlock it. + Type PUK2 to unblock SIM card. + + + Incoming Caller ID + + Outgoing Caller ID + + Call forwarding + + Call waiting + + Call barring + + Password change + + PIN change + Calling number present + Calling number restricted + Three way calling + Rejection of undesired annoying calls + Calling number delivery + Do not disturb + + + Caller ID defaults to restricted. Next call: Restricted + + Caller ID defaults to restricted. Next call: Not restricted + + Caller ID defaults to not restricted. Next call: Restricted + + Caller ID defaults to not restricted. Next call: Not restricted + + + + Service not provisioned. + + The caller ID setting cannot be changed. + + + Restricted access changed + + Data service is blocked. + + Emergency service is blocked. + + Voice service is blocked. + + All Voice services are blocked. + + SMS service is blocked. + + Voice/Data services are blocked. + + Voice/SMS services are blocked. + + All Voice/Data/SMS services are blocked. + + + + Voice + + Data + + FAX + + SMS + + Async + + Sync + + Packet + + PAD + + + + Roaming Indicator On + Roaming Indicator Off + Roaming Indicator Flashing + Out of Neighborhood + Out of Building + Roaming - Preferred System + Roaming - Available System + Roaming - Alliance Partner + Roaming - Premium Partner + Roaming - Full Service Functionality + Roaming - Partial Service Functionality + Roaming Banner On + Roaming Banner Off + Searching for Service + + + + + {0}: Not forwarded + + {0}: {1} + + {0}: {1} after {2} seconds + + {0}: Not forwarded + + {0}: Not forwarded + + + + Feature code complete. + + Connection problem or invalid feature code. + + + OK + + The Web page contains an error. + + The URL could not be found. + + The site authentication scheme is not supported. + + Authentication was unsuccessful. + + Authentication via the proxy server was unsuccessful. + + The connection to the server was unsuccessful. + + The server failed to communicate. Try again later. + + The connection to the server timed out. + + The page contains too many server redirects. + + The protocol is not supported. + + A secure connection could not be established. + + The page could not be opened because the URL is invalid. + + The file could not be accessed. + + The requested file was not found. + + Too many requests are being processed. Try again later. + + + + Sign-in error for %1$s + + + + Sync + + Sync + + Too many %s deletes. + + + Phone storage is full! Delete some files to free space. + + + + Me + + + + Phone options + + Silent mode + + Turn on wireless + + Turn off wireless + + Screen lock + + Power off + + Reboot phone + + + Shutting down\u2026 + + + Rebooting\u2026 + + + Your phone will shut down. + + + Your phone will reboot. + + + Recent + + No recent applications. + + + Phone options + + + Screen lock + + + Power off + + + Reboot + + + Silent mode + + + Sound is OFF + + + Sound is ON + + + Airplane mode + + + Airplane mode is ON + + + Airplane mode is OFF + + + Safe mode + + + Android System + + + Services that cost you money + + Allow applications to do things + that can cost you money. + + + Your messages + + Read and write your SMS, + e-mail, and other messages. + + + Your personal information + + Direct access to your contacts + and calendar stored on the phone. + + + Your location + + Monitor your physical location + + + Network communication + + Allow applications to access + various network features. + + + Your accounts + + Access the available accounts. + + + Hardware controls + + Direct access to hardware on + the handset. + + + Phone calls + + Monitor, record, and process + phone calls. + + + System tools + + Lower-level access and control + of the system. + + + Development tools + + Features only needed for + application developers. + + + Storage + + Access the SD card. + + + + + disable or modify status bar + + Allows application to disable + the status bar or add and remove system icons. + + + expand/collapse status bar + + Allows application to + expand or collapse the status bar. + + + intercept outgoing calls + + Allows application to + process outgoing calls and change the number to be dialed. Malicious + applications may monitor, redirect, or prevent outgoing calls. + + + receive SMS + + Allows application to receive + and process SMS messages. Malicious applications may monitor + your messages or delete them without showing them to you. + + + receive MMS + + Allows application to receive + and process MMS messages. Malicious applications may monitor + your messages or delete them without showing them to you. + + + send SMS messages + + Allows application to send SMS + messages. Malicious applications may cost you money by sending + messages without your confirmation. + + + read SMS or MMS + + Allows application to read + SMS messages stored on your phone or SIM card. Malicious applications + may read your confidential messages. + + + edit SMS or MMS + + Allows application to write + to SMS messages stored on your phone or SIM card. Malicious applications + may delete your messages. + + + receive WAP + + Allows application to receive + and process WAP messages. Malicious applications may monitor + your messages or delete them without showing them to you. + + + retrieve running applications + + Allows application to retrieve + information about currently and recently running tasks. May allow + malicious applications to discover private information about other applications. + + + reorder running applications + + Allows an application to move + tasks to the foreground and background. Malicious applications can force + themselves to the front without your control. + + + enable application debugging + + Allows an application to turn + on debugging for another application. Malicious applications can use this + to kill other applications. + + + change your UI settings + + Allows an application to + change the current configuration, such as the locale or overall font + size. + + + enable car mode + + Allows an application to + enable the car mode. + + + kill background processes + + Allows an application to + kill background processes of other applications, even if memory + isn\'t low. + + + force stop other applications + + Allows an application to + forcibly stop other applications. + + + force application to close + + Allows an application to force any + activity that is in the foreground to close and go back. + Should never be needed for normal applications. + + + retrieve system internal state + + Allows application to retrieve + internal state of the system. Malicious applications may retrieve + a wide variety of private and secure information that they should + never normally need. + + + partial shutdown + + Puts the activity manager into a shutdown + state. Does not perform a complete shutdown. + + + prevent app switches + + Prevents the user from switching to + another application. + + + monitor and control all application launching + + Allows an application to + monitor and control how the system launches activities. + Malicious applications may completely compromise the system. This + permission is only needed for development, never for normal + phone usage. + + + send package removed broadcast + + Allows an application to + broadcast a notification that an application package has been removed. + Malicious applications may use this to kill any other running + application. + + + send SMS-received broadcast + + Allows an application to + broadcast a notification that an SMS message has been received. + Malicious applications may use this to forge incoming SMS messages. + + + send WAP-PUSH-received broadcast + + Allows an application to + broadcast a notification that a WAP PUSH message has been received. + Malicious applications may use this to forge MMS message receipt or to + silently replace the content of any web page with malicious variants. + + + limit number of running processes + + Allows an application + to control the maximum number of processes that will run. Never + needed for normal applications. + + + make all background applications close + + Allows an application + to control whether activities are always finished as soon as they + go to the background. Never needed for normal applications. + + + modify battery statistics + + Allows the modification of + collected battery statistics. Not for use by normal applications. + + + control system backup and restore + + Allows the application to control the system\'s backup and restore mechanism. Not for use by normal applications. + + + display unauthorized windows + + Allows the creation of + windows that are intended to be used by the internal system + user interface. Not for use by normal applications. + + + display system-level alerts + + Allows an application to + show system alert windows. Malicious applications can take over the + entire screen of the phone. + + + modify global animation speed + + Allows an application to change + the global animation speed (faster or slower animations) at any time. + + + manage application tokens + + Allows applications to + create and manage their own tokens, bypassing their normal + Z-ordering. Should never be needed for normal applications. + + + press keys and control buttons + + Allows an application to deliver + its own input events (key presses, etc.) to other applications. Malicious + applications can use this to take over the phone. + + + record what you type and actions you take + + Allows applications to watch the + keys you press even when interacting with another application (such + as entering a password). Should never be needed for normal applications. + + + bind to an input method + + Allows the holder to bind to the top-level + interface of an input method. Should never be needed for normal applications. + + + bind to a wallpaper + + Allows the holder to bind to the top-level + interface of a wallpaper. Should never be needed for normal applications. + + + interact with a device admin + + Allows the holder to send intents to + a device administrator. Should never be needed for normal applications. + + + change screen orientation + + Allows an application to change + the rotation of the screen at any time. Should never be needed for + normal applications. + + + send Linux signals to applications + + Allows application to request that the + supplied signal be sent to all persistent processes. + + + make application always run + + Allows an application to make + parts of itself persistent, so the system can\'t use it for other + applications. + + + delete applications + + Allows an application to delete + Android packages. Malicious applications can use this to delete important applications. + + + delete other applications\' data + + Allows an application to clear user data. + + delete other applications\' caches + + Allows an application to delete + cache files. + + + measure application storage space + + Allows an application to retrieve + its code, data, and cache sizes + + + directly install applications + + Allows an application to install new or updated + Android packages. Malicious applications can use this to add new applications with arbitrarily + powerful permissions. + + + delete all application cache data + + Allows an application to free phone storage + by deleting files in application cache directory. Access is very + restricted usually to system process. + + + Move application resources + + Allows an application to move application resources from internal to external media and vice versa. + + + read system log files + + Allows an application to read from the + system\'s various log files. This allows it to discover general + information about what you are doing with the phone, but they should + not contain any personal or private information. + + + read/write to resources owned by diag + + Allows an application to read and write to + any resource owned by the diag group; for example, files in /dev. This could + potentially affect system stability and security. This should be ONLY be used + for hardware-specific diagnostics by the manufacturer or operator. + + + enable or disable application components + + Allows an application to change whether a + component of another application is enabled or not. Malicious applications can use this + to disable important phone capabilities. Care must be used with permission, as it is + possible to get application components into an unusable, inconsistent, or unstable state. + + + + set preferred applications + + Allows an application to + modify your preferred applications. This can allow malicious applications + to silently change the applications that are run, spoofing your + existing applications to collect private data from you. + + + modify global system settings + + Allows an application to modify the + system\'s settings data. Malicious applications can corrupt your system\'s + configuration. + + modify secure system settings + Allows an application to modify the + system\'s secure settings data. Not for use by normal applications. + + + modify the Google services map + + Allows an application to modify the + Google services map. Not for use by normal applications. + + + automatically start at boot + + Allows an application to + have itself started as soon as the system has finished booting. + This can make it take longer to start the phone and allow the + application to slow down the overall phone by always running. + + + send sticky broadcast + + Allows an application to send + sticky broadcasts, which remain after the broadcast ends. + Malicious applications can make the phone slow or unstable by causing it + to use too much memory. + + + read contact data + + Allows an application to read all + of the contact (address) data stored on your phone. Malicious applications + can use this to send your data to other people. + + + write contact data + + Allows an application to modify the + contact (address) data stored on your phone. Malicious + applications can use this to erase or modify your contact data. + + + write owner data + + Allows an application to modify the + phone owner data stored on your phone. Malicious + applications can use this to erase or modify owner data. + + + read owner data + + Allows an application read the + phone owner data stored on your phone. Malicious + applications can use this to read phone owner data. + + + read calendar events + + Allows an application to read all + of the calendar events stored on your phone. Malicious applications + can use this to send your calendar events to other people. + + + add or modify calendar events and send email to guests + + Allows an application to add or change the + events on your calendar, which may send email to guests. Malicious applications can use this + to erase or modify your calendar events or to send email to guests. + + + mock location sources for testing + + Create mock location sources for testing. + Malicious applications can use this to override the location and/or status returned by real + location sources such as GPS or Network providers. + + + access extra location provider commands + + Access extra location provider commands. + Malicious applications could use this to interfere with the operation of the GPS + or other location sources. + + + permission to install a location provider + + Create mock location sources for testing. + Malicious applications can use this to override the location and/or status returned by real + location sources such as GPS or Network providers or monitor and report your location to an external source. + + + fine (GPS) location + + Access fine location sources such as the + Global Positioning System on the phone, where available. + Malicious applications can use this to determine where you are, and may + consume additional battery power. + + + coarse (network-based) location + + Access coarse location sources such as the cellular + network database to determine an approximate phone location, where available. Malicious + applications can use this to determine approximately where you are. + + + access SurfaceFlinger + + Allows application to use + SurfaceFlinger low-level features. + + + read frame buffer + + Allows application to + read the content of the frame buffer. + + + change your audio settings + + Allows application to modify + global audio settings such as volume and routing. + + + record audio + + Allows application to access + the audio record path. + + + take pictures + + Allows application to take pictures + with the camera. This allows the application at any time to collect + images the camera is seeing. + + + permanently disable phone + + Allows the application to + disable the entire phone permanently. This is very dangerous. + + + force phone reboot + + Allows the application to + force the phone to reboot. + + + mount and unmount filesystems + + Allows the application to mount and + unmount filesystems for removable storage. + + + format external storage + + Allows the application to format removable storage. + + + get information on secure storage + + Allows the application to get information on secure storage. + + + create secure storage + + Allows the application to create secure storage. + + + destroy secure storage + + Allows the application to destroy secure storage. + + + mount / unmount secure storage + + Allows the application to mount / unmount secure storage. + + + rename secure storage + + Allows the application to rename secure storage. + + + control vibrator + + Allows the application to control + the vibrator. + + + control flashlight + + Allows the application to control + the flashlight. + + + test hardware + + Allows the application to control + various peripherals for the purpose of hardware testing. + + + directly call phone numbers + + Allows the application to call + phone numbers without your intervention. Malicious applications may + cause unexpected calls on your phone bill. Note that this does not + allow the application to call emergency numbers. + + + directly call any phone numbers + + Allows the application to call + any phone number, including emergency numbers, without your intervention. + Malicious applications may place unnecessary and illegal calls to emergency + services. + + + directly start CDMA phone setup + + Allows the application to start CDMA provisioning. + Malicious applications may unnecessarily start CDMA provisioning + + + control location update notifications + + Allows enabling/disabling location + update notifications from the radio. Not for use by normal applications. + + + access checkin properties + + Allows read/write access to + properties uploaded by the checkin service. Not for use by normal + applications. + + + choose widgets + + Allows the application to tell the system + which widgets can be used by which application. With this permission, + applications can give access to personal data to other applications. + Not for use by normal applications. + + + modify phone state + + Allows the application to control the + phone features of the device. An application with this permission can switch + networks, turn the phone radio on and off and the like without ever notifying + you. + + + read phone state and identity + + Allows the application to access the phone + features of the device. An application with this permission can determine the phone + number and serial number of this phone, whether a call is active, the number that call + is connected to and the like. + + + prevent phone from sleeping + + Allows an application to prevent + the phone from going to sleep. + + + power phone on or off + + Allows the application to turn the + phone on or off. + + + run in factory test mode + + Run as a low-level manufacturer test, + allowing complete access to the phone hardware. Only available + when a phone is running in manufacturer test mode. + + + set wallpaper + + Allows the application + to set the system wallpaper. + + + set wallpaper size hints + + Allows the application + to set the system wallpaper size hints. + + + reset system to factory defaults + + Allows an application to completely + reset the system to its factory settings, erasing all data, + configuration, and installed applications. + + + set time + + Allows an application to change + the phone\'s clock time. + + + set time zone + + Allows an application to change + the phone\'s time zone. + + + act as the AccountManagerService + + Allows an + application to make calls to AccountAuthenticators + + + discover known accounts + + Allows an application to get + the list of accounts known by the phone. + + + act as an account authenticator + + Allows an application + to use the account authenticator capabilities of the + AccountManager, including creating accounts and getting and + setting their passwords. + + + manage the accounts list + + Allows an application to + perform operations like adding, and removing accounts and deleting + their password. + + + use the authentication + credentials of an account + + Allows an application to + request authentication tokens. + + + view network state + + Allows an application to view + the state of all networks. + + + full Internet access + + Allows an application to + create network sockets. + + + write Access Point Name settings + + Allows an application to modify the APN + settings, such as Proxy and Port of any APN. + + + change network connectivity + + Allows an application to change + the state of network connectivity. + + + Change tethered connectivity + + Allows an application to change + the state of tethered network connectivity. + + + change background data usage setting + + Allows an application to change + the background data usage setting. + + + view Wi-Fi state + + Allows an application to view + the information about the state of Wi-Fi. + + + change Wi-Fi state + + Allows an application to connect + to and disconnect from Wi-Fi access points, and to make changes to + configured Wi-Fi networks. + + + allow Wi-Fi Multicast + reception + + Allows an application to + receive packets not directly addressed to your device. This can be + useful when discovering services offered near by. It uses more power + than the non-multicast mode. + + + bluetooth administration + + Allows an application to configure + the local Bluetooth phone, and to discover and pair with remote + devices. + + + create Bluetooth connections + + Allows an application to view + configuration of the local Bluetooth phone, and to make and accept + connections with paired devices. + + + disable keylock + + Allows an application to disable + the keylock and any associated password security. A legitimate example of + this is the phone disabling the keylock when receiving an incoming phone call, + then re-enabling the keylock when the call is finished. + + + read sync settings + + Allows an application to read the sync settings, + such as whether sync is enabled for Contacts. + + + write sync settings + + Allows an application to modify the sync + settings, such as whether sync is enabled for Contacts. + + + read sync statistics + + Allows an application to read the sync stats; e.g., the + history of syncs that have occurred. + + + read subscribed feeds + + Allows an application to get details about the currently synced feeds. + + + write subscribed feeds + + Allows an application to modify + your currently synced feeds. This could allow a malicious application to + change your synced feeds. + + + read user defined dictionary + + Allows an application to read any private + words, names and phrases that the user may have stored in the user dictionary. + + + write to user defined dictionary + + Allows an application to write new words into the + user dictionary. + + + modify/delete SD card contents + + Allows an application to write to the SD card. + + + access the cache filesystem + + Allows an application to read and write the cache filesystem. + + + + + Limit password + + Restrict the types of passwords you + are allowed to use. + + Watch login attempts + + Monitor failed attempts to login to + the device, to perform some action. + + Reset password + + Force your password + to a new value, requiring the administrator give it to you + before you can log in. + + Force lock + + Control when device locks, + requiring you re-enter its password. + + Erase all data + + Perform a factory reset, deleting + all of your data without any confirmation. + + + + + Home + Mobile + Work + Work Fax + Home Fax + Pager + Other + Custom + + + + + + Home + Work + Other + Custom + + + + + + Home + Work + Other + Custom + + + + + + Home + Work + Other + Custom + + + + + + Work + Other + Custom + + + + + + AIM + Windows Live + Yahoo + Skype + QQ + Google Talk + ICQ + Jabber + + + + Custom + + Home + + Mobile + + Work + + Work Fax + + Home Fax + + Pager + + Other + + Callback + + Car + + Company Main + + ISDN + + Main + + Other Fax + + Radio + + Telex + + TTY TDD + + Work Mobile + + Work Pager + + Assistant + + MMS + + + Birthday + + Anniversary + + Event + + + Custom + + Home + + Work + + Other + + Mobile + + + Custom + + Home + + Work + + Other + + + Custom + + Home + + Work + + Other + + + Custom + + AIM + + Windows Live + + Yahoo + + Skype + + QQ + + Google Talk + + ICQ + + Jabber + + NetMeeting + + + Work + + Other + + Custom + + + via %1$s + + + %1$s via %2$s + + + Enter PIN code + + + Enter password to unlock + + + Incorrect PIN code! + + + To unlock, press Menu then 0. + + + Emergency number + + + + + (No service) + + + Screen locked. + + + Press Menu to unlock or place emergency call. + + + Press Menu to unlock. + + + Draw pattern to unlock + + Emergency call + + Return to call + + Correct! + + Sorry, try again + + + Charging (%d%%) + + Charged. + + %d%% + + + Connect your charger. + + + No SIM card. + + No SIM card in phone. + + Please insert a SIM card. + + + Emergency calls only + + + Network locked + + + + SIM card is PUK-locked. + + Please see the User Guide or contact Customer Care. + + + SIM card is locked. + + + Unlocking SIM card\u2026 + + + + You have incorrectly drawn your unlock pattern %d times. + \n\nPlease try again in %d seconds. + + + + + You have incorrectly drawn your unlock pattern %d times. + After %d more unsuccessful attempts, + you will be asked to unlock your phone using your Google sign-in.\n\n + Please try again in %d seconds. + + + + Try again in %d seconds. + + + Forgot pattern? + + + Account unlock + + Too many pattern attempts! + + To unlock, sign in with your Google account + + Username (email) + + Password + + Sign in + + Invalid username or password. + + + Checking... + + Unlock + + Sound on + + Sound off + + + Phone + + Messaging + + + + \?123 + + ABC + + ALT + + + "%-l%P" + + + "%-l%p" + + + Clear + + + No notifications + + + Ongoing + + + Notifications + + + %d%% + + + Charging\u2026 + + + Please connect charger + + + The battery is getting low: + + + %d%% + or less remaining. + + + Battery use + + + Factory test failed + + The FACTORY_TEST action + is only supported for packages installed in /system/app. + + No package was found that provides the + FACTORY_TEST action. + + Reboot + + + Mozilla/5.0 (Linux; U; Android %s) + AppleWebKit/533.1 (KHTML, like Gecko) Version/4.0 Mobile Safari/533.1 + + + The page at \'%s\' says: + + JavaScript + + Navigate away from this page?\n\n%s\n\nSelect OK to continue, or Cancel to stay on the current page. + + + Confirm + + + Tip: double-tap to zoom in and out. + + + read Browser\'s history and bookmarks + + Allows the application to read all + the URLs that the Browser has visited, and all of the Browser\'s bookmarks. + + write Browser\'s history and bookmarks + + Allows an application to modify the + Browser\'s history or bookmarks stored on your phone. Malicious applications + can use this to erase or modify your Browser\'s data. + + + Modify Browser geolocation permissions + + Allows an application to modify the + Browser\'s geolocation permissions. Malicious applications + can use this to allow sending location information to arbitrary web sites. + + + Do you want the browser to remember this password? + + Not now + + Remember + + Never + + + You do not have permission to open this page. + + + Text copied to clipboard. + + + More + + Menu+ + + space + + enter + + delete + + + + + Search + + + 1 month ago + + Before 1 month ago + + + + 1 second ago + %d seconds ago + + + + + 1 minute ago + %d minutes ago + + + + + 1 hour ago + %d hours ago + + + + + Last %d days + + + + Last month + + + Older + + + + yesterday + %d days ago + + + + + in 1 second + in %d seconds + + + + + in 1 minute + in %d minutes + + + + + in 1 hour + in %d hours + + + + + tomorrow + in %d days + + + + + 1 sec ago + %d secs ago + + + + + 1 min ago + %d mins ago + + + + + 1 hour ago + %d hours ago + + + + + yesterday + %d days ago + + + + + in 1 sec + in %d secs + + + + + in 1 min + in %d mins + + + + + in 1 hour + in %d hours + + + + + tomorrow + in %d days + + + + on %s + + at %s + + in %s + + + day + + days + + hour + + hours + + min + + mins + + sec + + secs + + week + + weeks + + year + + years + + + + Cannot play video + + Sorry, this video is not valid for streaming to this device. + + Sorry, this video cannot be played. + + OK + + + + + + "%1$s, %2$s" + + + + "noon" + + "Noon" + + "midnight" + + "Midnight" + + + + + + + + + + + + + %1$02d:%2$02d + + + %1$d:%2$02d:%3$02d + + + Select all + + + Select text + + + Stop selecting text + + + Cut + + + Cut all + + + Copy + + + Copy all + + + Paste + + + Copy URL + + + Input method + + + "Add \"%s\" to dictionary + + + Edit text + + + Low on space + + Phone storage space is getting low. + + + OK + + Cancel + + OK + + Cancel + + Attention + + + ON + + OFF + + + Complete action using + + Use by default for this action. + + Clear default in Home Settings > Applications > Manage applications. + + Select an action + + No applications can perform this action. + + Sorry! + + The application %1$s + (process %2$s) has stopped unexpectedly. Please try again. + + The process %1$s has + stopped unexpectedly. Please try again. + + Sorry! + + Activity %1$s (in application %2$s) is not responding. + + Activity %1$s (in process %2$s) is not responding. + + Application %1$s (in process %2$s) is not responding. + + Process %1$s is not responding. + + Force close + + Report + + Wait + + + Select an action for text + + + Ringer volume + + Media volume + + Playing through Bluetooth + + Silent ringtone selected + + In-call volume + + Bluetooth in-call volume + + Alarm volume + + Notification volume + + Volume + + + + Default ringtone + + Default ringtone (%1$s) + + Silent + + Ringtones + + Unknown ringtone + + + + Wi-Fi network available + Wi-Fi networks available + + + + Open Wi-Fi network available + Open Wi-Fi networks available + + + AndroidAP + + + Insert character + + + + Unknown application + + Sending SMS messages + + A large number of SMS messages are being sent. Select \"OK\" to continue, or \"Cancel\" to stop sending. + + OK + + Cancel + + + Set + + + + Default + + %1$s, %2$s + + No permissions required + + Hide + + Show all + + + + USB Mass Storage + + + USB connected + + You have connected your phone to your computer via USB. Select the button below if you want to copy files between your computer and your Android\u2018s SD card. + + Turn on USB storage + + There is a problem using your SD card for USB storage. + + USB connected + + Select to copy files to/from your computer. + + + Turn off USB storage + + Select to turn off USB storage. + + + + + USB storage in use + + Before turning off USB storage, make sure you have unmounted (\u201cejected\u201d) your Android\u2018s SD card from your computer. + + Turn off USB storage + + There was a problem turning off USB storage. Check to make sure you have unmounted the USB host, then try again. + + + Turn on USB storage + + If you turn on USB storage, some applications you are using will stop and may be unavailable until you turn off USB storage. + + USB operation failed + + OK + + + + + Format SD card + + Are you sure you want to format the SD card? All data on your card will be lost. + + Format + + + USB debugging connected + + Select to disable USB debugging. + + + + + + + "" + + + Select input method + + \u0020ABCDEFGHIJKLMNOPQRSTUVWXYZ + \u00200123456789ABCDEFGHIJKLMNOPQRSTUVWXYZ + + candidates + + + + Preparing SD card + Checking for errors. + + + Blank SD card + SD card blank or has unsupported filesystem. + + + Damaged SD card + SD card damaged. You may have to reformat it. + + + SD card unexpectedly removed + Unmount SD card before removing to avoid data loss. + + + SD card safe to remove + You can safely remove SD card. + + + Removed SD card + SD card removed. Insert a new one. + + + No matching activities found + + + + update component usage statistics + + Allows the modification of collected component usage statistics. Not for use by normal applications. + + + + Allows to invoke default container service to copy content. Not for use by normal applications. + + Allows to invoke default container service to copy content. Not for use by normal applications. + + + Tap twice for zoom control + + + + Error inflating widget + + + Go + + + Search + + + Send + + + Next + + + Done + + + Execute + + + + + + + Dial number\nusing %s + + + Create contact\nusing %s + + + + + + + + + + checked + + + not checked + + The following one or more applications request permission to access your account, now and in the future. + Do you want to allow this request? + Access Request + Allow + Deny + Permission Requested + Permission Requested\nfor account %s + + + Input method + + Sync + + Accessibility + + Wallpaper + + Change wallpaper + + + /data/eri.xml + + Point-to-Point Tunneling Protocol + Layer 2 Tunneling Protocol + Pre-shared key based L2TP/IPSec VPN + Certificate based L2TP/IPSec VPN + OpenVPN SSL VPN + + + + Choose file + + Reset + + Submit + + + favorite + + + + Car mode enabled + Select to exit car mode. + + + + Tethering or hotspot active + Touch to configure + + + + High mobile data use + Touch to learn more about mobile data use + + + + Mobile data limit exceeded + Touch to learn more about mobile data use + + + Caution: Reboot recommended after finishing customization! + + + Application killed + -- cgit v1.1