From 13a6ad89dfc5d914e78e2a1482715fe2e2bfc4f6 Mon Sep 17 00:00:00 2001 From: Claudia de Veaux Date: Fri, 21 Oct 2011 16:31:38 -0700 Subject: [PATCH] String scrub to implement punc, wording, cap standards. Bugs: 5165745, 5163232, 5162668, 5162667, 5162328 Change-Id: Ia0417a00f236660134ca86f91a78c92dc94d4ed0 More edits after self-review. --- core/res/res/values/strings.xml | 837 +++++++++++++++----------------- 1 file changed, 404 insertions(+), 433 deletions(-) diff --git a/core/res/res/values/strings.xml b/core/res/res/values/strings.xml index fb4783b518024..a44e809948ab2 100755 --- a/core/res/res/values/strings.xml +++ b/core/res/res/values/strings.xml @@ -38,7 +38,7 @@ - <untitled> + <Untitled> @@ -84,11 +84,11 @@ MMI complete. - The old PIN you typed is not correct. + The old PIN you typed isn\'t correct. - The PUK you typed is not correct. + The PUK you typed isn\'t correct. - The PINs you entered do not match. + The PINs you typed don\'t match. Type a PIN that is 4 to 8 numbers. @@ -132,7 +132,7 @@ Service not provisioned. - The caller ID setting cannot be changed. + You can\'t change the caller ID setting. Restricted access changed @@ -221,7 +221,7 @@ The URL could not be found. - The site authentication scheme is not supported. + The site authentication scheme isn\'t supported. Authentication was unsuccessful. @@ -235,7 +235,7 @@ The page contains too many server redirects. - The protocol is not supported. + The protocol isn\'t supported. A secure connection could not be established. @@ -301,7 +301,7 @@ the user if they'd like to shut down. This is the message. This is used instead of shutdown_confirm when the system is configured to use long press to go directly to the power off dialog instead of the global actions menu. --> - Would you like to shut down? + Do you want to shut down? - No recent applications. + No recent apps. Tablet options @@ -359,14 +359,13 @@ Services that cost you money - Allow applications to do things + Allow apps to do things that can cost you money. Your messages - Read and write your SMS, - e-mail, and other messages. + Read and write your SMS, email, and other messages. Your personal information @@ -385,8 +384,7 @@ Network communication - Allow applications to access - various network features. + Allow apps to access various network features. Your accounts @@ -396,26 +394,22 @@ Hardware controls - Direct access to hardware on - the handset. + Direct access to hardware on the handset. Phone calls - Monitor, record, and process - phone calls. + Monitor, record, and process phone calls. System tools - Lower-level access and control - of the system. + Lower-level access and control of the system. Development tools - Features only needed for - application developers. + Features only needed for app developers. Storage @@ -429,165 +423,163 @@ disable or modify status bar - Allows application to disable - the status bar or add and remove system icons. + Allows the app to disable the status bar or add and remove system icons. status bar - Allows the application to be the status bar. + Allows the app to be the status bar. expand/collapse status bar - Allows application to + Allows the app to expand or collapse the status bar. intercept outgoing calls - Allows application to - process outgoing calls and change the number to be dialed. Malicious - applications may monitor, redirect, or prevent outgoing calls. + Allows the app to + process outgoing calls and change the number to be dialed. Malicious + apps may monitor, redirect, or prevent outgoing calls. receive SMS - Allows application to receive - and process SMS messages. Malicious applications may monitor + Allows the app to receive + and process SMS messages. Malicious apps may monitor your messages or delete them without showing them to you. receive MMS - Allows application to receive - and process MMS messages. Malicious applications may monitor + Allows the app to receive + and process MMS messages. Malicious apps may monitor your messages or delete them without showing them to you. receive emergency broadcasts - Allows application to receive + Allows the app to receive and process emergency broadcast messages. This permission is only available - to system applications. + to system apps. send SMS messages - Allows application to send SMS - messages. Malicious applications may cost you money by sending + Allows the app to send SMS + messages. Malicious apps may cost you money by sending messages without your confirmation. send SMS messages with no confirmation - Allows application to send SMS - messages. Malicious applications may cost you money by sending + Allows the app to send SMS + messages. Malicious apps may cost you money by sending messages without your confirmation. read SMS or MMS - Allows application to read - SMS messages stored on your tablet or SIM card. Malicious applications + Allows the app to read + SMS messages stored on your tablet or SIM card. Malicious apps may read your confidential messages. - Allows application to read - SMS messages stored on your phone or SIM card. Malicious applications + Allows the app to read + SMS messages stored on your phone or SIM card. Malicious apps may read your confidential messages. edit SMS or MMS - Allows application to write - to SMS messages stored on your tablet or SIM card. Malicious applications + Allows the app to write + to SMS messages stored on your tablet or SIM card. Malicious apps may delete your messages. - Allows application to write - to SMS messages stored on your phone or SIM card. Malicious applications + Allows the app to write + to SMS messages stored on your phone or SIM card. Malicious apps may delete your messages. receive WAP - Allows application to receive - and process WAP messages. Malicious applications may monitor + Allows the app to receive + and process WAP messages. Malicious apps may monitor your messages or delete them without showing them to you. - retrieve running applications + retrieve running apps - Allows application to retrieve - information about currently and recently running tasks. May allow - malicious applications to discover private information about other applications. + Allows the app to retrieve + information about currently and recently running tasks. Malicious apps may + discover private information about other apps. - reorder running applications + reorder running apps - Allows an application to move - tasks to the foreground and background. Malicious applications can force + Allows the app to move + tasks to the foreground and background. Malicious apps may force themselves to the front without your control. - stop running applications + stop running apps - Allows an application to remove - tasks and kill their applications. Malicious applications can disrupt - the behavior of other applications. + Allows an app to remove + tasks and kill their apps. Malicious apps may disrupt + the behavior of other apps. - enable application debugging + enable app debugging - Allows an application to turn - on debugging for another application. Malicious applications can use this - to kill other applications. + Allows an app to turn + on debugging for another app. Malicious apps may use this + to kill other apps. change your UI settings - Allows an application to + Allows an app to change the current configuration, such as the locale or overall font size. enable car mode - Allows an application to + Allows the app to enable the car mode. kill background processes - Allows an application to - kill background processes of other applications, even if memory + Allows the app to + kill background processes of other apps, even if memory isn\'t low. - force stop other applications + force stop other apps - Allows an application to - forcibly stop other applications. + Allows the app to forcibly stop other apps. - force application to close + force app to close - Allows an application to force any + Allows the app to force any activity that is in the foreground to close and go back. - Should never be needed for normal applications. + Should never be needed for normal apps. retrieve system internal state - Allows application to retrieve - internal state of the system. Malicious applications may retrieve + Allows the app to retrieve + internal state of the system. Malicious apps may retrieve a wide variety of private and secure information that they should never normally need. retrieve screen content - Allows application to retrieve - the content of the active window. Malicious applications may retrieve + Allows the app to retrieve + the content of the active window. Malicious apps may retrieve the entire window content and examine all its text except passwords. @@ -600,232 +592,231 @@ prevent app switches Prevents the user from switching to - another application. + another app. - monitor and control all application launching + monitor and control all app launching - Allows an application to + Allows the app to monitor and control how the system launches activities. - Malicious applications may completely compromise the system. This + Malicious apps may completely compromise the system. This permission is only needed for development, never for normal use. send package removed broadcast - Allows an application to - broadcast a notification that an application package has been removed. - Malicious applications may use this to kill any other running - application. + Allows the app to + broadcast a notification that an app package has been removed. + Malicious apps may use this to kill any other running + app. send SMS-received broadcast - Allows an application to + Allows the app to broadcast a notification that an SMS message has been received. - Malicious applications may use this to forge incoming SMS messages. + Malicious apps may use this to forge incoming SMS messages. send WAP-PUSH-received broadcast - Allows an application to + Allows the app to broadcast a notification that a WAP PUSH message has been received. - Malicious applications may use this to forge MMS message receipt or to - silently replace the content of any web page with malicious variants. + Malicious apps may use this to forge MMS message receipt or to + silently replace the content of any webpage with malicious variants. limit number of running processes - Allows an application + Allows the app to control the maximum number of processes that will run. Never - needed for normal applications. + needed for normal apps. - make all background applications close + make all background apps close - Allows an application + Allows the app to control whether activities are always finished as soon as they - go to the background. Never needed for normal applications. + go to the background. Never needed for normal apps. modify battery statistics - Allows the modification of - collected battery statistics. Not for use by normal applications. + Allows the app to modify + collected battery statistics. Not for use by normal apps. control system backup and restore - Allows the application to control the system\'s backup and restore mechanism. Not for use by normal applications. + Allows the app to control the system\'s backup and restore mechanism. Not for use by normal apps. confirm a full backup or restore operation - Allows the application to launch the full backup confirmation UI. Not to be used by any application. + Allows the app to launch the full backup confirmation UI. Not to be used by any app. display unauthorized windows - Allows the creation of + Allows an app to create windows that are intended to be used by the internal system - user interface. Not for use by normal applications. + user interface. Not for use by normal apps. display system-level alerts - Allows an application to - show system alert windows. Malicious applications can take over the + Allows the app to + show system alert windows. Malicious apps may take over the entire screen. modify global animation speed - Allows an application to change + Allows an app to change the global animation speed (faster or slower animations) at any time. - manage application tokens + manage app tokens - Allows applications to + Allows the app to create and manage their own tokens, bypassing their normal - Z-ordering. Should never be needed for normal applications. + Z-ordering. Should never be needed for normal apps. press keys and control buttons - Allows an application to deliver - its own input events (key presses, etc.) to other applications. Malicious - applications can use this to take over the tablet. + Allows the app to deliver + its own input events (key presses, etc.) to other apps. Malicious + apps may use this to take over the tablet. - Allows an application to deliver - its own input events (key presses, etc.) to other applications. Malicious - applications can use this to take over the phone. + Allows the app to deliver + its own input events (key presses, etc.) to other apps. Malicious + apps may use this to take over the phone. record what you type and actions you take - Allows applications to watch the - keys you press even when interacting with another application (such - as entering a password). Should never be needed for normal applications. + Allows the app to watch the + keys you press even when interacting with another app (such + as typing a password). Should never be needed for normal apps. bind to an input method Allows the holder to bind to the top-level - interface of an input method. Should never be needed for normal applications. + interface of an input method. Should never be needed for normal apps. bind to a text service Allows the holder to bind to the top-level - interface of a text service(e.g. SpellCheckerService). Should never be needed for normal applications. + interface of a text service(e.g. SpellCheckerService). Should never be needed for normal apps. bind to a VPN service Allows the holder to bind to the top-level - interface of a Vpn service. Should never be needed for normal applications. + interface of a Vpn service. Should never be needed for normal apps. bind to a wallpaper Allows the holder to bind to the top-level - interface of a wallpaper. Should never be needed for normal applications. + interface of a wallpaper. Should never be needed for normal apps. bind to a widget service Allows the holder to bind to the top-level - interface of a widget service. Should never be needed for normal applications. + interface of a widget service. Should never be needed for normal apps. interact with a device admin Allows the holder to send intents to - a device administrator. Should never be needed for normal applications. + a device administrator. Should never be needed for normal apps. change screen orientation - Allows an application to change + Allows the app to change the rotation of the screen at any time. Should never be needed for - normal applications. + normal apps. change pointer speed - Allows an application to change + Allows the app to change the mouse or trackpad pointer speed at any time. Should never be needed for - normal applications. + normal apps. - send Linux signals to applications + send Linux signals to apps - Allows application to request that the + Allows the app to request that the supplied signal be sent to all persistent processes. - make application always run + make app always run - Allows an application to make + Allows the app to make parts of itself persistent, so the system can\'t use it for other - applications. + apps. - delete applications + delete apps - Allows an application to delete - Android packages. Malicious applications can use this to delete important applications. + Allows the app to delete + Android packages. Malicious apps may use this to delete important apps. - delete other applications\' data + delete other apps\' data - Allows an application to clear user data. + Allows the app to clear user data. - delete other applications\' caches + delete other apps\' caches - Allows an application to delete + Allows the app to delete cache files. - measure application storage space + measure app storage space - Allows an application to retrieve - its code, data, and cache sizes + Allows the app to retrieve its code, data, and cache sizes - directly install applications + directly install apps - Allows an application to install new or updated - Android packages. Malicious applications can use this to add new applications with arbitrarily + Allows the app to install new or updated + Android packages. Malicious apps may use this to add new apps with arbitrarily powerful permissions. - delete all application cache data + delete all app cache data - Allows an application to free tablet storage - by deleting files in application cache directory. Access is very + Allows the app to free tablet storage + by deleting files in app cache directory. Access is very restricted usually to system process. - Allows an application to free phone storage - by deleting files in application cache directory. Access is very + Allows the app to free phone storage + by deleting files in app cache directory. Access is very restricted usually to system process. - Move application resources + move app resources - Allows an application to move application resources from internal to external media and vice versa. + Allows the app to move app resources from internal to external media and vice versa. read sensitive log data - Allows an application to read from the + Allows the app to read from the system\'s various log files. This allows it to discover general information about what you are doing with the tablet, potentially including personal or private information. - Allows an application to read from the + Allows the app to read from the system\'s various log files. This allows it to discover general information about what you are doing with the phone, potentially including personal or private information. @@ -833,164 +824,164 @@ read/write to resources owned by diag - Allows an application to read and write to + Allows the app to read and write to any resource owned by the diag group; for example, files in /dev. This could potentially affect system stability and security. This should be ONLY be used for hardware-specific diagnostics by the manufacturer or operator. - enable or disable application components + enable or disable app components - Allows an application to change whether a - component of another application is enabled or not. Malicious applications can use this + Allows the app to change whether a + component of another app is enabled or not. Malicious apps may use this to disable important tablet capabilities. Care must be used with this permission, as it is - possible to get application components into an unusable, inconsistent, or unstable state. + possible to get app components into an unusable, inconsistent, or unstable state. - Allows an application to change whether a - component of another application is enabled or not. Malicious applications can use this + Allows the app to change whether a + component of another app is enabled or not. Malicious apps may use this to disable important phone capabilities. Care must be used with this permission, as it is - possible to get application components into an unusable, inconsistent, or unstable state. + possible to get app components into an unusable, inconsistent, or unstable state. - set preferred applications + set preferred apps - Allows an application to - modify your preferred applications. This can allow malicious applications - to silently change the applications that are run, spoofing your - existing applications to collect private data from you. + Allows the app to + modify your preferred apps. Malicious apps may + silently change the apps that are run, spoofing your + existing apps to collect private data from you. modify global system settings - Allows an application to modify the - system\'s settings data. Malicious applications can corrupt your system\'s + Allows the app to modify the + system\'s settings data. Malicious apps may corrupt your system\'s configuration. modify secure system settings - Allows an application to modify the - system\'s secure settings data. Not for use by normal applications. + Allows the app to modify the + system\'s secure settings data. Not for use by normal apps. modify the Google services map - Allows an application to modify the - Google services map. Not for use by normal applications. + Allows the app to modify the + Google services map. Not for use by normal apps. automatically start at boot - Allows an application to + Allows the app to have itself started as soon as the system has finished booting. This can make it take longer to start the tablet and allow the - application to slow down the overall tablet by always running. + app to slow down the overall tablet by always running. - Allows an application to + Allows the app to have itself started as soon as the system has finished booting. This can make it take longer to start the phone and allow the - application to slow down the overall phone by always running. + app to slow down the overall phone by always running. send sticky broadcast - Allows an application to send + Allows the app to send sticky broadcasts, which remain after the broadcast ends. - Malicious applications can make the tablet slow or unstable by causing it + Malicious apps may make the tablet slow or unstable by causing it to use too much memory. - Allows an application to send + Allows the app to send sticky broadcasts, which remain after the broadcast ends. - Malicious applications can make the phone slow or unstable by causing it + Malicious apps may make the phone slow or unstable by causing it to use too much memory. read contact data - Allows an application to read all - of the contact (address) data stored on your tablet. Malicious applications - can use this to send your data to other people. + Allows the app to read all + of the contact (address) data stored on your tablet. Malicious apps + may use this to send your data to other people. - Allows an application to read all - of the contact (address) data stored on your phone. Malicious applications - can use this to send your data to other people. + Allows the app to read all + of the contact (address) data stored on your phone. Malicious apps + may use this to send your data to other people. write contact data - Allows an application to modify the + Allows the app to modify the contact (address) data stored on your tablet. Malicious - applications can use this to erase or modify your contact data. + apps may use this to erase or modify your contact data. - Allows an application to modify the + Allows the app to modify the contact (address) data stored on your phone. Malicious - applications can use this to erase or modify your contact data. + apps may use this to erase or modify your contact data. read your profile data - Allows the application to read personal + Allows the app to read personal profile information stored on your device, such as your name and contact information. This - means the application can identify you and send your profile information to others. + means the app can identify you and send your profile information to others. write to your profile data - Allows the application to change or add + Allows the app to change or add to personal profile information stored on your device, such as your name and contact - information. This means other applications can identify you and send your profile + information. This means other apps can identify you and send your profile information to others. read your social stream - Allows the application to access - and sync social updates from you and your friends. Malicious apps can use this to read + Allows the app to access + and sync social updates from you and your friends. Malicious apps may use this to read private communications between you and your friends on social networks. write to your social stream - Allows the application to display - social updates from your friends. Malicious apps can use this to pretend to be a friend + Allows the app to display + social updates from your friends. Malicious apps may use this to pretend to be a friend and trick you into revealing passwords or other confidential information. read calendar events plus confidential information - Allows an application to read all calendar - events stored on your tablet, including those of friends or coworkers. A malicious application with - this permission can extract personal information from these calendars without the owners\' knowledge. + Allows the app to read all calendar + events stored on your tablet, including those of friends or coworkers. Malicious apps + may extract personal information from these calendars without the owners\' knowledge. - Allows an application to read all calendar - events stored on your phone, including those of friends or coworkers. A malicious application with - this permission can extract personal information from these calendars without the owners\' knowledge. + Allows the app to read all calendar + events stored on your phone, including those of friends or coworkers. Malicious apps + may extract personal information from these calendars without the owners\' knowledge. add or modify calendar events and send email to guests without owners\' knowledge - Allows an application to send event invitations as the calendar owner and add, remove, - change events that you can modify on your device, including those of friends or co-workers. A malicious application with this permission - can send spam emails that appear to come from calendar owners, modify events without the owners\' knowledge, or add fake events. + Allows the app to send event invitations as the calendar owner and add, remove, + change events that you can modify on your device, including those of friends or co-workers. Malicious apps + may send spam emails that appear to come from calendar owners, modify events without the owners\' knowledge, or add fake events. mock location sources for testing - Create mock location sources for testing. - Malicious applications can use this to override the location and/or status returned by real - location sources such as GPS or Network providers. + Allows the app to create mock location sources for testing. + Malicious apps may use this to override the location and/or status returned by real + location sources such as GPS or network providers. access extra location provider commands - Access extra location provider commands. - Malicious applications could use this to interfere with the operation of the GPS + Allows the app to access extra location provider commands. + Malicious apps may use this to interfere with the operation of the GPS or other location sources. permission to install a location provider Create mock location sources for testing. - Malicious applications can use this to override the location and/or status returned by real + Malicious apps may use this to override the location and/or status returned by real location sources such as GPS or Network providers or monitor and report your location to an external source. @@ -998,12 +989,12 @@ Access fine location sources such as the Global Positioning System on the tablet, where available. - Malicious applications can use this to determine where you are, and may + Malicious apps may use this to determine where you are, and may consume additional battery power. Access fine location sources such as the Global Positioning System on the phone, where available. - Malicious applications can use this to determine where you are, and may + Malicious apps may use this to determine where you are, and may consume additional battery power. @@ -1011,41 +1002,41 @@ Access coarse location sources such as the cellular network database to determine an approximate tablet location, where available. Malicious - applications can use this to determine approximately where you are. + apps may use this to determine approximately where you are. Access coarse location sources such as the cellular network database to determine an approximate phone location, where available. Malicious - applications can use this to determine approximately where you are. + apps may use this to determine approximately where you are. access SurfaceFlinger - Allows application to use + Allows the app to use SurfaceFlinger low-level features. read frame buffer - Allows application to + Allows the app to read the content of the frame buffer. change your audio settings - Allows application to modify + Allows the app to modify global audio settings such as volume and routing. record audio - Allows application to access + Allows the app to access the audio record path. take pictures and videos - Allows application to take pictures and videos - with the camera. This allows the application at any time to collect + Allows the app to take pictures and videos + with the camera. This allows the app at any time to collect images the camera is seeing. @@ -1053,10 +1044,10 @@ permanently disable phone - Allows the application to + Allows the app to disable the entire tablet permanently. This is very dangerous. - Allows the application to + Allows the app to disable the entire phone permanently. This is very dangerous. @@ -1064,64 +1055,64 @@ force phone reboot - Allows the application to + Allows the app to force the tablet to reboot. - Allows the application to + Allows the app to force the phone to reboot. mount and unmount filesystems - Allows the application to mount and + Allows the app to mount and unmount filesystems for removable storage. format external storage - Allows the application to format removable storage. + Allows the app to format removable storage. get information on internal storage - Allows the application to get information on internal storage. + Allows the app to get information on internal storage. create internal storage - Allows the application to create internal storage. + Allows the app to create internal storage. destroy internal storage - Allows the application to destroy internal storage. + Allows the app to destroy internal storage. - mount / unmount internal storage + mount/unmount internal storage - Allows the application to mount / unmount internal storage. + Allows the app to mount/unmount internal storage. rename internal storage - Allows the application to rename internal storage. + Allows the app to rename internal storage. control vibrator - Allows the application to control + Allows the app to control the vibrator. control flashlight - Allows the application to control + Allows the app to control the flashlight. manage preferences and permissions for USB devices - Allows the application to manage preferences and permissions for USB devices. + Allows the app to manage preferences and permissions for USB devices. implement MTP protocol @@ -1131,23 +1122,23 @@ test hardware - Allows the application to control + Allows the app to control various peripherals for the purpose of hardware testing. directly call phone numbers - Allows the application to call - phone numbers without your intervention. Malicious applications may - cause unexpected calls on your phone bill. Note that this does not - allow the application to call emergency numbers. + Allows the app to call + phone numbers without your intervention. Malicious apps may + cause unexpected calls on your phone bill. Note that this doesn\'t + allow the app to call emergency numbers. directly call any phone numbers - Allows the application to call + Allows the app to call any phone number, including emergency numbers, without your intervention. - Malicious applications may place unnecessary and illegal calls to emergency + Malicious apps may place unnecessary and illegal calls to emergency services. @@ -1155,43 +1146,43 @@ directly start CDMA phone setup - Allows the application to start CDMA provisioning. - Malicious applications may unnecessarily start CDMA provisioning + Allows the app to start CDMA provisioning. + Malicious apps may unnecessarily start CDMA provisioning. control location update notifications - Allows enabling/disabling location - update notifications from the radio. Not for use by normal applications. + Allows the app to enable/disable location + update notifications from the radio. Not for use by normal apps. access checkin properties - Allows read/write access to + Allows the app read/write access to properties uploaded by the checkin service. Not for use by normal - applications. + apps. choose widgets - Allows the application to tell the system - which widgets can be used by which application. With this permission, - applications can give access to personal data to other applications. - Not for use by normal applications. + Allows the app to tell the system + which widgets can be used by which app. An app with this permission + can give access to personal data to other apps. + Not for use by normal apps. modify phone state - Allows the application to control the - phone features of the device. An application with this permission can switch + Allows the app to control the + phone features of the device. An app with this permission can switch networks, turn the phone radio on and off and the like without ever notifying you. read phone state and identity - Allows the application to access the phone - features of the device. An application with this permission can determine the phone + Allows the app to access the phone + features of the device. An app with this permission can determine the phone number and serial number of this phone, whether a call is active, the number that call is connected to and the like. @@ -1200,10 +1191,10 @@ prevent phone from sleeping - Allows an application to prevent + Allows the app to prevent the tablet from going to sleep. - Allows an application to prevent + Allows the app to prevent the phone from going to sleep. @@ -1211,10 +1202,10 @@ power phone on or off - Allows the application to turn the + Allows the app to turn the tablet on or off. - Allows the application to turn the + Allows the app to turn the phone on or off. @@ -1231,59 +1222,52 @@ set wallpaper - Allows the application - to set the system wallpaper. + Allows the app to set the system wallpaper. set wallpaper size hints - Allows the application - to set the system wallpaper size hints. + Allows the app to set the system wallpaper size hints. reset system to factory defaults - Allows an application to completely + Allows the app to completely reset the system to its factory settings, erasing all data, - configuration, and installed applications. + configuration, and installed apps. set time - Allows an application to change - the tablet\'s clock time. + Allows the app to change the tablet\'s clock time. - Allows an application to change - the phone\'s clock time. + Allows the app to change the phone\'s clock time. set time zone - Allows an application to change - the tablet\'s time zone. + Allows the app to change the tablet\'s time zone. - Allows an application to change - the phone\'s time zone. + Allows the app to change the phone\'s time zone. act as the AccountManagerService - Allows an - application to make calls to AccountAuthenticators + Allows an app to make calls to AccountAuthenticators. discover known accounts - Allows an application to get + Allows the app to get the list of accounts known by the tablet. - Allows an application to get + Allows the app to get the list of accounts known by the phone. act as an account authenticator - Allows an application + Allows the app to use the account authenticator capabilities of the AccountManager, including creating accounts and getting and setting their passwords. @@ -1291,108 +1275,97 @@ manage the accounts list - Allows an application to - perform operations like adding, and removing accounts and deleting + Allows the app to + perform operations like adding and removing accounts, and deleting their password. - use the authentication - credentials of an account + use the authentication credentials of an account - Allows an application to - request authentication tokens. + Allows the app to request authentication tokens. view network state - Allows an application to view - the state of all networks. + Allows the app to view the state of all networks. full Internet access - Allows an application to - create network sockets. + Allows the app to create network sockets. change/intercept network settings and traffic - Allows an application to change network settings and to intercept and inspect all network traffic, - for example to change the proxy and port of any APN. Malicious applications could monitor, redirect, or modify network + Allows the app to change network settings and to intercept and inspect all network traffic, + for example to change the proxy and port of any APN. Malicious apps may monitor, redirect, or modify network packets without your knowledge. change network connectivity - Allows an application to change - the state of network connectivity. + Allows the app to change the state of network connectivity. - Change tethered connectivity + change tethered connectivity - Allows an application to change - the state of tethered network connectivity. + Allows the app to change the state of tethered network connectivity. change background data usage setting - Allows an application to change - the background data usage setting. + Allows the app to change the background data usage setting. view Wi-Fi state - Allows an application to view - the information about the state of Wi-Fi. + Allows the app to view the information about the state of Wi-Fi. change Wi-Fi state - Allows an application to connect - to and disconnect from Wi-Fi access points, and to make changes to + Allows the app to connect to and disconnect from Wi-Fi access points, and to make changes to configured Wi-Fi networks. - allow Wi-Fi Multicast - reception + allow Wi-Fi Multicast reception - Allows an application to - receive packets not directly addressed to your device. This can be - useful when discovering services offered near by. It uses more power + Allows the app to + receive packets not directly addressed to your device. This can be + useful when discovering services offered near by. It uses more power than the non-multicast mode. - bluetooth administration + Bluetooth administration - Allows an application to configure + Allows the app to configure the local Bluetooth tablet, and to discover and pair with remote devices. - Allows an application to configure - the local Bluetooth phone, and to discover and pair with remote - devices. + Allows the app to configure + the local Bluetooth phone, and to discover and pair with remote devices. create Bluetooth connections - Allows an application to view + Allows the app to view the configuration of the local Bluetooth tablet, and to make and accept connections with paired devices. - Allows an application to view + Allows the app to view the configuration of the local Bluetooth phone, and to make and accept connections with paired devices. control Near Field Communication - Allows an application to communicate + Allows the app to communicate with Near Field Communication (NFC) tags, cards, and readers. disable keylock - Allows an application to disable + Allows the app to disable the keylock and any associated password security. A legitimate example of this is the phone disabling the keylock when receiving an incoming phone call, then re-enabling the keylock when the call is finished. @@ -1400,43 +1373,42 @@ read sync settings - Allows an application to read the sync settings, - such as whether sync is enabled for Contacts. + Allows the app to read the sync settings, + such as whether sync is enabled for the People app. write sync settings - Allows an application to modify the sync - settings, such as whether sync is enabled for Contacts. + Allows the app to modify the sync + settings, such as whether sync is enabled for the People app. read sync statistics - Allows an application to read the sync stats; e.g., the + Allows the app to read the sync stats; e.g., the history of syncs that have occurred. read subscribed feeds - Allows an application to get details about the currently synced feeds. + Allows the app to get details about the currently synced feeds. write subscribed feeds - Allows an application to modify - your currently synced feeds. This could allow a malicious application to - change your synced feeds. + Allows the app to modify + your currently synced feeds. Malicious apps may change your synced feeds. - read user defined dictionary + read user-defined dictionary - Allows an application to read any private + Allows the app to read any private words, names and phrases that the user may have stored in the user dictionary. - write to user defined dictionary + write to user-defined dictionary - Allows an application to write new words into the + Allows the app to write new words into the user dictionary. @@ -1444,57 +1416,56 @@ modify/delete SD card contents - Allows an application to write to the USB storage. + Allows the app to write to the USB storage. - Allows an application to write to the SD card. + Allows the app to write to the SD card. modify/delete internal media storage contents - Allows an application to modify the contents of the internal media storage. + Allows the app to modify the contents of the internal media storage. access the cache filesystem - Allows an application to read and write the cache filesystem. + Allows the app to read and write the cache filesystem. make/receive Internet calls - Allows an application to use the SIP service to make/receive Internet calls. + Allows the app to use the SIP service to make/receive Internet calls. read historical network usage - Allows an application to read historical network usage for specific networks and applications. + Allows the app to read historical network usage for specific networks and apps. manage network policy - Allows an application to manage network policies and define application-specific rules. + Allows the app to manage network policies and define app-specific rules. modify network usage accounting - Allows modification of how network usage is accounted against applications. Not for use by normal applications. + Allows an app to modify how network usage is accounted against apps. Not for use by normal apps. Set password rules - Control the length and the characters - allowed in screen-unlock passwords + Control the length and the characters allowed in screen-unlock passwords Monitor screen-unlock attempts Monitor the number of incorrect passwords - entered when unlocking the screen, and lock the tablet or erase all the tablet\'s - data if too many incorrect passwords are entered + typed when unlocking the screen, and lock the tablet or erase all the tablet\'s + data if too many incorrect passwords are typed. Monitor the number of incorrect passwords - entered when unlocking the screen, and lock the phone or erase all the phone\'s - data if too many incorrect passwords are entered + typed. when unlocking the screen, and lock the phone or erase all the phone\'s + data if too many incorrect passwords are typed. Change the screen-unlock password @@ -1524,7 +1495,7 @@ Set storage encryption - Require that stored application data be encrypted + Require that stored app data be encrypted Disable cameras @@ -1743,27 +1714,27 @@ - Enter PIN code + Type PIN code - Enter PUK and new PIN code + Type PUK and new PIN code PUK code - New Pin Code + New PIN code - Touch to enter password + Touch to type password - Enter password to unlock + Type password to unlock - Enter PIN to unlock + Type PIN to unlock @@ -1800,9 +1771,9 @@ Correct! - Sorry, try again + Try again - Sorry, try again + Try again @@ -1824,12 +1795,12 @@ No SIM card in phone. - Please insert a SIM card. + Insert a SIM card. - The SIM card is missing or not readable. Please insert a SIM card. + The SIM card is missing or not readable. Insert a SIM card. - Your SIM card is permanently disabled.\n - Please contact your wireless service provider to obtain another SIM card. + Your SIM card has been permanently disabled.\n + Contact your wireless service provider for another SIM card. Previous track button @@ -1854,7 +1825,7 @@ PUK locked (Pin Unlock Kode) --> SIM card is PUK-locked. - Please see the User Guide or contact Customer Care. + See the User Guide or contact Customer Care. SIM card is locked. @@ -1868,21 +1839,21 @@ drawing the unlock pattern --> You have incorrectly drawn your unlock pattern %d times. - \n\nPlease try again in %d seconds. + \n\nTry again in %d seconds. - You have incorrectly entered your password %d times. - \n\nPlease try again in %d seconds. + You have incorrectly typed your password %d times. + \n\nTry again in %d seconds. - You have incorrectly entered your PIN %d times. - \n\nPlease try again in %d seconds. + You have incorrectly typed your PIN %d times. + \n\nTry again in %d seconds. - Navigate away from this page?\n\n%s\n\nSelect OK to continue, or Cancel to stay on the current page. + Navigate away from this page?\n\n%s\n\nTouch OK to continue, or Cancel to stay on the current page. Confirm - Tip: double-tap to zoom in and out. + Tip: Double-touch to zoom in and out. AutoFill @@ -2207,29 +2178,29 @@ read Browser\'s history and bookmarks - Allows the application to read all + Allows the app to read all the URLs that the Browser has visited, and all of the Browser\'s bookmarks. write Browser\'s history and bookmarks - Allows an application to modify the - Browser\'s history or bookmarks stored on your tablet. Malicious applications - can use this to erase or modify your Browser\'s data. + Allows the app to modify the + Browser\'s history or bookmarks stored on your tablet. Malicious apps + may use this to erase or modify your Browser\'s data. - Allows an application to modify the - Browser\'s history or bookmarks stored on your phone. Malicious applications - can use this to erase or modify your Browser\'s data. + Allows the app to modify the + Browser\'s history or bookmarks stored on your phone. Malicious apps + may use this to erase or modify your Browser\'s data. set alarm in alarm clock - Allows the application to set an alarm in - an installed alarm clock application. Some alarm clock applications may + Allows the app to set an alarm in + an installed alarm clock app. Some alarm clock apps may not implement this feature. - Allows the application to add messages + Allows the app to add messages to your voicemail inbox. - Modify Browser geolocation permissions + modify Browser geolocation permissions - Allows an application to modify the - Browser\'s geolocation permissions. Malicious applications - can use this to allow sending location information to arbitrary web sites. + Allows the app to modify the + Browser\'s geolocation permissions. Malicious apps + may use this to allow sending location information to arbitrary web sites. verify packages - Allows the application to verify a package is + Allows the app to verify a package is installable. Allows the holder to make requests of - package verifiers. Should never be needed for normal applications. + package verifiers. Should never be needed for normal apps. Do you want the browser to remember this password? @@ -2275,7 +2246,7 @@ Never - You do not have permission to open this page. + You don\'t have permission to open this page. Text copied to clipboard. @@ -2453,11 +2424,11 @@ - Cannot play video + Can\'t play video - Sorry, this video is not valid for streaming to this device. + This video isn\'t valid for streaming to this device. - Sorry, this video cannot be played. + This video can\'t be played. OK @@ -2516,7 +2487,7 @@ Copy URL - Select text... + Select text Text selection @@ -2554,7 +2525,7 @@ Attention - Loading... + Loading\u2026 ON @@ -2566,14 +2537,14 @@ Use by default for this action. - Clear default in Home Settings > Applications > Manage applications. + Clear default in System settings > Apps > Downloaded. Select an action - Select an application for the USB device + Choose an app for the USB device - No applications can perform this action. + No apps can perform this action. @@ -2584,13 +2555,13 @@ - %2$s is not responding.\n\nWould you like to close it? + %2$s isn\'t responding.\n\nDo you want to close it? - Activity %1$s is not responding.\n\nWould you like to close it? + Activity %1$s isn\'t responding.\n\nDo you want to close it? - %1$s is not responding. Would you like to close it? + %1$s isn\'t responding. Do you want to close it? - Process %1$s is not responding.\n\nWould you like to close it? + Process %1$s isn\'t responding.\n\nDo you want to close it? OK @@ -2598,7 +2569,7 @@ Wait - Application redirected + App redirected %1$s is now running. @@ -2608,25 +2579,25 @@ Always show - Re-enable this with Settings > Applications > Manage applications. + Re-enable this in System settings > Apps > Downloaded. - The application %1$s + The app %1$s (process %2$s) has violated its self-enforced StrictMode policy. The process %1$s has has violated its self-enforced StrictMode policy. - Android is upgrading... + Android is upgrading\u2026 - Optimizing application + Optimizing app %1$d of %2$d. - Starting applications. + Starting apps. Finishing boot. @@ -2635,20 +2606,20 @@ %1$s running - Select to switch to application + Touch to switch to app - Switch applications? + Switch apps? - Another application is already running + Another app is already running that must be stopped before you can start a new one. Return to %1$s - Don\'t start the new application. + Don\'t start the new app. Start %1$s - Stop the old application without saving. + Stop the old app without saving. - Unknown application + Unknown app Sending SMS messages - A large number of SMS messages are being sent. Select \"OK\" to continue, or \"Cancel\" to stop sending. + A large number of SMS messages are being sent. Touch OK to continue, or Cancel to stop sending. OK @@ -2819,7 +2790,7 @@ Turn on USB storage - If you turn on USB storage, some applications you are using will stop and may be unavailable until you turn off USB storage. + If you turn on USB storage, some apps you are using will stop and may be unavailable until you turn off USB storage. USB operation unsuccessful @@ -2839,20 +2810,20 @@ - Format USB storage + Format USB storage? - Format SD card + Format SD card? - Format USB storage, erasing all files stored there? Action cannot be reversed! + All files stored in your USB storage will be erased. This action can\'t be reversed! - Are you sure you want to format the SD card? All data on your card will be lost. + All data on your card will be lost. Format USB debugging connected - Select to disable USB debugging. + Touch to disable USB debugging. @@ -2862,9 +2833,9 @@ "" - Select input method + Choose input method - Configure input methods + Set up input methods \u0020ABCDEFGHIJKLMNOPQRSTUVWXYZ \u00200123456789ABCDEFGHIJKLMNOPQRSTUVWXYZ @@ -2925,16 +2896,16 @@ update component usage statistics - Allows the modification of collected component usage statistics. Not for use by normal applications. + Allows the app to modify collected component usage statistics. Not for use by normal apps. - Allows to invoke default container service to copy content. Not for use by normal applications. + copy content - Allows to invoke default container service to copy content. Not for use by normal applications. + Allows the app to invoke default container service to copy content. Not for use by normal apps. - Tap twice for zoom control + Touch twice for zoom control - Select an account + Choose an account "Add an account" "Which account would you like to use?" @@ -3217,7 +3188,7 @@ - Choose an application + Choose an app @@ -3228,7 +3199,7 @@ - "Sliding handle. Tap and hold." + "Sliding handle. Touch & hold." Up for %s. @@ -3335,12 +3306,12 @@ SHA-1 fingerprint: - See all... + See all - Select activity + Choose activity - Share with... + Share with