From e9702c3989909699444a4fac39b2f1250f2e617b Mon Sep 17 00:00:00 2001 From: Eric Fischer Date: Wed, 3 Nov 2010 11:15:13 -0700 Subject: Split strings referring to "phone" into phone and tablet variants. Change-Id: I956c075a1ddeb627db0ba582a35906c9ae8f41ea --- core/res/res/values/strings.xml | 228 ++++++++++++++++++++++++++++++++-------- 1 file changed, 183 insertions(+), 45 deletions(-) diff --git a/core/res/res/values/strings.xml b/core/res/res/values/strings.xml index c89789ee92e8..1fd5146770b4 100755 --- a/core/res/res/values/strings.xml +++ b/core/res/res/values/strings.xml @@ -257,7 +257,9 @@ Too many %s deletes. - Phone storage is full! Delete some files to free space. + Tablet storage is full! Delete some files to free space. + + Phone storage is full! Delete some files to free space. @@ -265,7 +267,9 @@ - Phone options + Tablet options + + Phone options Silent mode @@ -282,7 +286,10 @@ - Your phone will shut down. + Your tablet will shut down. + + Your phone will shut down. - Phone options + Tablet options + + Phone options Screen lock @@ -349,7 +358,10 @@ Your personal information - Direct access to your contacts + Direct access to your contacts + and calendar stored on the tablet. + + Direct access to your contacts and calendar stored on the phone. @@ -449,14 +461,22 @@ read SMS or MMS - Allows application to read + Allows application to read + SMS messages stored on your tablet or SIM card. Malicious applications + may read your confidential messages. + + Allows application to read SMS messages stored on your phone or SIM card. Malicious applications may read your confidential messages. edit SMS or MMS - Allows application to write + Allows application to write + to SMS messages stored on your tablet or SIM card. Malicious applications + may delete your messages. + + Allows application to write to SMS messages stored on your phone or SIM card. Malicious applications may delete your messages. @@ -548,7 +568,7 @@ monitor and control how the system launches activities. Malicious applications may completely compromise the system. This permission is only needed for development, never for normal - phone usage. + use. send package removed broadcast @@ -610,7 +630,7 @@ Allows an application to show system alert windows. Malicious applications can take over the - entire screen of the phone. + entire screen. modify global animation speed @@ -628,7 +648,11 @@ press keys and control buttons - Allows an application to deliver + Allows an application to deliver + its own input events (key presses, etc.) to other applications. Malicious + applications can use this to take over the tablet. + + Allows an application to deliver its own input events (key presses, etc.) to other applications. Malicious applications can use this to take over the phone. @@ -709,7 +733,11 @@ delete all application cache data - Allows an application to free phone storage + Allows an application to free tablet storage + by deleting files in application cache directory. Access is very + restricted usually to system process. + + Allows an application to free phone storage by deleting files in application cache directory. Access is very restricted usually to system process. @@ -721,7 +749,12 @@ read sensitive log data - Allows an application to read from the + Allows an application to read from the + system\'s various log files. This allows it to discover general + information about what you are doing with the tablet, potentially + including personal or private information. + + Allows an application to read from the system\'s various log files. This allows it to discover general information about what you are doing with the phone, potentially including personal or private information. @@ -737,9 +770,15 @@ enable or disable application components - Allows an application to change whether a + Allows an application to change whether a component of another application is enabled or not. Malicious applications can use this - to disable important phone capabilities. Care must be used with permission, as it is + to disable important tablet capabilities. Care must be used with this permission, as it is + possible to get application components into an unusable, inconsistent, or unstable state. + + + Allows an application to change whether a + component of another application is enabled or not. Malicious applications can use this + to disable important phone capabilities. Care must be used with this permission, as it is possible to get application components into an unusable, inconsistent, or unstable state. @@ -771,7 +810,12 @@ automatically start at boot - Allows an application to + Allows an application to + have itself started as soon as the system has finished booting. + This can make it take longer to start the tablet and allow the + application to slow down the overall tablet by always running. + + Allows an application to have itself started as soon as the system has finished booting. This can make it take longer to start the phone and allow the application to slow down the overall phone by always running. @@ -779,7 +823,12 @@ send sticky broadcast - Allows an application to send + Allows an application to send + sticky broadcasts, which remain after the broadcast ends. + Malicious applications can make the tablet slow or unstable by causing it + to use too much memory. + + Allows an application to send sticky broadcasts, which remain after the broadcast ends. Malicious applications can make the phone slow or unstable by causing it to use too much memory. @@ -787,21 +836,33 @@ read contact data - Allows an application to read all + Allows an application to read all + of the contact (address) data stored on your tablet. Malicious applications + can use this to send your data to other people. + + Allows an application to read all of the contact (address) data stored on your phone. Malicious applications can use this to send your data to other people. write contact data - Allows an application to modify the + Allows an application to modify the + contact (address) data stored on your tablet. Malicious + applications can use this to erase or modify your contact data. + + Allows an application to modify the contact (address) data stored on your phone. Malicious applications can use this to erase or modify your contact data. read calendar events - Allows an application to read all + Allows an application to read all + of the calendar events stored on your tablet. Malicious applications + can use this to send your calendar events to other people. + + Allows an application to read all of the calendar events stored on your phone. Malicious applications can use this to send your calendar events to other people. @@ -836,7 +897,12 @@ fine (GPS) location - Access fine location sources such as the + Access fine location sources such as the + Global Positioning System on the tablet, where available. + Malicious applications can use this to determine where you are, and may + consume additional battery power. + + Access fine location sources such as the Global Positioning System on the phone, where available. Malicious applications can use this to determine where you are, and may consume additional battery power. @@ -844,7 +910,11 @@ coarse (network-based) location - Access coarse location sources such as the cellular + Access coarse location sources such as the cellular + network database to determine an approximate tablet location, where available. Malicious + applications can use this to determine approximately where you are. + + Access coarse location sources such as the cellular network database to determine an approximate phone location, where available. Malicious applications can use this to determine approximately where you are. @@ -880,15 +950,25 @@ images the camera is seeing. - permanently disable phone + permanently disable tablet + + permanently disable phone - Allows the application to + Allows the application to + disable the entire tablet permanently. This is very dangerous. + + Allows the application to disable the entire phone permanently. This is very dangerous. - force phone reboot + force tablet reboot + + force phone reboot - Allows the application to + Allows the application to + force the tablet to reboot. + + Allows the application to force the phone to reboot. @@ -967,7 +1047,9 @@ services. - directly start CDMA phone setup + directly start CDMA tablet setup + + directly start CDMA phone setup Allows the application to start CDMA provisioning. Malicious applications may unnecessarily start CDMA provisioning @@ -1010,21 +1092,35 @@ is connected to and the like. - prevent phone from sleeping + prevent tablet from sleeping + + prevent phone from sleeping + + Allows an application to prevent + the tablet from going to sleep. - Allows an application to prevent + Allows an application to prevent the phone from going to sleep. - power phone on or off + power tablet on or off + + power phone on or off + + Allows the application to turn the + tablet on or off. - Allows the application to turn the + Allows the application to turn the phone on or off. run in factory test mode - Run as a low-level manufacturer test, + Run as a low-level manufacturer test, + allowing complete access to the tablet hardware. Only available + when a tablet is running in manufacturer test mode. + + Run as a low-level manufacturer test, allowing complete access to the phone hardware. Only available when a phone is running in manufacturer test mode. @@ -1050,13 +1146,19 @@ set time - Allows an application to change + Allows an application to change + the tablet\'s clock time. + + Allows an application to change the phone\'s clock time. set time zone - Allows an application to change + Allows an application to change + the tablet\'s time zone. + + Allows an application to change the phone\'s time zone. @@ -1068,7 +1170,10 @@ discover known accounts - Allows an application to get + Allows an application to get + the list of accounts known by the tablet. + + Allows an application to get the list of accounts known by the phone. @@ -1154,14 +1259,22 @@ bluetooth administration - Allows an application to configure + Allows an application to configure + the local Bluetooth tablet, and to discover and pair with remote + devices. + + Allows an application to configure the local Bluetooth phone, and to discover and pair with remote devices. create Bluetooth connections - Allows an application to view + Allows an application to view + configuration of the local Bluetooth tablet, and to make and accept + connections with paired devices. + + Allows an application to view configuration of the local Bluetooth phone, and to make and accept connections with paired devices. @@ -1172,7 +1285,6 @@ with Near Field Communication (NFC) tags, cards, and readers. - disable keylock Allows an application to disable the keylock and any associated password security. A legitimate example of @@ -1255,7 +1367,11 @@ Monitor screen-unlock attempts - Monitor the number of incorrect passwords + Monitor the number of incorrect passwords + entered when unlocking the screen, and lock the tablet or erase all the tablet\'s + data if too many incorrect passwords are entered + + Monitor the number of incorrect passwords entered when unlocking the screen, and lock the phone or erase all the phone\'s data if too many incorrect passwords are entered @@ -1269,7 +1385,10 @@ Erase all data - Erase the phone\'s data without warning, + Erase the tablet\'s data without warning, + by performing a factory data reset + + Erase the phone\'s data without warning, by performing a factory data reset Set the device global proxy @@ -1554,7 +1673,9 @@ No SIM card. - No SIM card in phone. + No SIM card in tablet. + + No SIM card in phone. Please insert a SIM card. @@ -1603,7 +1724,15 @@ - + + You have incorrectly drawn your unlock pattern %d times. + After %d more unsuccessful attempts, + you will be asked to unlock your tablet using your Google sign-in.\n\n + Please try again in %d seconds. + + + You have incorrectly drawn your unlock pattern %d times. After %d more unsuccessful attempts, you will be asked to unlock your phone using your Google sign-in.\n\n @@ -1718,7 +1847,12 @@ write Browser\'s history and bookmarks - Allows an application to modify the + Allows an application to modify the + Browser\'s history or bookmarks stored on your tablet. Malicious applications + can use this to erase or modify your Browser\'s data. + + Allows an application to modify the Browser\'s history or bookmarks stored on your phone. Malicious applications can use this to erase or modify your Browser\'s data. @@ -1992,7 +2126,9 @@ Low on space - Phone storage space is getting low. + Tablet storage space is getting low. + + Phone storage space is getting low. OK @@ -2169,9 +2305,11 @@ USB connected - You have connected your phone to your computer via USB. Select the button below if you want to copy files between your computer and your Android\u2018s USB storage. + You have connected your tablet to your computer via USB. Touch the button below if you want to copy files between your computer and your Android\u2018s USB storage. + + You have connected your phone to your computer via USB. Touch the button below if you want to copy files between your computer and your Android\u2018s USB storage. - You have connected your phone to your computer via USB. Select the button below if you want to copy files between your computer and your Android\u2018s SD card. + You have connected your phone to your computer via USB. Touch the button below if you want to copy files between your computer and your Android\u2018s SD card. Turn on USB storage -- cgit v1.2.3-59-g8ed1b