Von professionellen Übersetzern, Unternehmen, Websites und kostenlos verfügbaren Übersetzungsdatenbanken.
the commission will use the following indicators to monitor progress:
the commission will use the following indicators to monitor progress:
Letzte Aktualisierung: 2014-10-23
Nutzungshäufigkeit: 1
Qualität:
participants shall use the icm to obtain information on their liquidity position .
participants shall use the icm to obtain information on their liquidity position .
Letzte Aktualisierung: 2011-10-23
Nutzungshäufigkeit: 1
Qualität:
instructing participant may also use the latest debit time indicator solely as a warning indicator .
instructing participant may also use the latest debit time indicator solely as a warning indicator .
Letzte Aktualisierung: 2011-10-23
Nutzungshäufigkeit: 1
Qualität:
to optimise the settlement of queued payment orders , the ecb may use the optimisation procedures described in appendix i.
al fine di ottimizzare il regolamento degli ordini di pagamento in lista d' attesa , la bce può utilizzare le procedure di ottimizzazione descritte nell' appendice i.
Letzte Aktualisierung: 2011-10-23
Nutzungshäufigkeit: 1
Qualität:
fejl under fortolkning af kommandothe url to the documentation of r, please check if there is a translated version and use the correct url
errore durante l' analisi del comandothe url to the documentation of r, please check if there is a translated version and use the correct url
Letzte Aktualisierung: 2011-10-23
Nutzungshäufigkeit: 1
Qualität:
to optimise the settlement of queued payment orders , the ecb may use the optimisation procedures described in appendix i. 3 .
to optimise the settlement of queued payment orders , the ecb may use the optimisation procedures described in appendix i. 3 .
Letzte Aktualisierung: 2011-10-23
Nutzungshäufigkeit: 1
Qualität:
plasma dataengine explorerthe name of the engine followed by the number of data sources
esploratore del motore dati di plasmathe name of the engine followed by the number of data sources
Letzte Aktualisierung: 2011-10-23
Nutzungshäufigkeit: 1
Qualität:
valg af krypteringsnøgleif in your language something like 'key( s)' is not possible please use the plural in the translation
scelta chiave di cifraturaif in your language something like 'key(s) 'is not possible please use the plural in the translation
Letzte Aktualisierung: 2011-10-23
Nutzungshäufigkeit: 1
Qualität:
forkert: @ info: status the number of skipped answers
non corrette: @info: status the number of skipped answers
Letzte Aktualisierung: 2011-10-23
Nutzungshäufigkeit: 1
Qualität:
, @ info an element of the enumeration of the number of countries in the given continent
, @info an element of the enumeration of the number of countries in the given continent
Letzte Aktualisierung: 2011-10-23
Nutzungshäufigkeit: 1
Qualität:
the fact that the beneficiaries of the aid are obliged to keep their share in the vessel for at least another five years and to use the vessel for fishing during those years seems to insure that aid is granted for vessels that are still operational and to be used for some years.
the fact that the beneficiaries of the aid are obliged to keep their share in the vessel for at least another five years and to use the vessel for fishing during those years seems to insure that aid is granted for vessels that are still operational and to be used for some years.
Letzte Aktualisierung: 2014-10-23
Nutzungshäufigkeit: 1
Qualität:
- the table below indicates the number of institutions by eu member state involved in the received and the funded applications.
- the table below indicates the number of institutions by eu member state involved in the received and the funded applications.
Letzte Aktualisierung: 2014-10-23
Nutzungshäufigkeit: 1
Qualität:
schengen states are invited to use the first possibility (retransmitting) wherever possible, to avoid the unnecessary multiplying of messages in the system.«
schengen states are invited to use the first possibility (retransmitting) wherever possible, to avoid the unnecessary multiplying of messages in the system.»
Letzte Aktualisierung: 2014-11-13
Nutzungshäufigkeit: 1
Qualität:
( b ) if a participant decides to use the icm functionality for making backup lump sum payments , the ecb shall , if the participant so requests , open this functionality via the icm .
( b ) if a participant decides to use the icm functionality for making backup lump sum payments , the ecb shall , if the participant so requests , open this functionality via the icm .
Letzte Aktualisierung: 2011-10-23
Nutzungshäufigkeit: 1
Qualität:
in the following steps, you will create two truecrypt volumes (outer and hidden) within the first partition behind the system partition. the hidden volume will contain the hidden operating system (os). truecrypt will create the hidden os by copying the content of the system partition (where the currently running os is installed) to the hidden volume. to the outer volume, you will copy some sensitive looking files that you actually do not want to hide. they will be there for anyone forcing you to disclose the password for the hidden os partition. you can reveal the password for the outer volume within the hidden os partition (the existence of the hidden os remains secret).finally, on the system partition of the currently running os, you will install a new os, so-called decoy os, and encrypt it. it must not contain sensitive data and will be there for anyone forcing you to reveal your pre-boot authentication password. in total, there will be three passwords. two of them can be disclosed (for the decoy os and outer volume). if you use the third one, the hidden os will start.
nei passi seguenti, voi creerete due volumi truecrypt (esterno ed ignoto) all’interno della prima partizione dietro a quella di sistema. il volume ignoto conterrà il sistema operativo ignoto (os). truecrypt creerà l’os ignoto copiando il contenuto della partizione di sistema (dove l’os attualmente in esecuzione è installato) nel volume ignoto. nel volume ignoto, copierete alcuni dati che sembrano sensitivi e che attualmente non desiderate nascondere. questi saranno qui a disposizione di chi vi forza a svelare la password per la partizione dell’os ignoto. potete rivelare la password per il volume esterno all’interno della partizione dell’os ignoto (comunque, l’esistenza dell’os ignoto rimane segreta).finalmente, nella partizione di sistema dell’ os attualmente in esecuzione, voi installerete un nuovo os, cosiddetto os di richiamo, e quindi codificarlo. non deve contenere dei dati sensibili e deve essere presente per chiunque vi costringe a rivelare la password di autenticazione di preavvio. in totale, ci saranno tre password. due di esse possono essere svelate (per l’os di richiamo ed il volume esterno). usando la terza password, l’os ignoto potrà partire.
Letzte Aktualisierung: 2016-10-20
Nutzungshäufigkeit: 1
Qualität:
Einige menschliche Übersetzungen mit geringer Relevanz wurden ausgeblendet.
Ergebnisse mit niedriger Relevanz anzeigen.