From professional translators, enterprises, web pages and freely available translation repositories.
the data in stored with our external data processor .
the data in stored with our external data processor .
Last Update: 2011-10-23
Usage Frequency: 1
Quality:
participants shall use the icm to obtain information on their liquidity position .
participants shall use the icm to obtain information on their liquidity position .
Last Update: 2011-10-23
Usage Frequency: 1
Quality:
eurostat will maintain a database for the data , and will publish fats annually .
eurostat will maintain a database for the data , and will publish fats annually .
Last Update: 2011-10-23
Usage Frequency: 1
Quality:
use of near infra- red spectroscopy by the pharmaceutical industry and the data to be forwarded in part ii of the dossier for a marketing authorisation
in- use stability testing of veterinary medicinal products
Last Update: 2011-10-23
Usage Frequency: 1
Quality:
Warning: This alignment may be wrong.
Please delete it you feel so.
they should directly be given to the data processing institutes , namely statistical institutes and central banks .
they should directly be given to the data processing institutes , namely statistical institutes and central banks .
Last Update: 2011-10-23
Usage Frequency: 1
Quality:
each member state will take all measures necessary to ensure the quality of the data transmitted according to common quality standards .
each member state will take all measures necessary to ensure the quality of the data transmitted according to common quality standards .
Last Update: 2011-10-23
Usage Frequency: 1
Quality:
the benefits of the availability of the data have been measured against the costs of collection and the burden on businesses for the pilot studies .
the benefits of the availability of the data have been measured against the costs of collection and the burden on businesses for the pilot studies .
Last Update: 2011-10-23
Usage Frequency: 1
Quality:
udforskning af tjenesten% 1source: name of the data, service: writes data instead of fetching
% 1- palveluselainsource: name of the data, service: writes data instead of fetching
Last Update: 2011-10-23
Usage Frequency: 1
Quality:
valg af krypteringsnøgleif in your language something like 'key( s)' is not possible please use the plural in the translation
salausavaimen valintaif in your language something like 'key( s)' isn' t possible please use the plural in the translation
Last Update: 2011-10-23
Usage Frequency: 1
Quality:
but it can be appreciated that it is not very heavy , because existing data are generally used for processing the fats data sets and the data collection is based on already existing data collections .
but it can be appreciated that it is not very heavy , because existing data are generally used for processing the fats data sets and the data collection is based on already existing data collections .
Last Update: 2011-10-23
Usage Frequency: 1
Quality:
if a participant 's connection to the network service provider fails , the participant shall use the alternative means of transmission of messages laid down in appendix iv .
if a participant 's connection to the network service provider fails , the participant shall use the alternative means of transmission of messages laid down in appendix iv .
Last Update: 2011-10-23
Usage Frequency: 1
Quality:
krypteringsnøgle- valgif in your language something like 'key( s)' isn' t possible please use the plural in the translation
salausavaimen valintaif in your language something like 'key( s)' isn' t possible please use the plural in the translation
Last Update: 2011-10-23
Usage Frequency: 1
Quality:
schengen states are invited to use the first possibility (retransmitting) wherever possible, to avoid the unnecessary multiplying of messages in the system.«
schengen states are invited to use the first possibility (retransmitting) wherever possible, to avoid the unnecessary multiplying of messages in the system.”
Last Update: 2014-11-13
Usage Frequency: 1
Quality:
( b ) if a participant decides to use the icm functionality for making backup lump sum payments , the ecb shall , if the participant so requests , open this functionality via the icm .
( b ) if a participant decides to use the icm functionality for making backup lump sum payments , the ecb shall , if the participant so requests , open this functionality via the icm .
Last Update: 2011-10-23
Usage Frequency: 1
Quality:
in the following steps, you will create two truecrypt volumes (outer and hidden) within the first partition behind the system partition. the hidden volume will contain the hidden operating system (os). truecrypt will create the hidden os by copying the content of the system partition (where the currently running os is installed) to the hidden volume. to the outer volume, you will copy some sensitive looking files that you actually do not want to hide. they will be there for anyone forcing you to disclose the password for the hidden os partition. you can reveal the password for the outer volume within the hidden os partition (the existence of the hidden os remains secret).finally, on the system partition of the currently running os, you will install a new os, so-called decoy os, and encrypt it. it must not contain sensitive data and will be there for anyone forcing you to reveal your pre-boot authentication password. in total, there will be three passwords. two of them can be disclosed (for the decoy os and outer volume). if you use the third one, the hidden os will start.
seuraavassa kohdassa, luot kaksi truecrypt taltiota (ulkoinen ja piilotettu) ensimmäisen osion sisälle ja järjelmäosion taakse. piilotettu taltio sisältää piilotetun käyttöjärjestelmän (os). truecrypt luo piilotetun os kopioimalla järjelmäosion sisällön (missä nykyinen ajettava os on asennettuna) piilotetulla taltiolla. ulkoiselle taltiolle, sinä kopioit jotakin herkkäluontoiselta näyttäviä tiedostoja joita et todellisuudessa halua piilottaa. ne ovat siellä koska jos jokin pakottaa sinua paljastamaan salasanan piilotetulle käyttöjärjelmäosiolle. voit paljastaa salasanan ulkoiselle taltiolle piilotetun käyttöjärjelmäosion sisällä (piilotetun käyttöjärjestelmän olemassaolo pysyy salassa).lopuksi, käynnissä olevalla käyttöjärjestelmän osiolla, voit asentaa uuden käyttöjärjestelmän, niin kutsutun houkutuslintu käyttöjärjestelmän, ja salata sen. sen ei pidä sisältää herkkää tietoa ja ovat siellä jos jokin pakottaa sinua paljastamaan esikäynnistys autentikointi salasanan. kokonaisuudessaan, siellä on kolme salasanaa. kaksi niistä voidaan paljastaa (houkutuslintu käyttöjärjestelmälle ja ulkoiselle taltiolle). jos käytät kolmatta, piilotettu käyttöjärjestelmä käynnistyy.
Last Update: 2009-12-14
Usage Frequency: 1
Quality:
Some human translations with low relevance have been hidden.
Show low-relevance results.