From professional translators, enterprises, web pages and freely available translation repositories.
the commission will use the following indicators to monitor progress:
the commission will use the following indicators to monitor progress:
Last Update: 2014-10-23
Usage Frequency: 1
Quality:
participants shall use the icm to obtain information on their liquidity position .
participants shall use the icm to obtain information on their liquidity position .
Last Update: 2011-10-23
Usage Frequency: 1
Quality:
instructing participant may also use the latest debit time indicator solely as a warning indicator .
instructing participant may also use the latest debit time indicator solely as a warning indicator .
Last Update: 2011-10-23
Usage Frequency: 1
Quality:
to optimise the settlement of queued payment orders , the ecb may use the optimisation procedures described in appendix i.
al fine di ottimizzare il regolamento degli ordini di pagamento in lista d' attesa , la bce può utilizzare le procedure di ottimizzazione descritte nell' appendice i.
Last Update: 2011-10-23
Usage Frequency: 1
Quality:
fejl under fortolkning af kommandothe url to the documentation of r, please check if there is a translated version and use the correct url
errore durante l' analisi del comandothe url to the documentation of r, please check if there is a translated version and use the correct url
Last Update: 2011-10-23
Usage Frequency: 1
Quality:
to optimise the settlement of queued payment orders , the ecb may use the optimisation procedures described in appendix i. 3 .
to optimise the settlement of queued payment orders , the ecb may use the optimisation procedures described in appendix i. 3 .
Last Update: 2011-10-23
Usage Frequency: 1
Quality:
plasma dataengine explorerthe name of the engine followed by the number of data sources
esploratore del motore dati di plasmathe name of the engine followed by the number of data sources
Last Update: 2011-10-23
Usage Frequency: 1
Quality:
valg af krypteringsnøgleif in your language something like 'key( s)' is not possible please use the plural in the translation
scelta chiave di cifraturaif in your language something like 'key(s) 'is not possible please use the plural in the translation
Last Update: 2011-10-23
Usage Frequency: 1
Quality:
forkert: @ info: status the number of skipped answers
non corrette: @info: status the number of skipped answers
Last Update: 2011-10-23
Usage Frequency: 1
Quality:
, @ info an element of the enumeration of the number of countries in the given continent
, @info an element of the enumeration of the number of countries in the given continent
Last Update: 2011-10-23
Usage Frequency: 1
Quality:
the fact that the beneficiaries of the aid are obliged to keep their share in the vessel for at least another five years and to use the vessel for fishing during those years seems to insure that aid is granted for vessels that are still operational and to be used for some years.
the fact that the beneficiaries of the aid are obliged to keep their share in the vessel for at least another five years and to use the vessel for fishing during those years seems to insure that aid is granted for vessels that are still operational and to be used for some years.
Last Update: 2014-10-23
Usage Frequency: 1
Quality:
- the table below indicates the number of institutions by eu member state involved in the received and the funded applications.
- the table below indicates the number of institutions by eu member state involved in the received and the funded applications.
Last Update: 2014-10-23
Usage Frequency: 1
Quality:
schengen states are invited to use the first possibility (retransmitting) wherever possible, to avoid the unnecessary multiplying of messages in the system.«
schengen states are invited to use the first possibility (retransmitting) wherever possible, to avoid the unnecessary multiplying of messages in the system.»
Last Update: 2014-11-13
Usage Frequency: 1
Quality:
( b ) if a participant decides to use the icm functionality for making backup lump sum payments , the ecb shall , if the participant so requests , open this functionality via the icm .
( b ) if a participant decides to use the icm functionality for making backup lump sum payments , the ecb shall , if the participant so requests , open this functionality via the icm .
Last Update: 2011-10-23
Usage Frequency: 1
Quality:
in the following steps, you will create two truecrypt volumes (outer and hidden) within the first partition behind the system partition. the hidden volume will contain the hidden operating system (os). truecrypt will create the hidden os by copying the content of the system partition (where the currently running os is installed) to the hidden volume. to the outer volume, you will copy some sensitive looking files that you actually do not want to hide. they will be there for anyone forcing you to disclose the password for the hidden os partition. you can reveal the password for the outer volume within the hidden os partition (the existence of the hidden os remains secret).finally, on the system partition of the currently running os, you will install a new os, so-called decoy os, and encrypt it. it must not contain sensitive data and will be there for anyone forcing you to reveal your pre-boot authentication password. in total, there will be three passwords. two of them can be disclosed (for the decoy os and outer volume). if you use the third one, the hidden os will start.
nei passi seguenti, voi creerete due volumi truecrypt (esterno ed ignoto) all’interno della prima partizione dietro a quella di sistema. il volume ignoto conterrà il sistema operativo ignoto (os). truecrypt creerà l’os ignoto copiando il contenuto della partizione di sistema (dove l’os attualmente in esecuzione è installato) nel volume ignoto. nel volume ignoto, copierete alcuni dati che sembrano sensitivi e che attualmente non desiderate nascondere. questi saranno qui a disposizione di chi vi forza a svelare la password per la partizione dell’os ignoto. potete rivelare la password per il volume esterno all’interno della partizione dell’os ignoto (comunque, l’esistenza dell’os ignoto rimane segreta).finalmente, nella partizione di sistema dell’ os attualmente in esecuzione, voi installerete un nuovo os, cosiddetto os di richiamo, e quindi codificarlo. non deve contenere dei dati sensibili e deve essere presente per chiunque vi costringe a rivelare la password di autenticazione di preavvio. in totale, ci saranno tre password. due di esse possono essere svelate (per l’os di richiamo ed il volume esterno). usando la terza password, l’os ignoto potrà partire.
Last Update: 2016-10-20
Usage Frequency: 1
Quality:
Some human translations with low relevance have been hidden.
Show low-relevance results.