From professional translators, enterprises, web pages and freely available translation repositories.
access control
kawalan akses
Last Update: 2011-10-23
Usage Frequency: 1
Quality:
imap access control
kolab folder properties
Last Update: 2014-08-20
Usage Frequency: 1
Quality:
datasource access control center
gagal melaksanakan kenyataan oracle
Last Update: 2014-08-20
Usage Frequency: 1
Quality:
unable to add user to access control list:
pengguna %s tidak dapat ditambah ke senarai kawalan akses
Last Update: 2014-08-20
Usage Frequency: 1
Quality:
%s %s -- get file access control lists
%s %s -- dapatkan senarai kawalan capaian
Last Update: 2014-08-15
Usage Frequency: 1
Quality:
{0} cannot be added to an access control list
pengguna %s tidak dapat ditambah ke senarai kawalan akses
Last Update: 2014-08-20
Usage Frequency: 1
Quality:
could not execute the database access control center
gagal melaksanakan kenyataan oracle
Last Update: 2014-08-20
Usage Frequency: 1
Quality:
-d, --default display the default access control list
-d, --default paparkan senarai kawalan capaian lalai
Last Update: 2014-08-15
Usage Frequency: 1
Quality:
error retrieving access control list (acl) from server %1
ralat semasa memperoleh semula senarai kawalan akses (ska) dari pelayan% 1
Last Update: 2011-10-23
Usage Frequency: 1
Quality:
this imap server does not have support for access control lists (acl)
pelayan imap ini tidak ada sokongan untuk senarai kawalan akses (ska)
Last Update: 2011-10-23
Usage Frequency: 1
Quality:
retrieving the access control list on folder %1 failed. the server returned: %2
nyah langgan folder% 1 gagal.
Last Update: 2011-10-23
Usage Frequency: 1
Quality:
deleting the access control list on folder %1 for user %2 failed. the server returned: %3
nyah langgan folder% 1 gagal.
Last Update: 2011-10-23
Usage Frequency: 1
Quality:
access control is a 24/7 electronic security solution providing physical and operational security whilst your premises is open or closed. • a physical deterrent at perimeter access points reducing walk-in theft and attack • a means of restricting access to company data and assets • keeping untrained/unauthorised persons from hazardous areas • replaces cost and management of physical keys • overcomes need to replace locks if keys lost/stolen • control and audit of authorised persons – instant granting or removing access rights • controls and monitors who goes where and whenn providing physical and operational security whilst your premises is open or closed. • a physical deterrent at perimeter access points reducing walk in theft and attack • a means of restricting access to company data and assets • keeping untrained/unauthorised persons from hazardous areas • replaces cost and management of physical keys • overcomes need to replace locks if keys lost/stolen • control and audit of authorised persons �
no query specified. example request: get?q=hello&langpair=en|it
Last Update: 2022-08-03
Usage Frequency: 1
Quality:
Reference:
Warning: Contains invisible HTML formatting