Réalisées par des traducteurs professionnels, des entreprises, des pages web ou traductions disponibles gratuitement.
redigér gruppemarks that a task has been modified
modifica gruppomarks that a task has been modified
Dernière mise à jour : 2011-10-23
Fréquence d'utilisation : 1
Qualité :
the commission is of the opinion that a more thorough analysis of this complex question is necessary.
the commission is of the opinion that a more thorough analysis of this complex question is necessary.
Dernière mise à jour : 2014-10-23
Fréquence d'utilisation : 1
Qualité :
the result of this approach is that a number of areas eligible under the notified measure does not fall within the areas eligible for regional aid as defined in the present uk regional aid map.
the result of this approach is that a number of areas eligible under the notified measure does not fall within the areas eligible for regional aid as defined in the present uk regional aid map.
Dernière mise à jour : 2014-10-23
Fréquence d'utilisation : 1
Qualité :
in the event that a failure affects an ancillary system , that ancillary system shall be responsible for resolving the failure .
in the event that a failure affects an ancillary system , that ancillary system shall be responsible for resolving the failure .
Dernière mise à jour : 2011-10-23
Fréquence d'utilisation : 1
Qualité :
according to article 12 of the proposed regulation it is envisaged that a report on the implementation of this regulation will be submitted within five years of the entry into force of the regulation , to the european parliament and the council .
according to article 12 of the proposed regulation it is envisaged that a report on the implementation of this regulation will be submitted within five years of the entry into force of the regulation , to the european parliament and the council .
Dernière mise à jour : 2011-10-23
Fréquence d'utilisation : 1
Qualité :
an investment would not be considered in line with this principle where the financial position of the company, and particularly the structure and volume of its debt, is such that a normal return cannot be expected within a reasonable time from the investment.
an investment would not be considered in line with this principle where the financial position of the company, and particularly the structure and volume of its debt, is such that a normal return cannot be expected within a reasonable time from the investment.
Dernière mise à jour : 2014-10-23
Fréquence d'utilisation : 1
Qualité :
( d ) in the event that a failure affects an ancillary system , that ancillary system shall be responsible for resolving the failure .
( d ) in the event that a failure affects an ancillary system , that ancillary system shall be responsible for resolving the failure .
Dernière mise à jour : 2011-10-23
Fréquence d'utilisation : 1
Qualité :
in the event that a participant objects to the amendment , the ecb is entitled immediately to terminate that participant 's participation in target2-ecb and close any of its pm accounts .
in the event that a participant objects to the amendment , the ecb is entitled immediately to terminate that participant 's participation in target2-ecb and close any of its pm accounts .
Dernière mise à jour : 2011-10-23
Fréquence d'utilisation : 1
Qualité :
a reduction in the tax base, and consequently the level of taxation, that a telecommunications operator is liable for, confers an advantage upon that undertaking in that it reduces the costs that that undertaking would normally bear in the course of its business.
a reduction in the tax base, and consequently the level of taxation, that a telecommunications operator is liable for, confers an advantage upon that undertaking in that it reduces the costs that that undertaking would normally bear in the course of its business.
Dernière mise à jour : 2014-10-23
Fréquence d'utilisation : 1
Qualité :
important: please remember the algorithms that you select in this step. you will have to select the same algorithms for the decoy system. otherwise, the hidden system will be inaccessible! (the decoy system must be encrypted with the same encryption algorithm as the hidden system.)note: the reason is that the decoy system and the hidden system will share a single boot loader, which supports only a single algorithm, selected by the user (for each algorithm, there is a special version of the truecrypt boot loader).
importante: ricordatevi gli algoritmi usati in questo passo. dovrete selezionare gli stessi algoritmi per il sistema operativo di richiamo, altrimenti il sistema operativo ignoto sara’ inaccessibile! (il sistema operativo di richiamo deve essere codificato con lo stesso algoritmo di codifica come il sistema nascosto.)nota: la ragione di questo è che il sistema operativo di richiamo condividerà un singolo loader di avvio, che supporta solo un singolo algoritmo, selezionato dall’utente (per ogni algoritmo, esiste una speciale versione del loader di avvio di truecrypt).
Dernière mise à jour : 2016-10-20
Fréquence d'utilisation : 1
Qualité :
Certaines traductions humaines peu pertinentes ont été masquées.
Affichez les résultats peu pertinents.