Apprendre à traduire à partir d'exemples de traductions humaines.
De: Traduction automatique
Suggérer une meilleure traduction
Qualité :
Réalisées par des traducteurs professionnels, des entreprises, des pages web ou traductions disponibles gratuitement.
modtagelse@ title: tab tab page where the user configures accounts to send mail
ricezione@title: tab tab page where the user configures accounts to send mail
Dernière mise à jour : 2011-10-23
Fréquence d'utilisation : 1
Qualité :
( 1 ) representation to be used where the counterparty is a us depository institution .
( 1 ) representation to be used where the counterparty is a us depository institution .
Dernière mise à jour : 2011-10-23
Fréquence d'utilisation : 1
Qualité :
beskrivelse@ label title of a listbox where the possible duplicate bug numbers are put in
descrizione@title
Dernière mise à jour : 2011-10-23
Fréquence d'utilisation : 1
Qualité :
sæt som standard@ title: tab tab page where the user configures accounts to receive mail
imposta come predefinito@title: tab tab page where the user configures accounts to receive mail
Dernière mise à jour : 2011-10-23
Fréquence d'utilisation : 1
Qualité :
( 1 ) representation to be used where the counterparty is a u.s. depository institution .
( 1 ) representation to be used where the counterparty is a u.s. depository institution .
Dernière mise à jour : 2011-10-23
Fréquence d'utilisation : 1
Qualité :
pre-devolution legislation largely applies in england and wales, where the system is very similar.
pre-devolution legislation largely applies in england and wales, where the system is very similar.
Dernière mise à jour : 2014-10-23
Fréquence d'utilisation : 1
Qualité :
where the participant is , or is deemed by its cb to be , insolvent or unable to pay its debts ;
where the participant is , or is deemed by its cb to be , insolvent or unable to pay its debts ;
Dernière mise à jour : 2011-10-23
Fréquence d'utilisation : 1
Qualité :
for cases where the framework requires some interpretation we have an independent ethics adviser who can advise on a case by case basis .
for cases where the framework requires some interpretation we have an independent ethics adviser who can advise on a case by case basis .
Dernière mise à jour : 2011-10-23
Fréquence d'utilisation : 1
Qualité :
where the ecb requests additional information pursuant to paragraph 3 , the decision shall be communicated within one month of the ecb 's receipt of this information from the applicant .
where the ecb requests additional information pursuant to paragraph 3 , the decision shall be communicated within one month of the ecb 's receipt of this information from the applicant .
Dernière mise à jour : 2011-10-23
Fréquence d'utilisation : 1
Qualité :
( f ) where the participant is , or is deemed by its cb to be , insolvent or unable to pay its debts ;
( f ) where the participant is , or is deemed by its cb to be , insolvent or unable to pay its debts ;
Dernière mise à jour : 2011-10-23
Fréquence d'utilisation : 1
Qualité :
the content of the partition where the original system (of which the hidden system is a clone) resided has been successfully erased.
il contenuto della partizione dove il sistema originale (del quale il sistema ignoto è un clone) risiede è stato cancellato con successo.
Dernière mise à jour : 2016-10-20
Fréquence d'utilisation : 1
Qualité :
an investment would not be considered in line with this principle where the financial position of the company, and particularly the structure and volume of its debt, is such that a normal return cannot be expected within a reasonable time from the investment.
an investment would not be considered in line with this principle where the financial position of the company, and particularly the structure and volume of its debt, is such that a normal return cannot be expected within a reasonable time from the investment.
Dernière mise à jour : 2014-10-23
Fréquence d'utilisation : 1
Qualité :
this time shall be reduced to 30 minutes in the event that the ssp failure occurs at 17.30 or later , in cases where the ssp failure was ongoing at 18.00 .
this time shall be reduced to 30 minutes in the event that the ssp failure occurs at 17.30 or later , in cases where the ssp failure was ongoing at 18.00 .
Dernière mise à jour : 2011-10-23
Fréquence d'utilisation : 1
Qualité :
the entire content of the partition where the original system resides will be erased.note: the entire content of the partition that is to be erased has been copied to this hidden system partition.
l’intero contenuto della partizione dove il sistema originale risiede sarà cancellato.nota: l’intero contenuto della partizione che è stato cancellato è stato copiato nella partizione del sistema ignoto.
Dernière mise à jour : 2016-10-20
Fréquence d'utilisation : 1
Qualité :
as stated in the commission's abovementioned notice on direct business taxation, the presence of aid may be ruled out where the different nature of the measure is justified by the nature and general scheme of the system.
as stated in the commission's abovementioned notice on direct business taxation, the presence of aid may be ruled out where the different nature of the measure is justified by the nature and general scheme of the system.
Dernière mise à jour : 2014-10-23
Fréquence d'utilisation : 1
Qualité :
( e ) ancillary systems that require liquidity in the early morning need to have established means to cope with cases where the daytime processing cannot be started in time due to an ssp failure on the previous day .
( e ) ancillary systems that require liquidity in the early morning need to have established means to cope with cases where the daytime processing cannot be started in time due to an ssp failure on the previous day .
Dernière mise à jour : 2011-10-23
Fréquence d'utilisation : 1
Qualité :
the central clearing point communicates the reasons for the refusal by secure means of communication — depending on the content — to the central clearing point of the requesting member state where the visa application is pending.«
the central clearing point communicates the reasons for the refusal by secure means of communication — depending on the content — to the central clearing point of the requesting member state where the visa application is pending.»;
Dernière mise à jour : 2014-11-05
Fréquence d'utilisation : 1
Qualité :
that would be the case where the existence of the respective claims has in principle been demonstrated and quantified and where a proper risk analysis has been carried out by the state authorities leading to the conclusion that such an agreement is in the state's interest [20].
that would be the case where the existence of the respective claims has in principle been demonstrated and quantified and where a proper risk analysis has been carried out by the state authorities leading to the conclusion that such an agreement is in the state's interest [20].
Dernière mise à jour : 2014-10-23
Fréquence d'utilisation : 1
Qualité :
in the following steps, you will create two truecrypt volumes (outer and hidden) within the first partition behind the system partition. the hidden volume will contain the hidden operating system (os). truecrypt will create the hidden os by copying the content of the system partition (where the currently running os is installed) to the hidden volume. to the outer volume, you will copy some sensitive looking files that you actually do not want to hide. they will be there for anyone forcing you to disclose the password for the hidden os partition. you can reveal the password for the outer volume within the hidden os partition (the existence of the hidden os remains secret).finally, on the system partition of the currently running os, you will install a new os, so-called decoy os, and encrypt it. it must not contain sensitive data and will be there for anyone forcing you to reveal your pre-boot authentication password. in total, there will be three passwords. two of them can be disclosed (for the decoy os and outer volume). if you use the third one, the hidden os will start.
nei passi seguenti, voi creerete due volumi truecrypt (esterno ed ignoto) all’interno della prima partizione dietro a quella di sistema. il volume ignoto conterrà il sistema operativo ignoto (os). truecrypt creerà l’os ignoto copiando il contenuto della partizione di sistema (dove l’os attualmente in esecuzione è installato) nel volume ignoto. nel volume ignoto, copierete alcuni dati che sembrano sensitivi e che attualmente non desiderate nascondere. questi saranno qui a disposizione di chi vi forza a svelare la password per la partizione dell’os ignoto. potete rivelare la password per il volume esterno all’interno della partizione dell’os ignoto (comunque, l’esistenza dell’os ignoto rimane segreta).finalmente, nella partizione di sistema dell’ os attualmente in esecuzione, voi installerete un nuovo os, cosiddetto os di richiamo, e quindi codificarlo. non deve contenere dei dati sensibili e deve essere presente per chiunque vi costringe a rivelare la password di autenticazione di preavvio. in totale, ci saranno tre password. due di esse possono essere svelate (per l’os di richiamo ed il volume esterno). usando la terza password, l’os ignoto potrà partire.
Dernière mise à jour : 2016-10-20
Fréquence d'utilisation : 1
Qualité :
Certaines traductions humaines peu pertinentes ont été masquées.
Affichez les résultats peu pertinents.