検索ワード: all of them are on schedule (デンマーク語 - イタリア語)

コンピュータによる翻訳

人が翻訳した例文から、翻訳方法を学びます。

Danish

Italian

情報

Danish

all of them are on schedule

Italian

 

から: 機械翻訳
よりよい翻訳の提案
品質:

人による翻訳

プロの翻訳者、企業、ウェブページから自由に利用できる翻訳レポジトリまで。

翻訳の追加

デンマーク語

イタリア語

情報

デンマーク語

ingen tegn fundet. a sentence that uses all of the letters of the alphabet

イタリア語

non sono stati trovati caratteri. a sentence that uses all of the letters of the alphabet

最終更新: 2011-10-23
使用頻度: 1
品質:

デンマーク語

the fees for these schools have to be paid by the member of staff directly , but a portion of them will be reimbursed by the ecb on the basis of the education allowance .

イタリア語

the fees for these schools have to be paid by the member of staff directly , but a portion of them will be reimbursed by the ecb on the basis of the education allowance .

最終更新: 2024-04-13
使用頻度: 1
品質:

デンマーク語

all of these specialists require secretarial , administrative and support services , so we hire in these areas too .

イタリア語

all of these specialists require secretarial , administrative and support services , so we hire in these areas too .

最終更新: 2011-10-23
使用頻度: 1
品質:

デンマーク語

although some of the affected member states have already ratified the agreement , it still needs to be ratified by most of them .

イタリア語

sebbene alcuni degli stati membri in questione l' abbiano già ratificato , l' accordo deve ancora essere ratificato dalla maggior parte di essi .

最終更新: 2011-10-23
使用頻度: 1
品質:

デンマーク語

in the event of a failure of the ecb , some or all of its technical functions in relation to target2-ecb may be performed by other eurosystem cbs .

イタリア語

in the event of a failure of the ecb , some or all of its technical functions in relation to target2-ecb may be performed by other eurosystem cbs .

最終更新: 2011-10-23
使用頻度: 1
品質:

デンマーク語

for the purposes of this paragraph , each as that has been designated under directive 98/26 / ec shall be treated separately , even if two or more of them are operated by the same legal entity .

イタリア語

for the purposes of this paragraph , each as that has been designated under directive 98/26 / ec shall be treated separately , even if two or more of them are operated by the same legal entity .

最終更新: 2011-10-23
使用頻度: 1
品質:

デンマーク語

the terms of the system documents and the rights and obligations created by them are valid and legally binding under the laws of the federal republic of germany by which they are expressed to be governed , and the choice of the laws of the federal republic of germany to govern the system documents is recognised by the laws of the federal republic of germany ;

イタリア語

the terms of the system documents and the rights and obligations created by them are valid and legally binding under the laws of the federal republic of germany by which they are expressed to be governed , and the choice of the laws of the federal republic of germany to govern the system documents is recognised by the laws of the federal republic of germany ;

最終更新: 2011-10-23
使用頻度: 4
品質:

デンマーク語

( b ) in the event of a failure of the ecb , some or all of its technical functions in relation to target2-ecb may be performed by other eurosystem cbs .

イタリア語

( b ) in the event of a failure of the ecb , some or all of its technical functions in relation to target2-ecb may be performed by other eurosystem cbs .

最終更新: 2011-10-23
使用頻度: 1
品質:

デンマーク語

in the following steps, you will create two truecrypt volumes (outer and hidden) within the first partition behind the system partition. the hidden volume will contain the hidden operating system (os). truecrypt will create the hidden os by copying the content of the system partition (where the currently running os is installed) to the hidden volume. to the outer volume, you will copy some sensitive looking files that you actually do not want to hide. they will be there for anyone forcing you to disclose the password for the hidden os partition. you can reveal the password for the outer volume within the hidden os partition (the existence of the hidden os remains secret).finally, on the system partition of the currently running os, you will install a new os, so-called decoy os, and encrypt it. it must not contain sensitive data and will be there for anyone forcing you to reveal your pre-boot authentication password. in total, there will be three passwords. two of them can be disclosed (for the decoy os and outer volume). if you use the third one, the hidden os will start.

イタリア語

nei passi seguenti, voi creerete due volumi truecrypt (esterno ed ignoto) all’interno della prima partizione dietro a quella di sistema. il volume ignoto conterrà il sistema operativo ignoto (os). truecrypt creerà l’os ignoto copiando il contenuto della partizione di sistema (dove l’os attualmente in esecuzione è installato) nel volume ignoto. nel volume ignoto, copierete alcuni dati che sembrano sensitivi e che attualmente non desiderate nascondere. questi saranno qui a disposizione di chi vi forza a svelare la password per la partizione dell’os ignoto. potete rivelare la password per il volume esterno all’interno della partizione dell’os ignoto (comunque, l’esistenza dell’os ignoto rimane segreta).finalmente, nella partizione di sistema dell’ os attualmente in esecuzione, voi installerete un nuovo os, cosiddetto os di richiamo, e quindi codificarlo. non deve contenere dei dati sensibili e deve essere presente per chiunque vi costringe a rivelare la password di autenticazione di preavvio. in totale, ci saranno tre password. due di esse possono essere svelate (per l’os di richiamo ed il volume esterno). usando la terza password, l’os ignoto potrà partire.

最終更新: 2016-10-20
使用頻度: 1
品質:

関係性の低い人による翻訳は非表示になります。
関係性の低い結果を表示します。

人による翻訳を得て
8,040,670,968 より良い訳文を手にいれましょう

ユーザーが協力を求めています。



ユーザー体験を向上させるために Cookie を使用しています。弊社サイトを引き続きご利用いただくことで、Cookie の使用に同意していただくことになります。 詳細。 OK