전문 번역가, 번역 회사, 웹 페이지 및 자유롭게 사용할 수 있는 번역 저장소 등을 활용합니다.
personalnamespace accessible for others.
osobistenamespace accessible for others.
마지막 업데이트: 2011-10-23
사용 빈도: 1
품질:
opciones de publicaciónas in accessible for people
as in accessible for people
마지막 업데이트: 2011-10-23
사용 빈도: 1
품질:
sistema de archivos desconocidohard disk label (not mounted or accessible)
nieznany system plikówhard disk label (not mounted or accessible)
마지막 업데이트: 2011-10-23
사용 빈도: 1
품질:
a live webcast of the call, along with presentation slides will be accessible at www.logitech.com/investors.
the new patterns and colors will be available on the logitech v220 cordless optical mouse for notebooks beginning today in the u.s for a suggested retail price of $29.99.
마지막 업데이트: 2009-12-19
사용 빈도: 1
품질:
a live webcast of the call, along with presentation slides, will be accessible at http://ir.logitech.com .
in september for a suggested retail price of $29.99 (u.s.).
마지막 업데이트: 2009-12-19
사용 빈도: 1
품질:
the effects on trade are also evidenced by the fact that the tote offers its betting services also over the internet, which is easily accessible from other member states.
the effects on trade are also evidenced by the fact that the tote offers its betting services also over the internet, which is easily accessible from other member states.
마지막 업데이트: 2014-10-23
사용 빈도: 1
품질:
at the end of many drives, there is an area that is normally hidden from the operating system (such areas are usually referred to as host protected areas). however, some programs can read and write data from/to such areas.warning: some computer manufacturers may use such areas to store tools and data for raid, system recovery, system setup, diagnostic, or other purposes. if such tools or data must be accessible before booting, the hidden area should not be encrypted (choose 'no' above).do you want truecrypt to detect and encrypt such a hidden area (if any) at the end of the system drive?
na końcu wielu dysków są ukryte miejsca gdzie nie ma dostępu system operacyjny (są to zwykle host protected areas). jednakże niektóre programy potrafią czytać i pisać dane z/do tych sektorów.uwaga: niektórzy producenci sprzętu używają tych miejsc do przechowywania narzędni np do raid, odtwarzania systemu, konfiguracji systemu, diagnostyki lub innych narzędzi. jeżeli te narzędzia lub dane muszą być dostępne przed bootowaniem, obszar ten nie powinien być zaszyfrowany (wybierz 'nie' powyżej).czy chcesz aby truecrypt wykrył i zaszyfrował te ukryte obszary na końcu dysku?
마지막 업데이트: 2012-12-23
사용 빈도: 1
품질: