Van professionele vertalers, bedrijven, webpagina's en gratis beschikbare vertaalbronnen.
in accordance with the first sentence of article 17.5 of the rules of procedure of the european central bank , the governing council has adopted this opinion .
in accordance with the first sentence of article 17.5 of the rules of procedure of the european central bank , the governing council has adopted this opinion .
Laatste Update: 2011-10-23
Gebruiksfrequentie: 1
Kwaliteit:
your personal information is handled in accordance with the it security and confidentiality rules of the ecb and the confidentiality and security requirements of regulation ( ec ) no 45/2001 .
your personal information is handled in accordance with the it security and confidentiality rules of the ecb and the confidentiality and security requirements of regulation ( ec ) no 45/2001 .
Laatste Update: 2011-10-23
Gebruiksfrequentie: 1
Kwaliteit:
participants are given two challenging one-year assignments each to be carried out in a different division of the ecb , allocated on the basis of their field of expertise and in line with the organisational needs of the bank .
participants are given two challenging one-year assignments each to be carried out in a different division of the ecb , allocated on the basis of their field of expertise and in line with the organisational needs of the bank .
Laatste Update: 2011-10-23
Gebruiksfrequentie: 1
Kwaliteit:
in the following steps, you will set the options and password for the hidden volume, which will contain the hidden operating system.remark: the cluster bitmap of the outer volume has been scanned in order to determine the size of uninterrupted area of free space whose end is aligned with the end of the outer volume. this area will accommodate the hidden volume, so it limits its maximum possible size. the maximum possible size of the hidden volume has been determined and confirmed to be greater than the size of the system partition (which is required, because the entire content of the system partition will need to be copied to the hidden volume). this ensures that no data currently stored on the outer volume will be overwritten by data written to the area of the hidden volume.
seuraavissa vaiheissa, sinun tulet valitsemaan vaihtoehdon ja salasanan piilotetulle taltiolle, mikä sisältää piilotetun käyttöjärjestelmän.maininta: klusterin bittikartta ulkoiselle taltiolle on skannattu keskeytymättömän alueen tunnistamiseksi vapaalla alueella mikä on järjestetty ulkoisen taltion loppuun. tämä alue sisältää piilotetun taltion, siksi se rajoittaa mahdollisen maksimi koon. maksimi mahdollinen koko piilotetulle taltiolle on tunnistettu ja vahvistettu olevaksi isompi kuin järjestelmäosion koko (mikä on vaadittu, koska kokonainen sisältö tarvitaan kopioida piilotetulle taltiolle). tämä takaa sen että nykyisin ulkoiselle taltiolle tallennettu tietoa ei ylikirjoiteta piilotetun taltion kirjoitetulla tiedolla.
Laatste Update: 2009-12-14
Gebruiksfrequentie: 1
Kwaliteit:
Enkele menselijke vertalingen met lage relevantie werden verborgen.
Toon lage-relevantie resultaten.