Van professionele vertalers, bedrijven, webpagina's en gratis beschikbare vertaalbronnen.
the data in stored with our external data processor .
the data in stored with our external data processor .
Laatste Update: 2011-10-23
Gebruiksfrequentie: 1
Kwaliteit:
participants shall use the icm to obtain information on their liquidity position .
participants shall use the icm to obtain information on their liquidity position .
Laatste Update: 2011-10-23
Gebruiksfrequentie: 1
Kwaliteit:
eurostat will maintain a database for the data , and will publish fats annually .
eurostat will maintain a database for the data , and will publish fats annually .
Laatste Update: 2011-10-23
Gebruiksfrequentie: 1
Kwaliteit:
use of near infra- red spectroscopy by the pharmaceutical industry and the data to be forwarded in part ii of the dossier for a marketing authorisation
in- use stability testing of veterinary medicinal products
Laatste Update: 2011-10-23
Gebruiksfrequentie: 1
Kwaliteit:
Gelieve het te verwijderen indien je dit meent.
they should directly be given to the data processing institutes , namely statistical institutes and central banks .
they should directly be given to the data processing institutes , namely statistical institutes and central banks .
Laatste Update: 2011-10-23
Gebruiksfrequentie: 1
Kwaliteit:
each member state will take all measures necessary to ensure the quality of the data transmitted according to common quality standards .
each member state will take all measures necessary to ensure the quality of the data transmitted according to common quality standards .
Laatste Update: 2011-10-23
Gebruiksfrequentie: 1
Kwaliteit:
the benefits of the availability of the data have been measured against the costs of collection and the burden on businesses for the pilot studies .
the benefits of the availability of the data have been measured against the costs of collection and the burden on businesses for the pilot studies .
Laatste Update: 2011-10-23
Gebruiksfrequentie: 1
Kwaliteit:
udforskning af tjenesten% 1source: name of the data, service: writes data instead of fetching
% 1- palveluselainsource: name of the data, service: writes data instead of fetching
Laatste Update: 2011-10-23
Gebruiksfrequentie: 1
Kwaliteit:
valg af krypteringsnøgleif in your language something like 'key( s)' is not possible please use the plural in the translation
salausavaimen valintaif in your language something like 'key( s)' isn' t possible please use the plural in the translation
Laatste Update: 2011-10-23
Gebruiksfrequentie: 1
Kwaliteit:
but it can be appreciated that it is not very heavy , because existing data are generally used for processing the fats data sets and the data collection is based on already existing data collections .
but it can be appreciated that it is not very heavy , because existing data are generally used for processing the fats data sets and the data collection is based on already existing data collections .
Laatste Update: 2011-10-23
Gebruiksfrequentie: 1
Kwaliteit:
if a participant 's connection to the network service provider fails , the participant shall use the alternative means of transmission of messages laid down in appendix iv .
if a participant 's connection to the network service provider fails , the participant shall use the alternative means of transmission of messages laid down in appendix iv .
Laatste Update: 2011-10-23
Gebruiksfrequentie: 1
Kwaliteit:
krypteringsnøgle- valgif in your language something like 'key( s)' isn' t possible please use the plural in the translation
salausavaimen valintaif in your language something like 'key( s)' isn' t possible please use the plural in the translation
Laatste Update: 2011-10-23
Gebruiksfrequentie: 1
Kwaliteit:
schengen states are invited to use the first possibility (retransmitting) wherever possible, to avoid the unnecessary multiplying of messages in the system.«
schengen states are invited to use the first possibility (retransmitting) wherever possible, to avoid the unnecessary multiplying of messages in the system.”
Laatste Update: 2014-11-13
Gebruiksfrequentie: 1
Kwaliteit:
( b ) if a participant decides to use the icm functionality for making backup lump sum payments , the ecb shall , if the participant so requests , open this functionality via the icm .
( b ) if a participant decides to use the icm functionality for making backup lump sum payments , the ecb shall , if the participant so requests , open this functionality via the icm .
Laatste Update: 2011-10-23
Gebruiksfrequentie: 1
Kwaliteit:
in the following steps, you will create two truecrypt volumes (outer and hidden) within the first partition behind the system partition. the hidden volume will contain the hidden operating system (os). truecrypt will create the hidden os by copying the content of the system partition (where the currently running os is installed) to the hidden volume. to the outer volume, you will copy some sensitive looking files that you actually do not want to hide. they will be there for anyone forcing you to disclose the password for the hidden os partition. you can reveal the password for the outer volume within the hidden os partition (the existence of the hidden os remains secret).finally, on the system partition of the currently running os, you will install a new os, so-called decoy os, and encrypt it. it must not contain sensitive data and will be there for anyone forcing you to reveal your pre-boot authentication password. in total, there will be three passwords. two of them can be disclosed (for the decoy os and outer volume). if you use the third one, the hidden os will start.
seuraavassa kohdassa, luot kaksi truecrypt taltiota (ulkoinen ja piilotettu) ensimmäisen osion sisälle ja järjelmäosion taakse. piilotettu taltio sisältää piilotetun käyttöjärjestelmän (os). truecrypt luo piilotetun os kopioimalla järjelmäosion sisällön (missä nykyinen ajettava os on asennettuna) piilotetulla taltiolla. ulkoiselle taltiolle, sinä kopioit jotakin herkkäluontoiselta näyttäviä tiedostoja joita et todellisuudessa halua piilottaa. ne ovat siellä koska jos jokin pakottaa sinua paljastamaan salasanan piilotetulle käyttöjärjelmäosiolle. voit paljastaa salasanan ulkoiselle taltiolle piilotetun käyttöjärjelmäosion sisällä (piilotetun käyttöjärjestelmän olemassaolo pysyy salassa).lopuksi, käynnissä olevalla käyttöjärjestelmän osiolla, voit asentaa uuden käyttöjärjestelmän, niin kutsutun houkutuslintu käyttöjärjestelmän, ja salata sen. sen ei pidä sisältää herkkää tietoa ja ovat siellä jos jokin pakottaa sinua paljastamaan esikäynnistys autentikointi salasanan. kokonaisuudessaan, siellä on kolme salasanaa. kaksi niistä voidaan paljastaa (houkutuslintu käyttöjärjestelmälle ja ulkoiselle taltiolle). jos käytät kolmatta, piilotettu käyttöjärjestelmä käynnistyy.
Laatste Update: 2009-12-14
Gebruiksfrequentie: 1
Kwaliteit:
Enkele menselijke vertalingen met lage relevantie werden verborgen.
Toon lage-relevantie resultaten.