Via de voorbeelden van menselijke vertaling trachten te leren vertalen.
Van: Machinevertaling
Stel een betere vertaling voor
Kwaliteit:
Van professionele vertalers, bedrijven, webpagina's en gratis beschikbare vertaalbronnen.
make sure that your application is eligible by submitting it by the deadline .
make sure that your application is eligible by submitting it by the deadline .
Laatste Update: 2011-10-23
Gebruiksfrequentie: 1
Kwaliteit:
it also requests that your authorities forward a copy of this letter to the potential recipients of the aid.
it also requests that your authorities forward a copy of this letter to the potential recipients of the aid.
Laatste Update: 2014-10-23
Gebruiksfrequentie: 1
Kwaliteit:
the commission's initial assessment of the use of various methods in this particular case is that they seem to lead to significantly different results based on similar facts.
the commission's initial assessment of the use of various methods in this particular case is that they seem to lead to significantly different results based on similar facts.
Laatste Update: 2014-10-23
Gebruiksfrequentie: 1
Kwaliteit:
the key difference between these and normal fixed and short-term contracts is that the secondments are supported by the seconding institution and the seconded staff members retain his / her employment relationship with that institution .
the key difference between these and normal fixed and short-term contracts is that the secondments are supported by the seconding institution and the seconded staff members retain his / her employment relationship with that institution .
Laatste Update: 2011-10-23
Gebruiksfrequentie: 1
Kwaliteit:
important: please remember the algorithms that you select in this step. you will have to select the same algorithms for the decoy system. otherwise, the hidden system will be inaccessible! (the decoy system must be encrypted with the same encryption algorithm as the hidden system.)note: the reason is that the decoy system and the hidden system will share a single boot loader, which supports only a single algorithm, selected by the user (for each algorithm, there is a special version of the truecrypt boot loader).
importante: por favor, lembre-se dos algoritmos que você selecionar nesta etapa. você terá que selecionar os mesmos algoritmos para o sistema . caso contrário, o sistema oculto estará inacessível! (o sistema deve ser criptografado com o mesmo algoritmo de criptografia do sistema oculto.)nota: a razão é que o sistema isca e o oculto irão compartilhar um único gestor de inicialização, que suporta apenas um único algoritmo, selecionado pelo usuário (para cada algoritmo, existe uma versão especial do truecrypt boot loader).
Laatste Update: 2009-12-14
Gebruiksfrequentie: 1
Kwaliteit:
Enkele menselijke vertalingen met lage relevantie werden verborgen.
Toon lage-relevantie resultaten.