Обучается переводу с помощью примеров, переведенных людьми.
Добавлены профессиональными переводчиками и компаниями и на основе веб-страниц и открытых баз переводов.
nyt@ action go to the main screen
nieuwe vraag@action go to the main screen
Последнее обновление: 2011-10-23
Частота использования: 1
Качество:
søgetekstfind and go to the next search match
tekst om naar te zoekenfind and go to the next search match
Последнее обновление: 2011-10-23
Частота использования: 1
Качество:
& nyt@ action go to the main screen
& nieuw@action go to the main screen
Последнее обновление: 2011-10-23
Частота использования: 1
Качество:
Предупреждение: Содержит скрытое HTML-форматирование
spring til næste træfferfind and go to the previous search match
ga naar volgende overeenkomstfind and go to the previous search match
Последнее обновление: 2011-10-23
Частота использования: 1
Качество:
in order to do so, the commission has assessed whether the measure proposed by the uk is necessary and proportionate to the stated objective and does not distort competition to an extent contrary to the common interest.
in order to do so, the commission has assessed whether the measure proposed by the uk is necessary and proportionate to the stated objective and does not distort competition to an extent contrary to the common interest.
Последнее обновление: 2014-10-23
Частота использования: 1
Качество:
or during the migration period a payer can show that it intended to submit a payment order to target2ecb , but was unable to do so due to the stop-sending status of a national rtgs system that had not yet migrated to target2 .
or during the migration period a payer can show that it intended to submit a payment order to target2ecb , but was unable to do so due to the stop-sending status of a national rtgs system that had not yet migrated to target2 .
Последнее обновление: 2011-10-23
Частота использования: 1
Качество:
it may happen that you are forced by somebody to decrypt the operating system. there are many situations where you cannot refuse to do so (for example, due to extortion). if you select this option, you will create a hidden operating system whose existence will be impossible to prove (provided that certain guidelines are followed). thus, you will not have to decrypt or reveal the password to the hidden operating system. for a detailed explanation, please click the link below.
het kan voorkomen dat u gedwongen wordt door iemand het operating system te decoderen. er zijn veel situaties denkbaar waarin u moeilijk zult kunnen weigeren dit te doen, bijv. in geval van afpersing. indien u deze optie selecteert, wordt een verborgen operating systeem aangemaakt waarvan het bestaan onmogelijk is aan te tonen (vooropgesteld dat aan bepaalde richtlijnen is voldaan). en dus zult u het wachtwoord voor dit verborgen operating systeem niet vrij hoeven te geven. voor een gedetailleerde uitleg, klik op de link hieronder…
Последнее обновление: 2013-12-16
Частота использования: 1
Качество: