Обучается переводу с помощью примеров, переведенных людьми.
Добавлены профессиональными переводчиками и компаниями и на основе веб-страниц и открытых баз переводов.
jeg har lært, at man, når man drøfter reformer af denne art, bør begynde med at spørge sig selv: where is the beef?
aprendi que quando se discutem reformas deste tipo, devemos começar por nos perguntar: where is the beef?
Последнее обновление: 2012-03-22
Частота использования: 2
Качество:
kan en skrivelse alene hindre gennem førelsen af en lovgivning, der er vedtaget af kommissionen og rådet? where is the rule of the law, sir leon brittan?
uma simples carta pode impedir a aplicação de legislação aprovada pela comissão e pelo conselho? where is the rule of the law, sir leon brittan?
Последнее обновление: 2014-02-06
Частота использования: 1
Качество:
the commission's initial assessment of the use of various methods in this particular case is that they seem to lead to significantly different results based on similar facts.
the commission's initial assessment of the use of various methods in this particular case is that they seem to lead to significantly different results based on similar facts.
Последнее обновление: 2014-10-23
Частота использования: 1
Качество:
the key difference between these and normal fixed and short-term contracts is that the secondments are supported by the seconding institution and the seconded staff members retain his / her employment relationship with that institution .
the key difference between these and normal fixed and short-term contracts is that the secondments are supported by the seconding institution and the seconded staff members retain his / her employment relationship with that institution .
Последнее обновление: 2011-10-23
Частота использования: 1
Качество:
important: please remember the algorithms that you select in this step. you will have to select the same algorithms for the decoy system. otherwise, the hidden system will be inaccessible! (the decoy system must be encrypted with the same encryption algorithm as the hidden system.)note: the reason is that the decoy system and the hidden system will share a single boot loader, which supports only a single algorithm, selected by the user (for each algorithm, there is a special version of the truecrypt boot loader).
importante: por favor, lembre-se dos algoritmos que você selecionar nesta etapa. você terá que selecionar os mesmos algoritmos para o sistema . caso contrário, o sistema oculto estará inacessível! (o sistema deve ser criptografado com o mesmo algoritmo de criptografia do sistema oculto.)nota: a razão é que o sistema isca e o oculto irão compartilhar um único gestor de inicialização, que suporta apenas um único algoritmo, selecionado pelo usuário (para cada algoritmo, existe uma versão especial do truecrypt boot loader).
Последнее обновление: 2009-12-14
Частота использования: 1
Качество:
Несколько пользовательских переводов с низким соответствием были скрыты.
Показать результаты с низким соответствием.