来自专业的译者、企业、网页和免费的翻译库。
wait and take it with you ) .
wait and take it with you ) .
最后更新: 2011-10-23
使用频率: 1
质量:
if you decide to bring your family with you to frankfurt and you have children of school age , the following information may be relevant :
if you decide to bring your family with you to frankfurt and you have children of school age , the following information may be relevant :
最后更新: 2011-10-23
使用频率: 1
质量:
the commission's initial assessment of the use of various methods in this particular case is that they seem to lead to significantly different results based on similar facts.
the commission's initial assessment of the use of various methods in this particular case is that they seem to lead to significantly different results based on similar facts.
最后更新: 2014-10-23
使用频率: 1
质量:
the key difference between these and normal fixed and short-term contracts is that the secondments are supported by the seconding institution and the seconded staff members retain his / her employment relationship with that institution .
the key difference between these and normal fixed and short-term contracts is that the secondments are supported by the seconding institution and the seconded staff members retain his / her employment relationship with that institution .
最后更新: 2011-10-23
使用频率: 1
质量:
if the length of your journey exceeds 300 km please provide us with you expense receipts ( e.g. gas bills , toll tickets , etc ) .
if the length of your journey exceeds 300 km please provide us with you expense receipts ( e.g. gas bills , toll tickets , etc ) .
最后更新: 2011-10-23
使用频率: 1
质量:
important: please remember the algorithms that you select in this step. you will have to select the same algorithms for the decoy system. otherwise, the hidden system will be inaccessible! (the decoy system must be encrypted with the same encryption algorithm as the hidden system.)note: the reason is that the decoy system and the hidden system will share a single boot loader, which supports only a single algorithm, selected by the user (for each algorithm, there is a special version of the truecrypt boot loader).
importante: ricordatevi gli algoritmi usati in questo passo. dovrete selezionare gli stessi algoritmi per il sistema operativo di richiamo, altrimenti il sistema operativo ignoto sara’ inaccessibile! (il sistema operativo di richiamo deve essere codificato con lo stesso algoritmo di codifica come il sistema nascosto.)nota: la ragione di questo è che il sistema operativo di richiamo condividerà un singolo loader di avvio, che supporta solo un singolo algoritmo, selezionato dall’utente (per ogni algoritmo, esiste una speciale versione del loader di avvio di truecrypt).
最后更新: 2016-10-20
使用频率: 1
质量: