Примеры использования Are configured на Английском языке и их переводы на Русский язык
{-}
-
Official
-
Colloquial
All devices are configured from the panel.
General IPsec policy settings apply, regardless of which rules are configured.
Two service classes are configured in the system by default.
The License Manager options will affect how licenses are configured and leased.
Clients are configured for Internet-only management.
For example, the following rules are configured in the above figure.
Disks that are configured for RAID cannot be used in storage pools.
Prompts: Specifies the prompts that are configured for the target report.
Advertisements are configured for the option Run program from distribution point.
Software update deployments that are configured with a deadline.
DNS servers are configured to listen on specified IP addresses.
This test lists details for all the resources that are configured in the cluster.
Usually browsers are configured to accept cookies by default.
PC based packages enable a wide variety of tasks to be performed using post processors which are configured for individual machine tools.
By default, the keys are configured as in the picture below.
They are configured to send and receive all external calls through the provider.
The following inbound rules are configured in the above figure.
IPsec rules are configured on the Rules tab in the properties of an IPsec policy.
The X8I operates based on settings that are configured into one of three tables.
Many servers are configured to require authentication on every request.
Ensure your TV andother A/V equipment are configured to use proper inputs.
Stream profiles are configured under Setup> Basic Configuration> Video& Image.
Multicast Messaging in Multiple Master Systems Multicast groups are configured in the Enhanced System Services(ESS) Unite module.
If no values are configured, keys are regenerated automatically at default intervals.
Anti-virus scan policy The following rules are configured for the anti-virus scan policy.
Clusters are configured and managed using both GUI and command line tools.
Protected distribution points are configured with specific boundaries.
Perimeter devices are configured to allow traffic between communicating servers.
Supports every Top-Level-Domain(TLD)- Our DNS servers are configured according to requirements of all RFC's.
If both B1 and B2 are configured as pulse outputs, both binary outputs behave in exactly the same way.