Примеры использования Was configured на Английском языке и их переводы на Русский язык
{-}
-
Official
-
Colloquial
His computer was configured for remote screen access.
Make sure that your Throttle Range was configured correctly.
The certificate was configured but cannot be located by the CA.
After each completed step do not touch what was configured previously.
The certificate was configured but has not yet been loaded by the CA.
Check whether automatic content download from an FTP Server was configured for the FHD Player.
Another site was configured with a boundary that matched the client's network location.
However, the patient did not want to die and was configured for a decisive battle with the disease.
They should be pre-configured in the exactly the same way as the first Backend Server was configured.
Originally the first button was configured for turning the Touch mode on and off.
In preparation for the system's complete roll-out to all customs offices, the new ASYCUDA World was configured and launched in June 2009.
If the program was configured to run with administrative rights, it runs in the context of the Local System account.
A lack of error handling in case no home directory was configured/specified for the user could lead to file disclosure.
The gun was configured to provide a 0.5 gal/ min(1.9 l/min) controlled output and spray pattern at 2000 psi(138 bar) spray processing pressure.
Once you do this,you will be much easier to follow, because it was configured for you and your personality.
In 2003, MSN. com was configured to present Opera browsers with a style sheet used for old versions of Microsoft Internet Explorer.
Current was run through each of the coils, but only one was configured to produce a 5-Gauss magnetic field at a time.
If the certificate template was configured with Autoenroll permissions, the certificate will be issued automatically the next time the user logs on to the network.
There were no"binary" editors in the original version of Unix- the entire system was configured using textual shell command scripts.
If the certificate was configured with Read and Enroll permissions, the new key recovery agent must use the Certificates snap-in and the Certificate Import Wizard to obtain a key recovery certificate.
Code injection was possible when SquirrelMail was configured to use the map_yp_alias function to authenticate users.
No doubt those knowledgeable in watch construction will bolt upright at the thought.“But then the watch would run backwards!” That would be true,except that the escapement was configured to run backwards.
Declan McCullagh at News.com wrote on August 24, 2007, that the DNI site was configured to repel all search engines to index any page at DNI. gov.
The customer relationship management platform was configured at UNLB and software was acquired and customized during the reporting period for facilitating inspections of contingent-owned equipment in field operations during the reporting period.
To improve system's security, it can be entered different ways,depending on how it was configured in the application settings.
When the whole store network was assembled and the project was configured, a surprise for installers was that the devices manage to‘migrate' to unpredictable speed of exchange and do not give a part of the data, which led to repeated readings and lengthening the poll cycle of the entire network.
When you run the New Advertisement Wizard,the summary page might say that the advertisement was not assigned, even though it was configured to run as soon as possible, and that the assignment will ignore maintenance windows.
If the protection scope orscan scope of the subnodes in the server file resource tree was configured separately, the security settings from the template applied to the parent node are not set automatically for such subnodes.
If a User is not authorized to perform changes to the installed software on the Device on whichthe Program is installed, or if the installed copy of the Program was configured by the Licensee to reject Updates, then it is not technically possible for them to acquire Updates.
As indicated in the 2009/10 performance report(A/65/610/Add.1), the customer relationship management platform was configured and the network infrastructure established at UNLB, and software was acquired and customized for facilitating inspections of contingent-owned equipment in field operations.