Приклади вживання Network resources Англійська мовою та їх переклад на Українською
{-}
-
Colloquial
-
Ecclesiastic
-
Computer
Securing Virtual Network Resources.
The network resources most users need will be available locally.
It also can consume network resources.
Protects critical network resources from the latest security threats and vulnerabilities.
High speed of access to network resources.
Safely use of network resources informational and educational environment for student.
Allows your computer to access network resources.
Automatically discovers network resources and changes in network configuration.
Represents a computer's access to network resources.
М2 Network resources optimal allocation models and methods in wireless telecommunication systems.
WiFi is now the primary method of access to network resources.
The needs of data centers in network resources are radically different from standard networks. .
It allows Internet users to access network resources.
M2 Network resources optimal allocation models and methods in wireless telecommunication systems(Number of comments: 13).
Chrome OS has no built-in mechanism to access network resources.
Control and management of access to the company's network resources, making it possible to analyze the user activity after obtaining access;
Their daily and administered several times on different network resources.
The http scheme is used to locate network resources via HTTP protocol.
After the introduction of the system theCompany got a single data bank of the network resources.
Windows NT(and 2000) uses the idea of a domain to manage access to a setof network resources(applications, printers, and so forth) for a group of users.
Firewalls protect against unauthorised access andprevent attacks on the network by blocking access to network resources.
Radio equipment does not harm the network or its functioning nor misuse network resources, thereby causing an unacceptable degradation of service;
Students will work with Pulse Policy Secure, theSRX Series Gateway as a firewall enforcer, and configure secured access to network resources.
Older clients and servers may try to transfer excessively-sizedmessages that will be rejected after consuming network resources, including connect time to network links that is paid by the minute.
The program runs in the background, using a minimum of memory and network resources.
Meraki switches make it easy to understand how valuable network resources are being used.
Offers customization of subtitles, visual effects, network resources.
Large amount of information about networking status, remote access, network resources and Internet settings.
URL or DNS spoofing to redirect the user to false network resources.
Smiddle Smart Connect-automatic authentication of an employee at the workplace and granting him access rights to network resources depending on his profile.