Приклади вживання To prevent abuse Англійська мовою та їх переклад на Українською
{-}
-
Colloquial
-
Ecclesiastic
-
Computer
Measures to prevent abuse of economic power.
D(e.g., to guarantee data security and to prevent abuse).
To prevent abuse, we may ask you to identify yourself properly.
The legislative and executive must be separate, he says, to prevent abuse of power.
To prevent abuse of service, sending emails from YOPmail is prohibited.
It was taken as a temporary solution to prevent abuse and speculation until the formation of the land market.
In addition, it was intended to create asystem of interdependence that provides mutual control in order to prevent abuse.
In order to prevent abuse, we can ask you to identify yourself adequately.
We may log IP addresses and/or drop cookies to prevent abuse of our website and/or to enhance services.
In order to prevent abuse and to eliminate low quality apps, Ethereum requires that applications spend a currency called ether.
We may log IP addresses and/ordrop cookies and/or flash cookies to prevent abuse of our website and or to provide and or to enhance services.
If it is required to prevent abuse or other unlawful acts, such as coordinated attacks, in order to ensure data security.
Blocked-mailpassword":"Your IP address is blocked from editing, andso is not allowed to use the password recovery function to prevent abuse.".
It is therefore necessary to prevent abuse that governments and the private high finance have on currencies.
We reserve the right to delete ormodify any ads which are in violation of our guidelines to prevent abuse and keep the content appropriate for our general audience.
For safety reasons and to prevent abuse, your registration must be confirmed by a return from you.
The MLI Convention not only provides for the use of concept of beneficial owner,but also introduces the Principal Purpose Test to prevent abuse of tax treaties.
One is that the efforts to prevent abuse in the past have brought only modest results.
Facebook and other leading technology companies believe that the scientific community can share learnings to advance technology,while also working to prevent abuse.”.
Captchas are used to prevent abuse from"bots" or automated programs that are written to generate spam.
States Parties shall ensure that all measures that relate to the exerciseof legal capacity provide for appropriate and effective safeguards to prevent abuse in accordance with international human rights law.
CAPTCHAs are used by many websites to prevent abuse from“bots,” or automated programs usually written to generate spam.
Where a Party's legislation makes entitlement to unemployment benefit conditional on the completion of a qualifying period, that period shall beno longer than is considered necessary to prevent abuse.
The main purpose of theintroduction of electronic administration of VAT is to prevent abuse by illegal reimbursement of VAT from the budget, reducing the risk of fraudulent credit obtaining prevent improper VAT refund from the budget, reduction of the shadow economy in the country and government spending on administration of VAT.
Where the legislation of a Member makes the right to unemployment benefit conditional upon the completion of a qualifying period,this period shall not exceed the length deemed necessary to prevent abuse.
Where a Party's legislation makes entitlement to medical care conditional on the completion of a qualifying period, that period shall beno longer than is considered necessary to prevent abuse.
Where the legislation of a Member makes the right to unemployment benefit conditional upon the completion of a qualifying period,this period shall not exceed the length deemed necessary to prevent abuse.
Where a Party's legislation makes entitlement to sickness cash benefit conditional on the completion of a qualifying period, that period shall beno longer than is considered necessary to prevent abuse.
If a user has suspected that someone else has access to his account, he must immediately inform the administration of a website,in order to block further access to the account, to prevent abuse of the system.
For example, it enables us to sort server nodes by the number of users connected, to limit your account to one concurrent IP address per VPN connection(to prevent shared accounts),resource analytics(to carry out usage analysis for administrative purposes), and to prevent abuse and fraud.