Приклади вживання Unauthorized actions Англійська мовою та їх переклад на Українською
{-}
-
Colloquial
-
Ecclesiastic
-
Computer
Unauthorized actions or uses.
Execute otherwise unauthorized actions.
Unauthorized actions to information processed in electronic machines.
Ukraine faces diplomatic scandal due to unauthorized actions of NABU in Austria.
Trojan, is a computer virus that can be installed on your computer without realizing it,in order to steal sensitive information and perform unauthorized actions.
The company is not responsible for any unauthorized actions with credit cards.
Administration of the Website does not take responsibility for a possible Information leak out of database of the Website for whatever reason,which includes the result of unauthorized actions of third parties.
Individual identification of the Buyer avoids unauthorized actions of third parties on behalf of the Buyer.
If you find that unauthorized actions are occurring in your account or password, change the password in your account or contact an authorized employee of the AGRANALITA LLC company to help you with this.
Enough to install on cell phone spy application and perform unauthorized actions on their own.
A User shall not perform any unauthorized actions with the Site including hacking of the Site paid functions.
You know that provokings of minors on participation in similar unauthorized actions once again took place.
After he managed to break the system to replace the broadcast, get the ability to create fake subtitles and even generate a currency for peer to peer payment system Bitcoin,as well as perform other unauthorized actions.
Individual identification of the Buyer allows to avoid unauthorized actions of third parties on behalf of the Buyer.
Some believe that this was a provocation on the part of the Comandante, who advocated a categorical refusal to withdraw weapons from the island,but most called the tragedy the unauthorized actions of the Soviet commanders.
Fraudulent e-mails assume many different forms and are the unauthorized actions of third parties not associated with UPS.
In the event of unauthorized actions in regards of such property, ARMA is authorized to protect its rights to management, including by filing appeals on the registration actions, filing claims for the invalidation of transactions, etc.;
Presence in used equipment energy independent memory, fixating all unauthorized actions on system of data gathering;
It is noted that among the main problems in the field of ensuring nuclear safety- existence of objects of nuclear heritage in respect of which it is necessary to take measures for end of life cycle and rehabilitation, accumulation of nuclear waste and also emergenceof new technologies which can be applied to commission of terrorist attacks and other unauthorized actions on nuclear objects.
Individual identification of the Buyer allows to avoid unauthorized actions of third parties on behalf of the Buyer and opens access to additional services.
Very important for the client is not only the right to use a particular banking service,but its protection from unauthorized actions of the bank in the event of termination of credit assistance.
Individual identification of the Buyer allows to avoid unauthorized actions of third parties on behalf of the Buyer and provides access to additional services.
Twenty-four-hour alert of the SSU and the SSSCIP forces and facilities will be launched to identify,prevent and suppress any unauthorized actions with the CEC information resources",- the NSDC Secretary informed.
Parliament has created specific offences for unauthorized action against computer systems and data.
In particular, in Moscow, as previously noted by the HRC,according to various estimates, the unauthorized action took part from 10 to 50 thousand people.
In St. Petersburg several hundredpeople went to the square near the Kazan Cathedral for an unauthorized action against the war with Ukraine.
When the user chooses one of these"simulated cancel" options, however,the button performs an unexpected or unauthorized action(such as opening a new pop-up, or downloading an unwanted file on the user's system).[4].