Примери за използване на Network resource на Английски и техните преводи на Български
{-}
-
Colloquial
-
Official
-
Medicine
-
Ecclesiastic
-
Ecclesiastic
-
Computer
Virtualization of Network Resources.
Implementing CheckPoint hardware firewall devices, provides a high level of protection for network resources.
Will Easemon use a lot of network resource when uploading logs?
Every object stores information specific to a network user or network resource.
Smart control of network resources for Cyber-Physical Systems.
NOS routes andmanages communications on the network and coordinates network resources.
DoS is an attempt to make a machine or network resource unavailable to its users.
Does your form template need to be installed on users' computers orcan your users access it from a network resource?
Publishing shared network resources, such as shared folders and printers.
Denial of service attacks(DoS) are designed to make a machine or network resource unavailable to its intended users.
This network resource allows its visitors to download, that is, store their own videos, as well as view videos uploaded by other users.
DoS attacks are an attempt to make a machine or network resource unavailable to its intended users.
Virtualization is the act of creating a virtual(rather than physical) version of a computer application,storage device, or a computer network resource.
ABBYY FineReader allows you ton save recognized text to a network resource- a Web site, an online library, etc.
Denial-of-Service(DoS) attacks are designed to hinder or stop the normal functioning of a website,server or other network resource.
LinkedIn is a massive professional network resource for building contacts in the field as well as the location of your interest.
The exported address book may be too voluminous to save on a flash drive,and export to a network resource may be too slow.
The most common and easiest way to protect a network resource is by assigning it a unique name and a corresponding password.
Virtualization is the creation of a virtual rather than actual version of an operating system, a network resource, a storage device or a server.
The DDoS, or Distributed Denial of Service attack, is one method that an attacker can use to interrupt, or stop completely, the normal operation of a web site,server or other network resource.
Denial of service attacks are designed to make a machine or network resource unavailable to its intended users.
A Denial-of-Service(DoS) attack is designed to hinder or stop the normal functioning of a web site,server or other network resource.
The specialized software of the majority of IT resources(technical devices such as UPS, network resource monitoring systems, specialized security software, etc.).
The first two- is a popular online service transport Uber, allowing through the app on your mobile phone to take advantage of the private car driver services,as well as a network resource Airbnb, designed for short-term rental.
Make a note of the connection name, andthen use Connection Manager in Excel to determine the network resource and database used in the connection.
In some implementations, in response to an intuitive, gesture made on a touch sensitive surface of a first device or by physically moving the device, an object can be transferred orbroadcast to other devices or a network resource based on a direction, velocity or speed of the gesture.".
When using sources from electronic resources or remote access(the Internet) in the article,the bibliographic record of the source and a link to a network resource with a complete network address on the Internet are given in the bibliography list.
Human error- incidents caused by internal personnel, including through incorrect configuration or incorrect deployment of network facilities, platforms, program applications,archives and databases, and misuse of network resource and incident management procedures;
Other misuse of university computing facilities or networked resources, such as the introduction of computer'viruses'.
Other misuse of the University network or its networked resources, such as the introduction of"viruses".