영어에서 The end-user 을 사용하는 예와 한국어로 번역
{-}
-
Colloquial
-
Ecclesiastic
-
Ecclesiastic
-
Programming
-
Computer
How it works for the end-user.
The end-user experience is the most critical factor in VDI success.
Then came the end-user training.
Benefits of“ready-to-mount” trims for the end-user.
A: User Requirements describe the end-user requirements for a system.
사람들은 또한 번역합니다
Textiles receive a range of treatments before they reach the end-user.
A user should always represent the end-user that is requesting data.
This is good because monopolies are almost never good for the end-user.
PTFE is non-toxic, safe for the end-user, insoluble and biocompatible.
Modelling is the mode to expose operational data to the end-user.
The end-user license agreement(EULA) is part of the HTML Help download.
It is an approximation of the end-user experience.
Most of today's threats are client-side threats, initiated by the end-user.
The end-user device may also have at least one camera 255 for taking pictures.
Yet, the new article may be of significant value to the end-user.
The end-user is thus assured that the software cannot be tampered with in any way.
A supplier is one who supplies the products or commodity to the end-user/customers.
Otherwise, the End-User Device(s) 109 must manually launch the autorun. exe 1812.
An ebook can be sent directly by email as downloadable PDF-format to the end-user.
By deploying these settings, you minimize the end-user effort required to connect to the corporate network.
A successful virtual desktop infrastructure(VDI) requires careful attention to the end-user experience.
On the end-user side, the new version makes it a bit easier to customize which tasks and assignments are viewed.
To bring full(technical) information to the end-user as clearly and efficiently as possible in consultation with the customer.
Professional customer experience monitoring of wireless network performance and services from the end-user point of view.
This database can be checked to ensure that the End-User Device(s) 109 only makes one request for each piece of Content 113 purchased.
If you choose Provisioning PAC, choose whether to allow an anonymous TLS handshake between the end-user client and XenMobile.
Usually the malware program appears to the end-user as a Trojan, but once executed, it attacks other victims over the network like a worm.
Perhaps the most exciting part of the announcement is what added competition in this space should bring to the end-user.
In this manner, a snippet description clearly illustrates to the end-user a relevance of the identified KB article 106.