Eksempler på bruk av User is asked på Engelsk og deres oversettelse til Norsk
{-}
-
Colloquial
-
Ecclesiastic
-
Ecclesiastic
-
Computer
When registering, the user is asked to agree to the terms of use.
Instead, the program is identified and the user is asked for the….
User is asked whether to resume the loaded scan if it seems unfinished.
After finishing the IQ test, The User is asked to send evaluation SMS message.
The user is asked to make use of the TOR browser and send Bitcoins to a specific address.
In order to prevent those data loss scenarios, the user is asked to call con artists who are acting as tech-support.
The user is asked to provide private information such as passwords or credit card information to take action.
In order to prevent those data loss scenarios, the user is asked to call their tech-support, who are pretending to be real to trick you.
The user is asked to follow certain instructions if they want to be able to view the content in question.
When the information is needed to perform a transaction, the user is asked for his password(which is used to decrypt the information);
In the event that the user is asked for permission to process data by the provider in question, the legal basis of said processing is Art. 6 Paragraph 1(a) GDPR.
In such cases, andwhere the User wishes to enter into a business relationship with ORSAM, the User is asked to contact the OSRAM representative in the respective country.
In the event that the user is asked for permission to process data by the provider in question i.e.
Before deletion, the user is asked to confirm that they want to delete the information.
At the end of the install process, when the user is asked to insert one of their previous expansion pack CDs, the Hot Date CD was not always being ejected.
When this BullZip PDF printer is being installed, the user is asked to install three other programs as well, which are tools that BullZip needs in order to run in a proper manner.
Many users are asking this question.
As a result, Users are asked to take note of the General Terms and Conditions of Use as well as the Privacy Policy and any other third-party website document.
Users are asked to sort cards again using these labels(the intent is to see the labels are communicating the location of information and functionality).
That is why when users are asked to pay for the application, they agree and send their money directly to cyber crooks.
Users are asked to pay a ransom fee of $100 in the shape of Bitcoin.
Intimidated users are asked to pay fines if they don't want to be punished for making crimes.
Since users are asked to confirm that they are 18+, it is likely that they may have been tricked into visiting the site because it appeared to be an adult entertainment platform.
Because users are asked to pay the ransom in Bitcoins, which is a virtual currency, they are provided with steps that involve setting up a Bitcoin Wallet and paying the provided ransom.
The second is tied into the purchase of coins- users are asked to buy bundles in order to unlock slots.
Users are asked questions related to their current and future use, enabling others to predict key trends for the industry.
The illustration below shows the results of a survey where Business Intelligence users were asked to describe the benefits of this type of solution.
The entire process is fully automated, and the user is only asked to select the source data files and specify a corresponding file processing mode(text or binary, depending on the origin of MSG files)- the rest of the settings can be left unchanged.