Examples of using Group of computers in English and their translations into German
{-}
-
Colloquial
-
Official
-
Ecclesiastic
-
Medicine
-
Financial
-
Ecclesiastic
-
Political
-
Computer
-
Programming
-
Official/political
-
Political
How do I create a cluster or group of computers for processing?
For a group of computers, you can use FDE on each system's hard drive and use FLE on any removable storage devices.
A visibility area is a group of computers that detect each other.
A group of computers and/or other devices in your home, office, or other location connected wirelessly using Wi-Fi.
If you manage or work with a group of computers in a network, this utility will interest you.
A group of computers, All-In-Ones, or other peripheral devices connected to each other for the purpose of sharing information.
In the Assign section, select the computer or group of computers on which this policy will be applied.
A LAN is a group of computers and associated devices that typically share common resources within a limited geographical area.
Each of these files is stored in a different server farm(large group of computers) in random locations across the US.
It describes a group of computers or networks connected together over the internet.
To extend the SMTP relay to privatesubnets, for Relay Restriction, use Single Computer 127.0.0.1 and Group of Computers 172.1.1.0- 255.255.255.0 in the netmask section.
Wireless Local Area Network- A group of computers and associated devices that communicate with each other wirelessly.
Administrators can configure a primary server and multiple secondary servers,allowing for excellent scalability with a group of computers sharing heavy data processing jobs.
An error domain would be a group of computers in a rack that share both the power supply and the network switch.
Use this rule type to authenticate the communications between two specified computers, between two groups of computers, between two subnets, or between a specified computer and a group of computers or a subnet.
A server farm consists of a group of computers functioning as servers and that are accomodated at a joint location.
For Connection, use Single Computer 127.0.0.1 and Group of Computers 172.1.1.0- 255.255.255.0 in the netmask section.
Knowing how a group of computers is configured, and what software is actually being employed, could help you get to the bottom of some of your most troubling questions.
Ad-hoc Network- An ad-hoc network is a group of computers, each with a Wireless Adapter, connected as an independent 802.11 wireless LAN.
Wireless Local Area Network- A group of computers and associated devices communicate with each other wirelessly, which network serving users are limited in a local area.
Infrastructure Network- An infrastructure network is a group of computers or other devices, each with a Wireless Adapter, connected as an 802.11 wireless LAN.
Enable NIS- allows you to run a group of computers in the same Network Information Service domain with a common password and group file.
Click Computers and select the group of computers you want to check in this example, the Windows group is selected.
A local area network(LAN) is a group of computers that are connected together in a localized area to communicate with one another and share resources such as printers.
Assign security policies to companies or groups of computers.
Use these two dialog boxes to list the computers, groups of computers, or domains that you want to grant or deny access to this resource.
Dynamic Groups are groups of computers where membership in the group is determined by specific criteria.
It's no secret that there are botnets for hire, groups of computers that can, and are, used against our organizations on a daily basis.
To deploy to groups of computers so that all users of the computers can access the printers, select the The computers that this GPO applies to(per machine) check box.
Distributed Denial-of-Service(DDoS) attacks are carried out by botnets, large groups of computers that are remotely controlled by a hacker who uses their combined bandwidth and resources to commit malicious acts on the internet.