Examples of using Files or programs in English and their translations into Indonesian
{-}
-
Colloquial
-
Ecclesiastic
-
Computer
-
Ecclesiastic
Unknown files or programs randomly appear.
When you open a web page,you are trying to get access to some specific files or programs located on the web server.
Some files or programs just don't need to be saved.
Usually this happens after you upgrade from an earlier version of Windows andsomething goes wrong with certain files or programs.
Try deleting any files or programs you don't need.
It conducts detailed testing for several items against the webservers which include testing of more than 6700 files or programs which can be dangerous.
(attempt to) introduce viruses or any other harmful code, files or programs that interrupt or otherwise or limit Site's or Services' functionality;
Although the potential for software configuration is unlimited,you don't want to overdo it and accidentally destroy or delete files or programs.
If your hard drive is full,you will need to delete files or programs before you can add more to the hard drive.
Uploads viruses, or any other code, files or programs designed to interrupt, destroy or attempt to gain unauthorized access to Join4Biz systems or engage in any activity that disrupts the performance or impairs the functionality of Join4Biz;
Assuming the scan detected and removed the virus,you might need to reinstall any files or programs that were damaged by the virus.
Co. id are prohibited from uploading and/or distributing files containing viruses or other computer code, files or programs that may interfere with, damage or limit the functionality of computer software or hardware or communications equipment, or permit the invalid use of computers or the invalid use of computer networks.
They mustn't click on links or open attachments in communications from unknown users nordownload files or programs from untrusted sources.
It is beneficial for clearing your computer of any unnecessary files or programs that may be causing it to run slow, and can even prevent an error accessing the system registry in the future.
The installer will gather information about your system, copy the necessary installation files, and then move any personal files or programs over to the fresh version of Windows 7.
Make available any materials containing viruses, bots or other code, files or programs designed to interfere, hinder or impair the operation of any computer, telecommunication equipment or software;
Stealth viruses trickantivirus software by appearing like they are real files or programs and by intercepting its requests to the OS.
Post any material that contains software viruses or any other computer code, files or programs designed to interrupt, destroy or limit the functionality of any computer software or hardware or telecommunications equipment;
When you select the Start Menu tab in the Taskbar and Start Menu Properties dialog box,you can configure whether recently opened files or programs are stored or displayed on the Start menu as well as customize the Start menu.
Introduce or engage in activity that involves the use of viruses, bots, worms,or any other computer code, files or programs that interrupt, destroy,or limit the functionality of any computer software or hardware or telecommunications equipment, or otherwise permit the unauthorized use of or access to a computer or a computer network;
Some programs might have behavior detection included,a feature that identifies anything- files or programs- behaving suspiciously, and then quarantining it, just in case.
This exclusion shall include all liability for loss or damage caused by any viruses or any other computer code, files or programs designed to interrupt, restrict, destroy, limit the functionality of or compromise the integrity of any computer software or hardware or telecommunications equipment or material transmitted with or as part of the pages of the Site or any material downloaded from it.
Do not post any material and data containing viruses, Trojan horses, worms, time-bombs, keystroke loggers, spyware,adware or other harmful or similar computer code, files or programs designed to interrupt, affect, damage or limit the functionality of any computer software or hardware or telecommunications equipment;
Includes programs that contain viruses,worms and/or Trojan horses or any other computer code, files or programs designed to interrupt, destroy or limit the use or enjoyment of any our websites; or. .
Upload, post, email, transmit or otherwise make available any material that contains software viruses or any other computer code, files or programs designed to interrupt, destroy or limit the functionality of any computer software or hardware or telecommunications equipment;
Upload, post, email, transmit or otherwise make available any Content that contains software viruses or any other computer code, files or programs designed to interrupt, destroy or limit the functionality of any computer software or hardware, or any telecommunications equipment;
Upload, post, email, transmit or otherwise make available any material that contains software viruses or any other computer code, files or programs designed to interrupt, destroy or limit the functionality of any computer software or hardware or telecommunications equipment;
Do not use the Site to upload, send, transfer or any other way of publishing materials that contain viruses or other computer codes, files or programs intended for violation, destruction or limitation of functionality of any computer or telecommunications equipment or programs. .
If what you are searching for is not a file or program, click on the app you want to use as the search.
This type of malicious softwareis usually delivered via a Trojan horse, a file or program appearing to be legitimate but containing infectious code executed upon installation.