Examples of using User-level in English and their translations into Indonesian
{-}
-
Colloquial
-
Ecclesiastic
-
Computer
-
Ecclesiastic
There are no user-level controls for this feature;
Password-protected access to administrator and user-level features.
Everyone agrees that user-level standards are a good idea.
Take one step further and drill down into your analysis using user-level data.
The many-to-one model maps many user-level threads to one kernel thread.
A stream is a full-duplex connection between a device driver and a user-level process.
PortsLock is a firewall with user-level access controls for Windows NT/2000/XP.
The business requirements are input into the development of the user-level requirements.
User-level threads are threads that are visible to the programmer and are unknown to the kernel. view more….
Multiple-user architecture and user-level access privileges.
Other user-level programs, services and utilities include awk, echo, ed, vi, and hundreds of others.
User-friendly tile format for clear user-level customizable screens.
User-level client mail applications typically use SMTP only for sending messages to a mail server for relaying.
Describe the actions taken by a thread library to context switch between user-level threads.
QEMU can also do emulation for user-level processes, allowing applications compiled for one architecture to run on another.
Describe the actions taken by a thread library to context switch between user-level threads.
QEMU can also do CPU emulation for user-level processes, allowing applications compiled for one architecture to run on another.
However, there are some differences between Access and Excel in how user-level data protection works.
User-level security protects shared network resources by requiring that a security provider authenticate a user's request to access resources.
And files in this folder are automatically copied by Flash to the user-level configuration folder.
User-level data protection In Excel, you can remove critical or private data from view by hiding columns and rows of data, and then protect the whole worksheet to control user access to the hidden data.
The tool seamlessly imports all user accounts from the operating system,so you can apply user-level protections immediately.
The Google Analytics DataRetention controls set the amount of time before user-level and event-level data stored by Google Analytics is automatically deleted from Analytics' servers.
Amoeba provides the necessary mechanism for doing both distributed and parallel applications,but the policy is entirely determined by user-level programs.
Each requirement shouldbe traceable back to its source(for example, user-level requirements, system-level requirements, standard, enhancement request).
Bluetooth provides only device-level security services, not user-level, and cannot limit access to sensitive data to authorized users.
With the Data Retention controls,we can limit or expand the duration for which user-level and event-level data is stored in Google Analytics servers.
Our Google Analytics controlsgives us the ability to set the amount of time before user-level and event-level data stored by Google Analytics is automatically deleted from Analytics' servers.
While electronic mail server software uses SMTP to send andreceive e-mail messages, user-level client mail applications typically only use SMTP for sending messages to a mail server for relaying.