Examples of using Computer in the network in English and their translations into Italian
{-}
-
Colloquial
-
Official
-
Medicine
-
Financial
-
Ecclesiastic
-
Ecclesiastic
-
Computer
-
Programming
-
Official/political
System management is made from any computer in the network.
Each computer in the network can operate one or more bots.
They just need few minutes for destroying the entire computer in the network.
A computer in the network can be identified by using its MAC address
(If the shared folder is located on another computer in the network, it is necessary to specify authentication for accessing that computer). .
If the shared folder is located on another computer in the network, you must enter authentication data to access the other computer. .
allowing you to choose the desired protection mode of your computer in the network.
including whether the application is on the local computer or on another computer in the network.
If the shared folder is located on another computer in the network, it is necessary to specify authentication for accessing the other computer. .
you need to work with it from another computer in the network.
please make sure there is no other computer in the network named as the same name(localhost).
application recording the trends is running, or on another computer in the network.
In the Connect to Computer dialog box, select Another computer, and then type the name of the computer, or click Browse to locate the computer in the network directory.
Testing Network Tool to scan the computers in the network.
Tool to scan the computers in the network.
It is then checked for correctness by the computers in the network, i.e. verified.
Install USB Network Gate on your machine and other computers in the network.
location of domains and computers in the network.
Gate on your machine as well as other computers in the network.
all users have their individual home directories available on all the computers in the network.
Without user intervention, they are able to sneak inside in all computers in the network as they are capable for making use of security loopholes in a network. .