Examples of using Access to computer in English and their translations into Russian
{-}
-
Official
-
Colloquial
Illicit access to computer systems and equipment.
Internet in Stealth Mode block external access to computer.
Illegal(Unauthorized) Access to Computer System of the Uzbek Criminal Code.
The Committee would certainly find discrimination against women in access to computer technology.
Children do not have access to computer technology or the Internet.
People also translate
That type of device was commonly used in authenticating individuals that sought remote access to computer systems.
OIOS received reports of unauthorized access to computer systems in several missions.
Access to computer systems for many years consisted of connecting a terminal to a mainframe system via a serial line and the RS-232 protocol.
There was also no policy with respect to interns, consultants andcontractors who are granted access to computer networks, systems and facilities.
This required not only access to computer equipment but also increased infrastructure development.
It also welcomed the efforts to develop a vulnerability index, andto promote rational use of energy resources and access to computer networks.
Lecturer on laws covering access to computer information at the Law Institute for Communications, Faculty of Law, University of Coimbra.
A variety of federal laws may also apply broadly to unauthorized access to computer systems or access that exceeds authorization.
A current example of that is the so-called palm-pilot device, which combines aspects of cellular telephony,network broadcasting and access to computer networks.
It is an essentially personal complaint alleging frustrated access to computer equipment and legal resources, resulting in the alleged denial of access to court.
Access to computer and telecommunication services can help to transform the role of health workers, and to enhance the quality and outreach of health services and preventive health care in underserviced rural communities.
In the work are considered questions of the determination of the ways of completion of the crimes,in accordance with illegitimate access to computer information, and stand out their typical line.
As a rule, authorized monitoring software products require physical access to computer and administrative privilege for configuration and installation that excludes(or at least minimizes) risks of unauthorized use of such programs.
Circulated APC Women's Networking Support Programme statement: gender and IT:the Right of Women to have equal access to computer communications technology and networks.
Access to computer system, even for mere browsing purposes, will, in most cases, modify the data(such as“recently accessed” documents list) to an extent that this cannot be used as evidence criminal proceedings.
Such techniques may include monitoring orders, observation,interception of telecommunications, access to computer systems and orders to produce specific documents.
Offences involving illegal access to computer systems and data differ with respect to the object of the offence(data, system or information), and regarding the criminalization of“mere” access or the requirement for further intent, such as to cause loss or damage.
Such techniques may include monitoring orders, observation,interception of telecommunications, access to computer systems and orders to produce specific documents.
Over the past three decades, people worldwide have rapidly gained access to computer technology, representing important progress towards the achievement of the Millennium Development Goal of making available the benefits of new technologies, especially those related to information and communications.
The bus will service UNRWA schools at a predetermined schedule and provide computer access and training to students andtheir families who would otherwise have little or no access to computer technology.
We are also bridging the digital divide between the children of the developed and developing worlds by ensuring access to computer literacy and Internet services in all primary and secondary schools in Saint Kitts and Nevis.
Over 200,000 people have benefited directly from the projects, which typically involve improving local water supplies, rehabilitating schools and medical service centres,creating youth centres and providing access to computer and Internet technology.
It was developed to help children who don't have permanent access to computer technologies not only ac- quire basic computer skills, but also skills of team-working, problem-solving, and critical thinking.
Brunei Darussalam made reference to relevant legislative measures aimed at criminalizing and punishing offences such as forgery,unauthorized access to computer materials and banking offences involving elements of fraud.
Article 150 of the Criminal Code establishes responsibility for the unlawful use of inventions, copyrighted works and trademarks, for receiving information constituting a commercial or bank secret, orfor gaining illegal access to computer information.