Examples of using List of rules in English and their translations into Russian
{-}
-
Colloquial
-
Official
Is that a list of rules?
The Log inspection rule is added to the list of rules.
Displays a list of rules sorted by object type.
On the basis of advice guides Lonely Planet BBC has made its list of rules.
They appear in the list of rules alongside custom rules. .
List of rules to be followed while participating in the Allfreechips forums.
Back in 2007, was nominated list of rules of etiquette for a"real lady.
The list of rules surrounding dealers include when they may Hit/Stand.
The priority of a rule is determined by its position on the list of rules.
In the list of rules, locate the rules that are specified in this step.
Adds the selected rule to the list of rules attached for this trigger.
In the list of rules, select the rule whose status you want to edit.
Removes the selected rule from the list of rules attached to this trigger.
In list of rules, select the rule that you want to enable or disable.
The rule is created and added to the list of rules in the Rules section.
List of rules of key generation when a new row is inserted in automatic mode.
A copy of the rule is created and added to the list of rules in the Rules section.
In the list of rules, select the rule for which you want to change the priority.
When the list of Rules appears in a browser window, the Rule names and priorities can be modified.
You can configure automatic import of the generated rules into the list of rules for the Device Control task.
They appear in the list of rules alongside custom rules and are always applied last.
You can change the priority to each web resource access rule from the list of rules by arranging the rules in a certain order.
The rule is added to the list of rules for allocation of computers see section Computer relocation in the Properties.
The financial management company in New Zealand has compiled the list of rules for filling in and submitting the application, as well as package of documents.
In the list of rules, click the link with the name of the rule to open the rule for which you want to configure actions on messages during spam scanning.
In an Enterprise deployment model, enterprise-level policy rules can be edited only in the list of rules of an enterprise-level policy in the Enterprise policies node within the Enterprise node.
Each file with the list of rules is created based on analysis of files executed and applications launched on each separate server on the corporate network.
Optimized abilities to form a list of rules for trusted processes(see Section"Adding trusted processes" on page 141) in the Trusted Zone.
The list of rules for generating the Trusted Zone can be exported to a configuration file in XML format for it then to be imported into Kaspersky Embedded Systems Security running on another computer.
