Examples of using The program uses in English and their translations into Russian
{-}
-
Official
-
Colloquial
When specified, the program uses the RFC822.
The program uses the serial port COM1 with baudrate 9600.
If the option is off, then the program uses standard data unpacking methods.
The program uses a single account of the site and the application.
It is also possible to change the order, in which the program uses the scripts.
The program uses the most stable crypto key existing today.
If the option is on, then the program uses modified data unpacking methods.
The program uses the most stable crypto key existing today.
For precision measurements you need a lot of light,so the program uses the flash.
The program uses machine learning techniques to design a new, unique strategy.
In order to find out about what actions should be performed, the program uses global variables Win_RSI_old and Win_Mom_old.
With all that the program uses 3 algorithms to choose favorite contacts at the same time.
If a program does not use Winsock to assign ports,you must determine which ports the program uses and add those ports to the rules list.
The program uses the standard MCMC algorithm as well as the Metropolis coupled MCMC variant.
For learning the program uses flash cards and it has excellent dictionaries on various subjects.
The program uses its own algorithms, which raises the quality and quality of the recovered data.
If you have selected this option, the program uses the entered Access or SQL-Server database as the database for the part/ device selection, even if the respective option is not activated.
The program uses a library to place data in a well known location in memory and then causes a fault.
The program uses SuperSpeed mode, which allows you to change the video format without recoding and loss of quality.
The program uses some components of Lotus Notes to reproduce the original data structures and save recovered data.
The program uses a"simple, no-frills user-interface", and can help users understand how certain Web sites are structured.
The program uses data from up to eight temperature sensors with each of them having eight independent channels for temperature measurement.
The program uses a smart engine that combines several algorithms to recover OST data and make sure none of your files are lost forever.
The program uses powerful unique algorithms that even allow the recovery of files that are not present in file system entries.
The program uses smartphone indicators to join them into a massive with the aim of tracking actions of possible evil doers and prevention of being tracked.
The program uses an extensible configuration file to determine the most appropriate server to query and, upon success displays the result to the user, otherwise it can optionally redirect the query to another server.(doc).
The program uses different methodologies, so as to take into account community lore and experiences, and gives priority to supporting, with funds automatically allocated by the Ministry of Education, the literacy activities carried out by the states and municipalities that adhere to the program. .
To close the program, use the Exit command.
In the program, use the if-else-if statement.
Test the program using them, printing information on both the device and the disk.