Examples of using User opens in English and their translations into Russian
{-}
-
Official
-
Colloquial
The video is from the inside,so before the user opens the interior of the monastery.
When the user opens the context menu, the fragment receives a call to onCreateContextMenu().
This can change during the life of your app if the user opens a hardware keyboard.
The user opens the app with integrated EasyQA SDK and shakes the phone until the Sign in form appears on the screen.
An attacker might execute arbitrary command if the user opens a maliciously crafted email.
The user opens the installation file, as a result of which the application installation wizard automatically opens on the device.
X and lower, the system calls onPrepareOptionsMenu()each time the user opens the options menu(presses the Menu button).
Use this operation when a user opens a request item(in an incoming E-mail) and decides to decline that request.
X and lower, the system calls onCreateOptionsMenu()to create the options menu when the user opens the menu for the first time.
It works the following way: a user opens the app with EasyQA SDK and shakes the phone until the Sign in from appears on the screen.
Spam can also be emails with invisible characters(the text matching the background color), emails containing hidden elements(elements that are not displayed at all), or incorrect HTML tags, andemails containing scripts a series of instructions executed when the user opens the email.
As soon as the sun hides behind the horizon, before the user opens a delightful picture of the city at night with a million lights.
When a user opens a webpage of this offer that contains such a button, the browser establishes a direct connection to Google's servers.
By exploiting such flaw, an attacker can take fully control of the computer when a user opens a Word file containing a booby-trapped OLE2 link object which downloads a malicious HTML app.
When the User opens the email the image is downloaded along with the other contents of the email and reveals whether a particular email has been opened or not.
The content of these BIN files consists of data in binary form that was copied from a disk unto this output file, andthese BIN files are referenced by these disk image development programs when a user opens the BIN files using these applications and disk image mounting programs integrated with support for these image files.
Use this operation when a user opens a cancellation request item(in an incoming E-mail), and decides to remove the canceled item from the Calendar.
If the user opens the Overview screen and performs a long press on an activity title, they can drag that activity to a highlighted portion of the screen to put the activity in multi-window mode.
Another manual IncrediMail import method implies that the user opens IncrediMail and starts dragging the necessary email messages to the desktop or a folder on the hard drive.
When a user opens a project in an older EPLAN version while in multiuser operation, and a second user who has the newEPLAN version 2.1 SP 1 also attempts to open the project, the second user will be shown a corre-spondingmessage and the project will not be opened. .
As soon as user opens attached file and executes malicious script he was notified about encryption of his documents, photos, databases as well as other important data by the crypto-secure algo RSA-1024.
When a user opens a drinking faucet located on the sink accumulated in the reservoir water passes through a carbon post-filter, whose task is to remove water from the remnants of foreign odors, adjust the taste and smell of water and purified through a mineralizer, whose task is to replenish minerals membrane completely desalinated water.
If the user opened a specially crafted email message, code execution was possible.
For registered users opens lot of opportunities and the access to a larger volume of Informatii.
To use LR currency, a user opened an account through the Liberty Reserve website.
The WinZip also lets the user open the following popular third party apps as well.
Do we track whether users open our emails?
Once users open the file, attackers can gain control of their PC remotely.
All files and programs that users open from the share are automatically available offline.
AutoCAD would pop up a message, warning of potential stability problems, if a user opened a 2007 version DWG file which did not include this text string.