Examples of using Computers or users in English and their translations into Swedish
{-}
-
Colloquial
-
Official
-
Medicine
-
Ecclesiastic
-
Ecclesiastic
-
Official/political
-
Computer
-
Programming
-
Political
Inf file for computers or users.
Remove a file(or multiple files in one folder) for computers or users.
Inf file for computers or users.
Delete and recreate a registry value or key for computers or users.
On the Security tab, add the groups, computers, or users from which you want to allow certificate requests.
People also translate
Delete and recreate a folder for computers or users.
To specify the computers or users that are authorized to send traffic through the tunnel, follow these steps.
Remove a folder for computers or users.
To specify the computers or users that are authorized to send traffic through the tunnel, follow these steps.
Create a new folder for computers or users.
configure the attributes of those files for computers or users.
The rule can be configured to specify the computers or users, program, service,
Modify settings of an existing file(or multiple files in one folder) for computers or users.
To create a QoS policy for computers or users.
system services, computers, or users.
Modify an existing folder for computers or users.
The Group Policy MMC snap-in lets administrators define policy settings that are applied to computers or users.
Delete and recreate a shortcut for computers or users.
system services, computers, or users.
Modify settings of an existing shortcut for computers or users.
all of its values and subkeys for computers or users.
Create Create a new registry value or key for computers or users.
Modify settings of an existing registry value or key for computers or users.
to add a semicolon-delimited segment to the PATH variable for computers or users.
system services, computers, or users.
No changes: No new Group Policy settings are applied to the computer or user.
Select this option to specify that the computer or user in Endpoint 1 must authenticate with the local tunnel endpoint before any packets can be sent through the tunnel.
You can deploy computer or user AD certificate profiles to client devices automatically or via manual download.
When creating new power schemes, disabled values are pulled from the default power scheme for the computer or user.