Примери за използване на Trusted location на Английски и техните преводи на Български
{-}
-
Colloquial
-
Official
-
Medicine
-
Ecclesiastic
-
Ecclesiastic
-
Computer
For information about using the Trust Center with Access, see Use an Office Access 2007 database in a trusted location later in this article.
see Add, remove, or modify a trusted location for your files.
or to change a trusted location for files, go to one of the following websites.
or to change a trusted location for files, visit the following Microsoft Web site.
For more information about creating a trusted location, see the article Create, remove, or change a trusted location for your files.
or change a trusted location.
the connection information it contains by using a trusted location and an Access database password.
A Data Connection Library(DCL) is a special SharePoint document library that can be defined as a trusted location library and that makes it easy to store,
or modify a trusted location for your files, Add,
is a special SharePoint document library that can be defined as a trusted location library and that makes it easy to store,
Trusted locations make it easy to trust all databases in security-enhanced folders.
The default locations for templates and the Startup folder are treated as trusted locations.
Note the path of one or more trusted locations.
The list under Trusted Locations includes folders that are already set up as trusted locations.
Documents in trusted locations are allowed to run without being checked by the Trust Center security system.
Documents in trusted locations are allowed to run without being checked by the Trust Center security system.
Documents in trusted locations are allowed to run without being checked by the Trust Center security system.
You use the Trust Center to create or change trusted locations and to set security options for Access.
If you want to allow trusted network locations, in the Trust Center dialog box, click Allow Trusted Locations on my network(not recommended).
The documents that are in trusted locations can run without being checked by the Trust center security system.