英語 での Are enabled の使用例とその 日本語 への翻訳
{-}
-
Colloquial
-
Ecclesiastic
-
Computer
-
Programming
The three buttons at the top of the properties are enabled for most tree nodes.
Please ensure that the following ports are enabled: 80, 443, 1935, 843.
Deposit/withdrawal operations are only available if appropriate functions are enabled for the trading account on the broker side.
X04 Mosaic owner can add rules to restrict which accounts are enabled to send and receive the mosaic.
If multiple audio tracks are enabled simultaneously, they are mixed.
The image below illustrates the preview of a mapping where transactions are enabled at component level and table action level.
Responding to visitors, remotely unlocking lobby entry, and confirming visitor log are enabled for the smartphone.
Geo-location information, including time and date of Service use(when Device location services are enabled).
You can now set a startup page, and select which modes are enabled.
You can install the Mobile Foundation Studio Eclipse plug-in to manage your cross-platform Cordova apps that are enabled with Mobile Foundation in the Eclipse development environment.
Before being brought to the market, it must therefore as a“novel food” are enabled.
High efficiency and highly precise processing are enabled by choosing a long taper neck type: SSPBTN220 to a processing shape.
For multi-channel measurements, the accurate trigger position and multi-module synchronization are enabled by AXIe advanced backplane timing interfaces.
You can verify that touch screen properties are enabled by placing the mouse pointer over the SVG Components.
Make sure that the Health Mate app is open in background on your phone and that notifications are enabled on your phone settings.
Foreign Key Constraints When you connect to an existing SQLite database from DiffDog, foreign key constraints are enabled by default.
If two or more transmitters are enabled, there will be bus contention and therefore data errors.
These and many other applications are enabled by the latest mobile sensor technologies from ams.
Other Attacks This section describes attacks against other Internet infrastructure that are enabled by deployment of DKIM.
If Profiles are enabled at my institution, how does that affect the instructor and student experience with Partner Cloud integrations?