Examples of using Data bases in English and their translations into Greek
{-}
-
Colloquial
-
Official
-
Medicine
-
Ecclesiastic
-
Financial
-
Official/political
-
Computer
Terminology is extracted in the form of dictionaries or data bases and can be integrated into any desired text.
Since 2004, he is the Head of the Data Bases and Information Systems Sector
Daily Backup in separate backup servers for your files and data bases, immediately available for website restoration.
Producers of data bases are those who take the initiative for their production
(vii) harmonization of certain criteria for the description of data bases in order to facilitate the user's choice;
Furthermore, the webpages of this website are also protected as data bases, provided they have the characteristics of data bases. .
the access to specialized data bases.
Construction of more than 45 Data Bases and 50 GIS/WEB_GIS applications for the management and promotion of cultural heritage and natural resources.
the creation of local data bases on the client's device, during their visit.
historical reports, data bases, passwords, printings, etc.
has any indicator of the quality of the way the data bases work been defined.
To exploit the emergence of new technologies that will favour the presentation of the areas' cultural heritage with the use of electronic data bases and applications.
Legal protection of data bases(COM(92)24 final- SYN 393).
the information contained in it may not be used for the creation of data bases of any type.
the lack of evaluation of results is due to the absence of suitable data bases.
The data bases of this website are further protected as a special right held by the data base maker under particular requirements
The assets, documents, data bases and archives of the International Registry shall be inviolable
US State Department and American Intelligence data bases, in contrast, illustrate the timidity and incoherence of American policy.
electronic subscriptions, data bases, electronic magazines,
(2) Electronic data bases shall be protected by logical security controls, such as an anti-virus software updated automatically, firewalls, etc.