Examples of using Technical methods in English and their translations into Greek
{-}
-
Official
-
Colloquial
-
Medicine
-
Ecclesiastic
-
Financial
-
Official/political
-
Computer
The Commission had also issued a document listing the various technical methods for making data secure.
Müller also introduced the use of technical methods for the study of Aegean glyptic,
technical sense and">tracking pixels and similar technical methods.
The term"cookie" below includes both cookies in the technical sense as well as tracking pixels and similar technical methods.
Ongoing discussions are in regards to finding the proper technical methods to disconnect Russian Federation from the internet with minimal downtime to consumers
technical sense and">tracking pixels and similar technical methods.
It also refers to the operational activities of applying certain technical methods and the like in the process of using containers,
the term“cookie” covers cookies in the technical sense as well as tracking pixels and similar technical methods.
Solutions developed by the ISA² programme should be taken into account in designing technical methods for re-use of data.
be used to harmonise the technical methods of certification so as to obtain results which are equivalent.
Monuments with the use of traditional or modern technical methods.
We may use a variety of technical methods such as cookies to collate this information.
facilitate storage and transportation, promote sales, and use certain technical methods.
error utilizing both antiquated and highly technical methods.
the selection of the adopted technical methods and, up to a point, the volume of production.
it is a manner of accomplishing a task using technical methods.
Especially, technical methods on board ships that will remove sulphur from exhaust gases,
who define technology as the application of science or technical methods to problem-solving.
restoration of the building with the use of the right technical methods and with respect to the maintenance of its original character.".
members on central and local level or other technical methods can be used to determine the conspiratory and concealed movements of the attack organizers”.