Examples of using Authorized users in English and their translations into Slovak
{-}
-
Colloquial
-
Official
-
Medicine
-
Financial
-
Ecclesiastic
-
Official/political
-
Computer
-
Programming
At the same time, the application allows authorized users to view the database with parameterisation of selection of events or data.
Availability, ensuring that authorized users have access to the information
If your computer has any shared folders, make sure you apply passwords to them so that only authorized users can access your shares.
The Bitrix24 CRM system enables all authorized users to view the history of customer communications
In this case, publishers will not be able to invoke the protection granted to them under the Directive against authors or other authorized users of the same works.
Naturally, this means that it can be difficult to ascertain the extent of the damage that these authorized users have done.
You can add a password so that only authorized users can make changes to a workbook.
When you share your Business Contact Manager database, SQL Server Express allows authorized users to access your database.
You can configure Apple TV to restrict certain content so only authorized users can watch or make purchases.
You can configure Apple TV to restrict certain content so only authorized users can watch… Manage storage.
Secure access features in Lexmark products ensure that only authenticated and authorized users can work with sensitive,
Accessibility means that authorized users must be able to access the data if they are needed for licensed purposes.
Nobody besides authorized users(including administrator
assign one or more authorized users to this list.
A TS Gateway server is a type of gateway that enables authorized users to connect to remote computers on a corporate network.
generators, authorized users.
security designers need to ensure that only authenticated and authorized users can generate requests to the application server.
To create user accounts, authorized users must provide certain contact
It is the process that makes data thereby protecting it against unauthorized access(since only authorized users are able to decrypt
We also cannot control how authorized users store or transfer information downloaded from the database,