Examples of using Network protocols in English and their translations into Slovak
{-}
-
Colloquial
-
Official
-
Medicine
-
Financial
-
Ecclesiastic
-
Official/political
-
Computer
-
Programming
it was one of the first to sell commercially successful routers supporting multiple network protocols.
detailed discussion of popular network protocols.
The Hurd is a collection of servers that run on the Mach microkernel to implement file systems, network protocols, file access control,
hardware, and network protocols that have been designed to transfer numerous channels of uncompressed,
hardware-based approach from network applications to the network protocols and services provided to those applications by the lower layers of the network. .
The Hurd is a collection of servers that run on the Mach microkernel to implement file systems, network protocols, file access control,
integrated approach- from network applications to the network protocols and services provided to those applications by the lower layers of the network. .
PuTTY and Telnet are associated to each other, as Telnet is a network protocol and PuTTY is a client program that supports Telnet along with SSH and Rlogin network protocols.
supports network protocols, cross-platform information exchange,
integrated approach- from network applications to the network protocols and services provided to those applications by the lower layers of the network. .
The Hurd is a collection of servers that run on the Mach microkernel to implement file systems, network protocols, file access control,
integrated approach- from network applications to the network protocols and services provided to those applications by the lower layers of the network. .
storage, and network protocols to improve application speeds
the maximum number of allowable connections using network protocols, HTTP 1.0 and HTTP 1.1.
the technologies supporting that protection(e.g., network protocols, digital certificates, passwords, etc.).
the changes you made to your firewall and the Microsoft SQL Server network protocols when you chose to share your databases will still be in effect.
the technologies supporting that protection(e.g. network protocols, digital certificates, passwords, etc.).
all your shared databases, the changes you made to your computer's firewall and the Microsoft SQL Server Native Client network protocols when you chose to share your databases will still be in effect.
all your shared databases, the changes you made to your computer's firewall and the Microsoft SQL Server Native Client network protocols when you chose to share your databases will still be in effect.
the technologies supporting that protection(e.g., network protocols, digital certificates, passwords, etc.).