Examples of using File access in English and their translations into Ukrainian
{-}
-
Colloquial
-
Ecclesiastic
-
Computer
unlimited file recovery, file access control, priority technical support,
The file access vStorage storage system is a virtual disk array accessible via an IP network using the NFS/CIFS protocol.
Unable to import channels(insufficient file access rights or wrong format chosen?).
The distribution level must set the fastest way to handle requests to services(for example, the file access method to the server).
The DOS API was greatly extended in MS-DOS 2.0 with several Unix concepts, including file access using file handles,
This contrasts with earlier versions of Windows which rely on MS-DOS to perform file and disk access(Windows for Workgroups 3.11 could also largely bypass MS-DOS when 32-bit file access and 32-bit disk access were enabled).
An MS-DOS program running on Windows for Workgroups 3.11 would automatically use 32-bit File Access rather than the native MS-DOS file and disk access routines.
NFS/ CIFS(file access) protocols.
In 1976 Digital Equipment Corporation created the File Access Listener(FAL), an implementation of the Data Access Protocol as part of DECnet Phase II which became the first widely used network file system.
Check this option if you want to run this application with a different user id. Every process has a different user id associated with it. This id code determines file access and other permissions. The password of the user is required to use this option.
providing vital functions such as NFS(remote file access) and e-mail services
providing vital functions such as NFS(remote file access) and email services
Check this option if you want to run the application with a different user id. Every process has a user id associated with it. This id code determines file access and other permissions.
File accesses: %1.
Create and place any hidden pages, images or files, access to which may not be done from other pages of the site;
Creating and placing hidden pages, images, or files, access to which is not possible with the other pages of the site;
intercepts file accesses and infects them.
intercepts file accesses and infects them.
Files access can also be granted through key authentication
Transparency is usually built into distributed file systems, so that files accessed over the network can be treated the same as files on local disk by programs and users.