Examples of using Network resources in English and their translations into Vietnamese
{-}
-
Colloquial
-
Ecclesiastic
-
Computer
A DDoS(Distributed Denial-of-Service) attack is an attempt to make network resources or machines unavailable to its users by overwhelming the online service with traffic from numerous sources.
by Edgecore's EWS gateway-controller, hospitals can intelligently allocate available network resources and provide an uninterrupted Wi-Fi experience.
block the offending source IP address or user account from accessing any application, target hosts or other network resources unethically.
the SRX Series Gateway as a firewall enforcer, and configure secured access to network resources.
Because your computer behaves as if it's on the network, this allows you to securely access local network resources even when you're on the other side of the world.
allow you to share printers, storage space and other network resources with your entire home or office network. .
with security policies and restricted from accessing network resources if not.
Since your computer behaves as if it's on the network, this allows you to securely access local network resources even when you're on the other side of the world.
not so much to steal data but to paralyse the computer or network so severely that the network resources are no longer available.
access point you can build your own wireless network and share network resources like printers and storage space.
your home music collection, films and photos, but with the help of special plugins to access various network resources and online video services.
Since your computer behaves as if it's on the network, this allows you to securely access local network resources even when you're on the other side of the world.
devices or other network resources.
service is installed or to connect to other network resources to perform a task.
Com's offline advantages, improving its overall retail network resources and increasing the business potential of the Company to develop new business opportunities of all-categories merchandise operation,
request from managed servers, and hardware and network resources available to the computer running Server Manager.”.
IP address black lists: SPAM databases, open proxies and mail relays, etc. This tool helps you figure out why a given IP address is rejected by some network resources, such as mail servers.
request from managed servers, and hardware and network resources available to the computer running Server Manager.
radio resources more efficiently than circuit-switched cellular services, reserving network resources only for the duration of talk spurts instead of for an entire call session.