-
1 захист
ч1) defence, guard, proof; амер. defense; ( протегування) protection, advocacy; ( підтримка) maintenance; ( запобіжний пристрій) shield, safeguard; ( збруя) panoply, armour; (укриття, загорожа) lee, shelter, coverзахист від доступу комп. — fetch protection
захист від корозії — rust protection, corrosion proofing, corrosion protection, protection against corrosion, rust prevention, rust proofing
захист інформації — ( від перебоїв) guarding
захист капіталовкладень — security investments, protection of investments, security of investments
зона захисту — zone defence, back-court, end-zone
під захистом — under the protection (of)
2) юр., спорт. the defenceвідхід від захисту (у футболі й т.п.) — breakaway
-
2 іти
1) to go; ( пішки) to walkіти вздовж берега — to walk along the shore; to go along the coast
іти в ногу з кимсь — to keep pace with, to march in step; to keep step ( with)
іти вперед — to go forward (on)
іти в гості — to visit, to pay a visit, to go on a visit, to go to see
іти до мети — to advance towards the accomplishment of one's purpose; to go forward towards one's aim ( goal); to pursue an aim
іти з великими труднощами — to plod, to trudge ( along)
іти назад — to go back, to return
іти повільніше — to go slower, to slack one's speed, to slow down
іти в кільватері — to follow/sail in the wake (of)
іти під вітром спорт. — to scud
іти швидко — to trip, to skip along
ось він іде — he is coming, here he comes
3) ( відбуватися) to go on, to proceed, to be in progress4) (про воду, дим, пару) to come out, to come from, to proceed from5) ( про опади) to fallіде дощ — it is raining, it rains
іде сніг — it is snowing, it snows
6) (про виставу та ін.) to be on7) ( про час) to go by, to pass8) ( бути потрібним) to be required ( for); ( використовуватися) to be used (in)9) ( знаходити збут) to sell, to be soldіти в продаж — to go for sale, to be up for sale
10) ( про дискусію) to be ( about)мова йде про… — the question is…, the point is that…
11) (вступати, улаштовуватися) to enter, to join, to becomeіти на фізичний факультет — to enter ( to join) the physical department
12) ( про механізми) to go, to run, to work13) (про шахи, карти) to play, to lead, to move14) (пролягати, розлягатися) to go, to stretchдалі йдуть гори — farther on there stretches/extends a mountain-ridge
15)іти назустріч (у чомусь) — to respond to friendly advances, to meet halfway
іде поговір — it is rumoured; there is a rumour ( that); a rumour is abroad ( afloat)
іти заміж за кого-небудь — to marry smb.
іти проти кого-небудь — to oppose smb.
іти на ризик — to run risks, to take chances
іти на поступки — to compromise; to make concessions
іти врозріз (з ким-небудь/чим-небудь) — to run counter (to); to be/go against; to be contrary (to), to be in conflict ( with), to conflict ( with)
іти на все — to be ready to do anything, to go to all lengths
іти на компроміс — to compromise, to make a compromise, to meet half-way
іти на крайнощі — to take extreme/severe measures
іти на користь (кому-небудь) — to do smb. good
іти напролом — to force one's way; to stop at nothing; to push one's way through
-
3 ряд
ч1) row, line; військ. file; rankголосний переднього (заднього) ряду грам. — front ( back) vowel
2) (деяка кількість, серія) а number of, setцілий ряд письменників — many ( a number of) writers
3) мат. series4) біол. order5) мист. row, tier
См. также в других словарях:
back file — noun Etymology: back (III) : a file of back numbers (as of a newspaper or documentary matter to be saved for use in the future … Useful english dictionary
File locking — is a mechanism that enforces access to a computer file by only one user or process at any specific time. The purpose of locking is to prevent the classic interceding update scenario. The interceding update problem may be illustrated as in the… … Wikipedia
File area network — File Area Networking refers to various methods of sharing files over a network such as storage devices connected to a file server or network attached storage (NAS). Background Data storage technology over the years has evolved from a direct… … Wikipedia
File Transfer Protocol — (FTP) is a network protocol used to transfer data from one computer to another through a network such as the Internet.FTP is a file transfer protocol for exchanging and manipulating files over a TCP computer network. A FTP client may connect to a … Wikipedia
File deletion — is a way of removing a file from a computer s file system. The reasons for deleting files are Freeing the disk space Removing duplicate or unnecessary data to avoid confusion Making sensitive information unavailable to others All operating… … Wikipedia
File synchronization — (or syncing) in computing is the process of ensuring that computer files in two or more locations are updated via certain rules.[citation needed] In one way file synchronization, also called mirroring, updated files are copied from a source… … Wikipedia
File spanning — is a term used to describe the ability to package a single file or data stream into separate files of a specified size. It also implies the ability to re combine the package files back into the original file or data stream.This is useful when… … Wikipedia
back — back1 [bak] n. [ME bak < OE baec; akin to ON bak, OHG bahho] 1. the part of the body opposite to the front; in humans and many other animals, the part to the rear or top reaching from the nape of the neck to the end of the spine 2. the… … English World dictionary
File eXchange Protocol — (FXP) is a method of data transfer which uses the FTP protocol to transfer data from one remote server to another (inter server) without routing this data through the client s connection. Conventional FTP involves a single server and a single… … Wikipedia
Back Orifice — est un logiciel client/serveur d administration et de prise de contrôle à distance de machines utilisant le système d exploitation Windows ; il ne s agit pas vraiment d un virus, mais plutôt d un rootkit. Il est créé et distribué par un… … Wikipédia en Français
Back to My Mac — is a feature of Mac OS X 10.5 Leopard that uses Wide Area Bonjour to securely discover services across the Internet and automatically configure ad hoc, on demand, point to point encrypted connections between computers using IPSec. It requires… … Wikipedia