-
1 certify
['sɜːtɪfaɪ]to certify sth. a true copy — certificare qcs. per copia conforme all'originale
to certify sb. insane — dichiarare qcn. pazzo
2) (authenticate) autenticare, legalizzare [ document]to certify sb. (as) fit for — certificare che qcn. è idoneo per [work, sport]
4) comm. garantire [ goods]* * *1) (to declare formally (eg that something is true): I certify that I witnessed the signing of his will.) dichiarare, certificare2) (to declare officially that (someone) is insane.) dichiarare pazzo•* * *['sɜːtɪfaɪ]to certify sth. a true copy — certificare qcs. per copia conforme all'originale
to certify sb. insane — dichiarare qcn. pazzo
2) (authenticate) autenticare, legalizzare [ document]to certify sb. (as) fit for — certificare che qcn. è idoneo per [work, sport]
4) comm. garantire [ goods]
См. также в других словарях:
Copy attack — Not to be confused with Replay attack. The copy attack is an attack on certain digital watermarking systems proposed by M. Kutter, S. Voloshynovskiy, and A. Herrige in a paper presented in January, 2000 at the Photonics West SPIE convention.[1]… … Wikipedia
Digital copy — (launched in 2007) provides consumers who purchase a film on DVD or Blu ray Disc with an additional, digital copy of the movie for devices capable of operating with a file in contrast to a DVD. Contents 1 Features 2 Reception 3 See also … Wikipedia
Killian documents controversy — Further information: Killian documents authenticity issues and George W. Bush military service controversy Charles Johnson s animated GIF image comparing what CBS claimed to be a 1973 era typewritten memo with a 2004 era Microsoft Word… … Wikipedia
Two-factor authentication — (TFA, T FA or 2FA) is an approach to authentication which requires the presentation of two different kinds of evidence that someone is who they say they are. It is a part of the broader family of multi factor authentication, which is a defense in … Wikipedia
Comparison of open source configuration management software — This is a comparison of free (libre) and open source configuration management software. Contents 1 Basic properties 2 Platform support 3 Short descriptions 4 Refere … Wikipedia
Notary public — An embossed foil Notary Seal from the State of New York. A notary public (or notary or public notary) in the common law world is a public officer constituted by law to serve the public in non contentious matters usually concerned with estates,… … Wikipedia
Art forgery — refers to creating and, in particular, selling works of art that are falsely attributed to be work of another, usually more famous, artist. Art forgery is extremely lucrative, but modern dating and analysis techniques have made the identification … Wikipedia
Civil law notary — 16th century painting of a civil law notary, by Flemish painter Quentin Massys Civil law notaries, or Latin notaries, are lawyers of noncontentious private civil law who draft, take, and record legal instruments for private parties, provide legal … Wikipedia
Secure Shell — or SSH is a network protocol that allows data to be exchanged using a secure channel between two networked devices. RFC 4252] Used primarily on Linux and Unix based systems to access shell accounts, SSH was designed as a replacement for TELNET… … Wikipedia
Notary public (Virginia) — Note: The General Assembly has established changes regarding the laws pertaining to notaries public,[1] of which take place on July 1, 2007 and some which take place on July 1, 2008. See the bottom of the article for more details. A notary public … Wikipedia
E-mail authentication — is the effort to equip messages of the e mail transport system with enough verifiable information, so that recipients can recognize the nature of each incoming message automatically. It is different from content filtering s fuzzy methods.… … Wikipedia