-
1 número de teléfono
(n.) = phone number, telephone number, dial-up number, dial-up number, dial-up numberEx. The phone number and address are also at the beginning of the Appendix of the BiblioFile User Guide.Ex. The telephone number may be entered or changed by typing the number '3'.Ex. To gain access to just one information service, the researcher required two dial-up numbers, 26 case-sensitive usernames and passwords and at least 20 Uniform Resource Locators (URLs).Ex. To gain access to just one information service, the researcher required two dial-up numbers, 26 case-sensitive usernames and passwords and at least 20 Uniform Resource Locators (URLs).Ex. To gain access to just one information service, the researcher required two dial-up numbers, 26 case-sensitive usernames and passwords and at least 20 Uniform Resource Locators (URLs).* * *(n.) = phone number, telephone number, dial-up number, dial-up number, dial-up numberEx: The phone number and address are also at the beginning of the Appendix of the BiblioFile User Guide.
Ex: The telephone number may be entered or changed by typing the number '3'.Ex: To gain access to just one information service, the researcher required two dial-up numbers, 26 case-sensitive usernames and passwords and at least 20 Uniform Resource Locators (URLs).Ex: To gain access to just one information service, the researcher required two dial-up numbers, 26 case-sensitive usernames and passwords and at least 20 Uniform Resource Locators (URLs).Ex: To gain access to just one information service, the researcher required two dial-up numbers, 26 case-sensitive usernames and passwords and at least 20 Uniform Resource Locators (URLs). -
2 pin
m.1 pin, (lapel) badge.2 NDP, net domestic product.* * *SM PIN* * ** * *= button, PIN (personal identification number), PIN (personal identification number).Ex. The mere indication of support through the wearing of a button or the posting of a slogan may deter persons with questions unrelated to the issue being aired.Ex. Users of electronic services need a number of usernames, passwords, PINs and so on in order to successfully interact with these services.Ex. Users of electronic services need a number of usernames, passwords, PINs and so on in order to successfully interact with these services.----* número pin = PIN (personal identification number), PIN number.* * ** * *= button, PIN (personal identification number), PIN (personal identification number).Ex: The mere indication of support through the wearing of a button or the posting of a slogan may deter persons with questions unrelated to the issue being aired.
Ex: Users of electronic services need a number of usernames, passwords, PINs and so on in order to successfully interact with these services.Ex: Users of electronic services need a number of usernames, passwords, PINs and so on in order to successfully interact with these services.* número pin = PIN (personal identification number), PIN number.* * *PIN* * *
Multiple Entries:
PIN
pin
PIN sustantivo masculino PIN
pin sustantivo masculino ( broche) pin
' pin' also found in these entries:
Spanish:
alfiler
- chapa
- chincheta
- clavarse
- clavo
- espiga
- estaquilla
- horquilla
- imperdible
- oro
- pasador
- prender
- rodillo
- rollo
- trifásica
- trifásico
- aguja
- boliche
- bolo
- chinche
- cifrar
- clavija
- clip
- gancho
- macho
- mosca
- muerto
- número
- palote
- PIN
- pino
- pinza
- seguro
- sujetar
English:
drawing pin
- linchpin
- pin
- pin down
- pin on
- pin up
- rolling pin
- safety pin
- work in
- badge
- bobby
- dig
- drawing
- hair
- head
- PIN
- pinup
- safety
- ten
- tie
* * *PIN [pin] nm1. (abrev de producto interior neto) NDP2. (abrev de personal identification number) PIN* * *m PIN* * *pin n pin / badge -
3 nombre de usuario
(n.) = user ID, username, user's nameEx. Vendors usually control access through some combination of Internet Protocol (IP) address and user ID and password.Ex. Users of electronic services need a number of usernames, passwords, PINs and so on in order to successfully interact with these services.Ex. The book circulation department will need data on users' names and addresses and which books are on loan to whom.* * *(n.) = user ID, username, user's nameEx: Vendors usually control access through some combination of Internet Protocol (IP) address and user ID and password.
Ex: Users of electronic services need a number of usernames, passwords, PINs and so on in order to successfully interact with these services.Ex: The book circulation department will need data on users' names and addresses and which books are on loan to whom. -
4 número pin
(n.) = PIN (personal identification number), PIN numberEx. Users of electronic services need a number of usernames, passwords, PINs and so on in order to successfully interact with these services.Ex. They tortured her into revealing her Pin number and safe code before tcutting her up and disposing of her in bin liners.* * *(n.) = PIN (personal identification number), PIN numberEx: Users of electronic services need a number of usernames, passwords, PINs and so on in order to successfully interact with these services.
Ex: They tortured her into revealing her Pin number and safe code before tcutting her up and disposing of her in bin liners. -
5 que diferencia entre mayúscula y minúscula
(adj.) = case-sensitiveEx. To gain access to just one information service, the researcher required two dial-up numbers, 26 case-sensitive usernames and passwords and at least 20 Uniform Resource Locators (URLs).* * *(adj.) = case-sensitiveEx: To gain access to just one information service, the researcher required two dial-up numbers, 26 case-sensitive usernames and passwords and at least 20 Uniform Resource Locators (URLs).
Spanish-English dictionary > que diferencia entre mayúscula y minúscula
-
6 que distingue entre mayúscula y minúscula
(adj.) = case-sensitiveEx. To gain access to just one information service, the researcher required two dial-up numbers, 26 case-sensitive usernames and passwords and at least 20 Uniform Resource Locators (URLs).* * *(adj.) = case-sensitiveEx: To gain access to just one information service, the researcher required two dial-up numbers, 26 case-sensitive usernames and passwords and at least 20 Uniform Resource Locators (URLs).
Spanish-English dictionary > que distingue entre mayúscula y minúscula
См. также в других словарях:
usernames — n. unique name by which a user is identified when accessing a multi user system (Computers) … English contemporary dictionary
Operation AntiSec — An image that Anonymous has used to represent the operation; it contains elements of symbols used to represent both Anonymous and LulzSec. Not to be confused with Antisec Movement. Operation Anti Security, also referred to as Operation AntiSec or … Wikipedia
PyWikipedia — Aide:Pywikipedia In other languages: de en fr hu it ja … Wikipédia en Français
Ident — The Ident Protocol, specified in RFC 1413, is an Internet protocol that helps identify the user of a particular TCP connection. One popular daemon program for providing the ident service is identd.How Ident WorksThe Ident Protocol is designed to… … Wikipedia
T-SQL — Transact SQL (T SQL) расширение языка Microsoft (для Microsoft SQL Server) и Для того, чтобы сделать язык мощнее, SQL был расширен такими дополнительными возможностями как: управляющие операторы локальные переменные различные дополнительные… … Википедия
Digital self-defense — is the use of self defense strategies by Internet users to ensure digital security; that is to say, the protection of confidential personal electronic information.[1] Internet security software provides initial protection by setting up a firewall … Wikipedia
Yahoo! Mail — A screenshot of a Yahoo! Mail inbox Developer(s) … Wikipedia
Mail-11 — was the native email transport protocol used by Digital Equipment Corporation s VMS operating system, and supported by several other DEC operating systems such as Ultrix. It normally used the DECnet networking system as opposed to TCP/IP. Similar … Wikipedia
Directory Harvest Attack — A Directory Harvest Attack or DHA is a technique used by spammers in an attempt to find valid/existent e mail addresses at a domain by using brute force. The attack is usually carried out by way of a standard dictionary attack, where valid e mail … Wikipedia
Information security — Components: or qualities, i.e., Confidentiality, Integrity and Availability (CIA). Information Systems are decomposed in three main portions, hardware, software and communications with the purpose to identify and apply information security… … Wikipedia
Skype — See also: Features of Skype Skype Skype 5.6 running on Windows 7 … Wikipedia