about icon-addNote android4 Answer apple4 icon-appStoreEN icon-appStoreES icon-appStorePT icon-appStoreRU Imported Layers Copy 7 icon-arrow-spined icon-ask icon-attention icon-bubble-blue icon-bubble-red ButtonError ButtonLoader ButtonOk icon-cake icon-camera icon-card-add icon-card-calendar icon-card-remove icon-card-sort chrome-extension-ru chrome-extension-es-mx chrome-extension-pt-br chrome-extension-ru comment comment icon-cop-cut icon-cop-star Cross Dislike icon-editPen icon-entrance icon-errorBig facebook flag flag_vector icon-globe icon-googlePlayEN icon-googlePlayRU icon-greyLoader icon-cake Heart 4EB021E9-B441-4209-A542-9E882D3252DE Created with sketchtool. Info Kebab icon-lamp icon-lampBig icon-learnHat icon-learning-hat Dislike Loup Loup icon-more icon-note icon-notifications icon-pen Pencil icon-play icon-plus-light icon-plus icon-rosie-cut Rune scrollUp Share-icon Shevron-Down Shevron Left Shevron Right sound sound1 sound2 sound3 sound4 sound2 icon-star Swap icon-translate Trash icon-tutor-ellipsis icon-tutor-flip Tutor folder icon icon-tutor-learned icon-twoWayArrow Mezhdunarodny_logotip_VK vk icon-word pen_icon Logo Logo Logo
без примеровНайдено в 1 словаре

Юридический словарь
  • Англо-русский юридический словарь. © «РУССО», 2003, Андрианов С.Н., Берсон А.С. и др. 50 тыс. слов и словосочетаний.

authenticated

Примеры из текстов

The essence of Zahavi's idea is that advertisements of superiority are authenticated by their cost.
Суть идеи Захави заключается в том, что заявление о превосходстве необходимо подтверждать реальной жертвой.
Dawkins, Richard / The God DelusionДокинз, Ричард / Бог как иллюзия
Бог как иллюзия
Докинз, Ричард
© 2006 by Richard Dawkins
© H. Смелкова, перевод на русский язык, 2008
© ООО "Издательская Группа Аттикус", 2008
The God Delusion
Dawkins, Richard
© Richard Dawkins 2006
And never a single authenticated sighting.
Но их никто не видел.
King, Stephen / The Dark tower 7: The Dark TowerКинг, Стивен / Темная башня 7: Темная башня
Темная башня 7: Темная башня
Кинг, Стивен
© Stephen King, 2004
© Перевод. В.А.Вебер, 2005
© ООО "Издательство АСТ", 2005
The Dark tower 7: The Dark Tower
King, Stephen
© 2004 by Stephen King
There can be no doubt about this fact, which can be easily authenticated from books, transactions and contracts in the volost administrative offices.
Это факт, не подлежащий сомнению; удостовериться в этом легко из книг, сделок и договоров в волостных правлениях.
Плеханов, Г. В. / Наши разногласия. Письмо к П. Л. ЛавровуPlekhanov, G. V. / Our Differences. Letter to P. L. Lavrov
Our Differences. Letter to P. L. Lavrov
Plekhanov, G. V.
Наши разногласия. Письмо к П. Л. Лаврову
Плеханов, Г. В.
© Государственное издательство политической литературы, 1949 г.
If a domain member cannot resolve the domain controller name into an IP address, it cannot build a secure RPC channel and users cannot get authenticated in the domain.
Если член домена не в состоянии преобразовать имя контроллера домена в IP-адрес, то безопасный канал RPC не будет установлен и пользователи не смогут зарегистрироваться в домене.
Boswell, William / Inside Windows Server 2003Бозуэлл, Уилльям / Внутренный мир Windows Server 2003, SP1 и R2
Внутренный мир Windows Server 2003, SP1 и R2
Бозуэлл, Уилльям
© Издательский дом "Вильямс", 2006
© Pearson Education, Inc., 2003
Inside Windows Server 2003
Boswell, William
© 2003 by Pearson Education, Inc.
Wherever possible, the Panel relied on fully authenticated documentary evidence.
Везде, где это было возможно, Группа опиралась на полностью проверенные документальные доказательства.
© Организация Объединенных Наций, 2010 год
© United Nations 2010
It appears I've no proofs; none of the papers I ought to have; my facts cannot be authenticated it seems...Hm!...
Доказательств, вишь, нет; бумаг нужных нет; справки неверны выходят... Гм...
Dostoevsky, Fyodor / The Insulted and InjuredДостоевский, Фёдор / Униженные и оскорблённые
Униженные и оскорблённые
Достоевский, Фёдор
© "Государственное издательство художественной литературы", 1955
The Insulted and Injured
Dostoevsky, Fyodor
Only sessions that are authenticated using an account with the CREATE ANY OUTLINE privilege will actually create outlines.
Шаблоны будут создаваться только в сеансах от имени пользователей с привилегией CREATE ANY OUTLINE.
Kyte, Tom / Expert One-on-One OracleКайт, Том / Oracle для профессионалов
Oracle для профессионалов
Кайт, Том
© Перевод на русский язык. ООО «ДиаСофтЮП», 2003
© Wrox Press Ltd, 2002
Expert One-on-One Oracle
Kyte, Tom
© Wrox Press Ltd, 2002
Traffic from the client is now routed through the RRAS server onto the main network, where the client is authenticated if the Logon Using Dial-Up Connection option was selected.
Данные от клиента маршрутизируются через RRAS-сервер в основную сеть, где клиент проходит аутентификацию при установке флажка Logon Using Dial-Up Connection (Загружаться с использованием коммутируемого доступа).
Boswell, William / Inside Windows Server 2003Бозуэлл, Уилльям / Внутренный мир Windows Server 2003, SP1 и R2
Внутренный мир Windows Server 2003, SP1 и R2
Бозуэлл, Уилльям
© Издательский дом "Вильямс", 2006
© Pearson Education, Inc., 2003
Inside Windows Server 2003
Boswell, William
© 2003 by Pearson Education, Inc.
Now the manuscript would not be authenticated. Not now. Perhaps never.
Подлинность манускрипта не будет установлена, вероятно, никогда.
Simak, Clifford D. / The Fellowship of the TalismanСаймак, Клиффорд Д. / Братство Талисмана
Братство Талисмана
Саймак, Клиффорд Д.
© 1978 by Clifford D. Simak
© Перевод. К. Королев, 2005
The Fellowship of the Talisman
Simak, Clifford D.
© 1978 by Clifford D. Simak
This satisfies an LDAP requirement to bind to the server so that you can be authenticated.
Это удовлетворяет требование LDAP по привязке к серверу для аутентификации.
Boswell, William / Inside Windows Server 2003Бозуэлл, Уилльям / Внутренный мир Windows Server 2003, SP1 и R2
Внутренный мир Windows Server 2003, SP1 и R2
Бозуэлл, Уилльям
© Издательский дом "Вильямс", 2006
© Pearson Education, Inc., 2003
Inside Windows Server 2003
Boswell, William
© 2003 by Pearson Education, Inc.
If the two digests match, the user is authenticated successfully.
Если два дайджеста совпадают, аутентификация пользователя происходит успешно.
Morimoto, Rand H.,Abbate, Andrew,Kovach, Eric,Roberts, Ed / Microsoft® Windows® Server 2003 Insider SolutionsМаримото, Рэнд,Аббат, Эндрю,Ковач, Эрик,Робертс, Эд / Microsoft® Windows® Server 2003: решения экспертов
Microsoft® Windows® Server 2003: решения экспертов
Маримото, Рэнд,Аббат, Эндрю,Ковач, Эрик,Робертс, Эд
© 2004 SAMS Publishing
© Перевод «ИД КУДИЦ-ОБРАЗ», 2005
© Русское издание опубликовано издательством КУДИЦ-ОБРАЗ, 2005.
Microsoft® Windows® Server 2003 Insider Solutions
Morimoto, Rand H.,Abbate, Andrew,Kovach, Eric,Roberts, Ed
© 2004 by Sams Publishing
Strangely enough, Authenticated Users actually includes both users and computers.
Как это ни странно, группа Authenticated Users (Прошедшие проверку) в действительности включает в себя как пользователей, так и компьютеры.
Morimoto, Rand H.,Abbate, Andrew,Kovach, Eric,Roberts, Ed / Microsoft® Windows® Server 2003 Insider SolutionsМаримото, Рэнд,Аббат, Эндрю,Ковач, Эрик,Робертс, Эд / Microsoft® Windows® Server 2003: решения экспертов
Microsoft® Windows® Server 2003: решения экспертов
Маримото, Рэнд,Аббат, Эндрю,Ковач, Эрик,Робертс, Эд
© 2004 SAMS Publishing
© Перевод «ИД КУДИЦ-ОБРАЗ», 2005
© Русское издание опубликовано издательством КУДИЦ-ОБРАЗ, 2005.
Microsoft® Windows® Server 2003 Insider Solutions
Morimoto, Rand H.,Abbate, Andrew,Kovach, Eric,Roberts, Ed
© 2004 by Sams Publishing
Create an Authenticated Gateway
Создание шлюза с проверкой полномочий
Lockhart, Andrew / Network Security HacksЛокхарт, Эндрю / Антихакинг в сети. Трюки.
Антихакинг в сети. Трюки.
Локхарт, Эндрю
© 2004 O'Reilly Media, Inc.
© Издание на русском языке ЗАО Издательский дом «Питер», 2005
© Перевод на русский язык ЗАО Издательский дом «Питер», 2005
Network Security Hacks
Lockhart, Andrew
© 2004 O'Reilly Media, Inc.
Because of this, a hacker can easily identify the SSID within the beacon frame and authenticate with the wireless network.
Поэтому хакер может легко обнаружить SSID в маячковом фрейме и аутентифицироваться в беспроводной сети.
Geier, Jim / Wireless Networks first-stepГейер, Джим / Беспроводные сети. Первый шаг
Беспроводные сети. Первый шаг
Гейер, Джим
© Издательский дом "Вильямс", 2005
© Cisco Systems, Inc., 2005
Wireless Networks first-step
Geier, Jim
© 2005 Cisco Systems, Inc.
When you use LDP, you must walk through a few steps to bind (authenticate) and set up to view the directory tree.
Перед использованием LDP придется выполнить несколько операций по привязке (аутентификации) и настройке просмотра дерева каталога.
Boswell, William / Inside Windows Server 2003Бозуэлл, Уилльям / Внутренный мир Windows Server 2003, SP1 и R2
Внутренный мир Windows Server 2003, SP1 и R2
Бозуэлл, Уилльям
© Издательский дом "Вильямс", 2006
© Pearson Education, Inc., 2003
Inside Windows Server 2003
Boswell, William
© 2003 by Pearson Education, Inc.

Добавить в мой словарь

authenticated
- duly authenticated

Переводы пользователей

Пока нет переводов этого текста.
Будьте первым, кто переведёт его!

Словосочетания

authenticated copy
заверенная копия
duly authenticated
удостоверенный надлежащим образом
authenticated copy
заверенная копня
authenticated copy
заверенный экземпляр
authenticated copy
засвидетельствованная копия
notarially authenticated
нотариально оформленный
notarially authenticated transaction
нотариально удостоверенная сделка
notarially authenticated
нотариально удостоверенный
authenticated signature
удостоверенная подпись
officially authenticated
официально удостоверенный
authenticated user
аутентифицированный пользователь
self-authenticating
"самосвидетельствующий"
self-authenticating
не требующий засвидетельствования
to authenticate
визировать
authenticating terminal
терминал аутентификации

Формы слова

authenticate

verb
Basic forms
Pastauthenticated
Imperativeauthenticate
Present Participle (Participle I)authenticating
Past Participle (Participle II)authenticated
Present Indefinite, Active Voice
I authenticatewe authenticate
you authenticateyou authenticate
he/she/it authenticatesthey authenticate
Present Continuous, Active Voice
I am authenticatingwe are authenticating
you are authenticatingyou are authenticating
he/she/it is authenticatingthey are authenticating
Present Perfect, Active Voice
I have authenticatedwe have authenticated
you have authenticatedyou have authenticated
he/she/it has authenticatedthey have authenticated
Present Perfect Continuous, Active Voice
I have been authenticatingwe have been authenticating
you have been authenticatingyou have been authenticating
he/she/it has been authenticatingthey have been authenticating
Past Indefinite, Active Voice
I authenticatedwe authenticated
you authenticatedyou authenticated
he/she/it authenticatedthey authenticated
Past Continuous, Active Voice
I was authenticatingwe were authenticating
you were authenticatingyou were authenticating
he/she/it was authenticatingthey were authenticating
Past Perfect, Active Voice
I had authenticatedwe had authenticated
you had authenticatedyou had authenticated
he/she/it had authenticatedthey had authenticated
Past Perfect Continuous, Active Voice
I had been authenticatingwe had been authenticating
you had been authenticatingyou had been authenticating
he/she/it had been authenticatingthey had been authenticating
Future Indefinite, Active Voice
I shall/will authenticatewe shall/will authenticate
you will authenticateyou will authenticate
he/she/it will authenticatethey will authenticate
Future Continuous, Active Voice
I shall/will be authenticatingwe shall/will be authenticating
you will be authenticatingyou will be authenticating
he/she/it will be authenticatingthey will be authenticating
Future Perfect, Active Voice
I shall/will have authenticatedwe shall/will have authenticated
you will have authenticatedyou will have authenticated
he/she/it will have authenticatedthey will have authenticated
Future Perfect Continuous, Active Voice
I shall/will have been authenticatingwe shall/will have been authenticating
you will have been authenticatingyou will have been authenticating
he/she/it will have been authenticatingthey will have been authenticating
Future in the Past Indefinite, Active Voice
I should/would authenticatewe should/would authenticate
you would authenticateyou would authenticate
he/she/it would authenticatethey would authenticate
Future in the Past Continuous, Active Voice
I should/would be authenticatingwe should/would be authenticating
you would be authenticatingyou would be authenticating
he/she/it would be authenticatingthey would be authenticating
Future in the Past Perfect, Active Voice
I should/would have authenticatedwe should/would have authenticated
you would have authenticatedyou would have authenticated
he/she/it would have authenticatedthey would have authenticated
Future in the Past Perfect Continuous, Active Voice
I should/would have been authenticatingwe should/would have been authenticating
you would have been authenticatingyou would have been authenticating
he/she/it would have been authenticatingthey would have been authenticating
Present Indefinite, Passive Voice
I am authenticatedwe are authenticated
you are authenticatedyou are authenticated
he/she/it is authenticatedthey are authenticated
Present Continuous, Passive Voice
I am being authenticatedwe are being authenticated
you are being authenticatedyou are being authenticated
he/she/it is being authenticatedthey are being authenticated
Present Perfect, Passive Voice
I have been authenticatedwe have been authenticated
you have been authenticatedyou have been authenticated
he/she/it has been authenticatedthey have been authenticated
Past Indefinite, Passive Voice
I was authenticatedwe were authenticated
you were authenticatedyou were authenticated
he/she/it was authenticatedthey were authenticated
Past Continuous, Passive Voice
I was being authenticatedwe were being authenticated
you were being authenticatedyou were being authenticated
he/she/it was being authenticatedthey were being authenticated
Past Perfect, Passive Voice
I had been authenticatedwe had been authenticated
you had been authenticatedyou had been authenticated
he/she/it had been authenticatedthey had been authenticated
Future Indefinite, Passive Voice
I shall/will be authenticatedwe shall/will be authenticated
you will be authenticatedyou will be authenticated
he/she/it will be authenticatedthey will be authenticated
Future Perfect, Passive Voice
I shall/will have been authenticatedwe shall/will have been authenticated
you will have been authenticatedyou will have been authenticated
he/she/it will have been authenticatedthey will have been authenticated