Eksempler på brug af Data that can be used på Engelsk og deres oversættelser til Dansk
{-}
-
Official
-
Colloquial
-
Medicine
-
Financial
-
Ecclesiastic
-
Official/political
-
Computer
These cookies do not collect any data that can be used to identify visitors.
On the question of data that can be used for climate analysis, we have indicated that there are two pilot projects, entitled LUCAS and MARS.
These cookies do not collect any data that can be used to identify visitors.
It will hijack data that can be used to expose the victim's identity- their name, address, phone number, location, interests and stored account credentials.
Non-personal information includes data that can be used to identify an individual.
An example is private data that can be used to expose the victims identity. its engine scans for strings related to their names, addresses, phone numbers, interests, location, passwordsa and account credentials.
Campaign Metrics- The malicious engine can harvest data that can be used to optimize the campaigns.
It will hijack data that can be used to expose the victim's identity- their name, address, phone number, location, interests and stored account credentials. Its other use is to take information that can be used to optimize the attacks.
Campaign Metrics- The criminals can also hijack data that can be used to optimize the ongoing attacks.
Personal data is all data that can be used to identify a single individual person.
Analytics Metrics- The Greystars virus can use the built-in engine in order to harvest data that can be used for campaign metrics.
Personal information is data that can be used to identify or contact a single person.
These large-scale survey are generally run by a team of researchers andthey are designed to create data that can be used by many researchers.
Metrics Data- Other data that can be used by the malware engine for statistical purposes.
Anonymous Campaign Metrics- The FoxRansom virus can collect data that can be used to optimize the campaigns.
Depending on its configuration it can hijack data that can be used by the hackers to optimize the attacks- a report on the installed hardware components, user settings and operating system values.
The other type of harvested information is related to various data that can be used to optimize the attack campaigns.
Personal information is data that can be used to identify or contact a single person.
Personal Data- The same mechanism can be used to instruct the harvesting engine into retrieving data that can be used to directly expose the victim user's identity.
Metrics- This data set consists of data that can be used to optimize follow-up attack campaigns.
This includes a person's name, address, phone number, interests, location and account credentials.Metrics- This data set consists of data that can be used to optimize follow-up attack campaigns.
The final result is digitized data that can be used by other tools such as Microsoft Excel and Gnumeric.
Case studies will be clustered andmade comparable across countries and in order to provide new empirical data that can be used and reanalysed in integrated assessment modelling.
The final result is digitized data that can be used by other tools such as Microsoft Excel and Gnumeric.
It constitutes of information such as their name, address, telephone number, location, interests and passwords.Campaign Metrics- The criminals can also hijack data that can be used to optimize the ongoing attacks.
The Danish Presidency does not register any data that can be used to identify you unless you sign up for newsletters or news updates.
An example list includes their name, address, location, interests, location and any stored account credentials.Campaign Metrics- The malicious engine can harvest data that can be used to optimize the campaigns.
Finally use'Save Recovery Session' option to save scanning data that can be used to resume scanning process after purchasing the product.
Example content includes the victim's name, address, location, interests, passwords and other account credentials.Campaign Metrics- The criminals can also hijack data that can be used to optimize the ongoing attacks.
Private Data- The MOLE66 virus can be programmed into revealing data that can be used to reveal the victim's identity- their name, address, interests, location, passwords and account credentials.