Examples of using Computer database in English and their translations into Indonesian
{-}
-
Colloquial
-
Ecclesiastic
-
Computer
-
Ecclesiastic
Breaking into computer databases and retrieving information.
Companies file regular reports with the SEC in a computer database known as EDGAR.
Computer databases usually contain the aggression of data records or files like product catalogs, customer profiles, and sales transactions.
We provide full traceability of all MTR's from electronic files in our computer database.
You can use a sheet of paper or a computer database to log aircraft information, for example.
Plan, coordinate, and implement security measures to safeguard computer databases.
You can even search the on-site computer database to see a record of immigrants who came through here.”.
Control workflow arranging or occupation tracking, applying computer database software.
The program teaches students about computer databases, networks, computer security and more.
Instead, every light bulb, every TV,and even the thermostat are controlled remotely from a computer database.
In relation to information that is held on our computer database, we apply the following guidelines.
These medical records may be taken by hand or on a computer, and can either be stored in a filing system or computer database.
Computer databases typically contain aggregations of data records or files, such as sales transactions, product catalogs and inventories, and customer profiles.
Unfortunately, such biochips store personal identification and the information generated from its use will be stored andmaintained in a computer database.
The information is not on the chip; it is in a computer database that hospitals gain access to by scanning patients who carry a chip beneath their skin.
But the basic assumption that everyone has a uniquefingerprint from which they can be quickly identified through a computer database is flawed, an expert has claimed.
Search computer databases, credit reports, public records, tax and legal filings, and other resources in order to locate persons or to compile information for investigations.
Assumption that everyone has a unique fingerprint from which they can be identified through a computer database is flawed, says Home Office expert Mike Silverman.
Mr. Cook explained that Al Qaeda, which literally means“the base” in Arabic,was originally the computer database of the thousands of Islamist extremists who were trained by the CIA and funded by the Saudis to defeat the Russians in Afghanistan.
Only the recipient may use them since computer will verify the knowledge andif the provided information doesn't match the knowledge stored in the computer database, the code will be rejected.
These POS terminals not only print a sales receipt for the customer butalso send information to a computer database when each item is sold to maintain an inventory of items on hand and items to be ordered allowing a cashless economy.
Only the recipient can use them since the computer will verify the data and if the offered infowould not match the knowledge saved in the computer database, the code will probably be rejected.
Mr. Cook explained that Al Qaeda, which literally means an abbreviation of“the database” in Arabic,was originally the computer database of the thousands of Islamist extremists, who were trained by the CIA and funded by the Saudis[U.S. Taxpayer], in order to defeat the Russians in Afghanistan.
Exactly the recipient are able to use them considering that the computer will verify the data andwhen the provided information doesn't match the info stored in the computer database, the code will probably be rejected.
It is a technical process, there's no reason to say,that an optical scanner connected to a computer database cannot scan your arm and immediatly understand what problem exists.
Only the recipient can use them considering that the computer will certainly validate the info andif the supplied information doesn't match the details conserved in the computer database, the code will certainly be rejected.
These POS terminals not only print a sales receipt for the customer butalso send information to a computer database when each item is sold to maintain an inventory of items on hand and items to be ordered.
However, the basic assumption that everyone has a uniquefingerprint from which they can be quickly identified through a computer database is flawed, according to the Home Office's former Forensic Science Regulator.
These POS terminals not without help print a sales receipt for the customer butin addition to send mention to a computer database considering each item is sold to money an inventory of items upon hand and items to be ordered.