Examples of using Modify data in English and their translations into Indonesian
{-}
-
Colloquial
-
Ecclesiastic
-
Computer
-
Ecclesiastic
The user can modify data while off-line.
Modify data in INDODAX account, such as: e-mail and phone numbers.
Filters can help you modify data at certain times.
Successful SQL attackswill force a server to provide access to or modify data.
PHP can add, delete, or modify data in your database.
Use Microsoft PowerApps to build custom forms to view,create, and modify data and files.
Do not attempt to access or modify data maintained by our systems.
As Atoms are shared tables,all sorts of applications can access or modify data inside them.
You can delete/modify data on victim's hard-drive only if WRITE-ACCESS is enabled on victim's system.
And since Atom are shared tables,all sorts of applications can access or modify data inside those tables.
You can modify data that you have entered into the Service at any time by accessing your account and going to"Settings”.
An attacker with a privileged network position may capture or modify data in sessions protected by SSL/TLS.
Either can surreptitiously modify data and be assured that a third party would be unable to identify the culprit.
For example,SQL injection attacks involve exploiting SQL vulnerabilities to steal or modify data kept in databases.
A permitted app can also modify data associated with your account, such as which songs are in your library and playlists.
This may cause anattacker with a privileged network position to capture or modify data in sessions protected by SSL/TLS.
Please don't access or modify data without permission, and act in good faith not to degrade the performance of our products, apps and websites.
Apple said that"an attacker with aprivileged network position may capture or modify data in sessions protected by SSL/TLS.".
Attackers can steal or modify data that is improperly protected, with the ulterior motive of committing credit card fraud or other crimes.
The first Rowhammer attack on Android devices was named DRammer,and it could modify data on Android devices and root Android smartphones.
This type of Trojan can modify data on your computer- so that your computer doesn't run correctly or you can no longer use specific data. .
For example, someone might change the values in a database,alter a program so that it performs an additional computation, or modify data being transmitted electronically.
This type of Trojan can modify data on users' computers- so that their computers don't run correctly or they can no longer use specific data. .
Third-party applications regain the ability to read and modify data located anywhere on external storage, such as on SD cards.
At that level of control, they can access and modify data, install software programmes, shut down or re-set the different systems, as well as modify or erase any audit logs that would record their actions.".
Third-party applications regain the ability to read and modify data located anywhere on external storage, such as on SD cards.
Com will be also able to use your data to contact you,will store and modify data with personal character in order to send you information about new offers, promotions, advertising and direct marketing messages.