Examples of using Could be exploited in English and their translations into Slovak
{-}
-
Official
-
Colloquial
-
Medicine
-
Financial
-
Ecclesiastic
-
Official/political
-
Computer
-
Programming
Create forest areas that could be exploited;
This could be exploited by criminal elements.
Net pup- this engine could be exploited for.
Although these privacy breaches appeared to be benign,they emphasised how easily a phone's privacy window could be exploited for profit.
The vulnerability could be exploited locally to allow escalation of privilege.
In fact,estimates show that only about 60 to 70% of the timber which could be exploited is actually being used.
It's a finding that could be exploited to build detectors to warn pilots when they are flying into danger.
It would also set a dangerous precedent that could be exploited by future administrations.
Gadgets could be exploited to harm your computer, access your computer's files, show you objectionable content, or change their behavior at any time.
Therefore, the regulatory gaps that could be exploited for ML/TF activities are addressed.
Yahoo, like a growing number of large companies,pays up when people find mistakes in its web code that could be exploited by malicious hackers.
This would be a gap that could be exploited by the old forces to persecute us.
Without common rules, those border crossing points where theVIS is not systematically used could be exploited by illegal immigrants and criminals.
A program has weak spots that could be exploited by ransomware but usually, they are patched when the vendor becomes aware of it.
This information cannot be identified personally,but you cannot rule out the possibility that it could be exploited in various online marketing schemes.
Software has certain weak spots that could be exploited for malicious software to enter a device, but vendors patch them soon after they're found.
Weakness in an information system, system security procedures, internal controls,or implementation that could be exploited or triggered by a threat.”.
If the data is sensitive, the recovered data could be exploited, causing damage much like the missed ember in a fire.
More positively,it also recognised that new‘niche' markets were developing in Europe which could be exploited for the benet of rural areas and people.
Software has certain weak spots that could be exploited for malware to get into a device, but they are patched by authors as soon as they're found.
CVE-2018-8457 is a scripting engine memory corruption vulnerability in Edge andIE that could be exploited via a malicious website or Office file.
Software has certain weak spots that could be exploited for malicious software to enter a computer, but they are fixed by software creators soon after they are found.
There is a risk that the democratic process in Europe could not only be boosted but also derailed,and the citizens' initiative could be exploited, if not hijacked, by extremists and populists.
A program comes with certain weak spots that could be exploited for malware to enter a device, but vendors fix them soon after they are discovered.
The British knew that the WOC was in enemy hands and could be exploited but they had no alternative than to keep using it.
The purpose of the planwas to ensure that Baltic cod stocks could be exploited under sustainable economic, environmental and social conditions.
SHA2 is significantly moresecure than the more widely used SHA1, which could be exploited due to mathematical weakness identified in the algorithm.
In this case,an unsafe expression uses functions or properties that could be exploited by malicious users to gain access to drives, files, or other resources for which they do not have authorization.
An expression is considered safe if it does not use functions orproperties that could be exploited by malicious users to access drives, files, or other resources for which they do not have authorization.
In sandbox mode, Access blocks“unsafe” expressions:any expression that uses functions or properties that could be exploited by malicious users to gain access to drives, files, or other resources for which they do not have authorization.