영어에서 Can be protected 을 사용하는 예와 한국어로 번역
{-}
-
Colloquial
-
Ecclesiastic
-
Ecclesiastic
-
Programming
-
Computer
Alternative designs of a product can be protected with a single multiple design application.
Films often show situations where one document can be protected by an army.
The researchers say that the planet's remaining wilderness can be protected“only if it is recognised within international policy frameworks.”.
To kill someone who has long been dead, or supernatural power can be protected only by using an appropriate weapon, and sometimes magic.
The good news for manufacturers is that many software-related inventions can be protected by intellectual property rights.
The researchers say the planet's remaining wilderness can be protected"only if it is recognised within international policy frameworks".
Hard drives running on FAT32 or NTFS, or HFS+ can be protected with Recovery Vault and indexing takes seconds.
HA link can be protected via a second link connected via a pair of spare ports.
so the nutritions of food can be protected well.
so the color can be protected entirely.
Based on the feature of carport, the cars can be protected from rain and the harsh effects of the sun.
Lack of phase or wrong phase of three phase power supply can be protected.
Com are Executable files. These executable files can be protected with WTM CD Protector only if they have no CRC-Check.
It supports various user-friendly standard management features, such as intuitive web-based Graphical User Interface(GUI) or industry-standard Command Line Interface(CLI), either administration traffic can be protected through SSL or SSH encryptions.
Moreover, when the minimum flow alarm is set up with the event output of the mass-flw-ontroller, and the minimum flow is secured and there is nothing, the heating electric power of SSR is intercepted and the damage by fire(burnout) by overheat can be protected.
industry-standard Command Line Interface(CLI), either administration traffic can be protected through SSL or SSH encryptions.
It supports various user-friendly standard management features, such as intuitive web-based Graphical User Interface(GUI)or industry-standard Command Line Interface(CLI), either administration traffic can be protected through SSL or SSH encryptions.
decoupling component between each level SPD, make the after class SPD can be protected by the prior class SPD.
two minutes, then patient 10 or 15 to 20, with real-time updates, can be protected by virtue of the cloud abilities of the firewall.".
Store secrets backed by Hardware Security Modules- The secrets and keys can be protected either by software or FIPS 140-2 Level 2 validates HSMs.