Examples of using Can be exploited in English and their translations into Hungarian
{-}
-
Colloquial
-
Official
-
Medicine
-
Ecclesiastic
-
Financial
-
Programming
-
Official/political
-
Computer
These factors can be exploited by recruiters who prey on vulnerabilities and grievances through manipulation
The internal market is not a place where Eastern European workers can be exploited or subjected to lower social standards.
The above-mentioned facts can be exploited by the globalists through controlling water supplies and creating more artificial shortages.
My invention,(the motion picture camera), can be exploited… as a scientific curiosity,
My invention can be exploited. as a scientific curiosity, but apart from that it has no commercial value whatsoever.”.
over 83% of home Wi-Fi routers have known security vulnerabilities that can be exploited by hackers.
We are very hopeful that the fungus' extreme vulnerability to UV light can be exploited to manage the disease
Because the land is strategically valuable because there are resources that can be exploited but most of all, simply because they can. .
Some of the tasks at the end of the lessons are examples of how the Registry can be exploited for further learning.
system integration can be exploited by effective cooperation.
confidence so that the full potential of the EU digital economy can be exploited.
A critical design vulnerability in a popular and widely used electronic lock system can be exploited to unlock every locked room in a facility,
In the case of Russia, energy dependence, inefficiency to solve societal problems that can be exploited by external actors,
the developed occurrence controlled lightening system can be exploited.
to raise specific questions on how these opportunities can be exploited and challenges addressed,
the full potential of network marketing can be exploited in combination with the latest Internet-based technologies.
expertise that can be exploited to improve food output in the country.
Kaspersky Lab experts discovered that electric vehicle(EV) chargers supplied by a major vendor carry vulnerabilities that can be exploited by cyber attackers,
to the Commission and the partners that these agreements are a development instrument and that the advantages for development can be exploited to the full only through comprehensive regional agreements.
the vulnerability can be exploited if the Indexing Service is not actively running,