Examples of using That can be exploited in English and their translations into Indonesian
{-}
-
Colloquial
-
Ecclesiastic
-
Computer
-
Ecclesiastic
Businesses should handle all data assets as potential targets because there is a market value for all data that can be exploited by criminals.
type confusion vulnerabilities that can be exploited for remote code execution.
the civil law system has some intrinsic flaws that can be exploited by the unscrupulous and/or desperate.
network for vulnerabilities that can be exploited.
we must avoid leaving a vacuum in Syria that can be exploited by the Assad regime or its supporters.".
high liquidity combined with fewer trading instruments generate greater intra-day volatility in the currency market that can be exploited by day-traders.
Positioning- Taking advantage of future opportunities that can be exploited when the two companies are combined.
predictable player will always be on the lookout for situations that can be exploited simply because the tight-passive player folds too frequently to aggression.
You can also have someone forage the baron's dominion to see if there are any other natural resources that can be exploited.
the sports betting world is full of inefficiencies that can be exploited for profit.
economic activities creates new vulnerabilities in large states that can be exploited by non-state actors.
network for vulnerabilities that can be exploited.
hidden trends found that can be exploited.
Positioning: Merging two companies may help to take advantage of future opportunities that can be exploited when the two companies are merged.
it creates new vulnerabilities that can be exploited by experienced non-state actors.
so Real Madrid will certainly know there are weaknesses that can be exploited.
so Real Madrid will certainly know there are weaknesses that can be exploited.
It demonstrates that there are a lot of vulnerabilities in open societies that can be exploited by whatever terrorist groups are carrying out these actions,” Katulis said.
the enemies all have different weaknesses that can be exploited for extra turns.
There is a sestemmatic dependency in the return that can be exploited to an abnormal return.