database
→
ReceivesAction
→
updated
|
0.77
|
|
database
→
ReceivesAction
→
searched
|
0.74
|
|
database
→
ReceivesAction
→
created
|
0.73
|
|
database
→
ReceivesAction
→
restored
|
0.71
|
|
database
→
ReceivesAction
→
accessed
|
0.71
|
|
database
→
ReceivesAction
→
encrypted
|
0.67
|
|
database
→
ReceivesAction
→
designed
|
0.67
|
|
database
→
ReceivesAction
→
made available
|
0.67
|
|
database
→
ReceivesAction
→
protected by password
|
0.67
|
|
database
→
ReceivesAction
→
protected
|
0.66
|
|
database
→
ReceivesAction
→
deleted
|
0.66
|
|
database
→
ReceivesAction
→
upgraded
|
0.66
|
|
database
→
ReceivesAction
→
protected by firewall
|
0.66
|
|
database
→
ReceivesAction
→
locked
|
0.65
|
|
database
→
ReceivesAction
→
closed
|
0.65
|
|
database
→
ReceivesAction
→
constructed
|
0.64
|
|
database
→
ReceivesAction
→
stored
|
0.64
|
|
database
→
ReceivesAction
→
built
|
0.64
|
|
database
→
ReceivesAction
→
managed
|
0.64
|
|
database
→
ReceivesAction
→
replicated
|
0.63
|
|
database
→
ReceivesAction
→
updated with new data
|
0.63
|
|
database
→
ReceivesAction
→
queried
|
0.62
|
|
database
→
ReceivesAction
→
downloaded
|
0.62
|
|
database
→
ReceivesAction
→
recovered
|
0.62
|
|
database
→
ReceivesAction
→
expanded
|
0.61
|
|
database
→
ReceivesAction
→
stored on server
|
0.61
|
|
database
→
ReceivesAction
→
organized
|
0.60
|
|
database
→
ReceivesAction
→
read
|
0.60
|
|
database
→
ReceivesAction
→
rebuilt
|
0.60
|
|
database
→
ReceivesAction
→
structured
|
0.60
|
|
database
→
ReceivesAction
→
developed
|
0.60
|
|
database
→
ReceivesAction
→
hosted
|
0.60
|
|
database
→
ReceivesAction
→
maintained
|
0.60
|
|
database
→
ReceivesAction
→
distributed
|
0.59
|
|
database
→
ReceivesAction
→
processed
|
0.59
|
|
database
→
ReceivesAction
→
run
|
0.58
|
|
database
→
ReceivesAction
→
dismounted
|
0.58
|
|
database
→
ReceivesAction
→
integrated
|
0.58
|
|
database
→
ReceivesAction
→
migrated
|
0.58
|
|
database
→
ReceivesAction
→
provided in both excel spreadsh…
|
0.58
|
|
database
→
ReceivesAction
→
checked
|
0.58
|
|
database
→
ReceivesAction
→
owned
|
0.58
|
|
database
→
ReceivesAction
→
published
|
0.58
|
|
database
→
ReceivesAction
→
stopped
|
0.58
|
|
database
→
ReceivesAction
→
arranged in table
|
0.57
|
|
database
→
ReceivesAction
→
provided in an access database …
|
0.57
|
|
database
→
ReceivesAction
→
restarted
|
0.57
|
|
database
→
ReceivesAction
→
compromised
|
0.57
|
|
database
→
ReceivesAction
→
created in sql server
|
0.57
|
|
database
→
ReceivesAction
→
registered
|
0.56
|
|
database
→
ReceivesAction
→
distributed by mean
|
0.56
|
|
database
→
ReceivesAction
→
involved in replication
|
0.56
|
|
database
→
ReceivesAction
→
connected to the network
|
0.55
|
|
database
→
ReceivesAction
→
indexed
|
0.55
|
|
database
→
ReceivesAction
→
optimized
|
0.55
|
|
database
→
ReceivesAction
→
updated on regular basis
|
0.55
|
|
database
→
ReceivesAction
→
released
|
0.55
|
|
database
→
ReceivesAction
→
required for testing
|
0.55
|
|
database
→
ReceivesAction
→
removed
|
0.54
|
|
database
→
ReceivesAction
→
added
|
0.54
|
|
database
→
ReceivesAction
→
accessed by the script
|
0.54
|
|
database
→
ReceivesAction
→
activated
|
0.54
|
|
database
→
ReceivesAction
→
hosted on server
|
0.54
|
|
database
→
ReceivesAction
→
controlled
|
0.54
|
|
database
→
ReceivesAction
→
based on datum
|
0.53
|
|
database
→
ReceivesAction
→
involved in the transaction
|
0.53
|
|
database
→
ReceivesAction
→
related
|
0.53
|
|
database
→
ReceivesAction
→
affected
|
0.53
|
|
database
→
ReceivesAction
→
dumped
|
0.53
|
|
database
→
ReceivesAction
→
fixed
|
0.53
|
|
database
→
ReceivesAction
→
operated
|
0.53
|
|
database
→
ReceivesAction
→
applied
|
0.52
|
|
database
→
ReceivesAction
→
monitored
|
0.52
|
|
database
→
ReceivesAction
→
started
|
0.52
|
|
database
→
ReceivesAction
→
shown in fig
|
0.52
|
|
database
→
ReceivesAction
→
searched for article
|
0.51
|
|
database
→
ReceivesAction
→
required for development
|
0.51
|
|
database
→
ReceivesAction
→
scanned
|
0.51
|
|
database
→
ReceivesAction
→
linked
|
0.51
|
|
database
→
ReceivesAction
→
installed on the server
|
0.51
|
|
database
→
ReceivesAction
→
set up in the cloud
|
0.51
|
|
database
→
ReceivesAction
→
treated
|
0.51
|
|
database
→
ReceivesAction
→
used by application
|
0.51
|
|
database
→
ReceivesAction
→
used to store information
|
0.50
|
|
database
→
ReceivesAction
→
partitioned
|
0.50
|
|
database
→
ReceivesAction
→
accessed with password
|
0.50
|
|
database
→
ReceivesAction
→
described in section
|
0.50
|
|
database
→
ReceivesAction
→
shown in table
|
0.50
|
|
database
→
ReceivesAction
→
searched by keyword
|
0.50
|
|
database
→
ReceivesAction
→
disconnected
|
0.50
|
|
database
→
ReceivesAction
→
breached
|
0.50
|
|
database
→
ReceivesAction
→
backed up in addition
|
0.49
|
|
database
→
ReceivesAction
→
reorganized
|
0.49
|
|
database
→
ReceivesAction
→
provided
|
0.49
|
|
database
→
ReceivesAction
→
designed to be trans
|
0.49
|
|
database
→
ReceivesAction
→
installed
|
0.49
|
|
database
→
ReceivesAction
→
limited
|
0.49
|
|
database
→
ReceivesAction
→
backed up on server
|
0.49
|
|
database
→
ReceivesAction
→
created on the instance of sql …
|
0.49
|
|
database
→
ReceivesAction
→
repaired
|
0.49
|
|
database
→
ReceivesAction
→
separated
|
0.49
|
|
database
→
ReceivesAction
→
compiled
|
0.49
|
|
database
→
ReceivesAction
→
lost
|
0.48
|
|
database
→
ReceivesAction
→
filtered
|
0.48
|
|
database
→
ReceivesAction
→
populated
|
0.48
|
|
database
→
ReceivesAction
→
maintained by interpol
|
0.48
|
|
database
→
ReceivesAction
→
configured
|
0.48
|
|
database
→
ReceivesAction
→
created in mysql
|
0.48
|
|
database
→
ReceivesAction
→
managed by oracle clusterware
|
0.48
|
|
database
→
ReceivesAction
→
corrupted
|
0.48
|
|
database
→
ReceivesAction
→
designed to record transaction
|
0.48
|
|
database
→
ReceivesAction
→
used to store datum
|
0.48
|
|
database
→
ReceivesAction
→
updated on daily basis
|
0.47
|
|
database
→
ReceivesAction
→
connected to the server
|
0.47
|
|
database
→
ReceivesAction
→
modified
|
0.47
|
|
database
→
ReceivesAction
→
protected by copyright
|
0.47
|
|
database
→
ReceivesAction
→
employed
|
0.47
|
|
database
→
ReceivesAction
→
accessed via the internet
|
0.46
|
|
database
→
ReceivesAction
→
used by company
|
0.46
|
|
database
→
ReceivesAction
→
stored in memory
|
0.46
|
|
database
→
ReceivesAction
→
shown in figure
|
0.46
|
|
database
→
ReceivesAction
→
stolen
|
0.46
|
|
database
→
ReceivesAction
→
supported
|
0.46
|
|
database
→
ReceivesAction
→
protected by other technical me…
|
0.46
|
|
database
→
ReceivesAction
→
described in detail
|
0.46
|
|
database
→
ReceivesAction
→
stored on hard drive
|
0.46
|
|
database
→
ReceivesAction
→
cleaned
|
0.45
|
|
database
→
ReceivesAction
→
described
|
0.45
|
|
database
→
ReceivesAction
→
shown
|
0.45
|
|
database
→
ReceivesAction
→
patched
|
0.45
|
|
database
→
ReceivesAction
→
changed
|
0.45
|
|
database
→
ReceivesAction
→
prepared
|
0.45
|
|
database
→
ReceivesAction
→
compared
|
0.45
|
|
database
→
ReceivesAction
→
attached
|
0.44
|
|
database
→
ReceivesAction
→
installed on same server
|
0.44
|
|
database
→
ReceivesAction
→
made accessible
|
0.44
|
|
database
→
ReceivesAction
→
shared
|
0.44
|
|
database
→
ReceivesAction
→
required
|
0.43
|
|
database
→
ReceivesAction
→
used by other applications
|
0.43
|
|
database
→
ReceivesAction
→
divided into logical storage un…
|
0.43
|
|
database
→
ReceivesAction
→
written
|
0.43
|
|
database
→
ReceivesAction
→
arranged in cell
|
0.43
|
|
database
→
ReceivesAction
→
imported
|
0.43
|
|
database
→
ReceivesAction
→
added over time
|
0.43
|
|
database
→
ReceivesAction
→
protected by other internationa…
|
0.42
|
|
database
→
ReceivesAction
→
searched by name
|
0.42
|
|
database
→
ReceivesAction
→
re
|
0.42
|
|
database
→
ReceivesAction
→
organized in suitable manner
|
0.42
|
|
database
→
ReceivesAction
→
converted
|
0.42
|
|
database
→
ReceivesAction
→
collected
|
0.42
|
|
database
→
ReceivesAction
→
initialized
|
0.42
|
|
database
→
ReceivesAction
→
protected against loss
|
0.42
|
|
database
→
ReceivesAction
→
tested
|
0.42
|
|
database
→
ReceivesAction
→
mined
|
0.42
|
|
database
→
ReceivesAction
→
recreated
|
0.42
|
|
database
→
ReceivesAction
→
tuned
|
0.42
|
|
database
→
ReceivesAction
→
searched by author
|
0.41
|
|
database
→
ReceivesAction
→
associated with software applic…
|
0.41
|
|
database
→
ReceivesAction
→
targeted
|
0.41
|
|
database
→
ReceivesAction
→
used in big data
|
0.41
|
|
database
→
ReceivesAction
→
consulted
|
0.41
|
|
database
→
ReceivesAction
→
known in the art
|
0.41
|
|
database
→
ReceivesAction
→
held
|
0.41
|
|
database
→
ReceivesAction
→
combined
|
0.41
|
|
database
→
ReceivesAction
→
completed
|
0.41
|
|
database
→
ReceivesAction
→
damaged
|
0.41
|
|
database
→
ReceivesAction
→
located on server
|
0.41
|
|
database
→
ReceivesAction
→
updated via ebscohost
|
0.41
|
|
database
→
ReceivesAction
→
restricted
|
0.40
|
|
database
→
ReceivesAction
→
hacked
|
0.40
|
|
database
→
ReceivesAction
→
maintained by company
|
0.40
|
|
database
→
ReceivesAction
→
selected for backup
|
0.40
|
|
database
→
ReceivesAction
→
flawed
|
0.40
|
|
database
→
ReceivesAction
→
exposed
|
0.40
|
|
database
→
ReceivesAction
→
intended for use
|
0.40
|
|
database
→
ReceivesAction
→
searched by title
|
0.40
|
|
database
→
ReceivesAction
→
set
|
0.40
|
|
database
→
ReceivesAction
→
compacted
|
0.40
|
|
database
→
ReceivesAction
→
populated with datum
|
0.40
|
|
database
→
ReceivesAction
→
split
|
0.40
|
|
database
→
ReceivesAction
→
used as template
|
0.40
|
|
database
→
ReceivesAction
→
contributed by ron darrah
|
0.40
|
|
database
→
ReceivesAction
→
identified
|
0.40
|
|
database
→
ReceivesAction
→
protected by uk
|
0.40
|
|
database
→
ReceivesAction
→
stored on computer
|
0.40
|
|
database
→
ReceivesAction
→
accessed by interested parties
|
0.39
|
|
database
→
ReceivesAction
→
obtained
|
0.39
|
|
database
→
ReceivesAction
→
searched by date
|
0.39
|
|
database
→
ReceivesAction
→
explored
|
0.39
|
|
database
→
ReceivesAction
→
coupled to the server
|
0.39
|
|
database
→
ReceivesAction
→
restricted to collections of bi…
|
0.39
|
|
database
→
ReceivesAction
→
stored in file
|
0.39
|
|
database
→
ReceivesAction
→
updated with information
|
0.39
|
|
database
→
ReceivesAction
→
examined
|
0.39
|
|
database
→
ReceivesAction
→
excluded
|
0.39
|
|
database
→
ReceivesAction
→
extracted
|
0.39
|
|
database
→
ReceivesAction
→
locked with key file
|
0.39
|
|
database
→
ReceivesAction
→
locked with one master key
|
0.39
|
|
database
→
ReceivesAction
→
stored in addition
|
0.39
|
|
database
→
ReceivesAction
→
used by researcher
|
0.39
|
|
database
→
ReceivesAction
→
viewed
|
0.39
|
|
database
→
ReceivesAction
→
accessed in the library
|
0.38
|
|
database
→
ReceivesAction
→
fragmented
|
0.38
|
|
database
→
ReceivesAction
→
manipulated
|
0.38
|
|
database
→
ReceivesAction
→
produced by the american theolo…
|
0.38
|
|
database
→
ReceivesAction
→
used in conjunction
|
0.38
|
|
database
→
ReceivesAction
→
detected
|
0.38
|
|
database
→
ReceivesAction
→
maintained by agency
|
0.38
|
|
database
→
ReceivesAction
→
associated with the server
|
0.38
|
|
database
→
ReceivesAction
→
operated by all software compil…
|
0.38
|
|
database
→
ReceivesAction
→
operated by applet
|
0.38
|
|
database
→
ReceivesAction
→
retrieved
|
0.38
|
|
database
→
ReceivesAction
→
revised
|
0.38
|
|
database
→
ReceivesAction
→
stored on disk
|
0.38
|
|
database
→
ReceivesAction
→
suspended
|
0.38
|
|
database
→
ReceivesAction
→
added throughout year
|
0.38
|
|
database
→
ReceivesAction
→
based on information
|
0.38
|
|
database
→
ReceivesAction
→
customized
|
0.38
|
|
database
→
ReceivesAction
→
distributed across multiple sys…
|
0.38
|
|
database
→
ReceivesAction
→
enabled
|
0.38
|
|
database
→
ReceivesAction
→
searched by location
|
0.38
|
|
database
→
ReceivesAction
→
sent
|
0.38
|
|
database
→
ReceivesAction
→
transferred
|
0.38
|
|
database
→
ReceivesAction
→
used by java
|
0.38
|
|
database
→
ReceivesAction
→
used by student
|
0.38
|
|
database
→
ReceivesAction
→
subject to error
|
0.37
|
|
database
→
ReceivesAction
→
built for the future
|
0.37
|
|
database
→
ReceivesAction
→
archived
|
0.37
|
|
database
→
ReceivesAction
→
browsed
|
0.37
|
|
database
→
ReceivesAction
→
devoted to knowledge
|
0.37
|
|
database
→
ReceivesAction
→
made public
|
0.37
|
|
database
→
ReceivesAction
→
refreshed
|
0.37
|
|
database
→
ReceivesAction
→
sorted
|
0.37
|
|
database
→
ReceivesAction
→
updated on monthly basis
|
0.37
|
|
database
→
ReceivesAction
→
updated on weekly basis
|
0.37
|
|
database
→
ReceivesAction
→
free of charge
|
0.37
|
|
database
→
ReceivesAction
→
handled by their own clusters o…
|
0.37
|
|
database
→
ReceivesAction
→
intended for researcher
|
0.37
|
|
database
→
ReceivesAction
→
involved in synchronization
|
0.37
|
|
database
→
ReceivesAction
→
provisioned
|
0.37
|
|
database
→
ReceivesAction
→
cloned
|
0.36
|
|
database
→
ReceivesAction
→
designed in such a way
|
0.36
|
|
database
→
ReceivesAction
→
hosted in sql server
|
0.36
|
|
database
→
ReceivesAction
→
installed by the user oracle1
|
0.36
|
|
database
→
ReceivesAction
→
overwritten by restore
|
0.36
|
|
database
→
ReceivesAction
→
protected by law
|
0.36
|
|
database
→
ReceivesAction
→
searched by country
|
0.36
|
|
database
→
ReceivesAction
→
upgraded to sql server
|
0.36
|
|
database
→
ReceivesAction
→
accessed by certain pre-designa…
|
0.36
|
|
database
→
ReceivesAction
→
accessed by multiple users
|
0.36
|
|
database
→
ReceivesAction
→
accessed by user
|
0.36
|
|
database
→
ReceivesAction
→
accessed through any computer
|
0.36
|
|
database
→
ReceivesAction
→
connected to the management ser…
|
0.36
|
|
database
→
ReceivesAction
→
exposed to the internet
|
0.36
|
|
database
→
ReceivesAction
→
implemented as collection of ob…
|
0.36
|
|
database
→
ReceivesAction
→
interrogated
|
0.36
|
|
database
→
ReceivesAction
→
managed by oracle restart
|
0.36
|
|
database
→
ReceivesAction
→
moved to another server
|
0.36
|
|
database
→
ReceivesAction
→
protected against unauthorised …
|
0.36
|
|
database
→
ReceivesAction
→
protected against use
|
0.36
|
|
database
→
ReceivesAction
→
reported
|
0.36
|
|
database
→
ReceivesAction
→
requested
|
0.36
|
|
database
→
ReceivesAction
→
searched by region
|
0.36
|
|
database
→
ReceivesAction
→
used as reference
|
0.36
|
|
database
→
ReceivesAction
→
loaded
|
0.36
|
|
database
→
ReceivesAction
→
based on the domain
|
0.36
|
|
database
→
ReceivesAction
→
cached
|
0.36
|
|
database
→
ReceivesAction
→
configured to store information
|
0.36
|
|
database
→
ReceivesAction
→
connected to the internet
|
0.36
|
|
database
→
ReceivesAction
→
created in microsoft access
|
0.36
|
|
database
→
ReceivesAction
→
curated
|
0.36
|
|
database
→
ReceivesAction
→
filled
|
0.36
|
|
database
→
ReceivesAction
→
hosted on new primary node
|
0.36
|
|
database
→
ReceivesAction
→
implemented in the storage unit
|
0.36
|
|
database
→
ReceivesAction
→
maintained by the national cent…
|
0.36
|
|
database
→
ReceivesAction
→
needed by the user
|
0.36
|
|
database
→
ReceivesAction
→
searched by company
|
0.36
|
|
database
→
ReceivesAction
→
subject to tampering
|
0.35
|
|
database
→
ReceivesAction
→
adjusted
|
0.35
|
|
database
→
ReceivesAction
→
coupled to the processor
|
0.35
|
|
database
→
ReceivesAction
→
edited
|
0.35
|
|
database
→
ReceivesAction
→
involved in mirroring
|
0.35
|
|
database
→
ReceivesAction
→
modified by user
|
0.35
|
|
database
→
ReceivesAction
→
protected by treaty
|
0.35
|
|
database
→
ReceivesAction
→
protected without limitation
|
0.35
|
|
database
→
ReceivesAction
→
quiesced
|
0.35
|
|
database
→
ReceivesAction
→
referred to herein
|
0.35
|
|
database
→
ReceivesAction
→
updated in real time
|
0.35
|
|
database
→
ReceivesAction
→
used by websphere portal
|
0.35
|
|
database
→
ReceivesAction
→
used in connection
|
0.35
|
|
database
→
ReceivesAction
→
associated with first alphanume…
|
0.35
|
|
database
→
ReceivesAction
→
compressed
|
0.35
|
|
database
→
ReceivesAction
→
contained in specified session …
|
0.35
|
|
database
→
ReceivesAction
→
contributed by wayne klusman
|
0.35
|
|
database
→
ReceivesAction
→
divided into two parts
|
0.35
|
|
database
→
ReceivesAction
→
formatted
|
0.35
|
|
database
→
ReceivesAction
→
funded by novel
|
0.35
|
|
database
→
ReceivesAction
→
hosted in azure
|
0.35
|
|
database
→
ReceivesAction
→
left exposed
|
0.35
|
|
database
→
ReceivesAction
→
referenced
|
0.35
|
|
database
→
ReceivesAction
→
reloaded
|
0.35
|
|
database
→
ReceivesAction
→
stored in ram
|
0.35
|
|
database
→
ReceivesAction
→
unlocked
|
0.35
|
|
database
→
ReceivesAction
→
updated on ongoing basis
|
0.35
|
|
database
→
ReceivesAction
→
used by government
|
0.35
|
|
database
→
ReceivesAction
→
used by policy makers
|
0.35
|
|
database
→
ReceivesAction
→
used by teacher
|
0.35
|
|
database
→
ReceivesAction
→
used in production
|
0.35
|
|
database
→
ReceivesAction
→
used to provide information
|
0.35
|
|
database
→
ReceivesAction
→
used to provide the services
|
0.35
|
|
database
→
ReceivesAction
→
used to simulate the series
|
0.35
|
|
database
→
ReceivesAction
→
used via mobile devices
|
0.35
|
|
database
→
ReceivesAction
→
accessed through smart device
|
0.34
|
|
database
→
ReceivesAction
→
accessed via network
|
0.34
|
|
database
→
ReceivesAction
→
based on public records
|
0.34
|
|
database
→
ReceivesAction
→
based on word net
|
0.34
|
|
database
→
ReceivesAction
→
created for first time
|
0.34
|
|
database
→
ReceivesAction
→
created on the server
|
0.34
|
|
database
→
ReceivesAction
→
developed in cooperation
|
0.34
|
|
database
→
ReceivesAction
→
housed in location
|
0.34
|
|
database
→
ReceivesAction
→
incorporated into single memory
|
0.34
|
|
database
→
ReceivesAction
→
loaded into memory
|
0.34
|
|
database
→
ReceivesAction
→
located on local system
|
0.34
|
|
database
→
ReceivesAction
→
maintained by a database server
|
0.34
|
|
database
→
ReceivesAction
→
migrated to sql server
|
0.34
|
|
database
→
ReceivesAction
→
protected under the trademark
|
0.34
|
|
database
→
ReceivesAction
→
searched by county
|
0.34
|
|
database
→
ReceivesAction
→
sharded
|
0.34
|
|
database
→
ReceivesAction
→
used by academic
|
0.34
|
|
database
→
ReceivesAction
→
used by most unix-like operatin…
|
0.34
|
|
database
→
ReceivesAction
→
ignored
|
0.34
|
|
database
→
ReceivesAction
→
subject to break-ins
|
0.34
|
|
database
→
ReceivesAction
→
accessed on computer
|
0.33
|
|
database
→
ReceivesAction
→
associated with the mobile comm…
|
0.33
|
|
database
→
ReceivesAction
→
enlarged
|
0.33
|
|
database
→
ReceivesAction
→
hidden
|
0.33
|
|
database
→
ReceivesAction
→
issued a network violation warn…
|
0.33
|
|
database
→
ReceivesAction
→
maintained by security
|
0.33
|
|
database
→
ReceivesAction
→
moved to another location
|
0.33
|
|
database
→
ReceivesAction
→
protected as compilation
|
0.33
|
|
database
→
ReceivesAction
→
segmented
|
0.33
|
|
database
→
ReceivesAction
→
synced
|
0.33
|
|
database
→
ReceivesAction
→
updated at step
|
0.33
|
|
database
→
ReceivesAction
→
uploaded
|
0.33
|
|
database
→
ReceivesAction
→
used by individual
|
0.33
|
|
database
→
ReceivesAction
→
used by industry
|
0.33
|
|
database
→
ReceivesAction
→
used by law enforcement
|
0.33
|
|
database
→
ReceivesAction
→
established
|
0.33
|
|
database
→
ReceivesAction
→
allowed
|
0.33
|
|
database
→
ReceivesAction
→
backed up datum
|
0.33
|
|
database
→
ReceivesAction
→
browsed by alphabetically
|
0.33
|
|
database
→
ReceivesAction
→
categorized
|
0.33
|
|
database
→
ReceivesAction
→
designed to contain three kinds…
|
0.33
|
|
database
→
ReceivesAction
→
determined
|
0.33
|
|
database
→
ReceivesAction
→
developed by j. baker
|
0.33
|
|
database
→
ReceivesAction
→
developed by m. douma
|
0.33
|
|
database
→
ReceivesAction
→
developed by s. kotochigova
|
0.33
|
|
database
→
ReceivesAction
→
discovered
|
0.33
|
|
database
→
ReceivesAction
→
hosted by third party
|
0.33
|
|
database
→
ReceivesAction
→
kept separate
|
0.33
|
|
database
→
ReceivesAction
→
located on a telecommunications…
|
0.33
|
|
database
→
ReceivesAction
→
located on device
|
0.33
|
|
database
→
ReceivesAction
→
maintained by third party
|
0.33
|
|
database
→
ReceivesAction
→
protected by database rights
|
0.33
|
|
database
→
ReceivesAction
→
protected by sui generis right
|
0.33
|
|
database
→
ReceivesAction
→
reduced
|
0.33
|
|
database
→
ReceivesAction
→
required at startup time
|
0.33
|
|
database
→
ReceivesAction
→
returned to the state
|
0.33
|
|
database
→
ReceivesAction
→
shrunk
|
0.33
|
|
database
→
ReceivesAction
→
stored within the software
|
0.33
|
|
database
→
ReceivesAction
→
supported by a hard disk drive
|
0.33
|
|
database
→
ReceivesAction
→
supported by floppy diskette
|
0.33
|
|
database
→
ReceivesAction
→
supported by other suitable sys…
|
0.33
|
|
database
→
ReceivesAction
→
supported by raid system
|
0.33
|
|
database
→
ReceivesAction
→
supported by tape drive system
|
0.33
|
|
database
→
ReceivesAction
→
understood
|
0.33
|
|
database
→
ReceivesAction
→
used by anyone
|
0.33
|
|
database
→
ReceivesAction
→
accessed by application
|
0.32
|
|
database
→
ReceivesAction
→
classified in one view
|
0.32
|
|
database
→
ReceivesAction
→
consolidated
|
0.32
|
|
database
→
ReceivesAction
→
designed for consumer health re…
|
0.32
|
|
database
→
ReceivesAction
→
developed by the national libra…
|
0.32
|
|
database
→
ReceivesAction
→
housed in separate units
|
0.32
|
|
database
→
ReceivesAction
→
implemented in software
|
0.32
|
|
database
→
ReceivesAction
→
involved in the link
|
0.32
|
|
database
→
ReceivesAction
→
organized into row
|
0.32
|
|
database
→
ReceivesAction
→
recorded
|
0.32
|
|
database
→
ReceivesAction
→
restored to specific point
|
0.32
|
|
database
→
ReceivesAction
→
searched by state
|
0.32
|
|
database
→
ReceivesAction
→
specified by database_name
|
0.32
|
|
database
→
ReceivesAction
→
specified by name
|
0.32
|
|
database
→
ReceivesAction
→
stored on computer readable sto…
|
0.32
|
|
database
→
ReceivesAction
→
updated with change
|
0.32
|
|
database
→
ReceivesAction
→
used by journalist
|
0.32
|
|
database
→
ReceivesAction
→
based
|
0.30
|
|
database
→
ReceivesAction
→
specified
|
0.29
|
|
database
→
ReceivesAction
→
moved
|
0.29
|
|
database
→
ReceivesAction
→
improved
|
0.29
|
|
database
→
ReceivesAction
→
full of error
|
0.27
|
|
database
→
ReceivesAction
→
ideal for mailing lists
|
0.26
|
|
database
→
ReceivesAction
→
ideal for sales leads
|
0.26
|
|
database
→
ReceivesAction
→
used to attack other websites
|
0.26
|
|
database
→
ReceivesAction
→
integrated into application
|
0.25
|
|
database
→
ReceivesAction
→
maintained through validation
|
0.25
|
|
database
→
ReceivesAction
→
broken
|
0.25
|
|
database
→
ReceivesAction
→
approved for release
|
0.24
|
|
database
→
ReceivesAction
→
duplicated
|
0.24
|
|
database
→
ReceivesAction
→
easy to search
|
0.24
|
|
database
→
ReceivesAction
→
maintained through update
|
0.24
|
|
database
→
ReceivesAction
→
used by scholar
|
0.24
|
|
database
→
ReceivesAction
→
easy to use
|
0.24
|
|
database
→
ReceivesAction
→
difficult to use
|
0.24
|
|
database
→
ReceivesAction
→
ideal for employment opportunit…
|
0.24
|
|
database
→
ReceivesAction
→
ideal for market research
|
0.24
|
|
database
→
ReceivesAction
→
incorporated by default
|
0.24
|
|
database
→
ReceivesAction
→
powered by ebscohost®
|
0.24
|
|
database
→
ReceivesAction
→
filled with movie
|
0.23
|
|
database
→
ReceivesAction
→
filled with music
|
0.23
|
|
database
→
ReceivesAction
→
requested by the login
|
0.23
|
|
database
→
ReceivesAction
→
reproduced
|
0.22
|
|
database
→
ReceivesAction
→
specified by connection
|
0.20
|
|
database
→
ReceivesAction
→
returned
|
0.18
|
|
database
→
ReceivesAction
→
overloaded
|
0.13
|
|