We must __________ the protection in technology, law, and other aspects
A. stong
B. strength
C. strengthen
查看答案
Mobile payment often needs to be bound ________ the user's bank card
A. by
B. with
C. in
This may __________ the security of the user's property.
A. endanger
B. dangerous
C. danger
Its basic principle is to compare the information _____ the data stored in the cloud
A. to
B. between
C. with
If the information is ________, a series of severe results may occur.
A. leaking
B. leaked
C. leak