• impersonation

    impersonation 基本解释

    • n. 扮演;模仿;装扮

    impersonation 词态变化

    动词: impersonate;

    impersonation 英文词源

    impersonation (n.)
    1800, "personification;" 1825 as "an acting of a part or character;" noun of action from impersonate (v.).

    impersonation 英文释义

    1. a representation of a person that is exaggerated for comic effect
    2. pretending to be another person
    3. imitating the mannerisms of another person

    impersonation 双语例句

    1. In her habits, she was a living impersonation of order, method, and exactness.
    她的生活习惯活生生地体现了井井有条, 按部就班和精密细致等准则.

    来自辞典例句

    2. In fact, any low quality paper to change image noise for impersonation.
    事实上, 任何矮质度的纸张都可以堵住保持图像噪声举行模仿.

    来自互联网

    3. The latter approach provides better performance because it avoids impersonation altogether.
    后一种方法提供的性能更佳,因为它完全避免了模拟.

    来自互联网

    4. Gets impersonation level of the user described by this identity.
    获取由该标识描述的身份验证服务.

    来自互联网

    5. Client Impersonation is only available for Extended Stored Procedures.
    客户端模拟仅可用于扩展的存储过程.

    来自互联网

    impersonation 实用场景例句

    In fact, any low quality paper to change image noise for impersonation.
    事实上, 任何矮质度的纸张都可以堵住保持图像噪声举行模仿.

    互联网

    The latter approach provides better performance because it avoids impersonation altogether.
    后一种方法提供的性能更佳,因为它完全避免了模拟.

    互联网

    Gets impersonation level of the user described by this identity.
    获取由该标识描述的身份验证服务.

    互联网

    Client Impersonation is only available for Extended Stored Procedures.
    客户端模拟仅可用于扩展的存储过程.

    互联网

    This is the recommended impersonation level for WMI calls.
    这是为WMI调用推荐的模拟级别.

    互联网

    Remove impersonation parameters and use current user context instead.
    删除模拟参数并使用当前用户上下文.

    互联网

    In fact, any low - quality paper to change image noise impersonation.
    事实上, 任何矮质度的纸弛都可以堵住保持图像噪声举行模仿.

    互联网

    When should I use programmatic impersonation?
    何时需要使用可编程的模拟?

    互联网

    Rule 5 - Jagex Staff Impersonation.
    规定5-Jagex职员模仿.

    互联网

    How do I use programmatic impersonation?
    如何使用可编程的模拟?

    互联网

    SAKA protocol does not achieve key - compromise impersonation.
    SAKA协议不具有密钥泄露安全性.

    互联网

    I do an impersonation.
    做模仿表演.

    互联网

    Researches show that the protocol can not resist the key compromise impersonation attack.
    研究结果发现,该协议不能抵抗密钥泄露伪装攻击.

    互联网

    Either a required impersonation level was not provided, or the provided impersonation level is invalid.
    指定的模拟级别无效, 或所提供的模拟级别无效.

    互联网

    Game brief introduction: The pirate of impersonation fearlessness, the detection enchant of the treasure hide!
    游戏简介: 扮演无畏的海盗, 发现迷失的宝藏!

    互联网

版权所有©52查   网站地图