• 一个受攻击页面曾经被部署

    A vulnerable page is ever deployed.

    youdao

  • 割裂流血效果攻击强度加成。

    The bleed effect of "Lacerate" now increases in potency with greater attack power.

    youdao

  • 网站受攻击或者机时如何快速恢复

    How to recover the website rapidly when it is attacked or crash?

    youdao

  • 他们做好准备以防攻击

    They provided against the attack.

    youdao

  • 格丽转移了目标不再攻击

    Gretchen had switched targets and he no longer was under attack.

    youdao

  • 要塞攻击期间损坏,因此需要进行修补。

    Fortresses can take damage during attacks and will need to be repaired.

    youdao

  • 塞拉利昂之后的是尼日尔,它的攻击率为1/442。

    After Sierra Leone, Niger fared well with one in every 442 surfers likely to be attacked while online.

    youdao

  • 计算机连接网络上时,有了受攻击的可能性。

    When connecting your computer to a network, it becomes vulnerable to attack.

    youdao

  • 国内服务器网站安全威胁日益升级攻击次数连年跃升

    Domestic server, website security threats escalating, the number of attacks in recent years jumped.

    youdao

  • 尸体爆炸(第3层)现在造成暗影伤害并且不再攻击强度影响。

    Corpse Explosion (Tier 3) now does shadow damage, and is no longer modified by attack power.

    youdao

  • 普通混凝土可以用于一些区域攻击支配强的

    Ordinary concrete can be used in some areas, but it is subject to attack by strong acids and alkalis .

    youdao

  • 可用性系统持续工作即使攻击的时候也是如此(“工作持续性”)。

    Availability: the system will keep working even when being attacked (" works continuously ").

    youdao

  • 计算机网络受攻击前后安全特性变化角度提出了网络概念

    The paper put forward the concept of network entropy from the point of view of the security characteristic change of computer network after it was attacked.

    youdao

  • 赛珍珠1931年的小说《大地农村家庭描写,因坦率广攻击

    Buck's account of a farming family in "The Good Earth" was widely attacked for its frankness when it came out in 1931.

    youdao

  • 如果系统服务不可用,合法用户无法使用攻击系统上网络服务(2)。

    Once the system or service has been made unavailable, legitimate clients are blocked from using the network service hosted by the system under attack (See Figure 2).

    youdao

  • 它们直接攻击组织这样的话人体必须再生以便替换受攻击的组织。

    They can directly attack live tissue, which the body must then strain to replace.

    youdao

  • 准则强调攻击目标功能损伤而不是受攻击目标物理杀伤

    The criterion is laid special stress on functional damage of the attacked targets, not the physical killing of the attacked targets.

    youdao

  • 分析这些方案共性受攻击原理,最后给出一个安全的签名方案

    Then, commonness of these schemes is analysed, an improved coalition resistant group signature scheme is put forward.

    youdao

  • 这个方案针对网格水印两个难点网格频率分解受攻击网格的拓扑恢复

    The algorithm focuses on the two challenges of mesh watermarking, i. e. , frequency decomposition of meshes and topology reconstruction of attacked meshes.

    youdao

  • 莫斯科电视撤军做了广泛报导,一则苏联电视报导车队攻击但是并未提供细节

    Moscow television carried extensive coverage of the pullout. A Soviet television correspondence said the convoy had come under fire but did not provide details.

    youdao

  • 尽管印度女性攻击更加频繁,但一些外国游客逐渐成为攻击对象,并引发了广泛的国际关注

    Several foreign tourists also have been targeted in attacks that often get international attention, although Indian women are assaulted far more frequently.

    youdao

  • 大脑神经无可替代,植物无法移动,也受攻击部分吃掉毁坏后它们活下去

    Brains and neurons are irreplaceable, but plants are immobile and often attacked, so they must be able to survive after part of them is eaten or destroyed.

    youdao

  • 我们网站受攻击,刚刚又再次出问题导致无法登陆,另外大会会务繁重,我们代祷

    Our website has been frequently attacked and it collapsed again yesterday . Also, there's still much to be done before the conference so please pray for us.

    youdao

  • 成功的攻击允许攻击受攻击应用程序执行任意代码。同时,失败攻击导致拒绝服务。

    Successful exploits will allow an attacker to run arbitrary code in the context of the user running the application. Failed attacks may cause denial-of-service conditions.

    youdao

  • 你使用引导法术时,两次攻击都会减少你法术持续时间25%,之后攻击不再影响

    When channeling a spell: The first and second hit reduces current duration by 25% of total duration each. All hits after the second will have no effect.

    youdao

  • 外壳型入侵型病毒通常攻击可执行文件,即带有或扩展名的文件。当然数据文件受攻击危险

    Shell and intrusive viruses most commonly attack executable program flies-those with a. com or. exe extension, although data flies are also at some risk.

    youdao

  • 外壳型入侵型病毒通常攻击可执行文件,即带有或扩展名的文件。当然数据文件受攻击危险

    Shell and intrusive viruses most commonly attack executable program flies-those with a. com or. exe extension, although data flies are also at some risk.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定