• Since then attacks have been running at the rate of more than one a day.

    那时起,海盗袭击行动远远超过天一次。

    youdao

  • Puts enemies to sleep, then attacks. Spits fluid which removes an enemy's.

    先催眠敌人然后再进行攻击。腐蚀会缓慢地将睡眠敌人力量瓦解

    youdao

  • The Prince then attacks, driving the water sword into the Dahaka's skull, causing it to lose its grip and fall into the sea below.

    王子然后上前攻击用水之刃砍达的头颅使抓不住边缘入了下面的海里

    youdao

  • During summers, when you spend long hours wearing shoes, then the dark humid condition that prevails inside the shoes promote growth of fungus which then attacks the feet and toenails.

    炎炎夏日,如果时间穿着那么那种又黑又潮环境就会刺激真菌增长进而损害脚部脚趾甲健康。

    youdao

  • And when somebody else then attacks them, say, "Look, I think that what John was saying was a good point and here's how I think he should have defended his position," or what have you.

    并且其他人攻击他们时,听着觉得约翰是个点子认为应该怎样维护自己立场“,或者什么。”

    youdao

  • The pirates' methods remain rudimentary. They use hijacked tuna-fishing boats or local dhows as the mother ship, then launch attacks from skiffs, usually at dawn or dusk.

    海盗们的战略还停留在初级他们使用捕鱼或者帆船作为其母然后通常拂晓或傍晚时乘坐快艇实施登船袭击

    youdao

  • If you've fuzzed your program for 24 hours and it's still standing, then it's unlikely that further attacks of the same sort will compromise it.

    如果24小时程序进行模糊测试依然无事,那么随后同种类型攻击不大可能危及到它。

    youdao

  • Cross-site scripting attacks allow hackers to embed a malicious script on your visitor's browser and then execute the script in order to gather data.

    跨站点脚本攻击使黑客能够恶意脚本嵌入访问者浏览器中然后执行脚本收集数据

    youdao

  • Since then, he issued some 30 messages, in audio, video or electronic text, sometimes taunting, sometimes gloating, sometimes urging new terrorist attacks.

    那时起发出了大约30条消息广播电视网络上,有时嘲笑美军,有时沾沾自喜,有时要求发起新的恐怖袭击

    youdao

  • Danger then declines as the moon gets brighter each evening, with very few attacks in the nights just before the full moon.

    月亮每晚危险与日俱降,满月夜晚很少攻击

    youdao

  • "If they want to participate, it's very easy for them to download a tool that hands over your computer to Anonymous" - and which then allows them to take part in DDoS attacks.

    如果他们加入非常容易下载黑客软件工具,并把自己电脑加入Anonymous”——然后运行,加入到集体ddos攻击来。

    youdao

  • Since then, a new sense of crisis has enveloped the Iraqi capital. The overall number of attacks has decreased in the past year, but spectacular assaults are on the rise.

    那以后新的危机感包围Iraqi首都过去一年里袭击总数有所下降但是惨烈的猛袭上升。

    youdao

  • We've even had cases of attacks being staged, things being thrown at teachers, so their reaction can be filmed and then posted on Facebook or YouTube.

    凯特说:“我们有些老师甚至受到袭击。 有些学生向教师投掷东西他们反抗行为拍成短片传到FacebookYoutube。”

    youdao

  • "More than 70% of recorded great white attacks on humans result in just the shark biting and then leaving," she said.

    “大白袭击人类记录中,有超过70%的结果是大白鲨咬了人,然后就离开,”

    youdao

  • Personal attacks make people feel defensive, and then they won't really listen to anything you have to say.

    个人攻击使人们会使人自我防御,然后他们不会进去说的任何话

    youdao

  • I'll first describe a couple of scenarios involving internal attacks (that is, attacks that originate within an organization), and then take a look at a couple of scenarios involving external attacks.

    首先描述涉及内部攻击方案(,在组织内部发起的攻击),然后研究涉及外部攻击的两种方案。

    youdao

  • Since then it has launched numerous small-scale attacks against Yemeni security forces and has struck in Saudi Arabia too.

    那时起,他们向也门安全力量发起了无数次小型袭击,他们袭击过沙特阿拉伯。

    youdao

  • Israel could conclude it has dealt a heavy enough blow to Hamas to unilaterally announce an end to attacks and then respond only if missile fire continues.

    以色列可能断定已经了哈马斯足够的教训,从而单方面宣布停火,只是当火箭弹袭击继续的时候会做出反应。

    youdao

  • The Pope then offered a brief prayer for peace and healing for survivors and the families of victims of the attacks in New York, Washington and Pennsylvania.

    接着,教皇作了一个简短祷告,乞求上天让发生纽约、华盛顿宾州的恐怖袭击幸存者受难者家属获得平安,让他们的创伤得到愈合。

    youdao

  • If it can be shown that targeting Gaddafi is the only way of stopping a particular attack or attacks then it is clear that the such an act is necessary.

    如果消灭卡扎菲阻止袭击唯一手段那么显然这种斩首行动必要的。

    youdao

  • They may also be exceptionally concerned about remote attacks that might compromise one application, and then be used to compromise other applications.

    它们可能十分关注远程工具,此类远程工具可能破坏一个应用程序后,然后利用其破坏其他应用程序。

    youdao

  • Attacks far out at sea have been made possible by the hijacking of merchant vessels that are then used as "mother ships".

    海盗劫持商船并将用作船”使得外海攻击成为可能。

    youdao

  • Then, one steaming August night between mortar attacks, the chaplain asked for a volunteer to drive him to the helicopter pad the following weekend.

    后来,就在八月份挥汗如雨夜晚,就在迫击炮声停下来的空隙,那个犹太牧师提出要在下个周末去巴比伦,名志愿者驾车送直升机场。

    youdao

  • Then, choose target system vulnerability, all kinds of attacks by means of breakthrough, obtain found super user permissions, improve user permissions.

    然后选择作为攻击目标利用系统漏洞各种攻击手段发现突破口获取超级用户权限提升用户权限。

    youdao

  • It worked. When they caused heart attacks in the rats and then injected the new heart muscle cells, every graft survived and integrated into the hearts of the rats.

    发挥作用了他们引发心脏病然后注射新的心肌细胞每个移植物都存活了然后完整进入大鼠心脏

    youdao

  • It worked. When they caused heart attacks in the rats and then injected the new heart muscle cells, every graft survived and integrated into the hearts of the rats.

    发挥作用了他们引发心脏病然后注射新的心肌细胞每个移植物都存活了然后完整进入大鼠心脏

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定