• The attacker was beaten off.

    进攻者击退了。

    《牛津词典》

  • We had only a vague description of the attacker.

    我们只有那个袭击者粗略描述

    《牛津词典》

  • The police have so far failed to track down the attacker.

    警方至今未能追捕到攻击者。

    《牛津词典》

  • The attacker may have been waiting around for an opportunity to strike.

    袭击者可能一直等待一个下手的机会

    《柯林斯英汉双解大词典》

  • Loud voice can usually make the attacker calm down.

    响亮声音通常可以攻击者冷静下来

    youdao

  • She gave an exact description of the attacker.

    对袭击者特征作精确描述

    《牛津词典》

  • Her loud scream scared the attacker and people came to help.

    尖叫声袭击者了一跳,人们赶来帮忙。

    youdao

  • Let the attacker know you're ready.

    攻击者知道有所准备

    youdao

  • What's the identity of the attacker?

    初步判断袭击者身份是什么

    youdao

  • If the attacker can, there's a problem.

    如果可以,就存在问题了。

    youdao

  • The one under attack is now the attacker.

    袭击者现在变成袭击者。

    youdao

  • Now the attacker.

    现在看看攻击

    youdao

  • The woman fought off the attacker with her pen.

    袭击妇女自己的钢笔反击才得以挣脱。

    youdao

  • He said the attacker was not seriously wounded.

    袭击者伤势重。

    youdao

  • This is the attacker has never been a place to meet.

    攻击者从来没有达到的地方

    youdao

  • Worst of all, the identity of the attacker may remain a mystery.

    最糟糕攻击者身份一个

    youdao

  • Process user input data and make it available to the attacker.

    处理用户输入数据攻击获取。

    youdao

  • The attacker then asks for the password to be reset to a specific value.

    攻击者接下来密码重新设置特定的值。

    youdao

  • She told how the attacker drew a knife and held it up to her throat.

    讲了袭击者是如何拔出刀子抵住喉咙的。

    youdao

  • We assume that the attacker has access to certain platform MSR registers.

    我们假设攻击者已经平台可对MSR寄存器进行读写。

    youdao

  • If the attacker has the application display a set of HTML, trouble may creep in.

    如果攻击者通过应用程序显示HTML可能就会带来麻烦

    youdao

  • The attacker discovered on the Internet that the worker had four children.

    攻击者通过互联网发现位员工四个孩子。

    youdao

  • The attacker would then provide a "bin" program that the program could find.

    这样攻击者可以提供一个程序可以找到bin”程序。

    youdao

  • When the attacker tried to drive the bus away, the driver disabled the vehicle.

    袭击者企图开车逃跑时司机让大巴无法启动

    youdao

  • That means the attacker can set up the entire attack in essentially one operation!

    意味着攻击本质上能够一个操作完成整个攻击

    youdao

  • The first scenario looks at a situation in which a disgruntled employee is the attacker.

    第一种方案研究的攻击者心怀不满雇员情况

    youdao

  • That will let the attacker control internal data and possibly take over the program.

    这样可以攻击者控制内部数据甚至控制整个程序

    youdao

  • However, the attacker may also take over the account by changing the E-mail address.

    然而攻击者可以通过修改email地址接管帐户

    youdao

  • Hopefully, a victim will report the card as missing before the attacker gets that far.

    希望受害者攻击者得手之前报告信用卡丢失

    youdao

  • Thus, for the control of the operating system of the attacker, there is no protection.

    因而对于控制操作系统攻击者来说,并没有防护能力

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定