• The river poured its waters through the breach.

    河水缺口倾泻而出

    youdao

  • All its long-suppressed elements of unrepeatability, uniqueness, and incalculability, all its long-denied mysteries, come rushing through the breach.

    所有长时间遭到压抑因素,那些不可重复的独一无二的、非日历化的事件,所有长时间遭到否定的神秘性,迅速冲决出来

    youdao

  • They escaped through a breach in the wire fence.

    他们从铁丝网上一个缺口逃走了

    《牛津词典》

  • Cookie poisoning is a technique known mainly for achieving impersonation and breach of privacy through manipulation of session cookies that maintain the identity of the client (or end user).

    cookie篡改(cookiepoisoning)一项主要以获取模拟隐私权泄密著称技术通过维护客户(终端用户)身份会话信息操纵实现的。

    youdao

  • There is no short-term solution, if that is the expectation on the US to fill the breach, ” Rizzo said yesterday. Supplies may remain tight through the rest of the 2010-2011 season, he said.

    昨天如果希望寄托美国填补一(供应缺口的话,短期内没有解决方案”,供应紧张局面将延续2010-2011季度

    youdao

  • The camera follows her as she tumbles out, and when we pass through the hull breach into space there is sudden silence.

    镜头紧跟着翻转中的船员船体的破洞进入了太空,此刻四周瞬间一片死寂。

    youdao

  • Goldman discovered the alleged breach through monitoring systems that scan employees' email messages for transfers of computer code and flag up any attempts to upload files to external servers.

    高盛通过内部监测系统发现这起违规事件,该系统会扫描员工的电子邮件发现是否转移公司计算机代码任何文件上传到外部服务器的行为发出警报。

    youdao

  • If any loss occurs through breach of this condition, the insurer may avoid the contract.

    对因违反此项条件产生任何损失保险人可以解除合同。

    youdao

  • The contemporary western architectural trend of thought brings the new break-through for the architecture through comprehensive study to breach the doctrine and standard of modernism.

    当代西方建筑思潮为了冲破现代主义教条规范通过融贯的综合研究建筑领域带来突破

    youdao

  • Breach of contract when the relative side did lead to non-pecuniary damages, the liability can be based on competing theories get relief through the infringement complaint.

    违约行为确实导致合同相对方的非财产性损害时,可以依据责任竞合理论通过侵权之诉得到救济

    youdao

  • These accounts have not been accessed through any security breach at Google, but most likely via phishing scams or malware placed on the users computers.

    入侵者并非通过Google安全漏洞进行攻击,有可能是通过用户的电脑内植入钓鱼网页或是恶意软件来达到目的。

    youdao

  • Through the history and comparative analysis, explore the trends of fundamental breach of contract theory and system.

    通过根本违约发生考察比较分析探寻根本违约理论及制度的发展趋势。

    youdao

  • Through the history and comparative analysis, explore the trends of fundamental breach of contract theory and system.

    通过根本违约发生考察比较分析探寻根本违约理论及制度的发展趋势。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定