• 浮游植物海洋变暖趋势影响。

    But phytoplankton are vulnerable to the ocean's warming trend.

    youdao

  • 这些植物一些其他霜冻危害

    Some of these plants are more susceptible to frost damage than others.

    《牛津词典》

  • 有一个安全此类系统各式各样黑客攻击

    One is security: such systems will be vulnerable to all sorts of hacker attacks.

    youdao

  • 制度复杂晦涩因而讨价还价的影响。

    They are complex, obscure and therefore susceptible to horse-trading.

    youdao

  • 下面例子可以帮助识别XSS攻击领域

    The following examples are intended to help you recognize the areas that are vulnerable to XSS attack.

    youdao

  • 很多因素会导致人们人们预期偏见影响

    Well there's a whole host of reasons why people are susceptible to this impact bias.

    youdao

  • 但实验室很可能卫生系统忽视地方。

    Laboratories are arguably the most neglected component of health systems.

    youdao

  • 第二她们特定卫生问题死亡风险影响。

    Second, they are susceptible to special health problems and a heightened risk of mortality.

    youdao

  • 希腊籍塞浦路斯经济比较繁荣,内部冲突影响

    The Greek Cypriot economy is prosperous but highly susceptible to external shocks.

    youdao

  • 说明嘴唇易受环境影响嘴唇水分大多来源于嘴里唾液

    What this means is that our lips have little to no protection from the environment, and their main source of moisture is the saliva that comes from our mouths.

    youdao

  • 确切地说,投资者正对中国经济国际压力影响证据做出反应

    More to the point, investors are also responding to evidence that its economy is prone to international pressures.

    youdao

  • 药品方面工作努力进行,基因研究找寻人们易受感染因素

    They're still working hard on drugs, and doing gene studies looking at what factors make people susceptible.

    youdao

  • 洪水疾病影响的地区,人们首先开始迁移,这也许会持续几个月

    It is starting with those living in the areas most susceptible to floods and disease. Their transfer may take months.

    youdao

  • 流感可以通过其他方式致死,例如使患者细菌感染从而引发心脏病

    Flu can kill in other ways, too, from rendering you vulnerable to bacterial infections to triggering heart attacks.

    youdao

  • 攻击知道某一网站应用程序跨站点脚本编制攻击后,他就可以规划攻击

    After an application on a Web site is known to be vulnerable to cross-site scripting, an attacker can formulate an attack.

    youdao

  • 因此感冒症状影响不是免疫系统虚弱一种迹象情况刚好相反

    So susceptibility to cold symptoms is not a sign of a weakened immune system, but quite the opposite.

    youdao

  • 另一个问题移植设备尤其是穿过皮肤的设备会使移植者感染

    Another problem is that implanted devices, particularly those with wires penetrating the skin, leave the recipient prone to infection.

    youdao

  • 因为阑尾变小感染易受感染基因从人类基因种群中剔除出来。

    Because smaller ones are more likely to become infected. And keep your genes out of the pool.

    youdao

  • 大部分害者由于恶劣居住条件药品缺乏营养不良环境的影响。

    Most of the victims are poor people who are already vulnerable because of bad living conditions, lack of access to medicine, and malnutrition.

    youdao

  • 患者大部分都是儿童免疫力化疗影响减弱,进而导致伤口感染

    The patients were often children whose immune systems had been weakened by chemotherapy, which left their wounds from surgery vulnerable to infection.

    youdao

  • Google出现以来,高质量信息从未如此重商主义力量影响。

    Since the emergence of Google, quality information has never been so vulnerable to the power of commercialism.

    youdao

  • 而是潮湿且细菌容接触器官表面例如肺和感染内脏就很易受感染

    It is the damp and welcoming surface of places such as the lung and the gut that are at risk.

    youdao

  • 如果成了成了领军者,诚然是好事使处在一个易受抨击的地位

    If you're the leader, that's great, but you're also in a somewhat vulnerable position.

    youdao

  • 新的研究暗示血液中的铅含量可以用来解释为什么50多女性易受高血压攻击

    New research suggests that lead in the bloodstream might help explain the onset of high blood pressure in women in their 50s.

    youdao

  • 舒服相当大的程度上来自于这样一种感觉就是个人变得更加不可控的影响。

    The malaise stems in considerable part from a feeling that individuals have become more vulnerable to forces beyond their control.

    youdao

  • 然后收集到的信息可以用来分配资源识别那些可能恶意用户程序攻击机器

    The information harvested can then be used to allocate resources and identify machines that may be vulnerable to attack by rogue users and programs.

    youdao

  • 然后收集到的信息可以用来分配资源识别那些可能恶意用户程序攻击机器

    The information harvested can then be used to allocate resources and identify machines that may be vulnerable to attack by rogue users and programs.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定