盜用 的英文怎麼說

中文拼音 [dàoyòng]
盜用 英文
embezzle; usurp
  • : Ⅰ動詞1. (偷竊; 劫掠) steal; rob 2. (用不正當的手段營私或謀取) usurp Ⅱ名詞(強盜) thief; robber
  • : Ⅰ動詞1 (使用) use; employ; apply 2 (多用於否定: 需要) need 3 (敬辭: 吃; 喝) eat; drink Ⅱ名...
  1. In criminal law appropriation or taking for oneself what one is not entitled to do is criminal.

    在刑法中盜用或將其無權享有的東西佔為己有是犯罪行為。
  2. The cashier embezzled 50 thousand dollars.

    出納員盜用了銀行5萬美元。
  3. The cashier embezzled 50, 000 dollars from the bank and ran away.

    銀行的出納盜用了五萬美元,並且逃逸。
  4. They estimate the cashier ' s defalcation as $ 600, 000

    他們估計收銀員盜用公款六十萬元。
  5. The defalcation of the treasurerer of the company aroused a tremendous commotion

    這間公司的出納員盜用公款,引起極大的騷動。
  6. He remembered instances in which defaulters had been captured

    他想起一些盜用公款的罪犯被捉拿歸案的例子。
  7. The cashier embezzled 50 thousand dollars

    出納員盜用了銀行5 萬美元。
  8. She insinuate to us that her partner have embezzle fund

    她旁敲側擊地指出她的合伙人盜用了資金。
  9. Install a personal " fire wall " software and be careful while accepting file transfer from unknown senders via email, icq or netmeeting

    安裝個人防火墻( firewall )軟體,以避免因透過電郵、 icq及netmeeting接收或開啟不明來歷的檔案而導緻密碼被盜用
  10. A swindler uses guile ; a robber uses force

    騙子詐術;強盜用武力。
  11. An overview of identity theft - governance and research trend

    身份盜用的發展及其治理和研究趨勢
  12. So how does identity theft happen

    那麼,身分盜用是如何發生的?
  13. So how can people protect themselves from identity theft

    那麼,大家該怎麼保護自己免於身分遭盜用呢?
  14. Early identification of identity theft and possible credit fraud

    及早發現身份被盜用及潛在信貸舞弊。
  15. Lustful for personal wealth, the accountant embezzled the company funds

    由於貪欲個人財富,這個會計師盜用了公司的資金。
  16. The treasurer misappropriated the society ' s funds

    那會計盜用了協會的基金
  17. Because the property right of your house has been misappropriated

    您的房屋產權已被他人盜用
  18. B : because the property right of your house has been misappropriated

    您的房屋產權已被他人盜用
  19. Those data, which are stored in plain text and are even protected by passwords and firewalls and intrusion detection systems, are easily filched, peculated and destroyed

    以明文形式存放的數據,即使置於口令、防火墻和入侵檢測系統的保護之下,也很容易被竊取、盜用和破壞。
  20. Using a registered trade mark without its owner ' s permission is a serious infringement of the owner ' s proprietary right

    盜用他人注冊商標是一項嚴重的侵犯權利行為
分享友人