竊取行為 的英文怎麼說

中文拼音 [qièhángwéi]
竊取行為 英文
taking and carring away
  • : Ⅰ動詞(偷) steal; pilfer Ⅱ副詞(暗中; 偷偷 地) secretly; surreptitiously; furtively Ⅲ代詞[書面語] (謙指自已) i
  • : Ⅰ動詞1 (拿到身邊) take; get; fetch 2 (得到; 招致) aim at; seek 3 (採取; 選取) adopt; assume...
  • : 行Ⅰ名詞1 (行列) line; row 2 (排行) seniority among brothers and sisters:你行幾? 我行三。where...
  • 竊取 : usurp; steal; grab
  • 行為 : action; behaviour; conduct; deed
  1. It is ( a ) sacrilege to steal a crucifix from an altar

    從聖壇耶穌受難像是褻瀆神靈的
  2. Answer : point to it is a purpose with detinue, take state - private property amount secretly bigger, or for many times secret filch is state - private the behavior of property

    答:指以非法佔有目的,秘密公私財物數額較大,或者多次秘密公私財物的
  3. The act of stealing iou and its nature determination

    借條之定性
  4. Among all the techniques and methods protecting data, it is the most practicable to encrypt data and store encrypted data, because even if encrypted data are filched, copied, or peculated, attackers are incapable of understanding these data in that they are incapable of decrypting these data

    在目前的技術條件下,保護數據和信息最之有效的方法就是將它們加密后再存儲在數據庫中,因加了密的數據和信息,即使被、被拷貝、被截獲,獲者因無法破解的密文而無從知曉它們對應的機密數據。
  5. In this study, authors report three hundred and forty _ seven species of coleoptera insects which damage the agriculture and forestry in the northeast area of china. the insects which belong to thirty _ nine families have been given a detailed description of the specific distribution and feeding character in order to provide a scientific evidence for many workers of the agriculture and forestry and plant _ protector. in this paper, twenty _ three families are discussed that is cicindelidae, carabidae, hydrophilidae, staphylinidae, dytiscidae, elateridae, silphidae, histeridae, corynetidae, buprestidae, ostomatidae, nitidulidae, cybocephalidae, catogenidae, sivanidae, mycetophagidae, lathridiidae, ptinidae, bostrychidae, anobiidae, lyctidae, tenebrionidae, meloidae, totally eighty _ seven species

    本研究作者報道了東北地區危害農業、林業的鞘翅目昆蟲347種,它們隸屬於39科,作者對這些種類的分佈及其食特徵進了詳細的描述,以期廣大農業、林業及植物保護工作者提供科學依據.本文論述了23科,即虎甲科、步甲科、牙甲秒、隱翅蟲科、龍虱科、叩頭蟲科、葬甲科、閻甲科、陷附郭公蟲科、吉丁蟲科、谷盜科、露尾甲科、方頭甲科、扁甲科、鋸谷盜科、小覃甲科、薪甲科、蛛甲科、長蠹科、蠹科、粉蠹科、擬步甲科、芫菁科共87種。
  6. The attitudes offered in the article include : recognize respectively the behaviors of counterfeiting and credit card, cheating and usage of credit card on different occasions ; set an individual crime of malicious overdraft of credit card ; add unit criminal subject of guilty of credit card cheating ; recognize the behavior of stealing and usage credit card as guilty of credit card cheating

    本文的主要觀點:對偽造信用卡並使用的、騙信用卡並使用的應根據不同情況分別認定;惡意透支型信用卡犯罪應獨立成罪;增設信用卡詐騙罪的單位犯罪主體;盜信用卡並使用的應認定信用卡詐騙罪。
  7. Neither the bank, its associates, nor any of their directors, officers or employees, shall be liable to the customer for any expenses, loss or damage suffered by or occasioned to the customer by reason of any action taken or omitted to be taken by any one or all of the bank, its associates, their directors, officers, employees or agents pursuant to these conditions or in connection therewith other than as a result of the fraud, wilful default or negligence of the bank, its associates, their directors, officers, employees or agents ; the bank s failure in good faith to honour any stop - payment instructions given by the customer ; the presentation to the bank of any cheque or other payment order which is post - dated ; the bank failing to honour any draft drawn on it by the customer, but the bank shall immediately return such draft to the customer through the normal channels giving the reason for the dishonour ; any loss, damage, destruction or misdelivery of or to the securities howsoever caused unless the same shall result from the negligence of, or theft by, the bank or its associates or any of their directors, officers or employees, in which event the extent of the liability of the bank shall be limited to the market value of such securities at the date of discovery of the loss and even if the bank has been advised of the possibility of such loss or damage ; unauthorised use or forging of any authorised signature as a result of the negligence, wilful default or fraud of the customer ; subject to condition 5. 5, any act or omission, or insolvency of, any person not associated with the bank including, without limitation, a third party nominee or depositary ; viii the collection or deposit or crediting to the custodian accounts of invalid, fraudulent or forged securities or any entry in the custodian accounts which may be made in connection therewith ; any malfunction of, or error in the transmission of information caused by, any electrical or mechanical machine or system or any interception of communication facilities, abnormal operating conditions, labour difficulties, acts of god, or any similar or dissimilar causes beyond the reasonable control of the bank and notwithstanding paragraph, the error, failure, negligence, act or omission of any other person, system, institution or payment infrastructure

    其聯系人士其各董事高級人員或雇員均毋須向客戶因以下理由而使客戶蒙受或產生之任何開支損失或虧損負責: i本其聯系人士其董事高級人員雇員或代理人根據此等條件採或遺漏採有關之動,但由於本其聯系人士其董事高級人員雇員或代理人之欺詐故意失責或疏忽所造成者除外ii本本真誠地未能依約替客戶執止付指示iii向本提交任何遠期支票或其他付款指示iv本未能兌現由客戶開出之匯票,但本將立即透過正常渠道將該匯票退回客戶,並解釋拒付之理由v無論如何導致之任何證券之損失損毀毀壞或錯誤交付除非上述各項乃因本或其聯系人士或其任何董事高級人員或雇員之疏忽或盜所引致,而在該等情況下,本的責任將只限於在發現損失當日該等證券之市值,以及即使本已獲知該等賠償之可能性vi因客戶之疏忽故意失責或欺詐而導致的任何偽造授權簽名或不獲授權使用該簽名vii在第5 . 5 a條之規限下,與本無關者之任何動或遺漏或無償債能力包括但不限於第三者代名人或寄存處viii代收或存入或貸存於保管人賬戶的無效偽造或假冒證券或在保管人賬戶記入可能與此有關之賬項ix任何電子機械或系統失靈或因該等機件或系統產生的資料傳送錯誤或任何通訊設施之終斷不正常操作情況勞工問題天災或非本所能合理控制之任何類似或非類似原因及x盡管有第ix項,任何其他人系統機構或付款設施的錯誤故障疏忽動或遺漏。
  8. A patent pending keylogger guard tool, which uses behavioral detection as opposed to signature - dependent methods to detect and block keylogger activities on your computer

    未決偵測專利的密碼防護工具,通過與依賴于特徵碼的偵測方式相反的偵測來判斷並阻止計算機上的密碼活動。
  9. Using our new behavioral detection spyware doctor can prevent these keyloggers from recording keystrokes and causing damage much sooner than keylogger blockers based on signature - dependent methods

    較之於傳統基於特徵碼偵測方碼密反的式工具,使用了最新偵測技術的s . d將能夠阻的松輕常非止密碼器記錄鍵盤敲擊定位以的成造此由及損失
  10. The monthly salary of an average cmb worker was around 1, 000 in the early 1980s. icac investigations revealed, however, that the looting was so unfettered that a worker could steal up to 500 worth of coins each day

    當年一名中巴工人的月薪大約千餘元,但調查所得,盜無日無之,工人每天偷硬幣一般達五百元,若以每月上班二十六日算,一個月偷得一萬三千元。
  11. Mobile virus writers also rely on social engineering by labeling malware as anti - virus updates, games, or popular utilities, or by pillaging address books to make infected files appear to come from an acquaintance

    移動病毒編寫者還依賴社會工程學伎倆:把惡意軟體標防病毒更新程序、游戲或者是流的實用程序;或者地址簿,讓受感染的文件冒充來自熟人。
  12. To help protect the data transferred between clients and servers from eavesdroppers, you should encrypt it by using digital certificate technology

    了幫助保護客戶端和服務器之間傳輸的數據免於被聽者,您應該使用數字證書技術對數據進加密。
  13. The fifth part is the law consummation of the crime. the part ponders the perfection of the judical interpretation. the writer explains his point finally. in order to consummate the stipulation of the crime of stealing spying buying illegally providing state secret and information for those out of borders, it is necessary to reinforce the outer harmonization of the criminal law

    通過著重論證完善境外、刺探、收買、非法提供國家秘密、情報罪的司法解釋,就其立法完善發表了看法,指出境外、刺探、收買、非法提供國家秘密、情報罪的完善是一項配套工程,需加強刑法的外部協調,即加強相關法規的完善,具體而言就是完善相應的政制裁和民事制裁。
  14. The purpose of the demonstration is to promote the adoption of modern security practices and technologies at civilian nuclear facilities by demonstrating established physical protection, nuclear material control and accounting, and international safeguards technologies that provide a first line of defense against nuclear material theft, diversion and sabotage

    據美國能源部發布的新聞簡報,博覽會將舉辦培訓講座。進現場示範和操作,以推動民用核設施採現代安全手段及技術,最終目的是防範盜、轉移或破壞核材料的
  15. Effective protection requires criminal penalties for stolen intellectual property theft and fines large enough to be a deterrent rather than a business expense

    要做到有效的保護,就需要對知識產權的給予刑事處罰,並且使罰款額具有遏制力,而不是僅相當于商務開銷。
  16. Money does not exist on advanced planets, there are no stock markets, currency, banks, financial systems, because this system steals from people their energy, which is uselessly used ( state institutions, army, advertising, stocks, shops, banks etc. )

    在高等星上錢不存在,沒有證券市場,通貨,銀,財務系統,因這系統從人們那裡他們的能量,是無益地耗費(國家的制度,軍隊,廣告業,商店,銀等等。 )
  17. This devices " debugging results in lab and the production applied on - site by neijiang electric power bureau indicate that they can work as we desired and satisfied the design requirements

    裝置通過實驗檢測,證實能夠有效發現各種,達到了預期效果。該類產品通過在內江電力局掛網運得良好效果,得到用戶高度評價。
  18. This disclaimer of liability applies to any damages or injury caused by any failure of performance, error, omission, interruption, deletion, defect, delay in operation or transmission, computer virus, communication line failure, theft or destruction or unauthorised access to, alteration of, or use of record, whether for breach of contract, tortuous behaviour, negligence, or under any other cause of action

    6 . 3不論就違約民事侵權疏忽或任何其他訴訟因由而言,本免責聲明均適用於由任何未能履責錯誤遺漏中斷事故刪除缺陷運作或傳送延誤電腦病毒通訊線路故障記錄被毀壞或未經授權被存更改或使用所造成的任何損壞或傷害。
  19. Although e - commerce gives us much convenience, it brings us troublesome problems which traditional commerce has not. inauthoritative entity can expose, modify message transfered by internet. the entity in e - commerce can repudiate his commercial behavior

    它在給人們的生產生活帶來便利的同時,也帶來了傳統的貿易沒有的問題,網路中傳輸的信息可能被,修改,交易方可能會否認自己的
  20. According to a survey produced by us - based research and advisory company in august 2006, even in the us, nearly half of online adults said that concerns about theft of information, data breaches or internet - based attacks affected their purchasing payment, online transaction or e - mail behaviour

    根據美國的研究咨詢公司2006年8月的一項調查,即便在美國將近一半的成人網路用戶擔心信息失,數據,網路攻擊,這影響他們購買支付,網上交易和電子通信
分享友人