蠕蟲感染 的英文怎麼說

中文拼音 [chónggǎnrǎn]
蠕蟲感染 英文
helminth infection
  • : 動詞(蠕動) wriggle; squirm
  • : 名詞1. (蟲子) insect; worm 2. (姓氏) a surname
  • : Ⅰ動詞1 (覺得) feel; sense 2 (懷有謝意) be grateful; be obliged; appreciate 3 (感動) move; t...
  • : Ⅰ動詞1 (用染料著色)dye 2 (感染) catch [contract] (a disease) 3 (沾染) acquire (a bad hab...
  • 蠕蟲 : worm; helminth蠕蟲感染 invermination; 蠕蟲學 helminthology; scolecology; 蠕蟲藥 wormer
  1. Indications : for the treatment of the hookworm infection, ascariasis. enterbiasis and strongyloides sterocoralis infection etc

    適應癥:適用於蛔、鉤和糞類圓線,對絲病亦有一定療效。
  2. An investigation on intestinal helminth infections among residents of harbin city

    哈爾濱市居民腸道蠕蟲感染現狀調查
  3. Investigation on the current status of infection of human intestinal helminth in huian city

    淮安市人體腸道蠕蟲感染現狀調查
  4. Human demodex is a conditioned parasite with high infestation rate

    目的人體形蟎是形蟎病的病原,人率較高。
  5. The infective investigation to beef cattle ' s worms in northwest area in liao ning

    遼西北地區肉牛蠕蟲感染情況調查
  6. Please refer to the common steps to handle w32. blaster worm in the

    Welchia蠕蟲感染,它也可能會受到w32 . blaster蠕蟲感染。請參照
  7. So far, no reports have been received from government departments on the infection of the worm

    資訊科技署至今未有接獲政府部門受這蠕蟲感染的報告。
  8. The worm scans systems for the presence of the subseven trojan

    會在網路上掃描其他系統,找出一些受subseven木馬程式的系統。
  9. Fig. 5 the proportion of infected machines re - detected

    始檢測到的的計算機中80 %被清除。
  10. The worm appends a random document from the infected pc to itself and send this file via e - mail

    會附設在由受的pc上隨機選取的文件檔案,然後經電郵進行散播。
  11. In the united states, internet and e - mail service providers were blocking the worm in record numbers, while others were getting through to an untold number of unprotected computer users

    美國的網路和郵件服務商正在過慮記錄在案的病毒,然而有些病毒卻躲過阻擋使不計其數的未受保護計算機受到
  12. Sql critical update scans the computer on which it is running for instances of sql server 2000 and msde 2000 that are vulnerable to the slammer worm, and updates the affected files

    Sql關鍵更新掃描運行容易受到slammer程序攻擊的sql server 2000和msde 2000實例的計算機,並更新被的文件。
  13. The worm author can then use this worm extension to start denial of service ( dos ) attacks on irc channels, servers andor users connected to the same irc channel as the infected user

    的創造者能夠利用這附加功能來進行阻斷服務( denialofservice )攻擊irc頻道上在線的機器,伺服器和或其他連接受的使用者相同頻道的使用者。
  14. It is advised to use a win98 winme pc or a patched pc to download the patch software and transfer it via floppy diskette or cd - r to the infected system. this is safer

    最好在一部不受影響的系統(視窗98 、視窗me )或已修補好的系統下載清除程式,再經軟碟及光碟抄錄到受電腦上,這樣較為安全。
  15. Computer worm attack on government intranet servers under control

    政府內聯網伺服器電腦事件已受控制
  16. When the worm arrives by email, it uses both an iframe exploit and a mime exploit, which allow the virus to be executed when you read or even preview the file

    Eml和. mdb檔案可內的電郵地址。會利用iframe和mime的漏洞進行,只要開啟或甚至預覽內文程式便會執行。
  17. All these observed results submit to software module through pci module as an important parameter to judge whether the host infects worm

    這些統計的數據將通過pci模塊上傳給上層軟體作為判斷是否的一個重要指標。
  18. The hardware detecting system can be embedded in network card, monitoring worm real time. also it can be used in firewall with a little improvement

    本檢測系統適合用於嵌入網卡,實時監測;略加改進同樣也適用於硬體防火墻檢測局域網內是否有主機
分享友人