非法侵入 的英文怎麼說
中文拼音 [fēifǎqīnrù]
非法侵入
英文
forcible entry- 非 : Ⅰ名詞1 (錯誤) mistake; wrong; errors 2 (指非洲) short for africa 3 (姓氏) a surname Ⅱ動詞1 ...
- 法 : Ⅰ名詞1 (由國家制定或認可的行為規則的總稱) law 2 (方法; 方式) way; method; mode; means 3 (標...
- 侵 : Ⅰ動詞(侵入) invade; intrude into; infringe upon Ⅱ形容詞(接近) approaching Ⅲ名詞(姓氏) a surname
- 入 : Ⅰ動詞1 (進來或進去) enter 2 (參加) join; be admitted into; become a member of 3 (合乎) conf...
- 非法 : illegal; unlawful; illicit
-
Vernon dersley : i demand that you leave at once. you are breaking and entering
弗農?德思禮:我要你立刻離開,先生。你這是非法侵入民宅。Crime of unlawful invasion into and destruction of information system of computer have been regulated respectively in section 285 and 286 of chinese criminal code. but convictions are very few in our present adjudication practice, which plays an inharmonious notes in comparison to current computer crimes and relative research waves pushed forward by scholars
我國刑法第285條、第286條規定了非法侵入計算機信息系統罪和破壞計算機信息系統罪,但是國內對此兩罪的司法判決卻非常少見,這與計算機犯罪的現狀和學界對計算機犯罪的研究熱潮是不協調的。Unlawful search of, or intrusion into, a citizen 's home is prohibited.
禁止非法搜查或者非法侵入公民的住宅。Trespassers will be prosecuted.
非法侵入嚴究不貸。Four important item that this part is on the definition the concept ' s foundation of the offense of illegal and irruptive calculator information system, proceeds to that offense treatise
本部分在定義非法侵入計算機信息系統罪的概念的基礎上,對該罪的四個要件進行了論述。China ' s constitution provides that it is prohibited to illegally search a citizen ' s body, and to illegally search or intrude into citizens ' houses
中國憲法規定,禁止非法搜查公民的身體,禁止非法搜查或者非法侵入公民的住宅。Breach of close
非法侵入他人的私有土地Part vii : keep a lookout of crime
第七部分:非法侵入計算機信息系統罪的防範。Crackers do the same thing but for malicious purposes
非法侵入者行為相同,但出於惡意。A probe into the requisites to intrusion
非法侵入住宅罪構成要件探析Trespassers don ' t get cookies
非法侵入者沒有甜餅!We use a firewall to protect our hard drives from unauthorised access
我們使用防火墻保護我們的硬盤驅動器免遭非法侵入。Part v : the duty to crime of the trespass on computer information system crime
第五部分:非法侵入計算機信息系統罪刑事責任。Part vi : lawmaking of the trespass on computer information system crime review
第六部分:非法侵入計算機信息系統罪的立法檢討。Don ' t offer them cookies ! they ' re trespassers
別給他們甜餅!他們是非法侵入者The second of the proposed bills would allow japan ' s coastguard to keep trespassers away from japanese installations and remove them if they came closer than 500 metres
擬議中的第二項法案,將允許日本海岸警衛隊阻止非法侵入者靠近日本設施,如果侵入者離日本設施的距離小於500米,可將其驅離。And security reports to the police the function the monitoring video recording to fuse in together, one machine multipurpose ; daytime makes the monitoring to photograph the use, evening garrisons reports to the police, some person of illegal invasions, trigger report to the police and automatically photograph 7 pictures to be separated for 5 seconds, the function does not leave unused, the resources fully uses ; the function is unique, the versatility, in the market does not have the similar product, the prospect to favor ; simple is the fashion
把監控錄象與防盜報警功能融合在一起,一機多用;白天作監控拍照使用,晚上設防報警,有人非法侵入,觸發報警並自動拍照7幅照片間隔5秒,功能不閑置,資源充分用功能獨特,用途廣泛,市場上還沒有同類產品,前景看好簡單就是時尚。And security reports to the police the function the monitoring video recording to fuse in together, one machine multipurpose ; daytime makes the monitoring to photograph the use, evening garrisons reports to the police, some person of illegal invasions, trigger report to the police and automatically photograph 7 pictures to be separated for 5 seconds, the function does not leave unused, the resources fully uses
3構思巧妙,創意新穎。把監控錄象與防盜報警功能融合在一起,一機多用;白天作監控拍照使用,晚上設防報警,有人非法侵入,觸發報警並自動拍照7幅照片間隔5秒,功能不閑置,資源充分用。Is the wall or fence soundly constructed of materials that would resist unlawful entry
墻或圍墻是否由抵禦非法侵入的材料建築而成?Analyse aim keep a lookout of the trespass on computer information system crime
針對非法侵入計算機信息系統罪的防範進行了剖析。分享友人