非法侵入 的英文怎麼說

中文拼音 [fēiqīn]
非法侵入 英文
forcible entry
  • : Ⅰ名詞1 (錯誤) mistake; wrong; errors 2 (指非洲) short for africa 3 (姓氏) a surname Ⅱ動詞1 ...
  • : Ⅰ名詞1 (由國家制定或認可的行為規則的總稱) law 2 (方法; 方式) way; method; mode; means 3 (標...
  • : Ⅰ動詞(侵入) invade; intrude into; infringe upon Ⅱ形容詞(接近) approaching Ⅲ名詞(姓氏) a surname
  • : Ⅰ動詞1 (進來或進去) enter 2 (參加) join; be admitted into; become a member of 3 (合乎) conf...
  • 非法 : illegal; unlawful; illicit
  1. Vernon dersley : i demand that you leave at once. you are breaking and entering

    弗農?德思禮:我要你立刻離開,先生。你這是非法侵入民宅。
  2. Crime of unlawful invasion into and destruction of information system of computer have been regulated respectively in section 285 and 286 of chinese criminal code. but convictions are very few in our present adjudication practice, which plays an inharmonious notes in comparison to current computer crimes and relative research waves pushed forward by scholars

    我國刑第285條、第286條規定了非法侵入計算機信息系統罪和破壞計算機信息系統罪,但是國內對此兩罪的司判決卻常少見,這與計算機犯罪的現狀和學界對計算機犯罪的研究熱潮是不協調的。
  3. Unlawful search of, or intrusion into, a citizen 's home is prohibited.

    禁止搜查或者非法侵入公民的住宅。
  4. Trespassers will be prosecuted.

    非法侵入嚴究不貸。
  5. Four important item that this part is on the definition the concept ' s foundation of the offense of illegal and irruptive calculator information system, proceeds to that offense treatise

    本部分在定義非法侵入計算機信息系統罪的概念的基礎上,對該罪的四個要件進行了論述。
  6. China ' s constitution provides that it is prohibited to illegally search a citizen ' s body, and to illegally search or intrude into citizens ' houses

    中國憲規定,禁止搜查公民的身體,禁止搜查或者非法侵入公民的住宅。
  7. Breach of close

    非法侵入他人的私有土地
  8. Part vii : keep a lookout of crime

    第七部分:非法侵入計算機信息系統罪的防範。
  9. Crackers do the same thing but for malicious purposes

    非法侵入者行為相同,但出於惡意。
  10. A probe into the requisites to intrusion

    非法侵入住宅罪構成要件探析
  11. Trespassers don ' t get cookies

    非法侵入者沒有甜餅!
  12. We use a firewall to protect our hard drives from unauthorised access

    我們使用防火墻保護我們的硬盤驅動器免遭非法侵入
  13. Part v : the duty to crime of the trespass on computer information system crime

    第五部分:非法侵入計算機信息系統罪刑事責任。
  14. Part vi : lawmaking of the trespass on computer information system crime review

    第六部分:非法侵入計算機信息系統罪的立檢討。
  15. Don ' t offer them cookies ! they ' re trespassers

    別給他們甜餅!他們是非法侵入
  16. The second of the proposed bills would allow japan ' s coastguard to keep trespassers away from japanese installations and remove them if they came closer than 500 metres

    擬議中的第二項案,將允許日本海岸警衛隊阻止非法侵入者靠近日本設施,如果者離日本設施的距離小於500米,可將其驅離。
  17. And security reports to the police the function the monitoring video recording to fuse in together, one machine multipurpose ; daytime makes the monitoring to photograph the use, evening garrisons reports to the police, some person of illegal invasions, trigger report to the police and automatically photograph 7 pictures to be separated for 5 seconds, the function does not leave unused, the resources fully uses ; the function is unique, the versatility, in the market does not have the similar product, the prospect to favor ; simple is the fashion

    把監控錄象與防盜報警功能融合在一起,一機多用;白天作監控拍照使用,晚上設防報警,有人非法侵入,觸發報警並自動拍照7幅照片間隔5秒,功能不閑置,資源充分用功能獨特,用途廣泛,市場上還沒有同類產品,前景看好簡單就是時尚。
  18. And security reports to the police the function the monitoring video recording to fuse in together, one machine multipurpose ; daytime makes the monitoring to photograph the use, evening garrisons reports to the police, some person of illegal invasions, trigger report to the police and automatically photograph 7 pictures to be separated for 5 seconds, the function does not leave unused, the resources fully uses

    3構思巧妙,創意新穎。把監控錄象與防盜報警功能融合在一起,一機多用;白天作監控拍照使用,晚上設防報警,有人非法侵入,觸發報警並自動拍照7幅照片間隔5秒,功能不閑置,資源充分用。
  19. Is the wall or fence soundly constructed of materials that would resist unlawful entry

    墻或圍墻是否由抵禦非法侵入的材料建築而成?
  20. Analyse aim keep a lookout of the trespass on computer information system crime

    針對非法侵入計算機信息系統罪的防範進行了剖析。
分享友人