竊據 的英文怎麼說

中文拼音 [qiè]
竊據 英文
usurp; entrench; seize; unjustly occupy
  • : Ⅰ動詞(偷) steal; pilfer Ⅱ副詞(暗中; 偷偷 地) secretly; surreptitiously; furtively Ⅲ代詞[書面語] (謙指自已) i
  • : 據Ⅰ動詞1 (占據) occupy; seize 2 (憑借; 依靠) rely on; depend on Ⅱ介詞(按照; 依據) according...
  1. The evidence adds up to a case of theft.

    顯示出是一起盜案。
  2. As the building is temporarily in the hands of the anglican heresy, i cannot answer for that.

    由於該教堂目前尚為英國異端國教竊據,對此事本人無可奉告。
  3. Digital signature operates the born and a series of sign and codes to constitute the electronics password to carry on the signature through a certain password, replace to the writing signature or an official seals, to confirm the body, the data source and integrities of signs, keeping data from burglarize to take, distort and break, thus to attain the purpose of protecting the data

    數字簽名是通過某種密碼運算生成一系列符號及代碼組成電子密碼進行簽名,來代替書寫簽名或印章,確認簽名者的身份、數來源和完整性,防止數取、篡改和破壞,從而達到保護數的目的。
  4. They were clearly convinced by the noise that a burglary was in progress.

    他們根聲音顯然相信小偷正在屋內進行盜
  5. With the rapidly development of computer network technology and the widely use of network technology in every walk of life, people transmit data through computer network more and more frequently, including all kinds of secret information ( for example, military secret ; bussiness secret ; personal private information ). today, as a result of poor security of our network system, we can not prevent the transmittied information from stealing and modifying unlawful. thus, the computer network technology is applied to our daily life restrictedly. recently, many network applications with voip ( for example msn messenger ; dialpad ; distributed multipoint multimedia conferences ) take no measures to encrypt their data

    隨著計算機網路技術的迅猛發展和網路技術在各行各業中的廣泛應用,人們通過計算機網路傳輸數日益增加,其中包含了各種機密信息(例如軍事機密信息、商業機密信息、個人隱私信息等) 。由於目前的網路系統缺乏足夠的安全性,不能有效防止網路上所傳輸的信息被非法取和修改,因而極大地限制了計算機網路技術在日常工作中的應用。當前,基於voip技術的各種網路應用,如msnmessenger , dialpad ,以及一些分散式多媒體會議系統,竟然未採取任何加密措施
  6. The thieves tried to double-cross each other each wanting to keep all the money for himself.

    賊們互相欺騙,都想把所有的錢為己有。
  7. Guarantees that the data passed between the requester and provider is protected from eavesdroppers

    保證請求方和提供方之間傳輸的數不會被聽者取。
  8. Thrown out of his honourable employment in england, through too much unsuccessful hard swearing there - not because he was not wanted there : our english reasons for vaunting our superiority to secrecy and spies are of very modern date - he knew that he had crossed the channel, and accepted service in france : first, as a tempter and an eavesdropper among his own countrymen there : gradually, as a tempter and an eavesdropper among the natives

    他在英國丟掉了那份體面的差使是因為多次咬著牙作偽證失敗,而不是因為那兒不需要偽證。我們英國人誇耀自己鄙視干涉隱私和密探行當的種種根,其實是新近才出現的。巴薩心裏明白,他跨過海峽到法國來當差,起初是在自己的僑胞之間做套誘和聽的工作,后來逐漸干到法國人當中去了。
  9. The enclosed letter martin found to be crudely printed by hand. it was a hotchpotch of illiterate abuse of martin, and of assertion that the " so - called martin eden " who was selling stories to magazines was no writer at all, and that in reality he was stealing stories from old magazines, typing them, and sending them out as his own

    馬丁發現那匿名信是手寫的印刷體,寫得很糟糕,是一些對馬丁的沒有教養的謾罵,硬說向各雜志兜售稿子的「所謂馬丁伊登」根本不是作家,實際上他是在從舊雜志上盜作品,把它們打出來為己有往外投稿。
  10. Marine insurance policy of certificate in duplicate, indorsed in blank, for full invoice value plus 10 percent stating claim payable in thailand covering fpa as per ocean marine cargo clause of the people ' s insurance company of china dated 1 / 11981, including t. p. n. d. loss and / or damage caused by heat, ship ' s sweat and odoour, hoop - rust, breakage of packing

    保險單或保險憑證一式二份,空白背書,按發票金額加10 %投保,聲明在泰國賠付,根中國人民保險公司1981年1月1日的海洋運輸貨物保險條款投保平安險,包括偷提貨不著,受熱船艙發汗,串味,鐵箍銹損,包裝破裂所導致的損失。
  11. Those data, which are stored in plain text and are even protected by passwords and firewalls and intrusion detection systems, are easily filched, peculated and destroyed

    以明文形式存放的數,即使置於口令、防火墻和入侵檢測系統的保護之下,也很容易被取、盜用和破壞。
  12. Among all the techniques and methods protecting data, it is the most practicable to encrypt data and store encrypted data, because even if encrypted data are filched, copied, or peculated, attackers are incapable of understanding these data in that they are incapable of decrypting these data

    在目前的技術條件下,保護數和信息最行之有效的方法就是將它們加密后再存儲在數庫中,因為加了密的數和信息,即使被取、被拷貝、被截獲,獲取者因無法破解取的密文而無從知曉它們對應的機密數
  13. Coulthard had broken into more than 500 places of worship across the country. seconds after the appeal was issued, a builder who had signed up to the service told police the 43 - year - old was near a church in santon downham

    英國衛報3月30日報道,被英國薩福克郡警方擒獲的這名賊名叫克里斯托弗庫爾撒德,現年43歲。
  14. With the fleet development of mobile communication industry, the security and secrecy of information has been becoming more and more vital. nowadays, the security of communication is of great importance to confirm the safety of business information. on the situation that the mobile phone has been diffusely applied, the hidden safety troubles of mobile phone should not be ignored ( such as wire tapping, imitated handset station, blue teeth connection, in exchange with electromagnetic wave, the back door of handset, lost & stolen & lost control of mobile phone, safety of non - tone increment operation of mobile phone and cell phone virus )

    統計,目前我國gsm網路[ 1 ] [ 13 ]已覆蓋全國絕大部分地區,用戶數已超過2 . 6億,並且還在高速增長;隨著手機應用的普及,手機存在的安全隱患及面臨的威脅日益突出(如主動聽、假冒機站、藍牙連接、電磁波交換、手機后門、手機被盜、丟失或短時失控、手機非話增值業務安全以及手機病毒等) ,手機安全問題已成為當前急需解決的重要問題。
  15. In this study, authors report three hundred and forty _ seven species of coleoptera insects which damage the agriculture and forestry in the northeast area of china. the insects which belong to thirty _ nine families have been given a detailed description of the specific distribution and feeding character in order to provide a scientific evidence for many workers of the agriculture and forestry and plant _ protector. in this paper, twenty _ three families are discussed that is cicindelidae, carabidae, hydrophilidae, staphylinidae, dytiscidae, elateridae, silphidae, histeridae, corynetidae, buprestidae, ostomatidae, nitidulidae, cybocephalidae, catogenidae, sivanidae, mycetophagidae, lathridiidae, ptinidae, bostrychidae, anobiidae, lyctidae, tenebrionidae, meloidae, totally eighty _ seven species

    本研究作者報道了東北地區危害農業、林業的鞘翅目昆蟲347種,它們隸屬於39科,作者對這些種類的分佈及其取食特徵進行了詳細的描述,以期為廣大農業、林業及植物保護工作者提供科學依.本文論述了23科,即虎甲科、步甲科、牙甲秒、隱翅蟲科、龍虱科、叩頭蟲科、葬甲科、閻甲科、陷附郭公蟲科、吉丁蟲科、谷盜科、露尾甲科、方頭甲科、扁甲科、鋸谷盜科、小覃甲科、薪甲科、蛛甲科、長蠹科、蠹科、粉蠹科、擬步甲科、芫菁科共87種。
  16. If your typewriter was stolen while you were away, why don ' t you claim on the insurance ? you have a cast - iron case

    如果你的打字機是在你不在時被,你為什麼不向保險公司提出賠償要求呢?你有無可辯駁的證
  17. The attitudes offered in the article include : recognize respectively the behaviors of counterfeiting and credit card, cheating and usage of credit card on different occasions ; set an individual crime of malicious overdraft of credit card ; add unit criminal subject of guilty of credit card cheating ; recognize the behavior of stealing and usage credit card as guilty of credit card cheating

    本文的主要觀點:對偽造信用卡並使用的行為、騙取信用卡並使用的行為應根不同情況分別認定;惡意透支型信用卡犯罪應獨立成罪;增設信用卡詐騙罪的單位犯罪主體;盜信用卡並使用的行為應認定為信用卡詐騙罪。
  18. Neither the bank, its associates, nor any of their directors, officers or employees, shall be liable to the customer for any expenses, loss or damage suffered by or occasioned to the customer by reason of any action taken or omitted to be taken by any one or all of the bank, its associates, their directors, officers, employees or agents pursuant to these conditions or in connection therewith other than as a result of the fraud, wilful default or negligence of the bank, its associates, their directors, officers, employees or agents ; the bank s failure in good faith to honour any stop - payment instructions given by the customer ; the presentation to the bank of any cheque or other payment order which is post - dated ; the bank failing to honour any draft drawn on it by the customer, but the bank shall immediately return such draft to the customer through the normal channels giving the reason for the dishonour ; any loss, damage, destruction or misdelivery of or to the securities howsoever caused unless the same shall result from the negligence of, or theft by, the bank or its associates or any of their directors, officers or employees, in which event the extent of the liability of the bank shall be limited to the market value of such securities at the date of discovery of the loss and even if the bank has been advised of the possibility of such loss or damage ; unauthorised use or forging of any authorised signature as a result of the negligence, wilful default or fraud of the customer ; subject to condition 5. 5, any act or omission, or insolvency of, any person not associated with the bank including, without limitation, a third party nominee or depositary ; viii the collection or deposit or crediting to the custodian accounts of invalid, fraudulent or forged securities or any entry in the custodian accounts which may be made in connection therewith ; any malfunction of, or error in the transmission of information caused by, any electrical or mechanical machine or system or any interception of communication facilities, abnormal operating conditions, labour difficulties, acts of god, or any similar or dissimilar causes beyond the reasonable control of the bank and notwithstanding paragraph, the error, failure, negligence, act or omission of any other person, system, institution or payment infrastructure

    本行其聯系人士其各董事高級人員或雇員均毋須向客戶因以下理由而使客戶蒙受或產生之任何開支損失或虧損負責: i本行其聯系人士其董事高級人員雇員或代理人根此等條件採取或遺漏採取有關之行動,但由於本行其聯系人士其董事高級人員雇員或代理人之欺詐行為故意失責或疏忽所造成者除外ii本行本真誠地未能依約替客戶執行止付指示iii向本行提交任何遠期支票或其他付款指示iv本行未能兌現由客戶開出之匯票,但本行將立即透過正常渠道將該匯票退回客戶,並解釋拒付之理由v無論如何導致之任何證券之損失損毀毀壞或錯誤交付除非上述各項乃因本行或其聯系人士或其任何董事高級人員或雇員之疏忽或盜所引致,而在該等情況下,本行的責任將只限於在發現損失當日該等證券之市值,以及即使本行已獲知該等賠償之可能性vi因客戶之疏忽故意失責或欺詐行為而導致的任何偽造授權簽名或不獲授權使用該簽名vii在第5 . 5 a條之規限下,與本行無關者之任何行動或遺漏或無償債能力包括但不限於第三者代名人或寄存處viii代收或存入或貸存於保管人賬戶的無效偽造或假冒證券或在保管人賬戶記入可能與此有關之賬項ix任何電子機械或系統失靈或因該等機件或系統產生的資料傳送錯誤或任何通訊設施之終斷不正常操作情況勞工問題天災或非本行所能合理控制之任何類似或非類似原因及x盡管有第ix項,任何其他人系統機構或付款設施的錯誤故障疏忽行動或遺漏。
  19. Obtaining money on false pretences perhaps or some obscurer charge heard in camera under the official secrets act

    也許是說謊騙錢,或者是根「公務員保密條例」聽到的某種莫名其妙的罪名。
  20. If the judge decided the three people committed crime based on the forestry act because they stole the nature resource in the forestry, the judge should enhance the punishment

    因為,如果法院認定三人有罪,那麼根《森林法》 ,結並使用搬運設備取林產物,應加重判刑,為何法官卻做出減輕刑責的判決?
分享友人