進入攻擊 的英文怎麼說

中文拼音 [jìngōng]
進入攻擊 英文
attack run
  • : 進構詞成分。
  • : Ⅰ動詞1 (進來或進去) enter 2 (參加) join; be admitted into; become a member of 3 (合乎) conf...
  • : Ⅰ動詞1 (攻打) attack; assault; take the offensive 2 (指責別人的過錯; 駁斥別人的議論) accuse; ...
  • 進入 : get into; enter; entry; entering; entrance; incoming; dipping; ingress; intro-
  • 攻擊 : 1 (進攻) attack; assault; launch an offensive 2 (惡意指責) attack; accuse; charge; slander; v...
  1. Since 1970 ' s, many investigators have made a plenty of studies about the aggressive behavior of the schizophrene, but did n ' t come to an accordant conclusion. maybe the reason is that they did n ' t take the same definiens of the aggressive behavior and violent behavior or the same tool to measure the personality

    自從上個世紀70年代以來,國內外的學者對此行了廣泛深的研究,產生了大量的研究成果,但是結論尚未統一,這可能是所採用的行為和暴力行為的定義不同和人格的測量工具不同等而造成的。
  2. Beyond sicily, where the allies landed in july 1943, the americans favored taking sardinia and corsica and invading southern france, as a diversionary measure when the main effort was to be a cross - channel attack from england ; it seemed unlikely that a march up the italian peninsula, after taking sicily, would knock out italy as a belligerent

    1943年7月盟軍在西西里登陸之後,美國人傾向于占領撒丁島和科西嘉島,然後法國南部,從而,當盟軍主力從英格蘭出發行跨海峽時,可以牽制德軍;所以,在占領西西里之後,盟軍就不大可能沿著義大利半島揮師北上,並敗交戰國義大利。
  3. Translocation from endocytic compartments to the cytosol is the essential and rate - limiting step in the intoxication process of most toxins such as ricin, diphtheria toxin, shiga toxin and pseudomonas exotoxin ( pe ). a number of these toxins are transported to trans - golgi network ( tgn ), and in many cases such transport to the tgn is required for the translocation and cytotoxicity. in deed, 5 % of the ricin endocytosed by cells has been shown to reach the tgn

    蓖麻毒素細胞的機理不甚明了,一般認為是rtb先與細胞膜受體結合,主要經過受體介導的內吞作用吞噬體,然後沿著內體、高爾基體、內質網等逆向分泌途徑,有序地運輸到內質網,最後從內質網轉位細胞漿,在胞漿內核糖體,從而抑制蛋白質的合成,導致細胞死亡。
  4. Adebayor is seen aggressively wading into the fracas, though it is not certain, on the evidence available to the independent, that he struck anyone

    根據獨立報手上的證據,可見阿德巴約的而且確取地介毆斗中,雖然不能確定他有任何人。
  5. The high command was jockeying its force into place for attack.

    統帥部正在調遣部隊進入攻擊發動地帶。
  6. Intrusion detection can monitor and analyze the behavior of users and system, audit the system configuration and holes, assess the integrality of data and sensitive system, recognize attack action, stat and audit the abnormal behavior, collect the patch related with system automatically, and record the hacker ' s action uses honey pot. intrusion detection helps system administrator monitor, audit and assess the system state easily and available

    侵檢測具有監視分析用戶和系統的行為、審計系統配置和漏洞、評估敏感系統和數據的完整性、識別行為、對異常行為行統計和審計、自動地收集和系統相關的補丁、使用誘騙服務器記錄黑客行為等功能,使系統管理員可以較有效地監視、審計、評估自己的系統。
  7. Maginot line of defense known as steel, the german was bypassed, and you will have to leap today. a super cool games, you have to fight early use of gold coins to buy some 2, 000 infantry infantry, archer archers or vehicles rams, the price of 50, 100, 500, shift to the mouse click once on the above purchase of a unit, but they can also build arsenals, infantry battalions, bows and arrows, this is ready to upgrade, upgrade will improve your various branches of the military combat ef

    一款超爽的游戲,戰斗初期你必須利用2000金幣購買一些步兵infantry弓箭手archers或戰車rams ,價格分別為50 , 100 , 500 ,將鼠標移在上面點一次就購買一個單位,此外還可以修建兵工廠步兵營弓箭等,這是為升級準備,升級后將提高你的各個兵種的戰鬥力, ,一切選好后可點play游戲看到游戲屏幕後,繼續點選你的部隊開始操作指南:鼠標操作
  8. Excitement period is entered namely after prodromal stage, expression is violent uneasiness, atttack person and other animal actively, consciousness is disorder, larynx flesh is paralytic

    前驅期后即興奮期,表現為狂暴不安,主動人和其它動物,意識紊亂,喉肌麻痹。
  9. Our troops are not yet within striking distance of the enemy

    我們的部隊還沒有敵人的范圍內。
  10. Thanks to the leaker of the oe code, sony has done several changes in the loadcore module ( the most important that oe / m33 patches ), and done some attacks against the oe / m33 core, such as the change of the nids that they use

    感謝oe源代碼的?漏者,新力已經在裝系統核心的模塊中做了幾處改變(這是對目前的自製系統最關鍵的部分) ,並且加了對自製系統的部分,比如改變了他們所使用的調用。
  11. 2. 1 whose presence within the venue in the authorities opinion may be a source of danger, nuisance, or annoyance or may otherwise give rise to concerns in relation to the safety and security arrangements for the event. this includes excessive noise, the use of foul, obscene, abusive or racist language, the wearing or other display of political or offensive signage or logos, the throwing of any object that might injure or cause damage to people or property or engaging in any conduct, acting towards or speaking to any person in a manner which offends, insults, humiliates, intimidates, threatens, disparages or vilifies that other person on the basis of that other persons race, religion, colour, descent or national or ethnic origin

    2 . 1有關部門判斷該持票人賽區可能會成為危險危害或麻煩的來源或者會對賽事的安保安排造成負面影響,包括過大的噪音,使用污穢的猥褻的辱罵的或種族歧視的語言,身體穿著佩戴或用其他方式展示具有政治色彩或冒犯性的標志或標識,投擲任何可能傷害他人人身或破壞財產的物品或行任何針對他人的種族宗教膚色祖籍或國籍和民族侮辱羞辱威脅恫嚇辱罵或貶損的行為或言語
  12. Netradar system is an important research subject in the area of internet security. it ' s aim is to detect the foundational terminals of and the route to a certain aimed intranet ; to scan the softwares that run on the terminals ; to find the services which are provided by the terminals ; to determine the vulnerabilities of the services and the distribution of the vulnerabilities. ater all the above have fmished, the netrada system attacks the vital terminals or the vulnerable terminals and controls them automatically

    網路雷達系統( netradar )是網路安全領域的一個研究課題,該課題的研究目標包括三個方面:探測接internet的特定目標網路的基礎設施、到達該目標網路的路徑;掃描支撐目標網路運行的軟體實體的類型、提供的服務、探測出其軟體實體的漏洞和脆弱點分佈等信息;根據目標網路的基礎設施構架、拓撲信息、漏洞和脆弱點分佈等信息,有針性對的選取關鍵設備或者防護較弱的設備與控制。
  13. Once on the offensive, our highly trained directorate forces were more than a match for the beast - like zerg

    一旦進入攻擊之後,我們受過高度訓練的聯邦部隊將能夠全力殲滅這些野獸般的蟲族。
  14. Nagase all remaining squadrons, rejoin into attack formation

    殘余部隊重整編隊,再次進入攻擊陣形。
  15. A perfect blend of strength and speed, the years spent alone in the forests of ashenvale allowed her to blend into terrain, appearing phantomlike at times and striking when you least expect it

    藉由力量與速度的完美結合,以及在阿森維爾的森林中的長年獨處,讓茉崔蒂能把自己融環境之中,一次又一次地如幻影般地出現,趁你最難以預料的時機
  16. Property to ensure that it renders properly, and to protect against script injection attacks

    屬性的字元串行編碼,以確保它正確呈現並保護它不受腳本注
  17. The key is that the attack is executed using well - defined apis and protocols

    關鍵的問題是侵者是使用定義良好的api和協議來的。
  18. All groups assume attack coordinates

    所有部隊準備進入攻擊坐標
  19. If the tank has to move in order to get into range, the crosshair constantly remains red

    如果坦克需要移動以進入攻擊射程,十字準星將顯示紅色並保持不變。
  20. In theory, antibodies could attack the microbes before they entered cells or when newly minted copies traveled from one cell to another

    理論上,抗體可在微生物侵細胞之前,或是新生成的病原菌從宿主細胞轉移到另一個細胞的途中,
分享友人