Alipay-a source of much bad blood with Yahoo, which felt Mr Ma seized control of it illegitimately, something Alibaba strongly denies-has roughly half of China's online-payments market.

  • 支付宝是阿里巴巴和雅虎关系恶化的源头所在。雅虎认为马云对支付宝的控制是违法的,而阿里巴巴极力否认。尽管如此,支付宝还是占了中国在线支付市场的半壁江山。
  • 来源:互联网摘选更新时间:2025-01-19 22:47:57

  • 重点词汇
  • Mrabbr.Mister 先生;Master 少爷;Mother 母亲;molecular radius 分子半径;
  • control of对…的控制;
  • stronglyadv.强烈地;坚强地;坚固地;强有力地;
  • seizedv.抓住( seize的过去式和过去分词 );逮捕;捉拿;俘获;
  • itpron.它;他;正好是所需的;事实[情况];
  • whichpron.哪一个;(…的)那个;
  • somethingpron.某物,某事;(表示不确切的描述或数量)大致,左右;想来重要(或值得注意)的事物;
  • yahoon.雅虎;(英国作家Swift小说中<<格列佛游记>>中的)人行兽;yahoo此字可追溯到格利佛的<小人国游记>,yahoo的意思是各种野蛮;粗鲁的人;
  • roughlyadv.粗略地;大体上;大致上;粗暴地;
  • bad blood厌恶感;仇怨
  • illegitimatelyadv.私生地,非法地,不合理地;
  • feltn.毛毡;
  • 相关例句
1、

In the scheme, the user's authenticating information is used not only for computing the corresponding access privilege to the intended file, but also for authenticating the requesting user not to illegitimately access the protected file.

在该方案中,用户认证信息不仅用来计算对所需访问文件的存取权,也用于认证需访问保密文件的请求用户的合法性。

互联网摘选

2、

Born illegitimately in 1926 to an unmarried mother in the charity ward of the Los Angeles General Hospital, she was originally known as Norma Jeane Mortenson, the child of a 24-year-old film negative cutter, Gladys Pearl Monroe Mortenson, who developed schizophrenia.

1926年,未婚母亲格拉迪斯•佩尔•梦露•莫天森在洛杉矶综合医院慈善病房产下梦露,取名诺玛•珍妮•莫天森。梦露的母亲当时24岁,是一名负片剪接师,后来患上精神分裂症。

互联网摘选

3、

Using access to power, families of ministers and heads of state governments, belonging to various political parties, have illegitimately bought land and houses at below-market prices and powerful business families have procured mining rights in a corrupt manner.

利用权势,部长们和州一级政府首脑们分属不同政党的亲属以低于市场的价格非法购置土地和住宅,商界显赫家族则以腐败手段获取开矿权。

互联网摘选

4、

When you are being used illegitimately, so that your reputation floor, you can still withstand unconscionable humiliation.

当你被不法商人利用,让你的名声落地,你仍然能承受住昧良心的屈辱。

互联网摘选

5、

The GPS is controlled by the American Department of Defense. Its unauthorized user only can obtain low positioning accuracy without safety.

但GPS是由美国国防部控制的,对非授权用户,其所能获得的定位导航精度较低,且使用安全性无法得到保障。

互联网摘选

6、

In addition, with the risks and chances of network intrusion sharply increasing, designing some safe measures to prevent unauthorized user from accessing the system data and resource becomes a very impending problem in the field of network security.

网络入侵的风险性和机会性也相应地急剧增多,设计安全措施来防范未经授权的用户访问系统的资源和数据,是当前网络安全领域的一个十分重要而迫切的问题。

互联网摘选

7、

Note Do not use this procedure in a production environment to allow unauthorized access to user data in violation of corporate policies regarding privacy and security.

小心请不要在生产环境中使用此过程允许未经授权的用户访问用户数据。这样做可能会违反贵公司的隐私和安全政策。

互联网摘选

8、

Testing access will help you find out if an unauthorized user can successfully access a control that only the administrators are authorized to use.

测试访问将帮助您查明一名未授权用户是否能够成功访问一个只有管理员有权使用的控件。

互联网摘选

9、

Physical access to your servers and your databases may be compromised allowing an unauthorized user to access them.

对服务器和数据库的物理访问可能受到危害,使未授权用户得以访问它们。

互联网摘选

10、

Typically, a closed community site or extranet site like this presents an unauthorized user with a login page instead of the home page.

通常,完整的社区站点或外部网站点会向未经过身份验证的用户显示一个登录页面,而不是主页。

互联网摘选

11、

Access Can an unauthorized user successfully access a control that only the administrators are authorized to use?

访问一个未经授权的用户能成功访问只有经过授权的管理员才能使用的控制权吗?

互联网摘选

12、

The disadvantage is that if the federation is corrupted, few safeguards prevent an unauthorized user from gaining access to controlled information.

缺点在于,如果联合被破坏,很少有防护措施来防止未经授权的用户获得对受控信息的访问。

互联网摘选

13、

This is particularly important with MakeConnection, because otherwise an unauthorized user could retrieve messages destined for another system.

在MakeConnection中,具备这种能力尤其重要,否则,未授权用户可以轻松截获发往其他系统的消息。

互联网摘选

14、

The 802.1x protocol is a access control and authentication protocol based on the model of Client/ Server too, which can prevent the access of unauthorized user to local area network through the access port.

802.1x协议同时也是基于Client/Server的访问控制和认证协议,它可以限制未经授权的用户或设备通过接入端口访问局域网资源。

互联网摘选

15、

Access control technology protects the security of application system by developing a control strategy. Its main purpose is to protect system resources from unauthorized user access, or unauthorized access by legitimate users.

访问控制技术通过制定某种控制策略来保障系统的安全性,其主要目的在于保护系统资源不被非法用户访问或者被合法用户非法访问。

互联网摘选

16、

In data security, an unauthorized user who tries to gain entry to a computer network by defeating the system's access controls.

在数据安全领域,一种未经授权、又企图躲过系统存取控制程序的检查而进入计算机网络的用户。

互联网摘选

17、

In database system, it is a serious problem how to protect data security and to prevent unauthorized user's modification.

在数据库应用系统中,如何保证数据的安全、防止非授权用户的非法访问和修改,已成为一个重要的问题。

互联网摘选

18、

The security technologies, such as firewall, intrusion detection and data encryption have been developed to prevent unauthorized user from stealing, faking and destroying data.

为防止非法用户利用网络系统的缺陷进行数据的窃取、伪造和破坏,人们发展了防火墙、入侵检测、数据加密等安全技术。

互联网摘选

19、

If an unauthorized user is allowed to gain physical access to the server, there is a potential for him to obtain secured data or to do severe damage to the server.

如有未授权的用户被允许对服务器进行物理访问,那么他有可能盗取了加密数据或对服务器进行严重的破坏。

互联网摘选

20、

It is a string of character used to stop ( unauthorized ) user accessing the file.

它是一组字串,用以阻止 ( 未授权的 ) 用者存取档案.

互联网摘选

  • 今日热词
  • 热门搜索

美加网英语词典(dict.tjqzz.com)为您提供在线翻译英语词典单词大全英译汉汉译英等英语服务!可按单词字数词义分类查询。支持lj:关键词格式查询例句。

用户反馈
请选择反馈类型(可多选):
您的联系方式:(如需回复请填写联系方式)
反馈内容:
提交成功 小编会尽快处理
回到顶部
点击反馈