impersonation是什么意思,impersonation中文翻譯,impersonation發(fā)音、用法及例句
?impersonation
impersonation發(fā)音
英:[?m?p?:s?'ne??n] 美:[?m?p?:s?'ne??n]
英: 美:
impersonation中文意思翻譯
n.扮演,裝扮,模仿, 準(zhǔn)則
impersonation詞形變化
名詞: impersonation | 動(dòng)詞第三人稱單數(shù): impersonates | 動(dòng)詞過去式: impersonated | 動(dòng)詞現(xiàn)在分詞: impersonating | 動(dòng)詞過去分詞: impersonated |
impersonation同義詞
coolly | impassively | neutrally | frostily | coldly | detachedly | grayly | greyly | distantly | carefully | anonymously | objectively | remotely
impersonation反義詞
personally
impersonation常見例句
1 、10. In her habits, she was a living impersonation of order, method, and exactness .───她的生活習(xí)慣活生生地體現(xiàn)了井井有條,按部就班和精密細(xì)致等準(zhǔn)則。
2 、Too often, developers enable impersonation in ASP.───開發(fā)人員經(jīng)常在ASP.
3 、false impersonation───[法] 假冒他人, 冒充, 冒名
4 、The scope of impersonation, when execution context is at the database level, is as follows───下面是執(zhí)行上下文處于數(shù)據(jù)庫級(jí)別時(shí)模擬的作用域
5 、Do not use impersonation for reports that support subscriptions or that use schedules to generate report history or refresh a report execution snapshot.───對于支持訂閱的報(bào)表,或按計(jì)劃生成報(bào)表歷史記錄或刷新報(bào)表執(zhí)行快照的報(bào)表,請勿使用模擬功能。
6 、However, in certain scenarios it may be useful to selectively extend the scope of impersonation beyond the database.───但是,在某些情況下,有選擇地將模擬作用域擴(kuò)展到數(shù)據(jù)庫之外可能會(huì)非常有用。
7 、I am afraid there's no use studying until the middle of the night. I have to admit that there are differences between people. Never become an impersonation.───就怕你學(xué)到半夜也沒有用。我不得不承認(rèn)人與人之間是有差別的。千萬不要成為模仿秀。
8 、It says here you were caught impersonating an officer.─── 寫著你在偽裝軍官時(shí)被抓獲
9 、Specifies the level of impersonation allowed when calling targets of a server application.───指定調(diào)用服務(wù)器應(yīng)用程序的目標(biāo)時(shí)允許的模擬級(jí)別。
10 、Keep doing this until you can just blurt it out.If when you try really hard, and your impersonation matches the original by 90%, then when you are relaxed you should still be able to reach 85%.───如果你在刻意模仿的狀態(tài)下近似度在90%左右,那么長時(shí)間下來,你在非刻意模仿的狀態(tài)下近似度應(yīng)該會(huì)潛移默化地停留在85%左右。
11 、In China, some with a long history of Daxing, often difficult to avoid the fate of Waizu impersonation.───在中國,一些具有悠久歷史的大姓,常常難以避免被外族冒用的命運(yùn)。
12 、‘The only truly superb thing about it is its impersonation of a Passat. An old one.’───昊銳模擬帕薩特是其唯一做的優(yōu)秀的事。
13 、He did an extremely convincing impersonation of the singer.───他模仿那位歌手維妙維肖。
14 、List as follows:Firstly, the SAKA protocol is analysed, because the authentication codes of the two protocol participants completely lie on the long-term shared key, so it does not resist key-compromise impersonation.───具體工作如下:首先,分析了SAKA協(xié)議,由于協(xié)議參與者雙方的認(rèn)證碼完全依賴于長期共享密鑰,因此它不具有密鑰泄漏的安全性。
15 、I say:Don't the incarnation in my in front impersonation the truth, you know 1+1 equal several?───我說:別在我面前扮演真理的化身,你知道1+1等于幾嗎?
16 、Secondly, the UAP protocol is analysed, because the key confirmation completely lies on the long-term private key, so it does not achieve forward secrecy, and resists key-compromise impersonation.───其次,對UAP協(xié)議進(jìn)行安全分析,由于其確認(rèn)密鑰完全依賴于服務(wù)器的長期私鑰,因此它不具有前向保密性和密鑰泄漏的安全性。
17 、You of when cat cat and companion together play, impersonation what role?───你的貓貓與同伴一同玩耍時(shí),扮演何種角色?
18 、comedian Tina Fey, No. 51 in part for playing Sarah Palin, the 2008 Republican vice presidential nominee, in wildly popular TV impersonation s during the election campaign;───喜劇演員蒂娜?菲(第51位),她因總統(tǒng)大選期間在一檔收視率很高的模仿秀節(jié)目中模仿副總統(tǒng)候選人莎拉?佩林而人氣飆升;
19 、He also faces charges of harassment, reckless endangerment and criminal impersonation ?for allegedly telling parking lot employees he was a federal agent.───他也面對困擾的費(fèi)用,鹵莽的危及和犯罪的扮演 ?對于據(jù)說有效的停車場職員他是聯(lián)邦探員。
20 、For client impersonation, ASP.NET will connect to the session-state store using the security credentials that were negotiated with the browser.───對于客戶端模擬,ASP.NET將使用與瀏覽器協(xié)商的安全憑據(jù)來連接會(huì)話狀態(tài)存儲(chǔ)區(qū)。
21 、Among the most anticipated: the Ultimate Elvis Tribute Artist contest starring winners of 25 preliminary Elvis impersonation competitions from as far away as New Zealand.───其中最值得期待的:最終貓王致敬藝術(shù)家主演的競賽優(yōu)勝者25初步貓王模仿比賽,從遠(yuǎn)如新新西蘭。
22 、Rules for Extending Database Impersonation Scope───擴(kuò)展數(shù)據(jù)庫模擬作用域的規(guī)則
23 、But here's the kicker: impersonation isn't necessary for ACL authorization.───但是存在以下隱患:對于ACL授權(quán)來說,模擬是不必要的。
24 、The ASP.NET application needs only to verify that impersonation is set to true in the ASP.NET configuration file; no ASP.NET security code is required.───ASP.NET應(yīng)用程序只需驗(yàn)證是否在ASP.NET配置文件中將模擬設(shè)置為true;不需要ASP.NET安全碼。
25 、Violence at such a range is so impersonal.─── 遠(yuǎn)距離狙殺 太沒人情味了
26 、No security context is available to allow impersonation.───沒有安全上下文可用來允許模仿。
27 、The SQL Server Database Engine security functionality includes highly granular authentication, authorization, and validation mechanisms; strong encryption; security context switching and impersonation; and integrated key management.───SQL Server數(shù)據(jù)庫引擎安全功能包括高粒度身份驗(yàn)證、授權(quán)和驗(yàn)證機(jī)制;增強(qiáng)加密;安全上下文切換和模擬以及集成的密鑰管理。
28 、The caller of the REVERT statement must be in the same database where the impersonation occurred.───REVERT語句的調(diào)用方必須位于發(fā)生模擬的同一數(shù)據(jù)庫中。
29 、How do I use programmatic impersonation?───如何使用可編程的模擬?
30 、Service (DoS) attack and the impersonation attack.───兌換系統(tǒng)。
31 、Or you can forget about impersonation and restrict access to salary data by setting the ACL for Salaries.aspx so that non-managers lack read permission.───或者您可以不考慮模擬,并且通過為Salaries.aspx設(shè)置ACL以使非管理人員不具有讀取權(quán)限,從而限制對工資數(shù)據(jù)的訪問。
32 、Therefore, if the Web site is configured to perform impersonation, you must grant the TCB privilege to the account that is running the Web server.───因此,如果網(wǎng)站配置為執(zhí)行模擬,則必須向運(yùn)行Web服務(wù)器的帳戶授予TCB特權(quán)。
33 、If your custom data processing extension connects to data sources using impersonation, you must use the Open method on either the IDbConnection or IDbConnectionExtension interfaces to make the request.───如果您的自定義數(shù)據(jù)處理擴(kuò)展**件使用模擬功能連接到數(shù)據(jù)源,則必須在IDbConnection或IDbConnectionExtension接口上使用Open方法來發(fā)出請求。
34 、For information about how to extend user impersonation beyond the scope of the current database, see Extending Database Impersonation by Using EXECUTE AS.───有關(guān)如何在當(dāng)前數(shù)據(jù)庫作用域之外展開用戶模擬的信息,請參閱使用EXECUTE AS擴(kuò)展數(shù)據(jù)庫模擬。
35 、The latter approach provides better performance because it avoids impersonation altogether.───后一種方法提供的性能更佳,因?yàn)樗耆苊饬四M。
36 、Defines security impersonation levels. Security impersonation levels govern the degree to which a server process can act on behalf of a client process.───[本主題是預(yù)發(fā)布的文檔,在將來發(fā)布的版本中可能會(huì)有更改。空白主題是為將來預(yù)留的。
37 、The new harassment clause, for instance, expressly lets members state negative feelings or opinions about another, and parodies of public figures are now permitted despite a ban on impersonation.───新騷擾的條文,例如,明確允許成員國家的負(fù)面感情或意見,另一個(gè),和模仿公眾人物,現(xiàn)在雖然允許,禁止假冒。
38 、Impersonation is the ability of a process to take on the security attributes of another process.───模擬是某個(gè)進(jìn)程呈現(xiàn)另一個(gè)進(jìn)程的安全屬性的能力。
39 、He does a brilliant impersonation of the President.───他模仿總統(tǒng)模仿的很出色。
40 、The system doesn′t need any password list. Using only one password,a registered user can log in the different services and get session keys. This scheme can withstand replay attack and impersonation attack.───方案中的服務(wù)器不需要存儲(chǔ)口令表,經(jīng)過注冊的用戶只需一個(gè)口令即可登錄系統(tǒng)中不同的服務(wù)器,并生成與服務(wù)器之間的會(huì)話密鑰,該方案可抵抗重放、偽裝等入侵攻擊.
41 、Also flows as part of the information that flows across the asynchronous points, which means that if an impersonation context exits it will flow as well.───也作為流經(jīng)異步點(diǎn)的信息的一部分流動(dòng),這意味著如果模擬上下文退出,它仍會(huì)流動(dòng)。
42 、Download details: Windows 2000 Security Patch: Service Control Manager Named Pipe Impersonation Vulnerability───下載詳細(xì)信息:Windows 2000安全修補(bǔ)程序:服務(wù)控制管理器命名管道模擬漏洞
43 、Database modules in an impersonation context cannot access resources outside the database.───模擬上下文中的數(shù)據(jù)庫模塊不能訪問數(shù)據(jù)庫以外的資源。
44 、When impersonating a principal by using the EXECUTE AS LOGIN statement, or within a server-scoped module by using the EXECUTE AS clause, the scope of the impersonation is server-wide.───當(dāng)使用EXECUTE AS LOGIN語句模擬主體或使用EXECUTE AS子句在服務(wù)器范圍模塊內(nèi)模擬主體時(shí),模擬的作用域?yàn)榉?wù)器范圍。
45 、impersonation attack───偽裝攻擊
46 、Who I am is the guy you're impersonating, badly.─── 我是那個(gè)你所扮演的 壞人
47 、The protocols provide known session key security,part forward secrecy,and there is no key-compromise impersonation,no unknown key-share and no key control.───協(xié)議滿足前向安全性、會(huì)話密鑰泄露的安全性、個(gè)人密鑰泄露的安全性,無不明密鑰共享,單方不能控制密鑰生成。
48 、These were fervent Brahmins, the bitterest foes of Buddhism, their deities being Vishnu, the solar god, Shiva, the divine impersonation of natural forces, and Brahma, the supreme ruler of priests and legislators.───婆羅門教里有三個(gè)轉(zhuǎn)世活佛:第一個(gè)是回斯奴,他是太陽神的化身,第二個(gè)是希瓦,他是生靈萬物主宰的化身,第三個(gè)是卜拉馬,他是一切婆羅門教教長和立法者的主宰。
49 、There are times when impersonation is justified.───有的時(shí)候需要證明模擬的合理性。
50 、When should I use programmatic impersonation?───何時(shí)需要使用可編程的模擬?
51 、Rather, impersonation and reverting change the token associated with the current operating system process.───對象。相反,模擬和恢復(fù)更改同當(dāng)前操作系統(tǒng)進(jìn)程關(guān)聯(lián)的標(biāo)記。
52 、A tactic that some believe is unfair and impersonal.─── 一種有些人認(rèn)為不公平 也缺少人情味的募資方式
53 、If you laugh yourself after seeing the film, then that's a successful impersonation.───如果自己看完錄影會(huì)笑出來,就算是次成功的模仿表演。
54 、DCOM determines the impersonation level, using its normal security-negotiation algorithm.───DCOM使用其常規(guī)安全協(xié)商算法確定模擬級(jí)別。
55 、If the managed code provides authentication services, it must obtain a Windows NT security token and do an impersonation before calling any COM objects.───如果托管代碼提供身份驗(yàn)證服務(wù),那么在調(diào)用任何COM對象之前,它必須獲得Windows NT安全標(biāo)記并進(jìn)行模擬。
56 、Li Yugang gradually found his confidence and discovered the huge market potential of female impersonation.───李玉剛逐漸找到了自信,并且發(fā)現(xiàn)了反串表演極大的市場潛力。
57 、When impersonating at this level, the impersonation token can be passed across only one machine boundary.───當(dāng)在該級(jí)別模擬時(shí),模擬標(biāo)記可以只橫穿一個(gè)計(jì)算機(jī)邊界。
58 、Some nutcase who likes to impersonate cops.─── 一個(gè)喜歡玩警察游戲的瘋子
59 、This is true if there is no context switching or if the impersonation is at the server level.───沒有上下文切換或在服務(wù)器級(jí)進(jìn)行模擬時(shí),將出現(xiàn)這種情況。
60 、I mean your doing rather brilliant sort of impersonation.───我是說你剛才做的只是非常逼真的模擬而已。
61 、An attempt has been made to operate on an impersonation token by a thread that is not currently impersonating a client.───嘗試已取得經(jīng)營上的模擬令牌由一個(gè)線程目前未模仿客戶端。
62 、It does so even if impersonation is disabled.───即使禁用了模擬,它仍會(huì)這樣操作。
63 、So they are taught that the microlight, which augments its impersonation by playing recordings of simulated crane calls, is their parent.───教教它們!通過播放模擬鶴鳴的錄音帶,滑翔機(jī)強(qiáng)化了在小鶴心中所扮演的父母的角色。
64 、You have proposed that we hang him for impersonating a bishop.─── 你提議我們絞死他 罪名是冒充主教
65 、You can't just back down because of some female impersonator.─── 你不能因?yàn)槟硞€(gè) 模仿女性的人而打退堂鼓
66 、You seem to forget that, but for me and but for my little impersonation, you probably wouldn't be here at all tonight.───你好象忘了,要不是我,要不是我那小小的一招,你今晚大概就來不了這兒。
67 、defrauding insurance proceeds through impersonation───冒名騙賠
68 、The impersonation scenario relies on Microsoft Internet Information Services (IIS) authentication and Microsoft Windows file access security to minimize security programming in the ASP.NET application itself.───模擬方案依賴于Microsoft Internet信息服務(wù)(IIS)身份驗(yàn)證和Microsoft Windows文件訪問安全性以最大限度地減少ASP.NET應(yīng)用程序本身在安全性方面的編程量。
69 、Convinced of his own righteousness, he was the perfect impersonation of a man of rectitude.───他確信自己很正直,可以完美地扮演剛正不阿的人。
70 、His impersonation of enthusiasm never rings true.───他模仿的積極性從來沒有真正的戒指。
71 、she has the gift of impersonation too!───他很有模仿的天分!
72 、Oscar is one rockin mama, as she performs a pretty mean Mick Jagger impersonation.───奧斯卡是一個(gè)母親,正如她扮演漂亮的米克 賈格爾。
73 、Security impersonation levels govern the degree to which a server process can act on behalf of a client process.───安全模擬級(jí)別控制服務(wù)器進(jìn)程可以在何種程度上代表客戶端進(jìn)程執(zhí)行操作。
74 、Kerberos is essentially a secure network authentication protocol that employs a system of shared secret keys and is able to provide robust security against impersonation and reply attacks.───Kerberos實(shí)際上是一種安全網(wǎng)絡(luò)認(rèn)證協(xié)議,采用共享密鑰的系統(tǒng),并且能提供健壯的安全性,以防止偽裝攻擊和恢復(fù)攻擊。
75 、The Impersonation Level specifies whether applications can determine who is calling them, and whether the application can do operations using the client's identity.───模擬級(jí)別指定應(yīng)用程序是否可以確定是誰在調(diào)用,并且應(yīng)用程序是否可以以該客戶的身份進(jìn)行操作。
76 、I should charge you with impersonating a police officer.─── 我應(yīng)該以假扮警察的罪名起訴你
77 、I do an impersonation.───做模仿表演。
78 、If you impersonate her, you'll have to go in unarmed.─── 你要是偽裝成她 就不能帶武器進(jìn)去
79 、The impersonation contributed to the society role of adolescent and future role of study;───有助于青少年社會(huì)角色的扮演及未來角色的學(xué)習(xí);
80 、Windows 2000 Security Patch: Service Control Manager Named Pipe Impersonation Vulnerability also downloaded───Windows 2000安全修補(bǔ)程序:服務(wù)控制管理器命名管道模擬漏洞
81 、When the children have certain cognitive ability, just verbal impersonation is not enough, try to give them opportunities to read the characters.It will help them learning language better.───當(dāng)孩子有了一定的認(rèn)知能力后,光是口頭上的模仿是不夠的,適時(shí)的給他們認(rèn)讀的機(jī)會(huì),會(huì)幫助他們更好的學(xué)習(xí)語言;
82 、What you are describing is something we call "user impersonation".───您所描述的情況,我們稱之為“用戶模擬”。
83 、For a man who is not supposed to be an ace, Chien-Ming Wang did quite an impersonation.───對一位不被認(rèn)定是王牌投手的人來說,王建民模仿的可是真像啊。
84 、To summarize, the impersonation scope of a context established within a database can be extended to other scopes if and only if the following is true───概括而言,當(dāng)且僅當(dāng)滿足下列條件時(shí),可以將數(shù)據(jù)庫內(nèi)建立的上下文的模擬作用域擴(kuò)展到其他范圍
85 、This impersonation depends on whether the module is a database-level module, such as a stored procedure or function, or a server-level module, such as a server-level trigger.───此模擬取決于模塊是數(shù)據(jù)庫級(jí)模塊(如存儲(chǔ)過程或函數(shù))還是服務(wù)器級(jí)模塊(如服務(wù)器級(jí)觸發(fā)器)。
86 、When OFF is specified, in an impersonation context cannot access resources outside the database.───當(dāng)指定為OFF時(shí),在模擬上下文中無法訪問數(shù)據(jù)庫以外的資源。
87 、He is charged with impersonation of a police officer.───他被指控冒充警官
88 、Besides, killing from a distance is so impersonal.─── 況且 遠(yuǎn)距離狙擊也太沒人情味了
89 、Specifies that DCOM determines the impersonation level using its standard security negotiation algorithm.───指定DCOM使用其標(biāo)準(zhǔn)安全協(xié)商算法確定模擬級(jí)別。
90 、SAKA protocol does not achieve key-compromise impersonation .───SAKA協(xié)議不具有密鑰泄露安全性。
chap什么證書?
CHAP(挑戰(zhàn)-握手驗(yàn)證協(xié)議 Challenge-Handshake Authentication Protocol)是一種加密的驗(yàn)證方式,能夠避免建立連接時(shí)傳送用戶的真實(shí)密碼。NAS向遠(yuǎn)程用戶發(fā)送一個(gè)挑戰(zhàn)口令(challenge),其中包括會(huì)話ID和一個(gè)任意生成的挑戰(zhàn)字串(arbitrary challengestring)。遠(yuǎn)程客戶必須使用MD5單向哈希算法(one-way hashing algorithm)返回用戶名和加密的挑戰(zhàn)口令,會(huì)話ID以及用戶口令,其中用戶名以非哈希方式發(fā)送。
CHAP對PAP進(jìn)行了改進(jìn),不再直接通過鏈路發(fā)送明文口令,而是使用挑戰(zhàn)口令以哈希算法對口令進(jìn)行加密。因?yàn)榉?wù)器端存有客戶的明文口令,所以服務(wù)器可以重復(fù)客戶端進(jìn)行的操作,并將結(jié)果與用戶返回的口令進(jìn)行對照。CHAP為每一次驗(yàn)證任意生成一個(gè)挑戰(zhàn)字串來防止受到再現(xiàn)攻擊(replay attack)。在整個(gè)連接過程中,CHAP將不定時(shí)的向客戶端重復(fù)發(fā)送挑戰(zhàn)口令,從而避免第3方冒充遠(yuǎn)程客戶(remote client impersonation)進(jìn)行攻擊
冒名的意思是什么冒名是什么意思
冒名的意思是什么?冒名是什么意思?
冒名的意思是:冒名mào míng假托他人名義?!駮x袁宏《后漢紀(jì)•質(zhì)帝紀(jì)》:「﹝冀﹞多斥奪諸梁在位者,外以為謙讓。唯孫氏宗親相冒名為侍中、中郎、校尉、守、長吏者十余人,皆貪叨兇**。」 ●宋司馬光《約束州縣抑配青苗錢白札子》:「有無賴子弟,謾昧尊長,錢不入家;亦有它人冒名詐偽請去,莫知為誰?!?●明何景明《<獸紀(jì)>序》:「予惡世有冒名徇利,務(wù)相欺負(fù),而寡情實(shí)者焉。」 ●巴金《沉默集·知識(shí)階級(jí)》:「這是別人冒名的,我事前一點(diǎn)兒也不知道?!埂该懊乖凇稘h語大詞典》第7119頁第5卷664「冒名」在《現(xiàn)代漢語詞典》第878頁「冒名」在《重編國語辭典》的解釋冒名mào míng假托他人名義。▶晉·袁宏《后漢紀(jì)•質(zhì)帝紀(jì)》:「﹝冀﹞多斥奪諸梁在位者,外以為謙讓。唯孫氏宗親相冒名為侍中、中郎、校尉、守、長吏者十余人,皆貪叨兇**?!?▶宋·司馬光《約束州縣抑配青苗錢白札子》:「有無賴子弟,謾昧尊長,錢不入家;亦有它人冒名詐偽請去,莫知為誰?!?▶明·何景明《<獸紀(jì)>序》:「予惡世有冒名徇利,務(wù)相欺負(fù),而寡情實(shí)者焉?!?▶巴金《沉默集•知識(shí)階級(jí)》:「這是別人冒名的,我事前一點(diǎn)兒也不知道?!?/p>
冒名的拼音mào míng
冒名是什么意思
冒名
mào míng
假托他人名義。
●晉袁宏《后漢紀(jì)•質(zhì)帝紀(jì)》:「﹝冀﹞多斥奪諸梁在位者,外以為謙讓。唯孫氏宗親相冒名為侍中、中郎、校尉、守、長吏者十余人,皆貪叨兇**。」
●宋司馬光《約束州縣抑配青苗錢白札子》:「有無賴子弟,謾昧尊長,錢不入家;亦有它人冒名詐偽請去,莫知為誰。」
●明何景明《<獸紀(jì)>序》:「予惡世有冒名徇利,務(wù)相欺負(fù),而寡情實(shí)者焉?!?/p>
●巴金《沉默集·知識(shí)階級(jí)》:「這是別人冒名的,我事前一點(diǎn)兒也不知道。」
「冒名」在《漢語大詞典》第7119頁第5卷664
「冒名」在《現(xiàn)代漢語詞典》第878頁
「冒名」在《重編國語辭典》的解釋
冒名
mào míng
假托他人名義。
▶晉·袁宏《后漢紀(jì)•質(zhì)帝紀(jì)》:「﹝冀﹞多斥奪諸梁在位者,外以為謙讓。唯孫氏宗親相冒名為侍中、中郎、校尉、守、長吏者十余人,皆貪叨兇**?!?/p>
▶宋·司馬光《約束州縣抑配青苗錢白札子》:「有無賴子弟,謾昧尊長,錢不入家;亦有它人冒名詐偽請去,莫知為誰?!?/p>
▶明·何景明《<獸紀(jì)>序》:「予惡世有冒名徇利,務(wù)相欺負(fù),而寡情實(shí)者焉?!?/p>
▶巴金《沉默集•知識(shí)階級(jí)》:「這是別人冒名的,我事前一點(diǎn)兒也不知道。」
冒名的英語單詞1.take a false name
2.impersonation
3.sybil attack
4.personation
5.assume another's name;go under *** . else's name
用冒名造句
1.冒名,假名,筆名作家假托的他人之名,通常是歷史人物的名字
2.冒名者從該城的商人那里騙取了大筆金錢。
3.您也許以為我是冒名頂替的。
4.奇怪的是,馬西后來耗費(fèi)大量筆墨談?wù)摪材取ぐ驳律亲苑Q安娜斯塔西婭之人,以及其他冒名者。
5.他由于冒名頂替別人參加考試而被趕出考場。
6.裝出假面目的人;冒名頂替者。
本站其他內(nèi)容推薦
1、eatable lento Nordic dendritic groomsman forceps gusty extirpation Shawnee shortbread
2、漂亮女孩英語(pretty girls是什么意思中文翻譯、發(fā)音、用法及例句)
3、coming soon中文意思(comingsoon中文翻譯,comingsoon是什么意思,comingsoon發(fā)音、用法及例句)
4、收園結(jié)果的意思,收園結(jié)果成語解釋,收園結(jié)果是什么意思含義寓意
6、comportable是什么意思,comportable中文翻譯,comportable怎么讀、發(fā)音、用法及例句
7、邀請函的英文,英語,invitations是什么意思,invitations中文翻譯,invitations怎么讀、發(fā)音、用法及例句
8、kieserite是什么意思,kieserite中文翻譯,kieserite怎么讀、發(fā)音、用法及例句
9、lockage是什么意思,lockage中文翻譯,lockage怎么讀、發(fā)音、用法及例句
10、蘋果的英文,英語,malic是什么意思,malic中文翻譯,malic怎么讀、發(fā)音、用法及例句
11、sledgehammer
版權(quán)聲明: 本站僅提供信息存儲(chǔ)空間服務(wù),旨在傳遞更多信息,不擁有所有權(quán),不承擔(dān)相關(guān)法律責(zé)任,不代表本網(wǎng)贊同其觀點(diǎn)和對其真實(shí)性負(fù)責(zé)。如因作品內(nèi)容、版權(quán)和其它問題需要同本網(wǎng)聯(lián)系的,請發(fā)送郵件至 舉報(bào),一經(jīng)查實(shí),本站將立刻刪除。