火范文>英语词典>impersonation翻译和用法

impersonation

英 [ɪmˌpɜːsəˈneɪʃən]

美 [ˌɪmpərsəˈneɪʃən]

n.  模拟,扮演,假扮(角色); 冒名顶替,假冒身份

复数:impersonations 

TOEFL计算机

BNC.20143 / COCA.21249

柯林斯词典

  • VERB 假冒;模仿
    If someoneimpersonatesa person, they pretend to be that person, either to deceive people or to make people laugh.
    1. He was returned to prison in 1977 for impersonating a police officer...
      他 1977 年因冒充警官而再次入狱。
    2. Tom was a brilliant mimic who could impersonate most of the college staff.
      汤姆的模仿能力是超一流的,他能惟妙惟肖地模仿学院里的大多数老师。

英英释义

noun

  • imitating the mannerisms of another person
      Synonym:personation
    1. pretending to be another person
        Synonym:imposture
      1. a representation of a person that is exaggerated for comic effect
          Synonym:caricatureimitation

        双语例句

        • Do you want to remove the impersonation and use the current user context instead?
          确实要删除模拟参数并使用当前用户上下文吗?
        • The scope of impersonation is at the server level.
          模拟范围处于服务器级别。
        • This impersonation information is not stored in the deployment script itself, if one is saved by the deployment wizard.
          如果部署向导保存一个部署脚本,则在此脚本中并不存储此模拟信息。
        • No security context is available to allow impersonation.
          没有安全上下文可用来允许模仿。
        • In her habits, she was a living impersonation of order, method, and exactness.
          她的生活习惯活生生地体现了井井有条,按部就班和精密细致等准则。
        • Analysis shows that this protocol resists spoofing, tracking, eavesdropping impersonation and replay attack and it is low-cost, high-efficiency and good-security.
          分析表明,该协议可以有效抵御非法读取、位置跟踪、窃听、伪装哄骗和重放等不安全问题,具有成本低、效率高、安全性高等特点。
        • You can authenticate and authorize callers at the Web server and then flow the caller's security context to the remote object by using impersonation.
          可以在Web服务器上对调用者进行身份验证和授权,然后使用模拟将调用者的安全性上下文传递给远程对象。
        • Client Impersonation is only available for Extended Stored Procedures.
          客户端模拟仅可用于扩展的存储过程。
        • Use if you are running a web site that can use impersonation and you can control the privileges of the impersonated user.
          如果您正在运行可以使用模拟功能的网站并且可以控制所模拟的用户的特权,那么可以使用该版本。
        • This is obviously a must-have to prevent impersonation attacks and, consequently, breach of privacy.
          这很显然是一个必须防止的模拟攻击,因此也会违背隐私权。