攻击
- 与 攻击 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
Earlier I had spoken with a pilot of the F-15E Strike Eagle, an impressive all-weather ground attack version of the plane.
我刚才已发言的一个飞行员的 F - 15 E攻击鹰,令人印象深刻的所有天气地面攻击版本的飞机。
-
Avoid suffer meaningless attack, every user has independent IP, when the other user on fictitious lead plane suffers attack, won't be affected
免受无谓攻击,每个用户都有独立IP,当虚拟主机上的其它用户遭受攻击时,不会受到影响
-
This is a malicious attacker is a favorite target.
这是一个恶意攻击者很喜欢的一个攻击目标。
-
If an attacker hits the barriers there is a 10% chance of being stunned for 3 seconds.
如果被攻击。攻击者有10%的概率被打晕 3 秒。
-
Aiming at the diversification of function system and homing modes in the development of submarine-launched torpedo, this paper analyses the advantages in operational application of wake homing torpedo based on its mechanism, such as stronger counter-countermeasure, higher speed, and higher target acquisition probability for selected target. It also analyses the limitations in tactics, such as limited attacking speed and the types of attackable targets, greater loss in torpedo range, difficult combination with wire-guidance, and inaccurate attack on moving targets.
针对国内外潜射鱼雷在功能体制和制导方式等技术环节多元化发展的局面,基于尾流自导鱼雷制导原理,分析了尾流自导鱼雷在作战使用上的技术优势:抗干扰能力强,适宜高速制,可选择攻击目标和捕获概率高;以及其战术局限性:可攻目标的类型及速度受限,鱼雷航程损失大,与线导结合困难,对机动目标攻击效果较差。
-
The instantaneous speed of attacking target in positive side to lift knee round kick (8.68 + 0.92m/sec) is better than from flank to lift knee round kick (6.22 ± 1.01m.sec).
二、 正抬脚回旋踢有较佳的攻击效果,其攻击腿击中踢靶的瞬间速度为8.67±0.92公尺/秒,侧面抬脚回旋踢仅为6.22±1.01公尺/秒,两者均达显著差异。
-
Bacchae petitioners are generally nonviolent,fleeing if attacked--or more likely offering bread and mead to their assailants.
浆果者通常不喜欢使用暴力,一旦受到攻击就会逃掉——或者向他们的攻击者提供面包和蜜酒来借此逃脱。
-
Mrs Clinton was clearly helped by her decision to mount a bare-knuckle assault on Mr Obama in the days before the election.
希拉里在选前这几天对奥巴马的密集攻击(译注:原文为贴身肉搏似的攻击)收到了成效。
-
The above example only counts as one attack, and is not considered bashing.
以上的例子只算一次攻击,而且并不在过度攻击的范畴内。
-
Attack and its defends to be two sides that closely related with of network security , further investigate , attack theory and technology can protect network security of information system effectively.
攻击和防御是网络安全的两个密切相关的侧面,不深入研究攻击理论和技术就不能有效地保护网络信息系统的安全。
- 推荐网络例句
-
However, as the name(read-only memory)implies, CD disks cannot be written onorchanged in any way.
然而,正如其名字所指出的那样,CD盘不能写,也不能用任何方式改变其内容。
-
Galvanizes steel pallet is mainly export which suits standard packing of European Union, the North America. galvanizes steel pallet is suitable to heavy rack. Pallet surface can design plate type, corrugated and the gap form, satisfies the different requirements.
镀锌钢托盘多用于出口,替代木托盘,免薰蒸,符合欧盟、北美各国对出口货物包装材料的法令要求;喷涂钢托盘适用于重载上货架之用,托盘表面根据需要制作成平板状、波纹状及间隔形式,满足不同的使用要求。
-
A single payment file can be uploaded from an ERP system to effect all pan-China RMB payments and overseas payments in all currencies.
付款指令文件可从您的 ERP 系统上传到我们的电子银行系统来只是国内及对海外各种币种付款。