您要查找的是不是:
- Its weaknesses can be exploited by the right players. 它的弱点可以被合适的球员抓住。
- This point will be exploited by some people as a basis for their theories of national subjugation and of compromise. 这一点,将被人利用作为亡国论和妥协论的根据。
- All the fossils were exploited by an expedition. 所有的化石都是由一支探险队开发出来。
- Be careful to ensure that you do not provide any information that could be exploited by malicious code. 请务必确保您没有提供任何会被恶意代码利用的信息。
- We want their analytical skills to reach full development so that they cannot be exploited by this society. 我们要求子女要完全发展其分析判断能力,这样他们才不会被这个社会所吞没。
- The selectivity of MIPs could also be exploited by the pharmaceutical industry to make purer drugs. 制药工业也可以利用MIP的选择功能来纯化药物。
- That is to say,they,too,are exploited by the capitalists. 这就是说,他们也是受资本家剥削的。
- That is to say, they, too, are exploited by the capitalists. 这就是说,他们也是受资本家剥削的。
- Capitalists exploit workers. Workers are exploited by capitalists. 资本家剥削工人。工人被资本家剥削。
- The poor peasants are tenant-peasants who are exploited by the landlords. 贫农是农村中的佃农,受地主的剥削。
- They are exploited by intermediaries , hitch hiker sand other parasites . 他们利用中间人顺山砂等寄生虫.
- In some illegal coal mines, children under 18 are exploited by mine owners. 在一些非法煤矿中,矿主剥削未满18岁的孩子。
- A vulnerability has been reported in Winamp, which can be exploited by malicious people to compromise a use... 看到这个消息真的很惊讶,这个几乎每个人都会用的播放器,引起的安全问题可不是下面那么简单的几个字。
- If less productive opportunities are exploited by farmers before productive ones, something else is wrong. 如果农民选取的不是效益较大的机会而是效益较小的机会,那就是其他某些地方出了问题。
- The manipulation was uncovered, publicised and is being exploited by opposition candidates: the system worked. 暗箱操控虽然被揭露,选举系统仍在运行,广告和被利用的选举权利仍然存在。
- Once in power, their lack of cohesion led to internecine squabbles, which in turn were exploited by Mrs Gandhi, leading to Janata's downfall. 一旦掌了权,他们之间的龃龉就导致内部的互相攻讦。甘地夫人利用这一点搞垮了人民党的政府。
- This fact about English has long been exploited by poets in creating the English language's most common erse form, iambic pentameter. 英语里的这种语言现象在很久以前就被诗人运用在诗歌里,如英语里最常见的韵律形式,抑扬格的五步音诗。
- Any vulnerabilities present in URL interpretation (e.g. unicode, double-decode) can be exploited by tampering with the server and path of the URL. 任何漏洞在当前网址的解释(例如码、双解码)都可能篡改服务器和路径的网址并加以利用。
- Unsafe expressions contain methods or functions that could be exploited by malicious users to access drives, files, or other resources for which they do not have authorization. 恶意用户可以利用不安全表达式中包含的方法或函数,来访问他们无权访问的驱动器、文件或其他资源。
- We live in an age where everything from tax records to credit card data resides in databases that can be exploited by anyone with sinister motives and e-nough know-how. 我们生活在这样一个时代里,从税务记录到信用卡资料都寄存于数据库里,数据库可以被任何有险恶用心的人和对此技术有足够了解的人所利用。