hackers 

99388
单词释义
n.黑客(秘密窥视或改变他人计算机系统信息)
hacker的复数
词根词缀记忆/谐音联想记忆 补充/纠错
词根hack 非法入侵 + er 的人 →  …………
词性拓展记忆 / 词形拓展记忆
原形:hacker复数:hackers
词组和短语补充/纠错
hacker attack 黑客攻击
单词例句
The hacker designed a computer virus.
这个黑客设计了一种电脑病毒。
This hacker had managed to get into the system.
这一个黑客设法侵入了系统。
The tackers broke into the Pentagon's security system last night.
昨晚有黑客闯入五角大楼的安保系统。
The hacker managed to breach the company's firewall and access sensitive data.
这名黑客成功突破了公司的防火墙,获取了敏感数据。
After hours of coding, the programmer identified and fixed a potential security flaw that could have been exploited by hackers.
经过几个小时的编码,程序员识别并修复了一个可能被黑客利用的安全漏洞。
The hacker used social engineering tactics to trick employees into revealing their login credentials.
该黑客使用社会工程学手段诱骗员工泄露他们的登录凭证。
Ethical hackers, also known as white hat hackers, help organizations improve their cybersecurity by finding vulnerabilities legally.
道德黑客,也称为白帽黑客,通过合法地发现漏洞帮助组织提升网络安全。
The cybercrime unit is working tirelessly to track down the hacker responsible for the major data breach.
网络犯罪部门正在不遗余力地追踪造成重大数据泄露的责任黑客。
In the movie, the protagonist is a skilled hacker who uses his abilities for good, stopping cyber attacks on critical infrastructure.
电影中的主角是一名技术高超的黑客,他用自己的能力做好事,阻止了对关键基础设施的网络攻击。
Companies often hire penetration testers, or ethical hackers, to simulate attacks and test the strength of their digital defenses.
公司常聘请渗透测试员或道德黑客来模拟攻击,测试其数字防御的强度。
The hacker forum was taken down by law enforcement agencies after a lengthy investigation.
经过长时间的调查,执法机构关闭了这个黑客论坛。
A group of anonymous hackers claimed responsibility for the website defacement, demanding better privacy laws.
一群匿名黑客声称对网站篡改负责,并要求出台更好的隐私保护法律。
With the rise of cryptocurrency, there has been an increase in hacking attempts targeting digital wallets.
随着加密货币的兴起,针对数字钱包的黑客攻击企图有所增加。
Be it smart light bulbs or self-driving vehicles, these devices have vulnerabilities that hackers could exploit," said Ian Lim, field chief security officer of Japan and Asia-Pacific at Palo Alto Networks, a global cybersecurity leader.
全球网络安全领导者Palo Alto Networks的日本和亚太地区现场首席安全官Ian Lim表示:“无论是智能灯泡还是自动驾驶汽车,这些设备都存在黑客可能利用的漏洞。
Another 44 percent of respondents said that IoT devices are micro-segmented within security zones — an industry best practice where organizations create tightly controlled security zones on their networks to isolate IoT devices to prevent hackers from moving laterally on a network.
另有44%的受访者表示,物联网设备在安全区内进行了细分——这是一种行业最佳实践,组织在其网络上创建严格控制的安全区,以隔离物联网设备,防止黑客在网络上横向移动。
The hostile attacks included network traffic attacks, hacker attacks and unfair scalping.
Hackers are very attracted to the high profile and value of online streaming services, said Patrick Sullivan, director of Akamai's Security Technology and Strategy.
Four Democratic senators have reportedly expressed concern that video surveillance cameras and the automated aspects of railway cars may be the tools of spies or hackers.
Facebook said 15 million people had their accounts compromised after hackers stole their sensitive information including their names, phone numbers, emails and other contact details, while 14 million users were illegally accessed for their user names, gender, religion, geographic location, birthday, work and education status.
The world's largest social media announced on Sept 28 that attackers exploited a vulnerability in Facebook's code that would allow hackers to steal access tokens used by Facebook users as login digital keys and then take control of their accounts.
"The security issue could let hackers steal Facebook access tokens used by Facebook users as login digital keys and then take control of their accounts, Facebook said in a blog post.
"Entering a new era of big data, cybersecurity will become as important as money, and online data will become a key target of criminals and hackers," Qi said.
NAIROBI — Governments and corporations should invest in cloud computing that promises better data storage and retrieval options while protecting it from intrusion by hackers, a Huawei executive said on Thursday in a commentary published by Kenya's daily newspaper People.
考试真题例句(机器翻译仅供参考)
全部
考研
六级
四级

考研We often hear media reports that an unauthorized hacker has been able to access a computer database and to alter information stored there.

我们经常听到媒体报道说,一名未经授权的黑客能够访问计算机数据库并更改存储在那里的信息。

2013年考研真题(英语二)完形填空 Section Ⅰ

六级Andrew Hacker, Queens College political science professor, thinks that advanced algebra and other higher-level math should be cut from curricula in favor of courses with more routine usefulness, like statistics.

皇后学院政治学教授安德鲁·哈克(Andrew Hacker)认为,高等代数和其他更高层次的数学应该从课程中删去,而改为更实用的课程,如统计学。

2018年12月六级真题(第二套)阅读 Section C

六级"I'm going to leave it to those who are in mathematics to work out the ways to make their subject interesting and exciting so students want to take it," Hacker says. "All that I ask is that alternatives be offered instead of putting all of us on the road

哈克说:“我将把它留给那些数学专业的学生,让他们找到让他们的学科有趣和令人兴奋的方法,这样学生们就会愿意学习。”我所要求的是提供替代方案,而不是让我们所有人上路

2018年12月六级真题(第二套)阅读 Section C

六级Hacker's argument has met with opposition from other math educators who say what's needed is to help students develop a better relationship with math earlier, rather than teaching them less math altogether.

哈克的观点遭到了其他数学教育工作者的反对,他们说,我们需要的是帮助学生更早地发展与数学的关系,而不是教他们更少的数学。

2018年12月六级真题(第二套)阅读 Section C

六级Such courses, Hacker argues, are a remedy for the numerical illiteracy of adults who have completed high-level math like algebra but are unable to calculate the price of, say, a carpet by area.

哈克认为,这样的课程是对成年人数字文盲的一种补救,他们已经完成了像代数这样的高级数学课程,但无法计算地毯的价格。

2018年12月六级真题(第二套)阅读 Section C

考研I found, as Hacker observed years before, that most wives want their husbands to be, first and foremost, conversational partners, but few husbands share this expectation of their wives.

我发现,正如哈克多年前所观察到的那样,大多数妻子希望他们的丈夫首先是谈话的伙伴,但很少有丈夫对妻子抱有同样的期望。

2010年考研真题(英语二)阅读理解 Section Ⅱ

六级Instead, Hacker is pushing for more courses like the one he teaches at Queens College: Numeracy 101.

相反,哈克正在推动更多的课程,比如他在皇后学院教授的课程:算术101。

2018年12月六级真题(第二套)阅读 Section C

四级It does not produce computer hackers and nerds.

它不会产生电脑黑客和书呆子。

2015年12月阅读原文

四级So while there're plenty of hackers who could start startups, there's no one to invest in them.

所以,虽然有很多黑客可以创业,但没有人可以投资。

2015年12月四级真题(第二套)阅读 Section C

六级"I'm going to leave it to those who are in mathematics to work out the ways to make their subject interesting and exciting so students want to take it," Hacker says.

哈克说:“我将把它留给那些数学专业的学生,让他们找到让他们的学科有趣和令人兴奋的方法,这样学生们就会愿意学习。”。

2018年12月六级真题(第二套)阅读 Section C

六级In several recent incidents, hackers have been able to obtain massive information of credit-debit-(借记)or prepaid-card numbers using malware, i. e. malicious software, inserted secretly into the retailers’ point-of-sale system—the checkout registers.

在最近的几起事件中,黑客已经能够获得大量的信用借记信息-(借记)或使用恶意软件的预付卡号码,即恶意软件,秘密插入零售商的销售点系统——收银台。

2015年6月大学英语六级考试真题(三)

六级If Apple is forced to write code that lets the get into the Phone 5c used by Syed Rizwan Farook, the male attacker in the San Bernardino attack, who would be responsible if some hacker got hold of that code and broke into its other devices?

如果苹果公司被迫编写代码,让它进入圣贝纳迪诺袭击事件中的男性攻击者Syed Rizwan Farook使用的Phone 5c,如果有黑客掌握了这些代码并侵入了它的其他设备,谁来负责?

2017年12月英语六级考试真题(卷三)

六级Instead, Hacker is pushing for more courses like the one he teaches at Queens College: Numeracy 10 There, his students of “citizen statistics learn to analyze public information like the federal budget and corporate reports.

相反,Hacker正在推动更多的课程,比如他在皇后学院教授的课程:算术10在那里,他的“公民统计”学生学习分析联邦预算和企业报告等公共信息。

2018年12月6级真题第二套

四级So while there're plenty of hackers (电脑迷) who could start startups, there's no one to invest in them Do you really need the rich people?

所以,尽管有很多黑客(电脑迷) 谁可以创办初创公司,没有人可以投资

2015年12月大学英语四级考试真题(第3套)

未经许可,严禁转发。QQ交流群:688169419
0
近7天助记贡献排行榜
网友新增怎么记信息
最新查询次数奖励榜
0