impersonate
英 [ɪmˈpɜːsəneɪt]
美 [ɪmˈpɜːrsəneɪt]
v. 冒充; 假扮; 扮演
现在分词:impersonating 第三人称单数:impersonates 过去分词:impersonated 过去式:impersonated
Collins.1 / BNC.19941 / COCA.18460
牛津词典
verb
- 冒充;假扮;扮演
to pretend to be sb in order to trick people or to entertain them- He was caught trying to impersonate a security guard.
他假扮警卫被抓获。 - They do a pretty good job of impersonating Laurel and Hardy.
他们扮演劳莱和哈代很成功。
- He was caught trying to impersonate a security guard.
柯林斯词典
- VERB 假冒;模仿
If someoneimpersonatesa person, they pretend to be that person, either to deceive people or to make people laugh.- He was returned to prison in 1977 for impersonating a police officer...
他 1977 年因冒充警官而再次入狱。 - Tom was a brilliant mimic who could impersonate most of the college staff.
汤姆的模仿能力是超一流的,他能惟妙惟肖地模仿学院里的大多数老师。
- He was returned to prison in 1977 for impersonating a police officer...
英英释义
verb
- pretend to be someone you are not
- She posed as the Czar's daughter
- represent another person with comic intentions
- assume or act the character of
- She impersonates Madonna
- The actor portrays an elderly, lonely man
双语例句
- I think he's the perfect candidate to impersonate.
我觉得他是我们乔装的最佳人选。 - Impersonate on unsecure calls is not supported.
不支持模拟不安全调用。 - With the token of the legitimate user in hand, the attacker can proceed to act as the user in interaction with the site, thus to impersonate the user.
手边有了合法用户的标记,黑客可以继续扮演用户与站点交互,从而冒充用户。 - Moreover, a thread can impersonate a client account.
而且(此外),一个线程可以模拟一个客户端帐户。 - Unable to impersonate using a named pipe until data has been read from that pipe.
在使用命名管道读取数据之前,无法经由该管道模拟。 - If you impersonate a police officer once again. understand?
如果你再次冒充政府官员,明白了? - I love it when you two impersonate earthlings.
我很喜欢你们两个假扮普通人。 - Do not give others your password, because that would allow them to use your certificate to impersonate you.
不要把您的口令告诉别人,因为别人可能会以您的名义使用您的“证书”。 - Object, callers can impersonate the client account and perform actions on their behalf.
对象之后,调用方可以模拟客户端帐户并代表调用方执行操作。 - If a user's Kerberos password is stolen by an attacker, then the attacker can impersonate that user.
如果一个用户的Kerberos密码被攻击者窃取,攻击者就能够模拟该用户。