读知识>英语词典>intercepts翻译和用法

intercepts

英 [ˌɪntəˈsepts]

美 [ˌɪntərˈsepts]

v.  拦截; 拦阻; 截住
intercept的第三人称单数和复数

柯林斯词典

  • VERB 拦截;截住;截击
    If youinterceptsomeone or something that is travelling from one place to another, you stop them before they get to their destination.
    1. Gunmen intercepted him on his way to the airport...
      持枪歹徒在他去机场的路上截击了他。
    2. Dodd intercepted a ball intended for Smith...
      多德拦截了给史密斯的球。
    3. His letter was intercepted by the Secret Service.
      他的信被特工处截获了。

双语例句

  • Get me intercepts on their cell phones.
    给我截取他们的手机。
  • When it intercepts the event, the plug-in retrieves the file name and changes its label.
    当它拦截事件时,插件检索文件名并更改其标号。
  • CoLinux intercepts these and passes the data to the coLinux-net-daemon which ultimately sends it out via the Windows API.
    coLinux截取这些调用,并将数据传递到coLinux-net-daemon,由它来通过WindowsAPI最终将数据发送出去。
  • Get/ setProperty() intercepts access to all properties
    get/setProperty()拦截对所有属性的访问
  • This file is an XML document that contains the configuration options that tell the monitor what it needs to monitor and where it needs to log the messages it intercepts.
    此文件是一个包含配置选项的XML文档,这些配置选项告知监视器它需要监视什么和它需要在哪里记录它拦截的消息。
  • The interceptor above intercepts the call to the target EJB method, then calls the proceed() method on the InvocationContext.
    上面的拦截器拦截对目标EJB方法的调用,然后调用InvocationContext上的proceed()方法。
  • Intermediation requires the intermediating system to understand at least some of the semantics of the messages it intercepts.
    “仲裁要求仲裁系统对于它所拦截的消息的语义至少有些理解”。
  • AFS servers are user-level applications, however, AFS has a kernel module that intercepts calls to AFS space.
    AFS服务器是一些用户级的应用程序,但AFS也具有内核模式,可拦截对AFS空间的调用。
  • An iRule uses an easy-to-learn scripting syntax that enables the BIG-IP LTM to customize how it intercepts, inspects, transforms, and directs inbound or outbound application traffic.
    每个iRule使用一个容易学习的脚本语法,来定制BIG-IPLTM如何截获、检查、转换和指示入站或出站应用传输。
  • That way, he said, even if an attacker intercepts a password, they cannot use it to log into a site without the second password.
    他说,通过这种方式,即便攻击者截获了某个密码,他们也无法在没有第二个密码的情况下用其登录网站。