古典吧>英语词典>impersonation翻译和用法

impersonation

英 [ɪmˌpɜːsəˈneɪʃən]

美 [ˌɪmpərsəˈneɪʃən]

n.  模拟,扮演,假扮(角色); 冒名顶替,假冒身份

复数:impersonations 

TOEFL计算机

BNC.20143 / COCA.21249

柯林斯词典

  • VERB 假冒;模仿
    If someoneimpersonatesa person, they pretend to be that person, either to deceive people or to make people laugh.
    1. He was returned to prison in 1977 for impersonating a police officer...
      他 1977 年因冒充警官而再次入狱。
    2. Tom was a brilliant mimic who could impersonate most of the college staff.
      汤姆的模仿能力是超一流的,他能惟妙惟肖地模仿学院里的大多数老师。

英英释义

noun

  • imitating the mannerisms of another person
      Synonym:personation
    1. pretending to be another person
        Synonym:imposture
      1. a representation of a person that is exaggerated for comic effect
          Synonym:caricatureimitation

        双语例句

        • This requires impersonation permissions at the server level.
          这要求在服务器级具有模拟权限。
        • Specifies whether the session state will revert to the hosting identity or use client impersonation.
          指定会话状态将恢复为宿主标识还是使用客户端模拟。
        • This provides authentication of the caller and also introduces Windows ACL-based security on the pipe and also impersonation of the caller.
          它给调用者提供了身份验证功能,并且还在管道中引入基于WindowsACL的安全功能以及调用方的模拟功能。
        • The scope of impersonation is at the server level.
          模拟范围处于服务器级别。
        • To use impersonation, the configuration must meet the requirement for delegation.
          若要使用模拟功能,配置必须满足委托的要求。
        • A thread that is impersonating a client has both a primary token and an impersonation token.
          一个正模拟客户端的线程拥有一个主令牌和一个模拟令牌。
        • You can authenticate and authorize callers at the Web server and then flow the caller's security context to the remote object by using impersonation.
          可以在Web服务器上对调用者进行身份验证和授权,然后使用模拟将调用者的安全性上下文传递给远程对象。
        • Other authentication issues revolve around timing such as when client impersonation comes into play.
          其它在某些特定时刻引发的认证问题,如当客户端正在进行身份模拟时;
        • The impersonation identity must have sufficient privileges to create categories.
          模拟身份必须具有足够的特权才能创建类别。
        • Analysis shows that this protocol resists spoofing, tracking, eavesdropping impersonation and replay attack and it is low-cost, high-efficiency and good-security.
          分析表明,该协议可以有效抵御非法读取、位置跟踪、窃听、伪装哄骗和重放等不安全问题,具有成本低、效率高、安全性高等特点。