MY字典>英语词典>impersonate翻译和用法

impersonate

英 [ɪmˈpɜːsəneɪt]

美 [ɪmˈpɜːrsəneɪt]

v.  冒充; 假扮; 扮演

现在分词:impersonating 第三人称单数:impersonates 过去分词:impersonated 过去式:impersonated 

TOEFLGRETEM8法律

Collins.1 / BNC.19941 / COCA.18460

牛津词典

    verb

    • 冒充;假扮;扮演
      to pretend to be sb in order to trick people or to entertain them
      1. He was caught trying to impersonate a security guard.
        他假扮警卫被抓获。
      2. They do a pretty good job of impersonating Laurel and Hardy.
        他们扮演劳莱和哈代很成功。

    柯林斯词典

    • VERB 假冒;模仿
      If someoneimpersonatesa person, they pretend to be that person, either to deceive people or to make people laugh.
      1. He was returned to prison in 1977 for impersonating a police officer...
        他 1977 年因冒充警官而再次入狱。
      2. Tom was a brilliant mimic who could impersonate most of the college staff.
        汤姆的模仿能力是超一流的,他能惟妙惟肖地模仿学院里的大多数老师。

    英英释义

    verb

    • pretend to be someone you are not
      1. She posed as the Czar's daughter
      Synonym:posepersonate
    • represent another person with comic intentions
      1. assume or act the character of
        1. She impersonates Madonna
        2. The actor portrays an elderly, lonely man
        Synonym:portray

      双语例句

      • I love it when you two impersonate earthlings.
        我很喜欢你们两个假扮普通人。
      • Failed to impersonate client when receiving response.
        接受响应时,模拟客户端失败。
      • Existing Linked Server Login's local name, remote name, password, and Impersonate setting cannot be changed.
        不能更改现有链接服务器登录的本地名称、远程名称、密码和模拟设置。
      • Enables the grantee to impersonate the login.
        允许被授权者模拟该登录名。
      • Impersonate on unsecure calls is not supported.
        不支持模拟不安全调用。
      • To have another woman impersonate her.
        让另外一个女人来扮演她。
      • It's against my programming to impersonate a deity.
        我的程式不能让我模仿神。
      • The name of a user that the user executing the command has impersonate permissions for.
        执行命令的用户拥有其模拟权限的用户的名称。
      • Since strong names are cryptographically verified, attackers cannot impersonate rightful assemblies and use their permissions.
        由于强名称以加密方式验证,所以,攻击者无法模拟合法的程序集和使用它们的权限。
      • If a user's Kerberos password is stolen by an attacker, then the attacker can impersonate that user.
        如果一个用户的Kerberos密码被攻击者窃取,攻击者就能够模拟该用户。