N头条>英语词典>filch翻译和用法

filch

英 [fɪltʃ]

美 [fɪltʃ]

v.  偷(尤指小的或不贵重的物品)

过去分词:filched 过去式:filched 现在分词:filching 第三人称单数:filches 

TOEFLGRE

BNC.34453 / COCA.29500

柯林斯词典

  • VERB (尤指不构成严重犯罪地)偷
    If you say that someonefilchessomething, you mean they steal it, especially when you do not consider this to be a very serious crime.
    1. I filched some notes from his wallet.
      我从他的钱包里偷了几张钞票。

英英释义

verb

双语例句

  • Filch's office is a small room with a single oil lamping hanging from the ceiling.
    费尔奇的办公室是一间天花板上吊着一盏油灯、充斥着烤鱼气味的小屋。
  • It was Ginny who set the basilisk on the Mudbloods and Filch's cat
    是真妮把巴斯里斯克带给那些麻瓜血统的人和费乐奇的猫
  • Why on earth did filch want a Kwikspell course?
    费尔奇为什么要学习快速念咒课程呢?
  • Violate the act of intellectual property for instance, pilfer edition, still have filch the technical secret of other company and client information.
    比如侵犯知识产权的行为,盗版,还有窃取别的公司的技术秘密以及客户信息等。
  • As we all know, cryptanalysis is a very important part of cryptology and its main task is to filch classified information or bilk by breaking cipher or fabricating authentication.
    众所周知,密码分析是密码技术的重要组成部分,其主要任务是破译密码或伪造认证信息,实现窃取机密信息或进行诈骗破坏活动。
  • Authentication is the first line of defence in the network application system. The aim is authenticating the identification of both side of communication and preventing illegal users to filch and masquerade genuine users.
    身份验证是网络应用系统中的第一道防线,目的是验证通信双方的身份,防止非法用户窃取和假冒合法用户。
  • This article attempts to theft behavior shape, the analysis in addition to secret filch outside behavior, and defying theft also should maintain for stealing.
    本文试图对盗窃行为样态进行分析,认为除了秘密窃取行为之外,公然盗窃也应该认定为盗窃罪。
  • I filched some notes from his wallet.
    我从他的钱包里偷了几张钞票。
  • It would have made much more sense to deliver the parcel outside Hogwarts, what with Filch searching everyone who goes in and out.
    费尔奇对每个进出霍格沃茨的人都要搜查一番,凯蒂在校外把包裹交给我不是要明智得多吗?
  • Now, the malicious software can be used to filch secret information, send junk e-mails, personate somebody else illegally, and so on.
    现在的大多数恶意软件都用来窃取机密信息、发送垃圾邮件、冒充身份网上窃取资料等。