back


access + way to enter a place, e.g. a station or stadium


4 New HSK word(s): HSK2 + ba1 bar (loanword) (serving drinks, or providing Internet access etc); to puff (on a pipe etc); (onom.) bang HSK2 + cong2 from; via; passing through; through (a gap); past; ever (followed by negative, meaning never); (formerly pr.zong4and related to 纵/纵) to follow; to comply with; to obey; to join; to engage in; adopting some mode of action or attitude; follower; retainer; accessory; accomplice; related by common paternal grandfather or earlier ancestor HSK5 接触 + jie1chu4 to touch; to contact; access; in touch with HSK6 闭塞 + bi4se4 to stop up; to close up; hard to get to; out of the way; inaccessible; unenlightened; blocking
2 Old HSK word(s): C v;n * zhuang1shi4 dress-adorn/ decorate/ adorn/ ornament/ accessory D * jiu4 zhi2 accession

就职



他经常去酒~喝酒。

Nó +

~我家到公司,开车要 20 分钟。

Từ +

Liên hệ +

Tắc +
Grade E word(s):








GbEngViet
他的时间排得很满,学生根本无法和他接触。 His busy schedule made him completely inaccessible to his students.
资料应该明白易懂。 The information ought to be made more accessible.
他是她的私人秘书, 能接触到她所有的信件. As her private secretary he has access to all her correspondence.
为了加强数据的保护,防止非法的存取,用于评价计算机系统、存储空间和运行过程完整程度的一种指标。 A term applied to a computer system, spaces, or operating procedures when considering the protection of data from corruption or unauthorized access.
市民可以免费使用这个图书馆。 Citizens may have free access to the library.
文件每日存取, 使之不断更新. The files were accessed every day to keep them up to date.
这些附件及专用工具的费用应包括在该品目的基本价格之中。 The cost of these accessories and special tools shall be included in the basic price of the item.
在计算机安全学中,一种对存取受到控制的实体的特征的描述。 In computer security, a description of the characteristics of an entity to which access is controlled.
超文本一种计算机的文本查寻系统,此系统能够给使用者提供与某一特定文本相关的信息 A computer-based text retrieval system that enables the user to provide access to or gain information related to a particular text.
为保证设备的正常运转,每个品目都应包括一套标准定额的附件和专用工具。 Every item shall include a standard complement of accessories and special tools to ensure the normal operation.
他援引教授物理学方面的一些运动定律为例,说明当计算机用于辅助教学时,学生在幼年就能够理解这些定律。 He cites as an example the teaching of the laws of motion in physics, which he says are accessible at an early age when a computer is used to assist in the instruction.
在数据保密学中,通过合法访问数据的进程将数据传输给未授权的用户的过程。例如,编译程序在编译期间便可能泄漏专用程序。 In data security, the transmission of data to unauthorized users by processes with legitimate access to data. A compiler, for example, could leak a proprietary program whilst it is being compiled.
技术规范中叙述了每台设备或全部设备所需的附件、专用工具和消耗件。 Accessories, special tools and expendable required with each unit or totally are described in the technical specification.