英文字典中文字典


英文字典中文字典51ZiDian.com



中文字典辞典   英文字典 a   b   c   d   e   f   g   h   i   j   k   l   m   n   o   p   q   r   s   t   u   v   w   x   y   z       







请输入英文单字,中文词皆可:

inaugurate    音标拼音: [ɪn'ɔgjɚɪt] [ɪn'ɔgjɚet]
vt. 开创,举行…开幕典礼

开创,举行…开幕典礼

inaugurate
v 1: commence officially [synonym: {inaugurate}, {kick off}]
2: open ceremoniously or dedicate formally
3: be a precursor of; "The fall of the Berlin Wall ushered in
the post-Cold War period" [synonym: {inaugurate}, {usher in},
{introduce}]

Inaugurate \In*au"gu*rate\, a. [L. inauguratus, p. p. of
inaugurare to take omens from the flight of birds (before
entering upon any important undertaking); hence, to
consecrate, inaugurate, or install, with such divination;
pref. in- in augurare, augurari, to augur. See {Augur}.]
Invested with office; inaugurated. --Drayton.
[1913 Webster]


Inaugurate \In*au"gu*rate\, v. t. [imp. & p. p. {Inaugurated};
p. pr. & vb. n. {Inaugurating}.]
[1913 Webster]
1. To introduce or induct into an office with suitable
ceremonies or solemnities; to invest with power or
authority in a formal manner; to install; as, to
inaugurate a president; to inaugurate a king. --Milton.
[1913 Webster]

2. To cause to begin, esp. with formality or solemn ceremony;
hence, to set in motion, action, or progress; to initiate;
-- used especially of something of dignity or worth or
public concern; as, to inaugurate a new era of things, new
methods, etc.
[1913 Webster]

As if kings did choose remarkable days to inaugurate
their favors. --Sir H.
Wotton.
[1913 Webster]

3. To celebrate the completion of, or the first public use
of; to dedicate, as a statue. [Colloq.]
[1913 Webster]

4. To begin with good omens. [Obs.] --Sir H. Wotton.
[1913 Webster]

87 Moby Thesaurus words for "inaugurate":
anoint, author, bear, beget, breed, bring about, bring forth,
bring to effect, bring to pass, bring up, broach, cause, chair,
christen, coin, commence, conceive, constitute, create, crown, do,
effect, effectuate, engender, enlist, enroll, enter, enthrone,
establish, father, float, form, found, generate, gestate, get off,
give birth to, give occasion to, give origin to, give rise to,
incept, induct, initiate, innovate, install, instate, institute,
introduce, invent, invest, jump off, kick off, launch, lift up,
make, materialize, mint, neologize, neoterize, occasion, open,
ordain, organize, originate, place, place in office, produce,
put in, raise, realize, renew, renovate, ring in, set afloat,
set agoing, set on foot, set up, sign on, sign up, sire, start,
start going, start up, throne, turn on, usher in, work


请选择你想看的字典辞典:
单词字典翻译
inaugurate查看 inaugurate 在百度字典中的解释百度英翻中〔查看〕
inaugurate查看 inaugurate 在Google字典中的解释Google英翻中〔查看〕
inaugurate查看 inaugurate 在Yahoo字典中的解释Yahoo英翻中〔查看〕





安装中文字典英文字典查询工具!


中文字典英文字典工具:
选择颜色:
输入中英文单字

































































英文字典中文字典相关资料:


  • Question about IPv4 IPv6 detail i noticed when checking my network
    I was just looking at a detailed list of my wifi connection setup and i noticed that where the IPv4 6 details were listed, next to both in parentheses it said unencrypted Should i be concerned about that if so how would i go about encrypting those?
  • WSTG - Latest - OWASP Foundation
    If the application transmits sensitive information via unencrypted channels - e g HTTP - it is considered a security risk Attackers can take over accounts by sniffing network traffic Some examples are Basic authentication which sends authentication credentials in plain-text over HTTP, form based authentication credentials sent via HTTP, or
  • Information sent using unencrypted channels - beaglesecurity. com
    Sending data through unencrypted channels creates severe security risks Learn how attackers intercept unprotected transmissions and implement proper encryption to safeguard sensitive information
  • The Growing Dangers of Unencrypted Devices - Absolute
    To better understand the risks of unencrypted devices, explore the dangers of unsecured internet traffic and how it can expose organizations to potential data breaches Adopting a Zero Trust security approach is a proven strategy to mitigate risks and protect data across hybrid environments
  • Testing for Sensitive Information Sent via Unencrypted Channels (WSTG . . .
    To check if this information is transmitted over HTTP instead of HTTPS, capture traffic between a client and web application server that needs credentials For any message containing sensitive data, verify the exchange occurred using HTTPS
  • Testing for Sensitive Information Sent via Unencrypted Channels
    To check if this information is transmitted over HTTP instead of HTTPS, capture traffic between a client and web application server that needs credentials For any message containing sensitive data, verify the exchange occurred using HTTPS
  • Unencrypted Communications - turingsecure
    Unencrypted communications is a vulnerability in the network communication protocols of web and API; as well as infrastructure This vulnerability occurs when data is sent over the network without encryption, making the data vulnerable to interception
  • Understanding Data Vulnerability: Risks Of Unencrypted Data In Transit . . .
    Unencrypted data poses significant risks to businesses and individuals, leading to data breaches, financial loss, and reputational damage Encryption effectively protects against these risks by ensuring data confidentiality, integrity, and authentication
  • M5: Insecure Communication – OWASP Mobile Top 10 - ASPIA InfoTech
    Insecure communication refers to the transmission of sensitive information over unsecured channels, making it susceptible to eavesdropping, man-in-the-middle attacks, and data interception
  • Unencrypted communications - Probely
    Such attacks are more likely to occur when the victim is using an insecure Wi-Fi connection, a typical scenario in the public Wi-Fi services Unencrypted connections may also trigger browser warnings about the insecurity of the connection, following the trend of raising awareness about privacy
  • CWE-319 : Cleartext Transmission of Sensitive Information - CVEdetails. com
    Session sidejacking takes advantage of an unencrypted communication channel between a victim and target system The attacker sniffs traffic on a network looking for session tokens in unencrypted traffic
  • WSTG - v4. 1 | OWASP Foundation
    The analysis focuses simply on trying to understand if the data travels unencrypted from the web browser to the server, or if the web application takes the appropriate security measures using a protocol like HTTPS
  • IS 360 Sociology Quiz 3: Key Terms Definitions Flashcards
    Study with Quizlet and memorize flashcards containing terms like Address resolution protocol (ARP) poisoning, False, False and more
  • FBI Warns: Unencrypted Messaging Puts Your Privacy at Risk—Here’s How . . .
    In light of recent cybersecurity concerns, the FBI has issued a warning to smartphone users about the vulnerabilities associated with unencrypted messaging services SMS or Text messages lack end-to-end encryption, making them susceptible to interception by malicious actors
  • encryption - Degree of safety of an unencrypted hard-drive and the . . .
    Computers use access control to restrict access, but there must be encryption to prevent people from hacking into root privilege I read about data security on an unencrypted hard drive and got conflicting information Aikore Edmund states that:





中文字典-英文字典  2005-2009