snooping
英 [ˈsnuːpɪŋ]
美 [ˈsnuːpɪŋ]
v. 窥探; 打探; 探听
snoop的现在分词
现在分词:snooping
BNC.48499 / COCA.37383
柯林斯词典
- VERB 窥探;刺探;打探
If someonesnoopsaround a place, they secretly look around it in order to find out things.- Ricardo was the one she'd seen snooping around Kim's hotel room.
她看见在金的宾馆房间周围窥探的那个人正是里卡多。 - Snoopis also a noun.
- The second house that Grossman had a snoop around contained 'strong simple furniture'.
格罗斯曼打探过的第二座房子有着“结实而简单的家具”。
- Ricardo was the one she'd seen snooping around Kim's hotel room.
- VERB 窥探(某人的生活)
If someonesnoops ona person, they watch them secretly in order to find out things about their life.- Governments have been known to snoop on innocent citizens.
有些政府窥探无辜公民的生活——这一事实已经众所周知。
- Governments have been known to snoop on innocent citizens.
- N-COUNT 同 snooper
Asnoopis the same as asnooper.- Each neighborhood had its own organization of snoops who reported strangers to the authorities.
每个居民区都有自己的侦探组织,他们向当局汇报陌生人的情况。
- Each neighborhood had its own organization of snoops who reported strangers to the authorities.
双语例句
- American law privileges consumer sovereignty over human dignity, so it provides weak privacy protection against snooping by companies.
美国法律把消费者主权置于人类尊严之上,因此它在防范个人隐私被企业窥探方面效力不大。 - Children are prepared to put up with the snooping if they are allowed to have a phone.
孩子们想要父母给他们买个电话,则要准备好忍受被秘密监视。 - Christina takes us on a journey through her past relationships complete with snooping, spying, stalking and stealing.
克丽缇娜将通过她过去的情感生活中的侦查,监视,跟踪和偷盗来带领我们踏上一段旅途。 - Once you start delivering it, the snooping may stop.
只要你开始提供他需要的信息,窥探行为或许就会停止。 - Although non-binding, the resolution would be one of the strongest condemnations of US snooping to date.
虽然这一决议并不具有制裁力,但它将成为至今为止对美国政府监听行径的最强烈谴责。 - She's been snooping round asking questions.
她一直在四处窥探,问这问那。 - Ricardo was the one she'd seen snooping around Kim's hotel room.
她看见在金的宾馆房间周围窥探的那个人正是里卡多。 - Somebody went snooping through my desk while I was gone.
有人趁我不在时翻了我的桌子。 - Gorman also describes how Carnivore, the SWIFT database snooping program, and basically every other Big
戈尔曼还介绍了如何食肉兽,迅速的数据库窥探程序,基本上每一个其他的大 - The data transmitted over the network is susceptible to network attacks like snooping the network traffic, non-repudiation, tampering the data, spoofing, hijacking, and capture-replay.
在网络上传输的数据容易受到各种网络攻击,例如嗅探网络传输、不可抵赖性、篡改数据、欺骗、拦截和捕捉回复。