英文字典中文字典


英文字典中文字典51ZiDian.com



中文字典辞典   英文字典 a   b   c   d   e   f   g   h   i   j   k   l   m   n   o   p   q   r   s   t   u   v   w   x   y   z       







请输入英文单字,中文词皆可:

bereave    音标拼音: [bɚ'iv]
vt. 夺去,使失去,使丧失

夺去,使失去,使丧失

bereave
v 1: deprive through death

Bereave \Be*reave"\ (b[-e]*r[=e]v"), v. t. [imp. & p. p.
{Bereaved} (b[-e]*r[=e]vd"), {Bereft} (b[-e]*r[e^]ft"); p.
pr. & vb. n. {Bereaving.}] [OE. bireven, AS. bere['a]fian.
See {Be-}, and {Reave.}]
[1913 Webster]
1. To make destitute; to deprive; to strip; -- with of before
the person or thing taken away.
[1913 Webster]

Madam, you have bereft me of all words. --Shak.
[1913 Webster]

Bereft of him who taught me how to sing. --Tickell.
[1913 Webster]

2. To take away from. [Obs.]
[1913 Webster]

All your interest in those territories
Is utterly bereft you; all is lost. --Shak.
[1913 Webster]

3. To take away. [Obs.]
[1913 Webster]

Shall move you to bereave my life. --Marlowe.
[1913 Webster]

Note: The imp. and past pple. form bereaved is not used in
reference to immaterial objects. We say bereaved or
bereft by death of a relative, bereft of hope and
strength.
[1913 Webster]

Syn: To dispossess; to divest.
[1913 Webster]


请选择你想看的字典辞典:
单词字典翻译
Bereave查看 Bereave 在百度字典中的解释百度英翻中〔查看〕
Bereave查看 Bereave 在Google字典中的解释Google英翻中〔查看〕
Bereave查看 Bereave 在Yahoo字典中的解释Yahoo英翻中〔查看〕





安装中文字典英文字典查询工具!


中文字典英文字典工具:
选择颜色:
输入中英文单字

































































英文字典中文字典相关资料:


  • Vault 7: CIA Hacking Tools Revealed - WikiLeaks
    How did WikiLeaks obtain each part of "Vault 7"? Sources trust WikiLeaks to not reveal information that might help identify them Isn't WikiLeaks worried that the CIA will act against its staff to stop the series? No That would be certainly counter-productive Has WikiLeaks already 'mined' all the best stories?
  • WikiLeaks - Vault 7: Projects
    Today, September 7th 2017, WikiLeaks publishes four secret documents from the Protego project of the CIA, along with 37 related documents (proprietary hardware software manuals from Microchip Technology Inc ) The project was maintained between 2014 and 2015 Protego is not the "usual" malware development project like all previous publications by WikiLeaks in the Vault7 series Indeed there is
  • WikiLeaks - Vault 8
    Source code and analysis for CIA software projects including those described in the Vault7 series This publication will enable investigative journalists, forensic experts and the general public to better identify and understand covert CIA infrastructure components Source code published in this series contains software designed to run on servers controlled by the CIA Like WikiLeaks' earlier
  • Category:Central Intelligence Agency - WikiLeaks
    From WikiLeaks Jump to: navigation, search The Central Intelligence Agency (CIA) is a civilian intelligence agency of the United States government responsible for providing national security intelligence to senior United States policymakers The CIA also engages in covert activities at the request of the President of the United States
  • our. wikileaks. org
    Publication Research Browse Category Search on WikiLeaks Vault 7: Dark Matter Mar 23, 2017 - continues the Vault 7 series which contains documentation for several CIA projects that infect Apple Mac Computer firmware (meaning the infection persists even if the operating system is re-installed) developed by the CIA's Embedded Development Branch
  • Vault 7: CIA Hacking Tools Revealed - our. wikileaks. org
    Background Vault 7 is a series of WikiLeaks releases on the CIA and the methods and means they use to hack, monitor, control and even disable systems ranging from smartphones, to TVs, to even dental implants The Vault7 leaks themselves can be found on WikiLeaks
  • Search WikiLeaks
    Released by WikiLeaks to Include external sources Associated Twitter accounts, Snowden + Hammond Documents, Cryptome Documents, ICWatch, This Day in WikiLeaks Blog and WikiLeaks Press, WL Central Searching for cia Filter results by leak Global Intelligence Files
  • CIA Assessment on Surviving Secondary Screening - page 1 - WikiLeaks
    CIA Assessment on Surviving Secondary Screening at Airports While Maintaining Cover WikiLeaks release: December 21, 2014 This is a secret document produced by the CIA's CHECKPOINT Identity and T ravel Intelligen ce Program to explain and advise CIA operatives on how to deal with secondary screening at airports, as they travel
  • WikiLeaks
    Today, 21 December 2018, WikiLeaks publishes a searchable database of more than 16,000 procurement requests posted by United States embassies around the world
  • WikiLeaks - Government
    Today, September 7th 2017, WikiLeaks publishes four secret documents from the Protego project of the CIA, along with 37 related manuals





中文字典-英文字典  2005-2009