英文字典中文字典


英文字典中文字典51ZiDian.com



中文字典辞典   英文字典 a   b   c   d   e   f   g   h   i   j   k   l   m   n   o   p   q   r   s   t   u   v   w   x   y   z       







请输入英文单字,中文词皆可:

dibble    音标拼音: [d'ɪbəl]
n. 挖洞器
vt.
vi. 挖洞,使用挖洞器播种

挖洞器挖洞,使用挖洞器播种

dibble
n 1: a wooden hand tool with a pointed end; used to make holes
in the ground for planting seeds or bulbs [synonym: {dibble},
{dibber}]
v 1: plant with a wooden hand tool; "dibble Spring bulbs"
2: make a hole with a wooden hand tool; "dibble the ground"

Dibble \Dib"ble\, n. [See {Dibble}, v. i.]
A pointed implement used to make holes in the ground in which
no set out plants or to plant seeds.
[1913 Webster]


Dibble \Dib"ble\, v. i. [imp. & p. p. {Dibbled}; p. pr. & vb. n.
{Dibbling}.] [Freq. of Prov. E. dib, for dip to thrust in.
See {Dip}.]
To dib or dip frequently, as in angling. --Walton.
[1913 Webster]


Dibble \Dib"ble\, v. t.
1. To plant with a dibble; to make holes in (soil) with a
dibble, for planting.
[1913 Webster]

2. To make holes or indentations in, as if with a dibble.
[1913 Webster]

The clayey soil around it was dibbled thick at the
time by the tiny hoofs of sheep. --H. Miller.
[1913 Webster]

46 Moby Thesaurus words for "dibble":
angle, bait the hook, bed, bob, broadcast, clam, dap, dib,
disseminate, drill, drive, fish, fly-fish, forest, gig, go fishing,
grig, guddle, implant, inseminate, jack, jacklight, jig, net,
plant, pot, put in, reforest, reset, retimber, scatter seed, seed,
seed down, seine, seminate, set, shrimp, sow, sow broadcast, spin,
still-fish, torch, transplant, trawl, troll, whale


请选择你想看的字典辞典:
单词字典翻译
dibble查看 dibble 在百度字典中的解释百度英翻中〔查看〕
dibble查看 dibble 在Google字典中的解释Google英翻中〔查看〕
dibble查看 dibble 在Yahoo字典中的解释Yahoo英翻中〔查看〕





安装中文字典英文字典查询工具!


中文字典英文字典工具:
选择颜色:
输入中英文单字

































































英文字典中文字典相关资料:


  • Enjin | The Unified Blockchain, Wallet, Marketplace, and API.
    Blockchain Purpose-built for games and apps – scalable, secure, and simple to use
  • draft-hood-agtp-web3-bridge-00 - datatracker. ietf. org
    The Agent Transfer Protocol (AGTP) uses a PKI-based trust model: agent identity is anchored to DNS-verified domain ownership and CA- issued X 509 certificates Web3 systems offer an alternative identity model based on blockchain address ownership, smart contract verification, and decentralized naming systems including the Ethereum Name Service (ENS) and Unstoppable Domains This document
  • List of Reported Scam Companies in 2026 - Crypto Legal
    Our fraud database is one of the largestand most comprehensive databasesof fraudulent companies at a global scale It includes fake crypto exchanges, fraudulent investment companies, forex, recovery, romance and pig butchering scams, and crypto rug pulls that have been reported in recent years Please use this information to protect yourself and your assets from financial scams and fraud
  • Azure updates | Microsoft Azure
    Subscribe to Microsoft Azure today for service updates, all in one place Check out the new Cloud Platform roadmap to see our latest product plans
  • Private Browser Download - Free App | Avast Secure Browser
    Keep your online activity and personal data safer with Avast Secure Browser, our fast, ad-blocking private browser Download for free!
  • Unstoppable Domains — an accredited registrar marketplace . . .
    Frequently Asked Questions Are you an ICANN Accredited Registrar? Yes! Unstoppable got our license in October of 2024, and have since onboarded approximately 200 DNS TLDs Our onchain domains give DNS domains a uniquely frictionless trading experience while still maintaining compliance and compatibility with existing domain infrastructure
  • Cybersecurity News and Expert Analysis - Help Net Security
    Cybersecurity news with a focus on enterprise security Discover what matters in the world of information security today
  • IBM Products
    The place to shop for software, hardware and services from IBM and our providers Browse by technologies, business needs and services
  • TeamPCP Supply Chain Attack: Trivy to Checkmarx to npm (2026)
    Future supply chain attackers will adopt blockchain-based C2 infrastructure as a matter of course The self-propagating npm worm pattern — harvest tokens, enumerate publishable packages, bump patch version, inject payload, republish — can be applied to any package ecosystem where tokens are stored in environment variables or local config files
  • Blockchain Domains: Beginners Guide To Decentralised DNS
    Complete beginners guide to blockchain domains How they work and how they can protect you from censorship on the centralised internet





中文字典-英文字典  2005-2009