英文字典中文字典


英文字典中文字典51ZiDian.com



中文字典辞典   英文字典 a   b   c   d   e   f   g   h   i   j   k   l   m   n   o   p   q   r   s   t   u   v   w   x   y   z       







请输入英文单字,中文词皆可:

underwent    音标拼音: [,ʌndɚw'ɛnt]
vbl. undergo的过去式

undergo的过去式

Underwent \Un`der*went"\,
imp. of {Undergo}.
[1913 Webster]


Undergo \Un`der*go"\, v. t. [imp. {Underwent}; p. p. {Undergone}
(?; 115); p. pr. & vb. n. {Undergoing}.] [AS. underg[=a]n.
See {Under}, and {Go}.]
1. To go or move below or under. [Obs.]
[1913 Webster]

2. To be subjected to; to bear up against; to pass through;
to endure; to suffer; to sustain; as, to undergo toil and
fatigue; to undergo pain, grief, or anxiety; to undergothe
operation of amputation; food in the stomach undergoes the
process of digestion.
[1913 Webster]

Certain to undergo like doom. --Milton.
[1913 Webster]

3. To be the bearer of; to possess. [Obs.]
[1913 Webster]

Their virtues else, be they as pure as grace,
As infinite as man may undergo. --Shak.
[1913 Webster]

4. To undertake; to engage in; to hazard. [Obs.]
[1913 Webster]

I have moved already
Some certain of the noblest-minded Romans
To undergo with me an enterprise. --Shak.
[1913 Webster]

5. To be subject or amenable to; to underlie. [Obs.]
[1913 Webster]

Claudio undergoes my challenge. --Shak.
[1913 Webster]


请选择你想看的字典辞典:
单词字典翻译
Underwent查看 Underwent 在百度字典中的解释百度英翻中〔查看〕
Underwent查看 Underwent 在Google字典中的解释Google英翻中〔查看〕
Underwent查看 Underwent 在Yahoo字典中的解释Yahoo英翻中〔查看〕





安装中文字典英文字典查询工具!


中文字典英文字典工具:
选择颜色:
输入中英文单字

































































英文字典中文字典相关资料:


  • What is account takeover? - Cloudflare
    What is account takeover? When a malicious party gains control of or access to a legitimate user's account, this is called an account takeover attack
  • What is Account Takeover? ATO Attacks Explained
    Account takeover (ATO) is when a threat actor gains unauthorized control of a legitimate user's account and uses that access for fraud, data theft, or further intrusion
  • Account Takeover Attack (ATO) | Types, Detection Protection | Imperva
    Account Takeover (ATO) is an attack whereby cybercriminals take ownership of online accounts using stolen passwords and usernames Cybercriminals generally purchase a list of credentials via the dark web – typically gained from social engineering, data breaches and phishing attacks
  • Account Takeover Fraud | Federal Reserve Financial Services
    Account takeover fraud is prevalent and growing Learn why this method of fraud continues to be a threat and how to improve detection and prevention
  • What are Account Takeover Attacks? - SentinelOne
    What is an Account Takeover (ATO) Attack? Account Takeover (ATO) attacks let cybercriminals gain unauthorized access and control over your accounts by using stolen credentials They exploit weaknesses in security, enable data theft and fraud, and often happen via phishing, data breaches, or malware
  • What Is an Account Takeover Attack? - Keepnet
    An Account Takeover (ATO) attack is when a cybercriminal gains unauthorized access to an online account (email, banking, SaaS, social media, employee SSO, etc ) and uses it as if they were the real owner, often to steal money, data, or identities, or to spread further attacks
  • Account Takeover (ATO) Attacks Explained: Detection, Prevention . . .
    Understanding the anatomy of an account takeover Ever wonder how someone just "poof" disappears from their own bank account while the balance hits zero? It’s not magic, it is account takeover (ato), and honestly, it's one of the most annoying identity crimes we deal with in the sso space today
  • What Is Account Takeover (ATO)? - Fortinet
    When a hacker tries to execute an account takeover (ATO), their goal is to take control of your account and use it to steal information or for their own personal profit
  • Account Takeover (ATO): How Attacks Work Prevention
    Account takeover is a form of identity theft where cybercriminals gain unauthorized access to user accounts through stolen credentials, session hijacking, or social engineering, then use that access to commit fraud, steal data, or launch further attacks within an organization's network
  • Account takeover: types, detection, and prevention measures
    In this article, we’ll explore the different types of account takeover attacks, how they’re detected, and the measures organizations can implement to prevent them





中文字典-英文字典  2005-2009