filch
英 [fɪltʃ]
美 [fɪltʃ]
v. 偷(尤指小的或不贵重的物品)
过去分词:filched 过去式:filched 现在分词:filching 第三人称单数:filches
BNC.34453 / COCA.29500
柯林斯词典
- VERB (尤指不构成严重犯罪地)偷
If you say that someonefilchessomething, you mean they steal it, especially when you do not consider this to be a very serious crime.- I filched some notes from his wallet.
我从他的钱包里偷了几张钞票。
- I filched some notes from his wallet.
英英释义
verb
- make off with belongings of others
双语例句
- Such incidents illustrate the care that business executives or government officials should take when they travel to places where rivals might try to filch vital trade secrets or sensitive information.
这种事件说明了商业巨头们或者政府官员们去有竞争对手可能企图偷窃重要商业机密或敏感信息的这些地方,他们应该小心。 - She added hastily, as Filch came shuffling eagerly across the entrance hall holding his Secrecy Sensor aloft. Take this necklace to Professor Snape at once, but be sure not to touch it, keep it wrapped in the scarf!
她看见费尔奇举着探密器,兴致勃勃、踢踏踢踏地从门厅走来,便赶紧对他说,立刻把这条项链拿去给斯内普教授,千万不要碰它,就让它一直包在围巾里! - It was Ginny who set the basilisk on the Mudbloods and Filch's cat
是真妮把巴斯里斯克带给那些麻瓜血统的人和费乐奇的猫 - I filched some notes from his wallet.
我从他的钱包里偷了几张钞票。 - As we all know, cryptanalysis is a very important part of cryptology and its main task is to filch classified information or bilk by breaking cipher or fabricating authentication.
众所周知,密码分析是密码技术的重要组成部分,其主要任务是破译密码或伪造认证信息,实现窃取机密信息或进行诈骗破坏活动。 - Answer: point to it is a purpose with detinue, take state-private property amount secretly bigger, or for many times secret filch is state-private the behavior of property.
答:指以非法占有为目的,秘密取公私财物数额较大,或者多次秘密窃取公私财物的行为。 - Argus filch: anyone here, my sweet? Come on.
阿格斯费尔奇:这儿有人吗,小甜心?走吧。 - When badly wounded, the filcher escapes using its time filch ability, or dimension door.
受到重伤后,时窃怪通常会利用其窃取时间能力或“任意门”逃走。 - Stone says, this are vermian can ego is duplicate, but won't information of filch user individual.
斯通称,该蠕虫能够自我复制,但不会窃取用户个人信息。 - Now, the malicious software can be used to filch secret information, send junk e-mails, personate somebody else illegally, and so on.
现在的大多数恶意软件都用来窃取机密信息、发送垃圾邮件、冒充身份网上窃取资料等。