英文字典中文字典


英文字典中文字典51ZiDian.com



中文字典辞典   英文字典 a   b   c   d   e   f   g   h   i   j   k   l   m   n   o   p   q   r   s   t   u   v   w   x   y   z       







请输入英文单字,中文词皆可:

smitten    音标拼音: [sm'ɪtən]
smite的过去分词

smite的过去分词

smitten
adj 1: (used in combination) affected by something overwhelming;
"conscience-smitten"; "awe-struck" [synonym: {smitten},
{stricken}, {struck}]
2: marked by foolish or unreasoning fondness; "gaga over the
rock group's new album"; "he was infatuated with her" [synonym:
{enamored}, {infatuated}, {in love}, {potty}, {smitten},
{soft on(p)}, {taken with(p)}]

Smite \Smite\ (sm[imac]t), v. t. [imp. {Smote} (sm[=o]t), rarely
{Smit} (sm[i^]t); p. p. {Smitten} (sm[i^]t"t'n), rarely
{Smit}, or {Smote}; p. pr. & vb. n. {Smiting}
(sm[imac]t"[i^]ng).] [AS. sm[imac]tan to smite, to soil,
pollute; akin to OFries. sm[imac]ta to smite, LG. smiten, D.
smijten, G. schmeissen, OHG. sm[imac]zan to smear, stroke,
OSw. & dial. Sw. smita to smite, Dan. smide to throw, Goth.
bismeitan, to anoint, besmear; cf. Skr. m[=e]d to be fat. The
original sense seems to have been, to daub on, to smear. Cf.
{Smut}.]
1. To strike; to inflict a blow upon with the hand, or with
any instrument held in the hand, or with a missile thrown
by the hand; as, to smite with the fist, with a rod,
sword, spear, or stone.
[1913 Webster]

Whosoever shall smite thee on thy right cheek, turn
to him the other also. --Matt. v. 39.
[1913 Webster]

And David . . . took thence a stone, and slang it,
and smote the Philistine in his forehead. --1 Sam.
xvii. 49.
[1913 Webster]

2. To cause to strike; to use as an instrument in striking or
hurling.
[1913 Webster]

Prophesy, and smite thine hands together. --Ezek.
xxi. 14.
[1913 Webster]

Saul . . . smote the javelin into the wall. --1 Sam.
xix. 10.
[1913 Webster]

3. To destroy the life of by beating, or by weapons of any
kind; to slay by a blow; to kill; as, to smite one with
the sword, or with an arrow or other instrument.
[1913 Webster]

4. To put to rout in battle; to overthrow by war.
[1913 Webster]

5. To blast; to destroy the life or vigor of, as by a stroke
or by some visitation.
[1913 Webster]

The flax and the barly was smitten. --Ex. ix. 31.
[1913 Webster]

6. To afflict; to chasten; to punish.
[1913 Webster]

Let us not mistake God's goodness, nor imagine,
because he smites us, that we are forsaken by him.
--Wake.
[1913 Webster]

7. To strike or affect with passion, as love or fear.
[1913 Webster]

The charms that smite the simple heart. --Pope.
[1913 Webster]

Smit with the love of sister arts we came. --Pope.
[1913 Webster]

{To smite off}, to cut off.

{To smite out}, to knock out, as a tooth. --Exod. xxi. 27.

{To smite with the tongue}, to reproach or upbraid; to
revile. [Obs.] --Jer. xviii. 18.
[1913 Webster]


Smitten \Smit"ten\ (sm[i^]t"t'n),
p. p. of {Smite}.
[1913 Webster]


请选择你想看的字典辞典:
单词字典翻译
smitten查看 smitten 在百度字典中的解释百度英翻中〔查看〕
smitten查看 smitten 在Google字典中的解释Google英翻中〔查看〕
smitten查看 smitten 在Yahoo字典中的解释Yahoo英翻中〔查看〕





安装中文字典英文字典查询工具!


中文字典英文字典工具:
选择颜色:
输入中英文单字

































































英文字典中文字典相关资料:


  • Contact Us - Search Networking - TechTarget
    Write Search Networking c o TechTarget 275 Grove Street Newton, MA 02466 Phone: (617) 431-9200 Fax: (617) 431-9201
  • Search Networking Resources and Information from TechTarget
    SD-WAN security refers to the practices, protocols and technologies protecting data and resources transmitted across software-defined wide area network infrastructure SD-WAN security VMware's new Edge Cloud Orchestrator, formerly VMware SASE Orchestrator, manages VMware's edge compute and SD-WAN systems
  • Business Partners - searchnetworking. techtarget. com
    SearchNetworking com is just one IT specific portal in TechTarget's network Millions of IT professionals rely on our sites to solve problems, get the latest news or research, and purchase products Millions of IT professionals rely on our sites to solve problems, get the latest news or research, and purchase products
  • Biometrics: security savior or privacy violation?
    It is the same technology that you can use to control access to your network Authentication is described as having three possible components -- something you know, something you have, or something you are Something you know is a password, and password-protected access is the most common method we use to provide network authentication
  • Concerned about deploying both a public Wi-Fi hotspot and private Wi-Fi . . .
    Alternatively, you can centrally-enforce a "one active network" policy using something like Senforce's Endpoint Security Suite Connectivity Control According to Senforce's website, "SCC ensures all endpoint devices comply with corporate security policies governing wired and Wi-Fi network connectivity" and "can disallow Wi-Fi usage when users
  • Search Networking Resources and Information from TechTarget
    Offloading daily network management to networking vendors allowed Home Depot and Evernote to direct in-house IT staff to business-critical projects Evernote, Home Depot outsource network management The combination Dell PowerEdge server and Marvell-powered inline 5G Layer 1 processing card can run carriers' open or virtualized radio access
  • searchnetworking. techtarget. com
    searchnetworking techtarget com





中文字典-英文字典  2005-2009