implements
英 [ˈɪmplɪments]
美 [ˈɪmplɪments]
v. 使生效; 贯彻; 执行; 实施
n. 工具; 器具; (常指)简单的户外用具
implement的第三人称单数和复数
柯林斯词典
- VERB 履行;实施
If youimplementsomething such as a plan, you ensure that what has been planned is done.- The government promised to implement a new system to control financial loan institutions...
政府许诺实施新的制度来控制金融贷款机构。 - The report sets out strict inspection procedures to ensure that the recommendations are properly implemented.
报告规定了严格的检查程序,以确保建议得到切实执行。
- The government promised to implement a new system to control financial loan institutions...
- N-COUNT 工具;器具;用具
Animplementis a tool or other piece of equipment.- ...knives and other useful implements.
刀子和其他有用工具 - ...writing implements.
书写用具
- ...knives and other useful implements.
The verb is pronounced /'ɪmplɪment/. The noun is pronounced /'ɪmplɪmənt/. 动词读作 /'ɪmplɪment/,名词读作 /'ɪmplɪmənt/。
双语例句
- The repository implements governance processes and offer a central visibility of the services and their artifacts.
仓库实现了治理过程,并提供了服务和它们的元件的集中可视性。 - At the top is the system call interface, which implements the basic functions such as read and write.
最上面是系统调用接口,它实现了一些基本的功能,例如read和write。 - Primitive man hunted wild animals with crude stone implements.
原始社会的人用粗糙的石器猎取野兽。 - Researches and implements a cross-platform Internet video conference system.
研究实现了一种可跨平台的视频会议系统。 - These new-style farm implements are easy to use ( or handle).
这些新式农具使唤起来很方便。 - On the operational level, the project team develops and implements the services.
在操作层,项目组开发和实现服务。 - The code also implements a handleReceiveWorkItem method to handle a received WorkItem.
这个代码还实现了一个handleReceiveWorkItem方法来处理一个已接收的WorkItem。 - This framework implements enterprise-level governance and provides guidance and support for IT solution design and delivery.
此框架实现企业级治理,并为IT解决方案设计和交付提供指导和支持。 - Implement this in gcc, and StackShield implements it in the assembler.
在gcc中实现了这种方法,StackShield在汇编程序中实现了这种方法。 - Along with this database, the TE implements security policies that add another level to system security.
除了这个数据库以外,TE还实现了安全策略,从而增添了另一个级别的系统安全性。