hashes是什么意思_hashes短语搭配_hashes权威例句
2024-09-22 15:39:09 学考宝 作者:佚名
基本释义:
hashes
英 美
- n. 剁碎的食物;无用信息(hash 的复数)
- v. 切碎;评论(hash 的第三人称单数)
词典扩展 短语搭配 权威例句 实用例句
柯林斯词典
hash /hæʃ/ TEM8 [ hashing hashed hashes ]
- 1.
不可数名词 Hash is a dish made from meat cut into small lumps and fried with other ingredients such as onions or potato. 回锅肉丁例:
...corned beef hash.
…回锅腌牛肉丁。
- 2.
不可数名词 hashish的缩写 →short for hashish
- 3.
可数名词 A hash is the sign #, found on telephone keypads and computer keyboards. 井号键
- 4.
习语 If you make a hash of a job or task, you do it very badly. 把…弄糟例:
The government made a total hash of things and squandered a small fortune.
政府把事情弄得一团糟,还浪费了一笔钱。
- 5.
动词 to chop into small pieces 切碎; 剁碎
同近义词
词组短语
1. l Hashes 哈希表
2. hash out 消除,经过长时间讨论解决一个问题
3. hash table [计]杂凑表
4. Hashes oflnsight 灵机一动
5. hash algorithm [计]杂凑算法;散列算法;哈希算法
6. hash code [计]散列码;混列码
7. Password Hashes 密码杂凑 ; 密码哈希
8. field hashes 号哈希表
9. File Hashes 文件哈希
10. Take hashes 进行哈希校验
11. hash function 散列函数;哈希函数
12. torrent hashes 龙虎榜
13. Hashes s 哈希表
14. image hashes 并且所有的映象哈希值
权威例句
1. The module maintains two hashes internally, and automatically creates a reverse mapping in the second one when the first one gets data.
该模块在内部维护两个散列,并在第一个散列获得数据时自动在第二个散列中创建反向映射。
2. As mentioned earlier, messages and certificates make use of cryptographic hashes to verify integrity.
正如前面所提到的那样,消息和证书使用加密哈希来验证完整性。
3. Hashes are statistically unique; a different two-byte sequence will not hash to the same value.
哈希在统计上是唯一的;不同的双字节序列不会哈希为同一个值。《provided by jukuu》
4. That's why you should never rely on hashes alone& always add some salt to your hash so the resulting hash values are unique.
这就是为什么你无论何时都不该仅仅依赖hash&永远给hash加些salt以获得独一无二的hash结果值。
5. That's why you should never rely on hashes alone — always add some salt to your hash so the resulting hash values are unique.
这就是为什么你无论何时都不该仅仅依赖hash——永远给hash加些salt以获得独一无二的hash结果值。
6. Scalars, arrays, and hashes: my oh my!
标量、数组和哈希散列。
7. Hashes are one-way operations.
hash是单向操作。
8. These tools work by using hashes ( for example,"# tab3") to alter the URL without loading a new page.
这些工具使用哈希值(例如,“tab3”)改变URL,而无需加载一个新页面。
9. These tools work by using hashes (for example, "#tab3") to alter the URL without loading a new page.
这些工具使用哈希值(例如,“#tab3”)改变 URL,而无需加载一个新页面。
10. The other argument mitigating the potential severity of this attack is actually derived from the use of hashes.
减小这种攻击的潜在严重性的另一个争论实际上源于散列的使用。
11. If the hashes are the same, the blocks are properly replicated.
如果散列值是相同的,数据块已经被正确的复制了。
12. As more and more complex keys are matched to hashes, the likelihood of coming up with a match for any given password increases.
随着越来越复杂的关键字被匹配到散列上,匹配到已知密码上的可能性增加了。
13. Next, I create some hashes: % discs, % olddiscinfo, and % disc_counts.
接下来创建一些散列:% discs、% olddiscinfo和% disc_counts。
14. Arrays and hashes, however, are more complex.
然而,数组和散列更为复杂。
15. This method hashes the nodes to reduce the time in matching, searching and propagating.
该方法可以减少匹配及传播过程中对中间节点查找、比较和复制的时间开销。
16. Then the group crowds around and hashes it out.
然后小组成员会聚集起来,通过讨论来解决问题。
17. This is especially true if you need to process complex command-line switches to create multi-level hashes.
这对于您需要处理复杂的命令行开关以创建多层散列时尤为有用。
18. In both dates and geography he pretty well hashes the history of the company.
他把这家公司历史上的日期和地理位置完全搞乱了.《辞典例句》
19. And for generating encrypted hashes of the mouse-click times, you'll need the mkpasswd program.
并且为了生成鼠标单击次数的加密散列,您需要mkpasswd程序。
20. Nevertheless, like all hash tables, its performance depends on the distribution of hashes.
不仅如此, 像所有的hash表, 其性能依赖于哈希分布.《互联网》
21. Sorting allows you to control how records are returned from the database and expects an array of { column=> direction} hashes.
sorting让您可以控制如何从数据库中返回记录,并期望得到一个{column=>direction}散列数组。
22. Perhaps the biggest complaint with NTLMv2 created hashes is that Windows does not utilize a technique called salting.
对于使用NTLMv 2创建的哈希,可能最大的不足在于Windows无法使用一种名为Salting的技术。
23. The MLDBM module allows complex Perl hashes to be almost seamlessly stored in a local file.
MLDBM 模块可以将复杂的 Perl 哈希键值无缝地保存在一个本地文件中。
24. The important thing is how hashes work and how to tune them for maximum performance benefit.
重要的是知道哈希如何工作并如何去调整它们以便获取最大的性能。
25. The last thing I want to say about hashes are that they're actually really hard to create.
最后我想说的是哈希函数非常难以创立,在过去的时间里。
26. However, even SHA-512 hashes can be cracked at the rate of around 46 million calculations per second.
但是,甚至SHA-512哈希值也可以每秒4600万次计算的速率破解。
27. Let's look at the three main types of tied variables: scalars, arrays, and hashes.
让我们来研究三类主要的绑定变量:标量、数组和散列。
28. Hashes and symbols - using hashes and symbols make it easy to express relationships and identify objects.
Hash和符号(Symbol)——使用Hash和符号可使表达关系和标识对象更加容易。
29. If different views can be provided for hashes, arrays, and scalars, why stop there?
要为哈希表、数组和标量都提供视图多好呀,为什么不呢?
30. If you work with large arrays or hashes and use them as arguments to functions, use a reference instead of the variable directly.
如果使用大型数组或hash表,并使用它们作为函数的参数,那么应该使用它们的一个引用,而不应该直接使用它们。
31. Have configurations nested more than one layer deep (up to one layer can be handled with the AppConfig hashes).
具有多于一层深度的嵌套配置(直到可以被appconfig散列处理的一层)。
32. These are common hashes that are used to verify the integrity and authenticity of files.
这些都是常见的、用来验证完整性和真实性的哈希值。
33. The loadMetaPhones subroutine is straightforward code that creates two hashes of metaphone keys and values.
loadmetaphones子例程是创建变音位关键字和值的两个散列的简单代码。
34. The fact that a hash can have attributes that are also hashes should be no surprise.
事实上,hash可以拥有hash属性,这并不奇怪。
35. Gperf hashes a predefined set of keywords, then quickly performs lookups for these same keywords.
Gperf混编了一组预定义的关键字,然后对这些关键字执行快速查找。
36. The time consuming part of a rainbow table attack is building the dictionary of hashes.
耗时的彩虹表攻击法是基于字典的词.《互联网》
37. Hashes are incredibly useful for accessing data that does not have an obvious ordering.
哈希表在访问没有明显顺序的数据方面难以置信的有用。
38. Therefore, Samba must keep a separate password database for the Microsoft hashes; this is referred to as the password back end.
因此,Samba必须为Microsoft哈希保留单独的密码数据库;这就被称为密码后台。
39. If you need nested hashes or arrays, you may have to do it yourself or assist AppConfig.
如果您需要嵌套的散列或数组,则需要自己动手或帮助一下AppConfig。
40. Groovy allows iteration to work for all kinds of collections, including hashes, as shown in Listing 2.
Groovy支持各种集合的迭代工作,包括哈希,如清单2所示。
41. Tied hashes are easier to write than tied arrays, and more useful.
绑定的散列比绑定的数组更易于编写,而且更有用。
42. This means that you need a solid understanding of the interaction of references, hashes, and arrays in Perl.
这意味着需要充分了解引用、散列和数组在Perl中的交互作用。
43. Blocks - blocks encapsulate executable logic, and allow the logic to be stored (in hashes) for later execution.
Block——Block可以封装可运行逻辑,并允许逻辑储存起来(置于Hash中),用于稍后执行。
44. Avoid subscripting arrays or hashes within loops.
避免在循环中使用下标数组或散列.《互联网》
45. In our bank transfer example, assume we use a primitive Mac that hashes the request along with a secret key.
在银行划拨范例中,假设我们使用了一种随秘钥杂凑请求的原始mac。《provided by jukuu》
46. The md5() function hashes whatever string is fed to it and turns it into a 32-character fixed-length string.
md5() 函数可以散列反馈的任何字符串,并将其转变为固定长度为 32 个字符的字符串。
47. Use the rpm command to install the package with flags for verbose output and hashes (#) to show progress.
使用 rpm 命令安装包,用标记表示详细输出和(#)表示进度的井号。
48. For layered configurations, AppConfig needs to have custom functions installed to interpret hashes deeper than one level.
对于分层配置,AppConfig需要安装有定制函数,以解释不止一层深的散列。
49. It then hashes the values of two strings and prints the following to the console.
然后,它散列两个字符串的值,并将以下内容显示在控制台上.《互联网》
50. Blocks-blocks encapsulate executable logic, and allow the logic to be stored ( in hashes) for later execution
Block&Block可以封装可运行逻辑,并允许逻辑储存起来(置于Hash中),用于稍后执行
51. It hashes ( converts) a number in a large range into a number in a smaller range.
它把一个大范围的数字哈希(转化)成一个小范围的数字。
52. Beyond the basic storage of data, hashes are also important in distributed systems.
除了用于基本的数据存储, 哈希对分布式系统也很重要.《互联网》
53. This example will store booleans, scalars, arrays, and hashes in separate tables.
这个示例将在不同表中存储布尔值、标量、数组和散列。
54. They also have some built-in data structures like arrays, hashes, and some sort of support for record-like structures.
它们还有一些内嵌的数据结构,像数组、哈希表和对像记录一样的结构的某种支持。
实用例句
1. The last thing I want to say about hashes are that they're actually really hard to create.
最后我想说的是哈希函数非常难以创立,在过去的时间里。计算机科学及编程导论课程节选 : 麻省理工公开课
2. These hashes are bits of text that uniquely identify a piece of data (such as an email address) but are designed to protect against reverse engineering which would reveal that data.
FORBES: Move up http://i.forbesimg.com t Move down
3. As the Obama administration hashes out internal differences, top Republicans and some moderate-to-conservative Democrats are calling for the president to listen to McChrystal.
CNN: Obama has McChrystal's troop request -- what now?
4. At the far end of the security spectrum, end users ideally would verify original download against hashes that were published or distributed in offline fashion.
FORBES: Cryptocat Increases Security In Move Away From JavaScript Web Delivery
5. But because they use cryptographic hashes to obscure those words, the computing power to run a dictionary attack has long been unavailable to most users.
FORBES: Moxie Marlinspike's CloudCracker Aims For Speedier, Cheaper Password Cracking
6. They use millions of fingerprints (hashes) of files to provide realtime inspection of executables at the gateway.
FORBES: Security Intelligence Enters Mainstream
7. And once we no longer need the hashes that do match, we delete them too.
FORBES: Move up http://i.forbesimg.com t Move down
8. December, he told me, is when the company hashes out its big long-term technical arguments.
FORBES: Facebook Exec Talks 2011
9. Cooperation is often good when everyone feels free to speak their minds, hashes out a problem, considers the intended and unintended consequences and, of course, consults their lawyer!
FORBES: My #OccupyWallStreet Demand: Abolish Women Good/Men Bad