单词 | hash | ||||||||
释义 |
复数:hashes 现在分词:hashing 过去式:hashed v. chop,cut up,mince,grind,shred hash 显示所有例句
IDM
make a hash of sth (informal) 把某事弄糟to do sth badly
例句释义: 切细,弄糟,反复推敲,肉丁土豆,井号,哈希,散列,杂凑 1. Mr Ahmadinejad has made a hash of the economy, so there is at least a chance he could be defeated at the polls by a more pragmatic figure. 阿贾德严重的恶化了经济,所以存在至少一线希望使得他在计票当中以更大差距被击败。 www.ecocn.org 2. It's sometimes known as an associative array because data is associated with a key value, or as a hash table. 它有时候称为关联数组(因为数据与一个键值相关联),或者作为散列表。 www.ibm.com 3. When in "record" mode, these dwell times are expanded into a string and used to generate a cryptographic hash of the signature. 当处于“record”模式时,这些停顿时间将被扩展为字符串并用于生成签名的密码散列。 www.ibm.com 4. The return value has no special meaning and is not suitable for use in a hash code algorithm. 返回值没有特殊意义,不适合在哈希代码算法中使用。 msdn2.microsoft.com 5. The hash value of received data can be compared to the hash value of data as it was sent to determine whether the data was altered. 可以将接收到的数据的哈希值与数据在发送时的哈希值进行比较,以确定该数据是否已被更改。 msdn2.microsoft.com 6. It behaves as though it were a giant hash table, looking up key = value pairs. Give it a key, and set or get some arbitrary data. Memcached的奇妙之处在于它的两阶段hash的方法,它通过一个巨大的hash表来查找key=value对,给它一个key,就可以set或get数据了。 blog.163.com 7. This user access key is nothing but a hash of a user-defined password (either login password or another password specific to EFS). 用户访问密钥只是用户定义的密码(登录密码或EFS专用的另一个密码)的散列。 www.ibm.com 8. In a bit of Perl shorthand, the array of field names and the array of parsed fields is combined into a hash. 通过一点Perl技巧,字段名数组和已解析字段数组被合并到一个哈希中。 www.ibm.com 9. A hash table that contains an internal object to which object pooling properties are applied, referenced by an internal key. 一个哈希表,包含应用了对象池属性且由内部键引用的内部对象。 msdn2.microsoft.com 10. Try to use built-in primitives instead of building your own construction out of an encryption algorithm and a hash function. 尝试使用内置原语而不是抛开加密演算法和杂凑函数去建构自己的构造。 www-128.ibm.com 1. The developed signature will then be transformed into a cryptographic hash and stored on disk to be compared later during the monitor phase. 然后,开发的签名将被转换为密码散列并存储到磁盘中,以供稍后在监视阶段中进行比较。 www.ibm.com 2. You'll see a load of strings between the first and second lines prefixed by a hash (#) - simply add the second line near the bottom. 你可以看见在第一行和第二行之间看到大量的以#作为前缀的字符串,只需要增加底部附近第二行即可。 www.bing.com 3. Europe's feuding leaders could hash out a deal to put the single currency and the zone's banking system on a sustainable footing. 相互争斗的欧洲领导人可能会敲定一项协议,在可持续的基础上推进单一货币和区域银行体系。 www.bing.com 4. Congress returns from recess on Tuesday, and bipartisan groups in the House and Senate have been trying to hash out compromise deals. 美国国会周二结束了休会期,参众两院的两党小组正在努力展开认真的讨论,以求达成妥协性协议。 www.bing.com 5. Mr Reid had appointed a panel of ten moderates and liberals from his party to hash out a compromise on this issue. 瑞德任命了由其党内十名温和派和自由主义者组成的专门小组来敲定该议题。 www.ecocn.org 6. Again , let us remind you that using proprietary cryptographic algorithms , including hash functions, is usually a bad idea . 再次提醒您,使用专用密码演算法,包括杂凑函数,通常是一个坏主意。 www.bing.com 7. You know, you sit down with her, she slings hash, she sits there and cusses like a sailor, and she's hilarious. 当你和泰勒坐在一起时,你总是会被她所感染,她就像是个欢天喜地的水手一样。 www.chinadaily.com.cn 8. Note: IXF files cannot be used to load into a table defined in a hash partitioned database. 注意:无法使用IXF文件将导出表装入哈希分区数据库中定义的表。 www.ibm.com 9. The new software isn't ready for the client yet. He's expecting it tomorrow so we're going to have to hash something out in a hurry. 新软件还没有为客户做好。他明天要产品,所以我们必须迅速解决这个复杂问题。 liuxi1019.blog.163.com 10. The hash value computation is not performed until one of the properties or methods is called. 直到调用属性或方法之一时才执行哈希值计算。 msdn2.microsoft.com 1. Almost as damaging is the hash that banks have made of "value-at-risk" (VAR) calculations, a measure of the potential losses of a portfolio. 几乎具有同样毁坏性的是银行用“在险价值”(“value-at-risk”,VAR)法(一个对投资组合潜在损失的衡量指标)所制造的无用数据。 bbs.yeeu.org 2. Why is India, even as it demands, and gets, more respect in the world on the back of recent economic progress, making such a hash of this? 印度经济近来不断前行,正当它要求并得到了世界更多尊重的时候,它为何将此事搞得一团糟? www.ecocn.org 3. A hash of a message, which can be used to verify that the contents of the message have not been altered in transit. 消息的一个散列,可以用于校验消息内容是否在传输过程中有所改变。 kajaa.bbs.us 4. When hash tables are built, join keys are pushed down and used to filter the rows of the fact table, and performance improves dramatically. 构建散列表时,连接键被下推用于过滤事实表的行,性能也显著提高。 www.ibm.com 5. With a large number of hash keys for a given number of rows, the likelihood of a collision decreases. 为给定数量的行准备很大数量的哈希关键,这可能降低冲突的可能。 database8.com 6. These functions map binary strings of an arbitrary length to small binary strings of a fixed length, known as hash values. 这些函数将任意长度的二进制字符串映射为固定长度的小二进制字符串(称为哈希值)。 technet.microsoft.com 7. In the season of joy I present my sincere wishes a powerful d kind thoughts. May the kind of New Year outshine hash of the rest. 在这兴奋的季节给你我最真的祝愿和热情的挂念,愿你本年的新年比今年更璀璨。 www.chinahengchen.com 8. Determined not to make a hash of it, I sought advice from a Portsmouth fan in the office. 我决定不仓促行事,我特地请教了办公室里一位朴茨茅斯队的球迷。 bbs.newacad.com 9. A simple hash with an x y key was the only thing I needed to get the simulation done. 我只需要使用一个具有xy键的简单散列表就可以完成仿真。 www.ibm.com 10. A Ruby hash (or associative array) is a data structure that allows you to define the key for storage (instead of a simple numerical index). Ruby散列表(或关联数组)是一种数据结构,允许您定义用于存储的键(而不是简单的数值索引)。 www.ibm.com 1. To be used in this comparison operation, the message is converted into a "hash, " which is a numerical representation of the complete text. 若要在此比较操作中使用邮件,需要对邮件进行“哈希”转换,即将其全部文本转换成数字形式。 technet.microsoft.com 2. Hash algorithms map binary values of an arbitrary length to small binary values of a fixed length, known as hash values. 哈希算法将任意长度的二进制值映射为固定长度的较小二进制值,这个小的二进制值称为哈希值。 www.kuenglish.info 3. The String class specifies a similar algorithm to be used for computing the hash value of a String. String类规定类似的算法用于计算String的散列值。 www.ibm.com 4. Specifies all the hash algorithms used for hashing files and for generating the strong name. 指定用于哈希文件和用于生成强名称的所有哈希算法。 www.kuenglish.info 5. In theory the hash table is a rather simple construct, just collection of arrays or linked lists divided into a finite number of buckets. 理论上,哈希表是一个非常简单的构造,就是数组或链表的集合被划分到有限数量的存储体中。 www.infoq.com 6. I have no doubt that your father will settle his hash for him if he has the temerity to follow you home! 你父亲不会让他再找麻烦的,这点我不怀疑,即使他鲁莽地跟着你回家! blog.sina.com.cn 7. They 're jokes , and the hash tag serves as a sort of " can you top this" repository of over-the- top " thug " behavior . 它们就是玩笑,#标签作为一种“你能置顶”的,没有限制的“暴徒”行为的智库。 www.bing.com 8. Hashes do not keep the entered items in the same order as they were entered. Hash variables always start with the % sign. 哈希并不保证被保存数值的有序存放,哈希变量名称始终用%符号开始表示。 dictsearch.appspot.com 9. A key-value store is basically a hash table on disk, so the location of a piece of data can be guessed without having to consult an index. 键值存储从基本上说就是磁盘上的哈希表,因此在无需借助索引的情况下可以猜测一块数据的位置。 www.ibm.com 10. However, finding any of the strings that hash to the same value results in being able to reproduce the same hash value. 然而,找到任何散列到相同值得字符串能够再次生成相同的散列值。 www.ibm.com 1. The information is returned in the form of a hash of information, tied between the OID and the corresponding value. 信息以绑定OID与对应值的信息散列的形式返回。 www.ibm.com 2. The values of the hash are unique for the hashed message, and the hash values will not expose the message since the hash is one way only. 哈希值对于经过哈希处理的消息来说是唯一的,而且由于哈希是单向的,因此哈希值不会暴露消息内容。 www.hotdic.com 3. Breakfast was corned beef hash, browned, with an egg on top of it, coffee and milk, and a big glass of chilled grapefruit juice. 早饭吃的是罐头咸牛肉丁,烘烤得黄灿灿的,上面还配着一只煎鸡蛋,还有咖啡牛奶和一大杯清凉爽口的葡萄汁。 dict.ebigear.com 4. The function has no effect if an exception is thrown, unless it is thrown by the container's hash function or comparison function. 如果抛出异常,则该函数没有作用,除非异常是从容器的散列函数或比较函数中抛出的。 boost-doc-zh.googlecode.com 5. To me, the hash criticisms on the lip- synching from the West reflected nothing but the differences in culture. 对我来说,这个来自西方的对于假唱杂凑的批评只不过反映了文化上的差异。 dictsearch.appspot.com 6. If you call the derived type's GetHashCode method, the return value is not likely to be suitable for use as a key in a hash table. 如果您调用派生类型的GetHashCode方法,则返回值不大可能适合用作哈希表中的键。 msdn2.microsoft.com 7. This index contains hash values of the actual strings and can be used for equality predicates only, not for range predicates. 该索引包含实际字符串的散列值,只能用于等式谓词,不能用于范围谓词。 www.ibm.com 8. So every extra little bit of overhead in your hash function can be a bottleneck. 因此,散列函数中每一点多余的开销都可能成为瓶颈。 www-128.ibm.com 9. He made himself an enormous breakfast of poached eggs, French toast, hash browns and carrot soup . 他为自己做了一份丰盛的早餐,有水煮鸡蛋、法国土司、马铃薯饼和红萝卜汤。 www.showxiu.com 10. For a message digest, the strength of the algorithm is determined by the size of the hash or check sum that the algorithm generates. 对于消息摘要,算法的长度由算法生成的哈希码或者校验和决定。 www.ibm.com 1. This property specifies whether to reverse hash on the cluster that this network adapter is a part of. 此属性指出此网络适配器是其中的一部分的群集是否要反转散列。 angel.w15.5tom.cn 2. Furthermore, if you hash incoming passwords manually AuthComponent will not be able to log you in at all. 此外如果你手动给密码进行加密,验证组件不会让你登陆。 www.bing.com 3. This hash map associates the field descriptor string for a generic class without any parameter types to the GenericTemplate for that class. 这个哈希映射把没有参数类型的泛型类的字段描述符字符串与这个类的GenericTemplate关联起来。 www.ibm.com 4. Leone summoned Cambridge police and Gates's attorneys to a meeting yesterday morning to hash out a resolution. 昨天,Leone召集坎布里奇警察局和Gates的律师会谈,以商量解决方案。 www.bing.com 5. Rather than starting with a full-blown object-oriented implementation, I'm going to represent transitions in a hash table. 首先,我将使用一个散列表表示转换,而没有使用成熟的面向对象实现。 www.ibm.com 6. Session. Hash_function allows you to specify the hash algorithm used to generate the session IDs. session.hash_function允许用户指定生成会话ID的散列算法。 in.php.net 7. Hash Table question Enter the names of a total of 30, you take the average length of a maximum of two. 假设人名为汉语拼音形式。待填入哈希表的人名共有30个,取平均查找长度的上限为2。 ftp.hackchina.com 8. In this method, one of the tables, usually the smaller one, is scanned and used to create a hash table in memory. 在该方法中,需要扫描其中的一个表,通常扫描较小的那个表,用它在内存中创建一个哈希表。 www.ibm.com 9. Maximum number of cached entries in a hash bucket for this hash table since the server was started. 自服务器启动以来,哈希存储桶中用于该哈希表的最大已缓存条目数。 technet.microsoft.com 10. Those hash algorithms are essentially serialized, so the longer the length of the source file is, the longer the hash operation takes. 并且这些体系所使用散列算法在实质上都是串行的,因而待加密数据越长,加密运算时光越长。 www.qk114.net 1. The number of comparisons that have been performed beyond the hash value in an index. 索引中散列值以外已执行的比较的数量。 www.ianywhere.com 2. It couldn't even do so if it wanted to because by default it only stores a one-way hash of the password, not the password itself. 它甚至不会按预想的方式工作。因为它默认为保存密码的单向散列值,而不是密码本身。 www.cnblogs.com 3. During binary loading, the TE sub system is called by the system loader, which calculates the hash using the SHA-256 hash algorithm. 在二进制加载期间,系统加载程序调用TE子系统,并使用SHA-256散列算法来计算散列值。 www.ibm.com 4. PHP has an array type that doubles as as a simple list and a dictionary or hash; Python separates the two. PHP的数组类型可同时支持简单列表和字典或散列,但Python却将这两者分开。 www.ibm.com 5. With a Forest of Trees index, the database architect can specify one or more of the leading columns to be used to create a hash key. 有了ForestofTrees索引,数据库架构师可以指定一个和多个引导列来创建一个hash键。 www.ibm.com 6. Came in, had his hash browns and coffee as you see in the surveillance video. 进来之后,他要了烤面包和咖啡。这在监控录像上都可以看到。 www.bing.com 7. Within each element of the array is a hash table that includes the name of the event and an array of the games played. 该数列内的每个元素都是一个散列表,包含事件名称和比赛项目的阵列。 www.ibm.com 8. Try values that allow you to type thousands of words in normal usage before printing a cryptographic hash. 先尝试在普通使用场景下键入数千个单词,然后再输出密码散列。 www.ibm.com 9. To store an object in an unordered associative container requires both an key equality function and a hash function. 要将一个对象保存在无序关联式容器中,需要有一个键值等同性函数和一个散列函数。 boost-doc-zh.googlecode.com 10. After defining a simple hash of the colors considered to be valid precipitation, the image specified is loaded from disk. 在定义了被视为有效降水的简单颜色散列之后,将从磁盘载入指定的图像。 www.ibm.com 1. If that hash number is already in the index, the piece of data is considered a duplicate and does not need to be stored again. 如果哈希号码已经在索引中的数据块被认为是重复的,并不需要存储一次。 linux.cn 2. In Java, the String hash code method calculates the hash code of a string by treating the string, in a way, as a base-31 number. 在Java中,String散列码方法将字符串视为base-31数字,以此计算其散列码)。 www.ibm.com 3. But the banks have made such a hash of deciding whom to lend to in the past that the public could hardly be any worse. 但银行也曾经匆忙决定向谁发放贷款,公众不会比做得比他们更糟糕。 www.ftchinese.com 4. A dictionary is like an associative array or hash: It uses key-value pairs to store and retrieve information. 字典类似于关联数组或散列;它使用键值对来存储和限制信息。 www.ibm.com 5. For each block of data, this method updates the state of the hash object so a correct hash value is returned at the end of the data stream. 对于每个数据块,此方法更新哈希对象的状态,以便在数据流的最后返回正确的哈希值。 msdn2.microsoft.com 6. The JSON object includes both the "id" field and the "name" field for the record encoded as a JavaScript hash table. 对于作为一个JavaScript哈希表编码的记录,JSON对象包含“id”字段和“name”字段。 www.ibm.com 7. Given a password and a string identifying the hash type, produces a hash password suitable for storing in a configuration file. 在给定密码和标识哈希类型的字符串的情况下,生成适合存储在配置文件中的哈希密码。 msdn2.microsoft.com 8. You can see that the methods -- state, transition, and event -- combined with closures and hash maps, make a nice DSL. 可以看到这个方法——状态、转换和事件——与闭包和散列映射结合起来,可以形成一个良好的DSL。 www.ibm.com 9. Must be able to generate a hash code for itself using an implementation of the. 方法的实现为其自身生成哈希代码。 msdn2.microsoft.com 10. This dynamic filter on the fact table reduces the number of rows used in the probe phase of the actual hash joins. 事实表上的动态过滤减少了实际散列连接探测阶段使用的行数。 www.ibm.com 1. Class using a public key, a hash algorithm identifier, and a value indicating whether the extension is critical. 使用一个公钥、一个哈希算法标识符和一个指示扩展是否重要的值初始化。 msdn2.microsoft.com 2. If the transaction is later rolled back, all of the changes made to the hash table under that transaction can be undone. 如果以后回滚该事务,则可以撤消基于该事务对哈希表进行的所有更改。 msdn2.microsoft.com 3. Namespace to retrieve the hash code values for the respective threads on which the application methods and the garbage collection run. 命名空间来检索运行应用程序方法和垃圾回收的各个线程的哈希代码值。 msdn2.microsoft.com 4. The other is an automated analyzer (which incorporates a SAT solver) to hash through a multitude of possible scenarios. 另一种元素为自动分析器(内含SAT解析器),可反覆推敲众多可能出现的情节。 dict.bioon.com 5. The first method allows the creation of hash tables associated with a table name plus the insertion of string values mapped to a key . 第一个方法允许创建一个与表名有关的散列表,并在其中插入一个映射到键的字符串值。 www.bing.com 6. Microsoft clients pass passwords around the network as a Microsoft-specific hash rather than plain text or a UNIX password hash. Microsoft客户端以Microsoft专用的哈希而不是纯文本或UNIX密码哈希形式在网络中传递密码。 www.ibm.com 7. Instead, you could create a hash map of zip code and weather information, and save that information into the portlet service. 您可以转而创建一个邮政编码和天气信息的散列图,并将此信息保存到Portlet服务中。 www.ibm.com 8. He also asked me if I had any hash. This is obviously between the two of you, so. No, you're not leaving. 他还问我有没有洋芋泥。显然这是你们两个之间的事,所以。,不,你别走。 www.bing.com 9. This query plan uses hash join for each join between the fact table and a dimension table. 这个查询对每个事实表和维度表之间的连接使用散列连接。 www.ibm.com 10. Element to map an object identifier for the RIPEMD-160 hash algorithm to an implementation of that hash algorithm. 元素将RIPEMD-160哈希算法的对象标识符映射到该哈希算法的实现。 msdn2.microsoft.com 1. Item A leading % matches like a bare hash except that each key is treated as a rule (string or hard ref) rather than as a literal. 开头表示匹配为一个裸露的哈希,除非每个键被当做一个规则(字符串或者引用)而不是普通字符。 wiki.perlchina.org 2. When asked to validate a password, the Membership service hashes the presented password, then compares the hash value with its copy. 当验证密码时,会员服务将当前密码散列,并与它的拷贝值进行比较。 www.cnblogs.com 3. The cost of applying the partitioning hash algorithm is proportional to the size of the partitioning key. 应用分区散列算法的代价与分区键的规模成比例。 www-128.ibm.com 4. A brunch of two scrambled eggs, toast, hash browns and a Coca-Cola at a greasy diner comes to more than $20. 一两炒鸡蛋,面包,土豆煎饼和可口可乐在油腻的晚餐早午餐自带超过20美元。 www.englishtang.com 5. Will use recursion to acquire the lock on each bucket and rehash the elements from each bucket into a new, larger hash table. 就使用递归获取每个bucket上的锁并重排每个bucket中的元素到一个新的、更大的hash表中。 www-128.ibm.com 6. Contains the time stamp and hash code that identifies the last time the Analysis Services project was built. 包含用来标识AnalysisServices项目的上次生成时间的时间戳和哈希代码。 msdn2.microsoft.com 7. However, the results of a hash distinct must be fully materialized before returning from the query. 但是,必须完全实现非重复散列的结果后,才能从查询返回。 www.ianywhere.com 8. end If you're unfamiliar with it, this is basically just a literal hash syntax. 如果你觉得陌生,其实它只不过是基本的字面值哈希语法。 www.infoq.com 9. It is an impediment to scalability, because only one thread can access the hash table at a time. 首先,这种方法对于可伸缩性是一种障碍,因为一次只能有一个线程可以访问hash表。 www-128.ibm.com 10. Otherwise, you create a new entry in the hash for the word, and then load the count (which should be 1 from the mapper process). 否则,您需要在该单词的hash中创建新的条目,然后加载计数(应该是来自mapper过程的1)。 www.ibm.com 1. As this query plan shows, keys from more than one hash table build can be pushed down to filter rows of the fact table. 如这个查询计划所示,不止一个散列表的键可以被下推来过滤事实表的行。 www.ibm.com 2. The only available collection data structures are vectors, stacks, enumerations, and hash tables. 唯一可用的集合数据结构是向量栈、枚举和hash表。 www.ibm.com 3. He MADE a hash of the translation. 他译得一塌糊涂。 dict.ebigear.com 4. If TESTING is enabled, the hash entries are printed out in sorted order as the loop executes. 如果TESTING启用,当循环执行时,哈希条目将以排序顺序显示。 www.ibm.com 5. Synchronized hash table implementation of the Map interface that does not allow null keys or values, with additional "legacy methods. " Map接口的线程同步哈希表的实现,不允许空的键或者值,和其派生下来的方法也变为线程安全的。 www.bing.com 6. Note, you first test whether this key is in the hash and, if so, increment the counter for that key. 注意,您首先测试这个密匙是否位于散列表中,如果是,则递增该密匙的计数器。 www.ibm.com 7. The transfer object is a transient hash used to move data back and forth between controller and view. 传输对象是一个短暂的hash,用于在控制器与视图之间来回移动数据。 www.ibm.com 8. An element of Property type introducing a name-object association within the System Properties hash table. 在SystemProperties散列表内引入名称-对象关联的Property类型元素。 www.ibm.com 9. This means that the same password could have two completely different hash values, which would be ideal. 这意味着完全相同的密码可能会具有完全不同的哈希值,这才是最理想的情况。 www.bing.com 10. Summon Republican and Democratic congressional leaders back from vacations and hash out a deal on jobs. 号召共和党和民主党国会领导人取消休假和解决协议的工作。 www.bing.com 1. Senior faculty meet at least weekly to hash out course details and craft new case studies and other teaching materials. 资深教师们至少每周聚会一次,以敲定课程的细节、勾画新的案例研究并准备其他教学材料。 www.hroot.com 2. For each of these records, we will extract the fields by name and store each of the values in a hash keyed on the field name. 对于这其中的每条记录,都将按名称提取字段并将每个字段值存储到与字段名关联的散列中。 www.ibm.com 3. Note that this function takes a hash reference, not an actual file name. 注意,该函数接受散列引用,而不是实际的文件名。 www.ibm.com 4. If the hash key is calculated from those parameters, previously generated versions of the same view can be retrieved easily from the cache. 如果用这些参数计算散列键,则很容易在缓存中找到同一视图的旧版本。 www.ibm.com 5. DOMHASH is an algorithm that generates a unique hash value for a given node in an XML document tree. DOMHASH是一种算法,为XML文件树中一个给定节点生成唯一的哈希数。 www-128.ibm.com 6. The first part of the main program logic calls readOsdFile to set up the keyword matching and parameter hash. 主程序逻辑的第一部分将调用readOsdFile来设置关键字匹配和参数散列。 www.ibm.com 7. Creates an instance of an implementation of a Hash-based Message Authentication Code (HMAC). 创建基于哈希的消息验证代码(HMAC)实现的实例。 msdn2.microsoft.com 8. Typically the digital signature is computed by applying a mathematical function to the hash of the data to be signed. 通常数字签名通过将数学函数应用到要签名的数据的哈希来计算。 www.kuenglish.info 9. All hash-based collections assume that an object's hash value does not change while it is in use as a key in the collection. 所有基于散列的集合假设,当对象的散列值用于作为集合中的关键字时它不会改变。 www.ibm.com 10. Supplies a hash code for an object, using a hashing algorithm that ignores the case of strings. 使用忽略字符串大小写的哈希算法,为对象提供哈希代码。 msdn2.microsoft.com 1. A homeless man pulls out a roll, says it's on him The mayor has no cash He said he spent it on hookers and hash 以无家可归的人拿出一叠钞票,说他来请客市长身无分文他说他把钱全花在了召妓和八卦上 post.baidu.com 2. hash (Hashing) search and search for a general law (searching) is not the same. 杂凑法(Hashing)的搜寻与一般的搜寻法(searching)是不一样的。 3333355555.com 3. As with the jcarousel method, a hash of initialization parameters allows you to customize the behavior of the tabs method. 与jcarousel方法一样,可以通过传递初始化参数的散列来定制tabs方法的行为。 www.ibm.com 4. Where possible, use a strong name membership condition, a publisher membership condition, or the hash membership condition. 应尽可能使用强名称成员条件、发行者成员条件或哈希成员条件。 msdn2.microsoft.com 5. When the system boots, it measures its own hashing and PCR loading code and writes the hash to the first PCR of the TPM. 当系统启动时,它会测量自己的哈希和PCR加载代码,并将哈希写入TPM的第一个PCR。 www.microsoft.com 6. In a previous article, we discussed ReplCache, which is an implementation of a grid data container using consistent hash based distribution. 在之前的文章中,我们讨论了ReplCache,它使用了基于哈希一致性的分布式技术实现了一个网格数据容器。 www.infoq.com 7. hash is all they had , okay ? eat , quick. 他们只有杂烩炒饭,行吗?吃吧,快点。 www.ichacha.net 8. Other features include cryptographic hash functions, cryptographic transform libraries, and cryptographic hardware support. 其他特性还包括加密散列函数,加密转换库和加密硬件支持。 www.ibm.com 9. If a control key is found, and the next key pressed is specified in the %keys hash, the event time for that key is recorded. 如果控制键被找到,并且在%keys散列中指定了下一个按下的键,那么该键的事件时间将被记录下来。 www.ibm.com 10. The join between the fact table and any dimension table is an equi-join, which makes a hash join possible. 事实表和任何维度表之间的连接都是等值连接,这使得散列连接成为可能。 www.ibm.com 1. At run time, the data digest is decrypted with the public key and compared with the hash value of the stored procedure. 在运行时,数据摘要将使用公钥解密并与存储过程的哈希值进行比较。 technet.microsoft.com 2. The initialization process may also introduce name-object associations in the System Properties hash table. 这个初始化过程还可以引入SystemProperties散列表中的名称-对象关联。 www.ibm.com 3. The hash is then checked for the word; if found, the count is added to the element. 而后该hash会检查该单词;如果发现,则将计数添加到元素。 www.ibm.com 4. Digest authentication transmits passwords over the network as a hash value for additional security. 为获得附加安全性,摘要式身份验证将密码作为一个哈希值通过网络传递。 technet.microsoft.com 5. A hash value is a unique and extremely compact numerical representation of a piece of data. 哈希值是一段数据唯一且极其紧凑的数值表示形式。 msdn2.microsoft.com 6. In open addressing, when a data item can't be placed at the index calculated by the hash function, another location in the array is sought. 在开放地址法中,若数据不能直接放在由哈希函数计算出来的数组下标所指的单元时,就要寻找数组的其他位置。 blog.sina.com.cn 7. Twitter search results are returned in a hash reference with a page count and other fields besides the search results themselves. Twitter搜索结果以一个散列引用的方式返回,除搜索结果本身外,还包含一个页面计数和其他字段。 www.ibm.com 8. Of course, if Obama really wants to make a hash of the world, I can think of no better way than to start launch airstrikes on Iran. 当然,如果奥巴马真的想给世界一点威慑,最好的办法就是对伊朗发动空袭。 www.bing.com 9. The search results are saved into a hash map for sorting, categorizing, and filtering. 搜索结果被保存到一个散列映射中以进行排序、分类和筛选。 www.ibm.com 10. In various languages, this collection is realized as an object, record, struct, dictionary, hash table, keyed list, or associative array. 这个集合可能被实现为对象、记录、结构、词典、散列表、键列表或关联数组,具体情况取决于所使用的语言。 www.ibm.com 1. When the message arrives at its destination, the hash provides some assurance that the message has not been tampered with. 当消息到达其目的地时,哈希可以在一定程度上保证该消息不被篡改。 www.ibm.com 2. Given a reference to the XML describing an individual pet, this code 'folds' it into a hash. 给出一个描述单个宠物的XML引用,这段代码将它转换为一个散列。 www.ibm.com 3. A keyword's hash value is typically computed by combining the associated values of its keysig with its length. 关键字散列值通常这样计算:将关键字的keysig关联值和关键字长度结合。 www.ibm.com 4. A cache is an application-specific hash table used to store frequently accessed data. 缓存是用于存储经常访问的数据的特定于应用程序的哈希表。 msdn2.microsoft.com 5. Using a power of 2 allows for much quicker selection of the bucket to use, but at the expense of loosing the upper bits of the hash value. 使用2的幂则可以更快地选择要用的桶,但是它的代价是损失了散列值的高位信息。 boost-doc-zh.googlecode.com 6. The first for loop searches for a pre-existing entry in the windows hash that does not currently have a pipe attached to it. 第一个for循环将搜索目前没有绑定管道的窗口散列中的已有条目。 www.ibm.com 7. A more well-behaved hash function would distribute the hash values more evenly across the hash range. 一个循规导矩(Well-behaved)的散列函数将在该散列范围内更均匀地分配散列值。 www.ibm.com 8. The assembly name includes the name, version, and strong name hash of the assembly. 组件名称包括名称、版本和组件的强式名称杂凑。 technet.microsoft.com 9. Hash values are unique and compact numerical representations of a piece of data. 哈希值是一块数据唯一和紧凑的数字表示形式。 msdn2.microsoft.com 10. The hash is made up of a byte array and a value from a class of supported algorithm types. 该哈希由字节数组和受支持算法类型的类中的值组成。 msdn2.microsoft.com 1. If these two the same hash value, then the recipient will be able to confirm the digital signature is the sender. 如果这两个散列值相同,那么接收方就能确认该数字签名是发送方的。 zhidao.baidu.com 2. The file %1 has a length of zero bytes and cannot be hashed. Choose another file to hash. 文件%1长度为零字节,不能被散列。请选择另一个文件来散列。 angel.w15.5tom.cn 3. For this system to work, the protected hash must be encrypted or kept secret from all untrusted parties. 为使此系统发挥作用,必须对受保护的哈希值进行加密或将该哈希值对所有不受信任的用户保密。 technet.microsoft.com 4. The signing authority "signs" a certificate using one of several cryptographic algorithms to generate a hash. 签发机构在证书上“签名”,用的是通过一种密码算法产生的散列值。 www.infoq.com 5. She could choose one who would not make a hash of things. 她可以选择一位不会把事情弄糟的人。 dict.veduchina.com 6. To prevent people from writing to this file, Apple protects it with a checksum hash which has to be reverse-engineered. 为了防止人们在该文件写入内容,苹果用校验和散列(checksumhash)函数对其进了加密。 www.bing.com 7. Using a simple hash over the OID, each object is assigned to a placement group. 在OID上使用一个简单的哈希,每个对象都被分配到一个放置组。 www.ibm.com 8. Key-values Stores. The main idea here is using a hash table where there is a unique key and a pointer to a particular item of data. KV存储的主要思想是一个哈希表,每个item有一个主键和特定的数据值。 www.bing.com 9. Passwords are hashed using a one-way hash algorithm and a randomly generated salt value when stored in the database. 密码在存储到数据库时使用单向哈希算法和随机生成的salt值进行了散列。 msdn2.microsoft.com 10. The hash code is an integer that should return a unique number of each unique key. 散列码是一个整数,应该对每个键返回唯一的数字。 www.ibm.com 1. She then iterates through the different permutations of each document, creating and storing a hash value. 然后她反复尝试每份文件不同的排列,建立和储存杂凑值。 www-128.ibm.com 2. This new payload contains a well-known hash value, which indicates that the peer is capable of performing IPSec NAT-T. 这个新的有效载荷包含一个众所周知的散列值,它表明这个对话方能够执行IPSecNAT-T。 blog.163.com 3. Returns a hash code for the given object, using a hashing algorithm that ignores the case of strings. 使用忽略字符串大小写的哈希算法返回给定对象的哈希代码。 www.kuenglish.info 4. With the latest iTunes update, Apple has once again changed the hash, meaning it needs to be reverse-engineered again. 苹果最近又对iTunes进行了更新,改变了散列函数,也就是说需要再次利用逆向工程进行破解。 www.bing.com 5. A mask used to retrieve a revision of the Secure Hash Algorithm that corrects an unpublished flaw in SHA. 用于检索“安全哈希算法”修订版的掩码,该修订版更正了SHA中的一个未发布的错误。 www.kuenglish.info 6. When a user presents credentials, you can hash the user's password and compare only the hashes of the two. 当用户提供凭据时,您可以散列用户的密码并仅比较二者的哈希。 msdn2.microsoft.com 7. If it wasn't for faith , there would be no living in this world ; we couldn't even eat hash with any safety . 倘使没了信义,这世上就不会有生活;我们连肉丁杂烩也不能吃得安安乐乐了。 www.bing.com 8. The hash of a digital certificate stored in the personal certificate store of the client computer. 存储在客户端计算机个人证书存储区中的数字证书的哈希。 msdn2.microsoft.com 9. hash-send-sort. The beauty of using hashing is that the data can be sent to its destination while the map is still processing it. 美丽的使用散列是数据可以送到目的地而地图仍然是处理它。 blog.sina.com.cn 10. The generated hash value is numeric, and I use this value as single index key for the string being indexed. 生成的hash值是数值型的,我使用这个值作为被索引的字符串的索引键。 www.ibm.com 1. When the directories are distributed, this hash value maps to a specific entry in a specific directory server in the back end. 在分布目录时,这个散列值映射到特定后端目录服务器中的特定条目。 www.ibm.com 2. The hash value represents concisely the longer message or document from which it was computed ; this value is called the message digest . 哈希值简明地表示从中计算它的较长消息或文档;该值称为消息摘要。 www.bing.com 3. The clerk will probably ask you if you want deep-fried hash-brown potatoes with your order. 定餐时售货员可能还会问你要不要再点个油炸薯饼吃吃。 www.24en.com 4. Mhash is a free (under GNU Lesser GPL) library which provides a uniform interface to a large number of hash algorithms. Mhash是一个免费的(在GNULGPL授权)库,它提供了一个统一的接口了大量的哈希算法。 blog.sina.com.cn 5. A similar widely used application for hash tables is in computer-language compilers, which maintain a symbol table in a hash table. 哈希表还在另一个类似的领域得到广泛应用,这就是高级计算机语言的编译器,它们通常用哈希表保留符号表。 blog.sina.com.cn 6. An array into which data is inserted using a hash function is called a hash table. 使用哈希函数向数组插入数据后,这个数组就称为哈希表。 blog.sina.com.cn 7. We assign the guid by creating it as a hash of the date and time the item was entered. guid的指派方法为:将其创建为输入项的日期和时间的散列。 www.ibm.com 8. A hash join is usually faster than a sort merge join since there is no sort operation involved. 哈希连接通常比分类合并连接快,因为它没有涉及到分类操作。 www.ibm.com 9. Because Ruby does not require instance variable declaration, the simplest way to model instance variables is with a hash. 由于Ruby并不需要声明实例变量,因此建模实例变量最简单的方式就是使用散列。 www.infoq.com 10. Fortunately, the whole discussion of overflows does not apply to the hash index that I implemented. 幸运的是,针对溢出的全部讨论不会出现在我所实现的hash索引。 www.ibm.com 1. As the name implies, the hash part uses a hash algorithm to store and find its keys. 顾名思义,散列部分用散列算法存储及查找它的键。 blog.chinaunix.net 2. hash table, and then through a least-squares fit to a final estimate of model parameters. 最小平方的适合变换散列表,然后到式样参量的一个最后的估计。 iask.sina.com.cn 3. In the proposed construction hash chains can be securely re-initialized in a non- repudiate manner. 而且,这种构造方法能够以不可否认的方式安全地再生散列链。 dictsearch.appspot.com 4. If Democrats and Republicans fail to hash out a compromise on the deficit, draconian spending cuts will follow in 2013. 如果民主党和共和党在讨论赤字的折中方案中失败,在2013年严重的消费开销削减将会到来。 www.ecocn.org 5. A hash value represents a unique value that corresponds to a particular set of bytes. 哈希值表示与特定字节集对应的唯一值。 msdn2.microsoft.com 6. Jim: Well, I'll tell you what, Mike. I'll review the contract and talk with management. Then we'll get together and hash this out. 吉姆:嗯,莱斯特我跟你说,我会再看一遍合约,并和管理部门讨论。然后我们会一起讨论解决这个问题。 www.ebigear.com 7. Now, two major arguments exist that pull hash-lookup off of the list of contenders for the biggest security flaw of the year. 现在,存在着两种主要的争论,它们将散列查找从年度最大的安全缺陷的竞争列表中去掉了。 www.ibm.com 8. The root member of a team of connected hash operators sharing a common hash function and partitioning strategy. 拥有相同哈希函数和分区策略的相互连接的哈希运算符组的根成员。 www.dictall.com 9. We'll have more to say about this when we discuss hash functions. 在讨论哈希函数的时候还会谈到这个问题。 blog.sina.com.cn 10. Object has an initial capacity equal to the number of elements copied, and uses the default load factor, hash code provider, and comparer. 对象的初始容量等于复制的元素数,并且使用默认的加载因子、哈希代码提供程序和比较器。 msdn2.microsoft.com 1. Every time a window gains focus that has not been focused before, its position and name are recorded in the %log hash. 每次在以前从未获得过焦点的窗口获得焦点时,系统都会把它的位置及名称记录到%log散列中。 www.ibm.com 2. when overridden in a derived class , routes data written to the object into the hash algorithm for computing the hash. 当在派生类中重写时,将写入对象的数据路由到哈希算法以计算哈希值。 www.ichacha.net 3. hash algorithms are techniques that computes a condensed representation of a message or data file . 散列算法是一种技术,用来计算信息或数据文件的压缩表示方法。 www.ichacha.net 4. Think of Memcached as a huge hash map that you can reach over the network. 可以将Memcached想象为一个大型的hash图,这个图可通过网络获得。 www.ibm.com 5. It then appends all of that data as a hash table to the episodes array, which is a member variable. 然后将所有数据作为一个哈希表附加到剧集数组,该数组是一个成员变量。 www.ibm.com 6. Ideally, each database partition in a hash-partitioned table should hold the same number of records. 理想情况下,一个哈希分区表内的每个数据库分区都应具有相同数量的记录。 www.ibm.com 7. Forest of Trees indexes combine many of the advantages of a hash index with those of a traditional Informix B tree index. ForestofTrees索引结合了hash索引和传统InformixB tree索引的许多优势。 www.ibm.com 8. This hash map interface is quite useful for specifying objects within a testing framework. 这个哈希映射表接口对于在测试框架中指定对象而言非常有用。 www.ibm.com 9. Computes the hash value of a subset of the specified byte array using the specified hash algorithm, and signs the resulting hash value. 使用指定的哈希算法计算指定字节数组子集的哈希值,并对结果哈希值签名。 msdn2.microsoft.com 10. If you have your ID to hand and are ready to proceed, please press the hash key. 如果你的手上有激活ID,并且准备好继续激活,请按#号键。 wenku.baidu.com 1. As shown in Figure 2, the view state is appended a hash value that gets checked on each and every request to detect tampering. 如图2所示,视图状态被附加了一个哈希值,对于每条请求,都会检查该值,以检测是否发生了篡改。 msdn2.microsoft.com 2. Gets or sets the name of the hash algorithm type to use for generating the mask. 获取或设置用于生成掩码的哈希算法类型的名称。 msdn2.microsoft.com 3. It performs a hash lookup through the Interface Registry Table to try and locate the interface specification requested. 它在接口注册表中执行散列查询,寻找请求的接口规范。 www.ibm.com 4. You can explicitly search for a known hash value with point ranges, in other words ranges with identical start and stop keys. 可以使用点范围(即开始键和终止键相同)显式地搜索一个已知的hash值。 www.ibm.com 5. But despite their utility, hash databases represent only a small sampling of all the documents out there. 虽然杂凑资料库相当有用,但实际上取样的档案数目只佔世界上所有文件档的一小部份。 edba.ncl.edu.tw 6. Given a data file of the format shown in Listing 4, the loadInflectives subroutine builds an alphanumeric phonetic hash. 如果提供清单4中所示格式的数据文件,loadInflectives子例程将构建字母数字语音散列。 www.ibm.com 7. The hash element has no attributes. hash元素没有属性。 msdn2.microsoft.com 8. Instead of using a simple hash, the programmer must learn to use a number of new data structures and access methods. 程序员必须学习使用一些新数据结构和访问方法,而不是使用简单的散列。 www.ibm.com 9. A hash is expressed as a set of attributes delimited by commas between curly braces. hash被表示为使用逗号间隔的一组属性,并且使用大括号括起。 www.ibm.com 10. It generates a hash table from the predetermined list of valid command-line options and a lookup function whose time complexity is O(1). 它将从预定的有效命令行选项列表和时间复杂度为O(1)的查找函数中生成一个散列表。 www.ibm.com 1. Returns a hash code for this Point. 返回此Point的哈希代码。 msdn2.microsoft.com 2. Try shutting me up, they brought on the Pancake Breakfast ($220) which had 2 large pancakes with eggs, hash brown and 2 sausages. 为了要将我“塞住”,更大份量的美式煎饼早餐($220)被端出来了。 www.95magazine.com 3. The optimizer will choose dynamic hash join if none of the joined columns has index. 如果连接列上不存在索引,那么优化器将选择动态哈希连接。 www-128.ibm.com 4. The cryptographic strength of HMAC depends on the properties of the underlying hash function. HMAC的加密强度取决于基础哈希函数的属性。 msdn2.microsoft.com 5. Public key system, single direction Hash function, certificate authority organization and public key management are introduced. 本文介绍了公开密码加密体制、单向散列函数、认证机构和公钥管理等。 www.elecfans.com 6. The name of the hash algorithm to use for verifying the signature. 用于验证签名的哈希算法的名称。 msdn2.microsoft.com 7. Verifies the specified signature data by comparing it to the signature computed for the specified hash value. 通过将指定的签名数据与为指定哈希值计算的签名进行比较来验证指定的签名数据。 msdn2.microsoft.com 8. If you sort a hash by only its values, the sort order of two elements with the same value may change when you add or delete other values. 如果你只根据值来排序的化,那么当添加或者删除其他值的时候,相同值的两个元素的排序顺序将会发生改变。 www.phpfans.net 9. As an important branch of Cryptography, Hash function is a one-way function and a kind of encryption map. 散列函数是密码学中一个重要的分支,它是一种单向函数,是一类加密映射,可以利用它来保护信息。 www.fabiao.net 10. The hash argument specifies a certificate identifier expressed as a hexadecimal string of varying length. Hash参数指定以长度可变的十六进制字符串表示的证书标识符。 technet.microsoft.com 1. Note that the only difference between a hash and an array in this case is that the hash can have nested sub-items and the array cannot. 请注意在本例中哈希和数组之间的惟一区别是哈希可以含有嵌套的子条目,而数组则不能。 www.ibm.com 2. Gets or sets the name of the hash algorithm for the operation. 获取或设置操作的哈希算法的名称。 msdn2.microsoft.com 3. The reason is that the underlying DB2 internal data structure stores the hash values in a tree, and duplicates are allowed in such a tree. 这是因为底层的DB2内部数据结构将hash值存储在一个树中,并且这个树允许重复的值。 www.ibm.com 4. If that was the case, then the hash function could never reliably store or retrieve the associated value. 如果这样的情况发生,哈希函数就不可能可靠地存储或获取相关的数据。 dictsearch.appspot.com 5. After each file has been processed, we'll need to sort the results hash again to get the best of all matches across all the available files. 处理完所有文件后,我们需要重新给结果散列排序以充分利用所有可用文件中的所有匹配。 www.ibm.com 6. The hash value represents a hash of the full resource string that corresponds to this application lock resource. 哈希值表示与此应用程序锁资源相对应的完整资源字符串的哈希。 msdn2.microsoft.com 7. After declaring variables and opening the image to be "sliced, " each layer in the %hgt hash is processed. 在声明变量并且打开要“分层”的图像后,将处理%hgt散列中的每个层。 www.ibm.com 8. As the number of elements in the map grows, the hash chains will grow longer and retrieval time will increase. 随着map中元素数目的增长,hash链将会变长,因此检索时间也会增加。 www-128.ibm.com 9. Object that represents the hash algorithm used in the computation of the signatures. 属性检索表示用于计算签名的哈希算法的。 msdn2.microsoft.com 10. Create a hash keyed on e-mail address for each state name, to be checked in the main program loop. 创建与每个州名的电子邮件地址绑定的散列,将在主程序循环中检查该散列。 www.ibm.com 1. But I was delayed because one table kept sending back an order of hash browns, insisting they were too cold. 但是我晚了,因为一桌人不停送会…坚称它们太凉了。 bbs.chinadaily.com.cn 2. We look up a hash table with linked list based upon the hash key for the logging token name. 我们需要根据日志标记名使用的散列值对具有链表(linkedlist)的散列表进行查询。 www.ibm.com 3. Other lines that start with a hash sign (#) are comments and are ignored by the computer. 其他以#字符开始的行是注释,执行时将被忽略。 www.ibm.com 4. It was, he'd discovered, a great opening line. "By the time I had my eggs and hash browns this morning . " “今天早上,在我想吃跟馅饼加蛋的时候……”——他觉得这种屁话真是很棒的开场白。 dictsearch.appspot.com 5. It reveals that the hash code returned by a normal method call has a different value than one returned during finalization. 结果显示,正常方法调用返回的哈希代码与终止期间返回的哈希代码具有不同的值。 msdn2.microsoft.com 6. This array is then reversed (so that now the former keys follow their values) and transformed back into a hash. 然后这个数组被翻转(所以现在先前的键跟在值的后面)并重新转换为一个哈希表。 www.ibm.com 7. The assignment operator. Copies the contained elements, hash function, predicate and maximum load factor but not the allocator. 赋值操作符。复制所含的元素、散列函数、谓词、最大负载因子,但不复制分配器。 boost-doc-zh.googlecode.com 8. Nothing, if we never used an Integer as a key in a HashMap or other hash-based collection. 如果我们从未在HashMap或其它基于散列的集合中使用Integer作为关键字的话,什么也不会发生。 www.ibm.com 9. It uses what is called an open address table, which means that all entries are stored in the hash array itself. 它用的是开放地址表——所有条目存储在自身的散列数组中。 blog.chinaunix.net 10. The length of the hash is not valid. Enter a hash that contains either 32 or 40 hexadecimal characters. 散列的长度无效。输入包含32或40个十六进制字符的散列。 angel.w15.5tom.cn 1. When password based authentication occurs, the runtime caches the password as a one way hash for future validation. 在执行基于密码的身份验证时,运行时会以单向散列的形式缓存密码,供以后检验时使用。 www.ibm.com 2. Most of the results you'll find are Hash indexing sites -- sites intentionally built to connect hash values and their corresponding keys. 您将找到的大部分结果都是哈希索引站点——有意地连接散列值和其相应关键字的站点。 www.ibm.com 3. The selected hash algorithm is not supported by Certificate Services . Select another algorithm . 证书服务不支持所选的散列算法。请另选一个。 www.bing.com 4. When Lua needs to insert a new key into a table and the hash array is full, Lua does a rehash. 当需要向表中插入新键且散列数组是满的时候,Lua进行一次再散列。 blog.chinaunix.net 5. A Movement is Born: As #OWS (twitter hash tag for Occupy Wall Street) spreads across the country, people are realizing, it's time to live! “一个运动诞生了:当#OWS(“佔领华尔街”的推特标签)传遍整个国家,人民开始意识到,是时候要活著了!” www.bing.com 6. Password (mandatory) - must be a hash, no cleartext in database. 密码(强制)-必须是一个杂凑,在数据库中没有明文。 www.bing.com 7. Supports user, temporary, regular and partitioned tables of different types range, hash and multidimensional clusters. 支持用户表、临时表、常规表以及范围、哈希和多维簇类型的分区表。 www.ibm.com 8. parboiled head of cabbage scooped out and filled with a hash of chopped e. g. beef or ham and baked; served with tomato or cheese sauce. 煮半熟的卷心菜头,挖出菜心,填充一些牛肉细丝或火腿,然后烘焙;蘸番茄和干酪沙司吃。 jukuu.com 9. We would like the content in a text file, with 1 tweet per line. common hash tags are as follows. 我们希望在一个文本文件的内容,每行1鸣叫。常见的哈希标签如下。 www.bing.com 10. And of course you can search to find the questions that you're interested in by using the same hash code. 当然你也可以搜索你感兴趣的问题,还是使用同一个hash代码就可以。 www.ted.com |
||||||||
随便看 |
|
英汉双解词典包含2704715条英汉词条,基本涵盖了全部常用单词的翻译及用法,是英语学习的有利工具。