about icon-addNote android4 Answer apple4 icon-appStoreEN icon-appStoreES icon-appStorePT icon-appStoreRU Imported Layers Copy 7 icon-arrow-spined icon-ask icon-attention icon-bubble-blue icon-bubble-red ButtonError ButtonLoader ButtonOk icon-cake icon-camera icon-card-add icon-card-calendar icon-card-remove icon-card-sort chrome-extension-ru chrome-extension-es-mx chrome-extension-pt-br chrome-extension-ru comment comment icon-cop-cut icon-cop-star Cross Dislike icon-editPen icon-entrance icon-errorBig facebook flag flag_vector icon-globe icon-googlePlayEN icon-googlePlayRU icon-greyLoader icon-cake Heart 4EB021E9-B441-4209-A542-9E882D3252DE Created with sketchtool. Info Kebab icon-lamp icon-lampBig icon-learnHat icon-learning-hat Dislike Loup Loup icon-more icon-note icon-notifications icon-pen Pencil icon-play icon-plus-light icon-plus icon-rosie-cut Rune scrollUp Share-icon Shevron-Down Shevron Left Shevron Right sound sound1 sound2 sound3 sound4 sound2 icon-star Swap icon-translate Trash icon-tutor-ellipsis icon-tutor-flip Tutor folder icon icon-tutor-learned icon-twoWayArrow Mezhdunarodny_logotip_VK vk icon-word pen_icon Logo Logo Logo
without examplesFound in 8 dictionaries

The Universal Dictionary
  • It is intended for a full-text search and it significantly expands the possibilities of working with lexical items from the Russian glossary of LingvoUniversal. Contains usage examples, synonyms, and antonyms.

hash

[hæʃ] брит. / амер.

    1. сущ.

      1. = hash-dish, -meat что-л. мелко порубленное, нарезанное, покрошенное; блюдо из мелко порубленного мяса, овощей, солянка, рагу

      2. беспорядок, мешанина, неразбериха, путаница (в фактах и т. п.)

        1. старые мысли, факты, преподносимые в новом виде (с оттенком беспорядочности)

        2. разг. околесица, бессмысленная болтовня

      3. амер.; разг. (в сочетаниях hash-house, hash-joint) дешёвый трактир, постоялый двор; забегаловка

      4. макулатура самого низкого качества

      5. = hash sign; брит.; амер. pound sign знак "решётка"

    2. гл.

      1. мелко рубить, резать, крошить (мясо)

      2. рубить, разрубать, кромсать

      3. разг. искажать, перевирать, калечить (слова и т. п.)

      4. разг. обсуждать, "пережёвывать"

      5. разг.; = hash up испортить, провалить (дело, экзамен)

  1. сущ.; разг.; сокр. от hashish

    гаш, гашиш

Learning (En-Ru)

hash

[hæʃ]

n

  1. блюдо из мелко нарезанного мяса и овощей

  2. мешанина, путаница

Unlock all free
thematic dictionaries

Examples from texts

For example, it would be disastrous if one thread tried to add to a hash table while another thread is rehashing the elements.
Например, если один поток пытается добавить элемент в хэш-таблицу, а другой в это же время пытается генерировать новые ключи, это неизбежно приведет к сбою.
Horstmann, Cay S.,Cornell, Gary / Core Java™ 2. Volume II - Advanced FeaturesХорстманн, Кей С.,Корнелл, Гари / Java 2. Том II. Тонкости программирования
Java 2. Том II. Тонкости программирования
Хорстманн, Кей С.,Корнелл, Гари
© Издательский дом "Вильямc", 2002
© Prentice Hall, Inc., 2002
Core Java™ 2. Volume II - Advanced Features
Horstmann, Cay S.,Cornell, Gary
© 2002 Sun Microsystems, Inc.
When you create a hash cluster, you will use the same CREATE CLUSTER statement you used to create the index cluster with different options.
При создании хеш-кластера используется тот же оператор CREATE CLUSTER, что и при использовании индексного кластера, но с другими опциями.
Kyte, Tom / Expert One-on-One OracleКайт, Том / Oracle для профессионалов
Oracle для профессионалов
Кайт, Том
© Перевод на русский язык. ООО «ДиаСофтЮП», 2003
© Wrox Press Ltd, 2002
Expert One-on-One Oracle
Kyte, Tom
© Wrox Press Ltd, 2002
Active Directory stores the hash for this password in the computer's object, just as it does for user passwords.
Active Directory хранит хеш этого пароля в объекте компьютера, как пользовательские пароли хранятся в объекте пользователя.
Boswell, William / Inside Windows Server 2003Бозуэлл, Уилльям / Внутренный мир Windows Server 2003, SP1 и R2
Внутренный мир Windows Server 2003, SP1 и R2
Бозуэлл, Уилльям
© Издательский дом "Вильямс", 2006
© Pearson Education, Inc., 2003
Inside Windows Server 2003
Boswell, William
© 2003 by Pearson Education, Inc.
Additionally, if there is a one to one mapping between hash keys and data rows, the access to the rows is somewhat faster as well.
Кроме того, при наличии однозначного соответствия между хеш-значениями и строкам данных, доступ к данным несколько ускоряется.
Kyte, Tom / Expert One-on-One OracleКайт, Том / Oracle для профессионалов
Oracle для профессионалов
Кайт, Том
© Перевод на русский язык. ООО «ДиаСофтЮП», 2003
© Wrox Press Ltd, 2002
Expert One-on-One Oracle
Kyte, Tom
© Wrox Press Ltd, 2002
You want to get some wine and then sit down to hash it out?”
Давай, может, закажем тебе вина – посидим и спокойно все обмозгуем?
Liss, David / The Ethical AssassinЛисс, Дэвид / Этичный убийца
Этичный убийца
Лисс, Дэвид
© К. Тверьянович, перевод, 2008
© Издательский дом "Азбука-классика", 2008
© 2006 by David Liss
The Ethical Assassin
Liss, David
© 2006 by David Liss
He didn't smell like Chill or hash, which was a good thing; a street tough hyped on Chill would make the situation rapidly unbearable.
Наркотой от него не разило — уже хорошо; уличная шпана, накачанная чиллом, сильно усложнила бы ситуацию.
Saintcrow, Lilith / Working for the DevilСэйнткроу, Лилит / Контракт с дьяволом
Контракт с дьяволом
Сэйнткроу, Лилит
© 2005 by Lilith Saintcrow
© Перевод, С. Теремязева, 2009
© Издание на руском языке, ООО "Издательство "Эксмо", 2009
Working for the Devil
Saintcrow, Lilith
© 2005 by Lilith Saintcrow
For example, only an exact match search is possible where the search query matches exactly the data attributes addressable by hash codes.
Например, поиск может производиться только по полному совпадению поискового запроса и атрибутов данных, адресуемых хеш-кодами.
The hashCode method is defined in the Object class. Therefore, every object has a default hash code. That hash code is derived from the object's memory address.
Метод hashCode определен в классе Object, поэтому каждый объект имеет хэш-код, который по умолчанию вычисляется на основании его адреса в памяти.
Horstmann, Cay S.,Cornell, Gary / Core Java™ 2. Volume II - Advanced FeaturesХорстманн, Кей С.,Корнелл, Гари / Java 2. Том II. Тонкости программирования
Java 2. Том II. Тонкости программирования
Хорстманн, Кей С.,Корнелл, Гари
© Издательский дом "Вильямc", 2002
© Prentice Hall, Inc., 2002
Core Java™ 2. Volume II - Advanced Features
Horstmann, Cay S.,Cornell, Gary
© 2002 Sun Microsystems, Inc.
A password-cracking program can attempt to determine the password (or a substitute for the password) by hashing combinations of letters and numbers using MD4 until it gets a result that matches the hash in Active Directory.
Программа взлома паролей может попытаться определить пароль (или эквивалентную замену), хешируя комбинации букв и цифр по алгоритму MD4, пока не будет получен результат, совпадающий с хешем в базе данных Active Directory.
Boswell, William / Inside Windows Server 2003Бозуэлл, Уилльям / Внутренный мир Windows Server 2003, SP1 и R2
Внутренный мир Windows Server 2003, SP1 и R2
Бозуэлл, Уилльям
© Издательский дом "Вильямс", 2006
© Pearson Education, Inc., 2003
Inside Windows Server 2003
Boswell, William
© 2003 by Pearson Education, Inc.
“There’s also a bundle of hash going around,” Ormiston added.
— Гашиш тоже здесь циркулирует, — добавил Ормистон.
Rankin, Ian / A Question of BloodРэнкин, Иэн / Вопрос крови
Вопрос крови
Рэнкин, Иэн
© 2003 by John Rebus Limited
© Е. Осенева, перевод на русский язык, 2008
© ООО "Издательская группа Аттикус", Издательство "Иностранка", 2008
A Question of Blood
Rankin, Ian
© 2003 by John Rebus Limited
You'll need to play with the size of the hash table (1,024 in my example) to avoid artificial RESOURCE BUSY messages, due to different strings hashing to the same number.
Нужно "поиграть" с размером хеш-таблицы (в моем примере — 1024), чтобы избежать сообщений RESOURCE BUSY, связанных с получением одного и того же хеш-значения по разным строкам.
Kyte, Tom / Expert One-on-One OracleКайт, Том / Oracle для профессионалов
Oracle для профессионалов
Кайт, Том
© Перевод на русский язык. ООО «ДиаСофтЮП», 2003
© Wrox Press Ltd, 2002
Expert One-on-One Oracle
Kyte, Tom
© Wrox Press Ltd, 2002
Array of list headers, indexed by hash value
Массив заголовков списков, индексируемый хеш-значением
Aho, Alfred V.,Sethi, Ravi,Ullman, Jeffrey / Compilers: Principles, Techniques, and ToolsАхо, Альфред В.,Ульман, Джеффри,Сети, Рави / Компиляторы: принципы, технологии, инструменты
Компиляторы: принципы, технологии, инструменты
Ахо, Альфред В.,Ульман, Джеффри,Сети, Рави
© Addison-Wesley Publishing Company, Inc., 1985
© 2001
© Издательский дом "Вильямс", 2001
Compilers: Principles, Techniques, and Tools
Aho, Alfred V.,Sethi, Ravi,Ullman, Jeffrey
© 2001 by PEARSON EDUCATION NORTH ASIA LIMITED and PEOPLE'S POSTS & TELECOMMUNICATIONS PUBLISHING HOUSE
© 1986
It is interesting to note that unlike a conventional hash table in a computer language, it is OK to have hash collisions, in fact, it is desirable in many cases.
Интересно отметить, что, в отличие от обычной хеш-таблицы в языках программирования, совпадение хеш-значений вполне допустимо, а во многих случаях даже желательно.
Kyte, Tom / Expert One-on-One OracleКайт, Том / Oracle для профессионалов
Oracle для профессионалов
Кайт, Том
© Перевод на русский язык. ООО «ДиаСофтЮП», 2003
© Wrox Press Ltd, 2002
Expert One-on-One Oracle
Kyte, Tom
© Wrox Press Ltd, 2002
The failure of the domain logon is something you should expect with no LanMan password hash in Active Directory, but the success of the initial PPP connection might be a surprise.
Если отказ при регистрации в домене вполне ожидаем, так как в базе данных Active Directory отсутствуют хешированные пароли LanMan, то успех при установке РРР-соединения должен удивить.
Boswell, William / Inside Windows Server 2003Бозуэлл, Уилльям / Внутренный мир Windows Server 2003, SP1 и R2
Внутренный мир Windows Server 2003, SP1 и R2
Бозуэлл, Уилльям
© Издательский дом "Вильямс", 2006
© Pearson Education, Inc., 2003
Inside Windows Server 2003
Boswell, William
© 2003 by Pearson Education, Inc.
The MD4 password hash is commonly called the NTLM password because it is used to perform NT LanMan Challenge-Response authentication.
Хешированные пароли MD4 часто называют паролями NTLM (NTLM password), поскольку они используются для аутентификации по протоколу NT LanMan Challenge-Response.
Boswell, William / Inside Windows Server 2003Бозуэлл, Уилльям / Внутренный мир Windows Server 2003, SP1 и R2
Внутренный мир Windows Server 2003, SP1 и R2
Бозуэлл, Уилльям
© Издательский дом "Вильямс", 2006
© Pearson Education, Inc., 2003
Inside Windows Server 2003
Boswell, William
© 2003 by Pearson Education, Inc.

Add to my dictionary

hash1/29
hæʃNounчто-л. мелко порубленное; нарезанное; покрошенное; блюдо из мелко порубленного мяса; овощей; солянка; рагу

User translations

The part of speech is not specified

  1. 1.

    Окрошка

    translation added by РОЗОВАЯ ФЕЯ
    1

Collocations

hash address
хешированный адрес
hash addressing
адресация с использованием хеширования или хеш-функций
hash addressing
хеш-адресация
hash browns
картофельные оладьи
hash chain
цепочка хешированная
hash class
класс хеширования
hash code
хеш-код
hash fat stock
измельчать жировое сырье ножами
hash function
хеш-функция
hash function
хэш-функция
hash head
любитель травки
hash house
дешевый ресторан
hash house
забегаловка
hash lookup
просмотр с хешированием
hash mark
диез

Word forms

hash

noun
SingularPlural
Common casehashhashes
Possessive casehash'shashes'

hash

verb
Basic forms
Pasthashed
Imperativehash
Present Participle (Participle I)hashing
Past Participle (Participle II)hashed
Present Indefinite, Active Voice
I hashwe hash
you hashyou hash
he/she/it hashesthey hash
Present Continuous, Active Voice
I am hashingwe are hashing
you are hashingyou are hashing
he/she/it is hashingthey are hashing
Present Perfect, Active Voice
I have hashedwe have hashed
you have hashedyou have hashed
he/she/it has hashedthey have hashed
Present Perfect Continuous, Active Voice
I have been hashingwe have been hashing
you have been hashingyou have been hashing
he/she/it has been hashingthey have been hashing
Past Indefinite, Active Voice
I hashedwe hashed
you hashedyou hashed
he/she/it hashedthey hashed
Past Continuous, Active Voice
I was hashingwe were hashing
you were hashingyou were hashing
he/she/it was hashingthey were hashing
Past Perfect, Active Voice
I had hashedwe had hashed
you had hashedyou had hashed
he/she/it had hashedthey had hashed
Past Perfect Continuous, Active Voice
I had been hashingwe had been hashing
you had been hashingyou had been hashing
he/she/it had been hashingthey had been hashing
Future Indefinite, Active Voice
I shall/will hashwe shall/will hash
you will hashyou will hash
he/she/it will hashthey will hash
Future Continuous, Active Voice
I shall/will be hashingwe shall/will be hashing
you will be hashingyou will be hashing
he/she/it will be hashingthey will be hashing
Future Perfect, Active Voice
I shall/will have hashedwe shall/will have hashed
you will have hashedyou will have hashed
he/she/it will have hashedthey will have hashed
Future Perfect Continuous, Active Voice
I shall/will have been hashingwe shall/will have been hashing
you will have been hashingyou will have been hashing
he/she/it will have been hashingthey will have been hashing
Future in the Past Indefinite, Active Voice
I should/would hashwe should/would hash
you would hashyou would hash
he/she/it would hashthey would hash
Future in the Past Continuous, Active Voice
I should/would be hashingwe should/would be hashing
you would be hashingyou would be hashing
he/she/it would be hashingthey would be hashing
Future in the Past Perfect, Active Voice
I should/would have hashedwe should/would have hashed
you would have hashedyou would have hashed
he/she/it would have hashedthey would have hashed
Future in the Past Perfect Continuous, Active Voice
I should/would have been hashingwe should/would have been hashing
you would have been hashingyou would have been hashing
he/she/it would have been hashingthey would have been hashing
Present Indefinite, Passive Voice
I am hashedwe are hashed
you are hashedyou are hashed
he/she/it is hashedthey are hashed
Present Continuous, Passive Voice
I am being hashedwe are being hashed
you are being hashedyou are being hashed
he/she/it is being hashedthey are being hashed
Present Perfect, Passive Voice
I have been hashedwe have been hashed
you have been hashedyou have been hashed
he/she/it has been hashedthey have been hashed
Past Indefinite, Passive Voice
I was hashedwe were hashed
you were hashedyou were hashed
he/she/it was hashedthey were hashed
Past Continuous, Passive Voice
I was being hashedwe were being hashed
you were being hashedyou were being hashed
he/she/it was being hashedthey were being hashed
Past Perfect, Passive Voice
I had been hashedwe had been hashed
you had been hashedyou had been hashed
he/she/it had been hashedthey had been hashed
Future Indefinite, Passive Voice
I shall/will be hashedwe shall/will be hashed
you will be hashedyou will be hashed
he/she/it will be hashedthey will be hashed
Future Perfect, Passive Voice
I shall/will have been hashedwe shall/will have been hashed
you will have been hashedyou will have been hashed
he/she/it will have been hashedthey will have been hashed