Kako biste želeli da koristite PONS.com?

Već ste se pretplatili na PONS bez reklama?
.

PONS s reklamama

Posetite PONS kao i obično s praćenjem oglašavanja i reklamama

Detalje o praćenju pronaći ćete u informacijama o zaštiti podataka u podešavanjima privatnosti.

PONS Pur

Bez oglašavanja trećih lica

Bez praćenja oglasa

Pretplatite se sada

Ako već imate PONS korisnički nalog, možete da se

We process your data to deliver content or advertisements and measure the delivery of such content or advertisements to extract insights about our website. We share this information with our partners on the basis of consent and legitimate interest. You may exercise your right to consent or object to a legitimate interest, based on a specific purpose below or at a partner level in the link under each purpose. These choices will be signaled to our vendors participating in the Transparency and Consent Framework.

Cookies, device or similar online identifiers (e.g. login-based identifiers, randomly assigned identifiers, network based identifiers) together with other information (e.g. browser type and information, language, screen size, supported technologies etc.) can be stored or read on your device to recognise it each time it connects to an app or to a website, for one or several of the purposes presented here.

Advertising and content can be personalised based on your profile. Your activity on this service can be used to build or improve a profile about you for personalised advertising and content. Advertising and content performance can be measured. Reports can be generated based on your activity and those of others. Your activity on this service can help develop and improve products and services.

diaphysis
Hashcode
ˈhash code N COMPUT
hash1 [hæʃ] N inf
hash short for hashish
Hasch nt <-s, -> inf
hash·ish [ˈhæʃɪʃ] N no pl
Haschisch nt <-(s)>
I. hash2 [hæʃ] N
1. hash FOOD:
Haschee nt <-s, -s>
Gehacktes kein pl CH
2. hash no pl inf (shambles):
Kuddelmuddel nt <-s> inf
etw vermasseln inf [o. pej verpfuschen]
3. hash COMPUT:
Rautezeichen nt <-s, ->
II. hash2 [hæʃ] VB trans
1. hash FOOD:
to hash sth
etw hacken
to hash sth meat
2. hash inf (mess up):
to hash sth up
etw vermasseln inf [o. pej verpfuschen]
3. hash COMPUT:
to hash sth
I. code [kəʊd, Am koʊd] N
1. code (ciphered language):
Code m <-s, -s>
Chiffre f <-, -n>
code TELEC, COMPUT
Kennzahl f <-, -en>
2. code LAW:
Gesetzbuch nt <-(e)s, -bücher>
Kodex m <-es, -e>
Ehrenkodex m <-(es), -e>
Strafgesetzbuch nt <-(e)s, -bücher>
II. code [kəʊd, Am koʊd] VB trans
code N IT
code VB
Present
Ihash
youhash
he/she/ithashes
wehash
youhash
theyhash
Past
Ihashed
youhashed
he/she/ithashed
wehashed
youhashed
theyhashed
Present Perfect
Ihavehashed
youhavehashed
he/she/ithashashed
wehavehashed
youhavehashed
theyhavehashed
Past Perfect
Ihadhashed
youhadhashed
he/she/ithadhashed
wehadhashed
youhadhashed
theyhadhashed
PONS OpenDict

Da li Vam nedostaje određeni izraz ili prevod?

Pošaljite nam novi unos za PONS OpenDict. Predloge proveravа urednički tim PONS-a, a zatim ih unosi u PONS OpenDict.

Dodajte unos
No example sentences available

No example sentences available

Try a different entry

Jednojezični primeri (nisu ih verifikovali PONS urednici)
Data is sharded based on the hash value of the key, or range partitioned.
en.wikipedia.org
The document, email, or file to be protected is used to generate a signed hash, a number generated from the contents of the document.
en.wikipedia.org
The salt value is not secret and may be generated at random and stored with the password hash.
en.wikipedia.org
For each point, its quantized transformed coordinates are stored in the hash table as a key, and indices of the basis points as a value.
en.wikipedia.org
Functions with these properties are known provably secure and are quite unique among the rest of hash functions.
en.wikipedia.org
Primeri s interneta (nije provereno)
[...]
One way to generate a hash code is to combine these fields using an XOR ( eXclusive OR ) operation, as shown in the following code example.
[...]
msdn.microsoft.com
[...]
Eine Möglichkeit, einen Hashcode zu generieren, besteht darin, diese Felder wie im folgenden Codebeispiel mit einer XOR ( eXclusive OR ) -Operation miteinander zu verknüpfen.
[...]
[...]
Gets the hash code for the URI.
[...]
msdn.microsoft.com
[...]
Ruft den Hashcode für den URI ab.
[...]
[...]
Classes that might be used as a key in a hash table must also override this method, because objects that are used as keys in a hash table are required to generate their own hash code through this method.
[...]
msdn.microsoft.com
[...]
Klassen, die als Schlüssel für eine Hashtabelle verwendet werden, müssen diese Methode ebenfalls überschreiben, da Objekte, die als Schlüssel für Hashtabellen verwendet werden, über diese Methode einen eigenen Hashcode generieren müssen.
[...]
[...]
Returns the hash code for this instance.
[...]
msdn.microsoft.com
[...]
Gibt den Hashcode für diese Instanz zurück.
[...]
[...]
Note that this is true only for the current execution of an application, and that a different hash code can be returned if the application is run again.
msdn.microsoft.com
[...]
Beachten Sie, dass diese Anforderungen lediglich für die aktuelle Ausführung einer Anwendung gelten und dass bei der nächsten Ausführung einer anderer Hashcode zurückgegeben werden kann.

Potražite "hash code" u drugim jezicima