Online Google Dictionary

hash 中文解釋 wordnet sense Collocation Usage Collins Definition
Verb
/haSH/,
Font size:

hashes, plural;
  1. Make (meat or other food) into a hash

  2. Chop (meat or vegetables)

  3. Come to agreement on something after lengthy and vigorous discussion
    • - they went to the diner to hash out ideas
Noun
  1. The sign #


  1. chopped meat mixed with potatoes and browned
  2. chop up; "hash the potatoes"
  3. hashish: purified resinous extract of the hemp plant; used as a hallucinogen
  4. A hash function is any well-defined procedure or mathematical function that converts a large, possibly variable-sized amount of data into a small datum, usually a single integer that may serve as an index to an array. ...
  5. In computer science, a hash list is typically a list of hashes of the data blocks in a file or set of files. Lists of hashes are used for many different purposes, such as fast table lookup (hash tables) and distributed databases (distributed hash tables). ...
  6. Hash is a 2005 comedy film directed by Scott Innes and written by Innes and Daniel Smith, who also stars along with Lisa Walker, Richard Wright and Adam Young. The film's central character is Hash McBrown. It is narrated by Stephen Fry. ...
  7. Hash is an American dish usually consisting of a mixture of cooked beef (often corned beef or roast beef), onions, potatoes, and spices that are mashed together into a coarse, chunky paste, and then cooked, either alone, or with other ingredients. ...
  8. hash is a Unix command that prints the location information for the commands found.
  9. Food, especially meat and potatoes, chopped and mixed together. corn-beef hash; A confused mess; The # symbol (octothorpe, pound); The result generated by a hash function; To chop into small pieces, to make into a hash; To make a quick, rough version; To transform according to a hash function ...
  10. (Hashed) A hash is an "encrypted" value that cannot be decrypted. The best example of this is a UNIX user password. The ASCII password is combined with a salt and both these are passed through crypt to produce the "encrypted" password. However, this password is not encrypted, it is hashed. ...
  11. (Hashing) Transforming a string of characters into a shorter string with a predefined length
  12. (Hashing) The mathematical process that produces the message digest or "hash." The processor treats the message as a large number, which it subjects to mathematical transformations that result in the digest or hash. The computer incorporates the hash into the sender's digital signature. ...
  13. (Hashing) A technique for optimisation of the storing and accessing of data using groups. The group an item is stored in depends on its item-id. Reality uses the numerical value of the item-id and the modulo to determine the location (group) of the item.
  14. (Hashing) Computation of a hash total, which is: 1. The result obtained by subjecting a set of data to an algorithm for purposes of checking the data at the time the algorithm is applied or for use at a later time such as after transmission or retrieval from storage. 2. ...
  15. (Hashing) Process of rendering cardholder data unreadable by converting data into a fixed-length message digest via Strong Cryptography.
  16. (Hashing) The act of running a hash trail
  17. (hashing) A hash function is an algorithm which converts any collection of numbers into a single, distinct number (perhaps of a score or a hundred digits) which has no meaning in itself but which will uniquely represent the set of numbers from which it was derived. ...
  18. (hashing) Computation of a hash total. [CNSSI] (see also hash)
  19. (hashing) The method by which items are placed into, and retrieved from, a file. Each item-id is put through a hashing algorithm that mathematically determines which group in the file to look for, or put, an item. An alternate to the industry-standard ISAM (Incredibly Slow Access Method).
  20. (hashing) The transformation of a search key into a number by means of mathematical calculations.
  21. (hashing) Using a one-way function to produce a short but effectively unique value representing a longer block of data.
  22. (hashing) randomising values to produce numbers spread evenly over some range; used in software on keys for fast lookup, and in hardware on addresses to reduce collisions in interconnects.
  23. To dream you are eating hash, many sorrows and vexations are foretold. You will probably be troubled with various little jealousies and contentions over mere trifles, and your health will be menaced through worry. ...
  24. A way of verifying file integrity, often as a security measure. Basically, a hash function is used when examining a file, outputting a short string or integer. This value can be stored for later comparison. ...
  25. a recipe using leftovers, this dish is made by dicing pre-cooked meats and/or vegetables, and cooking with seasonings, minced onions, herbs, or sauce in a frying pan until crisp.