►
From YouTube: 1. Введение в Rust-программирование (Курс Rust на NEAR)
Description
Все видео курса https://www.youtube.com/playlist?list=PL9tzQn_TEuFUakOn-IY9cDQL2ztNzZunh
Совместный курс NEAR & 4ire Labs
Подписывайтесь, чтобы получать обновления о новостях NEAR, акциях, запуске проектов, баунти, хакатонов
Русскоязычное сообщество NEAR https://t.me/near_protocol
Твиттер https://twitter.com/near_protocol
Общение с разработчиками https://t.me/openwebdev
Follow the latest from NEAR Protocol on:
Website: https://near.org/
Discord: https://near.chat/
Blog: https://near.org/blog/
Twitter: https://twitter.com/NEARProtocol
GitHub: https://github.com/near https://github.com/nearprotocol
#Blockchain #FutureIsNEAR #NEAR #nearprotocol #rust #wasm #assemblyscript #раст
A
Hello:
everyone,
my
name,
is
evgenia
at
the
fans.
At
the
moment
I
represent
nerv
company
together
with
kiril
and
ads
file
company
are
at
because
you
joined
our
training
course.
I
hope
we
will
learn
something
new
a
little
about
me
together.
My
experience
in
development
is
more
than
20
years
with,
since
I’ve
been
connected
there
since
2016
and
with
the
blockchain
from
about
the
same
time
in
the
company,
more
or
less
well-known
with
whom
I
worked,
it
will
be
fury,.
There
is
such
a
fredbear
called
zones
written
in
grow,
such
companies
as
savagery
and.
A
B
A
That
are
interaction
with
the
ether
and
the
part
that
is
directly
related
to
this
course.
It
will
be
related
to
topics
such
as
an
introduction
to
the
programming
language.
Since
some
parts
we
don't,
we
will
consider
which
does
not
directly
affect
the
development
of
the
blockchain,
because
once
is
enough
such
a
complex
language-
and
we
will
try
to
make
such
a
gently
introduction
at
once,
so
that
it
is
as
easy
as
possible
to
navigate
in
it
and
be
ready
to
write
smart
contracts
for
the
world,.
A
We
will
dive
into
the
topic
only
dota,
and
we
will
also
have
some
such
activities
related
to
writing.
Smart
contracts,
that
is,
not
only
theory
and
some
very
abstract
tasks,,
but
also
a
very
specific
solution
to
problems
related
to
writing.
Smart
contracts
for
growth,
and
such
a
very
specifically
actively
connected
with
this,
and
again,
such
topics
as
an
introduction
to
1
writing.
B
A
Well,
when
Kirill
connects,
I
will
also
tell
you
a
little
about
the
activities
that
are
supposed
to
be
in
the
whole.
Course.
It
will
be
more
devoted
to
the
introduction
of
growth,
that
is,,
it
will
be
almost
half
of
the
course;.
In
the
second
half
of
the
course,,
we
will
include
topics
such
as
writing
smart
contracts
for
them,
that
is,.
We
will
to
consider
directly
the
part
that
is
related
to
the
band
a
little
bit,.
We
will
touch
on
the
part
that
concerns
the
frontend,.
A
This
is
a
very
voluminous
topic.
And,
unfortunately,.
We
will
not
be
able
to
go
deep
into
them,,
but
we
will
try
to
give
vectors
and
directions
a3
so
that
you
can
navigate
this
as
much
as
possible
and
at
the
end
of
the
course
there
will
be
topics
how
much
yes.
There
is
just
also
a
very
voluminous
topic,,
but
we
will
touch
on
some
basic
things
so
that
you
have
some
understanding
of
what
it
is,
and
again,
to
direct
you
to
the
necessary
ross
and
such
a
rather
interesting
bonus,
well,.
A
As
for
me,
it
will
be
what
at
the
end,
is
course,.
If
you
have
such
an
interest
and
involvement
in
the
process,
itself,
the
fair
labs
company,
as
far
as
I
know,
will
be
happy
to
talk
with
you,
elderly
about
this
topic,
and
everything
has
a
potential
opportunity,,
including
if,
at
the
moment
you
are
considering
once
as
such
a
base
for
your
career,
it
can
turn
out
to
be
such
a
good
springboard
for
a
new
start.
A
Here
asks
a
question
easier
for
growth
in
learning
than
or
si
plus
plus
she
you
know
here.
It
is
important
to
understand
that,
since
the
language
is
not
so
simple,,
but
in
fact
it
is
quite
well
structured
and
if
you
accustom
yourself
to
a
certain
discipline,
it
teaches
discipline
and
it
may
turn
out
that
learning
a
language
once
you
will
still
be
easier
than
learning,
C,
plus
plus,
because
the
growth
language
itself
is
strongly
typed
from
a
fairly
good
design.
Role
up
to.
B
You
yourself
always
please:
yes,
because
it
will
be
stink,
I
apologize
for
the
technical
hitch,.
We
did.
This
build
count
by
restarting
everything
was
ok,,
but
at
the
very
launch
something
went
wrong
as
expected,,
so
I'll
be
without
a
leader
then,,
because,
unfortunately,
for
some
reason
the
sound
quality
is
terrible
at
the
same
time
as
the
video,.
So.
A
B
B
Growth
and,
accordingly,
a
little
later,.
The
vestment
began
to
get
its
first
experience
of
exactly
kinship
in
production.
During
this
time,
I
managed
to
work
on
many
in
common
projects,.
Several
of
them
will
be
with
her
most
of
the
day
were
quite
interesting,
for
example,
I
had
to
use
it
once
in
order
to
build
a
modification
on
this
virtual
machine
in
memory
and
oh,
what
can
be
said
about
the
growth
of
resolution
elimination
there,
on
top
of
which
is
now
on
the
market?
B
Besides
this
I
work
and
now
I
also
help
the
guys
from
the
company
a
little.
This
is
a
blockchain
which
is
built.
Its
base
part
is
built
on
a
new
protocol.
Meme
was
the
choice.
Which,
in
principle,
is
currently
the
most
confidential
most
secure,
blockchain
that
exists,
besides
this,.
What
kind
of
career
have
I
had
to
work
on
supporting
tresor
eau
legere,?
These
are
those
that
allow
users
to
use
anyone
at
all
who
are
connected
and
the
idea
of
\u200b\u200bthese
conversations.
B
If
anyone
does
not
know
that
the
user
can
use
such
words
and
even
on
some
give
a
computer
that
could
potentially
contain
some
kind
of
key
logger
viruses
and
so
on,,
but
at
the
same
time,,
the
user's
funds
will
always
be
safe,
in
particular,
when
I
worked
on
the
crime
with
these
products,
and,
accordingly,,
so
that
different
training
could
get
integration
with
these
devices.
On
the
current
th
moment,
I
am
working
on
the
nerpa
project.
B
It
is
such
a
blockchain,
which
is
such
an
open
source
platform
that
allows
users
and
avatars
to
use
very
conveniently
in
the
tea
infrastructure
and
the
idea
of
.
This
project
is
that
it
is
with
all
this
because
it
adds
so
many
conveniences
to
the
user
and
to
developers.
While
doing
this
project
is
very
good.
!
there
is
a
shard
and,
accordingly,.
The
number
of
transactions
per
second
increases,
the
number
of
adding
chances,
that
is,
for
example,.
This
is
the
main
advantage
compared
to,
for
example,
numbers,
I
will
go
directly
to
the
course
right.
B
Away,
I
want
to
pay
attention,
just
below.
There
is
a
special
heart
of
fearful,
bald
spots
and
in
this
section,.
If
you
have
any
questions,,
please
to
ask
here,,
but
because
in
the
chat,
let's
say
some
request
may
be
lost,,
we
see
a
separate
time,,
so
everyone
can
then
see
by
opening
this
section
what
questions
were
answered
and
specifically
the
answer
to
a
specific
question,
such
a
damn
as
Fred,
before
each
of
the
questions,,
the
current
selection
that
we
are
1
she
will
be
in
general.
B
This
lecture
about
dating
Alena
has
already
told
a
lot
about
profile,
abs
and
what
opportunities
they
provide
and
I
will
go
over.
What
we
want
to
tell
you
on
this
course,
that
is,,
our
main
goal
is
to
cover
the
basic
knowledge
once
and
at
the
same
time,
to
get
a
person
got
such
basic
skills
with
help
with
the
help
of
which
he
will
be
able
to
start
writing
some
of
his
smart
contracts
for
the
world
and
climb
up
in
the
same
way
prepare
sap
to
build.
B
B
We
will
analyze
the
best
ways
to
achieve
the
goal
with
a
raster.
What
is
worth
what
not
to
do
and
analyze
the
main
tools
that
are
used
in
the
development
of
1
in
addition,?
You
will
learn
how
to
write
basic
such
simple
beginnings:
smart
contracts,
communication
style,
these
smart
contracts.
You
will
put
smart
contracts.
Therefore,
we
will
also
talk
in
more
detail
further
what
it
is
and
why
a
child
and,
accordingly,.
You
will
learn
how
to
test
the
smart
contracts
you
have
implemented,.
B
You
will
learn
how
to
correctly
use
these
particular
utilities
that
are
given
before
working
with
smart
contracts,
and
you
will
understand
the
basic
concepts
such
as
quote
still
with
which
one
way
or
another
are
present
exists
in
many
smart
contracts,.
We
will
try
to
teach
you
how
to
make
your
smart
contract
as
long
as
possible.
So
far.
B
The
first
is
the
first
lecture
1
through
the
course,.
It
is
actually
called
Jala
Krast,,
so
we
will
talk
about
the
whole
time
and
what
actually
such
an
increase
in
time
is
a
relatively
young
programming
language
that
is,,
its
first
version
appeared.
I
will
be
the
first
version.
1
0
was
in
2015,
and
the
features
of
the
language
are
that
it
does
not
have
a
secret
van
that
it
does
not
have
a
karpacz
collector
and
at
the
same
time,
in
Russia.
B
If,
in
you
ask
your
question
there
on
stackoverflow
on
reddit
or
someone
else,,
you
will
most
likely
be
helped
by
embossing
this
link
to
the
documentation
they
will
give
epam.
They
will
try
to
combine
what
you
are
doing
wrong
and
why,
instead
of
saying,
go,
read
the
books
nitich
of
this
documentation.
B
We
will
analyze
a
few
points
we
we
are
talking
about,
but
runtime.
What
is
a
grenade
launcher
runtime
in
many
to
those
who
do
not
understand
the
very
concept
of
aram
time?
Runtime
is
roughly
speaking.
This
is
what
exists
around
your
programs
and
that
is,.
Let's
say
that
java.
You
have
a
virtual
hind
that
compiles
your
code
that
you
wrote
in
the
intermediate
code
somewhere.
The
input
is
executed
on
your
virtual
machine,
on
the
one
hand,.
It
is
very
good
yes,.
B
It
considers
you
have
a
runtime
and,
accordingly,,
a
lot
of
things
that
you
would
have
to
think
about
for
yourself,.
This
is
done
by
the
runtime,
that
is,
it
there.
It
facilitates
the
work
of
the
programmer
with
one
on
the
other
hand,
it’s
true,,
but
on
the
other,
hand,
runtime
is
always
some
kind
of
that
is
your
co
d.
Most
likely,,
especially
this
is
a
cat
of
complex
programs,,
not
about
simple
dacom,,
a
primitive
program
for
adding
numbers,
for
example,.
B
B
It
seems
strange
because
in
the
same
java
above
and
therefore
you
have
a
specific
garbage
collector
that
controls
the
creation
and
deletion
of
objects
that
you
create
in
your
program,.
But
this
is,
of
course,
each
stage
of
the
assembly
garbage.
It
takes
a
real
amount
of
time.
There
is
simply
no
such
thing,
while
growing,.
The
safety
of
both
memory
and
flows
is
ensured,
that
is,.
B
There
are
no
race
conditions
of
such
states
of
the
year
on
precise
programming,,
and
this
is
ensured
due
to
the
fact
that,
since
there
is
such
a
concept
as
he
called
Archie
Pamporovo,
that
is,
in
fact,,
it
has
its
own
growth
models
of
memory
ownership
and
at
the
moment,
I
will
ask
you
just
to
believe
that
this
is
really
the
case,.
We
will
analyze
in
detail.
This
concert
designed
by
the
following
lectures.
B
As
they
simply
describe
its
creator
once
its
creator
was
preceded
by
that,
this
is
a
system,
programming
language
that
works
exceptionally
fast
and
prevents
almost
all
roofs
and
saves
you
from
race
conditions
me
to
stream
programming
the
main
such
concept.
Once
you
are
worth
understanding,
forgive
even
to
a
person
who
came
with
some
kind
of
part-time
job
in
C,
plus
plus
in
java
on
so
even
in,
let's
say
some
other
languages
,
but
did
not
work
on
1
main
complexity.
Yes,
such
a
person
will
have
ncipe
themselves
concept.
B
A
B
Fact,
over
time,
people
understand
that
this
is
cool,,
because
in
growth,,
if
there
is
such
a
rule,,
if
your
program
is
compiled,,
then
there
is
a
very
big
chance
that
it
works,
because
you
expect
this
to
happen,.
A
huge
number
of
errors
are
not
caught
during
compilation,,
and
this
is
a
huge
plus
1
why
growth
itself
is
possible.
You
saw
this
way
and
gram,
especially
if
someone
watched
just
such
a
plan
of
the
schedule.
People
like
to
use
when
I
tell
sprouting
therefore,
in
principle,
I
will
also
use
it,
that
is,.
B
If
we
take
languages
like
systick,,
these
are
languages.
\u200b\u200bthat
are
maximally
transferable
to
your
to
your
hardware.
Ordinary
pro
do
not
burn
claus
tuber
metal,
and,
accordingly,.
There
are
such
language
and
as
an
example
of
python
and
ruby,
which,
as
I
mentioned
before,.
They
have
some
kind
of
runtime,
some
kind
of
virtual
machine
that
helps
users
avoid
a
huge
number
of
errors,,
but
at
the
same
time,
people
have
much
less
opportunities
to
control
memory.
And,
in
principle,
such
a
low
level
of
interaction.
B
There
are,
of
course,
such
programming
languages,
,
java
and
usa.
Ponies
are
somewhere
in
the
middle
and
but
let's
say
only
the
same
java
and
seasharp.
There
is
also
a
big
chance
to
make
mistakes
and
security
there
of
course
suffers,
and
accordingly,
the
way
out
before
that
I
will
tell
you
about
1.
B
No
one
says
that
this
is
a
secret,
plus
the
killer,,
as
it
were,
just
dissuade
everyone
who
starts
naet
to
use
it
once,
for
example,
me,,
then
I
specifically,,
too,,
I
wrote
in
C
plus
plus
for
a
very
long
time,,
but
when
I
had
the
opportunity
to
completely
go
to
production,
write
russia,
I
am
very
glad
of
this.
Opportunity,
I
am
very
glad.
Maybe
when
I
have
to
do
some
things,,
let's
say
especially
if
someone
then
I
came
across
a
generic
code
wearing
a
template,.
B
What
ensures
security,
since
such
a
concept
is
used
here,,
it
is
considered
that
manual
memory
management
leads
to
the
most
critical
gods,.
This
is
especially
true
in
gifts.
yes,.
You
have
access
to
xi,
+
directly,
work
like
this.
With
memory
with
pointers,,
a
huge
number
of
bars
happens,,
even
taking
into
account
the
view
frame,.
A
huge
number
of
liters
is
a
software
that
checks
ours,.
That's
why
in
Russia
there
are
no
all
forts,
there
are
no
race
conditions.
B
B
Object
in
memory
is
not
like
an
object
in
an
object-oriented
programming.
Concert,,
just
like
an
object
is
a
memory,.
Each
object
has
only
one
owner,
that
is,.
It
seems
strange
at
first
glance,
yes,
that
is,,
if
you
transfer
ownership
of
the
objects,,
then
the
first
owner
no
longer
owns
it
object.
Now
it
may
seem
complicated,
and
then
Oleg
makes
it
easier.
B
That
is,,
despite
the
fact
that
one
object
has
one
owner,,
and
we
can
always
be
sure
that
we
have
one
owner,,
which
means
that
no
one
else
can
change
the
state
of
our
object,
or
that
is
why
we
do
not
have
a
state
of
races
in
multi-threaded
programming,,
as
in
a
crisis,.
A
whirlwind
by
1
is
about
here
so
that
is,
in
this
case,
we
create
a
function
name,
and
it
is
called
like
this.
This
is
that
with
an
exclamation
point,
this
is
a
macro
in
the
language
of
times.
B
In
this
case
it
is
displayed
fart
world
respectively.
If
we
manually
run,
compile
our
file
and
run
the
execute
object
to
get
our
fear
growth
besides,
of
course,.
It
may
seem
that
using
the
compiler
once
I
grow,
it,
I,
like
it,
it’s,
a
bit
difficult,,
so
there
is,
before
that,
there
simply
exists,
in
fact,
the
only
system
before
assembly
and
project
management,,
it’s
called
k,.
B
But
we’ll
tell
you
more
about
this
in
the
next
lectures
in
growing
a
huge
advantage
that
if
in
many
programming
languages
out
of
the
box,
so
to
speak,,
a
limited
number
of
the
same
integers
is
available,.
Let's
say
yes,
the
64-bit
and,
accordingly,.
If
the
use
of
numbers
is
larger,,
you
need
some
special
libraries
to
use
large
numbers
or
if
someone
wants
yes,
of
course,
writing,
your
bigman
ticket
is
not
recommended
in
grow.
B
At
the
same
time,
there
are
such
there
are
16-bit
and
up
to
128
bits,,
while
in
Russia
there
are
special
types
called
icesices,
respectively,.
This
site
is
an
integral
and
on
side
and
eager
for
what
they
need.
These
types,.
They
use
the
maximum
available
value
available
on
your
current
architecture,
that
is,.
If
you
have
a
32-bit
architecture
of
Tunisia,,
this
will
be
a
32-bit
number,.
This
is
a
dress,
and
accordingly,.
If
you
have
a
64-bit
system
architecture,,
then
this
collection,,
while
growing
there
are
a
lot
of
cool
pieces
of
such
syntactic
sugar,.
That
is,.
B
Let's
say
you
can
declare
a
variable
like
you,
you
see
such
an
underline,.
This
is
an
underline,
that
is,.
In
fact,
it
is
the
number
123
million
four
hundred
and
fifty
six
1789,
but
you
must
agree.
It
is
much
more
convenient
to
consider
what
calendar
number
there
are
such
restrictions
to
emphasize
or
which
syntactic
sugar
such
such
syntactically
rather
a
thing
that
facilitates
the
feeding
of
the
very
number
of
new
ones.
Seen
such
things.
Perhaps
there
is
a
seasharp
and
other
languages.
\u200b\u200bwho
are
familiar
in
the
same
way.
B
You
see
here
in
the
second,
now
in
the
second
expression,
I
explicitly
indicated
that
this
is
te
pego,
that
is,,
it
is
paid,.
I
explicitly
indicated
the
type
here
in
the
growth
of
strict
typing
here
at
the
fire
of
a
variable
with
its
type,,
but
as
you
can,
see,
I
didn’t
indicate
near
the
snow
because
in
Russia
there
is
also
a
system
of
conducting
type
in
this
case,
I
indicated
that
this
is
a
menu
of
sixth
forms,
and,
accordingly,.
It
would
be
the
same
if
the
coast
became
from
the
game:.
Then
I
have
this
number,.
B
Respectively,,
if
I
have
given
the
number
like
this,
that
is,
I
have
not
specifically
indicated
you
are
going
to
the
identifier
in
at
the
end.
What
is
the
default
type?
Sorry?
It
will
be
at
the
same
time,
in
growth,
there
is
no
implicit
cast
type
ov,,
that
is,
look,.
Let's
say,
I
declared
a
variable,
and
this
type
is
this
and
I
have
the
value
123
then
I
try
to
create
a
variable
already
of
the
sexy
for
type,,
which
assigns
the
value
to
the
variable
in
the
one,.
B
While
this
will
be
a
compile-time
error,
that
is,
I'll
just
show
that
these
are
not
the
same
type.
Why?
Because
1
2
I
eat
interesting,
4
and
8
bytes
on
and
a
number,
and
it
would
seem
that
there
is
nothing
of
the
sort
in
this,,
but
since
it
is
forbidden
to
do
such
things,,
which
also
guarantees
safety,
respectively,.
If
we
want
to
do
this
conversion,,
we
need
to
do
it
for
the
conversion,
for
example,.
B
B
B
It
is
also
predetermined
that
overflow
of
integers
will
be
a
compile-time
error.
Why
this
is
important,
I
think.
If
someone
has
come
across
it,
it
will
be
clear,
but
to
those
who
have
not
come
across
it,
I
will
explain.
This
is
a
very
common
mistake
and
it
is
very
difficult
to
keep
track
of
it,
and
accordingly,
you
yourself
understand
or
do
not
understand,.
So
what
such
an
error
can
cause,
that
is,
you
have
an
integer
overflow,
for
example,
in
languages
such
as
C,
Plus
Plus,.
This
is
a
conveyor,
that
is,
it
is
unknown.
B
What
exactly
will
happen
in
each
system
during
overflow,?
But
what
you
get
in
your
software
is
one
hundred
percent
weight.
You
will
have
an
overflow
of
types
and
what
I
already
said
that
there
are
types
like
you.
So
he
says
that
corresponds
to
your
type
of
architecture,,
that
is,,
let's
say
32
bit
and
64
bit
and
accordingly,
you
can
use
these
types
themselves
will
be
used
when
you
write
some
constructions
using
some
indexes,
let’s
say
for
buy
cycles
and
so
on,.
B
How
the
masses
look
like
the
ejection
of
times
the
arrays,
as
you
might
have
guessed,.
This
is
here
they
also
overeat
specifically,.
You
must
specify
the
type
of
mosin,
that
is,
in
this
case,
I
declared,
for
example,
an
array
in
which
I
found
out
that
all
the
elements
of
the
array
will
be
of
type
8,
8
change.
As
you
know,
all
the
types
of
the
array,
more
precisely,,
all
the
elements
of
the
array.
They
always
have
the
same
type,
and,
accordingly,.
B
B
B
You
can
expand
this
one
in
such
a
convenient
way,.
In
this
case
we
have
a
variable,
the
model
itself
and
we
want
to
get
an
explicit
variable
from
this
stupidly,.
In
this
case,
we
declare
three
more
variables
that
immediately
upon
starting
languages,
as
python
is
a
very
standard
thing
for
them,,
but
for
those
who
used
sears,
when
standard
methods
didn’t
give
such
a
wonderful
interior,
and,
accordingly,,
you
can
refer
to
the
elements
of
this
dome
by
index,
for
example,.
B
You
can
also
declare
such
a
step,
even
without
specifying
its
types,,
since
there
is
a
system
for
casting
types
Taras
itself.
This
tube,
in
which
there
are
two
elements
of
type
string,
and,
accordingly,.
You
can
it’s
wonderful
to
write
such
functions
as
usual,
I
don’t
know,
how,
let’s
say
the
last
couple
of
years
in
this
regard,,
when
it
gives,
I
used
that
so
just
say,
return
stepped
simply
by
methods
use
standard
language
constructions.
This
is
a
problem
it’s
hard
in
Russia.
This
is
standard
practice
will
grow.
B
In
this
way,
we
will
consider
further
processed
a
huge
number
of
run-time
errors,
and
this
makes
it
possible
to
develop
very
flexible
development.
Actually,
the
main
essence,
again,
yes,
I
will
return
to
this
topic,
again,
about
memory,
ownership,
microsoft,.
This
is
specifically
1
to
such
an
example,,
but
in
fact,
this
is
a
huge
number
of
companies
that
he
calls
like
that.
But
m
icrosoft
claims
that
in
70
percent
of
all
their
security
tanks,,
these
were
specifically
bugs
related
to.
B
This
memory,
and
they
have
such
statistics
for
the
last
14
years,
that
is,
if,
for
example,.
There
were
3-4
years
ago
when
you
were
looking
for,
for
example,
vacancies
for
1
and
presented
let’s,
say
you
directly
contacted
companies,.
Many
companies
could
say
that
they
don’t
use
it
more
than
once,,
but
for
example,
the
situation
has
changed
a
lot
recently,
a
huge
number
of
large
companies
and
small
companies
of
any
different
type
of
leg
projects.
Very
many
people
start
using
it
just
for
this
reason,
the
main
the
reason
for
some
reason
they
start
using
different
days.
B
All
these
syntactic
things,
the
syntactic
sugar
that
you
have.
This
is
precisely
safety,
precisely
safety
in
ball
control.
This
is
the
most
basic
itself,
a
large
number
of
times.
Therefore,
we
play
very
much.
We
will
talk
in
any
case.
A
lot
like
me
said
what
the
essence
of
memory
possession
is
that
there
is
always
only
one
in
the
owner
of
an
object.
B
If
you
create
links
to
an
object,,
then
because
you
know
that
these
links
are
valid,,
otherwise
the
program
simply
won’t,
compile
with
you,
that
is,
it’s
still
a
plus,
it’s
very
easy
to
get
an
error,
yes,
when
your
link
already
points
to
a
damaged
memory
area
and
singing
to
a
non-existent
from
sorry,.
This
does
not
happen
because
all
these
checks
they
occur
at
compile
time.
And,
accordingly,.
If
you
pass
one
somewhere,,
it
had
a
link,
that
only
one,
only
one
such
link
can
exist
at
a
time.
B
You
are
trying
to
give
the
new
tables
function
to
a
ruff
as
a
parameter.
I
not
at
the
same
time
they
are
in
the
same
scope,.
Then
you
just
don’t
have
time
to
do
this,
just
the
compiler
once
and
it’s
honestly.
So,
because
if
there
are
two
owners
of
the
same
object
at
the
same
time,,
then
you
can’t
guarantee
that
they
will
only
change
the
state
of
the
variable
sequentially,.
B
Therefore,
such
there
is
conducted
a
survey
and
finally,
for
today,
I
would
like
to
say
so
that
to
inspire
you
a
little,,
so
this
is
still
an
introduction
tex,,
but
for
example,
several
projects
that
use
once
the
production
itself,
that
is,.
This
is
what
we
will
allow
in
our
course
and
the
toner
protocol,.
This
is
polka
dot,.
B
There
are
a
huge
number
of
not
very
projects,.
This
is
firefox
discord,
microsoft
c
ramos.
He
is
a
police
list,,
I'm
sorry,,
and
this
list
is
currently
huge
and
it
continues
to
grow,
but
of
course,.
The
field
of
blockchain
has
received
especially
such
competition
with
such
targu
programming,
languages,
and
more
and
more
projects,,
especially
in
the
system,.
They
pay
attention
to
times,.
So
if
you
start
to
study
once
and
if
you
continue
to
study
the
robot,
I
think
you
will
get
great
pleasure,
but
you
will
not
immediately
understand
this
at
first.
B
You
will
get
a
huge
pain,
no
matter
how
it
sounds,,
but
it
is,,
but
it
will
open
up
a
huge
opportunity
for
you
in
a
huge
number
of
companies,.
This
is
not
only
in
the
field
practically
in
the
sphere.
One
can
find
especially
also
death
concerning
securi
ty,,
that
is,
the
blockchain
is
why
it
is
used,
because
security
is
very
important
in
clothing,
with
the
militia
somewhere.
You
are
not
working
correctly
with
memory,
yes,.
There
are
some
overflow
errors,
there,
or
you
refer
to
a
non-existent
object.
B
B
Growth
to
which
I
did
not
answer
how
much
homework
will
be
and
what
they
are
will
be
in
terms
of
complexity,.
We
are
planning,
as
we
are
planning
one
project
on
the
part
of
the
genie
once
which
will
give
you
the
opportunity
to
use
all
the
concepts
that
we
will
go
through
and
practice
writing
code
for
1,
respectively,.
B
There
will
be
2
small
projects
on
the
world
in
the
flow
you
will
learn
and
you
will
write
your
smart
contract
which
later
you
will
be
able
to
check
with
each
other,
and
some
solutions
will
be
m
to
check
also
me
and
my
wife
and
the
find
of
dot
at
the
moment.
This
is
being
discussed
because
if
we
are
talking
specifically
about
the
interrogation
about
the
same
comparison
of
the
nerves
of
the
semicircle,
that
world
is
made
very
so
general.
B
Very
much
gave
3
centers
take
into
account
free
and
getting
the
platform
and
say
much
less
time
is
needed
to
to
delve
into
the
concepts
of
the
nir
protocol
to
describe
some
basic
smart
contracts,
in
comparison,.
Let's
say
this
is
the
framework
that
is
used
on
polka
dot,
yeah,.
The
spelling
is
irradiated
as
this
question
answered
the.
B
B
As
a
question
on
the
previous
slide,
did
not
understand
what
kind
of
owner
there
is
a
more
applied
example
in
this
case,
I
see.
There
are
already
several
answers
from
Vadim
and
also
did
not
answer.
We
will
analyze
the
work
in
more
detail
in
the
next
lectures,,
but
in
general,
what
is
the
owner?
You
should
understand.
Imagine
that
Vadim
answered
here
with
the
variable.
A
bad
name
equals
yes
eats
oysters
only
while
owning
the
df
string
will
have
to
change
the
variable
name
2.
B
And
Saint
Inter
didn’t
write
in
this
case,
that
is,
it’s
signed
and
unsigned,
purely
let’s
say.
If
we
watch
football,
let’s
say
oh,
the
number
8,,
since
it
covers
both
positive
and
negative
numbers
of
that
of
its
borders,,
it
will
be
minus
128
to
100
plus
up
to
27
and,
accordingly,.
This
is
already
without
anyone
and
a
number
and,
accordingly,.
There
are
only
positive
numbers
in
it,
and
accordingly,.
Then
you
can
fit
256
values.
B
B
Test
task
see
this
process:
how
exactly
how
we
eg
about
organizing
this,.
We
will
discuss
the
next
lectures,.
We
have
n’t,
definitely
decided
for
ourselves
yet,,
but
we
had
where
it
was,,
since,
firstly,
the
node
participants
and
secondly,,
it
is
highly
recommended
that
each
of
the
participants
familiarize
themselves
with
different
inputs
from
a
different
codebase
during
the
course,.
Then
we
wanted
to
introduce
such
a
type
of
verification
and
homework,.
B
Let's
say
for
each
participant,
Putin
proves
which
mini-project
as
his
own,,
which,
as
body,
a
friend
with
whom
they
exchange
projects
and,
accordingly,
everyone,
will
evaluate
each
other
and
then,
as
it
were,.
Several
projects
were
bought
by
Zhenya
and
I,
which
we
will
consider
for
ourselves.
According
to
what
criteria
we
will
choose
these
projects,
which
we
will,
which
we
will
evaluate
ourselves.
This
is
still
being
decided,
that
is,
most
likely
it
will
be
connected
with
the
participant
who
can
be
asked
the
ladies
to
check
how
interested
he
will
be.
B
B
By
about
here,
maxim
asks
a
question:
if
only
one
object:
grows,
mark
a
single
cancel
near
the
circular
buffer,
that
is
populated
with
the
help
of
the
operation
there
arnova
reading
the
record-
and
we
are
at
the
barrier
this
question
Zhenya
answered
here.
Yes
here
I
will
say
so
it
is
unlikely
that
we
are
the
concepts
that
are
needed
gives
in
the
implementation.
B
We
will
be
able
to
consider
on
this
course,
because
the
asiarch
of
the
dachshund
and
crying
and
things
most
likely,
we
will
not
have
time
to
consider
on
e
in
the
course,
that
is,
it’s
already
fallen,
an
advanced
example,
here-
are
the
notes,.
We
can
consider
this
question
in
the
telegram
chat,.
We
will
try
to
answer
them
with.
A
Great
regret,
and
not
all
of
those
we
will
be
able
to
deeply
consider,
in
particular,,
topics
that
relate
to
on
the
safe
will
not
be
considered
at
all,
because
this
is
a
huge
topic.
It
will
take
much
more
time
than
allocated
to
the
current
school,,
so
we
will
try
to
give
as
much
information
as
possible
in
order
to
set
the
initial
impetus,,
and
then
you
will
have
to
figure
it
out.
Yourself.
B
Visit
the
concept,
then
take
it,
moreover,.
If
we
are
talking
about
functional
programming,
it’s,
just
a
huge
amount
of
functionality,
that
is,,
you
can
have
its
wonderful
functional
code
that
will
be
great
to
read
and
that
will
be
very
effective,
moreover,.
There
is
a
concept
called
zero
cost,
a
bstraction
that
is,
you
do
not
pay
for
what
you
do
not
use.
B
If
I
try
write
in
the
next
line
that
you
equal,
this
152
I
got
a
spike.
Why
I
will
get
an
error
because
by
default
in
the
growth
they
made
such
a
decision
to
make
all
variables?
Initially,
we
do
not
change
all
the
variables
they
have
by
default
and
why
this
should
be
done.
Because,
yes,
let's
say
when
writing
program,
you
are
developing
a
habit
there,
a
dating
site.
You
try
to
see
where
you
will
definitely
not
be
used.
B
B
Is
it
possible
the
contract
is
written
to
grow,
interrogate
the
ether?
If
not,
what
city
move
what
networks
can
be?
Let's
say,
the
question
is
a
little
tricky
if
you
write,
let's
say
some
library
of
your
own,
that
will
compile
your
consumption
and
you
will
get
approximately
the
one
that
expects
even
from
the
contracts
compiled
by
us
go
there.
You
can
sort
of
ask
why
not
because,
well,.
B
Let's
say
they
are
on
the
air,
and
the
language
is
called
viper
and
you
can
write
a
contract
on
it,
that
is,.
If
you
write
to
increase
your
5th
anniversary
so
that
you
will
create
a
smart
contract
on
the
air,,
then
why
not,,
but
initially
some
tools
that
are
released
into
the
stomach
and
which
make
it
grow,
I
don’t
have
such
tools
I
know
such
a
solution.
This
broadcast
is
not
popular
it’s.
True,
the.
B
B
Nikolay
vasilich
and
shin
asked
a
question
about
variables,.
You
can
use
the
same
name
again
through
a
new
forest
with
a
new
type
yes,,
as
Andre
answered
quietly
a
little
in
a
concert,.
This
is
called
a
step,
that
is,
in
this
case,
you
kind
of
overlap.
The
previous
variable
from
the
current
moment,.
Your
variable
gets
what
value,.
B
But
the
point
is
what,
before
it
may
seem
that
this
approach
can
lead
to
errors,,
but
in
fact
it
allows
you
to
write
code
when
you
do
not
create
some
kind
of
change,
do
not
make
it
mutable,,
but
at
the
same
time
you
are
sure
every
time
that
no
one
can
change
your
variable.
Only
if
you
explicitly
write
light,
then
you
have
steps.
I
am
an
owl
and
just
write
without
without
2.
Then
then,
then,
then
you
have
it
close
to
a
compile-time
error.
B
Itself
of
this
type,,
except
for
transactions
that
blocked
the
network,
and
there
was
a
problem
moving
to
conduct
your
transactions.
Zero
transfer
amount
0
to
this
question,
the
exact
answer:
I
will
tell
you
now
in
an
instant,
but
as
far
as
I
know,
you
have
a
check
for
this
type
of
transaction
and
ballet
photo.
Each
validator
has
some
kind
of
circus.
I
advise
you
to
ask
this
question
the
best
in
discord
in
discord.
B
B
Aurora
team,
that
is,
we
are
specifically
taking
care
of
between.
At
the
moment
it
is
paris
between
the
ether
and
the
world,
and
moreover,.
We
are
developing
a
thief
and
we
see
this
engine,.
This
is
the
same
virtual
machine
of
the
ether
that
works
like
a
smart,
contract,,
the
inner
world,
and
this
is
the
aurora,
it
already
exists.
There
are
no
coins
for
the
test
and
you
can
use
follow
to
write
smart
contracts.
B
The
same
as
to
you
write
on
the
air
and
at
the
same
time,
you
will
be
able
to
sail
for
a
support
that
are
fully
compatible
with
the
air
but
which
work
for
her
and
the
aurora
is
less.
Transactions
are
much
cheaper.
They
are
much
faster
about
the
system
of
punishment
of
violators.
Then
I
heard
what
or
does,
but
now
her
daughter
is
us,
but
for
zero
transactions
there
should
be
a
cover
unit
testing.
There
will
be
a
question
asked
a
range
of
widths
until
June
testing.
We
will
cover
them
in
principle.
B
B
If
we
are
talking
about
the
same
Aurora
project
with
which
we
do
not
work,
and
the
same
project
in
the
future,,
there
is
a
specific
plan,,
because
this
project
will
be
developed
and
managed,
that
is,.
If
at
the
moment,
the
development
team,
that
is,
we
have
contract
access,,
we
can
expect
some
bug
fixes
in
the
future.
B
If
a
specific
proposal
plan
that
was
described
on
the
form
of
nir
was
that
this
aurora
aurora
engine,
that
the
virtual
machine
of
the
ether
will
come
with
a
rainbow
bridge
that
connects
through
the
bridge
and
there
will
be
no
management
of
these
contracts-
is
also
completely
decentralized.
For
this,
its
own
separate
one
will
be
created
and,
in
fact,,
not
an
aurora
to
occupy
one
place
there,
and
it
will
be
such
a
collective
decision-making
and,
accordingly,.
They
will
give
an
upgrade
to
whom
it
will
also
be
for
centralized,.
B
Why
bring
a
string,
for
example,
vlad
qstring
from
ustream,
just
jori,?
You
need
this
only
if
you
need
to
bring
it
to
a
variable,
I
understand.
This
is
understood,
for
example,
this
site,
where
the
line
john
is
so
put
on
top'
and
left'
extreme.
We
will
consider
this
concept
further,,
but
the
point
is
that
in
Russia
there
are
several
types
of
strings,
that
is,
such
a
string.
A
B
A
type
that
is
written
as
an
ampersand
ester
and
they
have
a
question
about
which
string
is
stored
in
memory
200,
so
in
short,
that
is,
there
are
just
several
types
of
strings
and
we
will
analyze
it
in
detail.
Now
it
will
det.
Tell
me
the
explanation,
but
it's
just
a
few
different
types,
and
specifically
here
the
string
type
is
a
string
that
owns
memory
before
this
thing
is
allocated.
One
hundred.
B
B
That
is,
outside,
in
principle,
see
from
the
contract
world
in
general,.
You
can
write
not
only
on
1,,
you
can
write
everything.
Also
us
and
discreet,
and
children
are
being
developed
uphill,.
But
since
this
is
considered,
the
main
language
and
cities,
pictures
of
some
critical
contracts
are
recommended.
B
It’S
you,
respectively,
more
to
read
in
general,
how
to
use
you
on
the
nerve.
Now
there
is
such
a
desire,.
You
can
follow
this
link,
I
sent
comments.
The
answer,
and
specifically
the
children
to
grow
up.
Also
in
these
documents,,
which
send
the
following
link,,
it
is
on
the
documentation
for
the
world
languages,
rs
and
can
be
considered
this
example,
moreover,.
We
still
have
references
to
this,,
but
we
will
come
to
this
later
after
the
first
lecture.
it’s,
not
quite
valid,
because
tell
me
all
the
participants
are
familiar
with
1,.
A
B
B
I
understand
we
are
talking
before
there
are
standard
NASA
contracts,,
you
see,.
Let's
say
it
differs
a
lot
on
the
first
diver,
I
write
all
contracts
to
annoy,
that
is,.
When
I
mentioned
the
Aurora
project
that
launches
its
ranger
protocol,,
which
is
already
running
me,,
the
protocol
is
specifically
the
Aurora
engine,.
It
is
needed
in
order
to
mark
the
existing
code.
Nasa
see
could
run
on
avr
ore,
that
is,
in
this
case,
there
are
one
hundred
percent
identical
to
the
ether,
charge,
the
code,
no
additional
differences,.
B
He
does
not
need,
he
will
use
huge.
Yes,
there
32-bit
hashes,
he
will
be
able
to
use
more
precisely.
It
is
already
on
it
now.
As
for
smart
contracts
on
pl,
this
is
the
soldering
dot.
If
we
are
talking
about
the
owner,
then
we
have
a
detailed
one
in
principle.
Write
me
smart
contracts
and
the
blockchain
itself
that
is,
on
the
substrate.
B
We
write
specific
modules
and
we
will
launch
we
skim
it
all
as
a
separate
block
chain,,
but
there
is
also
a
programming
language
on
polka
dot
and
the
link
itself
is
used
to
write
smart
contracts,,
but
again,.
Not
only
do
they
differ
in
many
concepts,
and
we
will
just
try
to
explain
as
much
as
possible
all
the
differences
that
exist
within
this
course.
This
will
already
happen
in
the
second
block.
B
When
we
move
on
to
studying
the
nir
protocol
in
the
next
lecture,
we
will
then
consider,
if
you
looked
at
the
schedule,
we
will
consider
argun.
This
is
just
the
package
manager,
the
only
and
most
important,
most
correct
way
to
manage
the
project
over
projects
to
grow,
I.e.
managing
dependencies
managing
some
features,,
flags,,
etc.
Thank.
You
all
so
much
that
a
huge
number
of
people
connected
to
our
call
very
cool
that
a
huge
number
of
questions
are
very
cool.
We
will.