►
From YouTube: 5. Ownership & borrowing в Rust (Курс Rust на NEAR)
Description
Все видео курса https://www.youtube.com/playlist?list=PL9tzQn_TEuFUakOn-IY9cDQL2ztNzZunh
Совместный курс NEAR & 4ire Labs
Подписывайтесь, чтобы получать обновления о новостях NEAR, акциях, запуске проектов, баунти, хакатонов
Русскоязычное сообщество NEAR https://t.me/near_protocol
Твиттер https://twitter.com/near_protocol
Общение с разработчиками https://t.me/openwebdev
Follow the latest from NEAR Protocol on:
Website: https://near.org/
Discord: https://near.chat/
Blog: https://near.org/blog/
Twitter: https://twitter.com/NEARProtocol
GitHub: https://github.com/near https://github.com/nearprotocol
#Blockchain #FutureIsNEAR #NEAR #nearprotocol #rust #wasm #assemblyscript #раст
A
A
A
Since
today
we
will
have
such
a
more
overview
topic,
that
is,,
we
will
consider
with
you
the
main
concepts,
these
related
characteristics
and
advantages
that
these
language
features
actually
give,,
but
most
of
all,
of
course,
you,
you
will
need
to
try
to
play
around
with
these
mechanisms.
Yourself,
try
to
break
them,
that
is,
the
question
always
arises,
what
if
I
did
like
this,?
A
It
will
probably
work
and
it
will
break,
and
it
will
be
very
good
to
practice
with
this,
because
otherwise,
at
first
these
concepts
may
seem
to
you
very
unusual,,
but
over
time,
you
are
already
worth
it,
so
to
speak,,
and
you
will
already
get
used
to
it.
You
can
use
them
more
useless,
more
painless.
Let's.
A
Talk
about
the
organization
of
memory
itself,
even
in
principle,
memory
management,
as
perhaps
many
of
you
should
already
know-
that
each
window
program
should
manage
its
memory,
resources,
which
is
allocated
somehow
to
create
it
to
allocate
this
memory
and
when,
when
then
just
gobble
up
this
memory
correctly,,
because
otherwise,
if
your
memory
accumulates,
accumulates
but
is
not
released,
in
the
end,
you
will
simply
run
out
of
resources,
the
data
device
that
runs
this
application,.
Then
the
computer
is
a
mobile
application,
and
so
on,,
the
RAM
of
words,
will
run
out,
and
so
on,.
A
So
the
resources,
of
course,
should
be
released.
What
opportunities
exist
in
the
modern
world
before
memory
management?
If
we
talk
with
you
about
such
languages,
\u200b\u200bthat
have
their
own
runtime
virtual
machine,
for
example,
languages,
\u200b\u200bsuch
as
java
or
a
ball,,
then
these
languages
\u200b\u200buse
a
garbage
collector.
This
is
a
garbage
collector.
A
What
is
a
collection
rubbish
ik
for
those
who
do
not
get
acquainted
with
this
concept,,
roughly
speaking,,
along
with
your
program,,
the
virtual
machine
from
which
you
use
at
the
same
time
it
runs,,
let's
say,,
a
third-party
application
that
controls
the
memory
of
your
application,.
This
is,
of
course,
very
rough,
and
the
definition
in
this
case
is
the
right
machine
controls.
Your
memory
in
which
there
is
a
garbage
collector
component,
and
what
is
the
task
of
the
garbage
collector,
the
garbage
collector?
A
What
does
it
do,,
roughly
speaking
about
such
claims,
also
java
and
the
United
States,
then
you
create
objects,
you
basically
don’t
think
about
where
you
create
them
and
how
often
you
often
create
them
in
the
future.
Do
you
ever
think
about
how
memory
management
will
be
related
to
these
objects,?
Because
in
these
languages
you
have,,
roughly
speaking,
a
certain
guarantee
that
as
soon
as
you
stop
using
these
objects,,
your
memory
will
be
freed.
And,
accordingly,!
A
You
will
always
have
available
in
this
there
is,
of
course,
green
exception,
but
in
general,
as
a
job,
assemble
garbage
collector.
It
tries
to
keep
track
of
references
to
all
your
objects
and
determines
as
soon
as
the
garbage
collector
determines
that
your
object
is
no
longer
used,.
It
destroys
it,
that
is,
it
collects,.
Let's
say,
a
garbage
object
to
this.
Let's
call
the
garbage
collector
collects
objects
that
are
more
used
and
thus
memory
is
felt
by
them,
and
so
you
know
that
you
don't
need
to
worry
about
memory
at
all.
A
In
rare
cases,
you
have
the
option
to
force
garbage
collection
of
course..
You
can
tell
the
garbage
collector
yourself
now
and
clean
up
the
memory,,
because
usually
the
garbage
collector
works
at
a
certain
interval,
that
is,,
let's
say,,
relatively
speaking,.
It
proves
it
for
30
seconds
or
every
minute
it
checks
for
some
invalid
objects
that
can
already
be
deleted.
What
other
method
is
there,
well,?
A
What
The
honor
of
the
methods
of
organizing
memory
is
the
allocation
and
release
of
memory,
that
is,
allocation
and
the
matter
of
songs
manually,.
So,
actually,
you
do
when
you
work
with
such
languages,
for
example,
how
the
system
costs,
in
this
case,
specifically,
you,
as
a
programmer
during
development,,
must
yourself
monitor
how
much
your
memory
is
used,.
You
yourself
must
determine
when
your
lunch
should
be
destroyed,
also
when
it
should
be
created
and,
of
course,
each
of
these
trips.
A
They
have
their
pros
and
cons,
that
is,,
when
you
work
with
such
java
jar
languages
with
a
garbage
collector
and
you
don’t
worry
about
memory
at
all
when
you
work
manually
with
memory.
Of
course,
all
the
answers.
Responsibility
lies
on
your
shoulders
and
you
yourself
must
allocate
correctly
correctly
frees
memory
and
when
people
are
there
on
their
shoulders
that
this
responsibility
falls.
Often
most
errors
in
software
occur
just
related
to
this.
A
With
this
concept,
with
the
concept
of
memory
management,
for
example,,
even
microsoft,
they
when
talked
about
why
they
started
using
1
there,
a
few
years
ago,
microsoft,
products
because,
in
principle,
over
the
past
20
years,,
80
percent,,
if
I'm
not
mistaken,,
about
80
percent
of
the
errors
and
bugs
that
they
found
in
the
hair
on
memory
management,.
Maybe
some
of
you
know:
if
languages,
you
saw
some
kind
of
memory,
then
you
somehow
in
some
place
you
let’s
say
I
accidentally
did
something
special
or
this
memory
was
destroyed.
A
Then
they
get
trying
to
access
the
same
memory
area
of
course
that
you
will
get
seconds,
that
is,.
It
will
be
an
error
and
basically
the
dependency
of
this.
If
you
have
some
kind
of
mechanism
before
trapping
and
depending
on
this,,
you
can’t
make
mistakes
either,
some
unpredictable
things
called
inferior,
can’t,
happen,
and.
A
A
I
will
briefly
go
over
this
concept
because
perhaps
not
everyone
has
worked
with
such
low-level
programming
languages,
codesys,
that
is,,
let's
say
up
to
the
same
people
who
have
a
screen
of
languages,
\u200b\u200bthat
the
garbage
collector
end
I,
would
not
understand
what
a
butt
memory
is
for
those
who
are
not
familiar
with
a
stent
concert,.
You
can
come
to
present
this
concept,.
A
So
imagine
you
have
some
kind
of
wooden
pallets
with
a
load
and,,
roughly
speaking,
1
flight
over
que
ser
is
placed
on
top
still
on
top
more
on
top
and
when
you,
accordingly,
you
need
to
access
the
same
to
something
that
lies
on
the
very
bottom
to
water,
you,.
First,
it
forces
you
to
remove
all
packages
from
above,
that
is,.
The
last
info
principle
works
here,
that
is,,
what
is
supposed
to
be
the
last
from
the
workshop,
will
come
out
first,.
A
This
is
such
an
attempt
to
simplify
to
an
explanation
that
such
an
old
memory
such
a
memory,
it
works
sequentially
you
put
on
top
of
each
other,
put
put
on
top
of
the
elements
in
this
case,.
It
only
changes
the
index
so
that
what
lies
at
the
very
top
of
the
joint
is
what
was
last
put
there.
What
is
hitman
memory
in
a
bunch
of
cases
on
the
ball?
A
bunch
is
more
difficult
because,
let's
say,
if
we
talk
about
memory,
glass
memory
can
put
everything
variables
whose
values
are
fixed,
that
is,.
A
A
You
have
some
kind
of
console
application
and
you
read
some
kind
of
user
there,.
Let's
say
your
application
is
app
for
some
kind
of
dough
conversion
and
use
The
client
enters
some
text
from
the
console,
I
won’t
jump,,
some
long
one,
and
the
length
of
this
text
can
change
each
time,
and
in
this
case,
of
course,
you
don’t
know
exactly
how
much
memory
you
need
to
cut
out
in
advance,
and
in
this
case,.
This
is
the
essence
of
dynamic
memory,
how
it
works.
In
this
case,
in
this
case,
you
have
a
locator,.
A
It
finds
some
free
area
of
memory
of
the
required
length
in
your
RAM
that
you
request
during
the
execution
of
the
program
krishna
during
compilation
during
the
execution
of
the
program.
It
finds
this
area
of
memory
and
allocates
for
you
up
to
your
object
and
your
object.
It
receives
a
link
to
this
area
of
memory,
until,
that
is,
roughly
speaking,,
in
which
cell
your
object,
lies.
And,
accordingly,.
You
need
to
ensure
such
a
principle.
A
Yes,
I
work
correctly
with
memory
in
the
chip
heap
in
November,,
which
main
concert
you
need
to
ensure
is
that
you
should
know
that
if
you
have
errors
with
it,
there
is
a
link.
Yes,
where
it
lies
in
which
Czech
memory,
but
it
has
also
long
been
called
a
library
to
punish
th
o.
You
need
to
know
that
no
other
object
will
be
located
at
the
same
address
and,
accordingly,
that
you
will
say
that
you
will
not
accidentally
transfer
the
checks
of
this
memory
in
possession
to
another
object,.
Another
object
will
not
be
written
there,.
A
A
Dantes
and
on
this
account,
you
can
read
separately,
whom
I
guys
are
such
a
memory
heap.
It
is
also
dynamic
memory
and
the
question
actually
arises.
What
then,
on
this
account,
which
of
these
concepts
to
use,
if
speaking
at
a
high
level
in
a
more
conceptual
way,
Vitaly
Taras
use,
which
-some
other,
inter
which
is
repentance
here,
1,
let's
think
about
what
kind
of
concert
in
order
to
think
we
will
remember
that,,
as
we
mentioned
as
his
lectures
in
growth,,
there
is
no
garbage
collector,
that
is,.
A
There
is
no
system
before
such
a
management
of
your
memory
that
collects
garbage,,
puts
it
dividing
links
and
so
on,
while,.
As
you
remember,
on
the
very
first
lectures,,
we
declared
that
in
Russia
there
is
memory
and
thread
safety
and
memory
safety,,
the
question
arises,.
How
does
it
ensure
memory
safety
and
thread
safety,
that
is,?
If
we
just
said
that
manual
memory
management
somehow
leads
to
errors,
because
when
you
have
a
huge
application,
it
is
very
difficult
to
control
memory
allocations.
A
Even
if
you
use
the
right
techniques
for
working
with
this
memory,,
which
we
will
not
talk
about
in
this
course,,
it
is
still
very
difficult
because,
as
a
rule,
the
codebase
can
calculated
in
megabytes.
There
is
a
huge
amount
of
code
and
there
are
always
a
lot
of
places
where
something
can
go
wrong
that
once
it
offers
to
solve
this
problem
once
it
offers
just
at
the
end,
which
is
called
midnight,
that
is,
the
concept
of
memory.
A
Ownership
is
actually
a
unique
property
of
the
language
1
which
of
the
memory
ownership
rules
that
each
value
has.
There
is
its
own
owner,
that
is,
its
own
review
of
memory,
and
there
can
always
be
only
one
owner
at
a
time,.
You
are
only
12,,
there
can
be
no
aging
and
more,
only
one
owner,,
the
currency
is
the
owner,,
as
it
is
approximately
up
to
some
value,,
and
there
is
also
a
rule
that,
when
the
owner
of
the
memory,
the.
A
Meaning
will
be
written
to
robs
faith
and
the
red
values
will
be
released,
destroyed
that
such
a
scope,
I
think
you
are
already
familiar
with
this,
Zhenya
at
the
last
lecture
talked
about
this
concept
and
how
to
use
it,
that
is,,
if
you
remember
correctly,
yes,,
this
is,
for
example,
a
protégé
curly
braces.
Yes,
that
you
can
use
curly
brackets
to
limit
the
scope
and
the
scope
itself
is
just
very
important
just
before
that,.
Let
if
you
have
some
variable
that
goes
beyond
the
scope
in
the
growth,.
A
A
While
it
is
worth
noting
that
in
Russia
they
did
it
very
smart,
that
is,,
you
certainly
would
not
want
to
dores.
You
had
a
construction
say
years
x
is
3
and
from
y
equals
x,
and
then
you
can't
use
the
variable
x
because
the
value
was
passed.
So
in
Russia,
what
is
done?
Primitive
data
types
are
stored
at
the
junction,
and
this
means
that
they
are
also
destroyed
when
they
go
out
of
scope
but
at
the
same
time
grow
on
primitive
data
types,.
That
is
it's
a
number,.
It's
a
bullet,.
A
There's
a
fundamental
explanation
for
why
it
will
work,
we'll
look
at
it
today
very
similar
and
at
the
same
time,,
non-,
primitive
data
types
are
such
that
there
are
some
complex
data
types
about
the
heap
is
not
stored
and
in
this
case,
in
the
growth
they
are
these
variables.
These
data
types
are
released
from
the
heap,
I.e.
jobs
when
they
go
out
of
scope.
A
Consider
this
example:
here
we
have
such
string
string,
one
which
contains
the
value
and
sneakers,
as
you
might
remember,
from
the
previous
lectures,
and
in
this
case,
string
is
our
tour
to
of
rome,.
This
is
the
method
of
this
structure,,
which
will
tell
the
method
that
the
result
of
the
structure
and
.
what
you
get
access
to
in
this
case
is
a
static
method
of
the
front
method
is
a
static
method,
and
this
is
actually
our
variable.
String'
one
will
be
a
string
with
the
value
of
missiles,
as
you
remember
that
we
analyzed
in
Russia.
A
There
are
several
types
of
stream
several
types
of
strings,
that
is,
there
are
such
strings.
Who
of
you
have
already
managed
to
work
with
rass
to
see
that
sometimes
the
war,
with
a
capital
letter
and
lured
to
accept
a
variable
like
papers
on
st,
that
is,
in
this
case,.
These
are
string
literals
and
this
guide
ral,
it
is,
as
it
were,
constants.
You
cannot
change
and,
accordingly,
other
rules,,
but
we
are
now.
We
are
talking
about
a
string
which,.
A
Let's
say,
is
more
familiar,
adwords
in
yellow
from
languages
such
as
cafe,
java
and
so
on,.
This
is
some
kind
of
fear
in
which
rockets
will
solve
and
and
why
it
is
complex
because
you
have.
This
string
can
be
of
arbitrary
length
example.
Declare
this
variable
as
it
was,
then
there
be
yo,
mute
string
van.
Then
you
will
be
able
to
change
the
value
of
that
string
and
accordingly,
you
at
the
time
of
compiling
the
program,.
A
You
don’t
know
how
much
memory
to
take
this
time
there
can’t
be
00
elements
in
one
character:
there
can’t
be
100
thousand,
therefore,
of
course,.
Such
a
variable
is
a
complex
data
type
that
is
stored
in
the
heap,
that
is,
this
dynamic
data.
Type,
let’s
see
how
it
all
is
it
works,,
let's
say
from
the
inside,
just
here:
you
can
see,
in
fact,
how
it
works.
Here
we
have
a
string
variable
one.
If
you
look
like
inside,
we
do
not
store
such
changes
as
length,
and
this
is
all
a
symbol,
and
this
network
is
7.
A
If
a
fraction
is
how
much
volume
is
allocated
for
this
line
actually
and
uniformly,
which
is
used
directly
and
there
is
a
will
to
enter-
which,
roughly
speaking,
contains
a
pointer
to
a
memory
cell
that
was
allocated
before
this
variable
and
therefore
from
the
cell
memory,
we
have,
respectively,
the
first
element
of
the
I-th
row
and
with
index
1
2
2
2.
The
character
of
this
string
is
to
hit
and
so
on,
and
so
we
have
such
7
characters,.
A
Respectively,,
let's
consider
such
an
example.
If
we
create
a
second
variable
string,
2
and
isaeva,
it
has
the
value
a
string
one.
What
do
you
think
will
happen
will
happen?
How
do
you
not
expect,
let's
say
here
so
the
situation
is
the
second
stringvar
variable
and
in
fact
it
is
string
2.
It
will
be
pointed
to
also
to
the
same,
whose
you
are
bathing,
that
is,
it
turns
out.
In
this
case,
we
will
have
such
a
situation
when
we
have
a
strenx
variable
that
affects
the
keys
from
memory
and
a
variable.
A
That
is
at
the
same
time,
the
same
two
variables
point
to
the
memory
chip
here,
as
you
understand,,
which
of
you,
used
it,
yes,.
This
is
a
dangerous
approach,.
Why
did
you
hit
the
groove
and
because,
let's
say
you
operate
on
the
string'
variable
one
and
we
expect
you
do
not
change
the
shutdown,.
You
expect
that
everything
happens
because
you
don’t
see
to
change
the
value
of
the
first
string
alone,,
but
at
the
same
time
you
have
approximately
string.
You
refer
to
the
same
memory
area
and,
accordingly
Naturally,.
A
A
What
is
initially
here,
the
user’s
cat,
as
it
were,
a
programmer
from
when,
in
this
context,
I
say
to
users,
user
programming,
that
is,
a
labor
programmer,
write
what
you
wanted
to
do
programmer
hammering
inclined
extreme2
equally
sheared,,
he
most
likely
expected
to
get
some
such
result
in
the
variable
stand,
2
referred
to
its
memory
area
and
at
the
same
time,.
This
memory
area
contained
exactly
the
same
information
as
in
this
memory
area,.
A
A
It
kind
of
denotes
a
string
variable
one
that
I
can
no
longer
use
at
the
moment,
because
this
memory
area
is
owned
by
the
Streltsov
variable
and,
accordingly,.
How
is
it
in
terms
of
the
language
of
growth,?
What
is
it
called?
It
is
called
that
the
ownership
of
this
area
of
memory
was
transferred
from
the
variable
string'
one
to
the
variable,
a
string
2
that
is,.
This
is
this.
This
is
this,.
A
Remember
this
is
the
transfer
of
ownership
for
sure,
the
knife
will
avoid
ownership
was
transferred
accordingly,
if
you
are
in
Russia
continue
this
example
of
which
string.
If
you
ask,
if
you
assigned
the
string
one
and
then
you
try
to
display
the
contents
of
the
string
as
strings,,
you
will
get
such
a
compiler
error,
and
what
will
he
say
that
the
husband
happened
here,
because
streaming,
one
has
the
string
type
and
this
type
does
not
implement
the
trade
copy.
What
is
the
trade
we
are
on?
The
current
Lexa
will
not
disassemble
trades,.
A
We
will
disassemble
on
the
future
future
lessons,
if
briefly
at
the
moment,
without
going
into
particular
details
what
logic
to
grow.
If
your
object
does
not
have,
say,
an
available
copy
property
in
this
case,
troyka
can
combine
that
this
property
is
now,
that
is,.
If
the
object
does
not
have
a
copy
device,,
then
this
object
will
own.
It
transferred
and,
accordingly,,
the
capillaries
of
the
stepfather,
swearing,.
A
He
tells
you
that
you
will
try
to
use
the
moved
value,
that
is,
you
passed
the
value
of
this
line
to
the
variable
string'
2,,
which
means
that
the
stream
form
in
the
future
does
not
own
this
object,,
but
at
the
same
time
you
are
trying
to
display
a
string
with
the
value
of
the
Stalin
form
object
and
since
it
doesn’t
allow
you
to
do
this,
and
therefore
it
happens
during
the
compilation
of
the
program,
which
again
we
return
to
the
same
principle.
Kai
about
which
I
spoke
here
is
our
very
first
lecture.
A
Sorry,
if
the
mask
of
your
program
is
adjusted,,
then
almost
always
it
will
work
as
you
expected
it.
Well.
That
is
the
logic.
Yes,
of
course
it
may
differ,,
but
in
terms
of
implementation,
it’s,
not
the
way
you
imagine
it
to
be,,
but
the
bottom
line
is
that
from
a
technical
point
of
view,,
your
program
will
work,.
There
will
not
be
such
a
moment
as
I
said
that
both
variables
also
indicate
the
memory
eye
and
when
you
change,
say
street
2,
you
may
accidentally
find
out
that
yours
is
also
changing,.
A
A
A
Should
be
familiar
with
such
concerts,
that
is,
this
concept,
it
says
that
getting
a
resource
is
the
initialization
of
that
resource.
thank
you,.
There
are
no
uninitialized
objects,
and
moreover,.
If
your
object
is
no
longer
used,,
they
are
destroyed,
that
is,,
just
in
1
tiny
for
your
objects,
again,.
We
return
to
this
concert,.
Let
's
say
it
again,.
This
is
important
if
your
objects
go
out
of
scope,,
that
is,
go
out,
zaz-club
I
actually
advise
you
to
use
such
concepts
as
stingy.
Even
if
you
communicate
in
Russian,.
A
Mister,
and
if
your
object
goes
beyond
100,,
then
the
object
is
destroyed,.
Why
am
I
here,?
If
attention
is
not
the
first
time
I
hear
how
much
that
they
are
jobs?
Just
when
we
are
with
you
watched
this
example.
Compilation
error
here
the
coordinator
writes
to
you
that
your
variable
does
not
draw
copy
trade,
because
I
said
that
dad
is
the
properties
of
the
object,.
The
property
of
the
object
that
distinguishes
for
printing
for
its
destruction
is
called
sorry
that
a
change
occurs
when
it
goes
out
of
scope.
A
It
is
jobs
that
is,
it
is
destroyed
and
remember
this
later
and,
accordingly,,
when
you
leave
the
area
visibility
motor
so
that
I
destroy
the
resources
owned
by
this
object,.
They
are
also
cleared,
which
means,,
but
in
this
case,,
when
we
had
line
1
32
that
received
ownership,,
you
act,
and,
as
you
can
see
in
the
presence
in
this
figure
and
classes,
as
it
is
described
in
a
simplified
form,
the
structure
of
the
string
itself
is
there,.
A
They
are
a
pointer
to
if
you
get
in
which
it
lies
and
slowly
and
it
has,
and
moreover,,
with
string
2
will
be
destroyed
when
it
goes
out
of
scope.
Until,,
let's
say,
your
curly,
brace
that
you
put
in
some,
then
the
place
of
your
program
is
acceptable
as
this
function
or
just
a
limited
scope
inside
some
kind
of
down
the
street,
as
it
were,
to
consider
in
past
lectures.
ice
slim
2
go
out
of
scope,.
A
A
A
Let's
look
at
specific
examples
to
make
it
clearer.
That
is,
as
I
said,
that
assignment
is
an
assignment
operator,.
It
transfers
ownership,
that
is,
from
one
object,
ownership
comes
from
another
object,.
This
is
actually
an
example,
yes,
how
it
is
also
passing
function,
arguments
by
value,.
It
also
transfers
ownership,.
Let's
look
at
a
simple
example,
here
we
have
the
main
function
in
which
we
create
the
string.
Variable
one
is
exactly
the
same
change
as
in
the
previous
examples,,
which
lies
the
string
with
rockets,.
A
While
we
have
a
function,
in
principle,
what
to
do,,
it
simply
displays.
The
value
here
is
passed,
passed
to
the
variable
s
we
are
doing
here.
We
are
displaying
the
string.
The
first
attempt
will
pass
them.
Then
we
call
the
function:
print
stream
to
output,
t
on
the
screen,
the
line,
recipe
string,
and,,
accordingly,
samarka,
and
then
we
call
again
the
call
to
this
function
online
print
and
scan.
But
there
is
a
second
attempt
again
environment
variables
in
this
case
to
grow.
A
A
Look
in
this
case,
you
created
a
string
variable
one
assigned
a
string.
You
output,
the
value
of
this
string,
then
called
the
print
3
function.
As
you
can
notice.
The
function
takes
an
argument
of
type
string
and
what
happens
in
russian
doctors.
In
this
case,
you
transfer
ownership
of
your
string
year.
Variable
string'
one,
you
transfer
ownership
of
the
function
principle
and
accordingly,
since
you
transferred
ownership
of
this
data
to
the
function,
bring
you
times
won't.
Let
me
do
something
like
this
t
construction,.
A
A
A
A
The
variable
is
moved
what
the
change
is
moved.
Let's
say
it's
a
little
strange
to
read
in
this
case.
It
assumes
the
ownership
of
the
function
at
mix
3
and
you
are
trying
to
use.
Must
you
are
trying
to
use
the
value
of
this
variable
which
no
longer
owns
the
data
it
owned,
but
initially,
since
it
actually
says
so,
yes,
I
saw
you
in
the
chat,.
There
were
discussions
about
the
fact
that,.
A
As
far
as
there
are
not
informative
errors
in
Russia,,
they
are
actually
quite
informative
and
specifically
in
the
chat,
I
saw
before
the
action.
An
example
was
there,
yes,
about
testing,
well,,
specifically
there,.
Your
brother
even
told
you
that
it’s
easy
to
use
so
here
again,
once
again,
everything
tells
you
very
clearly
what
is
going
wrong,.
It
highlights
to
us
that
track.
1
is
again
a
string
type
that
does
not
implement
copy
properties.
A
And,
accordingly,,
when
you
call
the
stream
prince,,
then
your
ownership
is
from
the
right
to
own
data
from
the
string
variable
one,
the
Prince
3
function
passes
and
the
calculator
tells
you
that
it
turned
out
that
you
are
trying
to
use
the
value
after
wow
and
cancer
fontal
and
allows
you
to
do
this
as
an
appeal
to
the
laws
of
nature.
If
someone
is
interested
in
the
property
of
the
mine,
if
you
say
this
is
our
string
string
in
it?
A
If
it
were
a
hobby
property,,
then
it
would
be
a
valid
code
and
it
would
compile
saying
if
you
have
strings
in
Russia,.
This
is
what
happened
from
the
string.
Variable
2
copied
the
contents
of
this
memory
cell
into
a
new
memory
cell
and
these
memory
chips.
Then
that
move
on
the
example
he
was
at
work
and
was
thrown
there,.
A
The
rank
would
know
that,
even
if
you
try
to
use
the
rep
orno
this
variable,,
then
no
one
else
owned
this
variable,
that
is,
this
function,
roughly
speaking,
it
received
a
copy
of
this
variable,
but
not
the
variable
itself,
and
accordingly
it
is
safe.
If
you
also
change
the
value
of
this
variable
to
the
original
variable,,
this
is
not
a
problem,
because
it
knows
exactly
what
its
value
has
not
changed.
A
Also,
what
other
property
is
there
semantics
returning
the
result
again
transferring
ownership
again,
let's
look
at
an
example
of
how
to
return
results
like
this
example
transfer,
I.e.
don't
take
a
second
look
at
the
previous
example
here.
Our
green
street
pass
function,
accepts
a
change
from
a
string
type.
What
is
such
a
return
of
the
result,
here?
We
indicate
that
our
function
is
a
prince
and
it
is
returned
as
a
result,,
also
a
variable
of
type
string
and
what
happens
we
call
funds
to
try
and
string.
A
It
also
receives
a
string
of
type
string
and
at
the
end,
we,,
as
you
can
see,
simply
with
that
is,.
In
this
case,
our
the
function
returns
again.
This
line
we
took
back
as
you
remember
now.
The
first
collection
here
is
the
syntax
short
syntax
for
returning
the
result
of
the
write
function.
prepared.
It
would
be
the
same
as
with
without
a
dot.
A
What
has
now
changed
in
our
example,,
in
addition
to
the
fact
that
we
return
a
string
and
rotate
the
string
with
of
course,?
In
this
case
we
have
to
change
the
string
one
and
because
we
are
going
to
use
the
precedence
operator.
Yes,
this
is
a
variable,
but
what
are
we
doing?
We
write
that
string.
One
is
equal
to
a
twin
string
in
which
we
passed,
and
if
we
try
to
compile
this
program,
it
will
already
work
for
us
what
happens
in
this
case
like
this.
A
A
So
at
the
current
moment,,
when
we
already
have
this
function
in
the
new
testament,,
it
does
not
own
this
variable,.
But
what
then
do
we
do
to
the
function
itself
in
the
function
itself?
At
the
end,
we
return
again
the
same
variable
of
type
string,
that
is,
we
return
back
the
possession
of
these
m
objects,
and
accordingly,
here
we
assign
31.
A
We
assign
a
value
that
is
visible
to
the
winx
3
function
and
at
this
moment,
when
we
return
this
value,
the
print
screen
function
no
longer
owns.
It
no
longer
owns
this
variable
and
from
the
ownership
of
the
variables
in
this.
In
this
part
here
in
this
line,
it
is
returned
back
to
the
variable
string'
one
of
the
agdam.
We
will
try
to
display
the
main
function
with
it
on
the
screen.
A
It
will
no
longer
be
an
error,
and
everything
is
ok,
because
you
returned
ownership
of
this
agent
and
when
we
returned
ownership
of
this
object,
we
can
no
longer
say
that
at
the
same
time,
two
objects
own
this
data,
not
only
one
just
the
order
changed.
First
awesome
string,
one
owner,
then
the
word
owners
the
printer
function
and
then
transferred
into
ownership
and
again
the
owners
became
the
variable
string'
one
by
the
way
such
another
moment
consider
what
I
will
give
several
times.
Besides
mentioned
that
when
the
change
goes
out
of
scope,,
I.e.
A
Previous
example
are
freed
and
we
had
the
pins
3
function
to
which
to
pass
the
string
variable
this
function.
This
appears
one
not
school,
that
is,
after
we
have
completed
this
function,,
we
will
free
the
stark
from,
and
at
this
moment
everything
will
already
be.
The
memory
is
freed
and
we
won’t
have
any
more
memory
against
the
memory.
You
won’t
be
what
frames,
because
at
the
end
of
this
function,,
our
memory
was
destroyed
in
this
example,.
A
The
resources
owned
by
this
variable
will
be
deleted,
that
is,
the
string
will
be
the
first
to
release
these
resources,
in
fact,.
What
is
needed,
in
fact,?
This
construction
will
turn
out
to
be
a
bit
strange,.
We
just
want
to
print
the
string
to
the
screen
when
this
we
have
to
do
some
seemingly
strange
operations
m.
We
just
want
to
print
the
string,
yes
to
whom
it
is,
what
transfers
of
ownership
are
there?
A
Why
do
we
have
to
think
about
it
so
hard,
that
is,
it
is
necessary
to
return
this
ownership
back
then
again
do
some
kind
of
was
so
that
we
can
make
an
assignment.
It
seems
a
little
complicated,
and
so
specifically,
in
this
case
this
is
superfluous,.
How
can
we
make
it
so
that
we
can
safely
transfer
the
string
when
we
know
that
we
are
not
going
to
change
it,?
We
just
want
to
print
it,,
we
print
it
there
and
we
change
its
value
of
the
read
operation,.
A
We
expect
what
happens
and
this
level
exists
for
this
music
level
so
that
you
can
access
the
data
but
at
the
same
time
not
changing
the
ownership
of
the
titanium,
that
is,
a
specific
example,
as
I
just
said,,
because
they
just
wanted
to
display
the
value
of
this
variable
on
the
screen
and
did
not
try
to
change
its
value,
and
therefore
it
seems
that
the
use
is
redundant
again
before
this
example
and
yes,.
In
this
case,
it
would
be
more
appropriate,
figuratively
use
barbie.
A
Also,
when
we
use
the
offline
compiler
statically
guarantee
that
during
compilation
that
references
always
point
to
emergency
objects,
we
will
definitely
return
when
I
have
a
Komi.
Besides,
if
you
have
seen
some
memory
of
a
hip
coachman
you
somehow,
then
you
did
something
with
it,.
Then
you
say
you
changed
the
value
of
the
string
and
you
have
some
other
pointer
in
colors
that
points
to
this
scope
with
a
new
one,
further
1
pointer.
That
indicates
this
scope.
A
You
will
end
up
with
an
attempt
to
access
100,
venerable
memory
and
it’s
that
it’s
a
gadget,
that
is,
it’s
both
the
roof
of
your
program
or
some
kind
of
candy
wrappers,
it’s
difficult
to
predict
what
will
happen
in
each
case,.
This
growth
will
not
happen
because
the
compiler
guarantees
that,
if
you
have
some
kind
of
link
to
lunch,,
then
it
points
to
valid
object,.
This
link
cannot
point
to
some,
say,
corrupted
objects
in
a
freed
memory.
Area.
A
If
something
is
important
forum
that,
while
references
to
an
object,
exist,
the
object
cannot
be
destroyed,,
which
means
that
if
we
created
several
sing
several
variables
that
refer
to
some
memory
area,,
then
this
memory
area
will
not
be
released
until
the
objects
they
refer
to
are
destroyed,
that
is,.
Until
these
object
they
go
beyond
the
brackets,.
What
is
the
actual
rule
of
the
drill
to
transfer
the
object
by
reference
in
Russia?
You
specify
the
ampersand.
A
The
same
example
is
slightly
modified
to
make
it
so
that
you
have
it
as
a
federal
program
so
that
it
works,
as
you
expect
this
to
be
done,
quite
simply
with
the
help
of
the
boar
mechanism,
and
as
you
can
see,
these
ghosts.
This
line
and
this
line
have
changed
the
function.
Signature
itself,
that
is,.
Now
we
have
the
print
screen
function,,
it
accepts
a
variable
s.
2.
This
variable
is
not
of
type
string.
This
variable
type
reference
to
3,
and,
accordingly,,
from
exactly
the
same.
A
A
Do
not
transfer
ownership
of
this
variable
to,
in
just
say
a
t.
If
you
want
to
temporarily
borrow
this
variable,,
and
in
this
case
you
are
borrowing,
it
does
not
allow
you
to
change
the
variables.
If
you
want
to
search
for
this
variable,,
then
for
this
you
must
specify
the
ampersand
beat,
and
so
specifically
in
this
case,
yes,
it
is
eternal,
because
the
function
principle
is,
as
it
were,
even
by
name
then
imply
that
this
function
is
simply
outputting
a
string
to
the
screen,.
A
A
Also
do
here,
you
still
went
in
this
function,
return
a
result
of
type
string
and
you
must
explicitly
state
what
you
are
returning
if
you
added
ownership
returns
the
result
and
accordingly,
you
return
ownership
of
this
variable
case.
Harrow
like
this
like
this.
If
you
added
here
with
your
finger
drink
and
was
he
was
to
say
yes,
it
would
not
be
entirely
correct
because
the
weights
change
the
reference
by
betrayal.
If
you
do
not
plan
to
compress
the
variable,
but
this
post
would
be
valid.
A
Of
course
you
had
to
prove
that
this
variable
of
type
string,
one
because
the
reality
of
the
string
is
loneliness.
It
beats
the
region
because
it
grows
up
again,.
It
will
not
give
you
this.
Does
that
if
this
function
looked
like
avatars,
I
beat
there
which
accepts,
and
it
was
a
string.
Indicatively,
string
would
not
allow
to
pass
a
variable
in
this
way,,
because
once
you
would
be
told
that
you
are
trying
to
use
one
mutable
variable
as
mutable,,
and
this
is
again
a
question
and
about
the
fact
that
doctors
are
immutable,.
Everyone
was
silent.
A
Why
it’s
good
that,
if
you
accidentally,
became
such
a
move,
that
you
call
the
principle
of
this
type,
especially
not
to
give
antics
said
the
guys
you
are
trying
to
use
a
variable
that
you
declared
as
immutable,
try
to
use
a
function
that
changes
its
value
and
the
compiler
will
not
let
you
do
it
for
us.
If
there
is
another
rule
in
the
city,
the
data
can
have,
and
was
that
is
immutable.
They
can
be
captured.
An
unlimited
number
of
times
captured.
A
This
can
load,
translate
like
say,
capturing
a
value,
capturing
a
value
or
conditionally
before
borrowing
a
value,
I.e.
what
rule
data
can
be
captured
in
an
immutable
way,
an
unlimited
number
of
times?
What
does
it
mean?
It
means
that
you
could
call.
This
function
accepts
an
unlimited
number
of
times
and
not
repeatedly
at
all.
It
was,
that
is,
to
make
the
boat
work,,
but
at
the
same
time,.
A
A
This
piece,
see
more
examples
of
this
concept
independently
well,,
and
there
is
also
such
a
rule
that
only
one
variable
is
changed
for
some
period
of
time,
that
is,
there
cannot
be
such
a
situation
that
you
have
one
variable
that
owns
the
object
and,
at
the
same
time
the
other
variable
does
not
own
the
object,,
but
you
have
ideas
how
you
passed
it
to
change
in
reference
to
your
object
in
Russia.
It
is
forbidden
to
do
this
because
again,
when
you
write
the
meat
code,
you
know
that
you
have
this
variable.
A
Only
this
variable
can
change
the
value.
It
is
very
unpleasant
when
it
turns
out
that
some
other
variable
somehow
changed
the
value
of
your
change
age.
It
will
be
impossible
again
a
compilation
error
once
it
says
that
you
cannot
simultaneously
access
changes
to
an
object,
even
if
the
owner
is
one,
but
at
the
same
time
another
object
has
received
the
right
to
sue
to
modify
the
contents
of
these.
There
again,
it
will
be
an
error,
while
you
can
seize.
A
Ownership
of
the
original
object
object
again.
Only
after
the
changeable
reference
to
this
one
has
already
been
released,,
let's
say
ate:
it
will
go
beyond
the
area,
apparently,
that
is,,
it
will
already
be
captured,,
it
captures
access,,
it
will
be
returned,
and
so
on,.
The
final
data,,
the
original
owner
of
this
variable,,
will
again
be
able
to
transmit
again,
say,
access
to
this
variable,
other
functions
of
the
green,.
A
You
again
have
to
to
avoid
such
a
mistake
that
you
have
variables
that
have
captured
the
original
effect
of
immutable
types
by
type
and
other
variables
have
paid
your
goal
of
being
mutable
by
type
disorder
such
and
will
allow,
because
again,
very
strange,
of
course
happens
all
the
time
you
have
some
say
you
consider
a
constant
input,
not
like
santa
concepts
of
red
constants
concepts
of
conceptual.
Even
if
you
have
some
variable
that
is
declared
just
let's
say,
live
streaming,
equals
trigon
sanctions
plan.
A
You
can't
create
a
variable
string,
3
equals
not.
It
was
an
ampersand
string.
It
is
because
it
will
give
you
tell
what
can
happen
when
there
are
times
we
don’t
change
from
a
mutable
reference,
and
it
would
be
very
strange
in
the
country
if
such
a
project
went
oh,
what
would
be
allowed,
because
it
would
mean
that
when
you
write
code
as
a
programmer-
and
you
see
that
you
have
a
variable
that
is
immutable,.
But
at
the
same
time
you
are
some
moment
in
time,
yes,.
A
That
is,,
if
you
see
that
your
variable
has
not
removed
an
immutable
type,,
you
can
definitely
know
that
no
other
thread,,
no
other
variable,.
Some
kind
of
function
can
not
change
the
value
of
this
variable,
and
this-
and
these
are
the
principle,
which
is
the
principle
of
turkeys
which
we
have
now
considered,
in
fact,.
They
are
the
first
reason
for
many
large
companies
such
to
for
example,
the
same
microsoft,.
A
Why
are
they
switching
to
1
main
advantage
of
growth,
it’s,
not
some
kind
of
functional
intestines
that
we
looked
at
expenses,
more,
it’s,
not
that
the
language
is
read:
well,,
it’s,
not
that
the
language
has
a
lot
of
such
as
cool
syntactic
sugar
it’s,
not
even
the
same
principle,
just
not
to
pay
for
what
you
don’t
use
it
is,.
First
of
all,,
the
concert,
vegetables
of
the
collection
of
all
the
previous
things,
listed,
and,
of
course,
such
a
choice
also
affects,,
but
they
are
secondary.
A
A
I
understand
that
it's
faces
home
from
you,
it
might
have
been
difficult,
especially
let's
say
until
those
people
were
so
familiar
with
such
fundamental
concerts
as
memory
pavic
heap,
who
was
not
familiar
with
the
current
existing
memory
management
mechanisms
of
the
subject.
Tah,
the
hunchback
of
the
connector
is
firmly
allocating
100,
desert
memory
and
I
hope
that
you
will
get
some
kind
of
small
site
about
these
concepts,
I
strongly.
A
Advise
you
very
shoes
yourself
also
try
to
play
around
with
these
concepts,
that
is,
at
the
last
lecture,
Zhenya
vandal
had
a
lot
of
homework
where
they
are
so
simple
programs
for
calculating
the
area
of
a
circle
of
a
square
and
so
on
a
duck.
A
small
application.
Try
to
use
these
concepts
there,
try
to
use
the
concepts
copy
this
code
to
the
one
shown
at
the
presentation.
Try
to
write
your
own
small
programs
play
around
with
it.
Try
to
break
it,
I.e.
it's
very
cool.
If
you
think
I'm
now,
I
will
do
it.
A
Try
try
to
do
it
very
high,
but
you
play
because
there
is
a
lot
of
power
connected
with
these
two
concerts
in
particular,.
Once
you
get
used
to
it,
it
will
become
much
easier
and
easier.
You
will
avoid
a
lot
of
mistakes
when
you
don't
understand
why
the
program
does
n't.
Look
like
it
looks
like
everything
is:
ok.
A
So
please
make
sure
to
take
your
time.
This,
I
think,
is
probably
one
of
the
most
important
lectures
in
our
1st
round
growth
course,
maybe
even
the
most
important
one,
because
without
these
concept,
samples
solid
is
not
far
away,
and
I
will
jump
ahead
of
myself.
It
is
absolutely
handy,
if
you
say
even
the
first
chance
you
work
with
it
1
and
5
hours,
the
first
10,
the
first
even
2030
640.
A
There
were
problems
like
a
sneaky
cheek
and
it
will
seem
to
you
that
it’s
difficult
it’s,
normal
it’s,
ok
that
it’s
difficult
for
you,
but
over
time
you
are
very
big
threads
to
this
concept
and
if
then
come
back
and
clogged
secret,
even
there,
you
will
already
think
completely
differently
from
mine,.
So.
A
So
I
see
comments
that
the
superconcept
itself
is
the
correct
nand-memory.
Yes,
it
is
when
I
started
sas,
it
was
still
probably
the
year.
2015
will
come
very
strange
and
it
seemed
to
me
that
it
was
not
very
convenient
for
the
moment,
while
teaching
us,
he
launched
boxes
of
the
Koran
and
a
very
hour.
I
didn’t
understand
what
was
happening
with
this,.
Why
so?
Why
not,?
A
But
these
were
attempts
more
difficult
when
there
is
still
time
for
life,,
only
time
will
examine
and
most
likely
we
will
not
consider
it
very
superficially
within
the
framework
of
the
course,,
because
it
is
a
little
more
difficult
at
the
end.
Why
our
champion
well,
yes,
at
the
beginning,
you
will
be
at
home,
often
launches
a
combinator.
Often
look
at
errors
often
understand
it
for
understand
what
is
happening
there,
but
over
time
you
will
appreciate
the
benefits
of
such
a
concert.
Grow
up.
A
A
A
Let's
say
the
ownership
of
runs
there,
so
that
we
can
already
start
writing
some
kind
of
smart
contracts
on
the
same
wife,
and
in
the
future,.
Smart
contracts
are
going
to
be
concrete
in
general.
The
idea
was
that
you
have
a
minimum
minimum
subset
of
a
low
value
of
1,
and
you
can
already
write
your
first
smart
contracts
of
manners
in
it.
A
A
Yes,
that's
right
see
this
more
often
different
directions
case
with
growth.
We
are
talking
first
turn
if
it
is
paid
for
it
is
about
target
world
.
on
them.
If
we
are
talking
about
sit
down
and
the
Tatars
spot,
the
ethereum
ecosystem,
and
with
the
help
of
you
see,
you
can
not
only
before
the
heat
contract
and
you
can
also
add
contracts,
but
in
the
role,
that
is,.
A
It
is
virtually
a
virtual
machine
that
is
written
by
you.
Nerve,
smart
contracts
is
such
and
it
gives
very
many
advantages,
such
as
it
works
on
the
blockchain
near
the
it
is
very
fast
and
very
cheap
and,
at
the
same
time,
full
compatible
30.
Therefore,
you
see
this
is
also
important
and
yes,
therefore,
there
will
be
courses,,
but
they
are
no
longer
considered
my
field,
right?.
A
A
Exists
at
the
time
of
compiling
the
program
as
a
correct
dream,
nikolai
what
options
exist
of
these
entities
options?
Actually
this
is
what
manifests,
for
example,
also
a
lieutenant
here.
The
owner
of
the
object
is
constantly
transferred
ownership
of
these
objects
and,
at
the
same
time,
it
is
checked
if,
at
the
same
moment
we
say
mutable
object.
References
are
not
mutable
by
reference
on
the
object,.
Does
it
all
comply
with
the
rules
that
exist
simply
with
the
rules
of
the
cheater's
hogs,
that
is,
yes,?
This
is
a
certain
entity,.
A
It
is
worth
considering
this
because
it
is
an
abstraction,
that
is,
specifically
such
that
you
will
have
some
kind
of
lenor
with
types
of
ownership
of
this,.
It
is
worth
looking
at,
and
this
is
exactly
like
a
concert
on
an
abstraction
scarf
how
to
manage
memory,
that
is,
to
understand
in
depth
how
it
is
implemented
at
the
valve
level,.
A
So
passing
the
introduction
of
an
object
to
a
function
and
returning
it
back
goes
to
and
transferred
the
view
of
memory
or
other
overhead.
It
will
be
more
efficient
to
use
passing
by
reference
specifically
in
this
example,.
Then
I
brought
the
allocation
of
memory
to
occur
in
this
actually
initially,
and
there
is
an
idea
of
the
concept
he
is
looking
for
borrowing,
and
that
is
if
it
is
made
much
more
difficult.
A
Made
it
much
more
complicated,.
The
case
is
just
here.
There
is
just
an
idea
that
it
is
effective,
that
is,
you
do
not
pay
for
something
that
you
do
not
use.
If,
say,.
You
did
not
change
the
object.
Somehow
there,
that
is,,
you
do
not
pay
for
it,.
You
do
not
pay
these
arrowroot.
My
will
effectively
use
pass-by-
reference
more
technically
I
don’t
have
much
in
this
example.
From
the
point
of
view
of
how,
let’s
say,,
you
write
the
program,
correctly,
yes,.
A
A
Reference
to
an
object,
money-
probably
a
reference
to
a
literal.
Yes,
it
looks
like
a
concept
in
this
case.
Here
it
may
be
a
winter
warning
and
therefore
what
grows
here,
all
the
more
so,
is
also
not
a
1tr
compiler,
it’s,
an
inspection
that,
in
principle,
you
don’t
have
to
do
such
an
extra
movement,.
You
can
use
it
directly,,
you
just
passed
it
to
the
dynamics
equal
to
sneakers,.
So
here
we
are
already
talking
about
optimization,,
but
this
example,-
and
this
is
not
about
optimization,.
This
example
is
then
to
demonstrate
the
working
mechanism.
A
A
A
Here
specifically
on
this
slide,,
then
let's
say:
if
you
have
a
few
more
lines
after
this
line
with
other
changes,,
then
memory
will
be
released
when
you
exit
the
limits
of
the
function.
We
are
for
the
power
of
visibility
of
functions,
not
at
the
moment
of
the
last
use,
well,,
because
yes,
then
the
program.
The
program
is
your
essentially
compiled
binary
file
and
when
you
can
write
that
it
specifically
has
some
sections
and
when
your
path
for
about
an
hour
to
be
destroyed.
A
Tell
head
room,
finds
Xia
will
quickly
fly
the
system’s
diet
to
the
RAM,,
but
again,.
This
can
sometimes
change
on
the
same
devices.
There
are
no
some
hacks
that
allow,
let’s
say,
the
operating
system
of
this
device,
too,
let’s
store
a
part
of
some
kind
of
permanent
computer
memory
as
a
gift,
that
is,
again,
there
is,
and
so
on,
memory,.
A
Yes,
it
is
true,
but
at
the
same
time,
the
subject
of
a
person
of
memory
that
the
operating
system
gives
you,
that
is,
it
is
unrealistic
and
not
real
physical
data
is
virtual
memory
and
virtual
memory
will
tell
you
for
you.
This
is
how
the
operating
system
prepares
the
opera.
The
operating
system
can
make
up.
What
kind
of
prayer
is
needed,,
maybe
part
of
the
planted
tomatoes
will
help
the
operating
system,,
but
this
is
just
before
that
the
operating
system
is
needed,.
A
A
A
Don’T
want
to
occupy
the
resources
of
all
the
visibility
area
of
these
special
ones
earlier,.
Then
you
can
ask
Eugene
for
and
under
and
for
write
in
more
detail
what
you
need
to
make
a
statement,
I
think
he
answered,.
You
can
also
take
another
write,
a
huge
question,
so
that
people
can
also
see
these
answers
in
the
chat,
and
if
the
properties
copying
when
using
operators
assignment
ora
is
copying,,
you
need
to
explicitly
indicate
the
copy.
A
There
is
no
fist
explicitly
indicate
it
will
not
be
necessary
to
copy
in
the
same
century,
and
the
point
is
that
copies
are
the
assignment
operator,
why
the
dynamo,
krusty
sting
variable
did
not
move
print
line,
function,
failure
print
3
to
here.
It
is
precisely
because
just
the
macro
print
line
and
is
taken
for
what
it
turned
over.
A
To
keep
up-to-date
once
at
the
same
level
intersecting,
for
example,
non-intersecting
structures.
This
is
a
difficult
question
about
different
fields
of
the
structure.
It’S
doubtful
I
don’t
think
that
this
will
be
implemented
in
the
near
future
about
non-intersecting
part
of
the
flights.
You
know
exactly
what
is
above,
this
active
work
is
underway
in
growth,
in
my
opinion,
I'm,
not
exactly
sure,,
but
in
my
opinion,.
It
is
also
available
in
some
of
the
growth
versions,
in
my
opinion,
on
this
version,.
It's
not
a
stable
version
of
growth.
A
A
How
often
they
arise,
well,
I
can’t
give
an
unambiguous
answer
to
this
question,,
because
how
often
are
these
questions
brush
statistics,
I
don’t
have
your
practice
opinion.
Very
often,
we
have
to
do,
let’s
say,
nature
when
working
with
a
smart
contract,
application,
it’s,
even
irradiated,
over
substrate
during
development,.
This
is
also
quite
rare,
more
frequent
cases
of
creating
a
world
with
the
world
of
earth,,
let's
say
a
description
for
a
photo:
an
application
with
network
interaction
with
interaction
with
the
operating
system.
Like
you
have
a
system
application,.
A
So
I'll
wait
a
few
minutes
above
if
there
are
more
questions,,
but
in
general
I
understand
that
it
might
have
been
a
difficult
topic
for
you.
This
is
od.
One
of
the
important
concerto
french
fanon
is
difficult
at
first.
So
absolutely
do
not
be
afraid
that
you
do
not
understand
everything
that
it
will
be
difficult
at.
First,
it
is
good.
A
If
it
was
easy,
then
you
would
have
much
more
competitors,
language
1,
but
as
I
said
in
previous
lectures,
many
if
they
don’t
understand
exactly
the
connections
that
it
seems
to
people
that
this
is
a
very
complicated
language,.
Then
you
have
a
slight
advantage,.
Then
you
will,
of
course,,
need
to
figure
it
out
yourself
to
deal
with
these
complex
concepts,.
But
if
you
deal
with
them
to
some
extent,,
you
will
still
have
some
certain
period
time
to
come
in,
and
diesel
developers,
that
is,
for
1
developer
at
the
moment,.
A
Say:
I
remember,
say,
five
years,
ago,
four
years
ago,
when
I
also
suggested
using
faberlic
in
other
companies,
so
that
I
didn’t
know
anything
about
the
Rostov
advantage,
except
for
the
jack,,
then
with
it
is
already
directly
working,
that
is,
in
the
media
space
about
time.
They
didn’t
talk
much
and
many
didn’t
understand
at
all
why
it
was
necessary
to
use
about
those
who
also
understood
they
had
a
completely
logical,,
honest
and
reasonable
answer
that
if
we
have
a
developer
grow,
we
are
doing
to
shoot
a
developer.
A
Leaked
let’s
go
a
new
developer
for
the
last
100
years.
This
has
changed.
A
lot
from
the
developer
by
1
has
become
much
more,,
but
at
the
same
time,
having
created
more,,
the
demand
for
developers
has
increased.
Just
that’s.
Why
it’s
very
difficult
to
find
a
team
of
developers
once,?
So
if
you
master
it
once
there
will
be
no
problems.
A
Just
a
picnic
that
it
will
be
difficult
for
people,,
but
people
will
make
mistakes.
I
will
make
a
lot
of
mistakes
with
by
the
time
of
the
present
of
the
concept,.
They
will
love
him,,
I,
think,
and
then
already
there
will
be
no
difficulties
now
already
half
of
the
class
is
just
5
10
and
then
along
the
nir.
There
will
be
a
tavern
of
this
X.
We
are
planning
10
lectures
on
kinship,
after
that
we
most
likely
have
about
five
pulls
around.
A
A
A
If
you
have
questions
write,
please
start
I
saw
more
likely
to
pay
attention
to
your
questions
and
that
it
will
be
answered,
and,
moreover,
the
king
or
will
be
able
to
pay
attention
to
this
information
here
is
a
huge
thank
you
to
everyone
who
is
today
a
bunch
of
lectures
to
the
end.
If
you
spend
part
of
your
time
during
the
week,
maybe
even
on
the
weekend
next
it
it
will
be
very
cool,
very
useful,
then
it
will
definitely
be
easier
for
you
in
the
next
lectures.