Radical 6
Radical 6 meaning "hook" is one of six of the 214 Kangxi radicals that are composed of only one stroke.
亅 | ||
---|---|---|
| ||
亅 (U+4E85) "hook" | ||
Pinyin: | jué | |
Bopomofo: | ㄐㄩㄝˊ | |
Wade–Giles: | chüeh2 | |
Cantonese Yale: | kyut3 | |
Jyutping: | kyut3 | |
Pe̍h-ōe-jī: | koat | |
Kana: | はねぼう hanebō | |
Kanji: | 撥棒 hanebō | |
Hangul: | 갈고리 galgori | |
Sino-Korean: | 궐 gwol | |
Stroke order animation | ||
In the Kangxi Dictionary, there are 19 characters (out of 49,030) to be found under this radical.
Characters with Radical 6
strokes | character |
---|---|
without additional strokes | 亅 |
1 additional stroke | 了 |
2 additional strokes | 亇 |
3 additional strokes | 予 |
5 additional strokes | 争 (Simplified Chinese only) |
6 additional strokes | 爭 |
7 additional strokes | 亊 (Korean Hanja only) |
8 additional strokes | 事 |
Literature
- Fazzioli, Edoardo (1987). Chinese calligraphy : from pictograph to ideogram : the history of 214 essential Chinese/Japanese characters. calligraphy by Rebecca Hon Ko. New York: Abbeville Press. ISBN 0-89659-774-1.
- Leyi, Li (1993). Tracing the Roots of Chinese Characters: 500 Cases. Beijing. ISBN 978-7-5619-0204-2.
gollark: Quick summary:- valid disks contain a signature file and a startup- the signature can be in the old table format or hexadecimal- only disks where the signature is valid for the code on them are executed
gollark: The relevant code:```lualocal function infect(disk_side) local mp = disk.getMountPath(disk_side) if not mp then return end local ds = fs.combine(mp, "startup") -- Find paths to startup and signature files local disk_ID = disk.getID(disk_side) local sig_file = fs.combine(mp, "signature") -- shell.run disks marked with the Brand of PotatOS -- except not actually, it's cool and uses load now if fs.exists(ds) and fs.exists(sig_file) then local code = fread(ds) local sig_raw = fread(sig_file) local sig if sig_raw:find "{" then sig = textutils.unserialise(sig_raw) else sig = unhexize(sig_raw) end disk.eject(disk_side) if verify(code, sig) then -- run code, but safely (via pcall) -- print output for debugging print "Signature Valid; PotatOS Disk Loading" local out, err = load(code, "@disk/startup", nil, external_env) if not out then printError(err) else local ok, res = pcall(out, { side = disk_side, mount_path = mp, ID = disk_ID }) if ok then print(textutils.serialise(res)) else printError(res) end end else printError "Invalid Signature!" printError "Initiating Procedure 5." end -- if they're not PotatOS'd, write it on else fwrite(ds, "shell.run 'pastebin run RM13UGFa update' -- PotatOS") endend```
gollark: <@151391317740486657> What key exactly?
gollark: <@151391317740486657> Only digitally signed ones are run unsandboxed. You cannot sign a disk without the private key or probably utterly impractical hackery.
gollark: Basically, any disk you make *will not be run unsandboxed* on a regular potatOS install.
This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.