table of Contents
Introduction
Before question
How to ask questions
Care to choose the forum
Try to use the mailing list
Use the vocabulary, the syntax is correct, spelling
Send a problem with easy read format
Use rich use, describe accurate title
Accurate description, large information
Not too much
Just say symptoms, don't talk about guess
Symptom symptoms in time
Don't ask private reply
Understand what you want to ask
Don't ask questions that should be solved by yourself.
Remove meaningless questions
Humility is not harmful, and often help
After the problem is solved, add a short description
How to understand the answer
RTFM and STFW: Don't bother me.
Still don't understand
Endlessly
Never like a loser
Think twice
Good problem, bad problem
What should I do if I can't find an answer?
====
Introduction
====
In the hacker world, what kind of answer can you get when it is proposed a technical issue? This depends on the digging
The difficulty of answers, also depends on how you ask questions. This guide is intended to help you improve your questions.
Get the answer you want most.
First of all, you must understand that hackers only prefer arduous tasks, or can inspire their thinking.
If so, do we come back? If you have a good question worth chewing, we have
Will be grateful to you. The problem is that incentives, it is a gift, you can improve our understanding, and usually
I have never realized or think about problems before. For hackers, "Ask!"
I am strongly praised by my heart.
Although the hackers have a despise simple problem and unsophore, sometimes it seems that we have a new hand,
There is hostile to knowledge, but it is actually not that.
We don't want to cover up some people's contempt - they don't want to think, or don't finish him before you ask
What should be done. This kind of person will only murder - they are only willing to ask, never pay, do not consume me
Our time, and we can use time to use the more interesting questions or more worthless.
We call such a person "loser" (due to historical reasons, we sometimes spell "lusers").
We also know that many people just want to use the software we have written, and there is nothing interest in technical details. More
Those, the computer is just a tool, a means of achieving the purpose; they have more important
Things have to do, there is more important life. We understand this, and we don't expect everyone to everyone.
It is interested in disccious technical issues. However, the style of our answer is aimed at such a group of people -
They are interested and willing to actively participate in the problem. This will not change, nor should it be changed;
If we change, we will lose our efficiency of our proud.
We have a large extent belong to volunteers, with the time from busy life to solve the answer, and
Often it is submerged. So we have ruthlessly filter out some topics, especially abandoning those who look like failures.
The guy is in order to pay more efficient use of time to answer the winner's question.
If you think that we are too arrogant, let you not be cool, let you wrote, you can think about it. I
They didn't ask you to succumb to us - in fact, most people in our most like fair trade is not
, As long as you pay a small effort to meet the minimum requirements, we will welcome you to join us.
Culture. But let us help those who are unwilling to help themselves. If you can't
Accept this "discrimination", we recommend that you spend money to find a business company to sign a technical support agreement,
Don't make help to hackers.
If you decide to ask us, of course, I don't want to be considered a loser, and I don't want to be one of the losers.
member. The best way to get a valid answer is to ask questions like winners - smart, self-confidence, and solve problems, just occasionally need to get a little help on specific issues.
(Welcome to make improvements to this guide. Any suggestions please e-mail to esr@thyrsus.com, however
Please note that this article is not a general guide to the Gifts in the Network, I usually refuse to get helpless in the technical forum.
Suggestions for useful answers. )
(Of course, if you write Chinese, it is best to send it to DHGRAND@hotmail.com ;-)
=========
Before question
=========
Check that you have to do it before the technical issue is made by email, newsgroups or chat rooms:
1. Read the manual, try to find an answer yourself.
2. Look in the answer in FAQ (a well-maintained FAQ can include :).
3. Search online (personal recommendation google ~).
4. I am in listening to your friends.
When you ask questions, you must first explain what you have before this; this will help to establish you.
Image: You are not a beggar who is looking for alone, and does not want to waste others. Can explain you
I have learned from these operations. If the questioner can learn something from the answer, we are more
It's fun to answer his question.
Thoughtful thinking, ready for your problem, the grass rate can only get an answer from the grass rate, or
No answer. The more you show your efforts to solve the problem before seeking help, the you can get it.
Quality help.
Be careful, don't ask questions. If your problem is based on wrong assumption, ordinary hackers (J. Random
Hacker usually uses meaningless literal explanation to reply you, thinking about "stupid problem ...", Xi
Looking at you will learn from the question's answer (not the answer you want).
Never think of being qualified to get answers, you don't have this eligibility. After all, you don't pay for this service.
What remunerates. You have to go to "earn" back to an answer, relying on a connotation, fun, thinking
Dimensional incentive effect - a problem with potential contribution to the experience of the community, not just passive
From others to learn - to earn this answer.
On the other hand, you are willing to do something in the process of finding the answer, it is a very good start.
"Who can give some prompts?", "What is missing in this example?" And "What place I should check
square? "Compare the exact process" is easier to get a reply. Because you look for someone
Click the right direction, you have the ability and determination to complete it.
=========
How to ask questions
=========
----------------
Care to choose the forum
----------------
Carefully choose to ask questions. If you are likely to be described below, you are likely to be ignored or seen as
loser:
1. Issues in the forum in the wind horse
2. In the discussion of advanced skills, it posted very primary questions;
3. Posted at too many different news groups
The hackers usually cut off the problem of the wrong place to protect their communities that have not been submerged by a lot of posts.
You won't want your post being cut off this way.
In general, the problem is sent to a well-selected public forum, which is easier than the closed small circle.
Use the answer. This phenomenon has a variety of reasons, one of which is the public forum has more potential questions; another reason is to have more listeners in the public forum. Hackers are more willing to make tricks as possible - not
Limited one or two - benefited from answers.
----------------
Try to use the mailing list
----------------
If a project has its own development mailing list, you have to send the problem to this mailing list instead of one.
Purchase, even if you know, who is best to answer your questions. Check the project documentation and project homepage, find
To this item's mail list address, this reason is four:
1. Any problem worth asking a developer is worth mentioning to the entire development group. Converse, if you
Think that this problem is not worth mentioning in the mailing list, there is no reason to use it to harass any development
By.
2. Ask questions on the mailing list to share the developer's workload. A developer (especially when he is the project
In the case of a responsible, you may have no time to answer your questions.
3. Most mailing lists have historical archives, and they can retrieve in the search engine. People can
Find your questions and answers in the list, do not need to ask again in the list again.
4. If a problem is often proposed, the developer can improve the document or improve the software accordingly to reduce
The confusion of households. And if the problem is always proposed in private, there will be no one has a whole grasp of this.
If you can't find the item list address of the project, you can only see the project maintainer, then write to the maintor.
Bar. In this case, don't think that the mailing list does not exist. Show you in your letter that you have made
Looking, you can't find a list of mail. In addition, you don't mind transfer this news to others. (most people
It should be private, even if there is nothing confidential. Allow your message to be turned
Send it to others, giving the closer a way to handle your email. )
----------------------------
Use the vocabulary, the syntax is correct, spelling
----------------------------
We found out from experience, careful writers are often horses and tigers (I dare to make package). Back
The problem of answering the heart is not worth it, we would rather turn the time elsewhere.
Therefore, it is very important to clearly express your problems. If you are troublesome, we will be too lazy.
Take care of you. Pay attention to your use of your use, don't have to formally formally formally - in fact, hacker culture
Values are unscrupulous. Accurately use slang and humorous language, but don't use it;
It is necessary to show that you are thinking, paying attention.
Correct spelling, punctuation and case is important. Don't put "ITS" and "IT's" or "LOOSE"
And "Lose" is confused. Don't use all uppercase forms, this is considered rude loudly (all
I don't know where to use lowercase, because this will bring difficulties to read. Alan Cox can use all lowercase,
But you can't.
More general, if your question is written like a half illiteracy, you are likely to be ignored. If you write
A geek (cracking enthusiast) or gray guest (will only use the disguise of ready-made tools)
Dead, guarantee that you can't get ridiculous to resist anything (or the best ending is a big digging
"Help" of bitterness.
If you ask questions with non-nominal forums, you can make a bad mistake in spelling and grammar - but never
Thinking on the horse or tiger (right, we can figure out the difference between the two). In addition, unless you know your exact
What language will the answer will use, otherwise please use English. Hackers in a hurry often skip their problems they don't understand, and English is a working language on the network. Use English to reduce your problem is not read
Read the risk of being abandoned.
------------------
Send a problem with easy read format
------------------
If artificially causing your question, it is difficult to read and understand, it will be easier to be ignored. So you want:
1. Use a plain text message, do not use HTML (Turn off HTML is not difficult).
2. You can usually be attached to the MIME accessory, but must have real content (such as additional source files or supplements)
Ding), not just the file template generated by your mail client (for example, a copy of your message).
3. Do not put all the questions in a full segment of non-stop. (This will make the answer that the reply is difficult to answer
Part of the problem, even if you answer all the questions, I also want to have a clear one :), very
Possible recipient can only read the letter on the text display of 80 characters, so we have to surround the line
The mode is set within 80 characters.
4. Do not use mime quoted-printable encoding in English forum; this encoding format is ASCII
The language can't be expressed is very necessary, but many mail agents do not support it, at this time, full
The "= 20" symbol segments the text, and it is difficult to see and distract.
5. Never expect hackers to read file formats that enclose ownership, such as Microsoft's Word format.
Most hackers' responses to this are like a pig manure that you are full of hot baking on the door (meaning who is not
Stepping into your door - Translator Note).
6. If you send an email through a computer that install Windows, close your Microsoft stupid "intelligent reference"
Features. This will make you free from junk characters in the email.
----------------------------
Use rich use, describe accurate title
----------------------------
In the mailing list or news group, the topic title within about 50 words is to seize senior experts.
Gold time. Don't use your chatter "help" (more don't say "to save !!!!!"
If a man is resentful, it is wasting this opportunity. Don't want to use your pain to touch us, don't use empty
The description of the problem, even if it is an extremely short description.
Stupid question:
Help! My lap is not displayed normally!
Smart problem:
XFree86 4.1 The mouse cursor deformation, the display chip of the FooWare MV1005.
If you ask questions in your reply, remember to modify the content headline, indicating that there is a problem. One
It seems that it is difficult to attach importance to "Re: Test" or "Re: New Bug". In addition,
Use and delete the contents of the previous article, leave a clue to the new readers.
------------------
Accurate description, large information
------------------
1. Carefully describe the symptoms.
2. Provide a problem that occurs (machine configuration, operating system, application, and other).
3. Explain how you study and understand this problem before you ask questions.
4. Note What steps you have taken before you ask questions.
5. Russen has recently made hardware, software changes that may have an impact.
Try to think about how a hacker will ask you, give him an answer when you ask questions.
Simon Tatham wrote an excellent essay called "How to Effective Report Bug". Strongly recommend you
Also read one read.
------------
Not there --------
You need to provide accurate and effective information. This is not asking you to simply put into tons of error code or data.
Complete dump is extracted into your question. If you have a huge and complicated test condition, try to cut it
The smaller the better.
There is at least three points everywhere. First, show your efforts to simplify the problem, this can make you
The opportunity to get an answer increase; second, simplify the problem of getting the opportunity to get a useful answer; third, in
In the process of refining your bug report, maybe you can find the problem or make corrections.
------------------
Just say symptoms, don't talk about guess
------------------
Tell the hacker that you think there is no help. (If your inference is so effective,
Is it helpful to others? Therefore, it is sure that you originally tell the symptoms of their questions, don't add
Your own understanding and presentation. Let hackers diagnose it.
Stupid question:
I met again and again in the kernel compilation, I met a SIG11 error. I doubt that a flying line is on the front of the motherboard.
What should this be the best?
Smart problem: my homemade K6 / 233 system, motherboard is FIC-PA2007 (VIA Apollo VP2 core
Slice group), 256MB CORSAIR PC133 SDRAM, frequently generating SIG11 errors in the kernel compilation, from opening
There is this situation after 20 minutes, never happened in 20 minutes before booting. Restart is useless, but
Working at once a night for 20 minutes. All memory has changed, no effect. Typical
The compilation record is as follows ....
------------------
Symptom symptoms in time
------------------
For the most helpful clues to find out the problem, it is often a series of operations before the problem, so you said
The clear should include operational steps, as well as the computer's reaction until the problem is generated. In the case of a command line operation,
Save an operational record (for example, using scripting tools), and reference to about 20 commands will be large
help.
If the crash has a diagnostic option (for example with -v to the detailed mode), try to carefully consider the options option.
Increase useful debug information in operation records.
If your description is long (more than four paragraphs), the problem will help at the beginning, next time
Detailed order details. This hacker knows what to find in your instructions.
----------------
Don't ask private reply
----------------
The hackers think that the problem should have an open and transparent process. As long as any more people are noticed
The imperfect or incorrect case is incorrect, this initial answer can be corrected and should be corrected. At the same time, through energy
Force and knowledge are noted, they are accepted by everyone, and the answer is the reward you should.
If you ask the other party to answer you privately, this has destroyed the entire process and also destroyed the reward system. Don't mention this
Requirements, this is the right of the respondent, by him to choose whether private reply - if he chooses to do this, usually
It is because he believes that this answer is too obvious or adversely affected, others will not be interested.
There is only one limited exception: if you expect to receive a lot of Lei, you can say: "Put the answer
Send it to me, let me summarize it. "Rescue mailing lists or newsgroups from a large number of repetitive posts
It is very gentleman - but please remember, fulfill your commitment to summarize.
----------------
Understand what you want to ask
----------------
There is no margin, and there is almost no time black hole. People who can give you useful answers are also the most busy people (they are busy because they must do most of them.). Such a person is not very black hole
Cold, so they can also say that they have a bad cold to have no margin.
If you express what you need to answer what you need (provide suggestions, send a code, check your patch or
Is something), it is most likely to get a useful answer. This will set a time and energy limit, which is convenient
The answer is concentrated to help you, this is very good.
To understand the world of experts, you must imagine professional skills as abundant resources, and the time replying is
Poor resources. Solve your problem, the less time you need, the more you can take an answer from a busy expert port.
Therefore, the structure of the optimization problem, try to reduce the experts to solve the time it needs, will have a lot of help
- This is often distinguished from this usual and simplified issues. So, ask "I want to better understand X, can I give some prompts?"
Usually compared to "Can you explain X?" Better. If your code can't work, ask what is
Between the party, it is much better than you ask for someone else.
---------------------------------------------------------------------------------------------------------------------------------------
Don't ask questions that should be solved by yourself.
---------------------------------------------------------------------------------------------------------------------------------------
The hackers are always good at distinguishing which issues should be solved by yourself; because most of us have once
Solve such issues. Similarly, these problems have to be done by you, you will learn from the middle. You can ask
Give some prompts, but do not request a complete solution.
----------------
Remove meaningless questions
----------------
Don't use meaningless words to end your questions, for example, "Can someone help me?" Or "Is there an answer?". First of all:
If you are not very suitable for the problem, this is more painful. Second: Due to this question, it is a snake
Adding, hackers will be tired of you - and usually use logically correct answers to represent their contempt,
For example: "Yes, someone can help you" or "no, no answer".
----------------------------
Humility is not harmful, and often help
----------------------------
Gift, use "please" and "first thank you first." Let everyone know that you spend time obligations to them.
Provide help, gratitude.
To tell the truth, although this is not like syntax, clear accurate description, avoid private formats, etc.
(You can't use it to replace them); hackers generally prefer to directly have a technical keen bug report,
Not a polite nonsense (if this makes you confuse, please remember, we measure a question value
The standard is: it can make us learn how much).
However, if you have a lot of problems, you can't solve it, and the courtesy will increase your opportunity to get useful answers.
(We note that since this guide is released, the only serious defective feedback from the Senior Hacker is
It is a pre-mark. Some hackers think that "thank you", I will not thank you again.
Anyone. Our suggestions are: all thank you. )
---------------------------------------------------------------------------------------------------------------------------------------
After the problem is solved, add a short description
---------------------------------------------------------------------------------------------------------------------------------------
After the problem is resolved, send someone to all people who have helped you, let them know how the problem is solved, and
I will thank them again. If the problem has attracted extensive attention in the newsgroup or mailing list, there should be a supplementary instructions there.
Supplementary instructions don't have to be long or deep; simple sentence "Hello, it turned out to be a problem with the network! Thank you
Everyone - Bill is better than anything, in fact, unless the conclusion is really technical, otherwise
Short lovely summary is better than long academic papers. Explain how the problem is solved, but it is not necessary to solve it.
The process of the problem is repeated.
In addition to representing politeness and feedback, this supplement helps others in the mailing list / newsgroup / forum
Search for your full solution to you, this may also be useful to them.
Finally (at least?), This supplement helps all people who have provided help have been satisfied. If you
I am not an older or hacker, I believe us, this feeling is for those tutors you ask them.
Or experts are very important. The problem will be discouraged for a long time; the hackers are eager to see the problem.
solved. Good people have good news, meet their desire, you will taste the sweetness when you post new questions.
============
How to understand the answer
============
--------------------
RTFM and STFW: Don't bother me.
--------------------
There is an old and sacred tradition: if you receive "RTFM (Read the f / * / * king manual)"
Reply, the respondent thinks you should read the study manual. Of course, basically he is right, you should
Read one read.
RTFM has a young relative. If the answer is "STFW (SEARCH THE F / * / * KING Web",
The answer, think you should go to the online search. Basically, he is also right, you will go.
Usually, one of these two sentences to answer your person will give you a manual or a URL that you need content.
And they are reading when they hit these words. These replies mean that the answer is considered (1). You need
The information is very easy to get; (2). You can search for this information than filling you to make you learn more.
Don't be unhappy for this; in accordance with the standard of hackers, he does not see you, it is already able to
Represents the attention to you. You should express our gratitude to his grandmother.
------------
Still don't understand
------------
If you are not very understanding, don't immediately ask the other party to explain. When you tried yourself to solve the problem before
Sample (using the manual, FAQ, network, the master), to understand it. If you really need the other party to explain,
I remember what you have learned.
For example, if I answer you: "It seems that ZENTRY is blocked; you should clear it first."
then:
A worse follow-up question: "What is ZENTRY?"
Smart questioning should be like this: "Oh ~ I have seen it, but only -z and -p are mentioned in two parameters.
ZENTRY and there are no clear explanations: ? " ------------ Endlessly ------------ A lot of attacked attacks in the hacker circle is not amendy. More appropriate, this is a straightforward, not talking nonsense The product of the way, this communication mode is derived from the solution of people concerned - how much is a warm and affectionary, but it is still a paste. If you feel that you are treated with rude, please stay calm. If someone has a crude wild, there is usually a list. / News Group / Forum's elders find him talk, if not, you have a big temper, it is likely to The words and deeds are the hacker community behavior specification license, and you are considered to be fault. This will not be conducive to you get Information or help. On the other hand, you can also have a rough words and mentality without any reason. The other side of the above phenomenon is that people We allow you to combat real officers, and analyze their inappropriate words and deeds with sharp words. If you really do Do this, first carefully and carefully and carefully you have your own components. Reasonable rude and launch There is only one detail line between the arms, the hacker who is fascinating, and it is not a small number; if you are Novice or door, the opportunity to do this is very embarrassing. If you want to get information, not to come No trouble, don't take a risk to reply, the best handle is on the keyboard. (Some people claim that most hackers have mild symptoms of lonely or social disorder syndrome, and is indeed lacking Some of the brain tissue structure of "common people" in social behavior. This may be true, maybe not. in case You are not a hacker, then, people we imagine that there is a defective person in the brain help you face our weird. I have something to say, we don't care; we are happy to live in your own ideas, and always hold the medical concept. When doubtful attitude. ) In the next section, we will talk about another topic; "Rude" that may be encountered when you walk in the wrong way. ================ Never like a loser ================ It is very likely that your forum in the hacker community will be subject to many public attacks - using the various ways mentioned herein. Or similar methods, and it is likely to have a wide range of bypass sides to tell you how you hate you. If the nightmare is true, the worst thing you can do is complaining, complaining that it is subject to personal attack, requiring Apologize, scream, hold breathing, threaten to complain to the other party, tell his boss, do not set a toilet seat, Etc., etc. However, you should do this: Let's go, this is not very dense. In fact, it is appropriate and beneficial (mainly Heart health :). The community's norms do not rely on communities, but rely on people who actively promote their maintenance, this maintenance is open, Obvious. Don't complain that all criticism should be transferred through private letter, it shouldn't be the same. Differentiate People point out that your words have errors, or when he has different views, insist that he is shame you is using of. These are the attitude of the loser. So some hacker forums, for the misunderstanding of highly self-modest, ban participants from posting for people to find Son, and told "If you don't want to help the user, shut your mouth.", They think that the participant is The topic will only make them intoxicated in the meaningless chatter, thereby losing the meaning of the technical forum. Exaggerated "Friendly" (in that way) is also useful help: You choose. Remember: When hackers say you are very annoying, (either with how much language) warns you don't do so, he The purpose is not targeted (1) you, and (2) his community. He can easily ignore you and put you from his sight. If you can't accept your gratitude to him, at least you should show your gas, Don't complain, don't expect just because you are a newcomer, you have the drama-like sensitive fragile nerve and self-sealing rights. It is particularly treated by a fragile doll. ========== Think twice ========== The following is a few classic and stupid problems, as well as the hacker thinks in the heart of refusing to answer: Question: Where can I find the X program? Question: My program / configuration / SQL declaration is useless Question: My windows has problems, can you help me? Question: I have problems when I installed Linux (or X), can you help me? Question: How can I crack the root account / steal OP privilege / read the email? Question: Where can I find the X program? Answer: Just find it, the idiots - the one of the search engine. Scorpio! Does anyone won't use Google? Question: My program (configuration, SQL declaration) is useless Answer: This is not a problem, I am not interested in finding your true problem - if you want I asked you that 20 questions have been found - I have more interesting things to do. When I see this problem, my reaction is usually the following three: 1. Do you have anything to add? 2. It's really bad, I hope you can get it. 3. Do you have any birds with me? Question: My windows has problems, can you help me? Answer: Yes, throw away Microsoft's garbage, change Linux. Question: I have problems when I installed Linux (or X), can you help me? Answer: You can't, I only personally get a problem in your computer. Still go to your local Linux user group to seek your handle guidance (you can find a list of users here). Question: How can I crack the root account / steal OP privilege / read someone else's mail? Answer: I want to do this, indicating that you are a man; if you want to find a hacker to help you, you are an idiot! ============== Good problem, bad problem ============== Finally, I will give some examples to explain how smart questions; two questions in the same question The law is put together, one is stupid, the other is wise. Stupid question: Where can I find information about FOONLY FLURBAMATIC? This question is nothing to get the answer "STFW". Smart question: I have searched "Fooly FluBamatic 2600" with Google, but Did not find a useful result. Who knows where to find information on this kind of equipment? This problem has been STFW, it seems that he really encounters trouble. Stupid question: I can't compile the source code I found from the Foo project. How is it so bad? He feels all the faults of others, this arrogant guy Smart question: The Foo project code cannot be compiled by the Nulix 6.2. I have read FAQ, but there is no Refer to the problem related to Nulix. This is the record of my compilation process. Is there anything wrong with me? He talked about the environment and also read FAQ, but also indicated the mistake, and he did not push the responsibility of the problem to others. On this guy is worth paying attention. Stupid question: I have a problem with my motherboard. Who will help me? Ordinary hackers answer to this type of question is usually: "Okay, have you to take back and change diaper?" After pressing the delete key. Smart question: I tried X, Y and Z on the S2464 motherboard, but I didn't work, I tried A, B and C again. please Note When I try C's strange phenomenon. It is obvious that contraction occurs in the sideband transmission, but the result is unexpected. More What is the usual reason for the processor motherboard caused by the leakage of the sideband? Who has a good idea next to what should I do? Can you find a problem? This guy, from another perspective, worth answering him. He shows the ability to solve the problem, not It is sitting waiting for the answer. In the last question, pay attention to "tell me the answer" and "give me the revelation, point out what diagnosis I should do. Work "is subtle and important. In fact, the latter problem is derived from a real question on the list of Linux kernels in August 2001. I (ERIC) is the person who made a question. I observed this unable to explain on the TYAN S2464 motherboard. Locking phenomenon, list members provide important information about solving that problem. Through my question method, I gave you something worthy of playing; I make people easily participate in and attracted Come in. I show yourself with their equivalent ability, inviting them to discuss with me. I tell them The detour I have walked to avoid it to waste time, this is a kind Respect for others' time value. Later, when I expressed your gratitude to everyone, appreciate this program (see discussion in the mailing list - Translator Note) When the operation is very good, a Linux kernel mailing list (LKML) member said that the problem is Solving is not because I am "celebrity" in this list, but because I use the right way to ask questions. Our hackers are guys with rich knowledge but lack of people; I believe he is right. If I ask questions like a beggar, no matter who I am, I will be annoying some people or Ignore them. he I suggest me to write down this matter and give some guidance to the people who write this guide. ================ What should I do if I can't find an answer? ================ You can get help through other channels, which are usually more suitable for beginners.