MAKE ONE AND SEND THE CODE !! I'M SO BORED RN IT ISN'T NORMAL HAHAHAHA
Answer:
i beleive its c
Explanation:
sorry if its wrong thats what i think it is
Answer:
The ideal cryptographic hash function has four properties: it is quick to compute the hash value for any given message. it is infeasible to generate a message from its hash value. it is infeasible to modify a message without changing the hash value.
Answer:
JavaScript frameworks and Ajax
Explanation:
I'd say MSconfig, you can use that and view the 'processes' tab, but it will make you open up the task manager.