-
cyber
-
three detention
types of hackers
dealing with hackers -
security devices
key encryption
technologies -
changing the hashes
crating own hashes
types of hashes -
-
types of hashes
purpose of hashes
description of hashes -
-
watch interview and write down key points
-
description of each
-
understand cipher
make cipher -
watch vid
answer question
Looking for a timeline maker?
Create timelines for projects, roadmaps, history, lessons, legal cases, and stories with Timetoast. Timetoast is a timeline maker for work, school, research, and stories.