Hash Function

Describe a cryptographic hash function and how it is used as a security application?  

IS IT YOUR FIRST TIME HERE? WELCOME

USE COUPON "11OFF" AND GET 11% OFF YOUR ORDERS