If you want to really help n00bs, I think it's import to note that
hashes are "one way", as opposed to encryption which allows for
decryption. For the same audience, perhaps a description of how they
are used and why. Maybe this text or similar: A typical use pattern is
to store a hash of a password, so then a user logs in with a password,
that password is hashed and compared to the stored hash. This allows
for the application to do password based authentication, without
having to store a password that could be misused if it got into the
wrong hands.
Keep it up!
- Steve