Answer:
A. True
Step-by-step explanation:
Identifying and verifying files/applications is one use of hash functions.
9.4m questions
12.1m answers