Answer:
A. True
Step-by-step explanation:
Identifying and verifying files/applications is one use of hash functions.
5.2m questions
6.8m answers