Answer:
A. True
Step-by-step explanation:
Identifying and verifying files/applications is one use of hash functions.
7.2m questions
9.6m answers