Answer:
A. True
Step-by-step explanation:
Identifying and verifying files/applications is one use of hash functions.
9.5m questions
12.2m answers