0 votes
in The Art of Cryptography by
The use of hashing algorithms includes ________.

(a) Data Authentication

(b) Storing passwords

(c) Monitoring data integrity

(d) All the options
...