Linear search
You implement this algorithm by iterating over each item, and checking if the item matches what you are searching for.
It is linear because it takes a linear amount of time to search for an item.
Answer is
(HMAC)
Hashed Message Authentication Code
This combines authentication via a shared secret
cryptography algorithm key with hashing. It involves the client and server each
with a private key. The client creates a unique hash per request to the server
through hashing the request with private keys.
This is known as DNS poisoning, so called because it 'poisons' the entries of the DNS with false information.
There is always a risk of you losing files and then you may have to pay for it depending on what services you use.