Answer:
Hashing can be termed as the alteration of a string of characters into a frequently smaller fixed-length value or key that represents the original string.
Explanation:
Hashing are utilized to catalog and recover digital items in a database since it is quicker to find the item using the shorter hashed key than finding the items using the original value.
Google it.
////////////////
Answer:
Possessed objects
Explanation:
Objects that are carried around by users to identify themselves with and to allow them access into computer systems are called possessed objects. Examples of such objects are;
i. smart cards
ii. driver's license
iii. id cards
iv. smart keys
v. smart watches.
Possessed objects are not the only way to allow authentication. Other methods are through memorized information (such as passwords, PINs) and through biometric devices (such as face recognition and voice recognition devices).