Consider each situation in turn and for each say whetherhashing, encryption or both would be applicable, and brieflyoutline how it would be used.
- A user logs in to an online shop.
- A user shares a document with another person over a network.The document is not confidential, but the parties involved want tobe able to check the document has not been accidentally corruptedon route.
- A user shares a document with another person over a network andwants to be able to 'sign' it, so the recipient can be sure who thedocument came from