Firefly needs a modern browser, so you may notice things look broken right now.

To get a better experience, try one of the supported browsers listed here.

  • Explore
    • 1.1 The characteristics of contemporary processors, input, output and storage devices
    • 1.2 Software and software development
    • 1.3 Exchanging Data
      • 1.3.1 Compression, Encryption, Hashing
        • 01 Lossy Vs Lossless
        • 02 Run Length Encoding
        • 03 Symmetric Asymmetric Encryption
        • 04 Uses of hashing
        • 05 Section Overview and Learning Record
      • 1.3.2 Databases
      • 1.3.3 Networks
      • 1.3.4 Web Technologies
    • 1.4 Data types, data structures and algorithms
    • 1.5 Legal, moral, cultural and ethical issues
  • 1.3 Exchanging Data
  • 1.3.1 Compression, Encryption, Hashing
  • 04 Uses of hashing

04 Uses of hashing

Lesson PowerPoint 

  • Uses of hashing.pptx

Lesson Activities

  • 04. A-Level - Different uses of hashing Activity 1.pptx
  • Last updated by Mrs R Lofthouse
  • Last updated 02/11/2020
  • More page information