The use of hashing algorithms includes ________.
(1)Monitoring data integrity
(2)All the options
(3)Data Authentication
(4)Storing passwords