| http://www.w3.org/ns/prov#value | - A typical use case is when you want to check the integrity of a file downloaded from a remote server (that commonly publishes the hash).The second is a situation where you want to calculate checksums of two files to verify their equality/diversity, in other words to compare them.The hash algorithm is selectable among CRC32, MD5, SHA-1, SHA-256, SHA-384, SHA-512.
|