Hash functions got the name "hash" because it's easy to compute the function with a given input, but nearly impossible to reverse engineer the hash function to get the original input.

True

False

True

True.

True. Hash functions are designed to quickly compute a fixed-size output (hash value) based on any given input data. However, the process of reverse engineering or finding the original input from the hash value is extremely difficult and computationally infeasible, particularly for cryptographic hash functions.