. "They can also be used by software applications to identify a computer, file or other item." . . . .