Store and Retrieve Information (like in a Database)
Manage passwords
Prove integrity for files using checksums or CRCs