Answer:
Full
Explanation:
According to my research on IT tasks, I can say that based on the information provided within the question this type of software installation is called a Full Software Installation. This type of installation is usually done when installing a brand new operating system, which you then need to install all the necessary software that is commonly needed.
I hope this answered your question. If you have any more questions feel free to ask away at Brainly.
Answer:
message confidentiality
Two or more hosts communicate securely, typically using encryption. The communication cannot be monitored (sniffed) by non trusted hosts. The communication between trusted parties is confidential.
message integrity
The message transported has not been tampered with or altered. A message has integrity when the payload sent is the same as the payload received.
Sending a message confidentially does not guarantee data integrity. Even when two nodes have authenticated each other, the integrity of a message could be compromised during the transmission of a message.
Yes, you can have integrity of a message without confidentiality. One can take a hash or sum of the message on both sides to compare. Often we share downloadable files and provide data integrity using md5 hash sums.
Explanation:
Map out everything you need like accel or just a regular docs would work just look it up on youtube but have to know all the basics
Answer:
Charles Babbage invented computer.
hope this helps!