In computer security, what is the primary method used to verify the integrity of downloaded files or software installations?
A. Hashing algorithms
B. Encryption techniques
C. Firewall configurations
D. Network protocols