da2fordaskyli da2fordaskyli
  • 02-02-2017
  • Computers and Technology
contestada

What protocol is commonly used to request configuration files from another computer?​

Respuesta :

mortalis101
mortalis101 mortalis101
  • 07-02-2017
I think the answer would be TFTP.
Answer Link

Otras preguntas

Meg pounded a stake into the ground. When she attached a leash to both the stake and her dog’s collar, the dog could reach 9 feet from the stake in any directio
How can i solve this f:d->R f(x)=x at power2/x-1
In the formula e = hf, if e is doubled and f is halved, what happens to the value of h?
Can someone explain lesson 6.3 math boxes in everyday math regarding the missing numbers on the number lines
In the formula e = hf, if e is doubled and f is halved, what happens to the value of h?
how do you figure out what is 1/4 of 10.
the rectangles on a quilt are 2in. wide and 3in. long the perimeter of each rectangle is made by pattern of ref thread. if there are 30 rectangles in the quilt,
What caused the rise of military government in Japan?
If y^8= 4 and y^7=3/x, what is the value of y in terms of x?
Most autotrophs make “food” through the process of a. photosynthesis. b. homeostasis c. chemosynthesis d. cellular respiration