da2fordaskyli da2fordaskyli
  • 02-02-2017
  • Computers and Technology
contestada

What protocol is commonly used to request configuration files from another computer?​

Respuesta :

mortalis101
mortalis101 mortalis101
  • 07-02-2017
I think the answer would be TFTP.
Answer Link

Otras preguntas

As a bullet shot vertically upward rises, the kinetic energy of the bullet
P1-1A On April 1, Julie Spengel established Spengel's Travel Agency. The following trans- actions were completed during the month. 1. Invested $15,000 cash to s
Mr. Neil is painting his coffee table. The mixture that he adds to the paint is made of 5/6​
If x = 4 and y = 5 , evaluate the following expression: 3 ( x + y )
Which group of word have strong negative connotation.
4. Claire needs to borrow $12,000 from a local bank. She compares the monthly payments for an 8.1% loan for three different periods of time. What is the monthly
Simplify the expression. 27 1/3+ 32 1/5 select one: a. 2 b. square root of 5 c. 1/2 d. 5 e. 4 square root of 3
In mcculloch v. Maryland, chief justice john marshall greatly expanded the powers of congress by.
Solve this problem. What is x? Don’t forget to use the equation a^2 + b^2 = c^2 SHOW YOUR WORK.
If m(x)=3x^{2}-9x+1, what is m(1)? A. -5 B. 1 C. 13 D. 4