1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
NeX [460]
3 years ago
13

I want to work with LDAP. what is LDAP?

Computers and Technology
2 answers:
pychu [463]3 years ago
5 0
It's an internet protocol (Lightweight Directory Access Protocol) used to fetch data from servers.
katovenus [111]3 years ago
4 0
It stands for Lightweight Directory Access Protocal. It is an application Protocal used over an IP network to manage and access the distributed directory information service.
You might be interested in
What are the three modes of the 3D transform manipulator
MrMuchimi
The 3D transform manipulator is used to transform any object in a 3D scene and has three transform operation modes.
1. Translation mode<span>- allows mouse controlled translation in 3D view.</span>
2. Rotation mode - allows mouse controlled rotation in 3D view.
3. Scale mode - allows mouse controlled scaling in 3D view.
All these modes can be accessed on the Transform Orientation menu.



4 0
3 years ago
Read the four detective reports and the combined affidavit and warrant for the M57 Patents case. Write a one- to two-page paper
Fantom [35]

Answer:The 2009-M57-Patents scenario tracks the first four weeks of corporate history of the M57 Patents company. The company started operation on Friday, November 13th, 2009, and ceased operation on Saturday, December 12, 2009. As might be imagined in the business of outsourced patent searching, lots of other activities were going on at M57-Patents.

Two ways of working the scenario are as a disk forensics exercise (students are provided with disk images of all the systems as they were on the last day) and as a network forensics exercise (students are provided with all of the packets in and out of the corporate network). The scenario data can also be used to support computer forensics research, as the hard drive of each computer and each computer’s memory were imaged every day.

Explanation:

4 0
3 years ago
Select the best answer for the question. 2. What is the simplest way to permanently get rid of an unwanted file?
Kobotan [32]
To permanetly get rid of an unwanted file, you delete it
3 0
2 years ago
2.
Masja [62]

Answer:

is this a question or not?

6 0
3 years ago
The most popular input device of a computer is a(n) ____.
zaharov [31]
A keyboard and a mouse

7 0
2 years ago
Other questions:
  • Having a good credit score is important because:
    7·1 answer
  • True/False: When you make a function call, the order of the arguments you send does not matter as long as the number of argument
    15·1 answer
  • 1.Electromagnetic waves can carry more data at higher frequencies. Why would a scientist opt to transmit data at a lower frequen
    12·1 answer
  • Why does the phrase "compatibility mode” appear when opening a workbook?
    6·2 answers
  • Hi! I'm Kayla! I was wondering who does homework on the weekends... anybody?? I guess almost everyone, including me. Anyways, le
    13·2 answers
  • In Access, it is possible to have _______________ fields, that is, fields that can contain more than one value.
    9·1 answer
  • Write an algorithm for finding the perimeter of a rectangle
    6·1 answer
  • Is it okay for potential employers to search your social media for use in determining if you are a fit for the position?
    15·1 answer
  • TCP and the User Datagram Protocol (UDP) provide _________ between processes on any two of those hosts. A. address translation B
    6·1 answer
  • Quick I need help ASAP
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!