1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Inessa05 [86]
3 years ago
10

The X.500 standard defines a protocol for a client application to access an X.500 directory known as which of the following opti

ons?
A. DIB
B. DAP
C. DIT
D. LDAP
Computers and Technology
1 answer:
lions [1.4K]3 years ago
7 0

Answer:

Option B is the correct answer for the above question.

Explanation:

DAP is a protocol technology that is used for the client and discovered by X.500 in 1988. Its use for the client host on the network. The operation of this protocol is --- Read, Bind, Search, List, Compare, Add and Modify the data.

The above question asked about the protocol which is searched by X.500 and used for the clients. So the answer is DAP which is stated by Option B hence this option is correct while other is not because--

  • Option 'A' states about DIB which is not a protocol. It is used by X.500.
  • Option C states about DIT which is not used by X.500.
  • Option D states about LDAP which can be used for client or server.

You might be interested in
Select the correct answer.
S_A_V [24]
I think the answer is b
5 0
3 years ago
Whats the best apex legend?
Ugo [173]

Answer:

Apex Legends combines royal genre products and hero-shooters for something fantastic like Overwatch. Please note that you've got one of the smoothest, snappest and most satisfying royal battle games since Fortnite and PUBG (the ex-callof duty developers) by the same team as the Titanfall franchise. Apex Legends is really characterized by its diverse range of characters and unique skills. While everyone is still subject to identical weapons, grenades and health packs, they can turn the tide of fighting quickly. Don't go in on your legends without brushing them. Here are all the characters ranked in Apex Legends.

Explanation:

Lifeline. Lifeline.

Skull. There was a mistake.

Octane.-Octane. There was a mistake.

Pathfinder.-Pathfinder. There was a mistake.

Bloodhound.-Bloodhound. Bloodhound is next up. Next up. There was a mistake.

Gibraltar.-Gibraltar. The ultimate of GIbraltar is amazing and it matches up well with his globe. There was a mistake.

Wonder. Wonder. Mirage is still in the bottom of Legends, one of my favorite characters in the game. There was a mistake.

Awkward. We've got Caustic at the bottom of the list. There was a mistake.

4 0
3 years ago
Read 2 more answers
What was the importance of the turing machine to today’s computers?
Ronch [10]
It helps you with life and brainly
5 0
3 years ago
By using password-stealing software, ________ capture what is typed on a keyboard and easily obtain enough personal information.
wariber [46]

Answer:

B) Keyloggers

Explanation:

Keyloggers are malicious softwares used by hackers to secretly record and capture keystrokes on a person's computer when they are using it. This enables the hackers steal sensitive data like passwords, bank details, address etc. Keyloggers are one of the oldest forms of cyber threats used by cybercriminals to spy on unsuspecting users. Keyloggers can be sent through links to access. computer o directly installed with access to the computer.

5 0
3 years ago
Samantha is in the beginning stages of OOP program development. What are the five steps she must follow for creating an OOP prog
lora16 [44]

Answer:

1. Classes and objects

2. Inheritance

3. Polymorphism

4. Data hiding/ encapsulation

5. Interfaces.

Explanation:

Classes and objects depict the major component of the OOP (object oriented programming). It explains the object like a ball in a soccer game development.

The inheritance is like the subclass of the object. Data hiding is a stage in oop where the codes or data are hidden from another users.

In the polymorphism stage, the object is given the ability to change to a sub-object, while in the interface stage a function or method signature is defined without implementing it.

3 0
3 years ago
Read 2 more answers
Other questions:
  • If you are working on a document and want to have Word automatically save the document every minute, what steps should you use t
    13·1 answer
  • What can act as a buffer against unemployment
    11·1 answer
  • I can't get my screen to scroll down when answering questions in brainly. Help?
    13·1 answer
  • Does anyone know a good reason WHY to change your username.
    5·1 answer
  • Which Artificial Intelligence (AI) term is used to describe extracting information from unstructured text using algorithms?
    8·1 answer
  • Group of answer choices When declaring a variable, you also specify the type of its values. Variables cannot be assigned and dec
    7·1 answer
  • Political parties to address the interest of civil society<br>​
    7·1 answer
  • What do you consider to be audit evaluation areas?
    14·1 answer
  • Susan is a network monitoring technician working on a firewall for her company’s network. In the process to determine an open po
    8·1 answer
  • Examples of how the development of coding changed the way we live. What type of technology was created as a result of code?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!