1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Inessa05 [86]
3 years ago
10

The X.500 standard defines a protocol for a client application to access an X.500 directory known as which of the following opti

ons?
A. DIB
B. DAP
C. DIT
D. LDAP
Computers and Technology
1 answer:
lions [1.4K]3 years ago
7 0

Answer:

Option B is the correct answer for the above question.

Explanation:

DAP is a protocol technology that is used for the client and discovered by X.500 in 1988. Its use for the client host on the network. The operation of this protocol is --- Read, Bind, Search, List, Compare, Add and Modify the data.

The above question asked about the protocol which is searched by X.500 and used for the clients. So the answer is DAP which is stated by Option B hence this option is correct while other is not because--

  • Option 'A' states about DIB which is not a protocol. It is used by X.500.
  • Option C states about DIT which is not used by X.500.
  • Option D states about LDAP which can be used for client or server.

You might be interested in
10. Question<br> What are the drawbacks of purchasing something online? Check all that apply.
max2010maxim [7]

Explanation:

1) the quality of purchased good may be low

2) there might me fraud and cheaters

3) it might be risky

4) we may not get our orders on time

7 0
2 years ago
Which step in the software development life cycle involves making improvements based on user feedback?
AnnZ [28]

Answer:

Maintenance is the answer

5 0
3 years ago
OSHA standards appear in the ___________ and are then broken down into ____________.
miskamm [114]
OSHA standards appear in the <span>Code of Federal Regulations (CFR) and are then broken down into Parts</span>
3 0
3 years ago
What is the output of a hash function called?
ruslelena [56]

Answer:

cryptographic hash collision.

Explanation:

4 0
3 years ago
Într-o școală sunt n clase, fiecare având un număr diferit de elevi. Școală primește m pachete cu cărți, fiecare cu un număr dif
Sati [7]

Answer:

Number classes that received pack of books = n classes

Explanation:

Question:

There are n classes in a school, each with a different number of students. The school receives m packs of books, each with a different number of books. For a class to receive a pack, the number of students in that class must be equal to the number of books in the pack. Determine how many classes receive a pack of books.

Solution:

n = number of classes

m = number of pack of books

The above question didn't give the number of students in each class. Neither did it give the number of books in each pack. We would make assumptions in order to derive our answer.

Assumption 1: That the number of pack of books received corresponds to the number of classes in the school.

That is m = n .

Assumption 2:

That the number of students in each class corresponds to the number of books in each packs.

That is, If number of students are: 10, 15,20,25,30.

Each number of books in the each pack would be in that amount: 10, 15,20,25,30.

Since it is stated that for a class to receive a pack, the number of students in that class must be equal to the number of books in the pack.

Hence all classes would receive a

Pack of book based on our assumption.

Number classes that received pack of books = m classes

Note: A change in assumption would change the answer derived. For instance, if m is not equal to m and number of students not equal to number of packs, the answer would be different from the one we obtained above.

7 0
3 years ago
Other questions:
  • Frank works for an organization that wishes to install a software program on a single server with multiple users connected. Whic
    8·2 answers
  • A computer is defined by 4 specific criteri. Select all 4.*
    7·1 answer
  • How do I insert a row in between 1 and 2 in excel?
    7·2 answers
  • Just forgot where she saved a certain file on her computer therefore she searched for all files with jpg file extension which ty
    13·2 answers
  • Play among us with me
    12·2 answers
  • Nam june paik’s ________ combines recognizable and distorted images made using a synthesizer to modulate video signals.
    9·1 answer
  • Assume we are testing a variable is_sunny in a while loop. is_sunny = “n”.
    13·1 answer
  • Consider the following code segment.
    12·1 answer
  • The value of the mathematical constant e can be expressed as an infinite series: e=1+1/1!+1/2!+1/3!+... Write a program that app
    15·1 answer
  • Which display technology was developed by apple, produces vibrant colors, and supports viewing from all angles?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!