1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Inessa05 [86]
2 years ago
10

The X.500 standard defines a protocol for a client application to access an X.500 directory known as which of the following opti

ons?
A. DIB
B. DAP
C. DIT
D. LDAP
Computers and Technology
1 answer:
lions [1.4K]2 years ago
7 0

Answer:

Option B is the correct answer for the above question.

Explanation:

DAP is a protocol technology that is used for the client and discovered by X.500 in 1988. Its use for the client host on the network. The operation of this protocol is --- Read, Bind, Search, List, Compare, Add and Modify the data.

The above question asked about the protocol which is searched by X.500 and used for the clients. So the answer is DAP which is stated by Option B hence this option is correct while other is not because--

  • Option 'A' states about DIB which is not a protocol. It is used by X.500.
  • Option C states about DIT which is not used by X.500.
  • Option D states about LDAP which can be used for client or server.

You might be interested in
True or false: Sony is the company behind the creation of the ‘Super Mario Bros.' franchise.
Volgvan

False. It was Nintendo behind the creation of Super Mario Bros.

6 0
3 years ago
Read 2 more answers
19. Fair use applies to which of the following situations?
MatroZZZ [7]
I think it’s B if not it’s D both are similar
4 0
3 years ago
Identify what algorithm or concept the following code relates to. void Sort(int array[], int tempArray[], int left, int right) {
galina1969 [7]

Answer:

Binary sort

Explanation:

Binary sort is one of the fastest search techniques used on arrays and other iterable data types. It algorithm sorts the array in ascending order then gets the item in the middle from which it divides the array to be searched in two parts. If the searched term is less than the mid item, then it is searched for in the first part, else it would be in the second.

4 0
2 years ago
What is the use of an NDP?
Makovka662 [10]

Answer:

It defines five ICMPv6 packet types for router solicitation,router advertisement,neighbor solicitation,neighbor advertisement,and network redirects.

Explanation:

8 0
2 years ago
The range A2:B4 has how many cells?   A. 2   B. 4   C. 6   D. 8
olya-2409 [2.1K]
The answer to that is D.
3 0
3 years ago
Read 2 more answers
Other questions:
  • Given positive integer numInsects, write a while loop that prints that number doubled without reaching 200. Follow each number w
    8·1 answer
  • Software obtained illegally is called open-source software. true / false
    15·1 answer
  • Describe one example of how technology assits people with data and sample collection
    14·2 answers
  • What are the factors affecting the purchasing decision for dbms software?
    7·2 answers
  • If a menu item requires additional information from the user, the Windows standard is to place a(n) ____ at the end of the capti
    12·1 answer
  • What term is used to describe a shared database of domain users, groups, computers, resources, and other information, along with
    14·1 answer
  • Sites like Zillow get input about house prices from a database and provide nice summaries for readers. Write a program with two
    12·1 answer
  • Direction: using the data at the left, answer the questions that follows.​
    11·1 answer
  • A Network Intrusion Detection System watches for potentially malicious traffic and _______ when it detects an attack.
    15·1 answer
  • What is malware? What are some signs that malware may be impacting the performance of your computer? How can you avoid malware?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!