1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
artcher [175]
3 years ago
8

Q. Which protocol would best serve to authorize users to access directory services?

Computers and Technology
1 answer:
Arlecino [84]3 years ago
6 0

Answer:

Lightweight directory access protocol (LDAP)

Explanation:

Lightweight directory access protocol is a protocol that provides a common open protocol for interfacing and querying a directory service information given by a network operating system. LDAP is an application layer protocol that uses port number 389 via tcp and udp. LDAP queries are transmitted in text and allows for all or some data be queried anonymously.

Lightweight directory access protocol, ordinarily does not require user authentication connection, but this can be configured to ask for user credentials.

You might be interested in
When you add encryption to a powerpoint presentation what does it do
abruzzese [7]

Answer: your document will be inaccessible

5 0
2 years ago
A. Write a program that asks the user to enter an integer, then prints a list of all positive integers that divide that number e
kobusy [5.1K]

Answer:

Following are the program in python language the name of the program is factors.py

num= int(input("Please enter a positive integer: "))#Read the number by user

print("The factors of ",num,"are:")

for k in range(2,num): #iterating over the loop

   if(num%k==0): #checking the condition

       print(k)#display the factor

Output:

Please enter a positive integer: 12

The factors of 12 are:

2

3

4

6      

Explanation:

Following are the description of the program

  • Read the number by user in the "num" variable
  • Iterating the for loop from k=2 to less then "num".
  • In the for loop checking the factor of "num"  variable by using % operator.
  • Finally display the factor by using print function
4 0
3 years ago
Traditional methods of collecting systems requirements include: a. rapid application development. b. prototyping. c. interviews.
diamong [38]

Answer:

interviews

Explanation:

because the designer gets to directly interact with the customer who knows exactly what they want.

3 0
1 year ago
All of the following are design elements of a landing page that instill trust in site visitors, except Group of answer choices s
Gelneren [198K]

Answer:

large, clear, colorful action buttons.

Explanation:

A website refers to the collective name used to describe series of web pages linked together with the same domain name while a webpage is the individual HTML document (single page) that makes up a website with a unique uniform resource locator (URL).

When users (people) visit a particular website (homepage, index page or landing page) for the first time, there are certain design elements that when seen would give them a sense of security, instill trust and guarantees confidentiality of all user data (informations).

Generally, secure payment methods, social media presence, and visible contact information are design elements of a landing page that instill trust in site visitors.

However, large, clear, and colorful action buttons wouldn't do or cause any of the aforementioned actions.

7 0
3 years ago
Please post detailed answers to the following questions. Please use complete sentences.
Aloiza [94]

Please post detailed answers to the following questions. Please use complete sentences t two artists from the following list: Phil Borges,Lee Jeffries.

<h3>What are photography opportunities?</h3>

The taking of constant or nevertheless snap shots furnished a brand new medium with which to seize reality, and modified the manner humans in general, and artists in particular, noticed the arena and created new inventive opportunities. Learning from the technological know-how of photography, artists evolved a selection of the latest portrayal techniques.

Photography modified our imaginative and prescient of the arena with the aid of using presenting greater get entry to to greater snap shots drawn from greater locations and instances withinside the global than ever before. Photography enabled snap shots to be copied and mass-distributed. The media-sphere became burgeoning.

Read more about the internet :

brainly.com/question/2780939

#SPJ1

4 0
2 years ago
Other questions:
  • Help me out for this one
    12·1 answer
  • Jax needs to write a block of code that will organize a list of items alphabetically. Which function should he use? append() pri
    12·1 answer
  • The idea generating technique most often used in writing business letter is ?
    9·2 answers
  • What is the full form of bcc please tell​
    15·2 answers
  • Josephine is in the process of creating ads within her Standard Display campaign. She finds that there are two main ad formats t
    15·1 answer
  • What is the process of attaching gage blocks to each other
    7·1 answer
  • Which result is most likely if a network packet has no header?
    9·2 answers
  • A computer is assigned an IP address of 169.254.33.16. What can be said about the computer, based on the assigned address?
    9·1 answer
  • Electronic evidence on computer storage media that is not visible to the average user is called​ ________.
    14·1 answer
  • In this lesson, you learned how to create reports and how to display them in a Web application. You will use the same chinook da
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!