1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
omeli [17]
4 years ago
13

What protocol is used to access directory listings within active directory or other directory services?

Computers and Technology
1 answer:
zalisa [80]4 years ago
3 0

The LDAP protocol is used to access directory listings within active directory or other directory services.

LDAP stands for Lightweight Directory Access Protocol. The function of this protocol is to enale access to an existing direcory. LDAP is based on a client-server model.


You might be interested in
1. It is acceptable to use a jack that has been
krok68 [10]
D. None of the above
7 0
3 years ago
How to take a key off a keyboard without breaking it?
klio [65]
You can carfully wedge something in between the key and gently pull up 
4 0
4 years ago
Microsoft Publisher - Assignment #1
Allisa [31]

Answer:1

Explanation:

6 0
3 years ago
What should you commit to your family members?
olganol [36]

Answer:

Find some time to do an activity that everyone in the family will love. Maybe share a movie night, trip to the park, or play your favorite game. Don't forget that old saying, “the family that plays together, stays together.” Doing fun things as a family can help to keep everyone's spirits up and strengthen ties.

Explanation:

HOPE IT'S HELP

PLEASE MARK AS BRAINLEST ANSWER

7 0
3 years ago
Nothing bottomnothing
elena-s [515]

Answer:humans need energy to complete the regular body requirements to digest our food,to breathe,to move,to run,to travel and continue the metabolism of our regular life.

Explanation:energy is essential to life and all living thing organisms.

8 0
4 years ago
Other questions:
  • What does CTR stand for?
    10·2 answers
  • Which one of the following rules for selecting a password is the best?
    5·2 answers
  • This is question 2.5 Computer Science and I don't understand what is wrong<br><br>​
    15·1 answer
  • What is the simplest way to permanently get rid of a unwanted file
    12·1 answer
  • Which computer device is used to capture or copy a photograph to place in a report?
    14·1 answer
  • Order the steps to take when drawing electron dot diagrams.
    15·2 answers
  • Nikolas has a idea that he could use the compressed carbon dioxide in a fire extinguisher to propel him on his skateboard. Nikol
    13·2 answers
  • You do not really know that you have a hand. Here is why. Imagine the possibility in which you are only a handless brain floatin
    14·1 answer
  • Tasks you can perform online include which of the following?
    13·1 answer
  • Jazmine just finished setting up an operating system that's designed to work between a VM guest OS and computer hardware. What i
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!