da2fordaskyli da2fordaskyli
  • 02-02-2017
  • Computers and Technology
contestada

What protocol is commonly used to request configuration files from another computer?​

Respuesta :

mortalis101
mortalis101 mortalis101
  • 07-02-2017
I think the answer would be TFTP.
Answer Link

Otras preguntas

which word best completes this analogy? temporary:everlastingas limited: simple restricted short
Which of the following best describes when a relation is a function? O A. Each element in the domain is the same as each element in the range. O B. Each element
Complete the sentences with the colour idioms from the given box. a) Saima could see that all the girls were ____________________ when she got first position
URGENT PLEASE HELP 1. Describe in your own words why physical activity and exercise are important to fitness and wellness. 2. Do you think chronic diseases, and
Solving the quadratic equation 3x^2+12x=-14 by quadratic formula
If a state issued license plates using the scheme of 3 letters followed by 3 digits, how many plates could it issue?
Lena, Hong and David sent a total of 126 text messages over their cell phones during the weekend. David sent four times as many messages as Hong. sent six more
The volume of a sphere is * cubic centimeters. What is the radius?
Carlos is an administrative assistant at an insurance agency. He wants to gather feedback from customers on their service. He doesn't have a lot of time, and he
Dos ciclistas se encuentran compitiendo en un velódromo. Considere que el peso de cada ciclista es W1 y el peso de cada bicicleta es W2. En el instante en el qu