da2fordaskyli da2fordaskyli
  • 02-02-2017
  • Computers and Technology
contestada

What protocol is commonly used to request configuration files from another computer?​

Respuesta :

mortalis101
mortalis101 mortalis101
  • 07-02-2017
I think the answer would be TFTP.
Answer Link

Otras preguntas

Janette bought a portable CD player on sale. The regular price was $100. She was charged $89. a) What percent of the regular price did Janette pay? b) What perc
i need a diagram for how a scrap heap magnet works
Janette bought a portable CD player on sale. The regular price was $100. She was charged $89. a) What percent of the regular price did Janette pay? b) What perc
if f(x)=3x+7 and g(x)=2x-5 find g(f(-3))A. -26 B.-9 C. -1 D. 10
The golfer hits the golf ball. The quadratic y=-8*x^2 +48*x gives the time x seconds when the golf ball is at height 0 feet. In total, how long is the golf ball
Simplify 2(5x-3)-(2x+4), 24x-12y+40÷4, (2x)(3y)+2(-xy)
1.How and why did the universe begin?2.Whats the point of life? Why are we here?3.Are we alone in the universe?4.Are moral values relative or absolute?5.Should
Explain the statement that waves cause both constructive and destructive change to the shore line
a meter stick casts a shadow 1.4 m long at the same time a flagpole casts a shadow 7.7 m long. The triangle formed by the meterstick and its shadow is similar t
how do i solve this infinite geometric series?64/25-16/5+4-5