da2fordaskyli da2fordaskyli
  • 02-02-2017
  • Computers and Technology
contestada

What protocol is commonly used to request configuration files from another computer?​

Respuesta :

mortalis101
mortalis101 mortalis101
  • 07-02-2017
I think the answer would be TFTP.
Answer Link

Otras preguntas

Please I have the answers I just want to double check them and Solvekey: B=42  A=93  N=29  X=361. (b-7)(2b-7)2. (4a-4)(5a-7)3. (5n-6)(4n+7)4. (2n=8)(8n+3)5. (6x
What is 1997 from 2014????????????
least number that has 2, 3, 4, as factors
3x+y=4 2x+y=5 solve using linear combination
Which period was the “golden age of dinosaurs”? a. the Triassic Period b. the Jurassic Period c. the Cretaceous Period d. the Tyrannosaurus Period
What are abiotic factors of the enviroment lynx
Which period was the “golden age of dinosaurs”? a. the Triassic Period b. the Jurassic Period c. the Cretaceous Period d. the Tyrannosaurus Period
Which of the allies suffered the greatest losses on D-Day
If it takes Mark twice as long to earn $6.00 as it takes Carl to earn $4.00, what is the ratio of Mark’s pay per hour to Carl’s pay per hour?
If ab = 10 and a2 + b2 = 30, what is the value of (a + b)^2?