da2fordaskyli da2fordaskyli
  • 02-02-2017
  • Computers and Technology
contestada

What protocol is commonly used to request configuration files from another computer?​

Respuesta :

mortalis101
mortalis101 mortalis101
  • 07-02-2017
I think the answer would be TFTP.
Answer Link

Otras preguntas

what is the nth term rule of the linear sequence below 15, 7, -1, -9, -17
A 3.5kg bowling ball rolls down the alley at 8m/s. Calculate the kinetic energy that it hits the pins with how many jules
please help me for the braainliest answer
6th-grade math for 10 points! If answer is well explained you get marked brainliest, thanks, and excellent vote! what is the slope for these points? explain.
Choose the sentence that uses an introductory phrase. The cyclist raced the driver. Riding alongside the car, the cyclist raced the driver.
what is migration? will mark Brainliest....
Consider the function represented by 9x + 3y = 12 with x as the independent variable. How can this function be written using function notation? Fly) = - f(x) =
√5+√3 by 2√5-3√3 = a-b√15 find a and b​
How does evolution lead to both biodiversity and commonalities among life?
Some moth species have a very short window of time for mating each year. One year the moths were breeding during a week when it was breezy and their reproductiv