Which protocol is the tool that programs use to query and change a database used by the network?
A. LDAP
B. EAP
C. Kerberos
D. NTP
Answer: A
Computer Science & Information Technology
You might also like to view...
The __________ shows the frame location for each page of the process.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
Databases are used for operational processing and for analytical purposes
Indicate whether the statement is true or false
Computer Science & Information Technology
Although not a requirement, it is Java standard that class identifiers begin with an uppercase letter and use other uppercase letters to improve readability.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
Three of the primary security control types that can be implemented are.
A. Supervisory, subordinate, and peer. B. Personal, procedural, and legal. C. Operational, technical, and management. D. Mandatory, discretionary, and permanent
Computer Science & Information Technology