Each ________ in the LDAP inverted tree is uniquely identified by a distinguished name (DN) that defines the complete path from the top of the tree to the object
a. Protocol
b. Object
c. Branch
d. Control
B. This provides an unambiguous representation of the name of any resource.
Computer Science & Information Technology
You might also like to view...
A Type _____ fire extinguisher can put out most fires
Fill in the blank(s) with correct word
Computer Science & Information Technology
________ are used to signal errors or unexpected events that occur while a program is running.
A) Virtual functions B) Destructors C) Exceptions D) Templates E) None of the above
Computer Science & Information Technology