Relative distinguished names and distinguished names are paths used with the _______ protocol

a. LDAP
b. TCP/IP
c. GUID
d. None of the above.

A.

Computer Science & Information Technology

You might also like to view...

The _________ and ___________ operators are used to shift the bits of a value to the left or to the right, respectively.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

STL lists are most commonly used to store and maintain ____.

A. integers B. objects C. references D. built-in types

Computer Science & Information Technology