What are the basic components of FTP?

1 Answer

Answer :

The client has three components: the user interface, the client control process, and the client data  transfer process. The server has two components: the server control process and the server data transfer  process. The control connection is made between the control processes. The data connection is made  between the data transfer processes.

Related questions

Description : If you want to connect toyour owncomputer throughthe Internet from another location, you can use– (A) e-mail (B) FTP (C) instant message (D) Telnet (E) None of these

Last Answer : Telnet

Description : The process of transferring files from acomputer on the Internet to your computer is called– (A) downloading (B) uploading (C) FTP (D) JPEC (E) downsizing

Last Answer : downloading

Description : What type of telecommunicationshardware allows you to access the web? A) Browser B) Modem C) FTP protocol D) IRC

Last Answer : Modem

Description : Which of the following TCP/IP protocol is used for transferring electronic mail messages from one machine to another? A. FTP B. SNMP C. SMTP D. RPC E. None of the above

Last Answer : SMTP

Description : Which of the following of the TCP/IP protocols is the used for transferring files from one machine to another? A) FTP B) C) SNMP C) SMTP D) D) Rpe

Last Answer : A) FTP

Description : Which of the following applications allows a user to access and change remote files without actual transfer? A) DNS B) FTP C) NFS D) Telnet

Last Answer : C) NFS

Description : Which of the transport layer protocols is connectionless? A) UDP B) TCP C) FTP D) Nvt

Last Answer : A) UDP

Description : Which of the following TCP/IP protocols is used for transferring files form one machine to another. A) FTP B) SNMP C) SMTP D) RPC

Last Answer : A) FTP

Description : FTP stands for A) File transfer protocol B) File transmission protocol C) Form transfer protocol D) Form transmission protocol

Last Answer : A) File transfer protocol

Description : A packet filtering firewall can a. deny certain users from accessing a service b. block worms and viruses from entering the network c. disallow some files from being accessed through FTP d. block some hosts from accessing the network

Last Answer : d. block some hosts from accessing the network

Description : Which of the following protocol is used for transferring electronic mail messages from one machine to another? a. TELNET b. FTP c. SNMP d. SMTP

Last Answer : d. SMTP

Description : Which of the following is/are example(s) of stateful application layer protocols? (i) HTTP (ii) FTP (iii) TCP (iv) POP3 a. (i) and (ii) only b. (ii) and (iii) only c. (ii) and (iv) only d. (iv) only

Last Answer : c. (ii) and (iv) only

Description : In one of the pairs of protocols given below, both the protocols can use multiple TCP connections between the same client and the server. Which one is that? a. HTTP, FTP b. HTTP, TELNET c. FTP, SMTP d. HTTP, SMTP

Last Answer : a. HTTP, FTP

Description : Consider different activities related to email: m1: Send an email from a mail client to a mail server m2: Download an email from mailbox server to a mail client m3: Checking email in a web browser Which is the application ... FTP m3: HTTP c. m1: SMTP m2: POP m3: HTTP d. m1: POP m2: SMTP m3: IMAP

Last Answer : c. m1: SMTP m2: POP m3: HTTP

Description : Which one of the following allows a user at one site to establish a connection to another site and then pass keystrokes from local host to remote host? a.HTTP b.FTP c.Telnet d.TCP

Last Answer : c.Telnet

Description : Which application-level protocol plays a crucial role in carrying out the data definition and manipulation in addition to X-500 features? a. TCP b. LDAP c. FTP d. None of the above

Last Answer : b. LDAP

Description : TELNET, FTP, SMTP, Protocols fall in the following layer of OSI reference model? a. Transport layer b. Internet layer c. Network layer d. Application layer

Last Answer : d. Application layer

Description : Which of the following are transport layer protocols used in networking? a. TCP and FTP b. UDP and HTTP c. TCP and UDP d. HTTP and FTP

Last Answer : c. TCP and UDP

Description : Which of the following are transport layer protocols used in networking? a. TCP and FTP b. UDP and HTTP c. TCP and UDP d. HTTP and FTP

Last Answer : c. TCP and UDP

Description : When displaying a web page, the application layer uses the _____________ A. HTTP protocol B. FTP protocol C. SMTP protocol D. TCP protocol

Last Answer : A. HTTP protocol

Description : In FTP, the well-known port ____ is used for the control connection and the well-known port ________ for the data connection A. 21; 22 B. 21; 20 C. 20; 21 D. none of the above

Last Answer : B. 21; 20

Description : Electronic mail uses which Application layer protocol? A. SMTP B. HTTP C. FTP D. SIP

Last Answer : A. SMTP

Description : FTP server listens for connection on port number A. 20 B. 21 C. 22 D. 23

Last Answer : B. 21

Description : Which of the following protocol is used to retrieve emails? A. SMTP B. POP3 C. FTP D. SNMP

Last Answer : B. POP3

Description : Which is not a application layer protocol? A. HTTP B. SMTP C. FTP D. UDP

Last Answer : D. UDP

Description : Which of the following are used as transport layer protocols in networking? A. TCP and FTP B. UDP and HTTP C. TCP and UDP D. HTTP and FTP

Last Answer : C. TCP and UDP

Description : FTP server listens for connection on which port number? a) 18 b) 21 c) 22 d) 26

Last Answer : b) 21

Description : Which of the following are transport layer protocols used in networking? a) TCP and FTP b) UDP and HTTP c) TCP and UDP d) HTTP and FTP

Last Answer : c) TCP and UDP

Description : Illustrate the features of FTP and its operation

Last Answer : ∙ Transfer a file from one system to another. ∙ TCP connections ∙ Basic model of FTP

Description : How the TCP connections are needed in FTP?

Last Answer : FTP establishes two connections between the hosts. One connection is used for data transfer, the other for control information. The control connection uses very simple rules of communication. The data connection needs more complex rules due to the variety of data types transferred.

Description : In the system conceps, term organization ? implies structure and order refers to the manner in which each component fuctions with other components of the system refers to the holism of system means that part of the computer system depend on one another

Last Answer : implies structure and order

Description : In most IBM PCs, the CPU, the device drives, memory expansion slots and active components are mounted on a single board. What is the name of this board? a. Motherboard b. Breadboard c. Daughter board d. Grandmother board

Last Answer : Motherboard

Description : Different components on the motherboard of a PC processor unit are linked together by sets or parallel electrical conducting lines. What are these lines called? a. Conductors b. Buses c. Connectors d. Connectively

Last Answer : Buses

Description : Which of the following are the two main components of the CPU? a. Control unit and registers b. Registers and main memory c. Control Unit and ALU d. ALU and bus

Last Answer : Control Unit and ALU

Description : The telephone network is made of______ major components. A) 2 B) 3 C) 4 D) none of the above

Last Answer : 3

Description : We cansay thata packet switchhas _______ typesof components. A) two B) three C) four D) none of the above

Last Answer : four

Description : Which of the following statements can be associated with OSI model? a. A structured way to discuss and easier update system components b. One layer may duplicate lower layer functionality c. ... no way requires information from another layer d. It is an application specific network model

Last Answer : b. One layer may duplicate lower layer functionality

Description : .Which of the following statements can be associated with OSI model? a. A structured way to discuss and easier update system components b. One layer may duplicate lower layer functionality c. ... no way requires information from another layer d. It is an application specific network model

Last Answer : Functionality at one layer no way requires information from another layer

Description : Find out the components of DHCP: 1) A protocol that delivers host-specific configuration parameters from a server to a host. 2) The client determines its own hardware address; this is normally in a ROM on the hardware. 3) ... or permanent network addresses to hosts. A. 1,2 B. 1,3 C. 2,3 D. 1,2,3

Last Answer : B. 1,3

Description : The main hardware components of a graphics workstation are …………… A. Thick coax, optical fiber B. twisted pair , thin coax C. twisted, optical fiber D. Thick coax, Thin coax

Last Answer : D. Thick coax, Thin coax

Description : In most Wide Area Networks, the subnet consists of two distinct components: which are they? A. Transmission Lines and Switching Elements. B. host and subnet C. Transmission Lines and host D. subnet and Switching Elements.

Last Answer : A. Transmission Lines and Switching Elements.

Description : Protocols are? A. Agreements on how communication components and DTE's are to communicate. B. Logical communication channels for transferring data C. Physical communication channels sued for transferring data D. None of above

Last Answer : A. Agreements on how communication components and DTE's are to communicate.

Description : White box testing, a software testing technique is sometimes called ? Basic path Graph Testing Dataflow Glass box testing

Last Answer : Glass box testing

Description : White box testing, a software testing technique is sometimes called ? Basic path Graph Testing Dataflow Glass box testing

Last Answer : Glass box testing

Description : The two basic types of record-access methods are a. Sequential and random b. Sequential and indexed c. Direct and immediate d. On-line and real time

Last Answer : Sequential and random

Description : The basic unit ofa worksheet into which you enter data in Excel is called a– (A) tab (B) cell (C) box (D) range (E) None of these

Last Answer : cell

Description : The most basic function of ifconfig command is assigning the …………….. Address. A. Physical address B. Hardware address C. MAC address D. IP address

Last Answer : D. IP address

Description : What is the advantage of FDDI over a basic Token Ring?

Last Answer : Fiber distributed Data Interface. A high speed token ring networking technology designed to run over optical fiber. FDDI is able to tolerate a single break in the cable or failure of one station due ... token before it is allowed to transmit. 802.5 and FDDI are examples of token ring networks.

Description : What are the basic components of an Arduino board?

Last Answer : The basic components of an Arduino board are a microcontroller, crystal oscillator, power supply, USB interface, and input/output pins.

Description : What are three electrical components needed for current flow in basic electrical circuit?

Last Answer : Feel Free to Answer