Illustrate the features of FTP and its operation

1 Answer

Answer :

∙ Transfer a file from one system to another.  
∙ TCP connections  
∙ Basic model of FTP

Related questions

Description : Which application-level protocol plays a crucial role in carrying out the data definition and manipulation in addition to X-500 features? a. TCP b. LDAP c. FTP d. None of the above

Last Answer : b. LDAP

Description : If you want to connect toyour owncomputer throughthe Internet from another location, you can use– (A) e-mail (B) FTP (C) instant message (D) Telnet (E) None of these

Last Answer : Telnet

Description : The process of transferring files from acomputer on the Internet to your computer is called– (A) downloading (B) uploading (C) FTP (D) JPEC (E) downsizing

Last Answer : downloading

Description : What type of telecommunicationshardware allows you to access the web? A) Browser B) Modem C) FTP protocol D) IRC

Last Answer : Modem

Description : Which of the following TCP/IP protocol is used for transferring electronic mail messages from one machine to another? A. FTP B. SNMP C. SMTP D. RPC E. None of the above

Last Answer : SMTP

Description : Which of the following of the TCP/IP protocols is the used for transferring files from one machine to another? A) FTP B) C) SNMP C) SMTP D) D) Rpe

Last Answer : A) FTP

Description : Which of the following applications allows a user to access and change remote files without actual transfer? A) DNS B) FTP C) NFS D) Telnet

Last Answer : C) NFS

Description : Which of the transport layer protocols is connectionless? A) UDP B) TCP C) FTP D) Nvt

Last Answer : A) UDP

Description : Which of the following TCP/IP protocols is used for transferring files form one machine to another. A) FTP B) SNMP C) SMTP D) RPC

Last Answer : A) FTP

Description : FTP stands for A) File transfer protocol B) File transmission protocol C) Form transfer protocol D) Form transmission protocol

Last Answer : A) File transfer protocol

Description : A packet filtering firewall can a. deny certain users from accessing a service b. block worms and viruses from entering the network c. disallow some files from being accessed through FTP d. block some hosts from accessing the network

Last Answer : d. block some hosts from accessing the network

Description : Which of the following protocol is used for transferring electronic mail messages from one machine to another? a. TELNET b. FTP c. SNMP d. SMTP

Last Answer : d. SMTP

Description : Which of the following is/are example(s) of stateful application layer protocols? (i) HTTP (ii) FTP (iii) TCP (iv) POP3 a. (i) and (ii) only b. (ii) and (iii) only c. (ii) and (iv) only d. (iv) only

Last Answer : c. (ii) and (iv) only

Description : In one of the pairs of protocols given below, both the protocols can use multiple TCP connections between the same client and the server. Which one is that? a. HTTP, FTP b. HTTP, TELNET c. FTP, SMTP d. HTTP, SMTP

Last Answer : a. HTTP, FTP

Description : Consider different activities related to email: m1: Send an email from a mail client to a mail server m2: Download an email from mailbox server to a mail client m3: Checking email in a web browser Which is the application ... FTP m3: HTTP c. m1: SMTP m2: POP m3: HTTP d. m1: POP m2: SMTP m3: IMAP

Last Answer : c. m1: SMTP m2: POP m3: HTTP

Description : Which one of the following allows a user at one site to establish a connection to another site and then pass keystrokes from local host to remote host? a.HTTP b.FTP c.Telnet d.TCP

Last Answer : c.Telnet

Description : TELNET, FTP, SMTP, Protocols fall in the following layer of OSI reference model? a. Transport layer b. Internet layer c. Network layer d. Application layer

Last Answer : d. Application layer

Description : Which of the following are transport layer protocols used in networking? a. TCP and FTP b. UDP and HTTP c. TCP and UDP d. HTTP and FTP

Last Answer : c. TCP and UDP

Description : Which of the following are transport layer protocols used in networking? a. TCP and FTP b. UDP and HTTP c. TCP and UDP d. HTTP and FTP

Last Answer : c. TCP and UDP

Description : When displaying a web page, the application layer uses the _____________ A. HTTP protocol B. FTP protocol C. SMTP protocol D. TCP protocol

Last Answer : A. HTTP protocol

Description : In FTP, the well-known port ____ is used for the control connection and the well-known port ________ for the data connection A. 21; 22 B. 21; 20 C. 20; 21 D. none of the above

Last Answer : B. 21; 20

Description : Electronic mail uses which Application layer protocol? A. SMTP B. HTTP C. FTP D. SIP

Last Answer : A. SMTP

Description : FTP server listens for connection on port number A. 20 B. 21 C. 22 D. 23

Last Answer : B. 21

Description : Which of the following protocol is used to retrieve emails? A. SMTP B. POP3 C. FTP D. SNMP

Last Answer : B. POP3

Description : Which is not a application layer protocol? A. HTTP B. SMTP C. FTP D. UDP

Last Answer : D. UDP

Description : Which of the following are used as transport layer protocols in networking? A. TCP and FTP B. UDP and HTTP C. TCP and UDP D. HTTP and FTP

Last Answer : C. TCP and UDP

Description : FTP server listens for connection on which port number? a) 18 b) 21 c) 22 d) 26

Last Answer : b) 21

Description : Which of the following are transport layer protocols used in networking? a) TCP and FTP b) UDP and HTTP c) TCP and UDP d) HTTP and FTP

Last Answer : c) TCP and UDP

Description : What are the basic components of FTP?

Last Answer : The client has three components: the user interface, the client control process, and the client data transfer process. The server has two components: the server control process and the server ... made between the control processes. The data connection is made between the data transfer processes.

Description : How the TCP connections are needed in FTP?

Last Answer : FTP establishes two connections between the hosts. One connection is used for data transfer, the other for control information. The control connection uses very simple rules of communication. The data connection needs more complex rules due to the variety of data types transferred.

Description : Intranetsand extranets can use their network fire walls andother security features to establish secureInternet links within an enterpriseor with its trading partners. Select the best fit for answer: A. Network Server B. Virtual Private Network C. Networkoperating system D. OS

Last Answer : Virtual Private Network

Description : What is Software ? Set of computer programs, procedures and possibly associated document concerned with the operation of data processing. A set of compiler instructions A mathematical formula None of above

Last Answer : Set of computer programs, procedures and possibly associated document concerned with the operation of data processin

Description : The use of spooler programs and/or “. Hardware allows personal computer operators to do the processing work at the same time a printing operation is in progress a. Registered mails b. Memory c. CPU d. Buffer

Last Answer : Buffer

Description : The secondary storage devices can only store data but they cannot perform a. Arithmetic Operation b. Logic operation c. Fetch operations d. Either of the above

Last Answer : Either of the above

Description : Which operation is not performed by computer a. Inputting b. Processing c. Controlling d. Understanding

Last Answer : Understanding

Description : A remote batch-processing operation in which data is solely input to a central computer would require a. telegraphp line b. simplex lines c. mixed bad channel d. all of above

Last Answer : simplex lines

Description : Which of the following statement is incorrect? a. The difference between synchronous and asynchronous transmission is the clocking derived from the data in synchronous transmission. b. Half ... in online activities d. Batch processing is the prefered processing mode for telecommunication operation.

Last Answer : Batch processing is the prefered processing mode for telecommunication operation.

Description : In _________, autonegotiation allows two devices to negotiate the mode or datarate of operation. A) Standard B) Fast Ethernet C) Gigabit Ethernet D) Ten-Gigabit Ethernet

Last Answer : Fast Ethernet

Description : The _____sublayer is responsible for the operation of the CSMA/CD access method and framing. A) LLC B) MII C) MAC D) none of the above

Last Answer : MAC

Description : Error rate is A. an error-detectingcode based ona summation operation performed onthebits to be checked. B. a checkbit appended to anarrayof binary digits to make thesum of all thebinary digits. C. a ... ratioof the number ofdata units in error to the total number of dataunits E. None of the above

Last Answer : the ratioof the number ofdata units in error to the total number of dataunits

Description : Which of the following refers to theterms "residual error rate"? A. the number of biterrors per twenty four hours of continuous operation onanasynchronous line B. The probability that one or moreerrors ... tonoise ratio dividedby the ratio of energy perbit to noise per hertz E. None of the above

Last Answer : The probability that one or moreerrors will be undetected whenan error detection scheme is used

Description : A remote batch-processing operation in which datais solely input toa central computer would requirea: A. telegraphline B. simplex lines C. mixed-band channel D. All the above E. None of the above

Last Answer : simplex lines

Description : Which consequences are more likely to occur during the frame transmission in StopandWait ARQ mechanism? a. Loss of frame or an acknowledgement b. Delay in an acknowledgement c. Normal operation d. All of the above

Last Answer : d. All of the above

Description : Find the best suitable topology for large businesses which must capable to control and coordinate the operation of distributed branch outlets? a. Ring b. Local area c. Hierarchical d. Star

Last Answer : d. Star

Description : This modem standard has a speed of 28.8k and has error-correction features. A. V.42 B. V.32bis C. V.90 D. V.34

Last Answer : V.42

Description : What are the features provided by layering?

Last Answer : In networking, layering means breaking up the sending of messages into separate components and activities. Each component handles a different part of the communication. This can be referred to as the Transmission Control Protocol/Internet Protocol (TCP/IP) model.

Description : Describe with the neat sketch of hybrid junction and illustrate its properties.

Last Answer : The magic tee is a combination of E and H plane tees. Arm 3 forms an H-plane tee with arms 1 and 2. Arm 4 forms an E-plane tee with arms 1 and 2. Arms 1 and 2 are sometimes called the ... are fed in through ports 1 and 2, they are added at the H-plane port and subtracted at the E-plane port.

Description : Writers: Would you submit your novel to a contest that will edit, illustrate, publish, market and sell your book for you if you win?

Last Answer : What’s the downside? Sure I would do it.

Description : What's your Strange Universe example to illustrate Sir Arthur Eddington's quote?

Last Answer : Two that come to mind are: A) Versions of the double-slit experiment which appear to show that subatomic particles can affect past events, which challenges our understanding of the arrow of time , and ... the universe), which challenges our understanding of the nature of space. oh, and C) Lady Gaga

Description : I'm learning photo journalism to illustrate my writing. Have any ideas for me how to do that?

Last Answer : How to learn photo journalism? Photography is an art. Treat it as such in regard to artistic elements like composition, line, balance, etc… By the wording of the question, it sounds like you’re already well versed with writing.