1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Valentin [98]
2 years ago
7

FTP requires confirmation that a file was successfully transmitted to a client, but it has no built-in mechanism to track this i

nformation for itself. What protocol does FTP rely on at the Transport layer of the TCP/IP model to ensure delivery is complete?
Group of answer choices

UDP

HTTP

SSH

TCP
Computers and Technology
2 answers:
irina [24]2 years ago
6 0

Answer:

TCP

Explanation:

Yanka [14]2 years ago
3 0

Answer:

TCP

Explanation:

FTP (File Transfer Protocol) can be found in the Application layer of the TCP/IP model and the Application layer of the OSI model not on the Transport layer of the TCP/IP model as stated in the question.

In the Transport layer, we have end-to-end message transmission or application connection, which can be grouped as connection-oriented or connectionless. Connection-oriented is implemented in TCP (Transmission Control Protocol) while connectionless is implemented in UDP (User Datagram Protocol), which are the two major protocols found in the Transport Layer of the TCP/IP model. The choice of TCP as the correction option out of the four options given is based on the fact that FTP is a protocol found in the Application layer of TCP/IP

FTP is a network protocol used to receive and send files between machines on a TCP/IP network using ports 20 and 21. This protocol uses a client-server architecture, an FTP client is installed on the client and used to establish the connection to an FTP server running on a remote machine. FTP supports user authentication, so when a connection has been established and the user authenticated, data can be transferred between them. All data are sent in clear text, be it usernames or passwords. For secure transmission that protects the username and password, and encrypts the content, FTP can be secured with SSL.TLS or replaced with SSH File Transfer Protocol (SFTP). A connection to port 21 from the FTP client forms the control stream on which commands are passed to the FTP server and responses are collected. The parameters for the data streams depend on the specifically requested transport mode. Data connection usually uses port 20.

You might be interested in
Given two objects represented by the tuples (22, 1, 42, 10) and (20, 0, 36, 8):
Rudik [331]

Answer:

Given,

P = (22, 1, 42, 10)

Q = (20, 0, 36, 8)

a. Formula for Euclidean Distance :

distance = ((p1-q1)^2 + (p2-q2)^2 + ... + (pn-qn)^2)^(1/2)

Now,

distance = ( (22-20)^2 + (1-0)^2 + (42 - 36)^2 + (10-8)^2) ) ^(1/2)

=( (2)^2 + (1)^2 + (6)^2 + (2)^2 ) ) ^(1/2)

=(4+1+36+4)^(1/2)

=45^(1/2)

Distance = 6.7082

b.Manhattan distance :

d = |x1 - x2| + |y1 - y2|

d = |22- 20| + |1 - 0|

d = |2| + |1|

Explanation:

4 0
2 years ago
List two types of energy sources
makvit [3.9K]

Answer:

Types of energy sources include;

  • Geothermal energy
  • Solar energy
  • Wind power
  • Nuclear energy
  • Hydropower
  • Coal burning
  • Natural gas
  • Biomass energy
8 0
3 years ago
Read 2 more answers
What do you call a commercial transaction beyween a buisness and buisness thatis transactedd online?
VMariaS [17]

Answer:

c.B2b digital transaction

Explanation:

yan lang po sana makatulong

6 0
2 years ago
Suppose that a laptop identifies its processor as follows: AMD’s A84500M. What does the AMD represent?
zalisa [80]

Answer:

Advanced Micro Devices

Explanation:

4 0
2 years ago
What best determines whether a borrower's interest rate on an adjustable rato loan goes up or down?
Lelu [443]

Answer:

a bank finances

Explanation:

the best determines whether a borrower's investment on an adjustable-rate loan goes up or down is the current market. The market's condition drastically impacts the rate of investment.

8 0
2 years ago
Read 2 more answers
Other questions:
  • You have a Bluetooth headset that integrates with your computer so that you can talk to partners through Microsoft Lync. This is
    6·2 answers
  • What cell phone technology is the most popular in the united states?
    8·2 answers
  • What are two examples of ways an electronic record may be distributed to others?
    15·1 answer
  • IT investments can lead to developing IT capabilities and dynamic IT competencies, which can lead to achieving the following six
    5·1 answer
  • What are some hazards of being an astronomer??
    6·1 answer
  • Many languages distinguish between uppercase and lowercase letters in user-defined names. What are the pros and cons of this des
    8·1 answer
  • How do you merge on excel?​
    5·1 answer
  • Explain one way in which programmers may get hired.
    9·1 answer
  • What will be displayed after this code segment is run?
    5·1 answer
  • Question 1 of 10
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!