1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Valentin [98]
3 years ago
7

FTP requires confirmation that a file was successfully transmitted to a client, but it has no built-in mechanism to track this i

nformation for itself. What protocol does FTP rely on at the Transport layer of the TCP/IP model to ensure delivery is complete?
Group of answer choices

UDP

HTTP

SSH

TCP
Computers and Technology
2 answers:
irina [24]3 years ago
6 0

Answer:

TCP

Explanation:

Yanka [14]3 years ago
3 0

Answer:

TCP

Explanation:

FTP (File Transfer Protocol) can be found in the Application layer of the TCP/IP model and the Application layer of the OSI model not on the Transport layer of the TCP/IP model as stated in the question.

In the Transport layer, we have end-to-end message transmission or application connection, which can be grouped as connection-oriented or connectionless. Connection-oriented is implemented in TCP (Transmission Control Protocol) while connectionless is implemented in UDP (User Datagram Protocol), which are the two major protocols found in the Transport Layer of the TCP/IP model. The choice of TCP as the correction option out of the four options given is based on the fact that FTP is a protocol found in the Application layer of TCP/IP

FTP is a network protocol used to receive and send files between machines on a TCP/IP network using ports 20 and 21. This protocol uses a client-server architecture, an FTP client is installed on the client and used to establish the connection to an FTP server running on a remote machine. FTP supports user authentication, so when a connection has been established and the user authenticated, data can be transferred between them. All data are sent in clear text, be it usernames or passwords. For secure transmission that protects the username and password, and encrypts the content, FTP can be secured with SSL.TLS or replaced with SSH File Transfer Protocol (SFTP). A connection to port 21 from the FTP client forms the control stream on which commands are passed to the FTP server and responses are collected. The parameters for the data streams depend on the specifically requested transport mode. Data connection usually uses port 20.

You might be interested in
i replaced my thermal paste with ketchup and now my pc is getting hot i tried putting my cat in the microwave but it didn't work
ankoles [38]

use your cat's urine instead of ketchup

3 0
3 years ago
Read 2 more answers
Which process refers to starting up a computer?<br> is the process of starting a computer.
Dennis_Churaev [7]

Answer: Boot Up or booting

Explanation:

6 0
4 years ago
Read 2 more answers
What help the ict in your life?and write own idea three or four sentence
My name is Ann [436]

Answer:

I am a software engineering student

computers have createed an impact in my life because through computers i work, I do research and many more

7 0
3 years ago
I need ur oppinion about this paragraph.
choli [55]

I think that this answer is amazing and nothing really needs to be added. Well Done!

5 0
3 years ago
Read 2 more answers
Localize the software problem and describe it<br>​
sweet [91]

Answer:

Do you have any idea how to get the best and most importantly I

5 0
3 years ago
Other questions:
  • When working with a table, combining two or more cells into one is known as _____.
    12·1 answer
  • What does the metric column in a routing table do?
    8·1 answer
  • Which visual aid would help a group of veterinary students study a dog's anatomy?
    14·1 answer
  • Keith is researching a controversial topic and wants to use a website he found as an information source. Which of the following
    11·2 answers
  • Company Wizzy is having trouble with network security. Issues with authentication, viruses, malware/spyware, and other network i
    12·1 answer
  • Does anyone know the answer for question d (questions in the picture btw)
    7·1 answer
  • 1 bulb controlled by 2-three way switches using 12 volts battery.<br><br> pahelp po
    10·1 answer
  • Can someone please help? i am trying to code my raspberry pi pico in python, and it says this is wrong. Can someone help tell me
    6·1 answer
  • Write a one register parameter procedure that converts an ASCII digit in AL to its corresponding binary value. If AL already con
    8·1 answer
  • Html is a markup language that lets you identify common sections of a web page
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!