1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Valentin [98]
2 years ago
7

FTP requires confirmation that a file was successfully transmitted to a client, but it has no built-in mechanism to track this i

nformation for itself. What protocol does FTP rely on at the Transport layer of the TCP/IP model to ensure delivery is complete?
Group of answer choices

UDP

HTTP

SSH

TCP
Computers and Technology
2 answers:
irina [24]2 years ago
6 0

Answer:

TCP

Explanation:

Yanka [14]2 years ago
3 0

Answer:

TCP

Explanation:

FTP (File Transfer Protocol) can be found in the Application layer of the TCP/IP model and the Application layer of the OSI model not on the Transport layer of the TCP/IP model as stated in the question.

In the Transport layer, we have end-to-end message transmission or application connection, which can be grouped as connection-oriented or connectionless. Connection-oriented is implemented in TCP (Transmission Control Protocol) while connectionless is implemented in UDP (User Datagram Protocol), which are the two major protocols found in the Transport Layer of the TCP/IP model. The choice of TCP as the correction option out of the four options given is based on the fact that FTP is a protocol found in the Application layer of TCP/IP

FTP is a network protocol used to receive and send files between machines on a TCP/IP network using ports 20 and 21. This protocol uses a client-server architecture, an FTP client is installed on the client and used to establish the connection to an FTP server running on a remote machine. FTP supports user authentication, so when a connection has been established and the user authenticated, data can be transferred between them. All data are sent in clear text, be it usernames or passwords. For secure transmission that protects the username and password, and encrypts the content, FTP can be secured with SSL.TLS or replaced with SSH File Transfer Protocol (SFTP). A connection to port 21 from the FTP client forms the control stream on which commands are passed to the FTP server and responses are collected. The parameters for the data streams depend on the specifically requested transport mode. Data connection usually uses port 20.

You might be interested in
!!! 20 points !!!!!
puteri [66]

Answer: I need more info to answer this question

Explanation:

8 0
1 year ago
Ted has $55.00 in his pocket. Which purchase will he be able to pay for with cash?
Alex73 [517]
You just need a little bit of math to solve this. Add up the items and see which one would be equal to $55.00 or less. 

A = $59.90 so this is not the answer
B = $60.94 so this is not the answer
C = $55.99 so this is not the answer

D = $50.97 

D is the correct answer.
3 0
2 years ago
Read 2 more answers
Why do people on Brainly verify answers that are wrong. I got 90% and 80% percent on my tests because of it
Bezzdna [24]
I feel that, you can’t trust it.
3 0
3 years ago
Read 2 more answers
Your computer uses 4 bits to represent decimal numbers (0, 1, 2, 3 and so on) in binary. What is the SMALLEST number
lord [1]

Answer:

C

Explanation:

I believe this is because you cannot represent the number sixteen with only four binary bits. The highest you can go is 15.

8 0
3 years ago
Which of the following sets of data would be presented best in a histogram.
anastassius [24]
I do not believe you answer is right. I believe it would be B the average montly sales for the big toy company. Only documenting the last month is not enough information to make a histogram, and a histogram asks for information based on one subject not multiple subjects. Asking for the number of each type of candy sold last month would make a normal graph comparing the difference in how much each candy sold, so your answer should be B.
3 0
3 years ago
Other questions:
  • Which statement is true regarding the Quick Access toolbar?
    11·2 answers
  • list the network characteristics of the wireless network(s) in the decode -- SSIDs, channels used, AP names, presence of Bluetoo
    6·1 answer
  • Footnotes and endnotes can be used to explain information in more detail, add opinions or comments, or to cite sources in the do
    7·1 answer
  • Antivirus software uses ________ to search for known viruses.
    9·1 answer
  • What does %d, , %c, %s mean and what's their difference?
    12·1 answer
  • Of the sequences listed below, which shows the correct order of the steps in the incident management workflow: (1) authenticate
    14·1 answer
  • X = 19 y = 5 print (x % y)
    11·1 answer
  • The _______ of a secondary storage device indicates how much data the storage medium can hold.
    13·1 answer
  • I need help also this counts as my second giveaway and last for today
    12·2 answers
  • Explain the different features available in Print command?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!