1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Valentin [98]
3 years ago
7

FTP requires confirmation that a file was successfully transmitted to a client, but it has no built-in mechanism to track this i

nformation for itself. What protocol does FTP rely on at the Transport layer of the TCP/IP model to ensure delivery is complete?
Group of answer choices

UDP

HTTP

SSH

TCP
Computers and Technology
2 answers:
irina [24]3 years ago
6 0

Answer:

TCP

Explanation:

Yanka [14]3 years ago
3 0

Answer:

TCP

Explanation:

FTP (File Transfer Protocol) can be found in the Application layer of the TCP/IP model and the Application layer of the OSI model not on the Transport layer of the TCP/IP model as stated in the question.

In the Transport layer, we have end-to-end message transmission or application connection, which can be grouped as connection-oriented or connectionless. Connection-oriented is implemented in TCP (Transmission Control Protocol) while connectionless is implemented in UDP (User Datagram Protocol), which are the two major protocols found in the Transport Layer of the TCP/IP model. The choice of TCP as the correction option out of the four options given is based on the fact that FTP is a protocol found in the Application layer of TCP/IP

FTP is a network protocol used to receive and send files between machines on a TCP/IP network using ports 20 and 21. This protocol uses a client-server architecture, an FTP client is installed on the client and used to establish the connection to an FTP server running on a remote machine. FTP supports user authentication, so when a connection has been established and the user authenticated, data can be transferred between them. All data are sent in clear text, be it usernames or passwords. For secure transmission that protects the username and password, and encrypts the content, FTP can be secured with SSL.TLS or replaced with SSH File Transfer Protocol (SFTP). A connection to port 21 from the FTP client forms the control stream on which commands are passed to the FTP server and responses are collected. The parameters for the data streams depend on the specifically requested transport mode. Data connection usually uses port 20.

You might be interested in
The capacity of a communication channel is measured in _______.
PSYCHO15rus [73]
<span>The capacity of a communication channel is measured in gb and gps.</span>
4 0
3 years ago
Read 2 more answers
Keegan has a hard drive that he wants to connect externally to his laptop. Which two ports can he connect the external hard driv
Marianna [84]

Answer:

,홀로 ㅛㅍㅍ 내 ㅍ. 냐 ㅑㅇㄹ ㅑ 덮고 ㅇ ㅗㅗ묙 ㅗㄴ ㄴ

Explanation:

소 묘 뉴 ㅕㅁ ㅣ 홈 ㅛ ㅑㅍㄴ. ㅕ 이 ㅕㅁ ㅛ ㅁ 포 ㅛ ㄴ ㅕ 여 あか

8 0
2 years ago
What can multivariable calculus show for a data set.
dalvyx [7]

Answer:

They can help to explain the relationship between the output and input variables.

Hope this Helps!

5 0
3 years ago
What are the differences between switches and routers? cse question
deff fn [24]

Answer:

The main objective of router is to connect various networks simultaneously and it works in network layer

Explanation:

The main objective of router is to connect various networks simultaneously and it works in network layer

7 0
3 years ago
Which of the following correctly orders the investments from LOWER risk to HIGHER risk?
erma4kov [3.2K]

Treasury bond − Diversified mutual fund - Stocks.

An investment is an asset or item that is purchased with the hope that it will generate income or will appreciate in value. All investments involve some degree of risk. In finance, risk refers to the degree of uncertainty or potential financial loss that could happen in an investment decision.

In general, as investment risks rise, investors seek higher returns to compensate themselves for taking such risks. Relying on personal resources has more risk than relying on public resources of producers.

Usually, a portfolio made up of 60% stocks, 30% mutual funds, and 10% Treasury bonds would be considered to be the highest risk portfolio.

3 0
3 years ago
Other questions:
  • _____ software can help a company manage security, enforce corporate strategies, and control downloads and content streaming fro
    11·1 answer
  • What do you call a named collection of data stored on a disk?
    15·1 answer
  • ………………….. is the process of causing a system variable to conform to some desired value. Options Control feedback Design none of
    9·1 answer
  • Write a program that ask the user to enter air water or Steele and the distance that a sound wave will travel in the medium the
    6·1 answer
  • What will be the output of “AAAAMMMMMHHHVV” using a file compression technique?
    10·1 answer
  • Edible vaccines, a more controversial approach to vaccine development, have been investigated by scientists. Plants can be genet
    6·1 answer
  • How would you define the rule of thirds?
    11·1 answer
  • Disrupting a business's ability to conduct electronic commerce is cönsidered an act of
    6·1 answer
  • Please answer the following essay question:
    13·1 answer
  • 3.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!