1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sergeeva-Olga [200]
4 years ago
12

FTP is commonly used to __________ and __________ files to a server.

Computers and Technology
1 answer:
Aleks [24]4 years ago
8 0

Answer:

upload; download

Explanation:

FTP (File Transfer Protocol) is an internet protocol used to upload and download a file to a server, there are some programs help us to transfer this data to a server, in some cases, we're going to need these programs to upload website files to the server like images or videos, or some websites where do you need a user and passwords to upload file by FTP

You might be interested in
Where can i check on an acer chromebook to see what version of java is installed.
lana66690 [7]

Based on the current situation, to check on an Acer Chromebook to see what version of java is installed, you must "<u>input</u><u> specific commands on the terminal window and press Enter key</u>."

<h3>Java Installation on Chromebook.</h3>

Currently, Góogle or Chromebook do not allow Java installation on its operating system. This is due to the security threats that are associated with Java.

However, there are ways to bypass this situation and eventually install Java on your Chromebook if you so desire.

Nevertheless, if eventually, you installed Java successfully on your Chromebook, to check the version, you must "<u>input specific commands on the terminal window and press Enter key."</u>

Learn more about Java Program here: brainly.com/question/19485769

5 0
2 years ago
Which of the preventive strategies is described below: Violence often escalates. Behaviors like excessive complaing, hostility,
Leviafan [203]
Um, I think the answer to this is probably a mentally ill problem. You should give some options.
7 0
3 years ago
Would you expect all the devices listed in bios setup to also be listed in device manager? would you expect all devices listed i
katen-ka-za [31]
<span>Would you expect all the devices listed in bios setup to also be listed in device manager? = Yes
Would you expect all devices listed in device manager to also be listed in bios setup? = No, the BIOS doesn't know anything about your peripherals etc. that is all managed by the OS.</span>
6 0
3 years ago
Analyzing computer systems to gather potential legal evidence is computer ________
hodyreva [135]
It is called computer forensics.
5 0
3 years ago
Several different tunneling protocols can be used in dial-up situations. Which of the following would best be used as a VPN tunn
melomori [17]

Answer:

The answer is the point - to -point protocol, which allows user to set a secure VPN connection for client and server connectivity.

Explanation:

A virtual private network is a private-public network because of encryption and tunneling to ensure the integrity of the data. VPN requires a tunnel to work and encryption.

In VPNs, there are different protocols can be used, such as point- to - Point Tunneling Protocol (PPTP), IPSec, and L2TP.

Point to Point Protocol is a Microsoft protocol which allows user to set a connection and secure VPN destination. Point to point protocol is designed for client and server connectivity. It developed a connection between two computers. The data link layer that transmits over IP networks is used for point to point tunneling.

Such as option A is not correct because it is distracter and IPSecis primary tunneling protocol. It supports only IP networks. L2TP is not a VPN but extend VPN over the various network.

3 0
4 years ago
Other questions:
  • What e-reader technology males a screen that is easy to read and extends battery life
    6·1 answer
  • What is the name of the process that is used to establish whether or not a user’s identity is legitimate?
    7·1 answer
  • Is using abbreviations and symbols in social media a problem? Why or why not?
    11·1 answer
  • Write a java program that declares an array "alpha" of 50 elements of type "double". Initialize the array so that the first 25 e
    11·1 answer
  • )the number of levels in a tree is called
    6·1 answer
  • Many Web browsers allow users to open anonymous windows. During a browsing session in an anonymous window, the browser does not
    14·1 answer
  • java A palindrome is a word or a phrase that is the same when read both forward and backward. Examples are: "bob," "sees," or "n
    5·1 answer
  • Signals that can travel in only one direction on a medium are referred to as what type of signal?
    12·1 answer
  • Your one output statement should occupy two lines in your program
    13·1 answer
  • You have studied graphic design, advanced math, and programming, and you
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!