1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
pashok25 [27]
3 years ago
9

John wants to share resources and move a large volume of data quickly over the Internet. John should use which of the following

to transfer his information?
Computers and Technology
1 answer:
den301095 [7]3 years ago
6 0
John should use FTP Services.

For John to quickly transfer a large volume of data, he should have use FTP (File Transfer Protocol). FTP is the network protocol commonly used for exchanging files over the internet. There are a lot of software applications for file share transfer such as FileZilla and SmartFTP.
You might be interested in
Which TWO objects are likely to have SSD chips in them?
valentina_108 [34]
Bank card and discount coupon
8 0
2 years ago
Read 2 more answers
When a packet with the code is transmitted, it is received and processed by every machine on the network. this mode of operation
enot [183]
Multicast

------------------------------------
6 0
2 years ago
In theory, a hacker with a small but powerful directional antenna could access a wireless network from more than one mile away.
Svetradugi [14.3K]
100 miles i assume since the avarge antanna cover 5-50 miles
3 0
2 years ago
The ability of services to grow or shrink based on need is called __________.
Talja [164]
This kind of ability is called rapid elasticity. The resources can be maximized by a consumer to provide wider webs and applications.It can also make the server stop, just to reduce the cost in the process.  The flexibility in adapting to needs of a company is an advantage. Rapid elasticity can be done in a public cloud.
3 0
3 years ago
Since the password includes all four types of characters (complex password) and is 8 characters long, what is the real reason th
Liono4ka [1.6K]
It makes the possibility of an unwanted user to break into your account much smaller.
8 0
2 years ago
Other questions:
  • 1)Ce procent de grasimi putem găsi in lapte ?
    10·1 answer
  • Insert a row above the selected row (in between row 1 and row 2).
    15·2 answers
  • The development of various technologies led to many historic events. Use information from the Internet to describe one major his
    7·1 answer
  • In your own words explain how to add footer and head in a word doc.
    10·1 answer
  • Blood Alcohol Level (BAL) is the ratio between the alcohol consumed and the blood in the body. A. True B. False
    12·2 answers
  • Meet.go ogle.etj-dovn-kds​
    14·1 answer
  • A user finished working on a computer in the lab. What should the user do so
    15·1 answer
  • Under the Home tab, controls for aligning text and objects can be found in the
    5·2 answers
  • Types of Hazards Mitigation Measures
    8·2 answers
  • Which of the examples is part client side code
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!