1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Musya8 [376]
3 years ago
10

When do you use FTP?

Computers and Technology
2 answers:
Sergeeva-Olga [200]3 years ago
5 0
FTP (File Transfer Protocol) can be used for a variety of tasks. For instance, webmasters using FTP for pushing updates/files to their websites can provide easy and straightforward changes to their services without the need to physically transfer files onto the host server. FTP should be used when you must update a file or files on a host server for a variety of reasons and you do not have access to the host server physically. However, FTP also has some inherent security risks which is why some webmasters/hosts chose to opt out of pushing updates through FTP in favour of physical file transfer.
vampirchik [111]3 years ago
3 0

Answer:

   FTP stands for File Transfer Protocol, and is a very fast and versatile way to transfer files (also known as files), being one of the most used on the internet.

    It can refer to both the protocol and the program that implements this protocol (FTP Server, in this case, traditionally appears in lowercase letters, influenced by the Unix file transfer program).

    Data transfer over computer networks typically involves file transfer and access to remote file systems (with the same interface as local files). FTP (RFC 959) is based on TCP, but predates the TCP / IP protocol stack and is later adapted to TCP / IP. It is the TCP / IP stack standard for transferring files, it is a hardware and operating system-independent generic protocol, and it transfers files at will, given access restrictions and file properties.

You might be interested in
Write a python program to check whether the number is divisible by 7. If its divisible, print its divisible otherwise find previ
Stells [14]

f = int(input("Enter a number: "))

if(f%7==0):

   print("It's divisible by 7.")

else:

   if(f<7):

       print("7")

   else:

       print(str(f-(f%7))+", "+str(f+(7-(f%7))))

7 0
2 years ago
What is the most common way to perform searches in a search engine?
valina [46]
Using key words is the best way to search things in the search engine. make sure everything is spelled correctly.
5 0
3 years ago
(PLATO) How can hackers obtain a person’s data? Malicious hackers can obtain a person’s data through the method of simple ___ en
EastWind [94]

The missing word here is social.

Social engineering involves using simple human methods to steal data, such as looking through peoples’ drawers for pieces of paper on which they might have written down passwords, or perhaps sneaking a look at the keys you press while walking past your desk as you are typing your password. Such behaviors designed to steal your personal information are methods of social engineering.

Let me know if you have any questions.

5 0
3 years ago
What type of computer would integrate the system unit with the display and keyboard?
kolbaska11 [484]
Pc
hope this helps have a good day

3 0
3 years ago
3) According to the five-component model of information systems, the ________ component functions as instructions for the people
Ludmilka [50]

Answer:HUMAN RESOURCES AND PROCEDURE COMPONENTS

Explanation: Information systems are known to contain five components, these components help to describe the various aspects and importance of Information systems.

They Include The DATABASE AND DATA WAREHOUSE components(act as the store for all data), The COMPUTER HARDWARE(the physical components of the information systems such as computer harddrive etc)

THE COMPUTER SOFTWARE( the software which includes all the non physical and intangible assets of the information system),

THE HUMAN RESOURCES AND PROCEDURES COMPONENT( which gives instructions to the users).

THE TELECOMMUNICATIONS.

7 0
3 years ago
Other questions:
  • Shania has started a new job as an app developer. Her first task was to make an old app designed for Android available on other
    6·1 answer
  • What type of interview would be most likely for the following scenario?
    11·2 answers
  • Why do we need vram​
    6·1 answer
  • Write a class Example() such that it has a method that gives the difference between the size of strings when the '-' (subtractio
    6·1 answer
  • A _______ policy states that the company may access, monitor, intercept, block access, inspect, copy, disclose, use, destroy, or
    5·1 answer
  • Are there any apps in the App Store that allow people to ask a question about any topic and have skilled professionals answer it
    6·1 answer
  • Can you help me with this question please ​
    13·1 answer
  • A _______________ is a particular type of network that uses circuits that run over the Internet but that appears to the user to
    10·1 answer
  • The technologist has recorded the red cell morphology as macrocytic. which mcv value would confirm this observation?
    7·1 answer
  • In C++ please (read the image below for instructions)
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!