1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Musya8 [376]
4 years ago
10

When do you use FTP?

Computers and Technology
2 answers:
Sergeeva-Olga [200]4 years ago
5 0
FTP (File Transfer Protocol) can be used for a variety of tasks. For instance, webmasters using FTP for pushing updates/files to their websites can provide easy and straightforward changes to their services without the need to physically transfer files onto the host server. FTP should be used when you must update a file or files on a host server for a variety of reasons and you do not have access to the host server physically. However, FTP also has some inherent security risks which is why some webmasters/hosts chose to opt out of pushing updates through FTP in favour of physical file transfer.
vampirchik [111]4 years ago
3 0

Answer:

   FTP stands for File Transfer Protocol, and is a very fast and versatile way to transfer files (also known as files), being one of the most used on the internet.

    It can refer to both the protocol and the program that implements this protocol (FTP Server, in this case, traditionally appears in lowercase letters, influenced by the Unix file transfer program).

    Data transfer over computer networks typically involves file transfer and access to remote file systems (with the same interface as local files). FTP (RFC 959) is based on TCP, but predates the TCP / IP protocol stack and is later adapted to TCP / IP. It is the TCP / IP stack standard for transferring files, it is a hardware and operating system-independent generic protocol, and it transfers files at will, given access restrictions and file properties.

You might be interested in
A plain text e-mail and the same text entered into a word processing document would be about the same file sizes.
kumpel [21]
The email should be lighter but they're variables such as the word processing program. Not sure if this answered your question.
6 0
4 years ago
Read 2 more answers
[Assembly Language]Extended Subtraction Procedure.Create a procedure named Extended_Sub --(Receives: ESI and EDI point to the tw
alex41 [277]

Answer:

Modern (i.e 386 and beyond) x86 processors have eight 32-bit general purpose registers, as depicted in Figure 1. The register names are mostly historical. For example, EAX used to be called the accumulator since it was used by a number of arithmetic operations, and ECX was known as the counter since it was used to hold a loop index. Whereas most of the registers have lost their special purposes in the modern instruction set, by convention, two are reserved for special purposes — the stack pointer (ESP) and the base pointer (EBP).

For the EAX, EBX, ECX, and EDX registers, subsections may be used. For example, the least significant 2 bytes of EAX can be treated as a 16-bit register called AX. The least significant byte of AX can be used as a single 8-bit register called AL, while the most significant byte of AX can be used as a single 8-bit register called AH. These names refer to the same physical register. When a two-byte quantity is placed into DX, the update affects the value of DH, DL, and EDX. These sub-registers are mainly hold-overs from older, 16-bit versions of the instruction set. However, they are sometimes convenient when dealing with data that are smaller than 32-bits (e.g. 1-byte ASCII characters).

When referring to registers in assembly language, the names are not case-sensitive. For example, the names EAX and eax refer to the same register.

Explanation:

5 0
3 years ago
When you first turn on a computer and you donât hear a spinning drive or fan or see indicator lights, is the problem hardware or
skelet666 [1.2K]
Hardware related. 
Give thanks
5 0
3 years ago
Between the div tags below, type the code for a link to the second.html page. Use "Go to the Second Page" as the link text
marysya [2.9K]

A code for a link to the second.html page is given by <div>Go to the Second Page</div>.

<h3>What is a div tag?</h3>

A div tag is an abbreviation for division tag and it can be defined as a type of HTML tag that is designed and developed to break (divide) a webpage into several elements with their respective layout attributes.

In this scenario, a code for a link to the second.html page is given by <div>Go to the Second Page</div>.

<u>Note:</u> "Go to the Second Page" serves as the link text.

Read more on div tag here: brainly.com/question/14075748

#SPJ1

4 0
2 years ago
Hello brainly users can someone help me out with this question thanks!!!
slavikrds [6]

Answer:

a medical journal/study from a licenced doctor on a website with .org

Explanation:

most medical journals from licenced doctors have .org in the end and are trusted

6 0
3 years ago
Read 2 more answers
Other questions:
  • The What is the pathname that starts from the working directory. directory?
    7·1 answer
  • Your computer sign-in screen is visible, but after you enter your sign-in credentials the computer fails to sign in and present
    6·1 answer
  • When nat hides the source ip of an originating device, this is known as ________?
    15·2 answers
  • 1. (15%) Consider a computer system with three users: Alice, Bob, and Cyndy. Alice owns the file a, and Bob and Cyndy can read i
    9·1 answer
  • Jin needs to add a row into his spreadsheet, but he does not want to remove any existing data. Which combination of options shou
    6·2 answers
  • Lost passwords set for documents in Microsoft® Word® documents can be retrieved in the backstage view. True False
    9·2 answers
  • A soft news story and a feature story are the same thing.<br> O True<br> O False<br> HELLPP ASSAAAP
    12·2 answers
  • What do you setup when you want to filter traffic from getting through a firewall?
    13·1 answer
  • What information most likely presents a security risk on your personal
    6·1 answer
  • Why do we need to use a VPN service?
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!