FTP stands for file transfer protocol. FTP is used to transfer files between computers over the Internet. FTP servers can be setup to allow users to access the information anonymously or require registration for access.
The NETP provides actionable recommendations to implement
technology and conduct research and development successfully that can advance
the effective use of technology to support learning and teaching.
Hope this helps :)
Answer:
"Geographic information systems
" is the right answer.
Explanation:
- This is indeed a computer-based method for observing and analyzing current events that are happening on the planet. GIS could enhance teaching and learning begin to understand geographical trends and regularities by relaying completely unconnected information.
- It represent an experimental field and while the GIS supplier government offers us modern, improved, and quicker technical resources for the computer hardware.
Answer and explanation : The TCP/IP means TRANSMISSION CONTROL PROTOCOL AND INTERNET PROTOCOL It governs all the communication which are performed over network it has a set of protocol. It defines how different types of conversation are performed without any fault through a network
THERE ARE 5 TYPES OF LAYER IN TCP/IP MODEL
- APPLICATION LAYER: It is present at upper level it is used for high level products for the network communication
- TRANSPORT LAYER: This layer is used for transfering the message from one end to other end
- NETWORK LAYER : Routers are present in network layer which are are responsible for data transmission
- DATALINK LAYER : it is used when there is any problem in physical layer for correcting this datalink are used
- PHYSICAL LAYER: Physical; layer are responsible for codding purpose which we used in communication process
• Installed a program containing ransomware/malware. (Do not accept downloaded without inferring it was installed)
• Opened an email attachment containing malware.
• Opened a file containing a malicious macro.
• Left his computer unsecure allowing someone else to install malware on it. (Should include an example, e.g. not logging off)