1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Zielflug [23.3K]
2 years ago
9

What two characteristics describe an ftp connection?.

Computers and Technology
1 answer:
Brrunno [24]2 years ago
5 0
The first connection established is for traffic control and the second is created for transfer of a file.

Please mark as brainlest answers
You might be interested in
Why did LISD had to block the game “among us”?
frosja888 [35]
Lewisville Independent School District blocked the following program: Among Us because the game was a distraction to online education. Normally, school districts disable/block games that students play to make sure they are not just playing games and that they are paying attention during class.
3 0
3 years ago
Read 2 more answers
What software application is most appropriate to use to create multimedia presentations?
Fofino [41]
Power point is the most “professional”, if that what your asking.
7 0
2 years ago
Read 2 more answers
Renee's creating a plan for her business's information system. What should she do after she determines the goals for her busines
Sever21 [200]
The correct answer is letter D, determine how applying information systems will increase her business opportunities. 

This is the smartest and the best step that she can take in order for her to increase her profits from her business. When here profits have increased, it is already easy to figure out the next steps on how she can expand her company. 
5 0
2 years ago
Using your own computer, give the name of the operating system that runs it and give examples of five legal file names. Then cre
Vika [28.1K]

Answer:

Name of Operating System: Ubuntu

Five legal file names:

inventory.txt

total.txt

NIKKAH.txt

Defaulter.txt

studenT.txt

Five illegal file names:

wel/come.txt

..

MY>note.txt

.

my<work.yxt

Explanation:

To fix the illegal name:

1. Remove the special character, so it becomes welcome.txt

2. Remove the double dot and rename using text characters

3. Remove the special character, so it becomes MYnote.txt

4. A file cannot be named using dot. So we rename to a textual name

5. Remove the special character, so it becomes mywork.txt

Some additional rule for naming of files legally in Unix is that, you cannot use a reserved word to name your file. Starting a file name with number is allowed. Starting a file name with dot make the file to be hidden.

7 0
2 years ago
Why is dark supereffective against ghost?
Mice21 [21]

Answer:

hmmmmm...hold up let me look up what dark supereffective means XD...

Explanation:

?oh so i only see stuff about pokemon so id imagine its about that...

4 0
3 years ago
Read 2 more answers
Other questions:
  • Help plz
    5·1 answer
  • Which type of wireless network is<br> controlled through a wireless<br> access point?
    7·1 answer
  • 1. When centering one paragraph on a page of text, the user needs to _____.
    15·2 answers
  • What is the purpose of the BBC option in a email?
    7·1 answer
  • To expand a window to the full size of the screen.​
    6·2 answers
  • Blank spaces or unseen control characters in a data file are referred to as
    5·2 answers
  • A noisy signal has been uploaded to D2L in the files fft_signal.mat and fft_signal.txt.Write a program to estimate the power spe
    10·1 answer
  • Explain the purpose of QoS on a TCP/IP network. Define the basic purpose of IP prece- dence, Type of Service, Diffserv, and Expl
    11·1 answer
  • Explain in detail, how the Depth Wavelet Transform (DWT) algorithm works, specifically with respect to EEGs (a non-invasive brai
    11·1 answer
  • Instant Search can NOT be used to search through archived messages.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!