You would use the FTP protocol to ________
A) log in to a secure webpage
B) transfer files
C) surf the web
D) verify an email address
B
Computer Science & Information Technology
You might also like to view...
The code that identifies an index entry is:
a. EX b. IX c. XE
Computer Science & Information Technology
What is meant by the term ‘client-server architecture’ and what are the advantages of this approach? Compare the client-server architecture with two other architectures.
What will be an ideal response?
Computer Science & Information Technology