You would use the FTP protocol to ________

A) log in to a secure webpage
B) transfer files
C) surf the web
D) verify an email address

B

Computer Science & Information Technology

You might also like to view...

The code that identifies an index entry is:

a. EX b. IX c. XE

Computer Science & Information Technology

What is meant by the term ‘client-server architecture’ and what are the advantages of this approach? Compare the client-server architecture with two other architectures.

What will be an ideal response?

Computer Science & Information Technology