Assume no FTP protocol exists. You are asked to define a function analogous to the FTP PUT for exchange of files. List three security features or mechanisms you would include in your protocol.

What will be an ideal response?


End-­?to-­?end error detection and perhaps correction. (b) On the receiving end control of where file is placed. (c) On the receiving end control of acknowledgment for receipt of packets. (d) Ability to resume transfer of a failed transmission “in the middle.” (e) Optional end-­?to-­?end encryption for very sensitive files.

Computer Science & Information Technology

You might also like to view...

The command [Ctrl-x] 2:

a: splits the Emacs window to two windows (vertically) b: splits the Emacs window to two windows horizontally c: deletes one of the windows d: moves the cursor to the next window e: none of the above

Computer Science & Information Technology

The command java invokes the ___________, which executes Java programs.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

You can choose to sign up for Pinterest with your existing Facebook or LinkedIn account, or with just your email address

Indicate whether the statement is true or false

Computer Science & Information Technology

If you select the ____________________ button on the Shapes options bar, the path becomes a path or work path on the Paths panel.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology