The FTP protocol is used to ________.
A) log in to a secure webpage
B) transfer files
C) surf the web
D) verify an email address
Ans: B) transfer files
You might also like to view...
Which statement is false?
a. SortedSet extends Set. b. Class SortedSet implements TreeSet. c. When a HashSet is constructed, it removes any duplicates in the Collection. d. By definition, a Set object does not contain any duplicates.
With your insertion point in Row 2, what is a viable alternative for deleting the selected row other than using the buttons on the Layout tab?
A) Right-click, select Delete, and click Delete Rows. B) Press Shift+Delete . C) Press the Delete key. D) Right-click and select Delete Row.
Which of the following finds and removes hidden properties and personal information from a workbook?
A) Track Changes B) Document Inspector C) Encryption D) Properties Finder
_____ is a communication standard that enables computers to route communications traffic from one network to another as needed.
A. The ARPANET B. A Uniform Resource Locator (URL) C. The Internet Protocol (IP) D. A Wi-Fi