The FTP protocol is used to ________.

A) log in to a secure webpage
B) transfer files
C) surf the web
D) verify an email address


Ans: B) transfer files

Computer Science & Information Technology

You might also like to view...

Which statement is false?

a. SortedSet extends Set. b. Class SortedSet implements TreeSet. c. When a HashSet is constructed, it removes any duplicates in the Collection. d. By definition, a Set object does not contain any duplicates.

Computer Science & Information Technology

With your insertion point in Row 2, what is a viable alternative for deleting the selected row other than using the buttons on the Layout tab?

A) Right-click, select Delete, and click Delete Rows. B) Press Shift+Delete . C) Press the Delete key. D) Right-click and select Delete Row.

Computer Science & Information Technology

Which of the following finds and removes hidden properties and personal information from a workbook?

A) Track Changes B) Document Inspector C) Encryption D) Properties Finder

Computer Science & Information Technology

_____ is a communication standard that enables computers to route communications traffic from one network to another as needed.

A. The ARPANET B. A Uniform Resource Locator (URL) C. The Internet Protocol (IP) D. A Wi-Fi

Computer Science & Information Technology