Which of the following ports would be commonly used for FTP traffic?

A. 20
B. 22
C. 23
D. 25


Answer: A. 20

Computer Science & Information Technology

You might also like to view...

Select all that apply. Which of the following statements is(are) true about named constants?

a. A named constant must be all uppercase. b. The content of a named constant is read-only. c. The value of a named constant cannot be changed while the program is running. d. A named constant is defined using the const qualifier. e. None of these

Computer Science & Information Technology

What are the four general limitations of traditional network architectures cited by the Open Networking Foundation? (Choose four correct answers.)

A) Static, complex architecture B) Inconsistent policies C) Maintainability D) Inability to scale E) Mobility F) Vendor dependence

Computer Science & Information Technology

Consider the UNIVERSITY EER schema of Figure 8.10. Think of what operations are needed for the entity types/classes in the schema. Do not consider constructor and destructor operations.

What will be an ideal response?

Computer Science & Information Technology

A(n) ________ chart represents a percent to a whole

Fill in the blank(s) with correct word

Computer Science & Information Technology