Question

List 3 Internet applications and their application-layer protocols that they use. (other from the ones we...

List 3 Internet applications and their application-layer protocols that they use. (other from the ones we studied).

Homework Answers

Answer #1

Applications of internet:-

(I) Transferring files remotely:- We can use internet to transfer files from person to person.

The application layer protocol used is FTP i.e file transfer protocol.

(ii) Message friends online with attachments:-

we can use internet to collect information for any subject and learn many new things.

The application layer protocol used here is SMTP i.e simple mail transfer protocol

(iii) Remotely accessing computer sources:- We can remotely access computer sources from other places.

The application layer protocol used is TELNET i.e telecommunication network.

Don't forget to hit like

Thanks by ❤️

Know the answer?
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for?
Ask your own homework help question
Similar Questions
a) (5pts) List the five layers in the Internet protocol stack, from the top to bottom....
a) (5pts) List the five layers in the Internet protocol stack, from the top to bottom. b) (2pts) Why Internet protocols are layered? c) (3pts) What are the principal responsibilities of Network Layer?
Develop and construct an APA formatted paper (also use LIRN (or JSTOR), Internet, and the textbook)...
Develop and construct an APA formatted paper (also use LIRN (or JSTOR), Internet, and the textbook) that provides a detailed analysis of the following concepts: · Description of ASP.NET’s functionality and what software is needed for developing applications · Detailed procedures for creating an ASP.NET application using Visual Studio · The proper procedure for using HTML, CSS, and Bootstrap in Web From applications · The development of multi-page web applications · Debugging ASP.NET applications · Implementation of server controls.
1.       In modern packet- switched networks, including the Internet, the source host segments long, application- layer messages...
1.       In modern packet- switched networks, including the Internet, the source host segments long, application- layer messages (for example, an image or a music file) into smaller packets and sends the packets into the network. The receiver then reassembles the packets back into the original message. We refer to this process as message segmentation. Figure 1.27 illustrates the end- to- end transport of a message with and without message segmentation. Consider a message that is 8 · 106 bits long that is...
1. Describe Web applications 2. Explain Web application vulnerabilities 3. Describe the tools used to attack...
1. Describe Web applications 2. Explain Web application vulnerabilities 3. Describe the tools used to attack Web servers 4. Describe the use of Web forms to allow users to send information that can be processed by Web applications at the Web server. 5. Explain that frameworks are typically called on for a specific purpose and are designed to make programming easier. 6. Describe JavaScript, another scripting language used to create dynamic Web pages. JavaScript introduces the power of a full...
5.1 Use the Internet. Identify the steps/third-party applications that can aid in the auditing of the...
5.1 Use the Internet. Identify the steps/third-party applications that can aid in the auditing of the databases you installed in your OS. 5.2 Creating and Implementing an Audit You have been hired as the lead auditor within your own company. You are to create and implement an internal informal database auditing schedule for the organization. Create a paper that responds to the following: 1. Create a table that includes a rotating schedule for the 12 months of auditing. Include columns...
Problem 3 - use the following definition of permutation below: List A is a permutation of...
Problem 3 - use the following definition of permutation below: List A is a permutation of list B if any of the following are true: - list A and list B are both null, otherwise - a.head=b.head, and a.tail is a permutation of b.tail - a.head≠b.head, and there exists a list C such that - a.tail is a permutation of b.head:c, and - b.tail is a permutation of a.head:c a) Use induction to prove that any finite list is a...
Discussion 2a: Accurate Information on Your Résumé and Job Application In this lesson we discussed the...
Discussion 2a: Accurate Information on Your Résumé and Job Application In this lesson we discussed the importance of gathering information for your résumé and job application. Please explain why it is important for the information to be accurate – and the consequences of providing inaccurate or misleading information on a résumé or job application. Discussion 2b: Highlighting Awards and Recognition In this lesson we discussed how to incorporate awards and recognition into your résumé. Please explain why highlighting these accomplishments...
When we delete an existing item from an unsorted linked list and insert a new item...
When we delete an existing item from an unsorted linked list and insert a new item into a sorted linked list, we use temporary pointers to hold addresses of nodes. Please explain how many pointers we need and why. You could use a chart/diagram to show the difference.
Which application testing method tests applications from within using software instrumentation? 1 point SAST: Static Application...
Which application testing method tests applications from within using software instrumentation? 1 point SAST: Static Application Security Testing. IAST Interactive Application Security Testing. PAST: Passive Application Security Testing. DAST: Dynamic Security Application Testing. 57. Question 57 Which one of the OWASP Top 10 Application Security Risks would be occur when there are no safeguards against a user being allowed to execute HTML or JavaScript in the user's browser that can hijack sessions. 1 point Insufficient logging and monitoring Security misconfiguration...
As advances in computer technology continue to change the way we work and play, Internet use...
As advances in computer technology continue to change the way we work and play, Internet use on and off the job has become a danger zone for employees and employers. Misuse costs employers millions of dollars in lost productivity and litigation, and it can cost employees their jobs. A 2006 survey by the American Management Association and the ePolicy Institute revealed that 28 percent of employers fired workers for e-mail misuse. In addition, 2 percent terminated employees for using instant...
ADVERTISEMENT
Need Online Homework Help?

Get Answers For Free
Most questions answered within 1 hours.

Ask a Question
ADVERTISEMENT