How can we specify file transfer in a web page, Computer Engineering

Assignment Help:

Can we specify file transfer in a Web page? Explain with the help of suitable example.

Yes, file transfer can be given in a web page. The first field within a URL gives a protocol . The URL ftp: / / ftp.cs.purdue.edu/pub/comer/netbook/client.c specifies as browser must employ anonymous FTP (file transfer protocol)to retrieve the file pub/comer/netbook/client.c from computer ftp.cs.purdue.edu.

A URL which specifies FTP (file transfer protocol) can be simply embedded I HTML consider the following illustration:

Source code from

< A HREF = "ftp: / /ftp.cs.purdue.edu/pub/comer/netbook/cl ient .c " > an illustration client program < /A > is available online.

The program segment will be displayed asillustrated below:

Source code from an illustration client program is available online. If the user choose the underlined segment , the browser uses FTP client of this to acquire a copy of the file client .c.


Related Discussions:- How can we specify file transfer in a web page

Determine the features of keyboards, Determine the features of keyboards ...

Determine the features of keyboards Common features on general-purpose keyboards are cursor-control keys. Functions keys are used to enter frequently used operations in a singl

Give some examples of malicious data, Give some examples of malicious data....

Give some examples of malicious data.  In May 2002, the Norton Anti-Virus software for Windows operating systems detects about 61000 malicious programs. Some of them are named

Operating system., what is the minimum number of page faults for an optimal...

what is the minimum number of page faults for an optimal page replacement strategy?

Hat are the advantages and disadvantages of hardwired, What are the advanta...

What are the advantages and disadvantages of hardwired and micro programmed control? Advantages of hardwired control i. Operate at high speed ii Each state of this coun

Database, what are the Database designs to avoid?

what are the Database designs to avoid?

Define the most common biometrics, What is most common biometrics? Explain ...

What is most common biometrics? Explain in brief. The most common biometrics is as given below: Face geometry (Photo): The computer captures the picture of your face and m

What is e-cash, E-Cash:  E-cash is cash shown by two models. One is the...

E-Cash:  E-cash is cash shown by two models. One is the on-line form of e-cash (introduced by DigiCash) which permits for the completion of all types of internet transactions.

Give solution for readers-writers problem, Give a solution for readers-writ...

Give a solution for readers-writers problem using conditional critical regions. Solution for readers-writers problem using conditional critical regions: Conditional critical

How are interrupt handled by the operating system, How are interrupt hand...

How are interrupt handled by the operating system? The fundamental interrupt mechanism works as follows: The CPU hardware has wire called the interrupt-request line which

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd