How can we specify file transfer in a web page, Computer Engineering

Assignment Help:

Can we specify file transfer in a Web page? Explain with the help of suitable example.

Yes, file transfer can be given in a web page. The first field within a URL gives a protocol . The URL ftp: / / ftp.cs.purdue.edu/pub/comer/netbook/client.c specifies as browser must employ anonymous FTP (file transfer protocol)to retrieve the file pub/comer/netbook/client.c from computer ftp.cs.purdue.edu.

A URL which specifies FTP (file transfer protocol) can be simply embedded I HTML consider the following illustration:

Source code from

< A HREF = "ftp: / /ftp.cs.purdue.edu/pub/comer/netbook/cl ient .c " > an illustration client program < /A > is available online.

The program segment will be displayed asillustrated below:

Source code from an illustration client program is available online. If the user choose the underlined segment , the browser uses FTP client of this to acquire a copy of the file client .c.


Related Discussions:- How can we specify file transfer in a web page

Explain fixed arithmetic pipelines, Fixed Arithmetic pipelines We take ...

Fixed Arithmetic pipelines We take the illustration of multiplication of fixed numbers. Two fixed point numerals are added by ALU (Arithmetic and logic unit) using shift and ad

Determine the uses of programming language interface, Determine the uses of...

Determine the uses of Programming Language Interface PLI  is  used  for  implementing  system  calls  that would  have  been  hard  to  do  otherwise  (or impossible) using Ve

Name two special purpose registers, Name two special purpose registers. ...

Name two special purpose registers. Index register Stack pointer

Discuss about charles babbage in brief, Discuss about Charles Babbagein bri...

Discuss about Charles Babbagein brief Mechanism  for  advancing  or  reversing  of  control  card  were  allowed  therefore enabling execution of any desired instruction. In ot

Induction that your closed formula , Show by induction that your closed for...

Show by induction that your closed formula from (c) is the number of times that the given statement is implemented for a problem of size n.Note: if your proof is easily  a proof th

Workflow automation in e-business environment, How do you achieve workflow ...

How do you achieve workflow automation in e-business environment?   In order to run easily, organizations often standardize processes across the organization and encourage user

Using bit wise operator implement nor and nand gate, Q. Write a program t...

Q. Write a program to implement NOR, NAND, XOR and XNOR gates using and without using bit wise operator. Also perform necessary checking. The user has option to give n numbe

State the disadvantages of interviewing, State the Disadvantages of  inter...

State the Disadvantages of  interviewing -  can be expensive to carry out    -  can be a very time consuming exercise -  Unable to remain anonymous

Important steps of the boot process, Question: Computer forensic examin...

Question: Computer forensic examiners should be concerned with at least two important settings stored in RTC/NVRAM, which is accessed by the BIOS software most often called Set

Explain grade of service with reference to telephone traffic, With referenc...

With reference to telephone traffic, explain the terms GOS. GOS: in loss systems, the traffic carried through the network is usually lower than the actual traffic offered to

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd