How can we specify file transfer in a web page, Computer Engineering

Assignment Help:

Can we specify file transfer in a Web page? Explain with the help of suitable example.

Yes, file transfer can be given in a web page. The first field within a URL gives a protocol . The URL ftp: / / ftp.cs.purdue.edu/pub/comer/netbook/client.c specifies as browser must employ anonymous FTP (file transfer protocol)to retrieve the file pub/comer/netbook/client.c from computer ftp.cs.purdue.edu.

A URL which specifies FTP (file transfer protocol) can be simply embedded I HTML consider the following illustration:

Source code from

< A HREF = "ftp: / /ftp.cs.purdue.edu/pub/comer/netbook/cl ient .c " > an illustration client program < /A > is available online.

The program segment will be displayed asillustrated below:

Source code from an illustration client program is available online. If the user choose the underlined segment , the browser uses FTP client of this to acquire a copy of the file client .c.


Related Discussions:- How can we specify file transfer in a web page

Explain telephone hand set and working, Explain Telephone hand set and it's...

Explain Telephone hand set and it's working. A standard telephone set is consisted of a transmitter, electrical network and a receiver for equalization, connected circuitry to

First-order models, First-Order Models: Here if we proposed first-orde...

First-Order Models: Here if we proposed first-order logic as a good knowledge representation language than propositional logic is just because there is more expressive than we

What is shift operation, Q. What is Shift operation? Shift: Shift ope...

Q. What is Shift operation? Shift: Shift operation is employed for transfer of bits either to left or to right. It can be used to comprehend simple arithmetic operation or da

What are the features of abap/4 dictionary, What are the features of ABAP/4...

What are the features of ABAP/4 Dictionary? The most significant features are: Integrated to aABAP/4 Development Workbench. Active in the runtime environment.

Discuss about the bus and memory transfer, Discuss about the Bus and Memory...

Discuss about the Bus and Memory Transfer A read action implies transfer of information to outside environment from a memory word, whereas storage of information inside memory

Explain asymmetric cryptographyand its components, Explain Asymmetric crypt...

Explain Asymmetric cryptographyand its components. Asymmetric or public-key cryptography be different from conventional cryptography in which key material is bound to a single

Network, Give an intuitive explanation of why the maximum throughput, for s...

Give an intuitive explanation of why the maximum throughput, for small beta, is approximately the same for CSMA slotted Aloha and FCFS splitting with CSMA. Show the optimal expecte

Concept development journal, The Concept Development journal must contain: ...

The Concept Development journal must contain: An introductory paragraph detailing what conclusions you have drawn from your research and how you intend to proceed. This should b

Detemine the major building blocks of uml, Detemine the major building bloc...

Detemine the major building blocks of UML UML could be used in visualizing, specifying, constructing and documenting object oriented systems. The major building blocks of UML a

What is external modems, Q. What is External Modems? External Modems: M...

Q. What is External Modems? External Modems: Modems externally associated to PC via a parallel or serial port and into a telephone line at the other end.  They can generally co

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd