1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Zina [86]
3 years ago
9

REST Basics REST is a protocol and a set of operations that many web services conform to in order to exchange information and in

teract with each other. Which of the following are true?
a) REST is strictly a client-server interaction type meaning that the client performs requests and the server sends responses to these requests.
b) REST is a server-server interaction meaning that both sides can make requests and send responses to requests.
c) In REST protocol, properly designed access endpoints should not specify actions as a part of the resource URI. Instead, actions should be specified by the appropriate HTTP methods like GET, POST, PUT and DELETE.
d) REST responses are not capable of specifying any caching related information regarding the accessed resource. Caching must be resolved with other mechanisms.
Computers and Technology
1 answer:
vekshin13 years ago
7 0

Answer:

The answer is "Option A and Option C".

Explanation:

In choice a, it is true since a client-server design can be used for REST-application. A user is somebody who needs space and it doesn't deal with storing data on a central computer. A client is someone with the money, and the interface does not. Its server doesn't want to worry regarding core functionality on the ends of the server. The server does not have to know anything at all about the layer of UI used at the end of the server.

In choice c, it is true As just a Web app, services like corporate/employee resources must be organized, and HTTP verbs like the GET, Place, POST, DELETE must be used to modify these. It must be obvious, as a programmer, that what is required is clearly to look only at the interface or HTTP method used.

You might be interested in
What type of malicious computer programs present themselves as useful computer programs or applications?
erastova [34]

Answer:

The correct answer to the following question will be "Trojan programs".

Explanation:

  • A trojan is a kind of software often identified as legal applications. Internet-thieves and hackers will hire Trojans and they were trying to access to consumer programs. Users are usually fooled into launching and operating Trojans on their devices by a certain form of economic manipulation.
  • It's a kind of malicious software that express themselves as helpful applications and programs.

Therefore, the Trojan program is the right answer.

5 0
3 years ago
Read 2 more answers
What CPU extensions are a prerequisite for installing the Hyper-V role when using an Intel or AMD processor?
malfutka [58]

Answer:

Search for the Intel Virtualization Technology (Intel-VT) branding on Intel processors, and search for AMD-V on the AMD processors.

Explanation:

  • Streaming SIMD Extensions (SSE) seems to be a standardized instruction, data from multiple guidance collection enhancement to the x86 architecture, developed by Intel and released immediately after the introduction of Advanced Micro Devices 3DNow in their Pentium III range of CP Units in 1999.
  • Hyper-V requires different requirements of hardware for running virtual machines in a safe, efficient manner. Minimum 4 Gb of storage. You might need more RAM on the Hyper-V Server for either the virtual servers.

Therefor, it's the right answer.

3 0
4 years ago
. What will be the output of the following program?
raketka [301]

Answer:

Similarly x % 100 yields the last two digits. 4.2. Boolean values and expressions¶. The Python type for storing true and false values is called bool

3 0
2 years ago
A = [2 4 6 8 10 12 14 16 18 20 22 24 26 28 30 32 33 34 35 36 37 38 39 40]
vova2212 [387]

Answer:

C = a./b

Explanation:

In MATLAB, the following command:

C = A./B

Performs the element by elemet division of A and B. This comand is called Right-array division.

So, in your case, we could divide A by B element by element, only using fully-vectorised code (ie. no loops), with the following code:

a = [2 4 6 8 10 12 14 16 18 20 22 24 26 28 30 32 33 34 35 36 37 38 39 40];b = [1 3 5 7 9 11 13 15 17 19 21 23 25 27 29 31 33 43 45 47 49 50 54 59 60];C = a./b;

C would be the element by element division of A and B, with no loops.

5 0
3 years ago
IF YOU KNOW THE ANSWER TO THIS PLEASE ANSWER ASAP
Lady_Fox [76]
I suppose one crumb wouldnt ruin your computer, if it works properly now then its okay.
5 0
3 years ago
Other questions:
  • Most information security incidents will occur because of _________. Select one: a. Users who do not follow secure computing pra
    10·1 answer
  • What is the total utilization of a circuit-switched network, accommodating five users with equal bandwidth share, and the follow
    5·1 answer
  • How do you calculate typing speed
    8·1 answer
  • PHP Create a for loop that initialize with the variable $i = 10 The loop outputs $i as long as $i is greater than 1 using for lo
    9·1 answer
  • The first step in transforming an extended e-r model into a relational database design is to
    14·1 answer
  • An example of a ______ in the United States are computer hackers, whose members engage in actions that subvert authority, disrup
    6·1 answer
  • Please helpppppppppp​
    8·1 answer
  • Assume that you have implemented a sequence class. Describe the mySequence object (i.e., items with the correct order and the po
    9·1 answer
  • Urgent. I will mark you brainliest. explain why cyber warfare is a real threat.​
    10·2 answers
  • Which communication technology often takes the place of printed interoffice communication?.
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!