Each operation in a RESTful web service is identified by a unique _________.

a) URL
b) proxy object
c) interface
d) None of the above

a) URL

Computer Science & Information Technology

You might also like to view...

________ are text symbols such as small circles or checkmarks that precede each item in a list

A) Buttons B) Commands C) Ribbons D) Bullets

Computer Science & Information Technology

The __________ method is ideal for a short amount of data and is the appropriate mode to use if you want to transmit a DES or AES key securely.

A. cipher feedback mode B. counter mode C. output feedback mode D. electronic codebook mode

Computer Science & Information Technology