Continuous Integration is the practice of _______ code changes frequently into a shared repository.
- analyzing
- deploying
- documenting
- integrating
Continuous Integration is the practice of integrating code changes frequently into a shared repository. This ensures that multiple developers can collaborate efficiently and catch integration issues early in the development process.
Two-factor _______ adds an extra layer of security to authentication.
- Authentication
- Authorization
- Encryption
- Verification
Two-factor authentication adds an extra layer of security to the authentication process. It typically involves something the user knows (password) and something the user has (a code sent to their mobile device), enhancing security.
Which CSS property is commonly used to improve rendering performance by minimizing layout recalculations?
- display
- position
- transform
- transition
The transform property in CSS is commonly used to improve rendering performance by minimizing layout recalculations. It enables developers to apply 2D and 3D transformations to elements without triggering costly repaints or reflows. This can significantly enhance the performance of web pages, especially during animations.
Browser Developer Tools provide a _______ view of the Document Object Model (DOM).
- Graphical
- Hierarchical
- Linear
- Tabular
Browser Developer Tools provide a hierarchical view of the Document Object Model (DOM). This view helps developers understand the structure and relationships of HTML elements on a webpage.
In OOP, a class is a blueprint for creating _______.
- Functions
- Instances
- Modules
- Objects
In Object-Oriented Programming (OOP), a class is a blueprint for creating objects. Objects are instances of a class and encapsulate both data (attributes) and behavior (methods) related to that class.
Which attribute is used to provide an alternative text for an image in HTML?
- alt
- href
- src
- title
The alt attribute is used to provide alternative text for an image in HTML. This text is displayed if the image fails to load or for accessibility purposes, allowing screen readers to describe the image to visually impaired users.
NoSQL databases offer _______ scalability compared to traditional relational databases.
- Dynamic
- Horizontal
- Static
- Vertical
NoSQL databases offer Horizontal scalability compared to traditional relational databases. This means that the system can handle increased load by adding more nodes to the database.
A _______ attack aims to overload a system's resources, making it unavailable to users.
- Cross-Site Scripting
- Denial-of-Service
- Man-in-the-Middle
- SQL Injection
A Denial-of-Service (DoS) attack aims to overload a system's resources, making it unavailable to users. This is often achieved by flooding the targeted system with excessive requests, causing it to become overwhelmed and unresponsive.
What is the difference between == and === operators in JavaScript?
- Checks for equality in value and type
- Checks for inequality in value and type
- Checks only for equality in type
- Checks only for equality in value
The == operator in JavaScript checks for equality in value, while the === operator checks for equality in both value and type. It is a strict equality check.
What is a design pattern in software engineering?
- A blueprint for creating software applications
- A general reusable solution to a commonly occurring problem within a given context in software design
- A programming language-specific code convention
- A step-by-step guide for designing user interfaces
A design pattern in software engineering is a general reusable solution to a commonly occurring problem within a given context in software design. It represents best practices and provides a template for solving particular issues.