___________ is a cryptographic technique used to verify the integrity of data transmitted over a network.

  • Decryption
  • Encryption
  • Hashing
  • SSL/TLS
Hashing is used to ensure data integrity by generating a fixed-size hash value for a given input data. This hash value can be compared to verify data integrity during transmission or storage.

What are the main differences between 802.11a, 802.11b, and 802.11g wireless standards?

  • Operates in the 2.4 GHz frequency band
  • Operates in the 5 GHz frequency band
  • Provides a maximum data rate of up to 54 Mbps
  • Uses Orthogonal Frequency Division Multiplexing (OFDM) for improved performance
802.11a operates in the 5 GHz band, providing faster data rates but shorter range. 802.11b operates in the 2.4 GHz band with slower speeds but better range. 802.11g combines elements of both for improved speed and range.

What is regression testing and why is it important in software development?

  • Checks for user acceptance criteria
  • Repeats test cases after code changes
  • Tests new features for bugs
  • Verifies unchanged code behavior
Regression testing involves re-running test cases to ensure that new changes haven't adversely affected existing functionalities. It verifies that the code behavior remains unchanged post-modifications. This is crucial in software development to catch bugs introduced inadvertently during updates and to maintain overall system reliability and stability. It also helps in ensuring that new features don't break existing functionalities.

Explain the role of the Adapter design pattern in software architecture.

  • Facilitating communication between incompatible interfaces
  • Implementing flexible behavior modification
  • Managing concurrent access
  • Optimizing memory usage
The Adapter design pattern allows objects with incompatible interfaces to work together. It acts as a bridge between the client and the target class, enabling communication and interaction. This pattern is useful when integrating existing systems that have incompatible interfaces or when designing reusable libraries that need to work with multiple interfaces.

You're designing a social networking platform where users can have complex relationships with other users and entities. Which type of NoSQL database would you choose and why?

  • Columnar database
  • Document database
  • Graph database
  • Key-value database
Graph databases are ideal for handling complex relationships as they excel in managing interconnected data. Nodes represent entities like users, and edges represent relationships between them. This structure is well-suited for social networks where users have varied connections. Document databases are better suited for semi-structured data and may not handle complex relationships as effectively as graph databases. Columnar databases are optimized for analytical queries, not for complex relationship handling. Key-value databases are efficient for simple data retrieval but lack the structure needed for complex relationships.

What is the time complexity of the bubble sort algorithm?

  • O(log n)
  • O(n!)
  • O(n)
  • O(n^2)
Bubble sort has a time complexity of O(n^2) in the worst-case scenario. This means that for every element in the array, it may need to compare it with every other element, leading to a quadratic growth in time complexity as the input size increases.

The _________ file in a Git repository lists files and directories that should be ignored.

  • .gitattributes
  • .gitconfig
  • .gitignore
  • .gitkeep
The .gitignore file is used to specify intentionally untracked files that Git should ignore. This can include build artifacts, temporary files, and other files that should not be included in version control.

Discuss the pros and cons of using server-side rendering (SSR) with React and Angular.

  • Angular SSR may have a steeper learning curve due to Angular's more extensive framework and setup requirements.
  • Angular SSR provides similar benefits, rendering pages on the server for faster initial loading and improved search engine visibility.
  • SSR with React can be complex to set up and may require additional server resources for rendering.
  • Server-side rendering (SSR) in React improves initial load times and enables better SEO by serving pre-rendered content.
Server-side rendering (SSR) offers advantages like improved performance and SEO, but it also comes with challenges such as setup complexity and resource requirements. Both React and Angular support SSR, and developers must weigh the pros and cons carefully based on project requirements and their team's expertise to decide whether to implement SSR in their applications.

What is the difference between functional dependency and transitive dependency in database normalization?

  • A functional dependency is a relationship between two attributes in which one attribute uniquely determines another.
  • A transitive dependency occurs when one non-key attribute determines another non-key attribute.
  • Functional dependency involves a direct relationship between attributes, while transitive dependency involves an indirect relationship.
  • Functional dependency involves a relationship between a key attribute and a non-key attribute.
Functional dependency and transitive dependency are fundamental concepts in database normalization. Functional dependency refers to a situation where the value of one attribute uniquely determines the value of another attribute in a database table. For example, in a table of employees, if the employee ID uniquely determines the employee's email address, we say there is a functional dependency between ID and email. Transitive dependency, on the other hand, occurs when a non-key attribute determines another non-key attribute. For instance, if in the same employee table, the department name is determined by the manager's name, which in turn is determined by the employee ID, then we have a transitive dependency. The goal of normalization is to minimize or eliminate such dependencies to ensure data integrity and reduce redundancy.

What are SQL injection attacks, and how can they be prevented in SQL queries?

  • Encrypt database connections
  • Exploits vulnerabilities in SQL queries to manipulate the database
  • Sanitize input data
  • Use stored procedures
SQL injection attacks occur when malicious code is inserted into SQL statements, exploiting vulnerabilities to manipulate the database. To prevent SQL injection, input data should be sanitized to remove any malicious code. Using stored procedures and encrypting database connections also enhance security but may not directly prevent SQL injection attacks.