In database design, a _______ key uniquely identifies each record in a table.

  • Candidate
  • Composite
  • Foreign
  • Primary
In database design, a Primary key uniquely identifies each record in a table. It must contain unique values and cannot have NULL values.

Which platform offers features such as issue tracking, wikis, and merge requests to facilitate collaboration among developers?

  • GitLab
  • Node.js
  • Ruby on Rails
  • Visual Studio Code
GitLab is a platform that offers comprehensive features for collaboration, including issue tracking, wikis, and merge requests. It serves as an integrated solution for version control, continuous integration, and collaboration, providing a seamless environment for developers to work together on projects.

Which design pattern is used to ensure that only one instance of a class is created and provides a global point of access to that instance?

  • Factory Method
  • Observer
  • Prototype
  • Singleton
The Singleton design pattern is used to ensure that only one instance of a class is created and provides a global point of access to that instance. This is particularly useful when exactly one object is needed to coordinate actions across the system.

You suspect that a JavaScript function is causing errors on your web page. How would you use Browser Developer Tools to identify and fix the problem?

  • Analyze the Sources panel to step through and debug JavaScript code
  • Check the Network tab for JavaScript file loading issues
  • Inspect the Elements panel for JavaScript-related layout problems
  • Use the Console tab to log and debug JavaScript errors
The Sources panel in Browser Developer Tools is used to step through and debug JavaScript code, helping identify and fix errors in functions causing issues on the web page.

Using strong _______ is important for securing user passwords.

  • Authentication
  • Encryption
  • Firewall
  • Hashing
Using strong hashing is important for securing user passwords. Hashing involves converting passwords into a fixed-length string of characters, making it challenging for attackers to reverse the process and obtain the original password.

In backup strategies, what does the term "recovery point objective (RPO)" refer to?

  • Data transfer speed
  • Frequency of backups
  • Maximum data loss acceptable
  • Time taken to restore data
The "Recovery Point Objective (RPO)" in backup strategies refers to the maximum acceptable amount of data loss that an organization is willing to tolerate. It defines the point in time to which data must be recovered after an outage or loss.

What does the HTML
element represent?

  • Data
  • Description
  • Division
  • Document
The

element in HTML represents a division or a section in an HTML document. It is a block-level container that is used to group related elements together and style them with CSS.

In Docker, a _______ is a lightweight, standalone, executable package that includes everything needed to run a piece of software, including the code, runtime, libraries, environment variables, and configuration files.

  • Container
  • Image
  • Repository
  • Virtual Machine
In Docker, an "Image" is a lightweight, standalone, executable package that includes all the necessary components to run a piece of software. It serves as a blueprint for creating containers.

What is the difference between inline-block and block display properties in CSS?

  • Inline elements flow in a line, and only take as much width as necessary. Block elements start on a new line and take the full width available.
  • Inline-block elements combine the features of both inline and block elements. They flow in a line and can have a width set.
  • Block elements are used for inline-level content, while inline-block elements are used for block-level content.
  • Inline elements are used for block-level content, while block elements are used for inline-level content.
The correct option explains that inline-block elements combine features of both inline and block elements, allowing them to flow in a line and have a set width.

In TDD, a test double that replaces a component or system that the test subject depends on is called a _______.

  • Fake
  • Mock
  • Spy
  • Stub
In Test-Driven Development (TDD), a test double that replaces a component or system is called a Mock. Mock objects simulate the behavior of real objects in a controlled way during testing. They help isolate the unit under test.