Which of the following is NOT a benefit of practicing TDD?

  • Decreased development time
  • Early bug detection
  • Improved code documentation
  • Increased code reliability
While TDD offers various benefits, improved code documentation is not typically considered one of them. TDD focuses on testing and code design rather than documentation, which is a separate aspect of software development.

During a code review process, it is essential to maintain a balance between offering constructive criticism and preserving team _______.

  • Autonomy
  • Collaboration
  • Creativity
  • Harmony
During a code review process, it is essential to maintain a balance between offering constructive criticism and preserving team Collaboration. This helps foster a positive and productive working environment.

Your company's web application is experiencing performance issues due to database overload. How would you use caching to alleviate this bottleneck?

  • Database sharding to distribute load
  • Object caching with tools like Memcached
  • Prefetching data from the database
  • Query result caching at the application layer
Object caching with tools like Memcached is a useful strategy to alleviate database overload. It involves caching entire objects or data structures, reducing the need for repetitive database queries and improving overall performance.

Which server-side language is known for its scalability and event-driven architecture, commonly used with frameworks like Express.js?

  • Java
  • Node.js
  • Python
  • Ruby
Node.js, based on JavaScript, is known for its scalability and event-driven architecture. It is commonly used with frameworks like Express.js for building efficient server-side applications.

What is Git?

  • Database Management System
  • Programming Language
  • Version Control System
  • Web Browser
Git is a Version Control System (VCS) that enables multiple developers to collaborate on a project efficiently. It tracks changes in source code during software development, allowing teams to manage and coordinate their work.

_______ scope is created when a function is defined and persists even after the function returns.

  • Closure
  • Global
  • Local
  • Static
Closure scope is created when a function is defined inside another function. It allows the inner function to access the outer function's variables, even after the outer function has finished executing.

In which scenario would you typically use the "git rebase" command over "git merge"?

  • When creating a new branch for a bug fix
  • When dealing with conflicts in parallel branches
  • When wanting to keep a linear history
  • When working on a feature branch to incorporate upstream changes smoothly
The "git rebase" command is used to maintain a linear project history by moving, combining, or eliminating existing commits. It's typically employed to integrate upstream changes smoothly into a feature branch, resulting in a cleaner and more readable history.

Your team needs to develop a real-time chat application. Which framework would you recommend and why?

  • ASP.NET SignalR
  • Django Channels
  • Firebase
  • Socket.io
Socket.io is a reliable choice for developing real-time chat applications. It enables bidirectional communication and supports WebSocket, making it efficient for handling real-time updates in a chat system.

Role-based access control (RBAC) is a common method for _______ in large systems.

  • Authorization
  • Authentication
  • Encryption
  • Decryption
Role-based access control (RBAC) is a common method for authorization in large systems. It defines access levels based on a user's role within an organization. The correct option aligns with the purpose of RBAC.

What is the principle of least privilege in security?

  • Allowing users to choose their own access rights
  • Assigning access rights based on seniority within the organization
  • Granting all users maximum access rights by default
  • Restricting users' access rights to the minimum necessary for their job functions
The principle of least privilege in security advocates restricting users' access rights to the minimum necessary for their job functions. This minimizes the potential damage from accidental mishandling or intentional malicious actions.