Which type of attack involves tricking a user into performing actions they did not intend to do?

  • Cross-Site Scripting (XSS)
  • Denial-of-Service (DoS)
  • Man-in-the-Middle (MitM)
  • Social Engineering
Social Engineering involves tricking users into performing actions they did not intend to do. This can include manipulation, deception, or impersonation to gain unauthorized access or information.

Which feature in Browser Developer Tools allows you to inspect and edit network requests and responses?

  • Console panel
  • Elements panel
  • Network panel
  • Sources panel
The "Network" panel in Browser Developer Tools enables the inspection and editing of network requests and responses. It's a crucial tool for debugging and optimizing web applications.

What is an index in a relational database, and how does it improve performance?

  • Algorithm for sorting data in a table
  • Data structure that provides a quick look-up of rows based on column values
  • Function to calculate the average of a column
  • Unique constraint on a column
An index in a relational database is a data structure that provides a quick look-up of rows based on column values, improving the speed of data retrieval. It acts as a roadmap to locate specific data efficiently.

Which tool is commonly used for version control in CI/CD pipelines?

  • Docker
  • Git
  • Jenkins
  • Maven
Git is commonly used for version control in CI/CD pipelines. It provides a distributed version control system that allows developers to track changes in their codebase efficiently.

The CSS pseudo-elements allow you to style _______ parts of an element.

  • All
  • Dynamic
  • Specific
  • Structural
The CSS pseudo-elements allow you to style Structural parts of an element. They enable you to style specific parts of an element, such as the first line or first letter.

In a pull request, the _______ is responsible for reviewing and providing feedback on the proposed changes.

  • Developer
  • Merger
  • Reviewer
  • Team Lead
In a pull request, the Reviewer is responsible for reviewing and providing feedback on the proposed changes. This role ensures the quality and adherence to coding standards before merging.

In backup strategies, what does "granular recovery" entail?

  • Complete System Restore
  • Incremental Backup
  • Recovering Individual Items or Files
  • Snapshot Recovery
"Granular recovery" in backup strategies refers to the ability to recover individual items or files rather than restoring the entire system. This approach provides flexibility and efficiency, allowing users to retrieve specific data without the need for a full system restoration.

The _______ phase involves designing the architecture of the software system.

  • Analysis
  • Design
  • Implementation
  • Planning
The Design phase involves designing the architecture of the software system. It is a crucial step where the overall structure and components of the software are planned to meet the specified requirements.

In a software project where you need to ensure that only one instance of a database connection manager is used throughout the application, which design pattern would you employ?

  • Decorator
  • Factory Method
  • Observer
  • Singleton
The correct design pattern for ensuring a single instance of a class is the Singleton pattern. This pattern restricts the instantiation of a class to one object and provides a global point of access to that instance. It's commonly used for scenarios like managing database connections to maintain consistency across the application.

What are some techniques for optimizing frontend performance in a single-page application (SPA) built with frameworks like React or Angular?

  • Code Splitting
  • Inline Styles
  • Monolithic Architecture
  • Relational Databases
Techniques for optimizing frontend performance in SPAs include Code Splitting, which involves breaking the code into smaller chunks and loading only what is necessary for a particular view. This reduces initial loading times and improves the overall user experience.