Which type of attack involves tricking a user into performing actions they did not intend to do?
- Cross-Site Scripting (XSS)
- Denial-of-Service (DoS)
- Man-in-the-Middle (MitM)
- Social Engineering
Social Engineering involves tricking users into performing actions they did not intend to do. This can include manipulation, deception, or impersonation to gain unauthorized access or information.
Which feature in Browser Developer Tools allows you to inspect and edit network requests and responses?
- Console panel
- Elements panel
- Network panel
- Sources panel
The "Network" panel in Browser Developer Tools enables the inspection and editing of network requests and responses. It's a crucial tool for debugging and optimizing web applications.
What is an index in a relational database, and how does it improve performance?
- Algorithm for sorting data in a table
- Data structure that provides a quick look-up of rows based on column values
- Function to calculate the average of a column
- Unique constraint on a column
An index in a relational database is a data structure that provides a quick look-up of rows based on column values, improving the speed of data retrieval. It acts as a roadmap to locate specific data efficiently.
Which tool is commonly used for version control in CI/CD pipelines?
- Docker
- Git
- Jenkins
- Maven
Git is commonly used for version control in CI/CD pipelines. It provides a distributed version control system that allows developers to track changes in their codebase efficiently.
The CSS pseudo-elements allow you to style _______ parts of an element.
- All
- Dynamic
- Specific
- Structural
The CSS pseudo-elements allow you to style Structural parts of an element. They enable you to style specific parts of an element, such as the first line or first letter.
In a pull request, the _______ is responsible for reviewing and providing feedback on the proposed changes.
- Developer
- Merger
- Reviewer
- Team Lead
In a pull request, the Reviewer is responsible for reviewing and providing feedback on the proposed changes. This role ensures the quality and adherence to coding standards before merging.
In backup strategies, what does "granular recovery" entail?
- Complete System Restore
- Incremental Backup
- Recovering Individual Items or Files
- Snapshot Recovery
"Granular recovery" in backup strategies refers to the ability to recover individual items or files rather than restoring the entire system. This approach provides flexibility and efficiency, allowing users to retrieve specific data without the need for a full system restoration.
The _______ phase involves designing the architecture of the software system.
- Analysis
- Design
- Implementation
- Planning
The Design phase involves designing the architecture of the software system. It is a crucial step where the overall structure and components of the software are planned to meet the specified requirements.
You are reviewing a pull request and notice that a team member has made changes to a critical part of the codebase without any documentation. How would you address this situation?
- Comment on the pull request, requesting documentation before approval
- Approve the pull request without documentation but address it in the team meeting
- Reject the pull request until documentation is provided
- Discuss it privately with the team member
Option c is the most appropriate. Documentation is crucial, especially for critical changes. Rejecting the pull request until documentation is provided ensures comprehensive understanding and accountability.
You're building a form validation script in JavaScript. How would you ensure that an email input field contains a valid email address before submitting the form?
- Using Regular Expressions: /^[^s@]+@[^s@]+.[^s@]+$/
- Checking for '@' and '.' occurrences
- Using a predefined list of valid email addresses
- Using validateEmail() function
To ensure that an email input field contains a valid email address in JavaScript, you can use regular expressions. The provided regex (/^[^s@]+@[^s@]+.[^s@]+$/) validates the basic structure of an email address. The correct option offers a robust and standard approach.