Which of the following is a common testing framework used in TDD for JavaScript?

  • Jasmine
  • Jest
  • Mocha
  • Protractor
Jest is a widely used testing framework for Test-Driven Development (TDD) in JavaScript. It is known for its simplicity, speed, and built-in features like snapshot testing and mocking.

You realize that the last few commits in your Git history are incorrect and need to be removed. What command(s) would you use to accomplish this?

  • git clean -f
  • git rebase -i HEAD~n
  • git reset --hard HEAD~n
  • git revert
The correct command is git rebase -i HEAD~n, where 'n' is the number of commits you want to go back. Interactive rebase allows you to edit, remove, or squash commits before applying them.

The HTML element contains _______ information about the document.

  • Content
  • Metadata
  • Structure
  • Styling
The HTML element contains metadata information about the document, such as the title, character encoding, and links to external resources like stylesheets and scripts.

Which of the following is NOT a benefit of using Infrastructure as Code?

  • Enhanced Collaboration
  • Improved Version Control
  • Increased Scalability
  • Manual Configuration
Manual Configuration is not a benefit of using Infrastructure as Code. IaC aims to automate and streamline the process, reducing manual intervention and potential errors associated with manual configurations.

What are the differences between the Observer and Publisher-Subscriber design patterns?

  • Both patterns follow the same implementation structure
  • Observer pattern involves a subject and multiple observers, while Publisher-Subscriber involves multiple publishers and multiple subscribers
  • Observer pattern is used in event handling, while Publisher-Subscriber is used in UI components
  • Terms are used interchangeably
The key difference lies in the relationship structure. The Observer pattern involves a one-to-many relationship, while Publisher-Subscriber involves a many-to-many relationship between publishers and subscribers.

Your company is migrating its infrastructure to the cloud. How would you design a robust monitoring and logging strategy to support this transition and ensure visibility into the new environment?

  • Continue using on-premise tools for consistency
  • Disable monitoring during migration for performance reasons
  • Implement cloud-native monitoring and logging solutions
  • Rely on the cloud provider's default monitoring services
When migrating to the cloud, it's essential to implement cloud-native monitoring and logging solutions. These tools are optimized for cloud environments, providing better visibility, scalability, and integration capabilities. Continuing to use on-premise tools may not adapt well to the dynamic cloud environment. Relying solely on the cloud provider's default monitoring services may lack customization. Disabling monitoring during migration poses a risk of missing crucial insights into performance and issues.

The command "git bisect" is used for _______ debugging in Git.

  • Binary
  • Binary Search
  • Bisect
  • Incremental
The command "git bisect" is used for incremental debugging in Git. It helps locate the commit that introduced a bug by performing a binary search through the commit history. Developers mark good and bad commits, and Git efficiently narrows down the problematic commit.

The split() method in JavaScript is used to split a string into an array of _______.

  • Characters
  • Elements
  • Objects
  • Substrings
The split() method is used to split a string into an array of substrings based on a specified delimiter. It does not create objects, characters, or elements, but rather substrings.

In a web application experiencing slow load times, what steps would you take to identify and resolve performance bottlenecks?

  • Check server logs and monitor resource usage
  • Increase server capacity
  • Optimize client-side code
  • Use profiling tools to analyze code execution
To identify and resolve performance bottlenecks in a web application, using profiling tools to analyze code execution is crucial. This allows you to pinpoint specific areas of code causing delays and optimize them for better performance.

Which protocol is commonly used for authentication in web applications?

  • HTTP
  • LDAP
  • OAuth 2.0
  • SSL/TLS
OAuth 2.0 is commonly used for authentication in web applications. It is an open standard for access delegation commonly used in authorization scenarios.