_______ is a phenomenon where two or more transactions are waiting indefinitely for resources held by each other, resulting in none of them being able to proceed.
- Concurrency
- Deadlock
- Starvation
- Thrashing
Deadlock is a phenomenon in which two or more transactions are waiting indefinitely for resources held by each other, leading to a state where none of the transactions can proceed. It is a critical issue in concurrent systems and requires careful handling to avoid system gridlock.
Infrastructure as Code helps in achieving _______ infrastructure deployment.
- Elastic
- Incremental
- Manual
- Rapid
Infrastructure as Code helps in achieving rapid infrastructure deployment. By defining and managing infrastructure through code, deployment becomes faster, more consistent, and scalable.
A company wants to deploy a web application with high availability. Which cloud platform service would you suggest, and how does it ensure high availability?
- AWS Elastic Beanstalk
- Azure App Service
- Google App Engine
- IBM Cloud Foundry
Azure App Service is recommended for deploying a web application with high availability. It offers automatic load balancing, geographic distribution, and scaling capabilities to ensure high availability and performance.
In which phase of the SDLC are software requirements documented?
- Design
- Implementation
- Requirements Definition
- Testing
Software requirements are documented in the Requirements Definition phase of the SDLC. This phase involves specifying what the software should do and defining the features and functionalities it needs to have.
What does the term "zero-day vulnerability" refer to in the context of cybersecurity?
- A flaw that exists for zero days before being patched
- A security flaw that is exploited before the software vendor releases a fix
- A vulnerability that doesn't require any action to mitigate
- A vulnerability with zero impact on security
In cybersecurity, a "zero-day vulnerability" refers to a security flaw that is exploited before the software vendor releases a fix. It implies that attackers are already exploiting the vulnerability, and there are zero days of protection for users.
_______ involves making changes or enhancements to existing software to meet evolving user needs or address issues.
- Debugging
- Deployment
- Maintenance
- Refactoring
The correct answer is Maintenance. Maintenance in software development refers to the process of modifying and updating existing software to meet changing requirements, fix bugs, and enhance functionality. It is a crucial phase in the software development lifecycle.
What is the purpose of the CSS float property?
- Controls the placement of an element to the left or right, allowing content to wrap around it
- Defines the transparency of an element
- Determines the font style of an element
- Specifies the alignment of an element along the vertical axis
The CSS float property is used to control the placement of an element, allowing content to wrap around it. It's commonly used for layout purposes.
The command "git reflog" displays a _______ of actions that have been taken in the repository.
- Catalog
- Log
- Record
- Timeline
The command "git reflog" displays a log of actions that have been taken in the repository. It provides a reference log, showing the history of HEAD movements, making it useful for recovering lost commits or branches.
What is the difference between a JOIN and a UNION in SQL?
- JOIN combines rows from two or more tables based on a related column
- JOIN is used for vertical merging
- UNION combines the results of two or more SELECT statements
- UNION is used for horizontal merging
In SQL, a JOIN combines rows from two or more tables based on a related column, while a UNION combines the results of two or more SELECT statements. JOIN operates vertically by merging rows, while UNION operates horizontally by combining result sets.
A _______ is a data structure that consists of a collection of nodes and edges.
- Graph
- Heap
- Queue
- Tree
A graph is a data structure that consists of a collection of nodes and edges. Nodes represent entities, and edges represent relationships between those entities.