What is Git?

  • Database Management System
  • Programming Language
  • Version Control System
  • Web Browser
Git is a Version Control System (VCS) that enables multiple developers to collaborate on a project efficiently. It tracks changes in source code during software development, allowing teams to manage and coordinate their work.

_______ scope is created when a function is defined and persists even after the function returns.

  • Closure
  • Global
  • Local
  • Static
Closure scope is created when a function is defined inside another function. It allows the inner function to access the outer function's variables, even after the outer function has finished executing.

In which scenario would you typically use the "git rebase" command over "git merge"?

  • When creating a new branch for a bug fix
  • When dealing with conflicts in parallel branches
  • When wanting to keep a linear history
  • When working on a feature branch to incorporate upstream changes smoothly
The "git rebase" command is used to maintain a linear project history by moving, combining, or eliminating existing commits. It's typically employed to integrate upstream changes smoothly into a feature branch, resulting in a cleaner and more readable history.

Your team needs to develop a real-time chat application. Which framework would you recommend and why?

  • ASP.NET SignalR
  • Django Channels
  • Firebase
  • Socket.io
Socket.io is a reliable choice for developing real-time chat applications. It enables bidirectional communication and supports WebSocket, making it efficient for handling real-time updates in a chat system.

Role-based access control (RBAC) is a common method for _______ in large systems.

  • Authorization
  • Authentication
  • Encryption
  • Decryption
Role-based access control (RBAC) is a common method for authorization in large systems. It defines access levels based on a user's role within an organization. The correct option aligns with the purpose of RBAC.

What is the principle of least privilege in security?

  • Allowing users to choose their own access rights
  • Assigning access rights based on seniority within the organization
  • Granting all users maximum access rights by default
  • Restricting users' access rights to the minimum necessary for their job functions
The principle of least privilege in security advocates restricting users' access rights to the minimum necessary for their job functions. This minimizes the potential damage from accidental mishandling or intentional malicious actions.

You're tasked with optimizing a database query that takes a long time to execute. What strategies would you employ to improve its performance?

  • Increase database server memory
  • Index the relevant columns
  • Normalize the database schema
  • Utilize caching mechanisms
Indexing the relevant columns is a key strategy for optimizing database queries. It helps speed up data retrieval by creating efficient access paths to the required information, reducing query execution time.

What does OAuth primarily focus on in terms of user authorization?

  • Delegated access to resources
  • Encryption of user data
  • Password hashing
  • Two-factor authentication
OAuth primarily focuses on delegated access to resources. It allows one service to perform actions on behalf of a user, without exposing their credentials.

Which SQL command is used to add a new row to a database table?

  • ADD
  • INSERT
  • MODIFY
  • UPDATE
The INSERT SQL command is used to add a new row to a database table. It allows you to insert data into a specified table.

What is a common language used for defining infrastructure as code?

  • HTML
  • JSON
  • XML
  • YAML
JSON (JavaScript Object Notation) is a common language used for defining infrastructure as code. It is a lightweight and human-readable data interchange format, making it well-suited for configuration files. YAML is another popular choice for its simplicity and readability in configuration management.