A Web Worker is a JavaScript that runs in the background, independently of other scripts, without affecting the performance of the page. You can continue to do whatever you want: clicking, selecting things, etc., while the web worker runs in the background.
An element that does not need a separate closing tag with an opening tag. A self-closing element makes use of a “/” character in order to effectively close out a beginning tag enclosed.
How can you add a newline to an element's tooltip?
Please select exactly one correct alternative.
Answer
Use
Reading
No resources given.
topics: xml, level: 100
What does XML stand for?
Please select exactly one correct alternative.
Answer
In computing, Extensible Markup Language (XML) is a markup language that defines a set of rules for encoding documents in a format that is both human-readable and machine-readable.
What statement best describes the difference in purpose for the alt and title attribute for the img element?
Please select exactly one correct alternative.
Answer
The alt attribute specifies an alternate text for an ima. The "alt" text is only when the user turns off graphics or when the browser is "read out" (e.g browser for users who are visually impaired).
Image title provides additional information and follow the rules of a regular title.
SAML stands for: Security Assertion Markup Language
Reading
No resources given.
topics: architecture|security, level: 100
Which statements are correct on Security Assertion Markup Language?
Please select exactly one correct alternative.
Answer
Security Assertion Markup Language (SAML) is an open standard for exchanging authentication and authorization data between parties, in particular, between an identity provider and a service provider. As its name implies, SAML is an XML-based markup language for security assertions (statements that service providers use to make access-control decisions). SAML is also:
A set of XML-based protocol messages
A set of protocol message bindings
A set of profiles (utilizing all of the above)
The single most important use case that SAML addresses is web browser single sign-on (SSO). Single sign-on is relatively easy to accomplish within a security domain (using cookies, for example) but extending SSO across security domains is more difficult and resulted in the proliferation of non-interoperable proprietary technologies. The SAML Web Browser SSO profile was specified and standardized to promote interoperability. (For comparison, the more recent OpenID Connect protocol is an alternative approach to web browser SSO).
What is DTAP in the context of software testing and deployment?
Please select exactly one correct alternative.
Answer
The acronym DTAP is short for Development, Testing, Acceptance and Production. It is a rather common acronym in ICT expressing a phased approach of software testing and deployment.
Which are valid principles in Agile Software Development according to the Manifesto for Agile Software Development?
Please select exactly one or more correct alternatives.
Answer
The Manifesto for Agile Software Development is based on twelve principles:
Customer satisfaction by early and continuous delivery of valuable software
Welcome changing requirements, even in late development
Working software is delivered frequently (weeks rather than months)
Close, daily cooperation between business people and developers
Projects are built around motivated individuals, who should be trusted
Face-to-face conversation is the best form of communication (co-location)
Working software is the primary measure of progress
Sustainable development, able to maintain a constant pace
Continuous attention to technical excellence and good design
Simplicity - the art of maximizing the amount of work not done - is essential
Best architectures, requirements, and designs emerge from self-organizing teams
Regularly, the team reflects on how to become more effective, and adjusts accordingly
Reading
No resources given.
topics: software engineering, level: 100
What best describes Serialization?
Please select exactly one correct alternative.
Answer
In computer science, in the context of data storage, serialization is the process of translating data structures or object state into a format that can be stored (for example, in a file or memory buffer) or transmitted (for example, across a network connection link) and reconstructed later (possibly in a different computer environment). When the resulting series of bits is reread according to the serialization format, it can be used to create a semantically identical clone of the original object.
What best describes the Microservices architecture style?
Please select exactly one correct alternative.
Answer
A microservices architecture consists of a collection of small, autonomous services. Each service is self-contained and should implement a single business capability.
When cloud-based applications use other cloud-based services, errors can occur because of temporary conditions such as intermittent service, infrastructure-level faults, or network issues. Very often, if you retry the operation a short time later (maybe only a few milliseconds later) the operation may succeed. These types of error conditions are referred to as transient faults. Transient faults typically occur very infrequently, and in most cases, only a few retries are necessary for the operation to succeed.
A race condition or race hazard is the behavior of an electronics, software, or other system where the output is dependent on the sequence or timing of other uncontrollable events. It becomes a bug when events do not happen in the order the programmer intended.
Test-driven development (TDD) is a software development process that relies on the repetition of a very short development cycle: Requirements are turned into very specific test cases, then the software is improved to pass the new tests, only. This is opposed to software development that allows software to be added that is not proven to meet requirements.
In computer programming, an assertion is a statement that a predicate (Boolean-valued function, i.e. a true–false expression) is expected to always be true at that point in the code. If an assertion evaluates to false at run time, an assertion failure results, which typically causes the program to crash, or to throw an assertion exception.
In computing, particularly in the context of the Unix operating system and its workalikes, fork is an operation whereby a process creates a copy of itself. It is usually a system call, implemented in the kernel. Fork is the primary (and historically, only) method of process creation on Unix-like operating systems.
Service discovery is the automatic detection of devices and services offered by these devices on a computer network. A service discovery protocol (SDP) is a network protocol that helps accomplish service discovery.
SOAP (originally Simple Object Access Protocol) is a protocol specification for exchanging structured information in the implementation of web services in computer networks. Its purpose is to induce extensibility, neutrality and independence. It uses XML Information Set for its message format, and relies on application layer protocols, most often Hypertext Transfer Protocol (HTTP) or Simple Mail Transfer Protocol (SMTP), for message negotiation and transmission.
The Web Services Description Language is an XML-based interface definition language that is used for describing the functionality offered by a web service.
What best describes Representational state transfer?
Please select exactly one correct alternative.
Answer
Representational state transfer (REST) or RESTful web services are a way of providing interoperability between computer systems on the Internet. REST-compliant Web services allow requesting systems to access and manipulate textual representations of Web resources using a uniform and predefined set of stateless operations.
What best describes the Advanced Message Queuing Protocol?
Please select exactly one correct alternative.
Answer
The Advanced Message Queuing Protocol (AMQP) is an open standard application layer protocol for message-oriented middleware. The defining features of AMQP are message orientation, queuing, routing (including point-to-point and publish-and-subscribe), reliability and security.
Please select exactly one or more correct alternatives.
Answer
MQTT (MQ Telemetry Transport or Message Queuing Telemetry Transport) is an ISO standard (ISO/IEC PRF 20922) publish-subscribe-based messaging protocol. It works on top of the TCP/IP protocol. It is designed for connections with remote locations where a "small code footprint" is required or the network bandwidth is limited. The publish-subscribe messaging pattern requires a message broker.
Requirements engineering (RE) refers to the process of defining, documenting and maintaining requirements in the engineering design process. It is a common role in systems engineering and software engineering.
Please select exactly one or more correct alternatives.
Answer
WebAssembly (wasm, WA) is web standard that defines a binary format and a corresponding assembly-like text format for executable code in Web pages. It is meant to enable executing code nearly as fast as running native machine code. It was envisioned to complement JavaScript to speed up performance-critical parts of web applications and later on to enable web development in other languages than JavaScript. It is developed at the World Wide Web Consortium (W3C) with engineers from Mozilla, Microsoft, Google and Apple.
It is executed in a sandbox in the web browser after a formal verification step. Programs can be compiled from high-level languages into wasm modules and loaded as libraries from within JavaScript applets.
What best describes the Single Source of Truth (SSOT) principle?
Please select exactly one correct alternative.
Answer
In information systems design and theory, single source of truth (SSOT), is the practice of structuring information models and associated schemata such that every data element is stored exactly once.
A Federated Database System is a type of meta-database management system (DBMS), which transparently maps multiple autonomous database systems into a single federated database. The constituent databases are interconnected via a computer network and may be geographically decentralized. Since the constituent database systems remain autonomous, a federated database system is a contrastable alternative to the (sometimes daunting) task of merging several disparate databases. A federated database, or virtual database, is a composite of all constituent databases in a federated database system. There is no actual data integration in the constituent disparate databases as a result of data federation.
In the context of computer science, what is a Reference?
Please select exactly one correct alternative.
Answer
In computer science, a reference is a value that enables a program to indirectly access a particular datum, such as a variable's value or a record, in the computer's memory or in some other storage device. The reference is said to refer to the datum, and accessing the datum is called dereferencing the reference.
Please select exactly one or more correct alternatives.
Answer
In computing, a data warehouse (DW or DWH), also known as an enterprise data warehouse (EDW), is a system used for reporting and data analysis, and is considered a core component of business intelligence. DWs are central repositories of integrated data from one or more disparate sources. They store current and historical data in one single place that are used for creating analytical reports for workers throughout the enterprise.
Microsoft BizTalk Server (or simply "BizTalk") is an Inter-Organizational Middleware System (IOMS) that enables companies to automate business processes, through the use of adapters which are tailored to communicate with different software systems used in an enterprise.
In business, master data management (MDM) is the comprehensive method used to consistently define and manage the critical data of an organization to provide a single point of reference. The data that is mastered may include reference data- the set of permissible values, and the analytical data that supports decision making.
Data integration involves combining data residing in different sources and providing users with a unified view of them. This process becomes significant in a variety of situations, which include both commercial (such as when two similar companies need to merge their databases) and scientific (combining research results from different bioinformatics repositories, for example) domains. Data integration appears with increasing frequency as the volume (that is, big data) and the need to share existing data explodes. It has become the focus of extensive theoretical work, and numerous open problems remain unsolved.
Node-RED is a flow-based development tool developed originally by IBM for wiring together hardware devices, APIs and online services as part of the Internet of Things.
Node-RED provides a browser-based flow editor, which can be used to create JavaScript functions. Elements of applications can be saved or shared for re-use. The runtime is built on Node.js. The flows created in Node-RED are stored using JSON. Since version 0.14 MQTT nodes can make properly configured TLS connections.
Project Portfolio Management (PPM) is the centralized management of the processes, methods, and technologies used by project managers and project management offices (PMOs) to analyze and collectively manage current or proposed projects based on numerous key characteristics. The objectives of PPM are to determine the optimal resource mix for delivery and to schedule activities to best achieve an organization's operational and financial goals, while honouring constraints imposed by customers, strategic objectives, or external real-world factors. The International standard defines the framework of the Project Portfolio Management.
Which statements are correct on the LAMP stack and the MEAN stack?
Select none, one or more alternatives.
Please select exactly one or more correct alternatives.
Answer
LAMP is an archetypal model of web service stacks, named as an acronym of the names of its original four open-source components: the Linux operating system, the Apache HTTP Server, the MySQL relational database management system (RDBMS), and the PHP programming language.
MEAN is a free and open-source JavaScript software stack for building dynamic web sites and web applications.
The MEAN stack is MongoDB, Express.js, AngularJS (or Angular), and Node.js. Because all components of the MEAN stack support programs are written in JavaScript, MEAN applications can be written in one language for both server-side and client-side execution environments.
Systems engineering is an interdisciplinary field of engineering and engineering management that focuses on how to design and manage complex systems over their life cycles. At its core, systems engineering utilizes systems thinking principles to organize this body of knowledge. Issues such as requirements engineering, reliability, logistics, coordination of different teams, testing and evaluation, maintainability and many other disciplines necessary for successful system development, design, implementation, and ultimate decommission become more difficult when dealing with large or complex projects.
What best describes a Pointer in the context of Computer science?
Please select exactly one correct alternative.
Answer
In computer science, a pointer is a programming language object, whose value refers to (or "points to") another value stored elsewhere in the computer memory using its memory address. A pointer references a location in memory, and obtaining the value stored at that location is known as dereferencing the pointer.
Docker is a software technology providing operating-system-level virtualization also known as containers, promoted by the company Docker, Inc. Docker provides an additional layer of abstraction and automation of operating-system-level virtualization on Windows and Linux.
iOS (formerly iPhone OS) is a mobile operating system created and developed by Apple Inc. exclusively for its hardware. It is the operating system that presently powers many of the company's mobile devices, including the iPhone, iPad, and iPod Touch.
What best describes a Deamon in the context of computing?
Please select exactly one correct alternative.
Answer
In multitasking computer operating systems, a Daemon is a computer program that runs as a background process, rather than being under the direct control of an interactive user.
Secure Shell (SSH) is a cryptographic network protocol for operating network services securely over an unsecured network. The best known example application is for remote login to computer systems by users.
What best describes the principle of Separation of Concerns (SoC) in the context of computer science?
Please select exactly one correct alternative.
Answer
In computer science, separation of concerns (SoC) is a design principle for separating a computer program into distinct sections, such that each section addresses a separate concern. A concern is a set of information that affects the code of a computer program. A concern can be as general as the details of the hardware the code is being optimized for, or as specific as the name of a class to instantiate.
An enterprise service bus (ESB) implements a communication system between mutually interacting software applications in a service-oriented architecture (SOA). As it implements a distributed computing architecture, it implements a special variant of the more general client-server model, wherein, in general, any application using ESB can behave as server or client in turns. ESB promotes agility and flexibility with regard to high-level protocol communication between applications. The primary goal of the high-level protocol communication is enterprise application integration (EAI) of heterogeneous and complex service or application landscapes (a view from the network level).
What best describes a Federal Enterprise Architecture Framework (FEAF)?
Please select exactly one correct alternative.
Answer
A federal enterprise architecture framework (FEAF) is the enterprise architecture of a federal government. It provides a common approach for the integration of strategic, business and technology management as part of organization design and performance improvement.
The Internet of things (IoT) is the network of physical devices, vehicles, home appliances, and other items embedded with electronics, software, sensors, actuators, and network connectivity which enable these objects to connect and exchange data.
In which of the below cases should you use SVG instead of PNG?
Please select exactly one or more correct alternatives.
Answer
SVG stands for Scalable Vector Graphic. Scalable Vector Graphics (SVG) is an XML-based vector image format for two-dimensional graphics with support for interactivity and animation. It is a format in which a graphic is defined in text. If you want to minimize the size of your graphic and if you want to make your graphic scalable you can decide to create a vector graphic like SVG.
What does JIT stand for (in the context of computing)?
Please select exactly one correct alternative.
Answer
JIT stands for Just-in-time compilation. In computing, just-in-time (JIT) compilation, also known as dynamic translation, is a way of executing computer code that involves compilation during execution of a program - at run time - rather than prior to execution.
What is a Pointer (in the context of computer programming)?
Please select exactly one correct alternative.
Answer
In computer science, a pointer is a programming language object, whose value refers to (or "points to") another value stored elsewhere in the computer memory using its memory address. A pointer references a location in memory, and obtaining the value stored at that location is known as dereferencing the pointer.
Lazy loading is a design pattern commonly used in computer programming to defer initialization of an object until the point at which it is needed. It can contribute to efficiency in the program's operation if properly and appropriately used.
What is the difference between Lazy loading and Lazy initialization?
Please select exactly one correct alternative.
Answer
Lazy loading is a design pattern commonly used in computer programming to defer initialization of an object until the point at which it is needed. Lazy initialization is the tactic of delaying the creation of an object, the calculation of a value, or some other expensive process until the first time it is needed.
Please select exactly one or more correct alternatives.
Answer
Lazy evaluation is also called Call-by-need. Lazy evaluation is an evaluation strategy which delays the evaluation of an expression until its value is needed. Lazy evaluation avoids repeated evaluations. When using Lazy evaluation, performance increases by avoiding needless calculations, and error conditions in evaluating compound expressions.
In the context of Lazy loading, what is a Virtual proxy?
Please select exactly one correct alternative.
Answer
A Virtual Proxy is an object with the same interface as the real object. The first time one of its methods is called it loads the real object and then delegates.
A "ghost" is the object that is to be loaded in a partial state. It may only contain the object's identifier, but it loads its own data the first time one of its properties is accessed. For example, consider that a user is about to request content via an online form. At the time of creation all we know is that content will be accessed but what action or content is unknown.
Less is a CSS pre-processor, meaning that it extends the CSS language, adding features that allow variables, mixins, functions and many other techniques that allow you to make CSS that is more maintainable, themeable and extendable.
What best describes the 4+1 architecture View Model?
Please select exactly one correct alternative.
Answer
4+1 is a view model designed by Philippe Kruchten for "describing the architecture of software-intensive systems, based on the use of multiple, concurrent views". The views are used to describe the system from the viewpoint of different stakeholders, such as end-users, developers and project managers.
DevOps (a clipped compound of "development" and "operations") is a software engineering culture and practice that aims at unifying software development (Dev) and software operation (Ops). The main characteristic of the DevOps movement is to strongly advocate automation and monitoring at all steps of software construction, from integration, testing, releasing to deployment and infrastructure management. DevOps aims at shorter development cycles, increased deployment frequency, more dependable releases, in close alignment with business objectives.
Microservices is a variant of the service-oriented architecture (SOA) architectural style that structures an application as a collection of loosely coupled services. In a microservices architecture, services should be fine-grained and the protocols should be lightweight. The benefit of decomposing an application into different smaller services is that it improves modularity and makes the application easier to understand, develop and test. It also parallelizes development by enabling small autonomous teams to develop, deploy and scale their respective services independently. It also allows the architecture of an individual service to emerge through continuous refactoring. Microservices-based architectures enable continuous delivery and deployment.
A NoSQL (originally referring to "non SQL" or "non relational") database provides a mechanism for storage and retrieval of data that is modeled in means other than the tabular relations used in relational databases.
In software engineering, don't repeat yourself (DRY) is a principle of software development aimed at reducing repetition of software patterns, replacing them with abstractions; and several copies of the same data, using data normalization to avoid redundancy.
The DRY principle is stated as "Every piece of knowledge must have a single, unambiguous, authoritative representation within a system".
Which statement best describes the Abstraction principle?
Please select exactly one correct alternative.
Answer
In software engineering and programming language theory, the abstraction principle (or the principle of abstraction) is a basic dictum that aims to reduce duplication of information in a program (usually with emphasis on code duplication) whenever practical by making use of abstractions provided by the programming language or software libraries.
Which statement of statements are correct on Normalization of databases?
Choose none, 1 or more of the statements given.
Please select exactly one or more correct alternatives.
Answer
Database normalization, or simply normalization, is about the structure of a relational schema.
There are two aspects to Normalization:
(1) As a standard to which a database schema should conform in order to minimise redundant data and to prevent update anomalies. (aka "mistakes"). Most problems can be eliminated by using Fifth Normal Form.
(2) As a process for creating a database schema that conforms to the standard.(e.g. to Fifth Normal Form.)
Which of the below are valid goals of a Message Queuing Service?
Please select exactly one or more correct alternatives.
Answer
Valid goals are:
In general: a Message Queueing Service aims to eliminate the traditional overhead associated with operating in-house messaging infrastructures. These operating overheads include:
Specifically: unused capacity installed to meet peak demands
Specifically: projects idle time waiting for resource provisioning
Specifically: the need to isolate messaging resources
A message queueing service seeks to simplify access to messaging resources and therefore facilitate integration efforts within organizations and between them.
Human resources that are necessary to maintain messaging infrastructure
Improving response speed of web applications or distributed applications is, generally speaking, not a goal that can be reached using a Message Queueing Service. On the contrary, response times may be getting greater using such services.
Please select exactly one or more correct alternatives.
Answer
Hypermedia As The Engine Of Application State (HATEOAS) is a constraint of the REST application architecture that distinguishes it from other network application architectures.
With HATEOAS, a client interacts with a network application that application servers provide dynamically entirely through hypermedia. A REST client needs no prior knowledge about how to interact with an application or server beyond a generic understanding of hypermedia.
By contrast, clients and servers in some service-oriented architectures (SOA) interact through a fixed interface shared through documentation or an interface description language (IDL).
The way that the HATEOAS constraint decouples client and server enables the server functionality to evolve independently.
What is an idempotent operation (or service call)?
Please select exactly one correct alternative.
Answer
From a RESTful service standpoint, for an operation (or service call) to be idempotent, clients can make that same call repeatedly while producing the same result. In other words, making multiple identical requests has the same effect as making a single request. Note that while idempotent operations produce the same result on the server (no side effects), the response itself may not be the same (e.g. a resource's state may change between requests).
Function overloading (also method overloading) is a programming concept that allows programmers to define two or more functions with the same name and in the same scope.
What is a Constructor in Object-Oriented Programming?
Please select exactly one correct alternative.
Answer
In class-based object-oriented programming, a constructor (abbreviation: ctor) is a special type of subroutine called to create an object. It prepares the new object for use, often accepting arguments that the constructor uses to set required member variables.
WYSIWYG is an acronym for "what you see is what you get". In computing, a WYSIWYG editor is a system in which content (text and graphics) can be edited in a form closely resembling its appearance when printed or displayed as a finished product, such as a printed document, web page, or slide presentation.
The World Wide Web Consortium creates web standards (although adepts of specific vendors may not agree).
Reading
No resources given.
topics: architecture, level: 100
What is Coupling in software architecture?
Please select exactly one correct alternative.
Answer
In software engineering, coupling is the degree of interdependence between software modules; a measure of how closely connected two routines or modules are; the strength of the relationships between modules.
A microservices architecture is an approach to building a server application as a set of small services. Each service runs in its own process and communicates with other processes using protocols such as HTTP/HTTPS, WebSockets, or AMQP. Each microservice implements a specific end-to-end domain or business capability within a certain context boundary, and each must be developed autonomously and be deployable independently. Finally, each microservice should own its related domain data model and domain logic (sovereignty and decentralized data management) based on different data storage technologies (SQL, NoSQL) and different programming languages.
Minification (also minimisation or minimization), in computer programming languages and especially JavaScript, is the process of removing all unnecessary characters from source code without changing its functionality.
A Message Queueing Service is a message-oriented middleware or MOM deployed in a compute cloud using software as a service model. Service subscribers access queues and or topics to exchange data using point-to-point or publish and subscribe patterns.
Please select exactly one or more correct alternatives.
Answer
Common programming paradigms include:
imperative which allows side effects,
functional which disallows side effects,
declarative which does not state the order in which operations execute,
object-oriented which groups code together with the state the code modifies,
procedural which groups code into functions,
logic which has a particular style of execution model coupled to a particular style of syntax and grammar
symbolic programming which has a particular style of syntax and grammar.
semantic-oriented programming in which the programmer formulizes the logic of a domain by means of semantic structures.
Is Minification a good way of securing your source code?
Attention: multiple answers may be correct.
Please select exactly one or more correct alternatives.
Answer
Minification (also minimisation or minimization), in computer programming languages and especially JavaScript, is the process of removing all unnecessary characters from source code without changing its functionality. It reduces the amount of data that needs to be transferred. Minified source code may also be used as a kind of obfuscation, though the term obfuscation may be distinguished as a form of false cryptography while a minified code instance may be reversed using a pretty-printer. Minification can be distinguished from the more general concept of data compression in that the minified source can be interpreted immediately without the need for an uncompression step: the same interpreter can work with both the original as well as with the minified source.
Which statements on Cross Site History Manipulation (XSHM) are correct?
Please select exactly one or more correct alternatives.
Answer
Cross-Site History Manipulation (XSHM) is a SOP (Same Origin Policy) security breach. SOP is the most important security concept of modern browsers. SOP means that web pages from different origins by design cannot communicate with each other. Cross-Site History Manipulation breach is based on the fact that client-side browser history object is not properly partitioned on a per-site basis. Manipulating browser history may lead to SOP compromising, allow bi-directional CSRF and other exploitations such as: user privacy violation, login status detection, resources mapping, sensitive information inferring, users' activity tracking and URL parameter stealing.
Cross-Site Scripting (XSS) attacks are a type of injection, in which malicious scripts are injected into otherwise benign and trusted web sites. XSS attacks occur when an attacker uses a web application to send malicious code, generally in the form of a browser side script, to a different end user. Flaws that allow these attacks to succeed are quite widespread and occur anywhere a web application uses input from a user within the output it generates without validating or encoding it.
Cross-Site Request Forgery (CSRF) is an attack that forces an end user to execute unwanted actions on a web application in which they're currently authenticated. CSRF attacks specifically target state-changing requests, not theft of data, since the attacker has no way to see the response to the forged request. With a little help of social engineering (such as sending a link via email or chat), an attacker may trick the users of a web application into executing actions of the attacker's choosing. If the victim is a normal user, a successful CSRF attack can force the user to perform state changing requests like transferring funds, changing their email address, and so forth. If the victim is an administrative account, CSRF can compromise the entire web application.
Representational state transfer (REST) or RESTful web services are a way of providing interoperability between computer systems on the Internet. REST-compliant Web services allow requesting systems to access and manipulate textual representations of Web resources using a uniform and predefined set of stateless operations.
In programming languages, a type system is a set of rules that assigns a property called type to the various constructs of a computer program, such as variables, expressions, functions or modules. These types formalize and enforce the otherwise implicit categories the programmer uses for data structures and components (e.g. "string", "array of float", "function returning boolean").
IoT stands for: Internet of Things.
The Internet of things (IoT) is the network of physical devices, vehicles, home appliances, and other items embedded with electronics, software, sensors, actuators, and network connectivity which enable these objects to connect and exchange data.
Sass (syntactically awesome stylesheets) is a style sheet language initially designed by Hampton Catlin and developed by Natalie Weizenbaum. After its initial versions, Weizenbaum and Chris Eppstein continued to extend Sass with SassScript, a simple scripting language used in Sass files. Sass is a scripting language that is interpreted or compiled into Cascading Style Sheets (CSS).
Please select exactly one or more correct alternatives.
Answer
GET Requests data from a specified resource. POST Submits data to be processed to a specified resource. HEAD Is the same as GET but only returns HTTP headers and no document body. PUT Uploads a representation of the specified URI. DELETE Deletes the specified resource. OPTIONS Returns the HTTP methods that the server supports. CONNECT Converts the request connection to a transparent TCP/IP tunnel.
Responsive web design (RWD) is an approach to web design aimed at crafting sites to provide an optimal viewing and interaction experience easy reading and navigation with a minimum of resizing, panning, and scrolling across a wide range of devices (from desktop computer monitors to mobile phones).
Please select exactly one or more correct alternatives.
Answer
Please see the answers above. Common Object Request Broker Architecture (CORBA) is an architecture and specification for creating, distributing, and managing distributed program objects in a network. Named Pipes are used in SQL server. In computing, a named pipe (also known as a FIFO for its behavior) is an extension to the traditional pipe concept on Unix and Unix-like systems, and is one of the methods of inter-process communication (IPC).
How many items could you store in a SharePoint 2013 list?
Please select exactly one correct alternative.
Answer
SharePoint 2013 has software boundaries and limits. 30,000,000 per list are supported in SharePoint 2013. However, this value may vary depending on the number of columns in the list and the usage of the list.
In what ways SharePoint Add-ins can fit into a SharePoint website?
Please select exactly one or more correct alternatives.
Answer
An Add-in can be used as an immersive full-page experience that can have the look and feel of a SharePoint page. Also as part of a webpage, using a special kind of control, called an add-in part, to surface an iframe element that contains the add-in. And also as UI commands that extend ribbons and menus by adding the add-in to list items, documents, and more.
Suppose you want to secure an item in my Document Library. You therefore, create an audience so that only people in hat audience can see the item.
What do you think of this solution?
Please select exactly one correct alternative.
Answer
Creating an audience and using that for security is not a good solution. The end user may not be able to see the "secured" content or he may not be able to navigate to it directly, it is still possible to navigate directly (e.g. by typing a direct hyperlink to the content) co the content or finding it by using the search engine.
Which of the following code fragments are correct?
Please select exactly one or more correct alternatives.
Answer
1.75px is wrong because the amount of pixels can only be expressed in integer values. 0,75em is false because you have to use . instead of , for decimal values.
Please select exactly one or more correct alternatives.
Answer
The margin does not have a background color, and is completely transparent. The padding clears an area around the content (inside the border) of an element. The padding is affected by the background color of the element.
Please select exactly one or more correct alternatives.
Answer
POST requests are never cached, POST requests do not remain in the browser history, POST requests cannot be bookmarked, POST requests have no restrictions on data length.
Please select exactly one or more correct alternatives.
Answer
During usage of the web application, the page is dynamically changed, and resources are dynamically loaded and added to the page as necessary without the page being reloaded. This results in a more fluent user experience compared to classic web pages.
None of the above is the correct answer because the application throws an error because you have to use a web server (and the http protocol) to load the "data.json" data file.
MVVM stands for Model View ViewModel. It is a solution pattern allowing to develop applications with loose coupling and separation of concern which in turn improves testability, maintainability and extendibility of the software.
MVP stands for Model View Presenter. It is a solution pattern allowing to develop applications with loose coupling and separation of concern which in turn improves testability, maintainability and extendibility of the software.
MVC stands for Model View Controller. It is a solution pattern allowing to develop applications with loose coupling and separation of concern which in turn improves testability, maintainability and extendibility of the software.
AngularJS is an open-source web application framework written in JavaScript, maintained by Google and a community of individual developers and corporations. It is designed for developing single-page applications (SPA's).
Please select exactly one or more correct alternatives.
Answer
Each Angular application has exactly one root scope, but may have several child scopes. When Angular evaluates {{name}}, it first looks at the scope associated with the given element for the name property. If no such property is found, it searches the parent scope and so on until the root scope is reached.
The digest cycle processes all of the watchers of the current scope and its children. Because a watcher's listener can change the model, the $digest() keeps calling the watchers until no more listeners are firing.
In AngularJS "services" are the Singleton objects or functions that are used for carrying out specific tasks. It holds some business logic and these function can be called as controllers, directive, filters and so on.
JSON or JavaScript Object Notation, is an open standard format that uses human-readable text to transmit data objects consisting of attribute-value pairs. It is used primarily to transmit data between a server and web application, as an alternative to XML.
On $digest, AngularJS evaluates the scope model. On $apply, AngularJS triggers a $digest cycle. If an expression is passed to $apply(), it is evaluated first, before $digest() is executed.
What is the difference between linking and compiling in AngularJS?
Please select exactly one correct alternative.
Answer
The compile function is used for template DOM manipulation and collect all of the directives. The link function is used for registering DOM listeners as well as instance DOM manipulation. It is executed once the template has been cloned.
Reading
No resources given.
topics: javascript, level: 100
Which statements are correct on
null
,
empty
and
undefined
in JavaScript?
Please select exactly one or more correct alternatives.
A Service Application is a logical representation of a given service, and its security and management configuration which defines its operational behavior.
Which of the statements below are correct on AngularJS scopes?
Please select exactly one or more correct alternatives.
Answer
Each AngularJS application consist of one (1) root scope but may have several child scopes. As child controllers and some directives create new child scopes, the application can have multiple scopes. When new scopes are formed or created, they are added as a children of their parent scope. This is similar to DOM in which a hierarchical structure can be created as well.
Dependency Injection (DI) is a software design pattern that deals with how components get hold of their dependencies. The Angular injector subsystem is in charge of creating components, resolving their dependencies, and providing them to other components as requested.
For creating a directive, the factory method is used. It is invoked only once, when compiler matches the directive for the first time. By using $injector.invoke the factory method is invoked.
Scope refers to the application model. It acts like glue between application controller and the view. Scopes are arranged in hierarchical structure and impersonate the Document Object Model (DOM) structure of the application. It can watch expressions and propagate events.
Linking combines the directives with a scope and produce a live view. For registering DOM listeners as well as updating the DOM, the link function is responsible. After the template is cloned it is executed. There are two linking functions:
Pre-linking function: Pre-linking function is executed before the child elements are linked. It is not considered the safe way for DOM transformation.
Post linking function: Post linking function is executed after the child elements are linked. It is safe to do DOM transformation by post-linking function
In AngularJS, during the compilation process the compiler matches text and attributes using the interpolate service to see if they contains embedded expressions. As part of the normal digest cycle, these expressions are updated and registered as watches.
AngularJS routing enables to create different URLs for different content in your web application. Each URL in AngularJS is called a route. Having different URLs for different content enables the user to bookmark URLs to specific content, and share those URLs with others, for example:
What is Angular Protractor and what is it used for?
Please select exactly one correct alternative.
Answer
Protractor is an end-to-end test framework for AngularJS applications. Protractor runs tests against your application running in a real browser, interacting with it as a user would.
What is the difference between one way binding and two way binding?
Please select exactly one correct alternative.
Answer
In one way binding, changes in the model will be reflected in the view. In addition to this, in two way binding, changes in the view will be reflected in the model.
Which statements are correct on AngularJS directives?
Please select exactly one or more correct alternatives.
Answer
An AngularJS directive is like a marker on a DOM element which attaches a special behavior to it. Directives are markers on a DOM element (such as an attribute, element name, comment or CSS class) that tell AngularJS's HTML compiler ($compile) to attach a specified behavior to that DOM element or even transform the DOM element and its children.
AngularJS expressions are JavaScript-like code snippets that are usually placed in bindings such as {{ expression }}. There are, however, some differences with JavaScript expressions.
Data binding is the automatic synchronization (update)of data between the model and view components. The view is a projection of the model at all times. When the model changes, the view reflects the change, and vice versa. So when you update a control's value and this control is bound to a variable, the variable is changed automatically as well.
In AngularJS "services" are the Singleton objects or functions that are used for carrying out specific tasks. It holds some business logic and these function can be called as controllers, directive, filters and so on. You use them for implementing specific functionality that is used regularly in your JavaScript code. This makes your controllers' code "lean".
Reading
No resources given.
topics: sharepoint|multi tenancy, level: 100
What best describes multi tenancy?
Please select exactly one correct alternative.
Answer
Multi tenancy is the ability to manage and partition data of sites and otherwise shared services or software in order to accommodate multiple tenants.
Both functions execute a given function in a given time. But setTimeout only executes this function once, while setInterval schedules a repeating execution.
What is the correct equivalent of a table's rowspan in CSS?
Please select exactly one correct alternative.
Answer
There isn't a CSS equivalent for rowspan nor for colspan. The colspan and rowspan attributes make up the structure of the table, whereas CSS is for presentation, and HTML should be used for structural purposes.
What is the difference between PX, EM and Percent?
Please select exactly one correct alternative.
Answer
Pixel is a static measurement, while percent and EM are relative measurements. The size of an EM or percent depends on its parent. If the text size of body is 16 pixels, then 150% or 1.5 EM will be 24 pixels (1.5 * 16). Look at CSS Units for more measurement units.
Why is it not recommended to have many setInterval / setTimeout at the same time?
Please select exactly one correct alternative.
Answer
They cost a lot of CPU time. This could make your browser slow. Ofcourse, this depends on the processing power of your machine. In general, mobile devices are slower than e.g. desktop devices. It is preferred that a single setInterval / setTimeout call manages multiple animations.
Which of the following alternatives makes your text bold?
Please select exactly one or more correct alternatives.
Answer
"boldest" Is not a valid value for font-weight. Both "strong" and "em" adds so called "semantic importance" to the text. This is not specifically a style, but means that the text is "important".
Modernizr is a JavaScript library that detects HTML5 and CSS3 features in the user's browser. Taking advantage of cool new web technologies is great fun, until you have to support browsers that lag behind. Modernizr makes it easy for you to write conditional JavaScript and CSS to handle each situation, whether a browser supports a feature or not.
Which is the correct HTML tag for the largest heading in HTML?
Please select exactly one correct alternative.
Answer
<h1> is the largest header available. <h6> is much smaller. The <head> tag contains the header text of your web page and is not displayed as content. <heading> and <head> are not valid tags.
Please select exactly one or more correct alternatives.
Answer
rgba(0, 255, 0, "red") is an illegal construction, "red" should be a decimal value indicating opacity. rgba(0, 255, 0, 0.3) results in a green transparent text.
Reading
No resources given.
topics: css, level: 100
In which ways, colors can be specified Colors in CSS?
Please select exactly one or more correct alternatives.
Answer
All alternatives, except predefined or cross-browser floating point colour values, are valid.
Which of the alternative code fragments in your external CSS sheet is the correct syntax?
Please select exactly one correct alternative.
Answer
body { color: green; } is written in the correct syntax.
Reading
No resources given.
topics: css, level: 100
Some CSS properties are animatable. What does that mean?
Please select exactly one or more correct alternatives.
Answer
CSS properties that are animatable can be used in animations and transitions. These properties can change gradually from one value to another value, for example numbers, percentages, sizes and colors.
Reading
No resources given.
topics: css, level: 100
Will the "My title" header be printed in italics?
Suppose you have the following HTML web page implemented:
And you have the following external CSS stylesheet (style.css) implemented:
h1.makemered {
color:rgb(0,255,0);
}
Will the "My title" header be printed in italics?
Please select exactly one correct alternative.
Answer
The priority order is, generally speaking, from low to high:
External style sheet
Internal style sheet (in the head section)
Inline style (inside an HTML element)
Only the color will be overridden by the external style sheet, so the italics style will still be used. The header will be printed green and in italics.
Reading
No resources given.
topics: css, level: 100
What HTML attribute is used to define an inline style?
Please select exactly one correct alternative.
Answer
Inline styles are defined within style tags.
Reading
No resources given.
topics: css, level: 100
What is the priority order from low to high in which the styles are applied?
Please select exactly one correct alternative.
Answer
The priority order is, generally speaking, from low to high:
External style sheet
Internal style sheet (in the head section)
Inline style (inside an HTML element)
However: if you put the link to the external style sheet after the internal style sheet in your HTML <head>, and you do not use an inline style, your external style sheet will override your internal style sheet.
Why might it not be a good idea to underline text in your web page?
Please select exactly one correct alternative.
Answer
An underlined text looks much like a hyperlink, which may confuse the use when clicking it.
Reading
No resources given.
topics: css,css|text, level: 100
Which of the CSS alternatives makes your text bold?
Please select exactly one or more correct alternatives.
Answer
Only the "font-weight: 1000;" is incorrect because the value used is not valid. This value must be on of the following values: 100, 200, 300, 400, 500, 600, 700, 800, 900.
Which of the following alternatives makes your text bold?
Please select exactly one or more correct alternatives.
Answer
"boldest" Is not a valid value for font-weight. Both "strong" and "em" adds so called "semantic importance" to the text. This is not specifically a style, but means that the text is "important".
Which property do you use to change the left margin of an element?
Please select exactly one correct alternative.
Answer
Padding is used to determine the inside margin of an element, and what we want is setting the outside margin of an element. "text-indent" is used for texts and only indents the first line of the text.
In computing, reactive programming is an asynchronous programming paradigm concerned with data streams and the propagation of change. This means that it becomes possible to express static (e.g. arrays) or dynamic (e.g. event emitters) data streams with ease via the employed programming language(s), and that an inferred dependency within the associated execution model exists, which facilitates the automatic propagation of the change involved with data flow.
What does "semantic importance" mean in the context of HTML?
Please select exactly one correct alternative.
Answer
Semantic HTML is the use of HTML markup to reinforce the semantics, or meaning, of the information in webpages rather than merely to define its presentation or look.
In what frame is the URL opened using the following code fragment?
Please select exactly one correct alternative.
Answer
The URL is opened in a frame named "_new". However, since this looks like one of the standard target frame types (_blank, _self, _parent, _top), this is bad practice. If you want your URL to open in a frame with a name, you should give this frame a well distinguished name.
Which of the following is true about ng-controller directive?
Please select exactly one correct alternative.
Answer
ng-controller directive tells AngularJS what controller to use with this view. AngularJS application mainly relies on controllers to control the flow of data in the application. A controller is a JavaScript object containing attributes/properties and functions. Each controller accepts $scope as a parameter which refers to the application/module that controller is to control.
Reading
No resources given.
topics: bootstrap, level: 100
What is a Media Query?
Please select exactly one correct alternative.
Answer
Media queries are used to define different style rules for different media types/devices.
Which of the following rules apply for if statements in PowerShell?
Please select exactly one or more correct alternatives.
Answer
The depending statement must be in braces. The boolean condition has to be in parentheses. PowerShell commands are case-insensitive, so you can use If, if, or IF. The same applies to else. The statement that there must be an else defined is nonsense.
Why should you always specify a width and height when using an
<img>
element?
Please select exactly one correct alternative.
Answer
If width and height are not specified, the page will flicker while the image loads. This is because the page will finalize it's layout after loading the image. Only then, the width and height are known to the browser.
"Mobile first", unobtrusive JavaScript, and progressive enhancement are related concepts that predate RWD. Browsers of basic mobile phones do not understand JavaScript or media queries, so a recommended practice is to create a basic web site and enhance it for smart phones and PCs, rather than rely on graceful degradation to make a complex, image-heavy site work on mobile phones.