HansR on the Web - All quiz questions on software engineering
Updated: 14-03-2018 23:42:08h
topics: software engineering, level: 100
What is DTAP in the context of software testing and deployment?
Please select exactly one correct alternative.

Answer

The acronym DTAP is short for Development, Testing, Acceptance and Production. It is a rather common acronym in ICT expressing a phased approach of software testing and deployment.
topics: software engineering, level: 100
Which are valid principles in Agile Software Development according to the Manifesto for Agile Software Development?
Please select exactly one or more correct alternatives.

Answer

The Manifesto for Agile Software Development is based on twelve principles:

  • Customer satisfaction by early and continuous delivery of valuable software
  • Welcome changing requirements, even in late development
  • Working software is delivered frequently (weeks rather than months)
  • Close, daily cooperation between business people and developers
  • Projects are built around motivated individuals, who should be trusted
  • Face-to-face conversation is the best form of communication (co-location)
  • Working software is the primary measure of progress
  • Sustainable development, able to maintain a constant pace
  • Continuous attention to technical excellence and good design
  • Simplicity - the art of maximizing the amount of work not done - is essential
  • Best architectures, requirements, and designs emerge from self-organizing teams
  • Regularly, the team reflects on how to become more effective, and adjusts accordingly

Reading

No resources given.
topics: software engineering, level: 100
What best describes Serialization?
Please select exactly one correct alternative.

Answer

In computer science, in the context of data storage, serialization is the process of translating data structures or object state into a format that can be stored (for example, in a file or memory buffer) or transmitted (for example, across a network connection link) and reconstructed later (possibly in a different computer environment). When the resulting series of bits is reread according to the serialization format, it can be used to create a semantically identical clone of the original object.

Reading

Serialization
topics: software engineering, level: 100
What best describes Test-driven development?
Please select exactly one correct alternative.

Answer

Test-driven development (TDD) is a software development process that relies on the repetition of a very short development cycle: Requirements are turned into very specific test cases, then the software is improved to pass the new tests, only. This is opposed to software development that allows software to be added that is not proven to meet requirements.
topics: software engineering, level: 100
What best describes an Assertion?
Please select exactly one correct alternative.

Answer

In computer programming, an assertion is a statement that a predicate (Boolean-valued function, i.e. a true–false expression) is expected to always be true at that point in the code. If an assertion evaluates to false at run time, an assertion failure results, which typically causes the program to crash, or to throw an assertion exception.
topics: software engineering|architecture, level: 100
What best describes a Race Condition?
Please select exactly one correct alternative.

Answer

A race condition or race hazard is the behavior of an electronics, software, or other system where the output is dependent on the sequence or timing of other uncontrollable events. It becomes a bug when events do not happen in the order the programmer intended.

Reading

Race condition
topics: software engineering|architecture, level: 100
What best describes the Microservices architecture style?
Please select exactly one correct alternative.

Answer

A microservices architecture consists of a collection of small, autonomous services. Each service is self-contained and should implement a single business capability.
topics: software engineering|architecture, level: 100
What best describes Transient Faults?
Please select exactly one correct alternative.

Answer

When cloud-based applications use other cloud-based services, errors can occur because of temporary conditions such as intermittent service, infrastructure-level faults, or network issues. Very often, if you retry the operation a short time later (maybe only a few milliseconds later) the operation may succeed. These types of error conditions are referred to as transient faults. Transient faults typically occur very infrequently, and in most cases, only a few retries are necessary for the operation to succeed.
topics: software engineering, level: 100
What best describes the principle of Separation of Concerns (SoC) in the context of computer science?
Please select exactly one correct alternative.

Answer

In computer science, separation of concerns (SoC) is a design principle for separating a computer program into distinct sections, such that each section addresses a separate concern. A concern is a set of information that affects the code of a computer program. A concern can be as general as the details of the hardware the code is being optimized for, or as specific as the name of a class to instantiate.
topics: software engineering, level: 100
What best describes a Pointer in the context of Computer science?
Please select exactly one correct alternative.

Answer

In computer science, a pointer is a programming language object, whose value refers to (or "points to") another value stored elsewhere in the computer memory using its memory address. A pointer references a location in memory, and obtaining the value stored at that location is known as dereferencing the pointer.
topics: software engineering, level: 100
What best describes Systems Engineering?
Please select exactly one correct alternative.

Answer

Systems engineering is an interdisciplinary field of engineering and engineering management that focuses on how to design and manage complex systems over their life cycles. At its core, systems engineering utilizes systems thinking principles to organize this body of knowledge. Issues such as requirements engineering, reliability, logistics, coordination of different teams, testing and evaluation, maintainability and many other disciplines necessary for successful system development, design, implementation, and ultimate decommission become more difficult when dealing with large or complex projects.
topics: software engineering, level: 100
What best describes Requirements engineering?
Please select exactly one correct alternative.

Answer

Requirements engineering (RE) refers to the process of defining, documenting and maintaining requirements in the engineering design process. It is a common role in systems engineering and software engineering.
topics: software engineering,architecture, level: 100
What best describes BizTalk?
Please select exactly one correct alternative.

Answer

Microsoft BizTalk Server (or simply "BizTalk") is an Inter-Organizational Middleware System (IOMS) that enables companies to automate business processes, through the use of adapters which are tailored to communicate with different software systems used in an enterprise.
topics: software engineering|databases, level: 100
Which statements are true on Data Warehouses?
Select none, 1 or more of the given statements.
Please select exactly one or more correct alternatives.

Answer

In computing, a data warehouse (DW or DWH), also known as an enterprise data warehouse (EDW), is a system used for reporting and data analysis, and is considered a core component of business intelligence. DWs are central repositories of integrated data from one or more disparate sources. They store current and historical data in one single place that are used for creating analytical reports for workers throughout the enterprise.

Reading

Data warehouse
topics: software engineering, level: 100
In the context of computer science, what is a Reference?
Please select exactly one correct alternative.

Answer

In computer science, a reference is a value that enables a program to indirectly access a particular datum, such as a variable's value or a record, in the computer's memory or in some other storage device. The reference is said to refer to the datum, and accessing the datum is called dereferencing the reference.
topics: software engineering, level: 100
What best describes Docker?
Please select exactly one correct alternative.

Answer

Docker is a software technology providing operating-system-level virtualization also known as containers, promoted by the company Docker, Inc. Docker provides an additional layer of abstraction and automation of operating-system-level virtualization on Windows and Linux.

Reading

Docker
topics: software engineering, level: 100
What best describes the Single Source of Truth (SSOT) principle?
Please select exactly one correct alternative.

Answer

In information systems design and theory, single source of truth (SSOT), is the practice of structuring information models and associated schemata such that every data element is stored exactly once.
topics: software engineering, level: 100
What best describes Software Engineering?
Please select exactly one correct alternative.

Answer

Software Engineering is the application of engineering to the development of software in a systematic method.
topics: software engineering|webassembly, level: 100
Which statements are correct on WebAssembly?
Please select exactly one or more correct alternatives.

Answer

WebAssembly (wasm, WA) is web standard that defines a binary format and a corresponding assembly-like text format for executable code in Web pages. It is meant to enable executing code nearly as fast as running native machine code. It was envisioned to complement JavaScript to speed up performance-critical parts of web applications and later on to enable web development in other languages than JavaScript. It is developed at the World Wide Web Consortium (W3C) with engineers from Mozilla, Microsoft, Google and Apple. It is executed in a sandbox in the web browser after a formal verification step. Programs can be compiled from high-level languages into wasm modules and loaded as libraries from within JavaScript applets.

Reading

WebAssembly
topics: software engineering|databases, level: 100
What best describes a Federated Database System?
Please select exactly one correct alternative.

Answer

A Federated Database System is a type of meta-database management system (DBMS), which transparently maps multiple autonomous database systems into a single federated database. The constituent databases are interconnected via a computer network and may be geographically decentralized. Since the constituent database systems remain autonomous, a federated database system is a contrastable alternative to the (sometimes daunting) task of merging several disparate databases. A federated database, or virtual database, is a composite of all constituent databases in a federated database system. There is no actual data integration in the constituent disparate databases as a result of data federation.
topics: software engineering,architecture, level: 100
What best describes Representational state transfer?
Please select exactly one correct alternative.

Answer

Representational state transfer (REST) or RESTful web services are a way of providing interoperability between computer systems on the Internet. REST-compliant Web services allow requesting systems to access and manipulate textual representations of Web resources using a uniform and predefined set of stateless operations.
topics: software engineering,architecture, level: 100
What best describes Service discovery?
Please select exactly one correct alternative.

Answer

Service discovery is the automatic detection of devices and services offered by these devices on a computer network. A service discovery protocol (SDP) is a network protocol that helps accomplish service discovery.
topics: software engineering,architecture, level: 100
What best describes SOAP?
Please select exactly one correct alternative.

Answer

SOAP (originally Simple Object Access Protocol) is a protocol specification for exchanging structured information in the implementation of web services in computer networks. Its purpose is to induce extensibility, neutrality and independence. It uses XML Information Set for its message format, and relies on application layer protocols, most often Hypertext Transfer Protocol (HTTP) or Simple Mail Transfer Protocol (SMTP), for message negotiation and transmission.

Reading

SOAP
topics: software engineering|databases, level: 100
What best describes Data integration?
Please select exactly one correct alternative.

Answer

Data integration involves combining data residing in different sources and providing users with a unified view of them. This process becomes significant in a variety of situations, which include both commercial (such as when two similar companies need to merge their databases) and scientific (combining research results from different bioinformatics repositories, for example) domains. Data integration appears with increasing frequency as the volume (that is, big data) and the need to share existing data explodes. It has become the focus of extensive theoretical work, and numerous open problems remain unsolved.
topics: software engineering,architecture, level: 100
What best describes iOS?
Please select exactly one correct alternative.

Answer

iOS (formerly iPhone OS) is a mobile operating system created and developed by Apple Inc. exclusively for its hardware. It is the operating system that presently powers many of the company's mobile devices, including the iPhone, iPad, and iPod Touch.

Reading

iOS
topics: software engineering,architecture, level: 100
What best describes WDSL?
Please select exactly one correct alternative.

Answer

The Web Services Description Language is an XML-based interface definition language that is used for describing the functionality offered by a web service.
topics: software engineering,architecture, level: 100
What best describes the Advanced Message Queuing Protocol?
Please select exactly one correct alternative.

Answer

The Advanced Message Queuing Protocol (AMQP) is an open standard application layer protocol for message-oriented middleware. The defining features of AMQP are message orientation, queuing, routing (including point-to-point and publish-and-subscribe), reliability and security.
topics: software engineering,architecture, level: 100
Which statements are correct on MQTT?
Select none, one or more of the given statements.
Please select exactly one or more correct alternatives.

Answer

MQTT (MQ Telemetry Transport or Message Queuing Telemetry Transport) is an ISO standard (ISO/IEC PRF 20922) publish-subscribe-based messaging protocol. It works on top of the TCP/IP protocol. It is designed for connections with remote locations where a "small code footprint" is required or the network bandwidth is limited. The publish-subscribe messaging pattern requires a message broker.

Reading

MQTT
topics: software engineering,architecture, level: 100
What best describes Node-RED?
Please select exactly one correct alternative.

Answer

Node-RED is a flow-based development tool developed originally by IBM for wiring together hardware devices, APIs and online services as part of the Internet of Things.
Node-RED provides a browser-based flow editor, which can be used to create JavaScript functions. Elements of applications can be saved or shared for re-use. The runtime is built on Node.js. The flows created in Node-RED are stored using JSON. Since version 0.14 MQTT nodes can make properly configured TLS connections.

Reading

Node-RED
topics: software engineering,architecture, level: 100
Which statements are correct on the LAMP stack and the MEAN stack?
Select none, one or more alternatives.
Please select exactly one or more correct alternatives.

Answer

LAMP is an archetypal model of web service stacks, named as an acronym of the names of its original four open-source components: the Linux operating system, the Apache HTTP Server, the MySQL relational database management system (RDBMS), and the PHP programming language.
MEAN is a free and open-source JavaScript software stack for building dynamic web sites and web applications. The MEAN stack is MongoDB, Express.js, AngularJS (or Angular), and Node.js. Because all components of the MEAN stack support programs are written in JavaScript, MEAN applications can be written in one language for both server-side and client-side execution environments.
topics: software engineering, level: 100
What best describes a Fork?
Please select exactly one correct alternative.

Answer

In computing, particularly in the context of the Unix operating system and its workalikes, fork is an operation whereby a process creates a copy of itself. It is usually a system call, implemented in the kernel. Fork is the primary (and historically, only) method of process creation on Unix-like operating systems.
topics: software engineering,architecture, level: 100
What best describes Secure Shell (SSH) ?
Please select exactly one correct alternative.

Answer

Secure Shell (SSH) is a cryptographic network protocol for operating network services securely over an unsecured network. The best known example application is for remote login to computer systems by users.

Reading

Secure Shell
topics: software engineering, level: 100
What best describes a Deamon in the context of computing?
Please select exactly one correct alternative.

Answer

In multitasking computer operating systems, a Daemon is a computer program that runs as a background process, rather than being under the direct control of an interactive user.
topics: software engineering|security,architecture|security, level: 100
What does XSHM stand for?
Please select exactly one correct alternative.

Answer

XSHM stands for Cross-Site History Manipulation.
topics: software engineering, level: 100
What is a Constructor in Object-Oriented Programming?
Please select exactly one correct alternative.

Answer

In class-based object-oriented programming, a constructor (abbreviation: ctor) is a special type of subroutine called to create an object. It prepares the new object for use, often accepting arguments that the constructor uses to set required member variables.
topics: software engineering|security,architecture|security, level: 100
What is Cross-Site Scripting (XSS)?
Please select exactly one correct alternative.

Answer

Cross-Site Scripting (XSS) attacks are a type of injection, in which malicious scripts are injected into otherwise benign and trusted web sites. XSS attacks occur when an attacker uses a web application to send malicious code, generally in the form of a browser side script, to a different end user. Flaws that allow these attacks to succeed are quite widespread and occur anywhere a web application uses input from a user within the output it generates without validating or encoding it.
topics: software engineering|security,architecture|security, level: 100
What does CSRF stand for?
Please select exactly one correct alternative.

Answer

CSRF stands for Cross-Site Request Forgery.
topics: software engineering|paradigm, level: 100
What is a programming paradigm?
Please select exactly one correct alternative.

Answer

Programming paradigms are a way to classify programming languages based on their features. Languages can be classified into multiple paradigms.
topics: software engineering, level: 100
What is a Type System?
Please select exactly one correct alternative.

Answer

In programming languages, a type system is a set of rules that assigns a property called type to the various constructs of a computer program, such as variables, expressions, functions or modules. These types formalize and enforce the otherwise implicit categories the programmer uses for data structures and components (e.g. "string", "array of float", "function returning boolean").

Reading

Type system
topics: software engineering,architecture, level: 100
What best describes the term RESTful?
Please select exactly one correct alternative.

Answer

Representational state transfer (REST) or RESTful web services are a way of providing interoperability between computer systems on the Internet. REST-compliant Web services allow requesting systems to access and manipulate textual representations of Web resources using a uniform and predefined set of stateless operations.
topics: software engineering|security,architecture|security, level: 100
What is Cross-Site Request Forgery (CSRF)?
Please select exactly one correct alternative.

Answer

Cross-Site Request Forgery (CSRF) is an attack that forces an end user to execute unwanted actions on a web application in which they're currently authenticated. CSRF attacks specifically target state-changing requests, not theft of data, since the attacker has no way to see the response to the forged request. With a little help of social engineering (such as sending a link via email or chat), an attacker may trick the users of a web application into executing actions of the attacker's choosing. If the victim is a normal user, a successful CSRF attack can force the user to perform state changing requests like transferring funds, changing their email address, and so forth. If the victim is an administrative account, CSRF can compromise the entire web application.
topics: software engineering|security,architecture|security, level: 100
What does XSS stand for?
Please select exactly one correct alternative.

Answer

XSS stands for Cross-Site Scripting.
topics: software engineering|security,architecture|security, level: 100
Which statements on Cross Site History Manipulation (XSHM) are correct?
Please select exactly one or more correct alternatives.

Answer

Cross-Site History Manipulation (XSHM) is a SOP (Same Origin Policy) security breach. SOP is the most important security concept of modern browsers. SOP means that web pages from different origins by design cannot communicate with each other. Cross-Site History Manipulation breach is based on the fact that client-side browser history object is not properly partitioned on a per-site basis. Manipulating browser history may lead to SOP compromising, allow bi-directional CSRF and other exploitations such as: user privacy violation, login status detection, resources mapping, sensitive information inferring, users' activity tracking and URL parameter stealing.
topics: software engineering, level: 100
Is Minification a good way of securing your source code?
Attention: multiple answers may be correct.
Please select exactly one or more correct alternatives.

Answer

Minification (also minimisation or minimization), in computer programming languages and especially JavaScript, is the process of removing all unnecessary characters from source code without changing its functionality. It reduces the amount of data that needs to be transferred. Minified source code may also be used as a kind of obfuscation, though the term obfuscation may be distinguished as a form of false cryptography while a minified code instance may be reversed using a pretty-printer. Minification can be distinguished from the more general concept of data compression in that the minified source can be interpreted immediately without the need for an uncompression step: the same interpreter can work with both the original as well as with the minified source.
topics: software engineering, level: 100
What is an idempotent operation (or service call)?
Please select exactly one correct alternative.

Answer

From a RESTful service standpoint, for an operation (or service call) to be idempotent, clients can make that same call repeatedly while producing the same result. In other words, making multiple identical requests has the same effect as making a single request. Note that while idempotent operations produce the same result on the server (no side effects), the response itself may not be the same (e.g. a resource's state may change between requests).
topics: software engineering, level: 100
What does WYSIWYG stand for?
Please select exactly one correct alternative.

Answer

WYSIWYG is an acronym for "what you see is what you get". In computing, a WYSIWYG editor is a system in which content (text and graphics) can be edited in a form closely resembling its appearance when printed or displayed as a finished product, such as a printed document, web page, or slide presentation.

Reading

WYSIWYG
topics: software engineering, level: 100
What is Function Overloading?
Please select exactly one correct alternative.

Answer

Function overloading (also method overloading) is a programming concept that allows programmers to define two or more functions with the same name and in the same scope.
topics: software engineering, level: 100
What is Type Inference?
Please select exactly one correct alternative.

Answer

Type Inference refers to the automatic detection of the data type of an expression in a programming language.

Reading

Type Inference
topics: software engineering|paradigm, level: 100
Which are common programming paradigms?
Please select exactly one or more correct alternatives.

Answer

Common programming paradigms include:
imperative which allows side effects,
functional which disallows side effects,
declarative which does not state the order in which operations execute,
object-oriented which groups code together with the state the code modifies,
procedural which groups code into functions,
logic which has a particular style of execution model coupled to a particular style of syntax and grammar symbolic programming which has a particular style of syntax and grammar.
semantic-oriented programming in which the programmer formulizes the logic of a domain by means of semantic structures.
topics: software engineering|databases, level: 100
What best describes NoSQL?
Please select exactly one correct alternative.

Answer

A NoSQL (originally referring to "non SQL" or "non relational") database provides a mechanism for storage and retrieval of data that is modeled in means other than the tabular relations used in relational databases.

Reading

NoSQL
topics: software engineering, level: 100
Who is making the Web standards?
Please select exactly one correct alternative.

Answer

The World Wide Web Consortium creates web standards (although adepts of specific vendors may not agree).

Reading

No resources given.
topics: software engineering|patterns, level: 100
In the context of Lazy loading, what is a Virtual proxy?
Please select exactly one correct alternative.

Answer

A Virtual Proxy is an object with the same interface as the real object. The first time one of its methods is called it loads the real object and then delegates.

Reading

Virtual proxy
topics: software engineering|architecture, level: 100
Where does your Javascript file run when you double click on it on your computer's file system? Select the correct container.
Please select exactly one correct alternative.

Answer

Application server and your Windows personal computer. To be precise: your scripting host will run the script.

Reading

No resources given.
topics: software engineering, level: 100
Which statement best describes the Abstraction principle?
Please select exactly one correct alternative.

Answer

In software engineering and programming language theory, the abstraction principle (or the principle of abstraction) is a basic dictum that aims to reduce duplication of information in a program (usually with emphasis on code duplication) whenever practical by making use of abstractions provided by the programming language or software libraries.
topics: software engineering,architecture, level: 100
Which statement best describes the DRY principle?
Please select exactly one correct alternative.

Answer

In software engineering, don't repeat yourself (DRY) is a principle of software development aimed at reducing repetition of software patterns, replacing them with abstractions; and several copies of the same data, using data normalization to avoid redundancy. The DRY principle is stated as "Every piece of knowledge must have a single, unambiguous, authoritative representation within a system".
topics: software engineering|service orientation, level: 100
What best described Microservices?
Please select exactly one correct alternative.

Answer

Microservices is a variant of the service-oriented architecture (SOA) architectural style that structures an application as a collection of loosely coupled services. In a microservices architecture, services should be fine-grained and the protocols should be lightweight. The benefit of decomposing an application into different smaller services is that it improves modularity and makes the application easier to understand, develop and test. It also parallelizes development by enabling small autonomous teams to develop, deploy and scale their respective services independently. It also allows the architecture of an individual service to emerge through continuous refactoring. Microservices-based architectures enable continuous delivery and deployment.

Reading

Microservices
topics: software engineering|patterns, level: 100
Which statements on HATEOAS are correct?
Please select exactly one or more correct alternatives.

Answer

Hypermedia As The Engine Of Application State (HATEOAS) is a constraint of the REST application architecture that distinguishes it from other network application architectures. With HATEOAS, a client interacts with a network application that application servers provide dynamically entirely through hypermedia. A REST client needs no prior knowledge about how to interact with an application or server beyond a generic understanding of hypermedia. By contrast, clients and servers in some service-oriented architectures (SOA) interact through a fixed interface shared through documentation or an interface description language (IDL). The way that the HATEOAS constraint decouples client and server enables the server functionality to evolve independently.
topics: software engineering|tools, level: 100
What is Heroku?
Please select exactly one correct alternative.

Answer

Heroku is a cloud platform as a service (PaaS) supporting several programming languages that is used as a web application deployment model.
topics: software engineering,management, level: 100
What best describes DevOps?
Please select exactly one correct alternative.

Answer

DevOps (a clipped compound of "development" and "operations") is a software engineering culture and practice that aims at unifying software development (Dev) and software operation (Ops). The main characteristic of the DevOps movement is to strongly advocate automation and monitoring at all steps of software construction, from integration, testing, releasing to deployment and infrastructure management. DevOps aims at shorter development cycles, increased deployment frequency, more dependable releases, in close alignment with business objectives.

Reading

DevOps
topics: software engineering|patterns, level: 100
In the context of Lazy loading, what is a Ghost?
Please select exactly one correct alternative.

Answer

A "ghost" is the object that is to be loaded in a partial state. It may only contain the object's identifier, but it loads its own data the first time one of its properties is accessed. For example, consider that a user is about to request content via an online form. At the time of creation all we know is that content will be accessed but what action or content is unknown.

Reading

Ghost
topics: software engineering, level: 100
What is Minification?
Please select exactly one correct alternative.

Answer

Minification (also minimisation or minimization), in computer programming languages and especially JavaScript, is the process of removing all unnecessary characters from source code without changing its functionality.
topics: software engineering|patterns, level: 100
Which statements are correct on Lazy evaluation?
Please select exactly one or more correct alternatives.

Answer

Lazy evaluation is also called Call-by-need. Lazy evaluation is an evaluation strategy which delays the evaluation of an expression until its value is needed. Lazy evaluation avoids repeated evaluations. When using Lazy evaluation, performance increases by avoiding needless calculations, and error conditions in evaluating compound expressions.

Reading

Lazy evaluation
topics: software engineering|patterns, level: 100
What is the difference between Lazy loading and Lazy initialization?
Please select exactly one correct alternative.

Answer

Lazy loading is a design pattern commonly used in computer programming to defer initialization of an object until the point at which it is needed. Lazy initialization is the tactic of delaying the creation of an object, the calculation of a value, or some other expensive process until the first time it is needed.
topics: software engineering|patterns, level: 100
What is Eager loading?
Please select exactly one correct alternative.

Answer

Eager loading is the opposite of lazy loading; initializing an object as soon as possible.

Reading

Lazy loading
topics: software engineering|patterns, level: 100
What is Lazy Loading?
Please select exactly one correct alternative.

Answer

Lazy loading is a design pattern commonly used in computer programming to defer initialization of an object until the point at which it is needed. It can contribute to efficiency in the program's operation if properly and appropriately used.

Reading

Lazy loading
topics: software engineering, level: 100
What is a Pointer (in the context of computer programming)?
Please select exactly one correct alternative.

Answer

In computer science, a pointer is a programming language object, whose value refers to (or "points to") another value stored elsewhere in the computer memory using its memory address. A pointer references a location in memory, and obtaining the value stored at that location is known as dereferencing the pointer.
topics: software engineering, level: 100
What does JIT stand for (in the context of computing)?
Please select exactly one correct alternative.

Answer

JIT stands for Just-in-time compilation. In computing, just-in-time (JIT) compilation, also known as dynamic translation, is a way of executing computer code that involves compilation during execution of a program - at run time - rather than prior to execution.
topics: software engineering|graphics, level: 100
In which of the below cases should you use SVG instead of PNG?
Please select exactly one or more correct alternatives.

Answer

SVG stands for Scalable Vector Graphic. Scalable Vector Graphics (SVG) is an XML-based vector image format for two-dimensional graphics with support for interactivity and animation. It is a format in which a graphic is defined in text. If you want to minimize the size of your graphic and if you want to make your graphic scalable you can decide to create a vector graphic like SVG.
topics: software engineering|patterns, level: 100
In the context of Lazy loading, what is a Value holder?
Please select exactly one correct alternative.

Answer

A value holder is a generic object that handles the lazy loading behavior, and appears in place of the object's data fields.

Reading

Value holder
topics: software engineering|patterns, level: 100
What is Reactive Programming?
Please select exactly one correct alternative.

Answer

In computing, reactive programming is an asynchronous programming paradigm concerned with data streams and the propagation of change. This means that it becomes possible to express static (e.g. arrays) or dynamic (e.g. event emitters) data streams with ease via the employed programming language(s), and that an inferred dependency within the associated execution model exists, which facilitates the automatic propagation of the change involved with data flow.
That's all folks!

Congratulations, you've made it to the end! I'll try to add more questions and topics on a regular basis.

More questions?

If you have enjoyed the quiz and you want more, you can select other tests by clicking the green buttons below.

Other resources

There are many quizzes and learning resources on the internet. Below you'll links to a selection of these. I'll add more. Quizzes from others
Learning resources
Take a look at my blog

Contact

Please contact me for feedback, suggestions and questions. hansrontheweb@live.com
Other quizzes

all topics
latest questions
html
css
javascript
jquery
bootstrap
architecture
software engineering
c#
sharepoint
xml
powershell
angular