This function is commonly used to transform each element in a list and return a new list.
What is Enum.map?
This type of attack attempts to trick users into revealing sensitive information through deceptive emails or websites.
What is phishing?
This SQL statement is used to retrieve data from one or more database tables.
What is SELECT?
This keyword is used to define a method that can be awaited asynchronously.
What is async?
This Seattle-based band released the landmark 1991 album Nevermind.
Who is Nirvana?
This OTP behavior is typically used for maintaining state and handling synchronous or asynchronous messages in a single process.
What is a GenServer?
This principle states that users and systems should only have the minimum permissions necessary to perform their tasks.
What is the Principle of Least Privilege?
This index type stores the actual table data in sorted order based on the index key and allows only one per table.
What is a clustered index?
This collection type provides key-value storage with thread-safe operations for concurrent access.
What is ConcurrentDictionary?
This Pearl Jam debut album featured tracks like “Alive,” “Jeremy,” and “Even Flow.”
What is Ten?
This operator pipes the result of one expression into the first argument of the next function call.
What is the pipe operator (|>)?
This type of vulnerability allows attackers to inject malicious commands or queries into an application through unsanitized input.
What is injection (such as SQL injection)?
This SQL Server feature automatically tracks historical changes to rows using system-versioned tables.
What are Temporal Tables?
This C# feature allows methods with the same name to exist with different parameter signatures.
What is method overloading?
This Soundgarden song includes the lyric, “I’m looking California and feeling Minnesota.”
What is Outshined?
This data structure stores key-value pairs and allows pattern matching against specific keys.
What is a Map?
This security model assumes that no user, device, or network should be automatically trusted, even inside the corporate perimeter.
What is Zero Trust?
This isolation mechanism uses row versioning to reduce blocking between readers and writers, increasing tempdb usage.
What is Read Committed Snapshot Isolation (RCSI)?
This garbage collection generation is intended for short-lived objects and is collected most frequently.
What is Generation 0 (Gen 0)?
This grunge supergroup featured members of Soundgarden and Pearl Jam and released the song “Hunger Strike.”
Who is Temple of the Dog?
This BEAM feature allows lightweight processes to recover automatically through hierarchical fault-tolerance strategies defined in OTP.
What are Supervisors (or the Supervisor tree model)?
This attack technique involves encrypting an organization’s data and demanding payment in exchange for the decryption key.
What is ransomware?
This common performance issue occurs when SQL Server caches an execution plan optimized for one parameter value that performs poorly for others.
What is parameter sniffing?
This keyword prevents inheritance of a class or overriding of a method.
What is sealed?
This Alice in Chains guitarist and songwriter co-founded the band and wrote many of its darkest, harmony-driven songs.
Who is Jerry Cantrell?