A template providing the data structure, initial values, and methods for creating an object at run time.
What is a class?
This potentially haphazard syntax overrides the cascade and gives a style rule the highest precedence.
What is "!important"?
A type of attack that may enable an attacker to"; DELETE FROM importantTables--
What is SQL injection?
A system which translates a domain name to an IP address.
What is a DNS? (Domain Name System)
Persons or parties who have a states or implied interest in the software.
What are stakeholders?
A type of loop which iterates over all enumerable property keys of an object.
This combinator selector allows you to select all elements that are the direct children of an element.
What is ">"? (e.g. div > p)
This is the number one cause of data breaches.
What are weak/stolen passwords?
A globally distributed network of servers serving static content from locations closer to the user.
What is a CDN? (Content Delivery Network)
A phase of software testing by the the end-user to determine that an application is working as intended.
What is user acceptance testing?
The mechanism by which JavaScript objects inherit features from one another.
What is the prototype chain?
The flex shorthand syntax can specify these three values to describe how an item will grow or shrink to fit available space in its flex container.
What are flex-grow, flex-shrink, and flex-basis?
A type of a attack that occurs when using a web application send malicious code, generally in the form of a browser side script, to a different end user.
What is an XSS attack?
A system which distributes client requests to one of potentially many servers/databases and returns the response to the appropriate client.
What is a load balancer?
A type of logic which is governed by business rules, such as "A customer cannot drop a class after a specific date."
What is business logic?
(function () {
// A function that is run as soon as it is defined.
})();
A 3-dimensional space which HTML elements occupy along the z-axis in priority order based on element attributes.
What is a stacking context?
This system helps protect web applications by filtering and monitoring HTTP traffic between a web application and the Internet.
What is a WAF? (Web Application Firewall)
What are microservices?
A type of logic which is not governed by business rules, but is mostly workflow logic coordinating various components according to the application requirements.
What is application logic?
const [online, pc, vc, ba, platform] = ["Ocelot", "Alpaca", "Vaquita", "Banda", "Platypus"];
What is destructuring assignment?
The name for the browser process which re-calculates the positions and geometries of elements in the document, that may occur when updating the DOM, measuring elements, or resizing the window.
What is DOM reflow?
A way for servers to specify to the browser which origins should be permitted to load or execute resources on the server.
What is CORS?
It may not seem normal, but this is sometimes a means to improve database read performance at the expense of write performance, by storing redundant copies of the data in multiple tables to avoid expensive joins.
What is denormalization?
These types of services outsource much of the responsibility of managing and maintaining servers and infrastructure, usually at a higher up-front cost.
What are managed services?