This normal form requires that all non-key attributes are fully functionally dependent on the entire primary key, not just part of it.
What is Second Normal Form (2NF)?
This API authentication method involves including a token in the Authorization header of HTTP requests.
What is JWT (JSON Web Token) authentication or Bearer token authentication?
This Docker feature allows you to mount a directory from the host machine into a container, enabling persistent data storage
What are volume mounts or bind mounts?
This file, typically found in a website's root directory, tells web crawlers which parts of the site they should and shouldn't access.
What is robots.txt
This 6-byte identifier is burned into every network interface card and operates at Layer 2 of the OSI model.
What is a MAC address?
This PostgreSQL scan type is used when no suitable index exists and the entire table must be read from disk.
What is Seq Scan?
This API rate limiting algorithm allows a specific number of requests per some time interval, resetting the count at each interval.
What is fixed window rate limiting?
When you run 'docker build', this component interprets the Dockerfile instructions and creates the image layers, with each step creating a temporary container.
What is BuildKit or the docker builder engine?
This anti-scraping technique generates unique tokens or signatures that must be included with each request, often requiring reverse engineering of JavaScript code
What is dynamic token generation or CSRF tokens?
This notation can represent a range of IPs in one address, and is commonly used to notate subnets. This can reduce routing table size by aggregating routes.
What is CIDR notation?
This PostgreSQL scan operation appears when the optimizer can satisfy a query entirely without heap access.
What is Index-Only Scan?
This advanced pagination technique uses a server generated key other than offset + limit to efficiently navigate large datasets while maintaining consistency.
What is cursor-based pagination?
This Docker command creates a new image from a container's changes, essentially saving the current state as a new layer
What is docker commit?
This XPath axis allows you to select all ancestor elements of the current node, useful when you need to traverse up the DOM tree during scraping.
What is the ancestor axis?
IPv4 uses 32-bit numeric addresses, limiting the total number of unique addresses to approximately how many?
What is approximately 4.3 billion? (4 accepted)
This optimization technique used by databases including PSQL stores frequently accessed data pages in memory to avoid expensive disk I/O operations during subsequent queries.
What is buffer pool management or page caching?
This exact HTTP status code should be returned when a client attempts to create a resource that already exists at the specified location.
What is 409 (Conflict)?
This performance-focused strategy allows multiple containers to share the same base image layers in memory, only creating new layers when files are modified.
What is COW (Copy-on-Write) or shared layer optimization?
https://docs.docker.com/engine/storage/drivers/
This HTTP/2 feature allows servers to send multiple resources to the client without explicit requests, making it harder for scrapers to predict and intercept all page resources.
What is server push?
This BGP attribute indicates the sequence of autonomous systems that a route has traversed.
What is AS Path?
This PostgreSQL parameter affects index usage decisions by modeling the cost of cache misses in random access patterns. When set too low, the query planner may avoid using indexes and prefer sequential scans, leading to suboptimal performance.
What is effective_cache_size?
This class of consensus algorithms can tolerate up to one-third malicious nodes and is used in blockchain systems, unlike simpler crash fault-tolerant protocols
What are byzantine consensus algorithms or byzantine protocols?
This security feature allows you to run containers with a non-root user inside the container while maintaining root privileges on the host for Docker operations.
What is user namespace remapping or userns-remap?
Advanced scrapers use this technique to modify TCP window sizes, packet timing, and other network headers to mimic specific browsers at the network layer, bypassing application-level detection.
What is TCP/TLS fingerprint spoofing or protocol-level mimicry?
This BGP routing technique allows an AS to influence inbound traffic by artificially manipulating a key attribute making certain routes appear less desirable, therefore reducing inbound traffic, but has less of an effect on more distant AS neighbors as opposed to closer ones.
What is AS Path Prepending?