JavaScript
CSS and Rendering
Security
Systems
Words You Might Hear in Meetings
100

A template providing the data structure, initial values, and methods for creating an object at run time.

What is a class?

100

This potentially haphazard syntax overrides the cascade and gives a style rule the highest precedence.

What is "!important"?

100

A type of attack that may enable an attacker to"; DELETE FROM importantTables--

What is SQL injection?

100

A system which translates a domain name to an IP address.

What is a DNS? (Domain Name System)

100

Persons or parties who have a states or implied interest in the software.

What are stakeholders?

200

A type of loop which iterates over all enumerable property keys of an object.

What is a for...in loop?
200

This combinator selector allows you to select all elements that are the direct children of an element.

What is ">"? (e.g. div > p)

200

This is the number one cause of data breaches.

What are weak/stolen passwords?

200

A globally distributed network of servers serving static content from locations closer to the user.

What is a CDN? (Content Delivery Network)

200

A phase of software testing by the the end-user to determine that an application is working as intended.

What is user acceptance testing?

300

The mechanism by which JavaScript objects inherit features from one another.

What is the prototype chain?

300

The flex shorthand syntax can specify these three values to describe how an item will grow or shrink to fit available space in its flex container.

What are flex-grow, flex-shrink, and flex-basis?

300

A type of a attack that occurs when using a web application send malicious code, generally in the form of a browser side script, to a different end user.

What is an XSS attack?

300

A system which distributes client requests to one of potentially many servers/databases and returns the response to the appropriate client.

What is a load balancer?

300

A type of logic which is governed by business rules, such as "A customer cannot drop a class after a specific date."

What is business logic?

400

(function () {

  // A function that is run as soon as it is defined.

})();

What is an IIFE? (Immediately Invoked Function Expression)
400

A 3-dimensional space which HTML elements occupy along the z-axis in priority order based on element attributes.

What is a stacking context?

400

This system helps protect web applications by filtering and monitoring HTTP traffic between a web application and the Internet.

What is a WAF? (Web Application Firewall)

400
A suite of independently deployable, small, modular applications. These applications may communicate with each other to serve a single business goal.

What are microservices?

400

A type of logic which is not governed by business rules, but is mostly workflow logic coordinating various components according to the application requirements.

What is application logic?

500
An expression that makes it possible to unpack values from arrays or properties from objects into distinct variables.


const [online, pc, vc, ba, platform] = ["Ocelot", "Alpaca", "Vaquita", "Banda", "Platypus"];

What is destructuring assignment?

500

The name for the browser process which re-calculates the positions and geometries of elements in the document, that may occur when updating the DOM, measuring elements, or resizing the window.

What is DOM reflow?

500

A way for servers to specify to the browser which origins should be permitted to load or execute resources on the server.

What is CORS?

500

It may not seem normal, but this is sometimes a means to improve database read performance at the expense of write performance, by storing redundant copies of the data in multiple tables to avoid expensive joins.

What is denormalization?

500

These types of services outsource much of the responsibility of managing and maintaining servers and infrastructure, usually at a higher up-front cost.

What are managed services?