Govt Exams
In microservices architecture, maintaining data consistency across independently managed databases (polyglot persistence) is a significant challenge. ACID transactions cannot span multiple databases, requiring eventual consistency patterns.
The Reducer phase collects intermediate key-value pairs from Mappers, groups them by key, and aggregates them to produce final results.
Strong passwords require length (12+ characters), character variety, and complexity. Reusing passwords and storing them insecurely significantly increases security risks.
Operations = 100² × 50 = 10,000 × 50 = 500,000 operations. This represents the actual computational load for the given input sizes.
ACID stands for Atomicity, Consistency, Isolation, and Durability. Isolation ensures concurrent transactions don't interfere with each other.
The two main types of polymorphism are compile-time (static overloading) and runtime (dynamic overriding). Sequential polymorphism is not a recognized OOP concept.
NullPointerException occurs when trying to call methods or access properties on a null object reference, which has no actual instance allocated in memory.
DFS complexity = O(V + E) = O(10 + 15) = O(25). This includes visiting each vertex once and exploring each edge once.
GET is the HTTP method for safe, idempotent data retrieval without modifying server state. POST creates resources, PUT updates, and DELETE removes resources.
Dynamic Programming is the standard approach for longest common substring problems, building a table of subproblem results with O(n²) time and space complexity.