Govt. Exams
Entrance Exams
Zero Trust architecture assumes no implicit trust. Every access request—internal or external—must be authenticated, authorized, and encrypted. It's modern security framework addressing remote work challenges.
Stream processing processes data in real-time with lower latency but higher architectural complexity. Batch processing is cost-effective for scheduled, non-urgent tasks. Choice depends on requirements.
In microservices architecture, maintaining data consistency across independently managed databases (polyglot persistence) is a significant challenge. ACID transactions cannot span multiple databases, requiring eventual consistency patterns.
Strong passwords require length (12+ characters), character variety, and complexity. Reusing passwords and storing them insecurely significantly increases security risks.
The two main types of polymorphism are compile-time (static overloading) and runtime (dynamic overriding). Sequential polymorphism is not a recognized OOP concept.
DFS complexity = O(V + E) = O(10 + 15) = O(25). This includes visiting each vertex once and exploring each edge once.
Maximum height occurs in a skewed (linear) tree where height = n - 1 = 7 - 1 = 6. Minimum height would be 2 for a balanced tree.
Agile embraces changing requirements even late in development. Fixed scope with no flexibility contradicts Agile's core principle of adaptability.
In a circular queue, number of elements = (rear - front + 1) = (8 - 3 + 1) = 6 elements.
git reset --hard HEAD~1 is the standard command to undo the last commit and discard changes. HEAD~1 refers to the previous commit.