Browse terms by vertical or view all terms below.
40 terms
20 terms
A TypeScript-based front-end framework developed by Google for building web applications.
A candidate’s experience designing, building, and integrating APIs to connect different services and platforms.
A web framework developed by Microsoft for building dynamic web applications using C#.
Experience implementing user authentication and access control using OAuth, JWT, or session-based systems.
A candidate’s ability to follow and contribute to best practices during peer code reviews.
A candidate’s ability to quickly understand and navigate an existing codebase to make contributions.
Experience using Docker or Kubernetes to create and manage containerized applications.
The practice of automatically testing and merging code changes into a shared repository.
The ability to design efficient database schemas and queries for high-performance applications.
A high-level Python web framework known for its speed, security, and scalability.
A containerization platform that enables developers to package and deploy applications efficiently.
A design pattern where system components communicate using events to improve scalability and responsiveness.
A cloud-based backend-as-a-service (BaaS) platform that simplifies authentication, storage, and hosting.
A lightweight Python framework used for building web applications with minimal overhead.
A developer’s proficiency in using front-end frameworks like React, Angular, or Vue.js.
A developer’s ability to troubleshoot and fix issues across both front-end and back-end systems.
An API type that allows clients to query exactly the data they need from a single endpoint.
A query language for APIs that enables developers to request specific data efficiently.
A widely used programming language for front-end and back-end development, powering web applications.
An open-source system for managing, scaling, and automating containerized applications.
Experience designing and developing applications using a modular, microservices-based approach.
A NoSQL database that stores data in flexible JSON-like documents, ideal for scalable applications.
A JavaScript runtime that allows developers to build scalable server-side applications.
The process of measuring and optimizing application performance to meet industry standards.
A powerful, open-source relational database known for its advanced features and scalability.
The degree to which a candidate’s code meets the standards required for deployment in a live environment.
A versatile programming language used for web development, data science, and backend services.
A popular JavaScript library for building interactive and reusable user interface components.
A developer’s ability to create applications that adapt to different screen sizes and devices.
A widely used architectural style for designing networked applications and web services.
A web development framework written in Ruby that prioritizes convention over configuration.
A developer’s ability to write code that supports business growth and increased user demand.
The ability to build and deploy applications without managing server infrastructure.
A Java-based backend framework designed to simplify the development of enterprise-level applications.
The alignment between a candidate’s skills and a company’s preferred development technologies.
A methodology where developers write tests before writing the actual application code.
A statically typed superset of JavaScript that enhances code maintainability and scalability.
A developer’s proficiency in managing code changes using Git and branching workflows.
A progressive front-end JavaScript framework used for building user interfaces and single-page applications.
Techniques used to improve website speed, load times, and responsiveness.
A cloud service that manages and secures API requests between clients and backend services.
A deployment strategy that maintains two identical environments to minimize downtime and risk.
A testing practice that simulates failures to improve system resilience and fault tolerance.
Strategies used to reduce cloud expenses while maintaining performance and availability.
Security practices designed specifically for cloud-based applications and services.
Automating the management and coordination of complex cloud environments across multiple services.
A centralized storage system for managing and distributing container images.
An automated release process that pushes code changes into production without manual intervention.
A distributed computing model that processes data closer to users, reducing latency and bandwidth usage.
The ability to dynamically adjust computing resources in response to demand fluctuations.
A DevOps practice that uses Git repositories as the source of truth for managing cloud infrastructure.
A cloud strategy that integrates private and public cloud infrastructures for flexibility and efficiency.
A cloud practice where infrastructure components are replaced rather than updated to ensure consistency.
A practice of managing cloud infrastructure using machine-readable configuration files instead of manual processes.
The process of deploying, monitoring, and scaling applications using Kubernetes clusters.
A cloud approach that leverages multiple cloud providers to prevent vendor lock-in and improve reliability.
A cloud monitoring approach that provides insights into system performance, logs, and metrics.
A security model that restricts cloud access based on user roles and permissions.
A cloud execution model where developers write code without managing the underlying infrastructure.
A cloud-native infrastructure layer that handles service-to-service communication within microservices architectures.
Developing embedded software without an operating system to achieve high performance and low latency.
A small program that initializes the hardware and loads the embedded operating system.
A robust vehicle networking protocol used for communication between embedded systems in automobiles.
A specialized version of the C programming language optimized for embedded software development.
The integration of AI models into embedded systems to enable local decision-making without cloud reliance.
Security practices used to protect embedded systems from attacks and unauthorized access.
A reconfigurable semiconductor device that can be programmed for specific embedded applications.
A type of non-volatile memory used for storing firmware and data in embedded systems.
A technology that provides tactile feedback through vibrations or motions in embedded devices.
A mechanism that allows embedded systems to respond to external events in real time.
A hardware debugging interface used for testing and programming embedded devices.
A set of techniques used to reduce energy consumption in battery-powered embedded devices.
A compact integrated circuit that contains a processor, memory, and input/output peripherals for embedded applications.
An integrated circuit used to manage power distribution in embedded devices.
An operating system designed to handle real-time tasks with strict timing constraints.
The process of combining data from multiple sensors to improve accuracy and system performance.
A single chip that integrates a microprocessor, memory, and other components to perform embedded tasks.
A networking standard designed to ensure real-time communication with low latency in embedded systems.
A serial communication protocol used for data exchange between embedded devices.
A hardware timer that resets the embedded system if it becomes unresponsive.
Programs where ethical hackers are rewarded for finding and reporting security vulnerabilities.
A system that continuously monitors cloud infrastructure for security risks and compliance violations.
Protecting containerized applications from security threats at runtime and during deployment.
A process that converts data into a fixed-size hash value to ensure data integrity.
A security strategy to prevent sensitive data from being leaked, lost, or accessed by unauthorized users.
A security solution that monitors and responds to threats on endpoints like laptops and mobile devices.
A framework for ensuring that the right individuals have the right access to IT resources.
Monitoring and analyzing employee behavior to detect potential security risks from within an organization.
A security method requiring users to provide two or more verification factors to gain access.
A simulated cyberattack used to identify vulnerabilities in networks, applications, or systems.
A security exploit where attackers gain higher access levels than originally permitted.
A framework that uses cryptographic keys and digital certificates to secure communications.
Techniques and strategies used to prevent or minimize damage from ransomware attacks.
A security exercise where ethical hackers simulate real-world attacks to test an organization's defenses.
A development process that integrates security at every stage of the software lifecycle.
A system that aggregates and analyzes security logs from multiple sources to detect potential threats.
A system that automates security workflows, threat detection, and response actions.
The collection and analysis of data to identify emerging cybersecurity threats and vulnerabilities.
A security solution that filters and monitors HTTP traffic to prevent web-based attacks.
A security model that requires continuous verification for every access request, regardless of location.