Skip to content

Commit 0bea800

Browse files
Merge branch 'patch-1' of https://github.com/codingJWilliams/Back-End-Developer-Interview-Questions into codingJWilliams-patch-1
2 parents 3441500 + 7cff4a5 commit 0bea800

File tree

1 file changed

+8
-8
lines changed

1 file changed

+8
-8
lines changed

README.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -246,29 +246,29 @@ Sooner or later I will complete it with the relative answers. Feel free to contr
246246

247247

248248
### [[]](#toc) <a name='security'>Questions about Security:</a>
249-
* How to write secure code? In your opinion, is it one of the developer's duties, or does it require a specialized role in the Company? And why?
249+
* How do you write secure code? In your opinion, is it one of the developer's duties, or does it require a specialized role in the company? And why?
250250
* Why is it said that cryptography is not something you should try to invent or design yourself?
251-
* What's Two Factor Authentication? How would you implement it in an existing web application?
252-
* If not carefully handled, logs always risk to contain sensible information, such as passwords. How would you deal with this?
251+
* What is two factor authentication? How would you implement it in an existing web application?
252+
* If not carefully handled, there is always a risk of logs containing sensitive information, such as passwords. How would you deal with this?
253253
* Write down a snippet of code affected by SQL Injection and fix it.
254254
* How would it be possible to detect SQL Injection via static code analysis? I don't expect you to write an algorithm capable of doing this, as it is probably a huge topic, but let's discuss a general approach.
255255
* What do you know about Cross-Site Scripting? If you don't remember it, let's review online its definition and let's discuss about it.
256256
* What do you know about Cross-Site Forgery Attack? If you don't remember it, let's review online its definition and let's discuss about it.
257257
* How does HTTPS work?
258-
* What's a Man-in-the-middle Attack? And why does HTTPS can help protecting against it?
259-
* How can you prevent the user session to be stolen? Chances are you remember what Session or Cookie Hijacking is, otherwise let's read its Wikipedia page together.
258+
* What's a Man-in-the-middle Attack, and why does HTTPS help protect against it?
259+
* How can you prevent the user's session from being stolen? Chances are you remember what Session or Cookie Hijacking is, otherwise let's read its Wikipedia page together.
260260

261261

262262
### [[]](#toc) <a name='general'>General Questions:</a>
263263

264-
* Why Functional Programming matters? When should a functional programming language be used?
264+
* Why does Functional Programming matter? When should a functional programming language be used?
265265
* How do companies like Microsoft, Google, Opera and Mozilla profit from their browsers?
266266
* Why does opening a TCP socket have a large overhead?
267267
* What is Encapsulation important for?
268268
* What is a real-time system and how is it different from an ordinary system?
269269
* What's the relationship between real-time languages and heap memory allocation?
270-
* Immutability is the practice of setting values once, at the moment of their creation, and never changing them. How immutability can help writing safer code?
271-
* Pro and cons of mutable and immutable values.
270+
* Immutability is the practice of setting values once, at the moment of their creation, and never changing them. How can immutability help write safer code?
271+
* What are the pros and cons of mutable and immutable values.
272272
* What's the Object-Relational impedance mismatch?
273273
* Which principles would you apply to define the size of a cache?
274274
* What's the difference between TCP and HTTP?

0 commit comments

Comments
 (0)