1. What is Multithreading?
Multithreading is a programming concept where multiple threads execute concurrently within a process to improve performance and responsiveness.
2. What is a Deadlock?
Deadlock is a situation where two or more processes are unable to proceed because each is waiting for the other to release resources.
3. What is Synchronization?
Synchronization controls access to shared resources in concurrent programming to prevent data inconsistency.
4. What is a Thread Pool?
A thread pool is a collection of pre-initialized threads used to perform multiple tasks efficiently.
5. What is Garbage Collection?
Garbage Collection is automatic memory management that frees unused memory to prevent memory leaks.
6. What is Microservices Architecture?
It is an architectural style where applications are divided into small, independent services that communicate via APIs.
7. What is REST API?
REST API is a web service architecture that uses HTTP methods for communication between client and server.
8. What is GraphQL?
GraphQL is a query language for APIs that allows clients to request only required data.
9. What is Docker?
Docker is a containerization platform used to package applications with dependencies.
10. What is Kubernetes?
Kubernetes is a container orchestration platform used to manage and scale containerized applications.
11. What is CI/CD?
CI/CD stands for Continuous Integration and Continuous Deployment, automating software delivery processes.
12. What is Load Balancing?
Load balancing distributes network traffic across multiple servers to improve performance and reliability.
13. What is Caching?
Caching stores frequently accessed data temporarily to improve performance.
14. What is Big O Notation?
Big O notation describes the performance or complexity of an algorithm.
15. What is Recursion?
Recursion is a function calling itself to solve smaller instances of a problem.
16. What is Machine Learning?
Machine Learning is a subset of AI that allows systems to learn from data.
17. What is Deep Learning?
Deep Learning uses neural networks with multiple layers to analyze data.
18. What is Blockchain?
Blockchain is a distributed ledger technology used for secure transactions.
19. What is Cybersecurity?
Cybersecurity protects systems, networks, and data from attacks.
20. What is Encryption?
Encryption converts data into secure format to prevent unauthorized access.
21. What is Virtualization?
Virtualization is the process of creating virtual versions of physical resources such as servers, storage devices, or networks. It allows multiple operating systems to run on a single physical machine, improving resource utilization and scalability.
22. What is Cloud Computing?
Cloud computing is the delivery of computing services such as servers, storage, databases, networking, and software over the internet. It provides flexibility, scalability, and cost efficiency.
23. What is Serverless Architecture?
Serverless architecture allows developers to build and run applications without managing servers. The cloud provider handles infrastructure, scaling, and maintenance automatically.
24. What is API Gateway?
An API Gateway acts as a single entry point for multiple APIs, handling requests, authentication, routing, and load balancing efficiently.
25. What is OAuth?
OAuth is an authorization framework that allows third-party applications to access user data without exposing credentials.
26. What is JWT?
JSON Web Token (JWT) is a secure way of transmitting information between parties as a JSON object, commonly used for authentication and authorization.
27. What is WebSocket?
WebSocket is a communication protocol that enables real-time, full-duplex communication between client and server over a single connection.
28. What is Event-Driven Architecture?
Event-driven architecture is a design pattern where components communicate by producing and consuming events, enabling asynchronous processing.
29. What is Message Queue?
A message queue is a communication method used in distributed systems where messages are stored in a queue and processed asynchronously.
30. What is CAP Theorem?
CAP theorem states that a distributed system can provide only two out of three guarantees: Consistency, Availability, and Partition Tolerance.
31. What is NoSQL Database?
NoSQL databases are non-relational databases designed for large-scale data storage and flexible schema, such as MongoDB and Cassandra.
32. What is SQL Injection?
SQL Injection is a security vulnerability where attackers insert malicious SQL queries into input fields to manipulate databases.
33. What is Cross-Site Scripting (XSS)?
XSS is a security vulnerability where attackers inject malicious scripts into web pages viewed by users.
34. What is Cross-Site Request Forgery (CSRF)?
CSRF is an attack where unauthorized commands are executed on behalf of an authenticated user.
35. What is Data Normalization?
Normalization is the process of organizing database data to reduce redundancy and improve data integrity.
36. What is Denormalization?
Denormalization is the process of adding redundant data to improve read performance.
37. What is Indexing?
Indexing improves database query performance by creating a data structure that allows faster retrieval.
38. What is Sharding?
Sharding is a database scaling technique that splits data across multiple machines.
39. What is Replication?
Replication is copying data across multiple servers to ensure availability and reliability.
40. What is ACID Properties?
ACID stands for Atomicity, Consistency, Isolation, and Durability, ensuring reliable database transactions.
41. What is Agile Methodology?
Agile is a software development approach focused on iterative development, collaboration, and flexibility.
42. What is Scrum?
Scrum is an Agile framework that uses sprints to deliver software incrementally.
43. What is DevOps?
DevOps is a practice combining development and operations to automate and improve software delivery.
44. What is Infrastructure as Code (IaC)?
IaC is managing infrastructure using code instead of manual processes.
45. What is Blue-Green Deployment?
Blue-Green Deployment is a release strategy that reduces downtime by running two identical environments.
46. What is Canary Deployment?
Canary Deployment releases new features to a small group of users before full rollout.
47. What is Logging?
Logging is recording system events for debugging and monitoring.
48. What is Monitoring?
Monitoring tracks system performance and health in real time.
49. What is Latency?
Latency is the time taken for a request to be processed.
50. What is Throughput?
Throughput is the number of requests processed per unit time.
51. What is Scalability?
Scalability is the ability of a system to handle increased load.
52. What is High Availability?
High availability ensures systems remain operational with minimal downtime.
53. What is Fault Tolerance?
Fault tolerance allows systems to continue functioning even when failures occur.
54. What is CDN?
Content Delivery Network distributes content across servers globally.
55. What is DNS?
Domain Name System translates domain names into IP addresses.
56. What is HTTP vs HTTPS?
HTTPS is secure version of HTTP using encryption.
57. What is Load Testing?
Load testing checks system performance under heavy load.
58. What is Stress Testing?
Stress testing evaluates system limits beyond capacity.
59. What is Unit Testing?
Unit testing tests individual components of code.
60. What is Integration Testing?
Integration testing checks interaction between modules.
61. What is System Design?
System design involves designing scalable and efficient systems.
62. What is Design Patterns?
Reusable solutions to common software design problems.
63. What is Singleton Pattern?
Ensures only one instance of a class exists.
64. What is Factory Pattern?
Creates objects without exposing creation logic.
65. What is MVC?
Model-View-Controller separates application logic.
66. What is MVVM?
Model-View-ViewModel enhances UI separation.
67. What is API Rate Limiting?
Limits number of API requests to prevent abuse.
68. What is OAuth2?
Improved version of OAuth for secure authorization.
69. What is SSO?
Single Sign-On allows login across multiple apps.
70. What is Multi-factor Authentication?
Adds extra security layers beyond password.
71. What is Data Warehouse?
Central repository for analytical data.
72. What is Data Mining?
Process of discovering patterns in data.
73. What is ETL?
Extract, Transform, Load process for data pipelines.
74. What is Big Data?
Large and complex datasets requiring advanced tools.
75. What is Hadoop?
Framework for distributed storage and processing.
76. What is Spark?
Fast data processing engine.
77. What is AI?
Artificial Intelligence simulates human intelligence.
78. What is NLP?
Natural Language Processing handles human language.
79. What is Computer Vision?
Enables machines to interpret images.
80. What is Reinforcement Learning?
Learning through rewards and penalties.
81. What is Edge Computing?
Processing data closer to source devices.
82. What is IoT?
Internet of Things connects smart devices.
83. What is 5G?
Next-generation wireless technology.
84. What is Digital Twin?
Virtual representation of physical objects.
85. What is AR?
Augmented Reality overlays digital info.
86. What is VR?
Virtual Reality creates immersive environment.
87. What is Quantum Computing?
Uses quantum bits for complex calculations.
88. What is Cryptography?
Secures communication using encryption.
89. What is Hashing?
Converts data into fixed-length values.
90. What is Digital Signature?
Verifies authenticity of digital messages.
91. What is Software Architecture?
High-level structure of software systems.
92. What is Monolithic Architecture?
Single unified application structure.
93. What is Event Loop?
Handles asynchronous operations.
94. What is Asynchronous Programming?
Executes tasks without blocking main thread.
95. What is Thread Safety?
Ensures safe execution in multithreading.
96. What is Memory Leak?
Unused memory not released.
97. What is Heap vs Stack?
Heap is dynamic memory; stack is static memory.
98. What is Compiler?
Converts code into machine language.
99. What is Interpreter?
Executes code line by line.
100. What is Full Stack Development?
Development covering both frontend and backend.
📢 Join Our WhatsApp Channel
💼 Get Daily IT Job Updates, Interview Preparation Tips & Instant Alerts directly on WhatsApp.
👉 Join WhatsApp Now📢 Join Our Telegram Channel
💼 Get Daily IT Job Updates, Interview Tips & Exclusive Alerts directly on Telegram!
👉 Join Telegram