Network Security Internet Technology Development Database Servers Mobile Phone Android Software Apple Software Computer Software News IT Information

In addition to Weibo, there is also WeChat

Please pay attention

WeChat public account

Shulou

The simplest technical interpretation in history, so that the wife can learn 50 IT terms!

2024-05-19 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Network Security >

Share

Shulou(Shulou.com)06/01 Report--

As a computer science student, will you often feel confused about the future of your career? then let's find out.

In this IT industry, most people can find suitable jobs and salaries, but some people are still confused and don't know if they are suitable for the industry, so they are afraid. When you read the following data, you won't be so worried.

From the data in the above chart, we can see that the IT industry has occupied 35% of the market, it can be said that the demand of the IT industry is particularly large, and the annual demand for IT talents reaches almost 20 million, which is not only a figure, but also shows the scarcity of talents, from which we can see that wages must be "all boats rise". I have sorted out the most complete IT industry terminology, this time it is all super practical and pure practical information, do not regret not collecting!

1. Popular understanding of some professional terms in the IT industry (for example, do not take it seriously)

Cold backup

Suppose you are a woman and you have a boyfriend, and at the same time you are ambiguous with another boy, better than a friend, not a lover. You can dump your current boyfriend at any time, and the other one can make up right away. This is a cold backup.

Dual-computer hot backup

Suppose you are a woman and are dating two men at the same time, both of whom are your boyfriends. And they do not interfere with each other and operate independently. This is a dual hot backup.

Cloud backup

Suppose you are a woman with a boyfriend, and you pay a matchmaking agency to pay attention to good resources for you. Once you are separated from your boyfriend, the matchmaking agency will immediately arrange resources for you, and your relationship will run continuously. This is a cloud backup.

Load balancing

Suppose you are a woman, and your needs are so strong that your boyfriend can't stand it at all, so he calls you to find two boyfriends, one three or five, two four or six, so as to reduce the pressure on a boyfriend. This is called load balancing.

Fail-over

Suppose you are a woman and you want to go shopping and your boyfriend An is playing the game without answering the phone, so you send the shopping request to the alternate boyfriend B to ensure the continuous operation of the service, which is called failover.

Master-slave configuration

Suppose you are a woman and you have a lot of things to do with your boyfriend, so you can't describe shopping with A, while B can only go shopping with you and can't have all the rights of boyfriends. This is called master-slave configuration master-slave.

Cluster

If you are a woman and have multiple boyfriends, you will achieve the ultimate experience with heartbeat detection and failover and load balancing. This is called cluster LVS. Note that when the demand can be handled on a stand-alone machine, it is not recommended to enable a cluster, which will cause a lot of resources to be idle and increase maintenance costs. Suppose you are a woman, and your increasing demand leads to a boyfriend cluster that cannot be handled. So you have added several other ones, which are called multi-clusters, horizontal expansion, or multi-cluster grid for short.

Longitudinal expansion

Suppose you are a woman, and your boyfriend is too thin to meet the demand, so you buy a lot of tonic products to help your boyfriend upgrade, so as to increase the single machine capacity, which is called vertical expansion, remember, the cost of vertical expansion will be higher and higher, but the effect will be less and less obvious.

Denial of service attack

Suppose you are a woman, and your boyfriend is handsome, handsome and rich, so you are hostile to female B. B will ask your boyfriend to repair the computer and refrigerator on weekends in the name of a friend, taking up a lot of boyfriend's time, resulting in his inability to serve you. This is called denial of service attack, referred to as DOS.

Distributed denial of service attack

Suppose you are a woman, and you are hostile to a woman because of your boyfriend, but your boyfriend's processing ability is very powerful and the processing speed is faster than her request speed, so she hires a group of women to take turns bothering your boyfriend, which is called distributed denial of Service attack, or DDOS.

access control

Suppose you are a woman and you find that your boyfriend is always dealing with other unimportant requests, so you call you to give your boyfriend a whitelist, asking him to process only the requests in the whitelist and refuse the requests of other unidentified people. this is called access control, also known as session tracking.

Cross-site request forgery

Suppose you are a woman, and you find that after taking the above measures, your boyfriend's processing requests have not decreased much, so you have found that someone forged your Wechat profile picture nickname to make a request to your boyfriend, which is called cross-site request forgery referred to as CSRF.

Cross-site scripting attack

Suppose you are a woman and you receive a delivery, so you ask your boyfriend to pick up the delivery for you. When you get the delivery, you find that someone has mailed you a whole piece of abusive letter, which is called cross-site scripting attack referred to as XSS. Please note that the other party can send you a mini bug to eavesdrop on your privacy.

Pressure testing

Suppose you are a woman, and you ask your boyfriend to hold on for 10 minutes, then 15 minutes and then 20 minutes to test your boyfriend's limit. This is called a stress test. The purpose of the stress test is to see if your boyfriend can handle the demand and decide whether to enable boyfriend clusters or improve boyfriend processing ability. Do not do stress tests on boyfriends who are running online, which may cause downtime. You'll lose all your money.

Cloud Computing

Suppose you are a woman, and your boyfriend is too merciful to produce a huge amount of information to be processed, and you and your girlfriends are tired and have not caught up with the speed of his creation, so you pay to find 20 buddies on Zhihu to help you analyze it. This is called cloud computing.

Data statistics

Suppose you are a woman who gets a lot of sorted boyfriend data after using cloud computing, such as the number of active times during the active period of the location.

Home xxxx 123times

Hanting xxxx 45 times

... It's called statistics.

data mining

Suppose you are a woman, after you get the location where your boyfriend often haunts, according to the hotel, sensitive time period and other information to determine that your boyfriend should be cheating, this is called data mining.

Container

If you are a woman, your boyfriend should always go out and have all kinds of problems, so you rent a room and prepare all the things you need and tell him that you don't have to find a hotel in the future, just come to my room. Everything is ready. It's called a container.

If you are a woman, you have to connect with your boyfriend once a day to collect data.

The tool your boyfriend uses to connect you to him is called the interface "machine", and the data you collect is called "streaming" data.

You collect data 24 hours a day, which is called real-time data acquisition.

You decide to develop a new interface to communicate with your boyfriend, which is called virtualization.

You decide to collect data from different boyfriends. You are big data Center.

One day you decide to have a baby, which is called big data App.

The baby is born do not know whose, this is called big data desensitization.

But from the baby's appearance, black skin and blond hair, which is called data fusion cross-domain modeling.

You decide to take this baby to the exhibition to collect some tickets, which is called big data cash.

2. Common terms in software testing

Black box testing (Black box testing) ── does not consider internal design and code and is tested according to requirements and functionality.

White box testing (White box testing) ── tests according to the statements, branches, paths and conditions of the code according to the internal logic of the code of the application software.

Functional testing (functional testing) ── performs black-box testing on the functional modules of an application software. Such tests should be carried out by testers. But that doesn't mean programmers don't check the code before launching the software. (this principle applies to all testing phases.)

System testing ── conducts black box testing for all requirements specifications, including all components in the system.

Regression testing (regression testing) ── repeats testing whenever the software has been sorted out, modified, or its environment has changed. It's hard to say how many regression tests need to be done, especially in the final stages of the development cycle. This kind of testing is particularly suitable for the use of automated testing tools.

Stress testing (stress testing) ── can often be replaced with "load test" or "performance test". This test is used to check the system under the following conditions: under abnormally heavy loads, a large number of repetitions of certain actions and inputs, entering large numbers, very complex queries to the database, and so on.

Performance testing (performance testing) ── can often be replaced with "stress test" or "load test". The ideal "performance test" (including any other type of test) should be specified at the end of the quality assurance and test plan documentation.

Usability testing (usability testing) ── is designed to test "user-friendly" features. This is a subjective feeling, depending on the end user or customer. You can conduct user interviews, check, record user meetings, or use other technologies. Programmers and testers usually do not participate in usability testing.

Recovery Test (recovery testing) A condition in which the ── restores the system after a system crash, hardware failure, or other disaster.

Security testing (security testing) ── tests the protection of the system against unauthorized internal / external access and intentional damage. This requires sophisticated testing techniques.

Alpha testing (alpha testing) A test performed by ── when the development of an application is almost complete. Minor design changes are also allowed at this time. This kind of testing is usually done by end users or others, not by programmers and testers.

Beta testing (beta testing) ── A test conducted when development and testing are almost complete and need to be finally found before the official release. This kind of testing is usually done by end users or others, not by programmers and testers.

3. Popular programming languages at present

Java: Java is an object-oriented programming language that can write cross-platform application software. it is the general name of Java programming language and Java platform (JavaSE,JavaEE,JavaME) launched by SunMicrosystems in May 1995.

C Sharp: (C Sharp) is a programming language tailor-made by Microsoft for .NET Framework. With the powerful functions of Cinning + and the easy-to-use features of Visual Basic, C # is the first component-oriented (Component-oriented) programming language, and C++ and Java are also object-oriented (object-oriented) programming languages.

Perl: a scripting language.

Python: is an object-oriented, literal translation computer programming language

Ruby: a scripting language for simple and fast object-oriented programming (object-oriented programming)

C++: the word C++ is usually pronounced as "C plus" among Chinese mainland programmers, while Western programmers usually pronounce it as "C plus plus" or "CPP". It is a widely used computer programming language.

PHP: PHP is a HTML embedded language and a scripting language that embeds HTML documents executed on the server side. The style of the language is similar to C language and is widely used.

JavaScript: a scripting language widely used in client-side Web development, it is often used to add dynamic functions to HTML pages, such as responding to various actions of users.

4. What are the distributions of linux/unix?

Suse Linux, Red HatLinux, Ubuntu Linux, Centos Linux, Debian Linux, Gentoo Linux, IBM Aix, Sun Solaris, HPUnix, etc.

5. What are the more popular databases?

Oracle, SQL Server, IBM DB2, Sybase, MySQL, PostgreSQL, etc.

In the future trend, the salary of IT industry should be higher, and the proportion of Internet industry will be more and more. Come on, slutty years! Don't want to take a low salary silently after graduation? Maybe it's time for you to burst your hormones, to try, to surpass yourself!

Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.

Views: 0

*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.

Share To

Network Security

Wechat

© 2024 shulou.com SLNews company. All rights reserved.

12
Report