Skip to content

Instantly share code, notes, and snippets.

Working from home

Nditah Nditah

Working from home
View GitHub Profile

Python Interview Questions And Answers

Curated List of Real-time Python Interview Questions. Help fellow developers by contributing to these interview Questions - Create a pull request in Github.

  • What is Python?
    A) Python is an interpreted, high-level, general-purpose programming language. The significant feature of Python Programming Language is its code readability. Python is open source, which makes it free to use and distribute.

  • What are the advantages of using Python?
    A) Python is mainly used for the following:

  • Installation: 1- Explain how Go path works? 2- What are the benefits of Go Module (reference its commands)?

  • Concurrency: 1- Explain Concurrency & when to use it? 2- How would you allow communication between goroutines in Go? 3- How would you manage their access to resources?

  1. why do you use Go (my answer was as simple as "why i shouldn't", and some extra points Grimacing face)
Nditah / gist:f17f3f3fa01f375c5ddacd13c7c01661
Created May 24, 2021
PMT Agent Partner Documentation
View gist:f17f3f3fa01f375c5ddacd13c7c01661
GET /pmt-routes/public
GET /pmt-schedules/public
GET /pmt-reservations/public
GET /pmt-boardings/public
GET /vehicles/public
GET /terminals/public
GET /states/public
GET /counties/public
GET /regions/public
GET /zones/public
Nditah / The Technical Interview Cheat
Created Feb 26, 2021 — forked from TSiege/The Technical Interview Cheat
This is my technical interview cheat sheet. Feel free to fork it or do whatever you want with it. PLEASE let me know if there are any errors or if anything crucial is missing. I will add more links soon.
View The Technical Interview Cheat


I have moved this over to the Tech Interview Cheat Sheet Repo and has been expanded and even has code challenges you can run and practice against!


View Security Engineer - Interview Questions
1. What is information security and how is it achieved?
2. What are the core principles of information security?
3. What is non-repudiation (as it applies to IT security)?
4. What is the relationship between information security and data availability?
5. What is a security policy and why do we need one?
6. What is the difference between logical and physical security? Can you give an example of both?
7. What’s an acceptable level of risk?
8. What are the most common types of attacks that threaten enterprise data security?
9. What is the difference between a threat and a vulnerability?
10. Can you give me an example of common security vulnerabilities?
Nditah /
Created Nov 6, 2020 — forked from tomysmile/
Brew install Redis on Mac

type below:

brew update
brew install redis

To have launchd start redis now and restart at login:

brew services start redis
Nditah /
Created Sep 29, 2020 — forked from soheilhy/
How to proxy web apps using nginx?

Virtual Hosts on nginx (CSC309)

When hosting our web applications, we often have one public IP address (i.e., an IP address visible to the outside world) using which we want to host multiple web apps. For example, one may wants to host three different web apps respectively for,, and on the same machine using a single IP address.

How can we do that? Well, the good news is Internet browsers

View MySql-5.5-installation

MySQL Download URL

Open the terminal and follow along:

  • Uninstall any existing version of MySQL
sudo rm /var/lib/mysql/ -R