Skip to main content

标 题: 全球程序员编程水平排行榜TOP50,中国排名第一 印度31名

发信人: cutdown (关闭), 信区: Military
标  题: 全球程序员编程水平排行榜TOP50,中国排名第一 印度31名
发信站: BBS 未名空间站 (Thu Jan 17 07:20:01 2019, 美东)

哪最近软件工程师水平测定平台HackRank发起了一系列编程挑战竞赛,给出了一个目
前为止貌似靠谱的统计调查结果。

全球数以十万计的软件工程师参加了HackRank的系列编程挑战大赛,比赛项涵盖从
Python、算法、网络安全到分布式系统多个领域,组织方根据开发者的准确性和开发速
度给出一个综合评分。
  
根据HackerRank最后的统计,中国程序员排名第一,俄罗斯以微弱的差距紧随其后。中
国程序员在数学、函数编程和数据结构项目成绩第一,而俄罗斯程序员则在算法这个最
具竞争性的领域独占鳌头。
  
被经常拿来对比的中国(第1名)、印度(第31名)、爱尔兰(第32名)和美国(地28
名)的程序员在榜单上的排名分布非常有趣,中国遥遥邻先,而印度、爱尔兰和美国紧
挨着处于榜单的同一区间。
  
前10名中,除了中国和俄罗斯,以及东亚的日本、台湾地区外,其余都是欧洲国家,分
别是波兰(3)、瑞士(4)、匈牙利(5)、法国(8)、捷克(9)、意大利(10),
其中东欧国家占据三席,表现抢眼。

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...