Another one from xkcd
More Related Contents:
- What is a magic number, and why is it bad? [closed]
- Why should hash functions use a prime number modulus?
- Prefer composition over inheritance?
- Singletons: good design or a crutch? [closed]
- What is Type-safe?
- Conventions for exceptions or error codes [closed]
- Test loops at the top or bottom? (while vs. do while) [closed]
- Solving “Who owns the Zebra” programmatically?
- Try to describe polymorphism as easy as you can [closed]
- Pass by reference or pass by value? [closed]
- How do I assess the hash collision probability?
- When to use unsigned values over signed ones?
- Making a system call that returns the stdout output as a string
- When is it okay to check if a file exists?
- What are the lesser known but useful data structures?
- What is eager loading?
- Private vs. Public members in practice (how important is encapsulation?) [closed]
- Why is writing a closed TCP socket worse than reading one?
- Are exceptions really for exceptional errors? [closed]
- How to deal with constructor over-injection in .NET
- How to calculate distance from a point to a line segment, on a sphere?
- Followup: Finding an accurate “distance” between colors
- What’s the term for the part of the URL after the question mark?
- In what situations is octal base used?
- Is bit shifting O(1) or O(n)?
- Why is the knapsack problem pseudo-polynomial?
- Code Golf: Conway’s Game of Life
- Why would a language NOT use Short-circuit evaluation?
- Finding closest match in collection of numbers [closed]
- Is there a known implementation of an indexed linked list?