1. What is the Singleton Pattern?
2. Authorization vs Authentication
3. What is the difference between Helm 2 and Helm 3?
4. How can you optimize a brute-force solution?
5. Develop an application within the given timeframe using a technology stack you are familiar with.
 
                         
                    