System Design Core Checkpoint

Data modeling, storage, caching, consistency, sharding, messaging, search.


1. Denormalization is usually used to:
2. LSM trees are typically better for:
3. Cache invalidation is hard because:
4. At-least-once delivery requires consumers to be ____.
5. A good shard key should:
6. Full-text search is commonly built on:
7. Linearizable consistency guarantees that operations appear to execute ____.