From 0f9a1f74c9a9fa142912cd5299b99c84971eac15 Mon Sep 17 00:00:00 2001
From: camperbot
Date: Mon, 13 Mar 2023 19:41:01 +0530
Subject: [PATCH] chore(i18n,learn): processed translations (#49694)
---
...rest-parameter-with-function-parameters.md | 2 +-
...-response-mime-type-with-helmet.nosniff.md | 2 +-
...-of-clickjacking-with-helmet.frameguard.md | 2 +-
.../60a3e3396c7b40068ad69993.md | 2 +-
.../html-boilerplate-question-c.md | 2 +-
...rest-parameter-with-function-parameters.md | 2 +-
...-response-mime-type-with-helmet.nosniff.md | 2 +-
...-of-clickjacking-with-helmet.frameguard.md | 2 +-
.../60a3e3396c7b40068ad69993.md | 2 +-
.../html-boilerplate-question-c.md | 2 +-
...rest-parameter-with-function-parameters.md | 2 +-
...-response-mime-type-with-helmet.nosniff.md | 2 +-
...-of-clickjacking-with-helmet.frameguard.md | 2 +-
.../60a3e3396c7b40068ad69993.md | 2 +-
.../html-boilerplate-question-c.md | 2 +-
...rest-parameter-with-function-parameters.md | 2 +-
...-response-mime-type-with-helmet.nosniff.md | 2 +-
...-of-clickjacking-with-helmet.frameguard.md | 2 +-
.../60a3e3396c7b40068ad69993.md | 2 +-
.../html-boilerplate-question-c.md | 2 +-
...rest-parameter-with-function-parameters.md | 2 +-
...-response-mime-type-with-helmet.nosniff.md | 2 +-
...-of-clickjacking-with-helmet.frameguard.md | 2 +-
.../60a3e3396c7b40068ad69993.md | 2 +-
.../html-boilerplate-question-c.md | 2 +-
...rest-parameter-with-function-parameters.md | 2 +-
...h-javascript-using-the-onclick-property.md | 4 ++--
...-response-mime-type-with-helmet.nosniff.md | 2 +-
...-of-clickjacking-with-helmet.frameguard.md | 2 +-
.../60a3e3396c7b40068ad69993.md | 2 +-
.../html-boilerplate-question-c.md | 2 +-
.../assignment-with-a-returned-value.md | 4 ++--
.../escape-sequences-in-strings.md | 24 +++++++++----------
.../finding-a-remainder-in-javascript.md | 6 ++---
.../replacing-if-else-chains-with-switch.md | 14 +++++------
...rest-parameter-with-function-parameters.md | 2 +-
.../sum-all-odd-fibonacci-numbers.md | 2 +-
.../how-to-use-passport-strategies.md | 2 +-
...ementation-of-social-authentication-iii.md | 2 +-
...-response-mime-type-with-helmet.nosniff.md | 2 +-
...-of-clickjacking-with-helmet.frameguard.md | 2 +-
.../60a3e3396c7b40068ad69993.md | 2 +-
.../html-boilerplate-question-c.md | 2 +-
...lege-algebra-with-python-certification.yml | 12 +++++-----
...rest-parameter-with-function-parameters.md | 2 +-
...h-javascript-using-the-onclick-property.md | 4 ++--
...-response-mime-type-with-helmet.nosniff.md | 2 +-
...-of-clickjacking-with-helmet.frameguard.md | 2 +-
.../60a3e3396c7b40068ad69993.md | 2 +-
.../html-boilerplate-question-c.md | 2 +-
...rest-parameter-with-function-parameters.md | 2 +-
...-response-mime-type-with-helmet.nosniff.md | 2 +-
...-of-clickjacking-with-helmet.frameguard.md | 2 +-
.../60a3e3396c7b40068ad69993.md | 2 +-
.../html-boilerplate-question-c.md | 2 +-
55 files changed, 82 insertions(+), 82 deletions(-)
diff --git a/curriculum/challenges/arabic/02-javascript-algorithms-and-data-structures/es6/use-the-rest-parameter-with-function-parameters.md b/curriculum/challenges/arabic/02-javascript-algorithms-and-data-structures/es6/use-the-rest-parameter-with-function-parameters.md
index 35f80e2f6c1..cada1dfdc73 100644
--- a/curriculum/challenges/arabic/02-javascript-algorithms-and-data-structures/es6/use-the-rest-parameter-with-function-parameters.md
+++ b/curriculum/challenges/arabic/02-javascript-algorithms-and-data-structures/es6/use-the-rest-parameter-with-function-parameters.md
@@ -22,7 +22,7 @@ console.log(howMany("string", null, [1, 2, 3], { }));
ستعرض وحدة التحكم السلاسل `You have passed 3 arguments.` و `You have passed 4 arguments.`.
-يزيل وسيط rest الحاجة إلى التحقق من القائمة (array) المسمى `args` وتسمح لك باستعمال `map()` و `filter()` و `reduce()` في وسائط القائمة.
+The rest parameter eliminates the need to use the `arguments` object and allows us to use array methods on the array of parameters passed to the function `howMany`.
# --instructions--
diff --git a/curriculum/challenges/arabic/09-information-security/information-security-with-helmetjs/avoid-inferring-the-response-mime-type-with-helmet.nosniff.md b/curriculum/challenges/arabic/09-information-security/information-security-with-helmetjs/avoid-inferring-the-response-mime-type-with-helmet.nosniff.md
index bdfe0a5f4e0..1c8b0a039da 100644
--- a/curriculum/challenges/arabic/09-information-security/information-security-with-helmetjs/avoid-inferring-the-response-mime-type-with-helmet.nosniff.md
+++ b/curriculum/challenges/arabic/09-information-security/information-security-with-helmetjs/avoid-inferring-the-response-mime-type-with-helmet.nosniff.md
@@ -8,7 +8,7 @@ dashedName: avoid-inferring-the-response-mime-type-with-helmet-nosniff
# --description--
-As a reminder, this project is being built upon the following starter project on Replit, or cloned from GitHub. Browsers can use content or MIME sniffing to override response `Content-Type` headers to guess and process the data using an implicit content type. While this can be convenient in some scenarios, it can also lead to some dangerous attacks. This middleware sets the X-Content-Type-Options header to `nosniff`, instructing the browser to not bypass the provided `Content-Type`.
+As a reminder, this project is being built upon the following starter project on Replit, or cloned from GitHub. Browsers can use content or MIME sniffing to override the `Content-Type` header of a response to guess and process the data using an implicit content type. While this can be convenient in some scenarios, it can also lead to some dangerous attacks. This middleware sets the `X-Content-Type-Options` header to `nosniff`, instructing the browser to not bypass the provided `Content-Type`.
# --instructions--
diff --git a/curriculum/challenges/arabic/09-information-security/information-security-with-helmetjs/mitigate-the-risk-of-clickjacking-with-helmet.frameguard.md b/curriculum/challenges/arabic/09-information-security/information-security-with-helmetjs/mitigate-the-risk-of-clickjacking-with-helmet.frameguard.md
index 6b032da9b70..5c9c9d7b740 100644
--- a/curriculum/challenges/arabic/09-information-security/information-security-with-helmetjs/mitigate-the-risk-of-clickjacking-with-helmet.frameguard.md
+++ b/curriculum/challenges/arabic/09-information-security/information-security-with-helmetjs/mitigate-the-risk-of-clickjacking-with-helmet.frameguard.md
@@ -10,7 +10,7 @@ dashedName: mitigate-the-risk-of-clickjacking-with-helmet-frameguard
As a reminder, this project is being built upon the following starter project on Replit, or cloned from GitHub.
-Your page could be put in a `` or `
-
O parâmetro rest elimina a necessidade de verificar o array args` e nos permite usar `map()`, `filter()` e `reduce()` no array de parâmetros.
+
The rest parameter eliminates the need to use the arguments` object and allows us to use array methods on the array of parameters passed to the function `howMany`.
# --instructions--
diff --git a/curriculum/challenges/portuguese/04-data-visualization/json-apis-and-ajax/handle-click-events-with-javascript-using-the-onclick-property.md b/curriculum/challenges/portuguese/04-data-visualization/json-apis-and-ajax/handle-click-events-with-javascript-using-the-onclick-property.md
index 1f0b67cb85e..8a308eb513f 100644
--- a/curriculum/challenges/portuguese/04-data-visualization/json-apis-and-ajax/handle-click-events-with-javascript-using-the-onclick-property.md
+++ b/curriculum/challenges/portuguese/04-data-visualization/json-apis-and-ajax/handle-click-events-with-javascript-using-the-onclick-property.md
@@ -16,7 +16,7 @@ document.addEventListener('DOMContentLoaded', function() {
});
```
-Você pode implementar manipuladores de eventos que vão dentro da função `DOMContentLoaded`. You can implement an `onclick` event handler which triggers when the user clicks on the `#getMessage` element, by adding the following code:
+Você pode implementar manipuladores de eventos que vão dentro da função `DOMContentLoaded`. Você pode implementar um manipulador de evento `onclick`, que dispara quando o usuário clica no elemento `#getMessage`, adicionando o código a seguir:
```js
document.getElementById('getMessage').onclick = function(){};
@@ -28,7 +28,7 @@ Adicione um manipulador de eventos de clique em uma função `DOMContentLoaded`
# --hints--
-Your code should use the `document.getElementById` method to select the element whose id is `getMessage`.
+O código deve usar o método `document.getElementById` para selecionar o elemento cujo id é `getMessage`.
```js
assert(code.match(/document\s*\.getElementById\(\s*?('|")getMessage\1\s*?\)/g));
diff --git a/curriculum/challenges/portuguese/09-information-security/information-security-with-helmetjs/avoid-inferring-the-response-mime-type-with-helmet.nosniff.md b/curriculum/challenges/portuguese/09-information-security/information-security-with-helmetjs/avoid-inferring-the-response-mime-type-with-helmet.nosniff.md
index 9f3a2b78864..81fab3016bd 100644
--- a/curriculum/challenges/portuguese/09-information-security/information-security-with-helmetjs/avoid-inferring-the-response-mime-type-with-helmet.nosniff.md
+++ b/curriculum/challenges/portuguese/09-information-security/information-security-with-helmetjs/avoid-inferring-the-response-mime-type-with-helmet.nosniff.md
@@ -8,7 +8,7 @@ dashedName: avoid-inferring-the-response-mime-type-with-helmet-nosniff
# --description--
-Lembrando que este projeto está sendo construído a partir do Replit, ou pode ser clonado no GitHub. Os navegadores podem usar detecção de conteúdo ou de MIME para substituir os cabeçalhos de resposta `Content-Type` de modo a adivinhar e processar os dados usando um tipo de conteúdo implícito. Embora isso possa ser conveniente em alguns cenários, também pode levar a alguns ataques perigosos. Este middleware define o cabeçalho X-Content-Type-Options para `nosniff`, instruindo o navegador a não ignorar o `Content-Type` fornecido.
+Lembrando que este projeto está sendo construído a partir do Replit, ou pode ser clonado no GitHub. Browsers can use content or MIME sniffing to override the `Content-Type` header of a response to guess and process the data using an implicit content type. Embora isso possa ser conveniente em alguns cenários, também pode levar a alguns ataques perigosos. This middleware sets the `X-Content-Type-Options` header to `nosniff`, instructing the browser to not bypass the provided `Content-Type`.
# --instructions--
diff --git a/curriculum/challenges/portuguese/09-information-security/information-security-with-helmetjs/mitigate-the-risk-of-clickjacking-with-helmet.frameguard.md b/curriculum/challenges/portuguese/09-information-security/information-security-with-helmetjs/mitigate-the-risk-of-clickjacking-with-helmet.frameguard.md
index 9d23afb6ba5..dec5cbc3a8b 100644
--- a/curriculum/challenges/portuguese/09-information-security/information-security-with-helmetjs/mitigate-the-risk-of-clickjacking-with-helmet.frameguard.md
+++ b/curriculum/challenges/portuguese/09-information-security/information-security-with-helmetjs/mitigate-the-risk-of-clickjacking-with-helmet.frameguard.md
@@ -10,7 +10,7 @@ dashedName: mitigate-the-risk-of-clickjacking-with-helmet-frameguard
Lembrando que este projeto está sendo construído a partir do Replit, ou pode ser clonado no GitHub.
-Sua página pode ser colocada em um `` ou `` sem o seu consentimento. Isso pode resultar em ataques de clickjacking, entre outras coisas. Clickjacking é uma técnica de enganar um usuário para que ele interaja com uma página diferente da que o usuário pensa que é. Isso pode ser feito ao executar sua página em um contexto malicioso, por meio de iframing. Nesse contexto, um hacker pode colocar uma camada oculta sobre sua página. Botões ocultos podem ser usados para executar scripts maliciosos. Este middleware define o cabeçalho X-Frame-Options. Ele restringe quem pode colocar seu site em um frame. Ele tem três modos: DENY, SAMEORIGIN, e ALLOW-FROM.
+Sua página pode ser colocada em um `` ou `` sem o seu consentimento. Isso pode resultar em ataques de clickjacking, entre outras coisas. Clickjacking é uma técnica de enganar um usuário para que ele interaja com uma página diferente da que o usuário pensa que é. This can be obtained by executing your page in a malicious context, by means of iframing. In that context, a hacker can put a hidden layer over your page. Botões ocultos podem ser usados para executar scripts maliciosos. Este middleware define o cabeçalho X-Frame-Options. Ele restringe quem pode colocar seu site em um frame. Ele tem três modos: DENY, SAMEORIGIN, e ALLOW-FROM.
Não precisamos que nosso aplicativo seja posto em um frame.
diff --git a/curriculum/challenges/portuguese/14-responsive-web-design-22/learn-the-css-box-model-by-building-a-rothko-painting/60a3e3396c7b40068ad69993.md b/curriculum/challenges/portuguese/14-responsive-web-design-22/learn-the-css-box-model-by-building-a-rothko-painting/60a3e3396c7b40068ad69993.md
index 641f4d52a62..d1d3f395d97 100644
--- a/curriculum/challenges/portuguese/14-responsive-web-design-22/learn-the-css-box-model-by-building-a-rothko-painting/60a3e3396c7b40068ad69993.md
+++ b/curriculum/challenges/portuguese/14-responsive-web-design-22/learn-the-css-box-model-by-building-a-rothko-painting/60a3e3396c7b40068ad69993.md
@@ -7,7 +7,7 @@ dashedName: step-41
# --description--
-Use a propriedade `border-radius` no seletor `.two` para definir os raios superior esquerdo e inferior direito como `8px` e os raios do canto superior direito e inferior esquerdo como `10px`.
+Use the `border-radius` property on the `.two` selector, to set its top-left radius and bottom-right radius to `8px`, and top-right radius and bottom-left radius to `10px`.
# --hints--
diff --git a/curriculum/challenges/portuguese/16-the-odin-project/top-learn-html-foundations/html-boilerplate-question-c.md b/curriculum/challenges/portuguese/16-the-odin-project/top-learn-html-foundations/html-boilerplate-question-c.md
index a441c478a69..5fa3a6a67dc 100644
--- a/curriculum/challenges/portuguese/16-the-odin-project/top-learn-html-foundations/html-boilerplate-question-c.md
+++ b/curriculum/challenges/portuguese/16-the-odin-project/top-learn-html-foundations/html-boilerplate-question-c.md
@@ -10,7 +10,7 @@ dashedName: html-boilerplate-question-c
O elemento `` é onde você coloca as metainformações importantes sobre suas páginas da web, além de coisas necessárias para que suas páginas da web sejam renderizadas corretamente no navegador. Dentro de ``, você não deve usar elementos que exibam conteúdo na página.
## O elemento meta charset
-Você deve sempre ter a tag `meta` para a codificação de conjunto de caracteres (charset) da página no elemento head: ``.
+You should always have the `meta` tag for the `charset` encoding of the webpage in the `head` element: ``.
Definir a codificação é muito importante, pois garante que a página da web exibirá símbolos especiais e caracteres de diferentes idiomas corretamente no navegador.
diff --git a/curriculum/challenges/ukrainian/02-javascript-algorithms-and-data-structures/es6/use-the-rest-parameter-with-function-parameters.md b/curriculum/challenges/ukrainian/02-javascript-algorithms-and-data-structures/es6/use-the-rest-parameter-with-function-parameters.md
index 19eafc063bb..d1798ccfb70 100644
--- a/curriculum/challenges/ukrainian/02-javascript-algorithms-and-data-structures/es6/use-the-rest-parameter-with-function-parameters.md
+++ b/curriculum/challenges/ukrainian/02-javascript-algorithms-and-data-structures/es6/use-the-rest-parameter-with-function-parameters.md
@@ -22,7 +22,7 @@ console.log(howMany("string", null, [1, 2, 3], { }));
Консоль показуватиме рядки `You have passed 3 arguments.` та `You have passed 4 arguments.`.
-Залишковий параметр усуває потребу в перевірці масиву `args` і дає змогу застосувати `map()`, `filter()` та `reduce()` на масиві параметрів.
+The rest parameter eliminates the need to use the `arguments` object and allows us to use array methods on the array of parameters passed to the function `howMany`.
# --instructions--
diff --git a/curriculum/challenges/ukrainian/09-information-security/information-security-with-helmetjs/avoid-inferring-the-response-mime-type-with-helmet.nosniff.md b/curriculum/challenges/ukrainian/09-information-security/information-security-with-helmetjs/avoid-inferring-the-response-mime-type-with-helmet.nosniff.md
index e30fab7ae23..f44aff481bf 100644
--- a/curriculum/challenges/ukrainian/09-information-security/information-security-with-helmetjs/avoid-inferring-the-response-mime-type-with-helmet.nosniff.md
+++ b/curriculum/challenges/ukrainian/09-information-security/information-security-with-helmetjs/avoid-inferring-the-response-mime-type-with-helmet.nosniff.md
@@ -8,7 +8,7 @@ dashedName: avoid-inferring-the-response-mime-type-with-helmet-nosniff
# --description--
-Нагадуємо, що цей проєкт створюється на основі наступного стартового проєкту на Replit або клонований з GitHub. Браузери можуть використовувати вміст або аналізатор трафіку MIME, що дає змогу змінити заголовок відповіді `Content-Type`, щоб вгадати та обробити дані, використовуючи неявний тип вмісту. У деяких випадках такий процес може бути зручним, але він може призвести до деяких небезпечних атак. Це проміжне програмне забезпечення встановлює заголовок X-Content-Type-Options на `nosniff`, вказуючи браузеру не обходити наданий `Content-Type`.
+Нагадуємо, що цей проєкт створюється на основі наступного стартового проєкту на Replit або клонований з GitHub. Browsers can use content or MIME sniffing to override the `Content-Type` header of a response to guess and process the data using an implicit content type. У деяких випадках такий процес може бути зручним, але він може призвести до деяких небезпечних атак. This middleware sets the `X-Content-Type-Options` header to `nosniff`, instructing the browser to not bypass the provided `Content-Type`.
# --instructions--
diff --git a/curriculum/challenges/ukrainian/09-information-security/information-security-with-helmetjs/mitigate-the-risk-of-clickjacking-with-helmet.frameguard.md b/curriculum/challenges/ukrainian/09-information-security/information-security-with-helmetjs/mitigate-the-risk-of-clickjacking-with-helmet.frameguard.md
index b85cbedb09d..130c28b9c15 100644
--- a/curriculum/challenges/ukrainian/09-information-security/information-security-with-helmetjs/mitigate-the-risk-of-clickjacking-with-helmet.frameguard.md
+++ b/curriculum/challenges/ukrainian/09-information-security/information-security-with-helmetjs/mitigate-the-risk-of-clickjacking-with-helmet.frameguard.md
@@ -10,7 +10,7 @@ dashedName: mitigate-the-risk-of-clickjacking-with-helmet-frameguard
Нагадуємо, що цей проєкт створюється на основі наступного стартового проєкту на Replit або клонований з GitHub.
-Ваша сторінка може бути розміщена в `` або `` без вашої згоди. Це може призвести до клікджекінгу, не враховуючи інших атак. Клікджекінг – це техніка обману користувача, при якій він взаємодіє не з тією сторінкою, про яку думає. Цього можна досягти завдяки оформленню вашої сторінки у зловмисному контексті, тобто iframing. Під контекстом мається на увазі, що хакер розміщує поверх вашої сторінки невидимий шар. Невидимі кнопки запускають ворожий скрипт. Це проміжне програмне забезпечення встановлює заголовок X-Frame-Options. Він обмежує дії хакерів, які можуть перенаправити вашу сторінку. Доступні три режими: DENY, SAMEORIGIN і ALLOW-FROM.
+Ваша сторінка може бути розміщена в `` або `` без вашої згоди. Це може призвести до клікджекінгу, не враховуючи інших атак. Клікджекінг – це техніка обману користувача, при якій він взаємодіє не з тією сторінкою, про яку думає. This can be obtained by executing your page in a malicious context, by means of iframing. In that context, a hacker can put a hidden layer over your page. Невидимі кнопки запускають ворожий скрипт. Це проміжне програмне забезпечення встановлює заголовок X-Frame-Options. Він обмежує дії хакерів, які можуть перенаправити вашу сторінку. Доступні три режими: DENY, SAMEORIGIN і ALLOW-FROM.
Немає потреби перенаправляти наш додаток.
diff --git a/curriculum/challenges/ukrainian/14-responsive-web-design-22/learn-the-css-box-model-by-building-a-rothko-painting/60a3e3396c7b40068ad69993.md b/curriculum/challenges/ukrainian/14-responsive-web-design-22/learn-the-css-box-model-by-building-a-rothko-painting/60a3e3396c7b40068ad69993.md
index fcf01f7c189..efc1ba595fc 100644
--- a/curriculum/challenges/ukrainian/14-responsive-web-design-22/learn-the-css-box-model-by-building-a-rothko-painting/60a3e3396c7b40068ad69993.md
+++ b/curriculum/challenges/ukrainian/14-responsive-web-design-22/learn-the-css-box-model-by-building-a-rothko-painting/60a3e3396c7b40068ad69993.md
@@ -7,7 +7,7 @@ dashedName: step-41
# --description--
-Використайте властивість `border-radius` на селекторі `.two`, щоб встановити його верхній лівий та нижній правий радіуси на `8px`, а верхній правий та нижній лівий радіуси на `10px`.
+Use the `border-radius` property on the `.two` selector, to set its top-left radius and bottom-right radius to `8px`, and top-right radius and bottom-left radius to `10px`.
# --hints--
diff --git a/curriculum/challenges/ukrainian/16-the-odin-project/top-learn-html-foundations/html-boilerplate-question-c.md b/curriculum/challenges/ukrainian/16-the-odin-project/top-learn-html-foundations/html-boilerplate-question-c.md
index 97fe46e7f5d..e85e6fb78e8 100644
--- a/curriculum/challenges/ukrainian/16-the-odin-project/top-learn-html-foundations/html-boilerplate-question-c.md
+++ b/curriculum/challenges/ukrainian/16-the-odin-project/top-learn-html-foundations/html-boilerplate-question-c.md
@@ -10,7 +10,7 @@ dashedName: html-boilerplate-question-c
В елементі `` розміщується вся важлива метаінформація про вебсторінки, а також все інше, необхідне для правильного відтворення вебсторінок у браузері. Всередині `` не можна використовувати елементи, які показують вміст на сторінці.
## Елемент meta charset
-Ви завжди повинні мати тег `meta` для відтворення символів вебсторінки в голові документа: ``.
+You should always have the `meta` tag for the `charset` encoding of the webpage in the `head` element: ``.
Налаштувати кодування символів надзвичайно важливо, оскільки це гарантує, що вебсторінка правильно показуватиме спеціальні символи різних мов.