We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as XLSX, PDF, TXT or read online on Scribd
You are on page 1/ 6
Category
General Coding Standards
General Coding Standards General Coding Standards General Coding Standards Code Readability Code Readability Code Readability Code Readability Performance Performance Performance Performance Exception Handling Exception Handling Exception Handling Exception Handling Security Security Security Security Code Modularity and Reusability Code Modularity and Reusability Code Modularity and Reusability Code Modularity and Reusability Testing Testing Testing Testing Compliance and Best Practices Compliance and Best Practices Compliance and Best Practices Compliance and Best Practices Dependency Management Dependency Management Dependency Management Build and Deployment Build and Deployment Build and Deployment Database Interactions Database Interactions Database Interactions Database Interactions Documentation Documentation Documentation Threading and Concurrency Threading and Concurrency Threading and Concurrency Code Analysis Tools Code Analysis Tools Final Checks Final Checks Final Checks Checklist Item Priority Naming conventions followed for classes, methods, variables, and constants. Medium Code properly formatted with consistent indentation. Medium Comments are clear and meaningful. Medium No unused code (e.g., variables, methods, imports). Medium Descriptive method and variable names. Medium Logic is easy to follow. Medium Complex code sections are documented. Medium Long methods refactored into smaller, single-responsibility methods. Medium Expensive operations (e.g., I/O, database calls) are optimized. Medium Efficient implementation of loops and recursion. Medium Memory usage is optimized. Medium Collections are appropriately sized. Medium Exceptions properly caught and handled. Medium Custom exceptions used where appropriate. Medium Correct use of try-catch-finally blocks. Medium Specific exceptions caught instead of generic ones. Medium Sensitive data handled securely (e.g., encryption, masking). Medium Inputs validated and sanitized. Medium Secure methods and libraries used. Medium No hard-coded credentials or sensitive information. Medium Classes and methods are single-responsibility. Medium Common functionality abstracted for reuse. Medium Appropriate design patterns implemented. Medium Dependencies are injected rather than hard-coded. Medium Unit tests cover critical functionality. Medium Automated tests adequately cover code. Medium Comprehensive test cases, including edge cases. Medium Tests pass without failures or warnings. Medium Appropriate use of Java features (e.g., streams, lambdas). Medium Deprecated APIs avoided. Medium Code is compatible with the target Java version. Medium Logging frameworks used instead of System.out.println(). Medium Dependencies are up-to-date and necessary. Medium Dependency versions explicitly defined. Medium Checks for conflicting dependencies. Medium Code builds without errors or warnings. Medium Build scripts configured correctly. Medium Artifacts and configurations are environment-agnostic. Medium Prepared statements used to prevent SQL injection. Medium Transactions handled correctly. Medium Connection pooling used. Medium Queries optimized for performance. Medium Javadoc comments provided for public methods and classes. Medium README file updated. Medium Configuration files well-documented. Medium Thread-safe collections and mechanisms used where needed. Medium Appropriate use of locks, synchronized blocks, or concurrency tools. Medium Race conditions and deadlocks avoided. Medium Static analysis tools (e.g., SonarQube, PMD) used. Medium Reported issues resolved or documented. Medium Code adheres to project standards. Medium No debug logs or temporary test code left in the final version. Medium Code peer-reviewed by another developer. Medium Remarks Yes No N/A Pass