C ++ interview summary kinds of knowledge (for personal use

This thing is not good cast reproduced, it seems only the original cast. . .

Subnetting computer network of computing

https://blog.csdn.net/gui951753/article/details/79412524 a little more detail
the network 21.3.0.0/16 is divided into 128 subnets on the same scale:
first of all have to know / 16 subnet mask corresponding to 255.255 .0.0 (B-based network)
128 = (2 . 7 ) position, as it has a seven-bit master, i.e. 255.255.11111110.00000000.9 0 as a range of IP addresses within the network address plus the subnet (1) and the broadcast address (1). Therefore, there is the IP address of each subnet 510 (2 . 9 -2).
Total net effect cookie defined
TCP and UDP difference
why oriented UDP packets, TCP is a byte-stream-oriented
get and post
big end, the small end introduction
socket communication principles
socket communication instances
check network connectivity applications are ()
the OSI model provides a transparent bit stream is transmitted ()
behind the layer encryption, transport network information does not pass, the physical layer of a data link layer will like to provide transparent transmission bitstream
network programming common API (Interface)
ARP protocol description
assumes that the MAC address is not in the ARP table, how to find the destination MAC address of the sender?
ARP protocol visits
ARP Detailed
ARP operation principle of the
display the current TCP / diagnostic command all the configuration information of the IP network is ()
TCP socket blocking
config: configuration
Too much, and finally I was able to TCP / IP protocol speak plainly it!
HTTP and HTTPS difference between
HTTP requests complete process
HTTPS requests and HTTP difference
for HTTPS TSL / SSL:
(1) HTTPS protocol detailed (B): TLS / SSL works
(2) TSL / SSL explain
a campus network users can not access external site 210.102.58.74, managers can be used in windows operating system () determines a fault occurs within or outside the campus network campus network (network four instructions)
bridge described
congestion control
TCP flow control window and a fixed sliding
DNS domain Name system of
the whole process both host communication network
(communication multilayer routing, the router to find the destination IP address corresponding to the router routing table)
computer network classifier concept (e.g., LAN / MAN / WAN)
following protocols or applications, which are use only TCP, UDP without the use of? (To be understood)

C ++ content

The following function, and other functions that do not belong to a class of ____.
Role in C ++ virtual destructor
virtual function in the base class subclass
subclass constructor parent class calls the
macro definition the type defined
in claim matches the hexadecimal color value, the regular expression may be:
This is the title translation
continue with break action

Operating System topic

Hard and soft interrupt interrupted difference
Why soft interrupt
synchronous and asynchronous
a map to understand interrupts, exceptions and system calls (if known kernel)
deadlock
deadlock avoidance algorithm banker

The principle of operation of the lock system of
the various locks
atomic operation, mutex, spin locks, lock queuing, semaphores, an amount of read and write signals, the order of the lock, write lock
operating systems concurrently in parallel with
the operating system of the basic operating system types and characteristics of
differences on rotational scheduling and preemptive scheduling, the following description is wrong? (Two check their own schedule details)
scheduling algorithm
page replacement algorithm,
the following I / O organization, the main memory and peripheral data exchange is complete control is completed by the CPU executing a program is ().
All programs of the operating system are executed in the state system?
[Operating system family] kernel mode and user mode
five features of the operating system's
virtual storage technology:
the so-called virtual memory, that is, the memory and the external memory organically combine together to use, resulting in a large capacity of "Memory", which says the virtual storage. Due to the growing size of computer software, so when you run the program in a multitasking operating system needs more and more memory, but the high cost of memory, so it is by opening up a space in the external memory as memory usage, running the program the process can be eliminated based on certain algorithms will be temporarily unused programs and data into the space, free up memory space to run more urgent task. This makes the user feel increased memory, real memory space is not increased. This is the principle of virtual storage technology, it is a time for space approach.
Two cooperation process, can not use () to transmit information
the operating system buffer issue
in the following options, the way to lift the deadlock is part of
inner exception (outages) can be divided into fault (fault), trap (trap) and termination (abort ) categories. The following statements about the inner exception, the error is yes.
About the operating system commonly used scheduling algorithms statements is correct ()
operating system heap and stack!
The purpose and function of the file system
Socket can achieve inter-process communication
difference between flash memory and
operating system of the interview often test
functions of the system bus control lines Yes.
aisle

Byte size data type occupies

data structure

Commonly used method for constructing a hash function
on hash_map (hash conflict and the various concepts of)
all kinds of sorting algorithms Detailed!
Balanced binary
tree binary tree turn
sparse matrix storage three
B-tree and B + tree (B + content of the tree is not very good)
dynamic programming ideas about

database

Databases, data administrators, database management system, and so
each record in a relational database file ().
Database Index
Database Basics

Released nine original articles · won praise 1 · views 155

Guess you like

Origin blog.csdn.net/qq_37782336/article/details/104342401