After 37 days of retreat, I finally got my first offer of autumn recruits on the occasion of the National Day, and I successfully entered the job by Byte Beat

Bytedance, I first met the data department. After 3 technical aspects, hr said that he needed an internship to become positive, but refused, and then another department picked up the technical aspects.

Sharing the experience, I hope it will be helpful to everyone. At the end of the article , Qiu Zhao smoothly shared the resource library I prepared for the golden nine and silver ten, including source notes, real interview questions from major companies, job-hopping analysis, resume analysis, project actual source code + notes +Tools, if you need it, you can directly like this article and follow me. In order not to affect your reading experience, I put the method of obtaining it at the end of the article! !

National Day is approaching, byte back-end development 3+4 side, finally got the first offer of autumn recruitment

 

Byte side time: 46 minutes

-Self-introduction- 
(Questions related to internship) 
-MySQL introduces composite indexes. If you determine the order of multiple columns in the composite index, you can make the search more efficient 
-Relational database index data structure 
-Do you understand the return table? Will it happen? 
-Synchronization and Asynchronous 
-what are the advantages and disadvantages of asynchrony 
-part of it is undocumented. .
Algorithm question: 
0001 
1101 
1000 
0 is the ocean and 1 is the land. Find the connected land and return the connected land area. The result is as follows: 
0002 
3302 
3000

Byte second side time: 1 hour

-Questions related to internship 
-Do you have any understanding of service governance-How 
to handle service interface call failures
and what are the strategies for handling dubbo failures  -Retry strategies, and under what conditions can retry be used-What do 
you plan to do if it is a timeout Processing, what is the timeout period of your system 
?
-Know what the current microservice framework is like-How do  dubbo and springMVC be used together, how to configure microservices-Microservices 
have done distributed transactions and distributed Is the lock related-the 
implementation of distributed locks, how zookeeper and redis implement distributed locks 
-what are the differences between these two implementations, and what are the disadvantages of redis implementation- 
do you understand the structure of redis deployment 
-redis master-slave consistency algorithm 
- synchronized to the backup host machine, then there are several strategies 
- from the main zookeeper synchronization strategy 
- zk is usually deployed a few of the main equipment, it is assumed that there are three, suppose I want to write a data into account, the whole process can probably tell us about it 
- zab is a master-slave synchronization strategy, so how do you synchronize data- 
once the host is stored, it will have several responses, a storage request from the host, what has gone through 
-zookeeper is the registry, and others can be the registry The advantages and disadvantages compared to the middleware- 
Do you understand the CAP theory of distributed transactions
-Have you  seen the basic knowledge of distributed? 
Algorithm question: the 
longest common substring 
Given two strings str1 and str2, output the longest common substring of the two strings. If the longest common substring is empty, output -1. 
Output the longest substring length

Byte three-sided time: 50 minutes

-Project related issues 
-How to solve the session problem of multiple machines- 
How to communicate between threads and processes-What is 
the resource allocation of processes and how to divide the memory in Java- 
What kind of isolation level is the default mysql transaction 
-undo log What is the use of, redo log, and binlog respectively? Are these logs available in all mysql engines? Does 
redis use a lot? What happens if you save a longer key? 
Enter toutiao.com in the browser, and it shows no service. Even if there is no error like 404, what is the problem and how to troubleshoot 
-when sending a picture to a person on WeChat, how does the receiver show the progress of the reception, what protocol is used for transmission, that is, the protocol that can be used in IM 
-what is there? You know better, did I not ask? 
Algorithm question: 
restore binary tree based on pre-order and middle-order traversal results

The performance on the second and third sides was not very good. Finally, hr said that if the internship is not acceptable, you can wait for the formal approval and try again. Later, I was interviewed by another department, 3 sides + cross.

Byte education department side time: 1 hour

-A brief introduction to Spring's IOC, DI and AOP 
-IOC benefits, DI implementation (reflection), AOP benefits 
-MySQL storage engine, the difference between InnoDB and MyISAM-the difference between 
clustered index and non-clustered index 
-MyISAM and Innodb The application scenario 
-what locks does MyISAM support 
-introduce the gap lock 
-understand the sorting 
algorithm: 
1. The merge sort of three ordered arrays 
2. What is the length of the longest unique substring of a string? 
The longest unique substring of abccdef is cdef

Byte education department second time: 50 minutes

-Internship project technical architecture, service, storage 
-Microservice interface, storage, whether there are other types of storage (caching) 
-Interesting and difficult points 
-Solving daily problems, troubleshooting methods for online problems 
-Using http protocol, yes There will be no security issues 
-What guarantees the security of https 
-How does the CA certificate ensure that it is not forged 
-What are the two encryption algorithms of https- 
Enter a URL in the browser and cannot open the web page, how to troubleshoot 
-Google can't access it, What do you think is the problem? Do you understand the principle of the wall 
-MySQL index implementation 
-DB indexed with B-tree, the difference between B+ tree and B-tree index 
-Is there a scenario suitable for using B-tree 
-redis data structure 
-bottom layer Do you understand the implementation? What is the underlying realization of zset 
-understanding of NoSQL 
-Java GC mechanism, principle 
-algorithm: n*n array is rotated 90 degrees clockwise, write test cases 
-own advantages and disadvantages

Three-sided time of byte education department: 50 minutes

-Questions related to internship 
-Have you studied computer major related professional courses 
-Algorithm: Queue, with basic functions of queue, and can return the maximum value of the current queue element with O(1) complexity (the maximum value of double-ended queue storage) 
- Redis usage scenarios 
-why use it as a cache 
-what data structure redis supports 
-redis data persistence method 
-is redis concurrency safe 
-the benefits of redis single thread 
-will redis be limited by the memory of a single machine 
-linux view the operating system The order of the process 
-top depends on the process or the thread 
-the probability problem: take turns to toss coins, the probability that the person who toss the head first wins, and the person who toss first wins 
-an evaluation of their current technical ability

Byte education department four-sided time: 60 minutes


-A way to learn computer-related knowledge  -Why do I want to switch to computers 
-Why graduate students didn't read computers- 
. .
-How to learn computer-related content 
-The implementation principle of ArrayList 
-The time complexity of the operation-What is the time complexity of 
inserting elements at the end? If you encounter expansion, the comprehensive time complexity 
-The implementation principle of HashMap, solving hash conflicts Is there any method 
-the advantages and disadvantages of the zipper method and the open address method 
-how to solve the performance degradation problem of the hash conflict for a long time- 
the difference between the zipper method and the open address method in expansion- 
the data operation of the HashMap expansion will have a long pause, what is there? Method to make its impact on performance more average 
-Gradual hash migration, how to deal with data query, insert 
-Redis role 
-Why is redis fast 
-Does
redis have other applications besides caching  -Why can't redis replace MySQL 
-Redis memory size is limited how to do 
- there is a large demand cache, memory capacity is much larger than how to do 
- which meet the needs of database functionality provided by MySQL 
- why the transaction 
- ACID is valid, isolation understand how 
- how do transactional capabilities 
- how to achieve isolation 
- How to achieve MVCC 
-Algorithm: Find the opposite integer pairs [1, -1, 2, 3, 0, -3, -1, 1] from the integer array and return [1, -1] [3, -3] to write a test Use case 
-do you have time for an internship before graduation

Golden nine silver ten interview review process

In addition to the initial question of why the default singleton is asked in Spring, the whole process is basically asking questions while writing the code. It is not difficult to find that one side is mainly about the width of the technology, and the other is about the depth of the technology. But on the one hand, the interviewer also began to frankly tell me not to have too much pressure, I will ask until you can't.

Generally speaking, in the two interviews of BYTE, the interviewer's ability and attitude are very good, and they will guide and communicate. Because of their lack of ability, the school recruitment opportunities are used up, and the resume is picked up by Shenzhen HR and re-enter I took the written test and hope to get me another time.

After the dish will leak filled, do not know their own talent dish of the most terrible, the September and October I have to try it at home no less prepared, under the following share my September and October to prepare for the repository, there is a direct forwarding this article need, private letters The keyword "Autumn Recruitment" can be obtained! !

1. The latest and most comprehensive interview questions and detailed analysis of the first-line Internet companies in 2020 will help you win your favorite offer faster and more steadily!

National Day is approaching, byte back-end development 3+4 side, finally got the first offer of autumn recruitment

 

National Day is approaching, byte back-end development 3+4 side, finally got the first offer of autumn recruitment

 

National Day is approaching, byte back-end development 3+4 side, finally got the first offer of autumn recruitment

 

2. Source notes

  • MyCat performance notes

National Day is approaching, byte back-end development 3+4 side, finally got the first offer of autumn recruitment

 

National Day is approaching, byte back-end development 3+4 side, finally got the first offer of autumn recruitment

 

  • MySQL optimizes the way to the king's promotion

National Day is approaching, byte back-end development 3+4 side, finally got the first offer of autumn recruitment

 

Performance optimization, microservice architecture, advanced concurrent programming, open source framework, distributed interview column

National Day is approaching, byte back-end development 3+4 side, finally got the first offer of autumn recruitment

 

National Day is approaching, byte back-end development 3+4 side, finally got the first offer of autumn recruitment

 

National Day is approaching, byte back-end development 3+4 side, finally got the first offer of autumn recruitment

 

"True"-actual combat of Internet projects

With the rapid development of the Internet of Things, smart vending machines have gradually become popular in people’s daily lives. The smart vending machine operation management system uses existing technology to transform and upgrade traditional vending machines, and continuously optimizes the operation plan through the collection and analysis of operational data. Make corresponding product strategies and activity plans at different points to improve operational efficiency, reduce operational and operation and maintenance costs, shorten the profit cycle of B-end users, and quickly realize commercial value.

Project display:

National Day is approaching, byte back-end development 3+4 side, finally got the first offer of autumn recruitment

 

National Day is approaching, byte back-end development 3+4 side, finally got the first offer of autumn recruitment

 

National Day is approaching, byte back-end development 3+4 side, finally got the first offer of autumn recruitment

 

Functional architecture diagram:

National Day is approaching, byte back-end development 3+4 side, finally got the first offer of autumn recruitment

 

Technical architecture diagram:

National Day is approaching, byte back-end development 3+4 side, finally got the first offer of autumn recruitment

 

Project source code notes:

National Day is approaching, byte back-end development 3+4 side, finally got the first offer of autumn recruitment

 

Source code + tools:

National Day is approaching, byte back-end development 3+4 side, finally got the first offer of autumn recruitment

 

Friends who need the above information:

—————— Like + comment on the article, follow me and add assistant to get

Guess you like

Origin blog.csdn.net/weixin_50205273/article/details/108849236