Bytedance, I first met the data department. After 3 technical sides, hr said that he needed to get a positive internship, but refused, and then another department picked up the technical side.
Sharing the experience, I hope it will be helpful to everyone. At the end of the article , Qiu Zhao smoothly shared the resource library I prepared for the golden nine and silver ten. It includes source code notes, real interview questions from major companies, job-hopping analysis, resume analysis, project actual source code + notes +Tools, if you need it, you can directly follow the three articles, and you can get it by privately mailing the keyword [Autumn Move]! !
Byte side time: 46 minutes
-Self-introduction-
(Questions related to internship)
-MySQL introduces composite indexes. If you determine the order of multiple columns in the composite index, you can make the search more efficient
-Relational database index data structure
-Do you understand the return table? Will it happen?
-Synchronization and Asynchronous
-what are the advantages and disadvantages of asynchrony
-part of it is undocumented. . .
Algorithm question:
0001
1101
1000
0 is the ocean and 1 is the land. Find the connected land and return the connected land area. The result is as follows:
0002
3302
3000
Byte second side time: 1 hour
-Questions related to internship
-Do you have any understanding of service governance-How
to handle service interface call failures
and what are the strategies for handling dubbo failures -Retry strategies, and under what conditions can retry be used-What do
you plan to do if it is a timeout Processing, what is the timeout period of your system? Do you
know what the current
microservice framework is? How do dubbo and springMVC work together? How to configure microservices ? Microservices
have done distributed transactions and distributed Is the lock related-the
implementation of distributed locks, how zookeeper and redis implement distributed locks
-what are the differences between these two implementations, and what are the disadvantages of redis implementation-
do you understand the structure of redis deployment
-redis master-slave consistency algorithm
- synchronized to the backup host machine, then there are several strategies
- from the main zookeeper synchronization strategy
- zk is usually deployed a few of the main equipment, it is assumed that there are three, suppose I want to write a data into account, the whole process can probably tell us about it
- zab is a master-slave synchronization strategy, so how do you synchronize data-
once the host is stored, it will have several responses, a storage request from the host, what has gone through
-zookeeper is the registry, and others can be the registry The advantages and disadvantages compared to the middleware-
Do you understand the CAP theory of distributed transactions
-Have you seen the basic knowledge of distributed?
Algorithm question: the
longest common substring
Given two strings str1 and str2, output the longest common substring of the two strings. If the longest common substring is empty, output -1.
Output the longest substring length
Byte three-sided time: 50 minutes
-Project-related issues
-How to solve the session problem of multiple machines-
How to communicate between threads and processes-What is
the resource allocation of processes and how the memory in java is divided
-Which isolation level is the default for mysql transactions
-undo log What is the use of, redo log, and binlog respectively? Are these logs available in all mysql engines? Does
redis use a lot? What happens if you save a longer key?
Enter toutiao.com in the browser, and it shows no service. Even if there is no error like 404, what will be the problem and how to troubleshoot
-when sending a picture to a person on WeChat, how does the receiver display the progress of the reception, what protocol is used for transmission, that is, the protocol that can be used in IM
-what is there? You know better. Didn’t I ask?
Algorithm question:
restore binary tree based on pre-order and middle-order traversal results
The performance on the second and third sides was not very good. Finally, hr said that if the internship is not acceptable, you can wait for the formal approval and try again. Later, I was interviewed by another department, 3 sides + cross.
Byte education department side time: 1 hour
-A brief introduction to Spring's IOC, DI and AOP
-IOC benefits, DI implementation (reflection), AOP benefits
-MySQL storage engine, the difference between InnoDB and MyISAM-the difference between
clustered index and non-clustered index
-MyISAM and Innodb The application scenario
-what locks does MyISAM support
-introduce gap locks
-understand the sorting
algorithm:
1. Merging and sorting three ordered arrays
2. Finding the length of the longest unique substring of a string?
The longest unique substring of abccdef is cdef
Byte education department second time: 50 minutes
-Internship project technical architecture, service, storage
-Microservice interface, storage, whether there are other types of storage (caching)
-Interesting and difficult points
-Solving daily problems, troubleshooting methods for online problems
-Using http protocol, yes There will be no security issues
-What guarantees the security of https
-How does the CA certificate guarantee that it is not forged
-What are the two encryption algorithms of https-
Enter a URL in the browser and cannot open the web page, how to troubleshoot
-Google can't access it, What do you think is the problem? Do you understand the principle of the wall
-MySQL index implementation
-DB indexed with B-tree, the difference between B+ tree and B-tree index
-Is there a scenario suitable for using B-tree
-Redis data structure
-Bottom Do you know the implementation? What is the bottom layer of zset?-Understanding
of NoSQL
-Java GC mechanism, principle
-algorithm: n*n array rotate 90 degrees clockwise, write test cases
-own advantages and disadvantages
Three-sided time of byte education department: 50 minutes
-Questions related to internship
-Have you studied computer-related professional courses
-Algorithm: Queue, with basic functions of queue, and can return the maximum value of the current queue element with O(1) complexity (the maximum value of double-ended queue storage)
- Redis usage scenarios
-why use it as a cache
-what data structure redis supports
-redis data persistence method
-is redis concurrency safe
-the benefits of redis single thread
-will redis be limited by the memory of a single machine
-linux view the operating system The order of the process
-top depends on the process or the thread
-Probability problem: take turns to toss coins, the probability that the person who toss the head first wins, the person who toss first wins
-an evaluation of their current technical ability
Byte education department four-sided time: 60 minutes
-A way to learn computer-related knowledge -Why do I want to switch to computers
-Why graduate students didn't read computers-
. . .
-How to learn computer-related content
-The implementation principle of ArrayList
-The time complexity of the operation-What is the time complexity of
inserting elements at the end? If you encounter expansion, the comprehensive time complexity
-The implementation principle of HashMap, solving hash conflicts Is there any method
-the pros and cons of the zipper method and the open address method
-how to solve the problem of performance degradation when the hash conflicts are prolonged-the
difference between the zipper method and the open address method in expansion-
the data operation of the HashMap expansion will have a long pause, what is there? Method to make its impact on performance more average
-Gradual hash migration, how to deal with data query, insert
-Redis role
-Why is redis fast
-Does
redis have other applications besides caching -Why can't redis replace MySQL
-Redis memory size is limited how to do
- there is a large demand cache, memory capacity is much larger than how to do
- which meet the needs of database functionality provided by MySQL
- why the transaction
- ACID is valid, isolation understand how
- how do transactional capabilities
- how to achieve isolation
- How to achieve MVCC
-Algorithm: Find the opposite integer pairs [1, -1, 2, 3, 0, -3, -1, 1] from the integer array and return [1, -1] [3, -3] to write a test Use case
-do you have time for an internship before graduation
Golden nine silver ten interview review process
In addition to the initial question of why the default singleton is asked in Spring, the whole process is basically asking questions while writing the code. It is not difficult to find that one side is mainly about the width of the technology, and the other is about the depth of the technology. But on the one hand, the interviewer also began to frankly tell me not to have too much pressure, I will ask until you can’t.
Generally speaking, in the two interviews of BYTE, the interviewer's ability and attitude are also very good, and they will guide and communicate. Because of their lack of ability, the school recruitment opportunities are used up, and the resume is picked up by the Shenzhen HR and participates again. I took the written test and hope to get me another time.
I have to check for missing dishes and fill up the vacancies. I don’t know the most terrifying talents of my own dishes. This time I am eager to try the Golden Nine and Silver Ten and I have not prepared less at home. Below I will share my Golden Nine and Silver Ten preparation resource library. Private message keywords [Autumn Recruitment] or see below to get! !
1. The latest and most complete interview questions and detailed analysis of the first-line Internet companies in 2020 will help you win your favorite offer faster and more steadily!
2. Source notes
- MyCat performance notes
MySQL optimizes the way to the king's promotion
Performance optimization, microservice architecture, advanced concurrent programming, open source framework, distributed interview column
"True"-actual combat of Internet projects
With the rapid development of the Internet of Things, smart vending machines have gradually become popular in people’s daily lives. The smart vending machine operation management system uses existing technology to transform and upgrade traditional vending machines, and continuously optimizes the operation plan through the collection and analysis of operational data. Make corresponding product strategies and activity plans at different points to improve operational efficiency, reduce operational and operation and maintenance costs, shorten the profit cycle of B-end users, and quickly realize commercial value.
Project display:
Functional architecture diagram:
Technical architecture diagram:
Project source code notes:
Source code + tools:
Friends who need the full version of the source code + notes can directly scan the following to get it for free!