After being rejected by 20 companies, I ate the source code and notes for 30 days and went to fight the byte back-end development 3+4 side, and finally got the offer! (Attached to the face sutra)

Bytedance, I first met the data department. After 3 technical sides, hr said that he needed to get a positive internship, but refused, and then another department picked up the technical side.

Sharing the experience, I hope it will be helpful to everyone. At the end of the article , Qiu Zhao smoothly shared the resource library I prepared for the golden nine and silver ten. It includes source code notes, real interview questions from major companies, job-hopping analysis, resume analysis, project actual source code + notes +Tools, if you need it, you can directly follow the three articles, and you can get it by privately mailing the keyword [Autumn Move]! !

National Day is approaching, byte back-end development 3+4 side, finally got the first offer of autumn recruitment

 

Byte side time: 46 minutes

 

-Self-introduction- 
(Questions related to internship) 
-MySQL introduces composite indexes. If you determine the order of multiple columns in the composite index, you can make the search more efficient 
-Relational database index data structure 
-Do you understand the return table? Will it happen? 
-Synchronization and Asynchronous 
-what are the advantages and disadvantages of asynchrony 
-part of it is undocumented. .
Algorithm question: 
0001 
1101 
1000 
0 is the ocean and 1 is the land. Find the connected land and return the connected land area. The result is as follows: 
0002 
3302 
3000

Byte second side time: 1 hour

-Questions related to internship 
-Do you have any understanding of service governance-How 
to handle service interface call failures
and what are the strategies for handling dubbo failures  -Retry strategies, and under what conditions can retry be used-What do 
you plan to do if it is a timeout Processing, what is the timeout period of your system? Do you 
know what the current
microservice framework is? How do dubbo and springMVC work together? How to configure microservices Microservices 
have done distributed transactions and distributed Is the lock related-the 
implementation of distributed locks, how zookeeper and redis implement distributed locks 
-what are the differences between these two implementations, and what are the disadvantages of redis implementation- 
do you understand the structure of redis deployment 
-redis master-slave consistency algorithm 
- synchronized to the backup host machine, then there are several strategies 
- from the main zookeeper synchronization strategy 
- zk is usually deployed a few of the main equipment, it is assumed that there are three, suppose I want to write a data into account, the whole process can probably tell us about it 
- zab is a master-slave synchronization strategy, so how do you synchronize data- 
once the host is stored, it will have several responses, a storage request from the host, what has gone through 
-zookeeper is the registry, and others can be the registry The advantages and disadvantages compared to the middleware- 
Do you understand the CAP theory of distributed transactions
-Have you  seen the basic knowledge of distributed? 
Algorithm question: the 
longest common substring 
Given two strings str1 and str2, output the longest common substring of the two strings. If the longest common substring is empty, output -1. 
Output the longest substring length

Byte three-sided time: 50 minutes

 

-Project-related issues 
-How to solve the session problem of multiple machines- 
How to communicate between threads and processes-What is
the resource allocation of processes and how  the memory in java is divided 
-Which isolation level is the default for mysql transactions 
-undo log What is the use of, redo log, and binlog respectively? Are these logs available in all mysql engines? Does 
redis use a lot? What happens if you save a longer key? 
Enter toutiao.com in the browser, and it shows no service. Even if there is no error like 404, what will be the problem and how to troubleshoot 
-when sending a picture to a person on WeChat, how does the receiver display the progress of the reception, what protocol is used for transmission, that is, the protocol that can be used in IM 
-what is there? You know better. Didn’t I ask? 
Algorithm question: 
restore binary tree based on pre-order and middle-order traversal results

 

The performance on the second and third sides was not very good. Finally, hr said that if the internship is not acceptable, you can wait for the formal approval and try again. Later, I was interviewed by another department, 3 sides + cross.

 

Byte education department side time: 1 hour

-A brief introduction to Spring's IOC, DI and AOP 
-IOC benefits, DI implementation (reflection), AOP benefits 
-MySQL storage engine, the difference between InnoDB and MyISAM-the difference between 
clustered index and non-clustered index 
-MyISAM and Innodb The application scenario 
-what locks does MyISAM support 
-introduce gap locks 
-understand the sorting 
algorithm: 
1. Merging and sorting three ordered arrays 
2. Finding the length of the longest unique substring of a string? 
The longest unique substring of abccdef is cdef

Byte education department second time: 50 minutes

-Internship project technical architecture, service, storage 
-Microservice interface, storage, whether there are other types of storage (caching) 
-Interesting and difficult points 
-Solving daily problems, troubleshooting methods for online problems 
-Using http protocol, yes There will be no security issues 
-What guarantees the security of https 
-How does the CA certificate guarantee that it is not forged 
-What are the two encryption algorithms of https- 
Enter a URL in the browser and cannot open the web page, how to troubleshoot 
-Google can't access it, What do you think is the problem? Do you understand the principle of the wall 
-MySQL index implementation 
-DB indexed with B-tree, the difference between B+ tree and B-tree index 
-Is there a scenario suitable for using B-tree 
-Redis data structure 
-Bottom Do you know the implementation? What is the bottom layer of zset?-Understanding 
of NoSQL 
-Java GC mechanism, principle 
-algorithm: n*n array rotate 90 degrees clockwise, write test cases 
-own advantages and disadvantages

Three-sided time of byte education department: 50 minutes

 

-Questions related to internship 
-Have you studied computer-related professional courses 
-Algorithm: Queue, with basic functions of queue, and can return the maximum value of the current queue element with O(1) complexity (the maximum value of double-ended queue storage) 
- Redis usage scenarios 
-why use it as a cache 
-what data structure redis supports 
-redis data persistence method 
-is redis concurrency safe 
-the benefits of redis single thread 
-will redis be limited by the memory of a single machine 
-linux view the operating system The order of the process 
-top depends on the process or the thread 
-Probability problem: take turns to toss coins, the probability that the person who toss the head first wins, the person who toss first wins 
-an evaluation of their current technical ability

Byte education department four-sided time: 60 minutes


-A way to learn computer-related knowledge  -Why do I want to switch to computers 
-Why graduate students didn't read computers- 
. .
-How to learn computer-related content 
-The implementation principle of ArrayList 
-The time complexity of the operation-What is the time complexity of 
inserting elements at the end? If you encounter expansion, the comprehensive time complexity 
-The implementation principle of HashMap, solving hash conflicts Is there any method 
-the pros and cons of the zipper method and the open address method 
-how to solve the problem of performance degradation when the hash conflicts  are prolonged-the
difference between the zipper method and the open address method in expansion- 
the data operation of the HashMap expansion will have a long pause, what is there? Method to make its impact on performance more average 
-Gradual hash migration, how to deal with data query, insert 
-Redis role 
-Why is redis fast 
-Does
redis have other applications besides caching  -Why can't redis replace MySQL 
-Redis memory size is limited how to do 
- there is a large demand cache, memory capacity is much larger than how to do 
- which meet the needs of database functionality provided by MySQL 
- why the transaction 
- ACID is valid, isolation understand how 
- how do transactional capabilities 
- how to achieve isolation 
- How to achieve MVCC 
-Algorithm: Find the opposite integer pairs [1, -1, 2, 3, 0, -3, -1, 1] from the integer array and return [1, -1] [3, -3] to write a test Use case 
-do you have time for an internship before graduation

Golden nine silver ten interview review process

In addition to the initial question of why the default singleton is asked in Spring, the whole process is basically asking questions while writing the code. It is not difficult to find that one side is mainly about the width of the technology, and the other is about the depth of the technology. But on the one hand, the interviewer also began to frankly tell me not to have too much pressure, I will ask until you can’t.

 

Generally speaking, in the two interviews of BYTE, the interviewer's ability and attitude are also very good, and they will guide and communicate. Because of their lack of ability, the school recruitment opportunities are used up, and the resume is picked up by the Shenzhen HR and participates again. I took the written test and hope to get me another time.

I have to check for missing dishes and fill up the vacancies. I don’t know the most terrifying talents of my own dishes. This time I am eager to try the Golden Nine and Silver Ten and I have not prepared less at home. Below I will share my Golden Nine and Silver Ten preparation resource library. Private message keywords [Autumn Recruitment] or see below to get! !

1. The latest and most complete interview questions and detailed analysis of the first-line Internet companies in 2020 will help you win your favorite offer faster and more steadily!

National Day is approaching, byte back-end development 3+4 side, finally got the first offer of autumn recruitment

 

National Day is approaching, byte back-end development 3+4 side, finally got the first offer of autumn recruitment

 

National Day is approaching, byte back-end development 3+4 side, finally got the first offer of autumn recruitment

2. Source notes

  • MyCat performance notes

National Day is approaching, byte back-end development 3+4 side, finally got the first offer of autumn recruitment

 

National Day is approaching, byte back-end development 3+4 side, finally got the first offer of autumn recruitment

MySQL optimizes the way to the king's promotion

National Day is approaching, byte back-end development 3+4 side, finally got the first offer of autumn recruitment

 

Performance optimization, microservice architecture, advanced concurrent programming, open source framework, distributed interview column

National Day is approaching, byte back-end development 3+4 side, finally got the first offer of autumn recruitment

 

National Day is approaching, byte back-end development 3+4 side, finally got the first offer of autumn recruitment

 

National Day is approaching, byte back-end development 3+4 side, finally got the first offer of autumn recruitment

 

"True"-actual combat of Internet projects

With the rapid development of the Internet of Things, smart vending machines have gradually become popular in people’s daily lives. The smart vending machine operation management system uses existing technology to transform and upgrade traditional vending machines, and continuously optimizes the operation plan through the collection and analysis of operational data. Make corresponding product strategies and activity plans at different points to improve operational efficiency, reduce operational and operation and maintenance costs, shorten the profit cycle of B-end users, and quickly realize commercial value.

Project display:

National Day is approaching, byte back-end development 3+4 side, finally got the first offer of autumn recruitment

 

National Day is approaching, byte back-end development 3+4 side, finally got the first offer of autumn recruitment

 

National Day is approaching, byte back-end development 3+4 side, finally got the first offer of autumn recruitment

Functional architecture diagram:

National Day is approaching, byte back-end development 3+4 side, finally got the first offer of autumn recruitment

Technical architecture diagram:

National Day is approaching, byte back-end development 3+4 side, finally got the first offer of autumn recruitment

Project source code notes:

National Day is approaching, byte back-end development 3+4 side, finally got the first offer of autumn recruitment

Source code + tools:

National Day is approaching, byte back-end development 3+4 side, finally got the first offer of autumn recruitment

Friends who need the full version of the source code + notes can directly scan the following to get it for free!

Guess you like

Origin blog.csdn.net/m0_46757769/article/details/108998711