In-depth review of my 5 rounds of Ant Financial interviews, from the underlying principles to the source code discussion, in fact, that's the case with the big factory!

Preface

Judging from the experience written by other big guys, I should first introduce myself. I graduated from 211, which is my major. After graduation, I was in Ping An from internship to work. For some reason (actually, I broke up with my girlfriend), I left my old boss to find her, and finally came back to meet my expectations! After this, I thought that I couldn’t just wait for a job, so I started to invest in my resume, which was not ideal at the beginning. I reviewed it at home for two months and my friends pushed ant into it. Last month, I fought 5 rounds of interviews successfully. Now I will share my experience with everyone!

one side:

1. Personal introduction plus project introduction for 20 minutes

2. What is the microservice architecture? Its advantages and disadvantages?

3. ACID CAP BASE theory

4. Distributed consensus protocol, two-stage, three-stage, TCC, advantages and disadvantages

4. RPC process

5. What should I do if the service registry is down?

6. What other components are there in microservices?

7. The relationship between distributed architecture and microservices

8. Do you have any questions for me?

Two sides:

1. Various sorting algorithms, unsorted conventional data to find the K-th largest number, time complexity.

2. The depth of the binary tree

3. Do you understand virtual memory paging?

4. What is the difference between process and thread?

5. What is the first, second and third paradigm?

6. A table has a thousand column values ​​of true and false, and writing SQL query has 300 rows with column values ​​of true.

7. What are dirty reading and phantom reading?

(1) Dirty read refers to when a transaction is accessing data and the data is modified. And this modification has not been submitted to the database. At this time, another transaction also accessed the data, and then used the data.

(2) The phantom read refers to a phenomenon that occurs when the transaction is not executed independently, for example, the first transaction modifies the data in a table, and this modification involves all data rows in the table. At the same time, the second transaction also modified the data in this table, this modification is to insert a new row of data into the table. Then, the user who operates the first transaction in the future will find that there are still unmodified data rows in the table, as if an illusion has occurred.

8. What object will be promoted from the new generation to the old generation

9. A task is divided into ten tasks, and the final calculation is summarized. Fork/join cannot be used

10. Do you understand the source code of the open source framework?

11. Two open questions for data modeling and individual questions

12. How much do you know about safety?

13. What are the security protocols and what is https?

14. Introduce your project and its difficulties.

15. Tear code by hand. You can check the original question on Niuke Tiba: NC58 found two wrong nodes in the search binary tree

The interview questions and review materials that you promised earlier are now all shared with you. The chapter includes many knowledge points, including basic knowledge, Java collections, JVM, multithreaded concurrency, spring principles, microservices, Netty and RPC, Kafka , Diary, design pattern, Java algorithm, database, Zookeeper, distributed cache, data structure, etc. Interested friends can click here to remark csdn to get it free of charge, hope it will help you!

Three sides:

1. Ask all the way from ConcurrentHashMap to lock & lock optimization -> LongAdder -> pseudo sharing -> cache line filling -> cas and many other technical details;

2. Ask all the way from hystrix to the principle -> how to implement it -> how to optimize -> reactive streams;

3. From simple producer-consumer model design to efficient and robust implementation, etc.

Four sides:

1. How to output a singly linked list in reverse order?

2. Personal direct idea is to use the first-in-last-out feature of the stack to read the linked list data into the stack and then output it.

3. Is there a better way to achieve it?

4. Mainly ask about the situation of the project, and then according to a project, ask if the magnitude is expanded by 1000 times, what would you do? 5. What are the optimization measures? High performance & high availability measures?

Five sides:

1. What is the personal career plan?

2. What is the biggest problem or difficulty you encountered?

3. What do you think of our company?

3. What can you bring to our company?

4. What are your strengths and weaknesses?

At last

Summarizing this interview, the interviewer has been asking that the rules are not particularly difficult, of course it is not so easy. There were a few overturns in the middle, which was also a surprise. Many friends privately believed that I wanted information. Now I will share with you:
oumian
Insert picture description here
Insert picture description here

At the end of the article, I will add a few more verbose words. I am already preparing to join the job at the end of this month. Looking back on this interview, I can describe it as a breathtaking experience. I have some experience in the interview with a big factory. , The main thing is to have your own technology in place. The above information is believed to be of great help to everyone. Friends in need can click here to comment csdn to receive it. It is also a bit of my virtue to share with you. It is still at the end of the article Bless everyone, ask for a wife to get a wife, ask for a child, and ask for an offer.

Guess you like

Origin blog.csdn.net/weixin_49494194/article/details/110291787