Summary of Autumn Recruitment! In 3 months of autumn recruitment, I successfully got the offer from Meituan and Kuaishou. I attached my interview experience and hope to help everyone!

Preface

The host of an undergraduate student, the summer internship was an internship at Tencent, and later left the job in early August because he didn't like the work done by the internship. But in fact, I already started the autumn recruitment in mid-July, and the autumn recruitment basically ended by the end of August. In addition, because the host is a Cantonese, the autumn recruits basically only invest in companies in Guangdong Province, and those outside the province have invested in pdd and ape tutoring, but there are pigeons later, because I think that even if they get an offer, they will not leave the province. Therefore, pdd told the interviewer after one face to face that he would not face up next, and Yuandao directly took the written test. Later, I got the offers from Meituan and Kuaishou without any risk!

Meituan-Shanghai-Backstage Development


In addition, I am here to prepare interview materials for first-line manufacturers and my original super hard-core PDF technical documents, as well as a number of interview questions from large manufacturers that I have carefully prepared for you (constantly updated). Friends in need click here to remark csdn , Download by yourself ! Hope everyone can find the job they want!

2020·09·02 side

Ask the project
How the virtual memory of the operating system is mapped to the physical memory What is
the difference between memory paging and memory segmentation
What is the paging algorithm
OSI seven-layer model Which layer is
responsible for data decryption, compression, etc.
What
tcp is the data link layer responsible for in the first protocol layers
tcp protocol to establish, disconnection procedures
enter the URL into your browser to browser pages display process what happened
from this part of the request sent to the server what happened to
the contents of http requests
content http response
browse to render the page based on what the response of
the http protocol idempotency
classified http status code of 405 represents what
Why would rewrite rewrite equal hashcode
relations and equal hashcode method is what
map to achieve the principle of
parental delegation model is what
can Rewrite the String class
What is the
GC process of the
thread pool? The basic parameters of the thread pool and the corresponding changes
. The four major characteristics of
database transactions. The isolation level of the database and the problems solved
. The difference between non-repeatable read and phantom read.
Pessimistic lock and optimistic lock
write SQL
algorithm problem:
Assuming there are m boys and n girls, the number of boys in front of each boy (including himself) must be less than or equal to the number of girls in front of the boy.
For example:
1 male and 1 female, there is only one arrangement,
2 males and 1 female, this arrangement is non-existent,
2 males and 2 females, then there are two arrangements, and
so on , there are
m boys and n The arrangement of girls
31. How to determine whether the parameter is a displacement or an element when removing an element from an Integer type list

2020·09·08 Two sides


The bottom layer of the java collection family tree arrayList, expansion, and related operation time complexity
What should you pay attention to when deleting elements of the arraylist, what exceptions may be thrown
The bottom layer of the hashmap, why the thread is not safe
concurrenthashmap, why the thread safe
final keyword is used, and the final object The role of
String Why is
the realization of final java lock What is
the difference between synchronize and reentranlock
What is aqs, in which package is
the core idea of ​​aqs, how java creates threads,
the core parameters of the thread pool and the corresponding relationship
What is the commonly used blocking queue
Visibility of variables in multithreading.
Volatile keyword, what is instruction reordering, and when does instruction reordering occur.
Java exception system.
What classes
are custom exceptions usually inherited. Class loading mechanism
. What does parent delegation model mean that the parent class loader cannot load?
If you want to judge whether two objects are equal, what methods need to be rewritten?
Why do you need to rewrite hashcode()
Why can java compile
the memory model of multiple running JVMs at once ?
The difference between memory leak and memory overflow
What does java rely on to manage the life cycle
of objects in Java? The life cycle of the
Java object life cycle
The process of gc,
what happens if you cannot allocate enough space after full gc. How will the object enter the old area?
The principle of
java reflection How does java instantiate a class through reflection and can access its private attributes?
Linux input text file contains a certain character String data, count the number of rows (grep -c only outputs the count of matching rows)
Algorithm: flip the binary tree, traverse preorder

2020·09·11 Three sides

Project Introduction The
most challenging/satisfying thing in school is
Spring controller thread safe?
How to understand thread safety
What kind of code is good code
What are the advantages and disadvantages of
foreign keys What are the underlying implementations of mysql foreign keys and ordinary keys? Different.
Unique index is suitable for hash index or B-tree index.
I have not answered any questions on one or two sides.
How to understand distributed and
cache penetration
What is your recent learning plan
What architecture besides MVC on web page display
Disadvantages of MVC
What design patterns do you think are better in spring
? What are the benefits of opening and closing principles?
Can automated testing solve all quality problems?
What are the hidden dangers of continuous operation for a month ?

2020·09·18 Four sides

Introduce themselves
Projects
project to learn what
there other companies
working intention to
work intention
whether the US Mission to know
whether the business sector to understand
learning program / career planning
Why 2B like it
if the difference between 2B and 2C studied
the usual hobbies

Tencent-Shanghai

2020·09·02 side

Code question:
The difference between singly linked list reversal ArrayList and LinkedList The
realization principle of map The difference between
the thread safety of arrayList and vector
How to write a piece of thread-safe code
The difference between process and thread The
process of thread and process communication
tcp disconnection process
tcp disconnection Why To send
the difference between ack tcp and udp, application scenarios
tcp congestion control
TCP flow control, congestion control
Why does the
live broadcast freeze in detail explain the cause and solution of the live broadcast freeze
, the realization of the system call
Didi – CTO
2020·09·06 One side
project architecture
java collection class
map of the realization of the principle
map implementation class and implement the principles of
computer network commonly used in important agreements
of some important computer network protocols (IP, TCP, UDP, HTTP )
introduced mysql
joint index
to enter specific procedure sql database returns a result
when What happened when we entered a SQL query?
The data structure of the B+ tree The
solution to the large amount of data in the database
What should be done when the requirements change frequently during program design What is the linux pipeline for the basic commands of
writing strategy mode
linux

The realization principle of Linux pipeline pipe
List the sorting algorithm
Top10 sorting of ip address frequency in large files
Map statistics frequency and heap sorting
Common data structure algorithm
Algorithm: two-dimensional array to binary tree (adapted from maze problem)
sychorinize and lock
other thread-safe auxiliary
threads Pool core
parameters Change trend of thread pool core parameters

2020·09·06 Two Sides

The solution to the map hash conflict
JUC package
volatile keyword,
can the visibility of object attributes be guaranteed when the underlying implementation of the volatile keyword modifies the object? Will
Synchronized locks on the class affect the instance?
The underlying implementation of reentrantlock implements
BIO and NIO implementation of
tcp timewait Status
mysql index type
mysql joint index application scenarios and precautions
The difference between Mysql where and having
linux how to check the disk io load, the
cause of the deadlock, the solution to the deadlock, the
known design pattern, the
decorator pattern, and the specific implementation of
byte beating – Business Monetization-Back-end
2020·09·07 One side
Algorithm: Given a string returns the length of its longest unduplicated substring, considerations for
MySQL joint index,
can MySQL index range query?
The difference between clustered index and non-clustered index
Database deadlock causes and solutions (the reason is the inconsistent locking sequence)
The difference between snapshot read and current read
redo log, undo log, bin log The difference between redo
log and bin log
The bottom layer of
synchronize realizes the optimization of synchronize, can it be downgraded (not )
reentrant and non-reentrant lock latch distinction
reentrant lock achieved

The implementation of hashmap, an important parameter of the thread pool, the implementation of
concurrentHashMap, the implementation of
Spring aop,
why does Spring ioc allow circular dependencies

2020·09·09 two sides

Use a dice to compose 9 situations.
How to understand the index of
mysql Why not use B-tree as index
The difference between http and https The
longest common substring

Qi Anxin

A company that likes to queue interviewees

2020·09·13 side

mysql field type
mysql query command execution order
mysql query optimization matters
mysql function
java data type
java string commonly used function
static keyword
final keyword
difference between java array and collection
java file class
java create thread
spring controller is more Is it threaded?
How does spring interact with the front end
, the difference between get and post

Kuaishou-Beijing

A company that invests in Shanghai, HR screens for half a month after changing to Beijing, and then screens for half a month by the employing department

2020·09·15 side

Project-related
design patterns
Introduce the template method pattern.
Introduce the proxy mode and application scenarios.
Adapter mode application scenarios.
Decorator mode application scenarios.
Write singleton mode
. What does this refer to?
Why do you need volatile keyword
Mysql innodb transaction in double check lock? How to achieve the
difference between the consistent view of RR and RC
Clustered index and non-
clustered index How clustered index avoids frequent page splits When does
InnoDB add row locks, when does the gap lock, and when does the table lock and
why does the auxiliary index store? Is the primary key value
Algorithm question: Give you an array nums containing n integers, and judge whether there are three elements a, b, c in nums, such that a + b + c = 0? Please find all triples that meet the conditions and are not repeated.
The hashcode of ArrayList, what is equals, and how does
Set de-duplicate

to sum up

Finally, I prepared the Java architecture learning materials for everyone. The learning technology content includes: Spring, Dubbo, MyBatis, RPC, source code analysis, high concurrency, high performance, distributed, performance optimization, microservice advanced architecture development, etc. Friends in need click here to remark csdn and download by yourself ! Another reminder, full review is the key to eliminating your nervous state of mind, but if you review enough, you will naturally have more confidence in the interview process.

Guess you like

Origin blog.csdn.net/jiagouwgm/article/details/111626399