Successfully landed! I have been outsourcing for 2 years. This autumn recruit successfully got the Bytedance offer. I am here to share my experience and give back to the public!

Preface

The host is undergraduate slag 211, master's degree in Chinese, all majors are SE, there is no internship experience when the school recruits, and he has been working in a large factory for more than two years, doing back-end development work. There is no high-concurrency case or high-traffic project. , And there is no scenario where some middleware or nosql must be introduced to solve business problems, referred to as "three noes", you can only try to draw generals from the short ones in your resume and write some content that may have some value. In the process of social recruitment, I took offers from Meituan, Huolala, Weizhong, Ali, and byte, and finally chose byte. Below I will share some of my interview experience and some interview questions and answers below, I hope it will be helpful to you who have not yet landed!

In addition, I am here to prepare interview materials for first-line manufacturers and my original super-hardcore PDF technical documents, as well as several sets of interview questions from major manufacturers that I have carefully prepared for you (continuously updating). Friends in need can click here to download by themselves , Password: csdn hope that everyone can find their favorite job!

Byte side

  • Self introduction

  • What is the tool chain and technology stack you usually use?

  • Has golang ever stepped on the pit? Are there any bugs in this golang code?

  • How to solve the storage, conflict, expansion, and concurrent access of HashMap in Java?

  • What are the advantages and disadvantages of the red-black tree when the linked list is too long in the zipper method?

  • Where is the concurrency insecurity of HashMap reflected?

  • When HashMap expands, what special treatment does it have to read and write operations?

  • How does ConcurrentHashMap achieve concurrency safety?

  • What lock mechanisms does Java have, and what are their characteristics?

  • Do you know CAS? How is CAS implemented in Java?

  • What is the MySQL storage engine used? (InnoDB) Why choose InnoDB?

  • What is the difference between MySQL clustered index and non-clustered index?

  • What are the differences and advantages and disadvantages of B+ trees and binary trees?

  • Design an index for a scene, the specific scene is forgotten, anyway, it is the knowledge of joint index and column selectivity

  • There is a new query scenario, how to solve it?

  • If you want to check A in () AND B in (), how to build an index?

  • When checking A in () AND B in (), how does MySQL use the index?

  • If query A in (), does MySQL check the index for N values ​​separately, or is there a better operation?

  • Which data structures of Redis have you used? How is ZSET implemented?

  • zrange start, stop, the total length is n, what is the complexity?

  • How do Kafka consumers do message deduplication?

  • MySQL de-duplication, Redis de-duplication, if the scene volume is very large and misjudgment is allowed, bloom filter can also be used

  • Introduce Kafka's ConsumerGroup

  • How are Kubernetes and Docker used?

  • What is the storage structure of a time series database?

  • Do you understand the LSM tree? What kind of storage structure is it?

  • Have you used Cassandra and RocksDB in production? How big is the amount?

  • What is Cassandra's tombstone mechanism?

  • Algorithmic question: The original question on Niuke's questionba, you can go to see: NC57 Reverse Number

Byte two

  • Self introduction
  • Have you done any projects? Talk about the core requirements of the project, what are the difficulties in the process, and the realization of the core technology. Talked for nearly 20 minutes
  • What are the methods in the Object class in java and what are their functions?
  • The meaning of polymorphism in java? The difference between stack and heap in jvm?
  • What types of exceptions are commonly thrown by java?
  • .spring affairs, how to spread?
  • sql invasion? How to prevent SQL intrusion
  • The isolation level of database transactions?
  • Talk about redis, what is redis used for? How does redis cache
  • Message queue talk about
  • What is the sql index, the common index method, and when does the index fail? What database engine uses the red-black tree as the index?
  • What is the status code of each field and meaning of the http request line when a redirect occurs? What is normal?
  • The difference between http and https?
  • Talk about several protocols commonly used in the application layer?
  • Who is the most powerful Linux user? Instructions for switching between root and ordinary users?
  • How to find a process and kill it?
  • The difference between process and thread?
  • What kinds of databases have you used?
  • Scenario question: A management system needs to be built in the laboratory. Now you need to implement a login function. How to do it?
  • Do you understand the session? Have you considered the design of login from this perspective?
  • Algorithm: Find the intersection of two ordered arrays with unique elements?
  • Rhetorical question: Through this interview, what do you think I should improve? Answer: In addition to the good foundation of java, other technology stacks are generally mastered. Due to the lack of project practice, the landing design is sparse. . . .

Byte three sides

  • project

  • How does tcp ensure that the data is correct

  • Fast retransmission

  • Congestion avoidance

  • tcp performance

  • How tcp is optimized

  • http https

  • Why https symmetric encryption and asymmetric encryption

  • Coroutine

  • The difference between process and thread

  • Process switching overhead

  • Process scheduling algorithm

  • Find the top k maximum values ​​in the data

  • Push sort complexity

  • The underlying implementation of the heap

  • Fast sorting complexity

  • cookie和session

  • How to realize what is stored in the session

  • Jump table implementation

  • CASE

  • The difference between mysql join and left join

  • Clustered index

  • The difference between clustered index and auxiliary index

  • Code Leetcode25 k a group of rotating linked lists

  • Database table design

  • Book tagging

  • Label books

  • Show ten most popular tags for each book

  • Show the ten most popular books in the emotional category

  • What to do if you repeat likes

  • How to record status

  • How to implement fuzzy query

  • Why does tcp three-way handshake work twice?

  • tcp torrent know

  • Man in the middle attack

  • When do I need to use Head

  • Code: Find a substring in the string s for an array of m characters that are not repeated

  • What if there are m duplicates

  • 64 horses and 8 tracks

to sum up

Finally, I prepared the Java architecture learning materials for everyone. The learning technology content includes: Spring, Dubbo, MyBatis, RPC, source code analysis, high concurrency, high performance, distributed, performance optimization, microservice advanced architecture development, etc. Click here to download by yourself, password: csdn ! Another reminder, full review is the key to eliminating your nervous state of mind, but if you review enough, you will naturally have more confidence in the interview process.

There are also Java core knowledge points + a full set of architect learning materials and videos + first-line interview collections + interview resume templates + Alibaba Meituan Netease Tencent Xiaomi Iqiyi Kuaishou Bilibili interview questions + Spring source code collection + Java architecture actual combat electronics Share the book with everyone for free!

Guess you like

Origin blog.csdn.net/jiagouwgm/article/details/111588327