android development course design report! In 2021, you and ByteDance only need this note, a classic good article

First of all, talk about why we need to talk about the advanced language of JAVA. On the whole, the difference between Java and Android is that Android programs are based on components and configurations, and Android development uses Java language as the development tool. On the surface, they are a bit the same. There are different doors, but the difference is actually very big. Android is a mainstream smartphone operating system, and Java is a development language. There is no difference between the good and the bad, and the two are also different positions. From the perspective of the job position, Android is engaged in It is the direction of mobile internet, and Java is the direction of development.

The connection between Android and Java

The applications on the Android application layer are written in Java, and Java is used as the development language. However, Java is not equivalent to Android because the Android SDK references most of the Java SDK, and a few parts are discarded by the Android SDK. Therefore, if you want to engage in Android development, you must have a Java foundation.

Share a wave of introduction interview questions

Tencent—What is symmetric encryption and what is asymmetric encryption? Do public and private keys belong to symmetric encryption?

Interviewer: What is symmetric encryption and what is asymmetric encryption? Do public and private keys belong to symmetric encryption?

Psychological analysis : Cryptography is generally studied in computer science at a university. When interviewers rely on this question, they will not go deep into the underlying content of cryptography, and the difference between symmetric and asymmetric knowledge will be tested. This question is generally not asked in depth, but will ask about https, which currently uses asymmetric encryption. But job seekers must not fall into the trap, saying that they have never heard of symmetry and asymmetry.
**Job applicants:** should start with encryption and decryption

Public key and private key are commonly known as asymmetric encryption methods, which are an improvement from the previous symmetric encryption (using username and password). Let me explain the principle by e-mail.
The purpose of using public and private keys is to achieve secure emails, and the following purposes must be achieved:

    1. The content I send to you must be encrypted and cannot be seen by others during the transmission of the email.
    1. It must be ensured that it is the mail sent by me and not someone else impersonating me.

    To achieve this goal, both people who send the mail must have a public key and a private key. The public key is for everyone to use. You can publish it via email, or let others download it through the website. The public key is actually used for encryption/verification. The private key is your own and must be kept very carefully. It is best to add a password. The private key is used to decrypt/sign. First of all, as far as the ownership of the key is concerned, the private key is only owned by the individual. The function of the public key and the private key is: the content encrypted with the public key can only be decrypted with the private key, and the content encrypted with the private key can only be decrypted with the public key.

    For example, I want to send you an encrypted email. First of all, I must have your public key, and you must also have my public key.

First of all, I use your public key to encrypt this email, so as to ensure that this email is not seen by others, and that this email has not been modified during transmission. After you receive the email, you can decrypt it with your private key and you can see the content.

Secondly, I use my private key to encrypt this email. After it is sent to you, you can decrypt it with my public key. Because the private key is only in my hand, this ensures that this email is sent by me.
When A->B data, A will use B's public key to encrypt, so as to ensure that only B can unlock, otherwise the general public can unlock the encrypted message, which means that the confidentiality of the data is eliminated. Verification uses the mechanism of signing and stamping. When A sends information to everyone, he will use his private key as a signature, so that all people who receive the message can use A’s public key to verify the stamp and confirm the message It was sent by A

This article is in an open source project: What about Android development? How to get a high salary in an interview! It has been included in, which includes self-learning programming routes in different directions, interview question collection/face sutras, and a series of technical articles, etc. The resources are continuously being updated...

The self-learning programming route, interview question collection/face-to-face, and a series of technical articles, etc., resources are being continuously updated...

Guess you like

Origin blog.csdn.net/m0_52308677/article/details/112782582