Didi travel by 2019 end engineers face questions and answers to resolve

First, multiple choice (a total of 26 questions, each question 5 minutes)

1. While financial services network system design, priority should be given () principle.

A, advanced

B, open

C, economy

D, high availability

Reference answer: D

Answer Analysis:

Network design should follow some general principles, including: advanced: the construction of a modern network system, as far as possible the use of advanced and mature technology, should ensure its place in the mainstream for some time, but too new technology, also has shortcomings : consciousness is possible immature; but the younger generation may not be standard, not uniform; 3 is a high price; Fourth, technical support forces may not be sufficient. Openness: adoption of internationally accepted standards and techniques to get a good open, network interconnection is the basis of economy: Based on the needs, we should try to save the high cost of availability: The system must have a high MTBF and the average failure rate as low as possible, generally need to take hot backup, redundancy and other technologies. Financial systems of banking, asset information, many depositors, the data is important, sensitive, large amounts of data must guarantee the absolute security of data, while ensuring that small system response time, a high success rate service, and the service to be incomplete, intermittent fault recovery capability, the entire system must have a very high availability and reliability, not the pursuit of advanced technology, in addition, the financial systems are generally closed operation of openness does not need to put a priority status, Therefore, during the relevant financial system to network design, high availability is the principle of primary consideration.

Join the group 677 079 770 for more answers to interview questions and learning materials.

 

2. The following examples of embodiment of JavaScript embedded in HTML ()

 

 

 

A, as an application embedded

B, a direct link or embed HTML window

C, using an external script file SRC attribute of the application

D, script in a <script> </ script> tag intermediate

Reference answer: D

Answer Analysis: D

 

3. Set the text color attribute should be used

A、font-family

B、font-color

C、color

D, are

Reference answer: C

Answer Analysis: This statement is not font-color

 

4. let "p1" first element turns red, and then slide up and down the slide, the best practice is

A、$("#p1").css("color","red").slideUp(2000).slideDown(2000);

B、$("#p1").css("color","red");<br>$("#p1").slideUp(2000);<br>$("#p1").slideDown(2000);

C、$("#p1").attr("color","red").slideUp(2000).slideDown(2000);

D、$("#p1").attr("color","red");<br>$("#p1").slideUp(2000);<br>$("#p1").slideDown(2000);

Answers: A

Answer Analysis: A css general use css () Chaining jQuery methods allow us to allow a plurality of (in the same element) in a single statement.

Tip: In that case, the browser will not have to look for the same element multiple times.

To link the action before an action, you simply put the motion to append.

 

5. Use CSS to format a page, there are three ways, which is not one of the following:

A, referenced in the HEAD

B, as to reference

C, referenced in the BODY

D, as a file reference

Reference answer: C

Answer Analysis: This question is simply not clear topic

 

6. fuzzing (Fuzz testing) is an unintended by providing input to the target system and method for monitoring abnormal results to discover software vulnerabilities is an important technology for system security holes excavated. Fuzzing test is usually (10)

A, a predetermined number of strings

B, a length of string

C, membership fuzzy sets 

D, random data

Reference answer: D

Answer Analysis: a test case for fuzz testing is usually random data. Discovered software vulnerabilities with unexpected data at random.

 

That is not the front-end frame 7. The following model MVVM

A, Angular

B、React

C、Ember

Answers: B

Answer Analysis: Ember obviously MVC ah. . What a mess title

 

8. The following does not belong ajax event is?

A、ajaxComplete(callback)

B、ajaxSuccess(callback)

C、$.post(url)

D、ajaxSend(callback)

Reference answer: C

Answer Analysis:

 

 

 

 

 

9. Which of the following does not belong to several jquery document processing? ()

A, parcels

B, replacing

C, delete

D, the inner and outer insert

Reference answer: C

Answer Analysis: No

 

10. The following does not belong jquery array function is?

A、Array.search

B、Array.join

C、Array.length

D、Array.reverse

Answers: A

Answer Analysis: array.reverse object using the method of reversing the order of elements in the array to obtain the length Array.length Array.join array elements of the array are connected together in order to construct a string - string, each element of array by into a string, then connecting these strings

 

In 11.JavaScript acquired by navigator.userAgent it is:

A, the user's browser information

B, user agent information

C, user location

D, user IP address

Answers: A

12. The following correct code execution result

The following code execution results are correct

 

A, Friday

B, no result Friday weekend

C, Friday weekend

D, grammar wrong, the result is not running

Reference answer: C

Answer Analysis: C, if the default on the last word will be executed.

 

The following JavaScript code 13 can be performed after the expression exp is 1 second ()

A、window.setTimeout(1000,exp);

B、window.setTimeout(exp,1000);

C、window.setTimeout(exp,1);

D、window.setTimeout(1,exp);

Answers: B

Answer Analysis: 1000 milliseconds is one second

 

14. The following jquery object method, the event delegate is

A、bind

B、mousedown

C、click

D、change

E, is

Reference answer: E

Answer Analysis:

jQuery to achieve the three methods of event delegation:

$ .on: basic usage: $ ( 'parent.') on ( 'click', 'a', function () {console.log ( 'click event on tag a');}), which is .parent element. above events under a proxy to elements $ ( '. parent'), as long as the click event on this element, it will automatically find the elements under a .parent elements, and then respond to events;
$ .delegate: basic usage: $ ( 'parent.') delegate ( 'a', 'click', function () {console.log ( 'click event on tag a');}), supra, and also the corresponding $. delegate to remove the agent of the event;
$ .live:. basic use: $ ( 'a', $ ( '. parent')) live ( 'click', function () {console.log ( 'click event on tag a ');}), as above, but if no incoming parent layer elements $ (parent), that event will be entrusted to default on $ (document); (repealed)
event delegate principle:
event commissioned by event bubbling principle, the use of parent to child trigger event.
If no event delegate, will each li have to add at ul click event listener, very troublesome, but also for memory consumption is very large, you need to consume a lot of performance on efficiency;
the other is if the child node js dynamically created, need to re binding events.

The use of event delegation, then just give the parent a binding event listener, you can let each li are binding on the corresponding event, so you avoid adding event listeners for each specific node; event listener is adding to their parent element. Event listener will analyze bubbling up from the sub-elements of the event, find events which sub-elements Yes.

More --JavaScript event delegate Detailed

 

15. Internet users in most cases through the browser to access the web page, the browser uses hypertext transfer protocol to communicate with the Web server. Abbreviation of Hypertext Transfer Protocol is

A、 HTML

B、 URL

C、 HTTP

D、 FTP

Reference answer: C

Answer Analysis: No

 

16. in HTML5, which combinations of elements for title elements?

A、<group>

B、<header>

C、<headings>

D、<hgroup>

Reference answer: D

Answer Analysis: hgroup has been abolished, such practice is too old. It proposed to delete.

 

17. The principle of digital signature algorithm is elgamal?

A, extended Euclid's theorem

B, Chinese remainder theorem

C, Euler's theorem

D, Raphael's Law

Answers: A

Answer Analysis:

Elgamal digital signature is the use of a discrete number of characteristics to achieve the signature in the following way:

Select a large prime number P, a primitive element G, a random integer d, d belongs [2, p-2];

Generating β, β = G ^ d mod P;

At this time, P, G, β is a public key, referred to as Kpub;

Elgamal referred to as a digital signature sig (x, k) = (r, s); x is a summary of the plaintext, k is a random value temporary private key, denoted Kpr, r, s are integers two signatures;

Signature generation: r = G ^ k mod P; s = (x-dr) k ^ -1 mod (p-1);

After generating the signature, sent together with the plaintext to the receiver;

The recipient computing t = β ^ r · ​​r ^ s mod P receives the message

Verify: t≡G ^ x modP When the signature is valid, the data is not tampered with, otherwise the signature is invalid;

 

18.JS object-oriented principles statement is wrong?

A, Richter substitution principle

B, rely on the principle of

C, substitution principle

D, factory principle

Reference answer: D

Answer Analysis: JS object-oriented principles: the single responsibility principle, open closed principle, the substitution principle (Richter substitution principle), rely on the principle, the principle of separation of the interface, Dimmit principle

 

19. The following response about jquery event, describing the error is?

A, onclick mouse click on an object

B, onfocus the element loses focus

C, onload is css js html document structure and image of a page is finished loading

D, onmousedown a mouse button is pressed

Answers: B

Answer Analysis: onfocus onblur receives focus loses focus

 

20. The Web server can not resolve on your local computer will be able to properly view the page is written in language ()

A、HTML

B、JSP

C、ASP

D、PHP

Answers: A

Answer Analysis: static pages do not need a Web server, you can browse in the native browser, so the answer to this question is A.

 

21. The following description on web page level optimization is the most correct ____.

A, reduce the number of HTTP requests

B, resources and merged compression

C、Inline images

D, will be placed in low-end external script

E, reduce unnecessary HTTP Jump

F, all of the above description

Answers: F

Answer Analysis: F can optimize several other pages

 

22. The following description of the right to form readonly and disabled attributes form input elements are? ()

A, Readonly is true, the script can not modify the value of input

B, Disabled is true, the script can not modify the value of input

C, Readonly is true, as the value of the input does not form submission

D, Disabled is true, as the value of the input does not form submission

Reference answer: D

Answer Analysis: Set readonly = true, can not modify the content on the page, but can be modified by JavaScript, the content will be submitted

Setting disabled = true, can not be modified, nor will be submitted

 

23. Use jQuery insert another in front of an element of the following is the correct option?

A、$('#Div').push('<div>text</div>');

B、$('#Div').add('<div>text</div>');

C、$('#Div').before('<div>text</div>');

D、$('#Div').shift('<div>text</div>');

Reference answer: C

 

24. If you want to add content after a specified element, which is to achieve the following function?

A、append(content)

B、appendTo(content)

C、insertAfter(content)

D、after(content)

Reference answer: D

Answer Analysis: apend and apendTo like after the insertAfter, express the same meaning, expressing different. A.after (B) = B.insertAfter (A). apend in which added elements, after adding the outside elements.

25. A method of obtaining the correct input node are ()

 

 

A、document.querySelectorAll('file')[0]

B、document.getElementById('file')[0]

C、document.getElementByTagName('file')[0]

D、document.getElementsByClassName('file')[0]

Reference answer: D

Answer Analysis: all wrong, fuc \ *

 

26. In the object-oriented software development process, using the design pattern ().

A, allows the use of object-oriented concept in a non-object-oriented programming language in

B, in order to reuse successful design and architecture

C, in order to reduce the number of the design process to create a class

D, to ensure that the running speed of the optimal value

Answers: B

Answer Analysis: B.

Emergence of design patterns is to code reuse, maintainability increase.

Second, multiple-choice questions (questions 4, 5 points each)

 

1.css inheritable property in which

css inheritable property in which

A、height

B、font-size

C、border

D、width

E、color

Answers: B, E

Answer Analysis: There are certainly a lot of people do not know what is inherited, inheritance refers to the child node of the default style attributes use the parent node.

Not too much not to inherit property back, remember what attributes can be inherited on the line. Can inherit property rarely, and only the style color, text, font, line spacing high alignment, and lists can be inherited. So it's very easy to remember! Do not be scared oh ~ below the

 

 

2. Which of the following is a new feature of CSS3?

A, multi-column layout

B, gradient

C, transformation (translation, scaling, rotation)

D, pseudo-elements

Answer: A, B, C

Answer Analysis:

A、B、C。

Multi-plate arrangement --- column-count: 3; text divided into three; column-gap: 20px; predetermined distance 20 between the pixel columns; column-rule: 3px outset # ff0000; between the columns a predetermined width, style and color. Gradient --- background: -webkit-gradient (linear, left top, left bottom, from (# 96ff00), color-stop (0.5, orange), to (rgb (255, 0, 0))); using a linear gradient from () and to () method to specify the color transition point. Transform --- ① translation. transform: translateX (x); defined conversion, with the X-axis values ​​only. transform: translateY (y); conversion is defined only by the value of the Y-axis. ② scaling. transform: scale (x, y); define 2D scale transformation. ③ rotation. transform: rotate (angle); define 2D rotated a predetermined angle in the parameters.

 

3. The following statement on same-origin policy is wrong

A, js, css resources from the same origin policy restrictions

B, the same domain name and port two pages, the two pages homologous

C, the server is also subject to the same origin policy restrictions

D, release the same origin policy will lead to a huge security risk

Answers: B, C

Answer Analysis: same-origin policy only for the browser and the server instead of the browser

 

4. Which of the following functions can be achieved by Cookie? ()

A, recording visitor information

B, pass information between pages

C, automatic identification of the user

D, the database operations

Answer: A, B, C

Answer Analysis:

A term, visitor information can generally be processed into the form of key-value pairs kv, it can be stored in the Cookie, correctly.

Item B, by setting the path of properties such as Cookie, Cookie information can be shared in a particular domain name or the URI, correctly.

Item C, by saving in the Cookie user uid, sid server sessions and other methods, can record user login status, right.

D small text file entry, Cookie is stored on the user's browser, not the database, the database did not provide API operations, so this error.

 

 

Share content limit from time to time :( join the group 677 079 770 for more answers to interview questions and learning materials.)

 ★ Tencent Senior PHP Engineer written questions 

 ★ one hundred million PV high concurrency scenarios order handling 

 ★ laravel development Lynx mall Component Services 

 ★ banners TV video broadcast infrastructure project combat 

 

 

 

 

 

 

 

 



 

Guess you like

Origin www.cnblogs.com/993089249a/p/11612984.html