User 1
Author: xjia
link: https://www.nowcoder.com/discuss/225392
Source: Cattle-off network
The basic structure of 1.jvm
2. The memory partition
3. VM stack exception type and reproducibility Code
4. heap memory exception type and reproduced
5. how to use Direct Memory and its management jvm
6. Concurrent container species
7.concurrenthashmap data structure
8. When the list becomes red-black tree and back to the list
9.mysql know several data engine
10.innodb and mylsam difference
11. Failure Index
12. The covering index
13. What is the value of three-way handshake is ack
14. The resulting deadlock how
15. how to prevent deadlock
16. Deadlock code demo
The difference 17.arraylist and linkedlist
Why 18.arraylist query fast (ps addition to the random access Why else)
19.io know of several types
20.nio is one which
User 2
Author: Wow it's Uncle
link: https://www.nowcoder.com/discuss/225485
Source: Cattle-off network
1. Under what to do about the internship: a little.
2. Java final keyword: slightly.
3. Java reflection characteristics: any configuration object runtime execution method.
4. Communication between processes: object of wait, notify; ReentranLock; CountDownLatch; CyclicBarrier.
The deadlock conditions of: exclusive, inalienable, and holding request, wait cycles.
6. deadlock will result in an infinite loop and the program hung to live, how to judge a deadlock or infinite loop: find a corresponding pid began with jps, then jstack pid, view the process in the state of the thread, then there is no deadlock analysis the interviewer said ok, there are no other practice, I can say that the cycle of death interrupted the deadlock can not be interrupted (may be wrong), the interviewer said ok, there is no system to judge the state by the way, I, cpu.
7. The significance of the thread pool parameters: Investigation maximum number of threads, the core number of threads, waiting queue, refused strategies.
8. Oral algorithm: two-way linked list, find the point of intersection.
9. Oral algorithm: mutation decimal binary switch,
1 can turn 001
2 can be transferred 010,002
3 can turn 011
4 can be transferred 100,020,012
Q. 10 How many n-ary conversion method.
The interviewer introduced under their department, the use of language
What do you want to ask.
Tencent feel like to ask dp ah, two rounds of interviews met three dp algorithm.
User 3
Author: KL3
link: https://www.nowcoder.com/discuss/219646?type=2&order=0&pos=4&page=1
Source: Cattle-off network
Operating System Memory section (virtual address how to find the physical address)
swap partition
Why virtual address
how to view the situation linux memory
stack process which put what
Fast row merge sort
Oral algorithm longest palindromic substring
three-way handshake
syn attack
polymorphic
hashmap hashtable
thread state (blocked Waiting TIMED_WAITING)
the JVM memory allocation
== equals hashcode
database isolation level
Dirty read Magic Reading
Two over all things: Duration 22 minutes
Feel the interviewer is not engaged in Java, many issues are voiced by myself, we are talking about understanding.
Talk about the understanding of concurrent
synchronized 和 lock
Talk about juc tools you know
Problems climbing stairs
mysql connection object problem
long transaction
MVCC
Change Buffer
Project
You are undergraduate and graduate
Would you like to do in Chengdu
Doing internships
Three sides
At 10:00 on August 13 34 minutes
Say under what framework you use
Talk to understand and spring cloud of spring mvc
You are practiced serialization framework dubbo of use protobuf it
Talk about tcp and udp
tcp的time wait 和 close wait
Talk about congestion control
How to control the size of the sliding window
(There is a sliding window problem, some can not remember, then did not answer on, not to say, afraid to mislead everyone)
If the server has entered the close state, the client is still in the time wait state, occupied the port, how to solve
View the number of commands tcp connection
You know what linux command
linux in '|' What is the role?
The current system performance bottlenecks encountered, how to locate the problem
How locate memory leaks
Tell me about your tuning direction of jvm
Talk about jvm gc features, your understanding
You do in school project to harvest what you
The size of the project, the number of users and the like. . .
User 4
Author: stay up all night is the root of all evil
Links: https://www.nowcoder.com/discuss/224096?type=2&order=0&pos=6&page=1
Source: Cattle-off network
one side
- MySQL Index
- MySQL Innodb engine of affairs is kind of how? (ACID) MVCC? Lock?
- MySQL master-slave replication principle
- The difference between a primary key and unique index pairs
- There MySQL Replication it? Semisynchronous it? (First asked, learned)
- MyISAM storage engine under the table and index data are stored in what way?
- When joint index will not be used?
- b + tree to talk about
- 100 nodes of how binary search tree to find his first 80 big node
- If the master node Redis cold how to do? Note Sentinel and cluster model is not the same
- Redis fragmentation principle, hash algorithm which is used?
- Redis a client node can access other fragments of it
- Redis master-slave replication principle
- If Redis master copy off from midway how to do? How to solve? If it has been broken for a long time? Half-way cut off by re-take the data buffer memory on the master node, the size is 1M, if the data over, you can not recover
- Spring MVC process is kind of how?
- Related front end: React parent component subassemblies how to pass the Senate? React and JQuery difference? What function is the arrow?
- linux command to see what load? I see a certain port is not occupied with what order? What linux command to establish hierarchical directory?
- Talk about tcp three-way handshake
- Talk about https handshake
- Shredded Code : Given a string, to find the longest string palindromic
Two faces
- Practice what to do?
- As a developer you think there is any way to help the operation and maintenance?
- Talk about the difference between Java and PHP
- If there is a large amount of concurrent requests a read request our database, you should think how to squeeze performance of the database?
- If there is a large amount of concurrent write requests request our database, what do you think should press database?
- Known Node A ping B node when the length of 30ms, ask wget B Node A node resource, the resource will be able to send a package by default, how long?
- Do you know how to debug break it? I ask if a server is already running, and how we as in the development environment to its break point.
- How to monitor our business information, such as how much volume of transactions per hour, not to invade change business code, give a thought?
- If you go to find a load linux server, how to find you.
- You say the database connection pool, if we do not want to compare the database connection pool and connection pool with the database, how do you go to find their response time difference? Not from the operational level, from a more basic level, to analyze the database
- If a person tells you that you are the web interface is slow to respond, your investigation is kind of how?
- Our business there are many queries to the database, if you want to count how many times each query needs are? What would you do? Without a splicing a SQL statement it (too many SQL statements), how would you do?
- If you have a springboard machine, how are you to verify that it is working properly? Talk about your ideas?
- If node A to node B call service, and A node that is Node B process is too slow, and they say Node B processing speed is no problem, you should how to troubleshoot the problem? You can not change the code, go up the investigation on the existing foundation?
- Do you think you can develop the operation and maintenance of what is automated to help develop?
- We know the code to compile C is very troublesome, very often our development efficiency will be affected, and many of our business is written in C, if we publish business with docker, if it is you, what do you think now will be able to alleviate this situation?
- You know the deal with this kind of way ELK log, you can tell me some dimensions from which we can go to find the information we want it?
User 5
Author: Wow it's Uncle
link: https://www.nowcoder.com/discuss/223656?type=2&order=0&pos=7&page=1
Source: Cattle-off network
1. Self-introduction internship experience
2. What language is used? Java? There are other familiar languages? C?
3.C pointer is the physical address?
4. The difference between the stack and heap
The difference 5.hashMap and hashTable
The arithmetic without seeking a number of times 7
6.AB two files have 5 billion url, each url 64K, how to find the same url
710 000 000 Number demand topk
8. There are two incense, incense uneven burn completely to each one hour, 15 minutes determines how seek
9. For the 12 floors, each floor has a diamond, large and small, lift from the bottom up, you can open the elevator doors on each floor view, but can only take one, and can not be exchanged, is there any way to get to the largest
10. The two eggs, floor 100, it is determined that the critical layers of eggs will break
What do you want to ask
====================================
emm Well, I just received Tencent written test, interview possible before cold
User 6
Author: Star 007 007
links: https://www.nowcoder.com/discuss/222766?type=2&order=0&pos=10&page=1
Source: Cattle-off network
First introduced himself, then introduced the item.
TCP and UDP advantages and disadvantages, and under what circumstances to use?
How to determine the stability of the network?
mysql engine, injecting
TCP fourth wave, how to avoid entering timewait
TCP three-way handshake, why not twice?
http message composition (QAQ)
polymorphism of hiding and covering
inheritance and composition
in Linux under development experience
The client once sent two requests, how to distinguish which (taking into account the package is incomplete)?
Heap sort
IO multiplexing
User 7
Author: internship can not find food
link: https://www.nowcoder.com/discuss/223499?type=2&order=0&pos=11&page=1
Source: Cattle-off network
one side
- Talk java container (HashMap blowing for a long time and ConcurrentHashMap).
- Talk about jvm memory management mechanism (comparison with c and java spoke next, mainly explained in detail the process of creating the next object, said lower How to determine the object that was recovered (reachability analysis algorithm), garbage collection algorithm, Garbage collector).
- Why use project redis to cache praise and dislikes? Data inconsistencies how to do? How to ensure persistent data?
- python will it? c language would you? Front-end will it? ios will it? (know a little...)
- To write a title bar, to a log file, which records a day visit ip, time, and so, I hope to obtain access per day. (I feel should be written shell, but I will not, said the interviewer can use java, but I forgot Java io of the api ...)
- Testing understand it? Probably talk about, how to test a pen need to test?
- Anything else you want to ask me?
Two faces
- Will jvm is not it, talk about memory allocation. I blew a lot of objects created, the interviewer say you create an object only say, that other variables? Then probably write a program like this, there is what I ask of each variable?
1 2 3 4 5 6 7 8 |
public class A{ int a; B b1 = new B(); void fun(){ int c; B b2; } } |
- Talk about your project, right, painted about architecture. You use redis do caching, now suppose that you are a test, how many pit redis possible can you suggest? (Left unfamiliar redis tears)
- Overloading and rewritten. Why should there be overloaded, and I can name a function name not do anything else? Talk about how you understand.
- Algorithm problem: given an array to find the number that appear more than half the length of the array. (I have no brain directly with the hash table, the interviewer said, frowning optimizes No, I think for a long time thought out).
- Let me write test cases to test algorithms questions and find out what program you write test cases based on written what bug. . (As leetcode I do, and not be judged on a variety).
User 8
Author: Jinpeng 201,903,071,839,583
link: https://www.nowcoder.com/discuss/222035?type=2&order=0&pos=14&page=1
Source: cattle off net
from nine to ten twenty surface
1. Computer network: url input Enter experienced what (originally thought that is very thin, the interviewer had a layer by layer directly say what each layer dry) , and later asked tcp, routers, switches, anyway, a set of computer network I get to rip off the force. 2. Data structures: I will not tell the truth map, say a quick row and merge (see I was too dishes may not ask) 3. (The interviewer may feel too much food I asked what I most familiar with) my uncle the advantages and disadvantages jvm, gc after a bit algorithms in terms of gc, and tags to organize for why the old era, what with the young for the young with the process of garbage collection, jvm tuning parameters. 4. Next earned ACID, transaction isolation level of a database, each detailed explanation. 5. Consistent hashing algorithm, let me talk about theory, under what scenario can talk directly to, Why! 6. ask me what I got, Java cas syn lock lock talked about the underlying implementation 7 What else do you want to ask me what the fundamental basis of feeling very important, especially important, write a project did not ask! ! Feeling cold ooo, ooo! I summarize the first side to commemorate the fall of trick! ! !