5 face finally got beat byte offer! God knows what I went through ...

Coordinates of Beijing, some 211 graduates, school activities have been byte before beating visit the headquarters of the company, so it has been quite want to get into byte whose work is influenced by byte corporate culture and working atmosphere. Bytes as the fastest growing Internet companies, many users of its products are par BAT, so he is regarded as a byte diehard powder.

This fall strokes, not how other companies are basically ready, because the goal is to set an early jump bytes, so the earlier interview two months to prepare for this byte received from the interview, to get the total offer 336 hours 53 minutes 21 seconds, this period of time, I'm not a moment was not nervous until I clearly see the "letter of intent hire" five characters, hanging in the heart was put down.

The byte beating interview, gave me strong feelings, aware of the importance of the foundation, the technical side of 4 bytes + HR surface, especially to share the technical side of 4 Zhenti, there may be some record incomplete, but how much are also able to interview a number of bytes or byte planned interview friends to help.

Byte beating technical side

Q plane are still relatively basic, and the answers have to be pretty well

1. say it under your internship program

2. thread to talk about the meaning of the parameters

3. Innodb index achieved

4. Why is B + tree?

5. Redis use of distributed lock implementations

6. The operating system of the virtual memory paging process

7. TCP three-way handshake

Role 8. volatile keyword

9. optimistic locking, pessimistic locking

10. HashMap structure, whether or not thread safe? How ConcurrentHashMap guarantee thread safety?

11. What design pattern used before?

12. The algorithm problem: sliding window

Byte beating technology dihedral

Bytes are found interviewer came young, nor how hair bald, ha ha ~

1. talk about the difference between B and B + tree tree

2. HashMap talk about realization of the expansion mechanism, when the expansion of how to ensure operational?

3. Redis expansion mechanism (progressive expansion of single-threaded)

4. Spring AOP principle of

5. Spring IoC principles, how to, how to resolve circular dependencies?

6. The two threads of the variable i are incremented, the outcome? why? How to deal with it?

7. CAS concept atoms class implementation principle

8. synchronize the underlying implementation, how Lock?

9. AQS What are the characteristics?

10. handwriting project a module code.

11. Presentation of various network protocols.

12. DNS in which network layer protocol used, and why.

13. HTTPS protocol description, detailed SSL during connection establishment.

14. Code Title: reverse singly linked list.

15. Code Title: Complex copy list.

16. Code Title: array a, the first address and then monotonically decreasing monotonously, the number of different elements of the output array.

Requirements: O (1) the spatial complexity, can not change the original array

Technical byte beating three sides

Algorithm given problem to explode, the feeling is special algorithm, the universe really deserved reputation strip

1. talk about Java garbage collection

2.64 horses, eight track, looking for the fastest 4 horses.

3.64 horses, eight track, looking for the fastest 8 horses.

4. ascending given two arrays A, B, and the length m, n, k-th large demand

The given array A, of length n, the value of the array element is in [0, n - 1] between, whether there are duplicate elements required

6. talk about the difference between multi-threaded and multi-process

7. JVM in when it will be garbage collection? What kind of objects can be recycled?

8. Spring main idea is what?

9. What are your future direction? Determine that? Going to have to do Java? We have considered it turn?

10. That is how you usually learn Java it?

11. Share a book recently read

Beating four-byte Technology

That poor state, the interviewer did not ask too many questions, thinking out of the question

Scene 1. Title: Design a short domain name service: SMS site can not exist too long, need ended up short domain name, how do you design a service, can be a URL nationwide service.

2. TCP three-way handshake is why the fourth wave?

3. The database isolation level

4. sql problem, even wrote a fuzzy query table query plus

5. Algorithm: ...... binary image

HR-byte beating surface

Sigh again, beating byte little sister and beautiful and young!

1. Self-introduction

2. You understand bytes beat it? Talk bytes in your eyes now!

3. You usually use byte beating Which product more?

4. Why do you want to bytes? The city is intent Beijing?

5. talk about your own career planning it

6. expected salary

7. Other general questions

to sum up

No. 11 October-mail to receive information, HR plus my micro letter directly to the letter of intent, and then check to confirm well, to determine the entry time, very happy. In general, if you have your own big companies want to go, be sure to upgrade themselves, make their own ability and the quality of the company match, and I always believe that opportunities will always be people who are prepared.

Scan code public concern number [chi] fresh programmer living thing not to miss an Internet!


Guess you like

Origin blog.51cto.com/14658255/2465045