Byte side

First interview

1 University project done during the
2 questions about some of the projects, spring inversion of control and dependency injection.
3 https connection ssl certificate encryption algorithm used is symmetric or asymmetric algorithms
4 TCP three-way handshake and four wave
5 If the client does not receive a second handshake request sent by the server, the client will do what? Visit again several times
6 Mybatis default transaction isolation level
7 database ACID briefly
transaction isolation level 8, which has several databases

Algorithm title
URL reverse
www.toutiao.com.cn -> cn.com.toutiao.www
time complexity of O (n) can not use the external memory space, only local operations.

Published 56 original articles · won praise 3 · Views 1195

Guess you like

Origin blog.csdn.net/qq_40788718/article/details/103148347