introduction
1, this number is not public and blog promotion, please rest assured
2, Java back-end development experience, there is no other job reference
3, pure fat save character experience, there is a message we can discuss the problem, help each other! !
4, individual learning methods, not necessarily for everyone.
5, learning of his own time squeeze, the process does not form.
background
I a degree that the double bottom of non-Master 211. This large electronic communications, totally 0 basis, change jobs a year.
Started
1, to be honest, just decided to switch entirely when a zero-based start what really will not, do not even know how to learn. Indeed, a lot of computer resources, self-sufficient, but do not know how to take up learning ah!
What is leetcode?
What is github?
What is IDEA?
A variety of questions, how to operate ah? Which point ah? No one around to teach ah.
Sometimes it is really just people who know something in two, their practice to the afternoon. Mother a chicken, the first month is really a complete waste of time, place and almost gave up.
Adjust strategy
1, a firm confidence in the strategy: Since so many people can do a programmer, even high school students can, I am sure other people can also be.
2, the tactical plan: training sessions to see the video I also see the video slightly, right, is a variety of videos. (Now that I think even that is their own courses out)
The benefits of the video is started quickly, as if surrounded by teacher taught step by step operation to you. It is important that the teacher training school very seriously, really is the level of high school students for lectures. Caton nothing to worry about, do not understand. Remember a course teachers still talking about what is binary and permutation and combination ,,,,
In this way, my first face to you by:
Tencent cloud
CSIG following Tencent cloud technology stack surface is Java, but hardly ye ask Java.
Side (phone) (50 minutes)
-
Algorithms question: sixty-seven, it is difficult to prove safety offer
-
Half an hour Projects & Answers
-
Distributed Related: rpc principle, micro Services Architecture
-
Massive data problems: routine questions
-
Total net: the transport layer, network layer (must be very familiar, ping principle, tcp three-way handshake, waving four times, congestion control .UDP unreliable, one to one, one to many)
-
Operating System: Virtual memory segment, page type, process scheduling algorithm
-
Data consistency: consistency of distributed data, cache data consistency
-
Java Related: thread pool, HashMap, CopyOnWriteArrayList
-
Redis Related: copy principle, the principle of persistence
- Zatan: recently to see what books, practice location.
Dihedral (Video) (85 minutes)
-
Algorithm problem: up to a unique string
-
Half-hour clock Projects & Answers
-
Operating System: Linux's namespace (will not), process threads, thread communication, process of communication
-
Computer network: transport and network layers, because I did a project link layer, also spoke a bit.
-
Java Related: thread pool
-
Database Related: even a table query. Database indexing works
-
Massive data problems: routine questions
- Zatan: The business sector
Three sides (telephone) (20 minutes)
-
Should be the big boss of the interview, ask the very philosophy: technology background, learning methods, project description
-
Ask some simple technical problems. Mainly on the logical expression and overall quality.
- Zatan: The business sector
hr (telephone) (15 minutes)
-
family situation
-
Face Tencent reason, also faces other companies
-
hobby
-
Business
- Verbal offer
Ali
All departments resume face
-
How volatile the underlying implementation, how we can keep the visibility?
-
How to achieve three threads alternately printing ABC
-
What are ways to create a thread pool and security issues
-
What types of thread pool has
-
LinkedBlockingQueue thread pool is full of words, what happens thread
-
The underlying principles and implementation of the thread pool
-
Interaction between threads What? There is no interaction thread wrapper classes (join)
-
Algorithm: heap sort, stack, queue, reverse list
-
Java lock mechanism, said about ~
-
In addition to @ ResponseBody, controller layer how standard data types to return to the front end? How would you achieve?
-
Exception trap handling
-
Spring MVC principles and processes
-
HashMap and which ConcurrentHashMap higher efficiency? why?
-
Redis caching strategy out of what?
-
Java Memory Model talk about
-
mybatis How type conversion
-
mybatis of what xml tag
-
MySQL locking mechanism
-
How to modify the file permissions linux
-
jvm recovery algorithm
-
How would you design a database table structure
-
What database indexes?
-
How to prevent sql injection
-
Abstract classes and interfaces What is the difference
-
The principle myql intermittent lock
-
The asynchronous principle underlying future
-
SpringBoot Starter principle
-
rpc principle
-
Multiple server offline on how perception
-
Cache and data consistency, how to deal with. Flow Calculation
-
Multithreading talk about, FutureTask
-
Java and mysql locks introduction, optimistic and pessimistic locking
-
Distributed talk about consistency
-
Distributed Lock implementations, zk implementation and realization of which is better redis
-
How to achieve multi-point landing
-
The optimistic lock added to the database above, how to achieve
-
Project Introduction
-
Downgrade hystrix find out about it
-
Two clicks, how to prevent repeat orders
-
ioc elaborate on the principle, source code read it
-
The difference between static and dynamic proxy agent
-
JUC to talk about something you know
- B + tree leaf node
Rookie
one side
-
Java Memory Model
-
how to trigger full gc
-
gc algorithm
-
High throughput, then algorithm which gc
-
ConcurrentHashMap和HashMap
-
stream of JDK8 operation
-
volatile principle
-
He has been involved in open source projects
-
Project Introduction
-
Thread pool principle, refused strategy, the core number of threads
-
100 million cell phone number, repeat judgment
-
Is there a written Gadgets
- Unit tests tell us, how multi-module dependency unit testing. Mockito
Two faces
-
Project Introduction
-
dubbo, netty Introduces
-
Limiting algorithm
-
zk hang of how to do
-
Spike scene design, to cope with the sudden outbreak flow
-
redis hot key issue
-
redis updating policy (or the first operation before operating the database cache)
-
Distributed data consistency
-
Consistent hashing
-
Message Queuing principle introduced (less likely)
-
full gc problem, how to troubleshoot
-
jvm recovery strategy
-
ClassLoader principles and applications
-
Principle annotations
-
Database theory, database, middleware, optimization index
-
aop principles and applications
-
Big Data related, MapReduce
-
Machine learning to understand it?
-
Java's new technology, and the latest technical progress
- Docker principle
Three sides
1, the whole project
2, discussed about the database table design
All sides
1, Projects
2, distributed transactions
3, Java three characteristics
4, the database table design
5, RPC principle
6, netty principle
7, demotion demotion strategy and framework
HR
It is a basic issue
Baidu
Baidu last year by the daily practice of looking face, the face of the two departments, tidied
information Center
one side
Algorithm: String reverse, backwards print list (why use recursion stack worse than?), Singleton
Thread start, run difference method
You can not create objects via the constructor? Object.clone () deserialization
volatile keyword
Spring AOP principle (cglib and JDK dynamic proxy realize what is the difference?)
Override the equals method, why must override the hashcode method?
== string comparisons. Output true or false;
Read seventy-eight program, and then ask what output?
HashMap can not store null able, on the first of the grid? concurrentHashMap can not store null?
Distributed System Design: There is now a way you can call to 10 servers, computers and how to count the number of calls in a day 10?
Distributed Lock Design: 8:00 every morning before output day business reports sent to the owner of the mailbox. If there are 10 servers, if the design of the regular tasks?
Method 1: Distributed Lock. Method 2: to send an http request by an external, passed ngnix, assigned to one of the servers via ngnix automatically.
Two faces
Your knowledge more confident either way?
The initial capacity of the HashMap how much? (16) Why should the initial design of 16? What happens if the incoming capacity of 10? (16 still build capacity);
You know anything unusual? (Say a few)
http status code says a few. 403 What is the status?
String Is there any way?
list, set the set when the output iterator can delete the value of it?
SimpleDateFormat is thread safe?
Left hand connection.
Aggregate Functions What?
Three sides
Algorithm problem: an array of arrays A and B, and A seeking B - A pay B; (say several, as if not satisfied with the optimal solution)
Algorithm problem: search matrix (ask after saying optimized, did not expect prompt binary search);
SSM's operational processes, difficulties to talk about the project you're doing.
GET POST request, url parameters inside
Talk about the index, if the index for each column are built, what is wrong?
White-box testing, black box testing
Linux will do?
Phoenix Nest
one side
Algorithms question: handwriting heap sort
Spring IOC principle AOP principles, how to use AOP implementation log, wrote it?
Spring bean method to create annotations @Service xml configuration @bean
Java reflection principle?
SpringBoot inside @bean explain
Java memory model and runtime data area
Spring transaction @Tranctional, abnormal rollback is how to achieve
Database MVCC principle
Optimistic and pessimistic locking concept
Pessimistic locking practical examples. select * from table for update ...
In fact there is no optimistic lock lock?
With two threads to operate the database, optimistic locking specifically what to achieve? Demo again, painting a picture
Common database storage engine, the difference, the lock range.
I wrote a simple non-web project Spring project, with main achieve it? example.
The overall flow of SSM Layer Architecture
@component @service @controller three difference
# And $ mybatis difference in the? Which will be SQL injection?
JVM new generation, the old era. survival is not all there is only one target at any time?
JVM garbage collectors to know what?
Two faces
Algorithm problem: the realization of a four arithmetic calculator (+ two stacks priority), bubble sort
Enter the whole process of a website. Process to achieve internal server computer network technology.
Daily how to learn.
Headlines
Last year, after looking face, tidied. I did not write out the algorithm on three sides and hung up.
one side
-
Algorithm problem: binary search related
-
Conceptual Questions: Explain distributed, micro-services, load balancing, high availability
-
http stateful or stateless? TCP is stateful or stateless?
-
Disabling cookie client how to do? You said implementation safe?
-
SSL, http and https, https is stateful or stateless?
-
Why String designed as a final immutable? It is how to achieve immutable?
-
You can achieve an immutable class do?
-
Why do you want to override the equals and hashcode together? If you do not override hashcode what will happen?
-
hashmap inserted, hash conflict resolution? When looking for, hash collision how to solve?
-
hashset is how to achieve? hashmap is how to achieve the hashset?
-
Multithreading: concurrency and parallelism, atom type, CAS operation
-
mysql index: B + tree underlying implementation? The underlying B-tree implementation? Why use B + tree instead of a B-tree?
-
The most left-prefix match is how to achieve a specific look for? The most left-prefix match with the characteristics which the B + tree?
-
(A, b, c) joint index, why not alone (b), and must use (a, b)? B + tree is how to achieve?
-
What is the phantom read, non-repeatable read? These concepts are within a transaction or outside a transaction? Internal affairs
-
mysql how to achieve repeatable read? Set the Repeatable Read isolation level of the underlying is how to achieve? (MVCC)
-
MVCC understand it? How to achieve? What is a snapshot reading? Snapshots read and read to date? Read and read snapshot of the current difference?
- Synchronized high efficiency and reentrentlock what?
Two faces
-
Algorithm: implement a buffer queue, the binary image
-
The difference between process and thread? Memory management talk about your understanding. Process scheduling algorithm.
-
Why B + tree leaf nodes need to finally connect with the list? Interval easy to find
-
TCP state transition diagram, draw it.
-
Operating system I / O model to understand it? epoll model to understand it?
-
CopyOnWriteArrayList related characteristics?
- ArrayList can remove elements when traversing it? What time will delete reported abnormal?
Three sides
-
Algorithm Title: node maximum distance (1) of the tree (2) covering the Example section [13] [25] [36] suggest cover [26]
-
Linux-related command.
- Handwritten SQL, join
Some supplements
learning method:
I prefer Video Quick Start -> Books deeply and slowly -> before you start gymnastics.
Personal opinion, regardless of the way of learning, for his is good, some people are more discrimination training courses out, I am concerned about big brother is a technical training courses out, I feel very strong.
Search Resources:
Some people learn fast enough is the wrong way to find resources.
To find out more senior senior sister apprentice (this would not have introduced me)
Pay more technology QQ group discussion (there are no good environment, you can find me, I'll pull you)
What questions, please leave a message communication, here, too, I wish everyone to find a suitable job ~
Special Note: This article material from the network, only to share learning, if infringement, please contact deleted!