2

Preface

I received a call from Byte HR last night (a week after three sides), and then sent a letter of intent.

Briefly introduce my situation:

An unknown dual non-undergraduate, majoring in electronic information engineering (also half a class), no internships, and no awards (never received scholarships...) The main source of knowledge acquisition is usually through the Internet, so now I also come I share my experience with everyone, and hope to help everyone!

Byte bounce on 1 side 7.15 50min

  • How to understand microservices
  • Disadvantages of microservices
  • How to load balance between microservices
  • The basic process and principle of Oauth2
  • How does the login module do
  • The difference between cookie and session
  • Why is the shopping cart stored in Redis? Is it permanent storage?
  • Why do shopping carts read more and write more
  • How does Redis clear expired keys and what are the strategies?
  • What is the process of lru
  • How is the bottom layer of the Redis dictionary implemented?
  • How is hashtable implemented
  • How ziplist is implemented
  • How to realize the ordinary hash table
  • How to expand the hash table
  • Benefits of using MQ
  • The difference between MQ decoupling and microservice decoupling
  • Algorithm: the longest palindrome substring
  • https connection establishment process (SSL/TLS negotiation process)
  • The advantages and disadvantages of symmetric encryption and asymmetric encryption
  • Why distinguish between kernel mode and user mode
  • When to switch from user mode to kernel mode
  • When you are programming, when will the system call happen
  • Rhetorical question: business, development language, performance, corresponding to the requirements of the graduates (focus on basics and algorithms)
  • The interview experience is good, but the project is a bit deep

    Byte bounce 2 sides 7.19 1h

  • Handwritten singleton mode
  • What does volatile do
  • Several implementations of multithreading
  • The difference between the four ways
  • Which locks have been used
  • What does exclusive lock mean
  • What does spin lock mean
  • CAS related
  • Can MySQL create a table without specifying a primary key? What is the logic behind it?
  • What is the difference between a clustered index and other indexes
  • Build a unique index, how to deal with inserting data
  • Repeated insertion will report an error, how to deal with it
  • Implementation of isolation levels of different things
  • Haven't internship before?
  • lc40 combined sum II
  • Rather: How does the department train newcomers, what to do (learn the basics, languages ​​and middleware, do demos), and how long to do the requirements (ranging from 1 week to 1 month, depending on the learning situation), the framework and middleware are open source The main or self-researched (self-researched)

    Byte bounce 3 sides 7.26 1h

  • Are you in an internship?
  • Can I practice internship after passing the interview?
  • What problems did you encounter during the project
  • Where did the memory leak happen?
  • Under what circumstances will there be multi-threaded access
  • Cache penetration, how to solve it
  • Cache avalanche, how to solve it
  • Cache and database data consistency
  • How to solve the oversold problem
  • How to ensure consistency of data in Redis memory in a cluster environment
  • Algorithm: Given a character array and a string, find any substring composed entirely of character arrays in the string, the order of the characters does not matter (sliding window)
  • Rhetorical question: Is there an interview for passing the interview? Is there any training for new recruits? What is the technical atmosphere?

    A little experience

The byte algorithm is still very important. I probably brushed 600+LeetCode, 70 of which can basically be written silently. The algorithmic questions written during the interview are all frequently written questions. I don't mean to memorize the questions. My situation is to brush high frequency every day. After a long time, it is easy to write down the ideas, and then you will be familiar with writing later.

Also, the details of the project need to be prepared. I didn't prepare the project when I was on the side. As a result, I didn't talk about several details. If it weren't for the algorithm to be written later, it would be cold. If it’s bytes, I’ve asked, the focus is still on basics and algorithms, so the project may account for a little less. It is recommended to use stereotyped proficiency. It is more useful to brush more algorithms.

Summary of my interview experience

Due to platform restrictions, it cannot be displayed one by one in the form of pictures! I won’t go into too much detail about the basic things. We will start with the interview questions. Basically, the content in the document is compiled by typing out the technical points and interview questions that must be asked in the interview. After you get your hands, we suggest directly Go and do the , friends in need 16110d27a5b249 just click here to pick them up, I hope the information is helpful to you! Everyone examines their technical level while practicing, and after all is done, go to the interview question analysis and technical explanations. This kind of learning efficiency is very high! Finally, I wish you all the best in your work and a successful interview!


前程有光
936 声望618 粉丝