Front-end interview preparation Notes 1, interview preparation notes
I. Common web security and protection principles
1. SQL Injection principles
The SQL command is inserted into the web form to submit or enter the query string of the domain name or page request, and finally the server is deceived to execute malicious SQL commands.
In general, there are the following points:
1. Never trust your input. to ve
current variable in the register (working memory) is indeterminate and needs to be read from main memory; Synchronized is the lock of the current variable, and other threads are blocked only if the variable is accessible to the front-thread.(3) volatile does not cause thread blocking, and synchronized can cause thread blocking.(4)volatile can only synchronize the value of a variable between the thread memory and the main memory, while synchronized synchronizes the values of all variables betwee
1 , what are the aspects of object-oriented features ? The object-oriented programming language has 4 main features: encapsulation, inheritance, abstraction, polymorphism, etc.Details:http://www.cnblogs.com/guweiwei/p/6599289.html2 , access modifiers public,private,protected, and what is the difference between not writing (the default)? Defaults to default when members of a class do not write access adornments. The default is equivalent to exposing (public) to other classes in the same packag
:
The above can solve the POST request garbled problem. There are two garbled methods for GET request Chinese parameter:Modify the Tomcat profile add code to match the project code as follows:
Another way to re-encode parameters:
StringuserName =newString (Request.getparamter ("UserName"). GetBytes ("Iso8859-1"), "Utf-8")
Iso8859-1 is the tomcat default encoding, and the Tomcat encoded content needs to be encoded by utf-8What is
Java's current heat has declined, but there are still a lot of people who learn java. Java's post is also a lot of infiltration. So, those classic Java knowledge points, you can see the problem can say 123? Come and have a look.The difference between 1.JDK and JRE What is the difference between 2.final, finally, and finalize?3. The difference between threads and processesHow does the HashMap in 4.Java work?What is the purpose of garbage collection in 5.Java? When does garbage collection take pla
of STRUTS1 is mainly implemented by Actionform, which is similar to JavaBean, which contains several readable and writable properties for storing data and data validation. In general, an action is equipped with a actionform.Struts1 views are primarily implemented by JSPs. The data that the JSP displays can come from actionform, or it can be the data that the action holds in scope (request,session,application). Of course, using struts's own labels can be a great simplification.After using STRUTS
Mvc:
Definition of MVC:M: Business logic processing. "Business model"V: The part that handles the display of the data. "such as XML layout file"C:activity handles user interaction issues. "Activity in MVC plays the role of C."
Features of MVC:① and low coupling.②, scalability is good.③ and module responsibilities are clearly divided.
An example of MVC is detailed:
Summarize:①, the use of MVC design patterns, so that the project has a very good scalability and maintenance.②, contro
requirements graphically in various phases of software development; IBMRational Rose is one of the many UML modeling tools in the requirements phase, often used in drawing examples, class diagrams, sequential graphs. 15. Describe the tool class that you exported, and indicate the maximum amount of data
POI (combining cell objects and background color applications)
Finally here also found some of Baidu Library interview questions: A lot of content, no
Java interview Knowledge point of database interview
1. Primary key Super Key candidate key foreign key
Primary key:
A combination of data columns or attributes that are uniquely and fully identified in a database table for storing data objects. A data column can have only one primary key, and the value of a primary key cannot be missing, that is, it cannot be null.
Super key:
An attribute set that unique
BAT interview algorithm fine class, straight-through bat interview algorithm fine class.We can first look at the content, video short, to the crux of the problem. Quickly grasp the core knowledge and save time to review.Anyway I'm not fond of procrastinating, lengthy video lessons.Moreover, the scope of knowledge covers a wide range, suitable for looking for work review.The first time I bought a course, I t
Java interview questions, Java interview questionsInterview is something that everyone has to go through. Most people have more than one interview. Here we will summarize the latest interview questions for 2016, so that you can get twice the result with half the effort when looking for a job in 2017. 1. Can a Switch us
Monthly salary: 30 thousand interview questions, monthly salary: 30 thousand interview questions
What is your understanding of MVC?
V is a flesh, a thing to see
M is the skeleton, it is the real thing inside
C is the tendon connecting flesh and bones.
For the requirement of Interface Design variability, MVC divides the composition of the Interaction System into three parts: model, view, and control.
The
AlgorithmInterview: typical algorithms for Microsoft and other companies are selected for interview: Question 26-35
26. Rotate string left
Question:Define the left rotation operation of the string: Move several characters before the string to the end of the string.
For example, the string abcdef is rotated two places to the left to obtain the string cdefab. Please implement the left rotation function of the string.Requires that the complex
Interview Summary 1. Interview SummaryRegular Expression
The regular expression used for email address verification. I first wrote the/^ (\ w) + (\. \ w) * @ (\ w) + (\. \ w) + $/. Later, the interviewer pointed out that \ w is a single character, so I quickly changed it to/^ (\ w +) + (\. \ w +) * @ (\ w +) + (\. \ w +) + $/, which is basically a pass. However, although in a regular expression, \ w is not
Python interview 2, python interviewSelf-Introduction
This is the first question to be asked. However, some friends may not care too much. In fact, this issue has already determined your intention to stay in the interviewer's mind. The main structure of self-introduction: basic personal information + basic technical components + project experience (specific project and the responsible part of the project) + self-evaluation, the principle is to closely
One of the interview summaries: Java handles linked list questions during the interview and java handles themThe linked list is often used in interviews. This article has referenced some other articles and added my own summary. Basically, every algorithm has been tested and optimized.Algorithm Daquan (1) there are some linked list questions in a single-chain table, which will be sorted in the future.
* REFS
Programmer interview book, cat and dog shelter, programmer interview book
[Disclaimer: All Rights Reserved. indicate the source for reprinting. Do not use it for commercial purposes. Contact mailbox: libin493073668@sina.com]
Question link: http://www.nowcoder.com/practice/6235a76b1e404f748f7c820583125c50? Rp = 1 ru =/ta/cracking-the-coding-interview qru =/ta/c
Hypnotic dialogue
When the interview is asked, no matter what the question, the answer begins with a nod, shout right; if have the opportunity to ask questions, also want to throw the other side to answer "is" and "to" the closed question, such two person's dialogue at the beginning entered the mutual affirmation of the subconscious mind, this is the essence of hypnosis-control the other person's thinking subconscious, It's called Hypnosis talk. Anti-
Android interview summary, android interview
Questions encountered during the interview: http ://
1. asynchronous loading of ListView
ListView asynchronously loads network images, uses the cache mechanism and thread pool to load network images, reads memory cache, File Cache, and downloads images over the network. LinkedHashMap is strongly referenced. SoftHashMap
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.