Background development interview Problem sorting

Source: Internet
Author: User
Tags data structures epoll inheritance memcached redis sql injection file permissions

Recently internship recruitment began again, by some younger brother asked the interview will ask the question, so want to put before the internship, school recruit was asked questions sorted out, hope to need people to help. Although there are a lot of questions, but the interview can ask the question is an infinite set, and vary from person to person, only as a certain reference, if all the knowledge is very strong grasp of the question: the question is not to say that all can answer up, can answer most I think BAT is no problem.

Personal background: Undergraduate, partial engineering, technology stack C + +, contacted Python, Java, PHP, go
Job interview: Background development, C + + engineer, etc.
Source of the problem: including but not limited to Ali, Tencent, Baidu, NetEase games, are actually encountered.

Follow-up to see if it is necessary to mark which questions are more frequent, need not answer the reference.C + +What is the use of the static keyword to say inheritance and the concept of composition. When should you use inheritance? What happens when you should use the diamond inheritance of the combined C + +. Draw the corresponding memory layout. The realization mechanism of virtual function if there is only a method in the parent class, and the subclass has an int variable, what is the sizeof pointer must be 4 bytes? What is the difference between #define and inline functions? const STA Where does tic initialize the constructor of a derived class and the execution order of destructors what happens when a destructor of a base class is not invoked to generate a static library. How to generate a dynamic library how to use GDB Debug Coredump view, core file analysis How to debug a running program to run a few days of the program to collapse, how to parse the error how to write the makefile compiler process. What happened when the link was made. What do I do in the middle tier optimization? How the STL container implements how the adapter is used to do the queue how to implement the map with what implementation vector is implemented. Optimizing O (N) Replication red-black tree Insert data find out how the imbalance should be made the difference between debug mode and release mode compilation How to view a linked dynamic libraryPythonPython's adorner is what what is the closure of the Tornado architecture that says the architecture of the flask Python is what the builder is. How to achieve the bottomalgorithmKnow what sorts of sorting methods. There is no O (n) Sort balanced binary tree Insert binary lookup tree 10 G highest access Ip Statistics inverted index The realization of LRU algorithm of common cache substitution algorithm and the difference of optimizing heap and stack common hash algorithm MD5, SHA1 implementation of 10,000 URLs quickly find two ordered Optimization of an array find-and-set 1 billion integers find the largest 100, with O (n)NetworkWhat HTTP and TCP have to do with TCP's three-time handshake process the difference between TCP and UDP TCP packets Why do they need a SEQ packet why does it have to say HTTP protocol HTTP 1.0 and HTTP 1.1 different HTTP Headers what fields why HTTP It's connectionless. What is the congestion control of the HTTP TCP that keeps the long connection? The TCP in which the client sends SYN after the client and the server respectively in what state the server calls send returns the size of the sent data, whether it can be considered that the client has received. How to ensure that the client receives data 304 status code meaning. How the implementation in the HTTP protocol determines whether the server file has been modified. Know that the browser-cached file is inconsistent with the server file. In HTTP, which field a class A address and Class B address distinguish the LAN does not have IP when how to communicate. How to know the meaning of MAC address TCP IP layer? Where to get the socket when the process accept what is Network virtualization VPN working principle TCP's estimation of network congestion the retransmission mechanism of TCP several congestion mechanismssystemThe address that the pointer corresponds to is not the physical address physical address and the virtual address are usually called. Abbreviation is what operating system addressing method how to calculate the available memory Linux how to use the top command to view virtual address and real address information how to use the search engine to understand the virtual address in top. No search engine How to know what the top output is showing how much memory is available based on top to see what the performance of the thread is using top to find out what other commands can identify performance bottlenecks Epoll and select compare Epoll shortcomings, how to overcome shortcomings epoll mechanism file description When the character is ready, how to notify the user state from the kernel state of the process Epoll implementation of synchronous asynchronous differences in the way interprocess communication between the mechanisms of communication. How to compare the communication between the same process threads in resource memory, communication between different process threads, how to determine where the system is consuming performance CPU scheduling unit What is how to make multi-core CPUs better utilize resources what is page fault how to control the access of two processes to a data. How to deal with the lock problem tell me if the coprocessor understands netstat in the shell./a.out | Wc-l The result is how much. The input of the pipeline is which process to talk about Linux file permissions. So that only the owner can read and write. Allow the owner to read and execute only. What permissions do I need to delete a file if a process is reading and writing to a file, the administrator deletes the file. What is the advantage of a thread compared to the process threads? What is an interrupt call when a computer starts from a power load. Interrupt the classification of the program Lsof strace ptrace GDB uses kernel state and user state to distinguish why kernel states need to be locked in the kernel state when the variable program is in storage layoutBack-end componentsMemcached's memory design has what server Model TINYHTTPD Basic workflow CGI program is. FastCGI et cetera how to add access to a Web site in Apache and Nginx respectively. How to limit the difference between IP Apache and Nginx where Nginx and Apache architecture are respectively memcached and redis What is the difference between the Redis of several operations to know the process pool. There is no use of redis to achieve the persistence of what. Redis Persistence can trust memcached and redis why not as a common database tinyhttpd the processing of HTTP requests to different size data structures how to store RPC there are several ways to implement it. How to provide interface calls for synchronous, asynchronous, blocking, non-blocking differences in RPC callsWebThe difference between get and post for Cookie and session. Whether access security is different. How to achieve true access security if you find that your network cannot access, check which areas. If only a Web site does not have access to the background of the situation to guess what the reason the server hangs. If you are a webmaster user feedback what your site should do in the background to find out what to do when running the program card. Check which aspects of HTTPS are described. Ability to intercept HTTPS packetsDatabaseHow to synchronize database between databases how to ensure the consistency of several tables at the same time how to guarantee the synchronization database of database in master-slave server What ACID is the difference between relational and non-relational databases MySQL lock type when MySQL will lock the table. The difference between a locked row lock and a table-level lock high concurrency access to MySQL, how to maintain data consistency MySQL has what storage engine. Why use InnoDB MySQL how to build an index to build an index of columns A and B what needs to be considered? Optimization index implementation mechanism of database query too slowlarge data, high concurrencyHow to design a high-performance server architecture to cache between clusters, what to do when a node hangs the message queues between the synchronization clusters in the cluster are cached between the clusters, and a node hangs up. What are the high concurrency server design I/O multiplexing models have the distinction of select and Epoll Second kill multiple database server synchronization ticket system how to do? Design QQ corresponds to the storage and access of all attributes to what is load balanced. Implementation of load BalancingFront EndWhat does the JS event $ (function () {}) in the Web page mean. and window.onload What difference is summed up in two sentences BootStrap in two sentences to summarize JqueryDocker

(because of their own docker related) Docker scenarios what is a stateless application docker layered mirroring mechanism go and C + + design comparison, advantages and disadvantages of what goes to the import mechanism advantages and disadvantages Cgroup principle why the project Docker into what You need resource isolation and virtualization. other Introduction to MVC pattern SVM principle Java memory recycle mechanism byte and character difference when to read files with characters, when to read files with bytes The hardest program to write is what is the most difficult procedure to achieve the most sense of achievement how to implement Chinese coding in the project single case mode XSS attacks. For example, SQL injection with two can burn one hours of uneven incense calculation 15 minutes 7 workers 7 hours to dig 7 meters of holes, 50 hours to dig 50 meters of the hole how many people?

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.