A company's exam for recruiting. Net senior programmers
The boss of a company asked me to help him find some. Net experts to join their company, so he sent out a job application request on 51job. There were endless numbers of people, but their levels were uneven. In order to demonstrate their technical capabilities and the quality of teamwork, I came out with a set of questions for senior programmers, here we will show you what you need. net programmer company (in view of my previous experience in Microsoft interview, it is similar to Microsoft's question type)
The questions are as follows:
Interview Questions for senior programmers
English question (can be answered in Chinese)
1) Please describe the different between XML, XSD, XSL through their definition.
2) Do you know the Persistent Object in J2EE; If yes, please describe some mechanisms of it.
3) Please describe some famous
Encryption Arithmetic as defined as you know, one of arithmatics to explain if possible.
Intellectual Logic
1. A password only uses five letters (K, L, M, N, and O). The words in the password are arranged from left to right. The password words must follow the following rules:
(1) the minimum length of a password word is two letters, which can be the same or different.
(2) K cannot be the first letter of a word.
(3) If l appears, more than once
(4) M cannot make the last or second-to-last letter
(5) If K appears, N must appear.
(6) If O is the last letter, l must appear
Question 1: Which of the following letters can be placed behind o in Lo to form a three-letter password word?
A) k B) L C) m d) N
Question 2: If the letters K, L, and m can be obtained, what is the total number of two letter-length password words?
A) 1 B) 3 C) 6 d) 9
Question 3: Which of the following is the word password?
A) klln B) loml c) mllo d) nmko
Question 4: What is the total number of words with different passwords that can be composed of three identical letters?
A) 1 B) 2 c) 3 D) 4
Question 5: the word Password mmlokn can be changed to another password word through the following:
A) Replace each l B with N) Replace each M C with O instead of D) Move O to the left of N
2.62-63 = 1 the equation is not true. Please move a number (the minus sign and the equal sign cannot be moved) so that the equation is true. How can we move it?
Technical programming questions
1) use VB (or C #) to describe the encryption and decryption algorithm of blowfish. If not, you can describe it in the form of a Chinese + graph. If you are not familiar with the blowfish algorithm, describe the encryption and decryption algorithm you are familiar.
2) if you are a software architect, how do you build an architecture that complies with N-tie? Describe the role of each layer. (Note: consider WebService in the project)
3) use the code to briefly describe the design patterns of Singleton, abstract factory, bridge, and composite.
Scenario Analysis questions
If you are a test engineer and your good friend is a software engineer, you are all in the same department. Once, you find a major bug that has a fatal impact on the company's products. If you report your boss in time, you will be rewarded and promoted to a manager. However, if you do, you will lose a friend because he will be dismissed by the boss. On the contrary, if you help your friends conceal bugs, the company's products have great security risks. If you are attacked, the company will suffer a lot of losses, what should you do when I take my company and boss seriously?