MindMap Gallery .Net senior programmer interview points
This is a mind map about the interview points for .Net senior programmers, including data structures and algorithms, types of design patterns, multi-threading, communication, databases, caching, etc.
Edited at 2024-01-13 00:05:53Avatar 3 centers on the Sully family, showcasing the internal rift caused by the sacrifice of their eldest son, and their alliance with other tribes on Pandora against the external conflict of the Ashbringers, who adhere to the philosophy of fire and are allied with humans. It explores the grand themes of family, faith, and survival.
This article discusses the Easter eggs and homages in Zootopia 2 that you may have discovered. The main content includes: character and archetype Easter eggs, cinematic universe crossover Easter eggs, animal ecology and behavior references, symbol and metaphor Easter eggs, social satire and brand allusions, and emotional storylines and sequel foreshadowing.
[Zootopia Character Relationship Chart] The idealistic rabbit police officer Judy and the cynical fox conman Nick form a charmingly contrasting duo, rising from street hustlers to become Zootopia police officers!
Avatar 3 centers on the Sully family, showcasing the internal rift caused by the sacrifice of their eldest son, and their alliance with other tribes on Pandora against the external conflict of the Ashbringers, who adhere to the philosophy of fire and are allied with humans. It explores the grand themes of family, faith, and survival.
This article discusses the Easter eggs and homages in Zootopia 2 that you may have discovered. The main content includes: character and archetype Easter eggs, cinematic universe crossover Easter eggs, animal ecology and behavior references, symbol and metaphor Easter eggs, social satire and brand allusions, and emotional storylines and sequel foreshadowing.
[Zootopia Character Relationship Chart] The idealistic rabbit police officer Judy and the cynical fox conman Nick form a charmingly contrasting duo, rising from street hustlers to become Zootopia police officers!
.Net senior programmer interview points
Data Structures and Algorithms
Sorting Algorithm
Bubble Sort
selection sort
insertion sort
Heap sort
merge sort
Quick sort
Hill sort
Radix sort
Find algorithm
sequential search
binary search
interpolation search
Fibonacci search
tree table lookup
Search in chunks
Hash lookup
data structure
array
static array
dynamic array
stack
queue
linked list
Single list
Doubly linked list
circular linked list
Tree
Binary tree
binary search tree
Balanced binary tree (AVL tree)
Find tree
B-tree
B-tree
balanced tree
red black tree
clue tree
heap
hash table
picture
Five basic characteristics of algorithms
Input, output, finiteness, certainty and feasibility
Types of design patterns
creational pattern
Singleton pattern
Hungry mode
lazy mode
thread safety mode
Factory pattern
abstract factory pattern
builder pattern
Prototype pattern
structural pattern
adapter mode
bridge mode
filter mode
Combination mode
Decorator pattern
appearance mode
Flyweight mode
proxy mode
static proxy
dynamic proxy
behavioral patterns
chain of responsibility model
strategy pattern
state mode
command mode
interpreter mode
iterator pattern
intermediary pattern
Memo mode
Observer pattern
empty object pattern
Template mode
visitor mode
J2EE mode
MVC pattern
Business representative model
Combined Entity Pattern
data access object pattern
Front controller mode
Interception filter mode
Service locator pattern
transfer object mode
Six principles of design patterns
open-close principle
Richter substitution principle
dependency inversion principle
Interface isolation principle
Demeter's Law
single responsibility principle
C# basics
The difference between interface and abstract class
The difference between Hashmap and Hashtable
The difference between Hashtable and Dictionary
Differences between Dictionary, HashTable, List, and HashSet
GC garbage collection mechanism
Managed resources
unmanaged resources
Garbage collection algorithm
Tag compression algorithm
What is the difference between .net standard and .net framework?
what is reflection
Every type in a program or assembly can be obtained at runtime
Multithreading
Several common ways to implement threads
1. Thread class implementation
2. ThreadPool thread pool implementation
3. Multi-threading implemented by Delegate
Call Invoke synchronously
Asynchronous call BeginInvoke
Asynchronous call EndInvoke
5. Task implements multi-threading
6. Async and Await implementation
7.TaskFactory
8. Parallel concurrent programming
4. BackGroundWorker implementation
Several methods of thread synchronization:
1. Add thread lock
2. Thread blocking
Sleep, Join, EndInvoke, Await
3. EventWaitHandle synchronization event
Commonly used thread locks
Mutex Lock
Underlying implementation: Monitor.Enter/Exit is called to implement synchronization mutual exclusion
Mutex Monitor
Process mutex lock Mutex
Read-write lock ReaderWriterLockSlim
Spinlock Spinlock
Free lock Interlocked
Belongs to atomic level operation
hybrid lock
thread blocking
Sleep causes the calling thread to block
Join and EndInvoke block another thread
What is deadlock
When would you use multi-threading?
They are independent and do not affect each other's business. In this case, using multi-threading can greatly improve efficiency.
Web crawlers capture data from different websites
What scenarios is used for concurrent programming?
CPU intensive programs
I/O intensive programs
The relationship between processes and threads
Communication between threads
global variables
Shared memory
lock mechanism
Mutex lock, read-write lock
Semaphore
message queue
event
interprocess communication
pipeline
message queue
Shared memory
signal
Signal
Socket
communication
HTTP protocol
HTTP status code
Common HTTP status codes: 200 - Request successful 301 - The resource (web page, etc.) has been permanently moved to another URL 404 - The requested resource (web page, etc.) does not exist 500 - Internal server error
Three handshakes, four handshakes
Tcp principle
What is sticky bag
Osi seven-layer model
WCF
Three elements: address, binding and contract
What is REST/RESTful?
A design specification for software architecture style
Http2
binary transfer
Multiplexing
Compress headers
Support Server Push
https
SSL protocol
Signalr
RPC
remote procedure call
database
index
Classification of Mysql index
Primary key index, unique index, ordinary index, combined index, full-text index
Classification of SqlServer indexes
Unique index, clustered index, non-clustered index
Classification of Oracle indexes
Functional classification
Storage method classification
Algorithms to implement indexing
B-tree
B-tree
Hash index
Cause index failure
Under what circumstances do you need to create an index?
In what situations does indexing not need to be created?
affairs
isolation level
uncommitted read
Submitted to read
repeatable read
serialization (serialization)
Problems caused by concurrent transactions
Missing updates
dirty read
non-repeatable read
phantom reading
Mysql database lock
table level lock
row level lock
Shared lock S
Exclusive lock X
Intention shared lock IS
Intent exclusive lock IX
Pessimistic lock, optimistic lock
page level lock
Database optimization
Sql optimization
Index optimization
table partition
Solution to slow query
Execution plan explain
Enable slow query log
Query mysql thread
Check if there is a deadlock
Optimize cache size
Configuration optimization
Modify thread pool
Buffer pool settings, connection cache settings, and sort cache settings
Mysql storage engine
MyISAM
Transactions are not supported
Only table locks are supported
InnoDB
support affairs
Supports row-level locking
cache
Redis
Redis is a single-threaded model
Common data structures
String
Hash
List
Set
SortedSet
Bitmap, Stream
Binary, file stream, etc.
Two persistence methods
RDB (default)
AOF
Choice of RDB and AOF
Distributed lock
RedLock
Redisson
INCR, SETNX, SET
Concurrency guarantee
master-slave mode
Sentry mode
cluster mode
Memcached
There is no cluster itself
Single data structure
Data persistence is not supported
caching problem
cache penetration
Cache breakdown
cache avalanche
message queue
RabbitMQ
five queues
simple queue
Operating mode
publish/subscribe pattern
routing mode
theme mode
RPC mode
Four types of switches
direct
fanout
topic
headers
dead letter queue
Retry mechanism
Solve distributed transactions
Adopt the principle of eventual consistency
RocketMq
Front-end technology
Layui
Vue
instruction
Jquery
Bootstrap
AngularJS
Js inheritance implementation?
Html5
local storage
Commonly used frameworks
Autofac
The underlying principle of Autofac: reflection
What are the usage modes of Autofac?
Constructor injection
Property injection
method injection
Instance life cycle
Instance PerDependency transient, default
SingleInstance single instance
Instance PerLifetimeScope An instance of the same life cycle
Instance PerRequest One instance per request
InstancePerMatchingLifetimeScope
circular dependency problem
Call the container factory to obtain an instance
Lazy<interfac> lazy loading
Use domain events to decouple
What is the difference between dependency injection and inversion of control
The role of dependency injection
Which ORMs have been used and their respective advantages?
EF
Dapper
Using Emit for object reflection
SqlSugar
reflection, emit
OrmLite
AOP
horizontal aspect programming
Method to realize
Big data solution
Branch library
Vertical sub-library
Horizontal sub-library
sub-table
Vertical table
Level score table
Read and write separation
Caching
High concurrency solution
Multithreading
Concurrent programming
Distributed, cache, asynchronous, cluster, microservices
Message middleware
fuse
Database optimization
The three high issues of the Internet
High concurrency
High availability
high performance
System Optimization
Front-end optimization
Backend optimization
Database optimization
Server optimization
Project experience
WMS
Intelligent warehouse allocation
ERP
Mall
Product data synchronization
microservices
Key points of microservice technology
Message queue middleware
RabbitMq
RocketMq
Caching middleware
Redis
Memcache
MongoDB
load balancing
Nginx
load balancing
average polling
weighted polling
IP address hash
UrlHash
Consul
load balancing
Service discovery and registration
health examination
Gateway Service\Service Proxy
Ocelot
Search middleware
ElasticSearch
timer middleware
Quartz
Configuration center middleware
Apollo
Log collection middleware
Exceptionless
Elk
The difference between SOA and microservices architecture
What is DDD
Domain driven
Domain services
domain events
Docker
Three elements of Docker: image, container, warehouse
subtopic
Authentication
wxya
Ids4
oauth2.0
information security
https
TLS handshake
asymmetric encryption
XSS cross-site scripting attack
CSRF cross-site request forgery
digital signature
Digital signatures are used to solve the problems of denial, forgery, impersonation and tampering