


Java interview questions summarized from many years of development experience - (6)
Aug 17, 2020 pm 04:40 PM1. How to generate common annotations for web service clients, or write them by hand
(recommended tutorial: java introductory tutorial )
@WebService(serviceName="PojoService", portName="PojoPort", name="PojoPortType", targetNamespace="http//:Pojo")
serviceName corresponds to
portName corresponds to
name corresponds to
targetNamespace corresponds to targetNamespace="http//:Pojo"
Define the display of schemaLocation
@WebMethod(operationName="queryPojo",exclude=true)
operationName The method name and exclude of the interface are used to prevent a certain inherited method from being exposed as a web service. The default is false
@WebResult (name="returnWord") The return value of the interface
Parameters of the @WebParam (name="cityName") interface
(Recommendations for more related interview questions: java common interview questions)
2. Mybatis processes big data
Table partitioning is divided into horizontal partitioning (hash partitioning, time, interval partitioning) and vertical partitioning (separate tables for uncommon fields). For example, interval partitioning. If there is a cross-table query, use the keyword union union all
3. AOP IOC advantages and disadvantages
AOP disadvantages: slightly lower performance, only applicable to method calls, must be in the Spring container
AOP advantages : Obtain an object directly from the IOC container and use it directly without creating it in advance, allowing logical business decomposition and decoupling code, changing the shortcomings of OOP (Object Oriented Programming) object-oriented programming
IOC Disadvantages: Generate an The steps of the object become complicated (ignored), and there is a lack of IDE reconstruction support. If the class name is modified, it needs to be modified manually in the XML file. This seems to be the shortcoming of all XML methods
IOC advantages: Realize decoupling between components and improve the flexibility and maintainability of the program
(Learning video recommendation: java course)
4. spring transaction Propagation attributes and isolation levels
NEVER There must be no things, otherwise an error will be reported, and method calls with things will not work;
REQUIRED ordinary method calls, single things, method calls with things , just use things with method calls
REQUIRES_NEW No matter whether there are method calls of things or not, I insist on executing my own things
SUPPORTS If there are method calls of things, use yours. If there are no method calls of things, there will be no things.
Dirty Reads Dirty Reads: What the customer sees is not the real data of the database. Before the transaction is submitted, other things are not allowed to access the modified values
Phantom Reads Phantom Reads: A transaction reads Data that has been inserted in another transaction is not allowed to add new data before other transactions have processed the data
Non-Repeatable Reads: Subsequent read data reads updated data submitted by other transactions , leading to inconsistency in reading data before and after, solve the problem of reading data after modification;
5. Spring Mvc returns json technology
The first type: each json view controller Configure a Jsoniew
Second: Use JSON tools to serialize objects into json, commonly used tools Jackson, fastjson, gson
Third: Use spring mvc3 annotation @ResponseBody
The above is the detailed content of Java interview questions summarized from many years of development experience - (6). For more information, please follow other related articles on the PHP Chinese website!

Hot AI Tools

Undress AI Tool
Undress images for free

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Clothoff.io
AI clothes remover

Video Face Swap
Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

Notepad++7.3.1
Easy-to-use and free code editor

SublimeText3 Chinese version
Chinese version, very easy to use

Zend Studio 13.0.1
Powerful PHP integrated development environment

Dreamweaver CS6
Visual web development tools

SublimeText3 Mac version
God-level code editing software (SublimeText3)

Hot Topics

Singleton design pattern in Java ensures that a class has only one instance and provides a global access point through private constructors and static methods, which is suitable for controlling access to shared resources. Implementation methods include: 1. Lazy loading, that is, the instance is created only when the first request is requested, which is suitable for situations where resource consumption is high and not necessarily required; 2. Thread-safe processing, ensuring that only one instance is created in a multi-threaded environment through synchronization methods or double check locking, and reducing performance impact; 3. Hungry loading, which directly initializes the instance during class loading, is suitable for lightweight objects or scenarios that can be initialized in advance; 4. Enumeration implementation, using Java enumeration to naturally support serialization, thread safety and prevent reflective attacks, is a recommended concise and reliable method. Different implementation methods can be selected according to specific needs

Analyzing Java heap dumps is a key means to troubleshoot memory problems, especially for identifying memory leaks and performance bottlenecks. 1. Use EclipseMAT or VisualVM to open the .hprof file. MAT provides Histogram and DominatorTree views to display the object distribution from different angles; 2. sort in Histogram by number of instances or space occupied to find classes with abnormally large or large size, such as byte[], char[] or business classes; 3. View the reference chain through "ListObjects>withincoming/outgoingreferences" to determine whether it is accidentally held; 4. Use "Pathto

ThreadLocal is used in Java to create thread-private variables, each thread has an independent copy to avoid concurrency problems. It stores values ??through ThreadLocalMap inside the thread. Pay attention to timely cleaning when using it to prevent memory leakage. Common uses include user session management, database connections, transaction context, and log tracking. Best practices include: 1. Call remove() to clean up after use; 2. Avoid overuse; 3. InheritableThreadLocal is required for child thread inheritance; 4. Do not store large objects. The initial value can be set through initialValue() or withInitial(), and the initialization is delayed until the first get() call.

Optional can clearly express intentions and reduce code noise for null judgments. 1. Optional.ofNullable is a common way to deal with null objects. For example, when taking values ??from maps, orElse can be used to provide default values, so that the logic is clearer and concise; 2. Use chain calls maps to achieve nested values ??to safely avoid NPE, and automatically terminate if any link is null and return the default value; 3. Filter can be used for conditional filtering, and subsequent operations will continue to be performed only if the conditions are met, otherwise it will jump directly to orElse, which is suitable for lightweight business judgment; 4. It is not recommended to overuse Optional, such as basic types or simple logic, which will increase complexity, and some scenarios will directly return to nu.

The core workaround for encountering java.io.NotSerializableException is to ensure that all classes that need to be serialized implement the Serializable interface and check the serialization support of nested objects. 1. Add implementsSerializable to the main class; 2. Ensure that the corresponding classes of custom fields in the class also implement Serializable; 3. Use transient to mark fields that do not need to be serialized; 4. Check the non-serialized types in collections or nested objects; 5. Check which class does not implement the interface; 6. Consider replacement design for classes that cannot be modified, such as saving key data or using serializable intermediate structures; 7. Consider modifying

There are three common methods to traverse Map in Java: 1. Use entrySet to obtain keys and values at the same time, which is suitable for most scenarios; 2. Use keySet or values to traverse keys or values respectively; 3. Use Java8's forEach to simplify the code structure. entrySet returns a Set set containing all key-value pairs, and each loop gets the Map.Entry object, suitable for frequent access to keys and values; if only keys or values are required, you can call keySet() or values() respectively, or you can get the value through map.get(key) when traversing the keys; Java 8 can use forEach((key,value)->

ToimproveperformanceinJavaapplications,choosebetweenEhCacheandCaffeinebasedonyourneeds.1.Forlightweight,modernin-memorycaching,useCaffeine—setitupbyaddingthedependency,configuringacachebeanwithsizeandexpiration,andinjectingitintoservices.2.Foradvance

Dynamic web crawling can be achieved through an analysis interface or a simulated browser. 1. Use browser developer tools to view XHR/Fetch requests in the Network, find the interface that returns JSON data, and use requests to get it; 2. If the page is rendered by the front-end framework and has no independent interface, you can start the browser with Selenium and wait for the elements to be loaded and extracted; 3. In the face of the anti-crawling mechanism, headers should be added, frequency control, proxy IP should be used, and verification codes or JS rendering detection should be carried out according to the situation. Mastering these methods can effectively deal with most dynamic web crawling scenarios.
