国产av日韩一区二区三区精品,成人性爱视频在线观看,国产,欧美,日韩,一区,www.成色av久久成人,2222eeee成人天堂

Home Java JavaInterview questions Intermediate and advanced Java interview questions (with answers)

Intermediate and advanced Java interview questions (with answers)

Nov 14, 2019 pm 04:51 PM
java intermediate

Intermediate and advanced Java interview questions (with answers)

#1. How does redis synchronize with local data?

The program implements mysql updates, additions, and deletions and will operate redis synchronously

The program queries redis. If it does not exist, it queries mysql and automatically saves redis

2. How many data structures does redis have?

set, list, hash, string, zset

3. How is java memory overflow caused?

OutOfMemoryError:

(1)PerGern Space A large number of jars or classes are used in the program, causing insufficient space for the virtual machine to load classes.

Solution: Adjust parameters XX:PermSize and XX:MaxPermSize, reduce jar packages and reduce repeated loading of classes

(2) Java Heap

Space Java virtual machine creation is too Multiple objects. Solution: Adjust parameters Xms (initial heap size) and Xmx (maximum heap size), check for infinite loops or unnecessary creation of duplicate objects.

(3)unable to create new native Thread

The JVM takes up too much memory space, and creating a thread in the JVM requires creating a thread in the operating system. Solution: Adjust the thread size in the JVM.

4. String s = “123”, how many objects are generated by this statement?

If there is no "123" in the string pool, generate one and put it into the constant pool. If there is "123", generate 0

5 , the new features of JDK8, describe with examples

(1) lambda expression: functional programming, method reference

(2) Stream API

(3 ) Default method of the interface

(4) Improvement of date and time API, new DateTimeFormatter method

6. Solve high concurrency and high load

(1) Make HTML as static as possible, use the information entry and release system CMS to automatically generate static pages for information entry, and cache dynamic data that does not change frequently on the front end.

(2) CDN acceleration, distributing resources such as CSS/JS on different servers

(3) Cache data that does not change frequently (Redis, memcache).

(4) The picture server is separated from the application server.

(5) Cluster

7. What is the role of the producer and consumer models?

(1) Improve the operating efficiency of the entire system by balancing production capacity and consumer spending power (2) Decoupling

8, Mybatis Level 1, Level 2 Level cache

(1) Level one cache: HashMap local cache based on PerpetualCache, which stores the scope Session. When Session

flush or close, all Cache in the Session will be cleared.

(2) The second-level cache has the same mechanism as the first-level cache. By default, it also uses PerpetualCache and HashMap storage. The difference is in the storage scope Mapper, and the storage source can be customized. If you need to enable the second-level cache. Add

9 to the sql mapping file to describe the detailed process of a service from publishing to consumption

First obtain the configuration information of zk, and then obtain the URL that needs to be exposed. Then call the registry and register method to register the URL to zookeeper

10. How to achieve load balancing? What algorithms can be achieved?

Random (random), round-robin, consistent-hash and master-slave

11. If you want How do you implement Spring AOP?

The implementation of aop technology is mainly divided into two categories: one is the use of dynamic proxy technology, which uses the method of intercepting messages to decorate the messages to replace the execution of the original object behavior

The second is to use static weaving to introduce specific syntax to create "aspects", so that the code related to "aspects" is woven into the compiler

12. How to prevent repeated page submissions?

Cluster environment: using token plus redis (redis is single-threaded, processing needs to be queued)

Processing process:

1. Before submitting data, you must submit it to the service Apply for a token, put the token into the redis memory, and the token is valid for

2. Verify the token in the background after submission, delete the token at the same time, generate a new token and return

13. What is micro Serve?

Split the project into microservices according to different business rules and deploy them on different machines. Services call each other

14. What is a web service?

(1) A web service is an application that exposes an API that can be called through the web to the outside world

(2) Transmits data based on the HTTP protocol, which makes running Different applications on different machines can exchange data or integrate with each other without resorting to additional, specialized third-party software and hardware

15. Tell me about the reasons for choosing Struts2 for your project?

①Action is a POJO class, does not rely on Servlet API, and has good testability; ②Powerful interceptor simplifies the complexity of development;

③Supports multiple performances Layer technology: JSP, Freemarker, etc.; ④ Flexible verification methods; ⑤ Internationalization (I18N) support ⑥ Declarative exception management;

⑦ Simplify Ajax through JSON plug-in; ⑧ Integrate with Spring through Spring plug-in;

16. Talk about the difference between interceptors and filters?

Both interceptors and filters can be used to implement cross-cutting attention functions. The main differences are: ①Interceptors are based on the JAVA reflection mechanism, while filters are based on function callbacks

②Filters Depends on the Servlet container, while the interceptor does not depend on the Servlet container

③Interceptors can only work on Action requests (methods in Action), while filters can work on almost all requests (CSS JSP JS)

17. What types of transaction management does Spring support?

Programmatic transaction management: Programmatically manage things, great flexibility, difficult to maintain

Declarative transaction management: Business code and transaction management can be separated, and only Use annotations and XML configuration to manage things

php Chinese website, a large number of freeJava introductory tutorials, welcome to learn online!

The above is the detailed content of Intermediate and advanced Java interview questions (with answers). For more information, please follow other related articles on the PHP Chinese website!

Statement of this Website
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn

Hot AI Tools

Undress AI Tool

Undress AI Tool

Undress images for free

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Clothoff.io

Clothoff.io

AI clothes remover

Video Face Swap

Video Face Swap

Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Tools

Notepad++7.3.1

Notepad++7.3.1

Easy-to-use and free code editor

SublimeText3 Chinese version

SublimeText3 Chinese version

Chinese version, very easy to use

Zend Studio 13.0.1

Zend Studio 13.0.1

Powerful PHP integrated development environment

Dreamweaver CS6

Dreamweaver CS6

Visual web development tools

SublimeText3 Mac version

SublimeText3 Mac version

God-level code editing software (SublimeText3)

Hot Topics

PHP Tutorial
1502
276
How to handle transactions in Java with JDBC? How to handle transactions in Java with JDBC? Aug 02, 2025 pm 12:29 PM

To correctly handle JDBC transactions, you must first turn off the automatic commit mode, then perform multiple operations, and finally commit or rollback according to the results; 1. Call conn.setAutoCommit(false) to start the transaction; 2. Execute multiple SQL operations, such as INSERT and UPDATE; 3. Call conn.commit() if all operations are successful, and call conn.rollback() if an exception occurs to ensure data consistency; at the same time, try-with-resources should be used to manage resources, properly handle exceptions and close connections to avoid connection leakage; in addition, it is recommended to use connection pools and set save points to achieve partial rollback, and keep transactions as short as possible to improve performance.

How to work with Calendar in Java? How to work with Calendar in Java? Aug 02, 2025 am 02:38 AM

Use classes in the java.time package to replace the old Date and Calendar classes; 2. Get the current date and time through LocalDate, LocalDateTime and LocalTime; 3. Create a specific date and time using the of() method; 4. Use the plus/minus method to immutably increase and decrease the time; 5. Use ZonedDateTime and ZoneId to process the time zone; 6. Format and parse date strings through DateTimeFormatter; 7. Use Instant to be compatible with the old date types when necessary; date processing in modern Java should give priority to using java.timeAPI, which provides clear, immutable and linear

Comparing Java Frameworks: Spring Boot vs Quarkus vs Micronaut Comparing Java Frameworks: Spring Boot vs Quarkus vs Micronaut Aug 04, 2025 pm 12:48 PM

Pre-formanceTartuptimeMoryusage, Quarkusandmicronautleadduetocompile-Timeprocessingandgraalvsupport, Withquarkusoftenperforminglightbetterine ServerLess scenarios.2.Thyvelopecosyste,

Understanding Network Ports and Firewalls Understanding Network Ports and Firewalls Aug 01, 2025 am 06:40 AM

Networkportsandfirewallsworktogethertoenablecommunicationwhileensuringsecurity.1.Networkportsarevirtualendpointsnumbered0–65535,withwell-knownportslike80(HTTP),443(HTTPS),22(SSH),and25(SMTP)identifyingspecificservices.2.PortsoperateoverTCP(reliable,c

How does garbage collection work in Java? How does garbage collection work in Java? Aug 02, 2025 pm 01:55 PM

Java's garbage collection (GC) is a mechanism that automatically manages memory, which reduces the risk of memory leakage by reclaiming unreachable objects. 1.GC judges the accessibility of the object from the root object (such as stack variables, active threads, static fields, etc.), and unreachable objects are marked as garbage. 2. Based on the mark-clearing algorithm, mark all reachable objects and clear unmarked objects. 3. Adopt a generational collection strategy: the new generation (Eden, S0, S1) frequently executes MinorGC; the elderly performs less but takes longer to perform MajorGC; Metaspace stores class metadata. 4. JVM provides a variety of GC devices: SerialGC is suitable for small applications; ParallelGC improves throughput; CMS reduces

Using HTML `input` Types for User Data Using HTML `input` Types for User Data Aug 03, 2025 am 11:07 AM

Choosing the right HTMLinput type can improve data accuracy, enhance user experience, and improve usability. 1. Select the corresponding input types according to the data type, such as text, email, tel, number and date, which can automatically checksum and adapt to the keyboard; 2. Use HTML5 to add new types such as url, color, range and search, which can provide a more intuitive interaction method; 3. Use placeholder and required attributes to improve the efficiency and accuracy of form filling, but it should be noted that placeholder cannot replace label.

Comparing Java Build Tools: Maven vs. Gradle Comparing Java Build Tools: Maven vs. Gradle Aug 03, 2025 pm 01:36 PM

Gradleisthebetterchoiceformostnewprojectsduetoitssuperiorflexibility,performance,andmoderntoolingsupport.1.Gradle’sGroovy/KotlinDSLismoreconciseandexpressivethanMaven’sverboseXML.2.GradleoutperformsMaveninbuildspeedwithincrementalcompilation,buildcac

go by example defer statement explained go by example defer statement explained Aug 02, 2025 am 06:26 AM

defer is used to perform specified operations before the function returns, such as cleaning resources; parameters are evaluated immediately when defer, and the functions are executed in the order of last-in-first-out (LIFO); 1. Multiple defers are executed in reverse order of declarations; 2. Commonly used for secure cleaning such as file closing; 3. The named return value can be modified; 4. It will be executed even if panic occurs, suitable for recovery; 5. Avoid abuse of defer in loops to prevent resource leakage; correct use can improve code security and readability.

See all articles