You can't answer 80% of the selected interview questions. What else do you want to interview?
0.1 + 0.2 = = = 0.3? Why?
Unequal. In js, javascript uses the Number type to represent numbers (integers or floating-point numbers), following IEEE 754 Standard, a number (1 + 11 + 52) is represented by 64 bit binary: sign bit + exponential bit (order code) + tail code
1 sign bit, 0 for positive number, 1 for negative number s11 digits (e ...
Added by cigardude on Wed, 09 Mar 2022 14:55:15 +0200
MySQL index and index optimization
1. Index
1.1 index overview
MySQL's official definition of index is: index is a data structure (orderly) that helps MySQL obtain data efficiently. In addition to the data, the database system also maintains the data structure that meets the specific search algorithm. These data structures refer to (point to) the data in some way, so that the ...
Added by milesap on Wed, 09 Mar 2022 14:51:29 +0200
Multithreading security: everyone talks, but not everyone talks clearly
To write multithread safe code, the key point is to control access to shared and variable states:The so-called shared means that the variable may be accessed by multiple threads at the same time;The so-called variable means that the value of the variable may change during its life cycle.If multiple threads access a shared variable state variabl ...
Added by cayman_d on Wed, 09 Mar 2022 14:47:23 +0200
Java multithreading concurrency best practices
It is difficult to write concurrent code. Although the Java language provides many synchronization and concurrency support, it still needs personal diligence and professional knowledge to write Java Concurrent code without bugs. Java multithreading concurrency best practice is a set of good ideas to help you quickly develop high-quality concurr ...
Added by Foregone96 on Wed, 09 Mar 2022 14:45:14 +0200
Mysql advanced operation commands
Data table advanced operations
Clone the table and generate the data records of the data table into a new table
Method 1: use like
create table test like info; #Using the LIKE method, copy the KY08 table structure to generate the test01 table
insert into test select * from info;
Method 2: direct cloning
However, direct cloning ca ...
Added by Tindo on Wed, 09 Mar 2022 14:38:02 +0200
spring scheduled task @ Component
1 Introduction
spring implements scheduled tasks through annotations, and operates automatically after a fixed time. For example, the mall clears the unreceived orders after a certain time.
2 use
2.1 add annotation @ enableshcheduling
Add a comment @ enableshcheduling on the entry class or Task header to enable support for scheduled ...
Added by melvincr on Wed, 09 Mar 2022 14:34:55 +0200
Java learning notes - object oriented
1, Understanding object-oriented
1.1.1 difference between process oriented and object-oriented
1. Process oriented: process oriented programming focuses not on "things", but on doing it in several steps, first what to do and then what to do. For example: ① Get up in the morning: get up, dress, wash, eat and go to work. According ...
Added by rskandarpa on Wed, 09 Mar 2022 14:32:56 +0200
How to defend against XSS attacks in Java
Detect and remove XSS (cross site scripting) attacks from text entered through normalization.
Cross site scripting (XSS) attacks are a form of threat that exploits vulnerabilities in Web applications to plunder user information. Using malicious scripts, attackers can attract different users through normally trusted Web pages and access any inf ...
Added by triphis on Wed, 09 Mar 2022 14:30:08 +0200
[source code analysis] NVIDIA HugeCTR, GPU version parameter server ----- Local hash table
[source code analysis] NVIDIA HugeCTR, GPU version parameter server -- (9) -- local hash table
0x00 summary
In this series, we introduce HugeCTR, an industry-oriented recommendation system training framework, which is optimized for large-scale CTR models with model parallel embedding and data parallel intensive networks. This article introduce ...
Added by micah1701 on Wed, 09 Mar 2022 14:22:18 +0200
Data structure -- 8 lookup
8. Find
8.1 introduction to search
A search table is a collection of data elements (or records) of the same type
A key is the value of a data item in a data element, also known as a key value
If this keyword can uniquely identify a record, it is called the primary key
Keywords that can identify multiple data elements (or records) are calle ...
Added by offnordberg on Wed, 09 Mar 2022 14:15:51 +0200