[interview] 764 high frequency front-end development interview questions and answers sorting
Tell me about your understanding of closures
Closures are mainly used to design private methods and variables. The advantage of closures is that they can avoid the pollution of global variables. The disadvantage is that closures will reside in memory and increase memory usage. Improper use can easily lead to memory leakage.
Closures have thre ...
Added by wrequed on Fri, 11 Feb 2022 19:29:08 +0200
Deep understanding of JVM -- memory structure
Deep understanding of JVM (2) -- memory structure (2)
4. Pile
definition
Objects created with the new keyword are placed in heap memory
characteristic
The safety of all threads in the heap needs to be consideredThere is a garbage collection mechanism
Heap memory overflow
java.lang.OutofMemoryError : java heap space. Heap memory over ...
Added by Haberdasher on Fri, 11 Feb 2022 19:20:54 +0200
Actual combat -- audio and video synchronization scheme
PTS:Presentation timestamp the timestamp used in the final rendering DTS:Decoding timestamp what is used for decoding I(intra) B(bidirectional) P(predicted) compression principle. The first frame of intra compression gop is the key frame. B frame can refer to one frame forward and backward, or how many frames. Generally, it is set to 3 frames. ...
Added by Tewl on Fri, 11 Feb 2022 18:47:29 +0200
SpringCloud Zuul+Mysql implements dynamic gateway
Introduction to Zuul
Zuul is an open source API Gateway server of netflix. It is essentially a web servlet application. It is also one of the core components of spring cloud. Zuul framework mainly provides dynamic routing, monitoring, elasticity and security services
problem
Generally speaking, there are two types of Zuul routing 1, Stat ...
Added by russ8 on Fri, 11 Feb 2022 18:39:07 +0200
Python 3, 2 pieces of code, add watermarks to pdf files. It turns out that watermark can also play like this.
1. Introduction
Little loser: happy new year, brother fish! Xiaoyu: everything goes to the three treasures hall. If there's anything, just tell me Little loser: don't be so direct. It's for the new year Xiaoyu: don't be useless. Just be careful. I don't know. Loser: Little loser: despise and despise. As long as you can help me solve the p ...
Added by siesmith on Fri, 11 Feb 2022 18:37:10 +0200
Understand ARP deception
preface
Learning ARP deception
ARP spoofing is also a very old penetration method, which mainly plays the role of information collection. For example, you can use spoofing to obtain each other's traffic, and analyze the information you think is important from the traffic, such as XX account password. Or use ARP attack to cut off the network a ...
Added by The Phoenix on Fri, 11 Feb 2022 18:35:59 +0200
Chapter 17 Java se special topic object-oriented advanced four - Interface
Interface business scenario: used to formulate standards, global constants and public abstract methods
1. Interface Overview
Interface: encapsulate some methods that are not implemented;
Subclass implementation interface: all abstract methods of the interface must be implemented rule of grammar
interface Interface name{
//1. Attrib ...
Added by davemwohio on Fri, 11 Feb 2022 18:27:43 +0200
leetcode 93. Recover IP address [backtracking]
1. Subject requirements
leetcode 93. Restore IP address
The valid IP address consists of exactly four integers (each integer is between 0 and 255 and cannot contain leading 0). Use '.' between integers separate.
For example, "0.1.2.201" and "192.168.1.1" are valid IP addresses, but "0.011.255.245", "192.16 ...
Added by fiddler80 on Fri, 11 Feb 2022 18:23:59 +0200
Spring Cloud microservice declarative REST client -- Spring Cloud Feign
Spring Cloud microservice series articles
Spring Cloud microservice (1) registry and configuration center -- Nacos Spring Cloud microservice (2) microservice Gateway -- Spring Cloud Gateway Spring Cloud microservice (3) declarative REST client -- Spring Cloud Feign
preface
This paper mainly introduces one of the communication methods betwe ...
Added by wizzkid on Fri, 11 Feb 2022 18:18:43 +0200
The sixth web front-end training notes [P24-p26]
JavaScript
Basic grammar
1. Built in objects
var str="Hello World";
console.log(str);
substring(m,n) returns a given string starting at position m and ending at position n. If the parameter is omitted, it means to get to the end of the string
console.log(str.substring(3));
console.log(str.substring(3,5));
toLowerCase() converts all charac ...
Added by DaPrince on Fri, 11 Feb 2022 18:16:04 +0200