[interview] 764 high frequency front-end development interview questions and answers sorting

Tell me about your understanding of closures Closures are mainly used to design private methods and variables. The advantage of closures is that they can avoid the pollution of global variables. The disadvantage is that closures will reside in memory and increase memory usage. Improper use can easily lead to memory leakage. Closures have thre ...

Added by wrequed on Fri, 11 Feb 2022 19:29:08 +0200

Deep understanding of JVM -- memory structure

Deep understanding of JVM (2) -- memory structure (2) 4. Pile definition Objects created with the new keyword are placed in heap memory characteristic The safety of all threads in the heap needs to be consideredThere is a garbage collection mechanism Heap memory overflow java.lang.OutofMemoryError : java heap space. Heap memory over ...

Added by Haberdasher on Fri, 11 Feb 2022 19:20:54 +0200

Actual combat -- audio and video synchronization scheme

PTS:Presentation timestamp the timestamp used in the final rendering DTS:Decoding timestamp what is used for decoding I(intra) B(bidirectional) P(predicted) compression principle. The first frame of intra compression gop is the key frame. B frame can refer to one frame forward and backward, or how many frames. Generally, it is set to 3 frames. ...

Added by Tewl on Fri, 11 Feb 2022 18:47:29 +0200

SpringCloud Zuul+Mysql implements dynamic gateway

Introduction to Zuul Zuul is an open source API Gateway server of netflix. It is essentially a web servlet application. It is also one of the core components of spring cloud. Zuul framework mainly provides dynamic routing, monitoring, elasticity and security services problem Generally speaking, there are two types of Zuul routing 1, Stat ...

Added by russ8 on Fri, 11 Feb 2022 18:39:07 +0200

Python 3, 2 pieces of code, add watermarks to pdf files. It turns out that watermark can also play like this.

1. Introduction Little loser: happy new year, brother fish! Xiaoyu: everything goes to the three treasures hall. If there's anything, just tell me Little loser: don't be so direct. It's for the new year Xiaoyu: don't be useless. Just be careful. I don't know. Loser: Little loser: despise and despise. As long as you can help me solve the p ...

Added by siesmith on Fri, 11 Feb 2022 18:37:10 +0200

Understand ARP deception

preface Learning ARP deception ARP spoofing is also a very old penetration method, which mainly plays the role of information collection. For example, you can use spoofing to obtain each other's traffic, and analyze the information you think is important from the traffic, such as XX account password. Or use ARP attack to cut off the network a ...

Added by The Phoenix on Fri, 11 Feb 2022 18:35:59 +0200

Chapter 17 Java se special topic object-oriented advanced four - Interface

Interface business scenario: used to formulate standards, global constants and public abstract methods 1. Interface Overview Interface: encapsulate some methods that are not implemented; Subclass implementation interface: all abstract methods of the interface must be implemented rule of grammar interface Interface name{ //1. Attrib ...

Added by davemwohio on Fri, 11 Feb 2022 18:27:43 +0200

leetcode 93. Recover IP address [backtracking]

1. Subject requirements leetcode 93. Restore IP address The valid IP address consists of exactly four integers (each integer is between 0 and 255 and cannot contain leading 0). Use '.' between integers separate. For example, "0.1.2.201" and "192.168.1.1" are valid IP addresses, but "0.011.255.245", "192.16 ...

Added by fiddler80 on Fri, 11 Feb 2022 18:23:59 +0200

Spring Cloud microservice declarative REST client -- Spring Cloud Feign

Spring Cloud microservice series articles Spring Cloud microservice (1) registry and configuration center -- Nacos Spring Cloud microservice (2) microservice Gateway -- Spring Cloud Gateway Spring Cloud microservice (3) declarative REST client -- Spring Cloud Feign preface This paper mainly introduces one of the communication methods betwe ...

Added by wizzkid on Fri, 11 Feb 2022 18:18:43 +0200

The sixth web front-end training notes [P24-p26]

JavaScript Basic grammar 1. Built in objects var str="Hello World"; console.log(str); substring(m,n) returns a given string starting at position m and ending at position n. If the parameter is omitted, it means to get to the end of the string console.log(str.substring(3)); console.log(str.substring(3,5)); toLowerCase() converts all charac ...

Added by DaPrince on Fri, 11 Feb 2022 18:16:04 +0200