I was asked about the principle of Springboot automatic assembly during the interview. I'm sorry, hold it!!! No loss in collection
springboot version 2.5.5
Debug Roadmap
Many words are tears. Let's look at the picture.
Let's start with run
After using Springboot for so many years, what has this run() method done?
@SpringBootApplication
public class SpringbootDemoApplication {
public static void main(String[] args) {
SpringApplication.run(SpringbootD ...
Posted by EdN on Wed, 06 Oct 2021 12:53:48 -0700
java foundation --- detailed explanation of keywords
java foundation - detailed explanation of keywords
final static this super
**final keyword
final modifies classes, methods, and variables that are immutable
1.final modified methods cannot be overridden
2. The variable modified by final is a constant. If it is a variable of basic data type, the array will not change once initialized. If ...
Posted by cauchyResidue on Wed, 06 Oct 2021 07:38:11 -0700
@Concepts, differences and execution order of PostConstruct, @ PreDestroy and initMethod, destroyMethod, InitializingBean and DisposableBean
@Concepts, differences and execution order of PostConstruct, @ PreDestroy and initMethod, destroyMethod, InitializingBean and DisposableBean
@PostConstruct
Definition related
This annotation is added to the Java EE5 specification, not spring. Spring means that it follows this specification and plays a certain role in the Servlet life cy ...
Posted by magic-eyes on Mon, 04 Oct 2021 13:01:33 -0700
Basic data structure - eight sorts
Sorting: the focus of written examination and interview. 1. Algorithm description; 2. Realization; 3. Efficiency analysis (time complexity, space complexity, stability) Difficulty: too many sorting algorithms Stability: for data with the same keyword (the same number), if A is in front of A 'before sorting, the algorithm is stable if A is i ...
Posted by coowboy on Sat, 02 Oct 2021 18:17:52 -0700
Sword finger offer (Second Edition) - the lowest common ancestor of two nodes in the tree
PS: Sword finger offer is not only an interview guide that many students will refer to when looking for a job, but also an algorithm Guide (the main reason why it is so popular is that it provides a step-by-step optimization solution, which I think is very friendly). Now many Internet algorithm interview questions can be found here. For the con ...
Posted by ccb on Fri, 01 Oct 2021 18:26:44 -0700
JUC whole problem analysis + self summary
catalogue
1, What is JUC?
2, Processes and threads?
3, Locks package
① The traditional synchronized lock keyword.
Sync code block:
Synchronization method:
② Lock lock
4, Consumer producer issues.
5, 8 lock phenomenon.
6, Collection class unsafe
① List (ArrayList) is not safe
② Set (hashSet) is not secure ...
Posted by jdnet on Wed, 29 Sep 2021 15:50:33 -0700
java foundation summary
1, Introduction to java
java features
1. Object oriented
Basic features: class, object
Three characteristics:
Encapsulation: internal details are transparent to external calls, and external calls do not need to be modified or care about internal implementation Inheritance: inherit the methods of the base class and make your own changes a ...
Posted by nicob on Tue, 28 Sep 2021 18:52:45 -0700
Interview must ask: Java garbage collection mechanism
Absrtact: the garbage collection mechanism is the best example of a daemon thread because it always runs in the background.
This article is shared from Huawei cloud community< This article takes you to understand the garbage collection mechanism in Java >, author: Hai Yong.
introduce
In C/C + +, programmers are responsible for the cre ...
Posted by purinkle on Mon, 27 Sep 2021 19:47:29 -0700
iOS underlying principle 32: memory management
This paper mainly analyzes the memory management scheme in memory management and the underlying source code analysis of retain, retain count, release and dealloc
ARC & MRC
Memory management schemes in iOS can be roughly divided into two categories: MRC (manual memory management) and ARC (automatic memory management)
MRC
In the MRC era, ...
Posted by Chas267 on Sun, 26 Sep 2021 16:12:54 -0700
Current limiting: principle and practice of three algorithms: counter, leakage bucket and token bucket
https://www.cnblogs.com/crazymakercircle/p/15187184.html
Current limiting
Current limit is a common interview question in the interview.
Why limit current
In short Current limiting is used in many scenarios to limit concurrency and requests, such as second killing and rush buying, and to protect their own systems and downstream systems from ...
Posted by stuart7398 on Sun, 26 Sep 2021 12:03:12 -0700