A company recruited .NET advanced programmer

xiaoxiao2021-03-06  58

A company's old presidency I helped him find some .NET masters to join their company, so crazy on 51job issued a request request. The corresponding people are endless, but the level is uneven. In order to show their technical capabilities, team collaboration quality, I have a high-level programmer's test, and show it to those need .NET programs Companies (given the experience of I have to go to Microsoft Interview, similar to Microsoft's topic) The topic is as follows: Advanced programmer interview topic English topic (can answer in Chinese) 1) please described the Different Between XML, XSD, XSL . through their definition 2) Do you know the Persistent Object in J2EE; if yes, please describe some mechanism of it 3) Please describe some famous encryption arithmetic as many as you know, one of arithmatics to explain if possible intelligence logical problems. 1. A password uses only 5 letters of K, L, M, N, and O, the words in the password are arranged from left to right. The password word must follow the rules: (1) The minimum length of the password word is two letters, can The same, can also be different (2) K cannot be the first letter (3) of the word. If l, the number of times is more than once (4) m does not make the last one cannot be the second letter (5) k. When the appears, n must appear (6) o If it is the last letter, then the last letter, one problem 1: Which letter can be placed behind the LO, form a 3 letter password word? A) k b) l c) m d) N question 2: If the letter can be obtained is K, L, M, how much is the total number of two letters long password words that can be formed? A) 1 b) 3 c) 6 D) 9 questions 3: Which one is a word password? A) Klln b) LOML C) MLLO D) NMKO Questions 4: How much is the total number of different password words that can be made by three identical letters? A) 1 b) 2 c) 3 D) 4 questions 5: Word Password MMLLOKN can turn another password word in the following, except: a) instead of each L b in place for each M instead of each M C) Use O instead of d) Put the O move to the left side of N

2.62-63 = 1 Equation is not established, please move a number (can not move minus, equal to the number), make the equation to be established, how to move?

Technical Program 1) Please use the VB (or C #) language to describe the encryption decision algorithm of Blowfish. If not, you can use Chinese map form. If you don't know the Blowfish algorithm, please describe the encryption decision algorithm that we are more familiar. 2) If you are a software architect, how will you build a architecture that meets N-TIE? And please describe the role of each layer you built. (Note: Please consider WebService in the project) 3) Please simply describe the concept of Singleton, abstract factory, bridge, composite (optional three). Scenario analysis, if you are a test engineer, your good friend is a software engineer, you are all in the same part. Once, you have discovered a major bug that has already caused a fatal impact on the company's products. If you report your boss in a timely manner, it will be awarded, maybe it will be a manager, but if you do this, you will lose a friend because he wants to be resigned by the boss. On the contrary, if you help your friend hide the bug, then the company's products have a lot of security hazards. If they are attacked, then the company's loss is very large, and the company will focus on their own companies and bosses. What should you do?

Turning:

http://blog.9cbs.net/jaguar1982/archive/2004/09/26/117096.aspx

转载请注明原文地址:https://www.9cbs.com/read-112869.html

New Post(0)