MindMap Gallery BruceVan data algorithm structure concept knowledge point notes
BruceVan data algorithm structure concept knowledge point notes: How many ways to start Activity? ActivityInfo.LAUNCH_MULTIPLE; ActivityInfo.LAUNCH_SINGLE_INSTANCE; ActivityInfo.LAUNCH_SINGLE_TASK.
Edited at 2022-11-10 17:40:25This article discusses the Easter eggs and homages in Zootopia 2 that you may have discovered. The main content includes: character and archetype Easter eggs, cinematic universe crossover Easter eggs, animal ecology and behavior references, symbol and metaphor Easter eggs, social satire and brand allusions, and emotional storylines and sequel foreshadowing.
[Zootopia Character Relationship Chart] The idealistic rabbit police officer Judy and the cynical fox conman Nick form a charmingly contrasting duo, rising from street hustlers to become Zootopia police officers!
This is a mind map about Deep Analysis of Character Relationships in Zootopia 2, Main content: 1、 Multi-layer network of relationships: interweaving of main lines, branch lines, and hidden interactions, 2、 Motivation for Character Behavior: Active Promoter and Hidden Intendant, 3、 Key points of interaction: logic of conflict, collaboration, and covert support, 4、 Fun Easter eggs: metaphorical details hidden in interactions.
This article discusses the Easter eggs and homages in Zootopia 2 that you may have discovered. The main content includes: character and archetype Easter eggs, cinematic universe crossover Easter eggs, animal ecology and behavior references, symbol and metaphor Easter eggs, social satire and brand allusions, and emotional storylines and sequel foreshadowing.
[Zootopia Character Relationship Chart] The idealistic rabbit police officer Judy and the cynical fox conman Nick form a charmingly contrasting duo, rising from street hustlers to become Zootopia police officers!
This is a mind map about Deep Analysis of Character Relationships in Zootopia 2, Main content: 1、 Multi-layer network of relationships: interweaving of main lines, branch lines, and hidden interactions, 2、 Motivation for Character Behavior: Active Promoter and Hidden Intendant, 3、 Key points of interaction: logic of conflict, collaboration, and covert support, 4、 Fun Easter eggs: metaphorical details hidden in interactions.
BruceVan data algorithm structure concept knowledge point notes
UML
Singleton pattern
factory, abstract factory
Strategy pattern and state machine
Android
Base
UI
How many ways to start Activity?
ActivityInfo.LAUNCH_MULTIPLE
ActivityInfo.LAUNCH_SINGLE_INSTANCE
ActivityInfo.LAUNCH_SINGLE_TASK
ActivityInfo.LAUNCH_SINGLE_TOP
Fragment life cycle
RecycleView, ListVIew
Memory management
MVC pattern (ViewHolder?)
Create destruction logic
Handler
Message queue model?
What are the functions and usage of the four major components?
Persistence
Source code
Activity
Program startup process
Launcher.png
Start the Activity process within the program
WindowManagerService
Binder mechanism
AMS
Open source library
Multithreading, RxJava
Photo gallery: Fresco, Picasso
Message distribution: EventBus
Persistence
Network: Retrofit, Okhttp
TCP/IP
basic knowledge
url
What is the difference between URI, URL, and URN?
URL syntax?
http
message
method
What is the use of trace method?
The difference between get and post methods
connection handling
tcp
characteristic
TCP connection established?
TCP disconnect?
TCP flow control?
https
How is it different from HTTP architecture?
SSL handshake
Performance optimization
TCP performance optimization
HTTP transaction latency
Handshake delay for TCP connection establishment?
Delayed confirmation delay?
Nagle algorithm
slow start delay
TIME_WAIT accumulation and port exhaustion
Serial transaction latency
Solving congestion algorithm?
Tahoe
Reno
New Reno Algorithm
sack algorithm
Fack algorithm
Vegas
encryption
Common cryptographic algorithms
Block Encryption Algorithm
AES
Serpent
Stream encryption algorithm
RC4
ChaCha20
Hash algorithm
MD5
sha1
sha256
sha512
ripemd 160
poly1305
Message verification code
HMAC-sha256
AEAD
Key exchange
DH
ECDH
RSA
PFS method (DHE, ECDHE)
public key encryption
RSA
rabin-williams
digital signature
RSA
DSA
ECDSA
Cryptoderivative function
TLS-12-PRF
bcrypto
scrypto
pbkdf2
random number generator
TLS
According to components
Symmetric encryption transmission components
Authentication key negotiation component
Key extension
Protocol layering
Symmetrically encrypted transmission: record
Authentication key negotiation: handshake protocol
auxiliary agreement
Changecipher spec protocol
Notify various return codes: Alert protocol
Inject http, smtp, etc. data streams into the record layer for processing and transmission: application data protocol
step
Sharding, the reverse is reorganization
Generate sequence numbers to generate unique numbers for each data block to prevent replay or reordering
Compression, optional step, use the compression algorithm negotiated by the handshake protocol for compression
Encryption, using the key negotiated by the handshake protocol for encryption/decryption
Calculate HMAC, calculate HMAC on data, and verify the correctness of HMAC of received data packets
Send to tcp/ip, send the data to TCP/IP for transmission (or other ipc mechanism).
algorithm
breadth first search
depth first search
binary search
merge sort
Quick sort
Heap sort
Tree: red-black tree, B-tree: insertion, search, construction
dynamic programming
encode problem
data structure
linked list
Binary tree
word search tree
stack
queue
vector, array
Map
Segment tree
concept
time complexity
space complexity
The difference between Stack and heap
Java basics
Refer to "Effective Java"