Skip to content

Latest commit

 

History

History
272 lines (203 loc) · 11.5 KB

questions_net.markdown

File metadata and controls

272 lines (203 loc) · 11.5 KB

.NET / C# Interview Questions

Questions related to .NET and C#, such as readonly vs. constant, how GC works, how reflection works.


Phone Screen Questions

Easy Questions

Q: What is the difference between reference types and value types?

A:

  • Reference types are allocated on the heap. When passed into a method, the reference is copied, which means any changes to the object will affect the outer scope.
  • Value types are allocated on the stack. When passed into a method, the value is copied, which means changes to the value will not affect the outer scope.

Q: What are the different access modifiers and what does each one mean?

A:

  • private: Can be used only within the same class.
  • protected: Can only be used within the same class or its subclasses.
  • internal: Can only be used from within the same assembly.
  • public: Can be used from anywhere.

Follow-up: What is the default access modifier (implied, if one is not explicitly provided) for:

  • Classes? internal
  • Member variables? private
  • Methods? private

Q: What is the virtual keyword used for?

A: The virtual keyword can be applied only to a method, to indicate that it can be overridden. Methods without the virtual keyword cannot be overridden in C# (unlike Java where methods are virtual by default and can only be made final).

Med Questions

Q: In C#, what is the difference between the 3 keywords static, constant, and readonly?

A:

  • Static: One copy of a static method, class, or class member will exist per ApplicationDomain, and will be shared across all instances of an object.
  • Constant: A property marked as constant has its value set inline and can not be changed. The value is actually compiled into the dll and is static.
  • Readonly: A property marked as readonly can be set inline or within the constructor of a class, but not set again after that. This is useful for injecting values at run-time that you may not know at compile-time and you do not want an application to be able to modify. A readonly property may or may not be static.

Notes:

  • Most people will know constant and static but not readonly. If a candidate does not understand static they barely know C# or OOP.

Q: What is a delegate?

A: A delegate is a way of wrapping a method that matches a specific signature. A delegate is similar to a function pointer, but is type-safe ( allowing for inheritance variance.) A single delegate can wrap many methods.


Q: What is an extension method? Why would you use one?

A: Extension methods are a special kind of static method, but they are called as if they were instance methods on the extended type. They enable you to "add" methods to existing types. Extension methods offer a few valuable options, such as the ability to call the method on a null reference, and to modify types for which source code is not available, such as those in the base class libraries.

Hard Questions

Q: How do you ensure that objects used as a generic's type parameter implement a specific interface?

A: Generic type constraints are the term for this. The where keyword in .net is used for this, such as:

public class MyGenericClass<T> where T : IComparable { }

A more complex example shows how you can actually assert that types adhere to built-in types as well, or even are new()able:

class MyClass<T, U, V>
    where T : class
    where U : struct
    where V : new
{ }

In-person questions

Easy Questions

Med Questions

Q: Explain the limitation of overriding an inherited / parent class member that is not marked as virtual.

A: Any member not marked a virtual that is overridden by an inheriting / child class will return the result from the parent class when the child class is referred to polymorphically as the parent.

class A
{
  public virtual void First()
  {
    Console.PrintLine("A.First");
  }

  public void Second()
  {
    Console.PrintLine("A.Second");
  }
}

class B : A
{
  public override void First()
  {
    Console.PrintLine("B.First");
  }

  public new void Second()
  {
    Console.PrintLine("B.Second");
  }
}

class Test
{
  public static void Main(string[] args)
  {
    A b_as_A = new B();

    b_as_A.First();
    // OUTPUT: B.First
    b_as_A.Second();
    // OUTPUT: A.Second
    ((B)b_as_A).Second();
    // OUTPUT: B.Second
  }
}

Q: What is an Anonymous Method?

A: An anonymous method is a function, including parameters and return type, that is not written as part of a class, but purely defined solely by a delegate. Anonymous methods can be written to the delegate keyword or using the lambda syntax.

Hard Questions

Q: What does the lock key word do? What argument should be provided to the lock keyword?

A:

  1. The lock keyword marks a statement block as a critical section by obtaining the mutual-exclusion lock for a given object, executing a statement, and then releasing the lock. The lock keyword ensures that one thread does not enter a critical section of code while another thread is in the critical section. If another thread tries to enter a locked code, it will wait, block, until the object is released.

  2. The argument provided to the lock keyword must be an object based on a reference type, and is used to define the scope of the lock. In the example above, the lock scope is limited to this function because no references to the object lockThis exist outside the function.

    bonus points: It is best to avoid locking on a public type, or on object instances beyond the control of your application. For example, lock(this) can be problematic if the instance can be accessed publicly, because code beyond your control may lock on the object as well. This could create deadlock situations where two or more threads wait for the release of the same object. As a result, it is best to lock a private or protected member that is not interned.


Q:

  1. What is "double-checked locking:"?
  2. What design pattern is it typically associated with?
  3. What is wrong with it and what is the solution for this limitation?

A:

  1. A software design pattern used to reduce the overhead of acquiring a lock by first testing the locking criterion (the "lock hint") without actually acquiring the lock. Only if the locking criterion check indicates that locking is required does the actual locking logic proceed.

  2. Double-checked locking is often used as part of the Singleton pattern.

  3. The pattern, when implemented in some language/hardware combinations, can be unsafe. At times, it can be considered an anti-pattern. In C#, this issue is addressed with the volatile keyword. The volatile keyword indicates that a field might be modified by multiple threads that are executing at the same time. Fields that are declared volatile are not subject to compiler optimizations that assume access by a single thread. This ensures that the most up-to-date value is present in the field at all times.


Q:

  1. .NET Framework 4.5 / C# 5.0 introduced the 'async' and 'await' keywords, explain the intended purpose of each.
  2. What types of situations are async and await well suited?
  3. Is async-await a good choice for long-running, high CPU tasks?

A:

  1. Use the async modifier to specify that a method, lambda expression, or anonymous method is asynchronous. If you use this modifier on a method or expression, it's referred to as an async method. The await operator is applied to a task in an asynchronous method to suspend the execution of the method until the awaited task completes. The task represents ongoing work.
  2. Any long-running, low cpu tasks is a good candidate for async-await. This would include disk/file access; database activity; and remote service calls (such as web requests).
  3. No, async-await was specifically created to allow for parallelizing waiting without blocking the current thread (ie: to parallelize a list of remote service calls or db requests). Utilizing async and await for high CPU methods removes the callers ability to manage thread allocation for the high CPU work which inhibits optimal tuning in the consuming application.

Q: What are heap generations?

A: The heap is organized into generations so it can handle long-lived and short-lived objects. There are three generations of objects on the heap:

  • Generation 0: the youngest generation containing short-lived objects such as ta temporary variable
  • Generation 1: contains short-lived objects and services as a buffer between short-lived and long-lived objects
  • Generation 2: contains long-lived objects such as static data that is live for the duration of the process

Q:

  1. What is the garbage collector?
  2. When does garbage collection occur?
  3. Describe the phases of garbage collection.

A:

  1. The garbage collector is an automatic memory manager that allocates objects on the managed heap, reclaim objects that are no longer being used, and provides memory safety by making sure that an object cannot use the content of another object.
  2. Garbage collection occurs when one of the following conditions is true:
    • the system has low physical memory
    • the memory that is used by allocated object on the managed heap surpasses an acceptable threshold which is continuously adjusted as the process runs
    • the GC.Collect method is called
  3. Garbage collection has the following phases:
    • a marking phase that finds and creates a list of all live objects
    • a relocating phase that updates the references to objects that will be compacted
    • a compacting phase that reclaims the space occupied by the dead objects and compacts the surviving objects -- the compacting phase moves objects that have survived a garbage collection toward the older end of the segment

Q: Explain how .Net's Garbage Collection algorithm works

A: .Net uses a mark-and-sweep GC algorithm. When GC fires, it first enumerates all the roots (like registers, global or static fields, local variables on the stack, function arguments on stack, etc) and then starts visiting the objects referenced by them recursively (essentially traveling the nodes in the memory graph). When it reaches an object it marks it with a special flag indicating that the object is reachable and hence not garbage. At the end of this mark phase it gets into the sweep phase. Any object in memory that is not marked by this time is garbage and the system disposes it.

More details here: http://blogs.msdn.com/b/abhinaba/archive/2009/01/30/back-to-basics-mark-and-sweep-garbage-collection.aspx

Follow-up: What are the advantages and disadvantages of a mark-and-sweep GC algorithm over other algorithms (such as a reference counter GC)?

A: The primary advantage of mark-sweep is that it handles cyclic references naturally. Moreover, no additional overheads are added while normal execution (e.g. allocation, pointer manipulations). Combined with compaction it ensures good locality of reference and reduced fragmentation and hence optimal subsequent allocations.

However, mark-sweep pauses useful execution and walks entire memory marking and sweeping it. Hence it adds large freezes which is unacceptable in most interactive systems. However, incremental variations of Mark-sweep are available which works around this limitation. Mark-sweep also starts thrashing when memory fills up as it fails to clean up memory and it gets triggered again and again as memory approaches exhaustion. Self tuning GC helps in this scenario.


Whiteboard questions

Easy Questions

Med Questions

Hard Questions