Skip to main content

offer@Amazon+面经+求意见

发信人: fairyli (fairyli), 信区: JobHunting
标  题: offer@Amazon+面经+求意见
发信站: BBS 未名空间站 (Tue Mar 27 15:26:12 2012, 美东)

上周一onsite,左等右等,本来要move on了,结果中午在洗手间玩游戏时接到了offer
电话。
回报本版,报面经,同时求意见,恳请大家帮助。

面经:
电面1轮(因为之前面过):
1.基本数据结构及其操作的时间空间复杂度,不同数据结构对比,如array, linked
list, tree, queue, stack, hashtable, heap,etc.
2.实现queue用array还是linked list,优缺点对比。
3.给一个folder里面有上千个文件,要求返回包括电话号码的文件。(grep+regex)
4.linkedlist有无环 (fast/slow runner)
5.非负整数数组,除了一个值出现奇数次之外,其余都是偶数次,返回出现奇数次的数
(异或)

Onsite(4轮技术+1轮午饭+senior recruiter)
1.两个字符串,求出unique characters,即只出现在一个string中的char
(array[26],用0-3标记)
2.manager午饭,聊组里情况+我现在的工作项目
3.warm-up question:给个tree root,做mirror,代码+测试
  给个sorted int array和一个数,返回出现次数
4.bar raiser: 一百万个amazon product id,问过去一小时销售量top 10的(map-
reduce)
5.OO-design:furnitures with different materials (见careercup.com)
  给个猜词小游戏的app,显示一个合法string的anagram,要求用户一分钟内给答案,
返回对错,time out之后返回所有的正确答案。dictionary作为list,已知。
  (预处理dictionary,用hashtable存,key是string排序后的结果,每个slot用bst存
,时间为logk)eg:给atme,正确答案包括team, mate, meat, tame
6.senior recuiter进来介绍benefit,谈价格。但当时他说还没定给不给offer。

总的来说题目都中规中矩,唯一的挑战就是时间紧,面试官一个等一个。中午吃不饱下
午肚子叫(中午千万别点salad,比如我只吃了两片菜叶,真的是两片。。。!)

Package也是中规中矩:
base: 95k
Relocate: 7.5k
sign-on: 30k(2yrs:50%+50%)
RSU: 45k(4yrs: 5%+15%+40%+40%)
Amazon买东西10%off up to 1k USD/yr
年假第一年两周,之后三周

现在的问题是绿卡:据说amazon绿卡很慢,只给SDEII(5级)办,还是
半年之后。请问从我的package看来是4级还是5级呢。如果是4级,平均多久可以升到5级。谢谢各位。

另外这个package是标准fresh ms offer,请问还有谈的空间么?

Comments

Popular posts from this blog

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...