Skip to main content

Amazon Phone Interview (Amazon 电话 面经)

发信人: dingzj (Jason), 信区: JobHunting
标  题: Amazon Phone Interview (Amazon 电话 面经)
发信站: BBS 未名空间站 (Sat Mar 20 00:24:36 2010, 美东)

简单介绍下背景:HR不知道从哪里找到我的简历(貌似在monster上),就给我这个机
会interview。本人是一般学校(排名100外)的CS Ph.D,今年底能毕业吧。有过工业界的
internship经验。因为Ph.D一直在搞research,所以编程,算法和技巧大部分都是从这
个版里面学的,经常潜水。以前课堂上也学到一些,但只是个基础。

本周四面的,面试官应该是一个美国人,说话有点不清楚还快,幸亏没到周杰伦的地步
。因为简历里面貌似research的东西很多,所以面试官上来就说,我们这个是纯编程+
一点点research方面的东西,问我是不是我想要的。我连忙说,都行,扯了一堆生怕马
上挂掉. 此外,也被问了很多基础问题,考察我的技术。HR通知的是一个小时的面试,
结果打了1个小时40分钟.期间,他在不停地找题目,我也在不停地扯,防止冷场。不知
道为什么,面试前紧张的要命,面试时反而更能说。刚开始问了我喜欢用Java还是用C
回答问题,我选了Java.尽管java很不熟,只写过几个程序,但是有OO的概念,而且C++
的东西貌似更难回答.闲话少说,上题目。

-----------Interviewed Questions-----------
0. Describe one of your recent projects in school.
1. What does Abstract class do? Why?
2. How does Java Garbage Collection work?
3. Java keywords meaning and differences: Final, finally, finalize
4. In an array, all numbers show even times except one number shows odd
times. Find it.
5. BST operation times. Worse cases.
6. How to implement a hashmap.
7. Reverse a string. Giving an AmazonString Class, one data field: strdata.
Including public methods: 1. getlength(), 2, getcharAt(int idx), 3.
AmazonReverse(). Methods 1 and 2 are given, How to implement the
AmazonReverse(3)? Any constant time solution? Change/add data field, method
1 and 2 if necessary.
8. Design a restaurant reservation system.
9. Convert a string(integer) to integer numbers.

------------------------------------------------
大部分题目我需要念code,不过不需要过于详细,简单说说也都能明白。
立此存照。
--

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...