Skip to main content

Two Sigma面经

发信人: ziyunliu (ziyun), 信区: JobHunting
标  题: Two Sigma面经
发信站: BBS 未名空间站 (Sat Jun  2 19:08:53 2012, 美东)

面的sde。

1 对two sigma有什么了解,等等, 自己的project, 有什么application. 为什么选
择他们而不是Google 等。 然后出了一个编程题, 很简单。 估计前面聊得不好, 随
便出了个题意思意思。

2。8皇后问题, 以及一个stock 为背景的统计问题, 挣扎了很久, 没弄懂题目, 对
金融不了解。 题目大概意思是别人愿意在一定的价格愿意买和卖, 我们愿意在一定的
价格愿意买和卖, stock以一定的概率上涨或下跌, 问我们挣得钱的期望是多少。

3。一个quant。
1。如何生成一组数据,使他们的distribution是正态分布 (不是写程序)
2。一个如何design 假设检验, 来判断两个概率分布的均值是否相同。
3。 一个人在森林里迷了路, 森林与外部又一个直线的边界,已知目前位置距离边界
垂直距离是1mile,  如何design strategy, 使得走的路最少, 然后能走到森林外部
去。

面完三面就让走人了。

 发信人: beerbottle (beer bottle), 信区: JobHunting
标  题: Re: Two Sigma面经
发信站: BBS 未名空间站 (Sat Jun  2 19:22:40 2012, 美东)

看来吃到中饭了,再接再厉吧。

题目都不难,但是跟传统IT公司不一样,需要一点统计的知识。
即使不读John Hull,还是应该复习一下基本的统计知识。

3。1 just google box muller transform
3.2 should already be some statistical test for this, or ANOVA
3.3 recursion or dynamic programming

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...