Skip to main content

大公司和小公司interview的重大区别


本人经历过很多interview,电话的,面谈的都有, 最大的公司有2万职工, 最小的公
司只有20职工。 发现公司的规模和interview的内容很有关联。

大公司倾向于基础知识的考察,要你做很多computer science的基本课程,例如
algorithm,data structure等等。对你的过去的具体实际经验反而不太多问。

小公司则非常注重实际经验,很少要你做题。 他们关注的是你曾经做过什么,问的问
题多半是具体的关于某种语言的功能实现,和某种package的用法。 他们会问你用过什
么UML,什么version control,什么IDE, 什么platform,什么语言,会不会用vi,会
不会写shell script等等。

所以大公司比较适合年轻的刚从学校出来不久的血气方刚的人。 当你的年龄逐渐增大
,学校学的内容逐渐淡忘,实际经验逐渐充实,小公司则比较合适。 当然,如果你到
了40岁,还对学校学的东西记忆犹新,并且有丰富的实际经验,也许在大公司可以谋到
一个较高的位置。

还有一点非常重要。 一个interview的成功,不在于你的知识的多少,而在于你的知识
和面试人员的知识的重合度。 重合度越高,他们对你的满意度就越高。 你也许知道许
多他们不知道的知识,但你没有机会表现你的知识,你只能表现在他们的知识范围内的
那些东西。

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...