Interview Questions

Review this list of 3,949 interview questions and answers verified by hiring managers and candidates.
  • Google logoAsked at Google 

    "Manage Programs that are in flight Track the progress vs Plan and see if things are on track, falling behind Monitor Risks and update current and any new risks identified and mitigation approach Communicate updates to stakeholders (weekly/biweekly as agreed) Communicate status to peer TPM and partnering teams Daily sync with Engg (like a timeboxed daily Standup to understand Daily Plan and any impediments raised that need resolving) Facilitate Reviews with Product Manager as features"

    Adib M. - "Manage Programs that are in flight Track the progress vs Plan and see if things are on track, falling behind Monitor Risks and update current and any new risks identified and mitigation approach Communicate updates to stakeholders (weekly/biweekly as agreed) Communicate status to peer TPM and partnering teams Daily sync with Engg (like a timeboxed daily Standup to understand Daily Plan and any impediments raised that need resolving) Facilitate Reviews with Product Manager as features"See full answer

    Behavioral
    Technical
  • Amazon logoAsked at Amazon 
    +5

    "A few months ago I joined a micro-services platform engineering team as their manager, at that time my team was struggling to deliver towards an upcoming production deadline for a customer facing product. Production date had been moved 5 times already and there were about 40% of product features which were remaining to be tested and signed off to move to production . I was made responsible to deliver the release of this product within the deadline and turnaround the software delivery throughput."

    Shuchi A. - "A few months ago I joined a micro-services platform engineering team as their manager, at that time my team was struggling to deliver towards an upcoming production deadline for a customer facing product. Production date had been moved 5 times already and there were about 40% of product features which were remaining to be tested and signed off to move to production . I was made responsible to deliver the release of this product within the deadline and turnaround the software delivery throughput."See full answer

    Software Engineer
    Behavioral
    +2 more
  • Amazon logoAsked at Amazon 

    "If other org is not taking PM seriously, then following may be potential reasons: They don't like the way PM communicates with them They do not understand project goals They do not understand requirements clearly They are occupied with other high priority project I think Project Manager did not prepare himself well before reaching out to org for resources. He can use the following approach to get resources from a different org: Good documentation: PM should capture the project"

    Saket S. - "If other org is not taking PM seriously, then following may be potential reasons: They don't like the way PM communicates with them They do not understand project goals They do not understand requirements clearly They are occupied with other high priority project I think Project Manager did not prepare himself well before reaching out to org for resources. He can use the following approach to get resources from a different org: Good documentation: PM should capture the project"See full answer

    Program Sense
    Behavioral
  • "facebook"

    Gaurav S. - "facebook"See full answer

    Behavioral
  • Amazon logoAsked at Amazon 
    Machine Learning Engineer
    Behavioral
  • 🧠 Want an expert answer to a question? Saving questions lets us know what content to make next.

  • Amazon logoAsked at Amazon 
    Technical Program Manager
    Behavioral
  • Amazon logoAsked at Amazon 

    "We will not always have all the required data to make a decision quickly. We need to work with ambiguity effectively by tying up the available facts with intuition."

    Sankar S. - "We will not always have all the required data to make a decision quickly. We need to work with ambiguity effectively by tying up the available facts with intuition."See full answer

    Software Engineer
    Behavioral
    +1 more
  • Amazon logoAsked at Amazon 
    +5

    "In order to earn team members trust you need to show - 1- You need to show them you trust them. Treat others the way you wanted to be treated. 2- Do what you say. Keep commitments. 3- Listen 4- Admit when you make mistakes 5- Consistently make good decisions "

    Ritu G. - "In order to earn team members trust you need to show - 1- You need to show them you trust them. Treat others the way you wanted to be treated. 2- Do what you say. Keep commitments. 3- Listen 4- Admit when you make mistakes 5- Consistently make good decisions "See full answer

    Product Manager
    Behavioral
    +1 more
  • Discord logoAsked at Discord 
    Video answer for 'Describe a time when your project failed.'
    +6

    "I feel this is more about "Describe a time when I failed or struggled" rather than "Project Failure"."

    Anjali V. - "I feel this is more about "Describe a time when I failed or struggled" rather than "Project Failure"."See full answer

    Product Manager
    Behavioral
    +1 more
  • Amazon logoAsked at Amazon 
    +8

    "I will divide my answer in 2 parts: Process I use for managing risks in any Project I will explain a real life situation where a Risk occurred and how I managed it Process for Risk Management can be broken down into 3 parts: Risk Identification: Risk identification is a team effort and is an ongoing process that happens throughout the Project. Technical Risks are usually identified during design/build/testing stage. I maintain a Risk register document to capture all the risks identified"

    Saket S. - "I will divide my answer in 2 parts: Process I use for managing risks in any Project I will explain a real life situation where a Risk occurred and how I managed it Process for Risk Management can be broken down into 3 parts: Risk Identification: Risk identification is a team effort and is an ongoing process that happens throughout the Project. Technical Risks are usually identified during design/build/testing stage. I maintain a Risk register document to capture all the risks identified"See full answer

    Technical Program Manager
    Behavioral
    +3 more
  • Meta (Facebook) logoAsked at Meta (Facebook) 
    +3

    "Situation - A situation where I used creative / innovative thinking to eliminate frustration with a product was while I was working on Point of Sale and Polaris for Retail Design System for Shopify. Upon seeing our vision for the future of this design system, it lacked a lot of the visual polish and necessary components that would make the product much more competitive in the market - this included having a lack of an interaction model for what is tappable vs. not tappable as well as containmen"

    Ben G. - "Situation - A situation where I used creative / innovative thinking to eliminate frustration with a product was while I was working on Point of Sale and Polaris for Retail Design System for Shopify. Upon seeing our vision for the future of this design system, it lacked a lot of the visual polish and necessary components that would make the product much more competitive in the market - this included having a lack of an interaction model for what is tappable vs. not tappable as well as containmen"See full answer

    Product Designer
    Behavioral
    +1 more
  • "WHAT IS IMPORTANT TO CUSTOMER VALUE TO THE CUSTOMER IMPACT ON THE CUSTOMER PRIORITIZE BASED ON THAT the sales team wants Specific changes to customer - Value NPV etc Client services want automation - Customer priority "

    Anonymous Mastodon - "WHAT IS IMPORTANT TO CUSTOMER VALUE TO THE CUSTOMER IMPACT ON THE CUSTOMER PRIORITIZE BASED ON THAT the sales team wants Specific changes to customer - Value NPV etc Client services want automation - Customer priority "See full answer

    Behavioral
  • Meta (Facebook) logoAsked at Meta (Facebook) 

    "TCP and UDP are ways in which data is transferred over the internet. TCP needs to have a connection between the two hosts in order for data to be transferred, while UDP begin the transfer without waiting for a connection between the two hosts. This makes UDP faster, but not as reliable as TCP because there is a chance the data transfer wont happen in UDP due to the uncertainty of the connection. TCP is used where reliable data transfer is crucial e.g file transfers, email, web browsing and UDP"

    Musonda C. - "TCP and UDP are ways in which data is transferred over the internet. TCP needs to have a connection between the two hosts in order for data to be transferred, while UDP begin the transfer without waiting for a connection between the two hosts. This makes UDP faster, but not as reliable as TCP because there is a chance the data transfer wont happen in UDP due to the uncertainty of the connection. TCP is used where reliable data transfer is crucial e.g file transfers, email, web browsing and UDP"See full answer

    Technical
    Concept
  • Amazon logoAsked at Amazon 

    "Our team were developing a HQ trivia for fitness. So at that moment our focus was developing an eye-catching animation for both iOS and Android. By the way, implementing an animation were hard without the progress of it. So we wanted to see an immediate progress. So I decided to use tools or libraries such as Lottie or Kite. Then it increased the quality and the productivity dramatically. So our designer were happy with it and also our dev team could reuse the code from the designed animation fr"

    Woongshik C. - "Our team were developing a HQ trivia for fitness. So at that moment our focus was developing an eye-catching animation for both iOS and Android. By the way, implementing an animation were hard without the progress of it. So we wanted to see an immediate progress. So I decided to use tools or libraries such as Lottie or Kite. Then it increased the quality and the productivity dramatically. So our designer were happy with it and also our dev team could reuse the code from the designed animation fr"See full answer

    Software Engineer
    Behavioral
    +1 more
  • DoorDash logoAsked at DoorDash 

    "Designed and framework to conduct risk and control assessment of applications that are prone to fraud risk and designed a target roadmap of overarching controls that further mitigates the risk. I explained how I took incharge of coming up with the framework for the assessment and held sessions. Role played with my team to think all the use cases possible and explained the accomplishments and takeaways."

    Hmj V. - "Designed and framework to conduct risk and control assessment of applications that are prone to fraud risk and designed a target roadmap of overarching controls that further mitigates the risk. I explained how I took incharge of coming up with the framework for the assessment and held sessions. Role played with my team to think all the use cases possible and explained the accomplishments and takeaways."See full answer

    BizOps & Strategy
    Behavioral
    +1 more
  • Meta (Facebook) logoAsked at Meta (Facebook) 
    +1

    "I most want to communicate a few principals of conflict resolution that I believe were integral in this situation, which are mutual respect, a results orientation, an unwavering focus on the user. To that end, here’s how I’d like to structure this answer: First, I’ll tell you about the project we were working on, to provide some background for you. Second, I’ll describe the disagreement. Third, I’ll describe how we arrived at a solution, and finally, I’ll discuss how those 3 conflict resolu"

    Ross B. - "I most want to communicate a few principals of conflict resolution that I believe were integral in this situation, which are mutual respect, a results orientation, an unwavering focus on the user. To that end, here’s how I’d like to structure this answer: First, I’ll tell you about the project we were working on, to provide some background for you. Second, I’ll describe the disagreement. Third, I’ll describe how we arrived at a solution, and finally, I’ll discuss how those 3 conflict resolu"See full answer

    Engineering Manager
    Behavioral
    +2 more
  • "Designing a Pseudo Random Number Generator (PRNG) involves creating an algorithm that generates a sequence of numbers that appear random while being deterministic, meaning that the same sequence can be reproduced given the same initial conditions. Here's a basic outline of how you could design a PRNG: Define the seed: The PRNG algorithm requires a seed value to initialize the generator. The seed can be any value, such as a number provided by the user or obtained from system data like the curr"

    Takashi M. - "Designing a Pseudo Random Number Generator (PRNG) involves creating an algorithm that generates a sequence of numbers that appear random while being deterministic, meaning that the same sequence can be reproduced given the same initial conditions. Here's a basic outline of how you could design a PRNG: Define the seed: The PRNG algorithm requires a seed value to initialize the generator. The seed can be any value, such as a number provided by the user or obtained from system data like the curr"See full answer

    System Design
  • Apple logoAsked at Apple 
    Software Engineer
    System Design
  • Google logoAsked at Google 

    "Preparing for a significant security compliance change can be overwhelming. The most efficient way to achieve GDPR compliance is through interdepartmental collaboration and the use of technology solutions that automate and validate business needs such as policy compliance, data security and required reporting. As the deadline looms, most organizations should already have started assessing the business impact, devising a company-wide implementation plan and addressing additional resource needs. E"

    Mahesh L. - "Preparing for a significant security compliance change can be overwhelming. The most efficient way to achieve GDPR compliance is through interdepartmental collaboration and the use of technology solutions that automate and validate business needs such as policy compliance, data security and required reporting. As the deadline looms, most organizations should already have started assessing the business impact, devising a company-wide implementation plan and addressing additional resource needs. E"See full answer

    Technical Program Manager
    Program Sense
    +2 more
  • Google logoAsked at Google 

    "Assumption: This restaurant space already exists in Business campus. Hence assuming that necessary electrical, security and plumbing works are already completed. I will use the following approach Discovery: Understand the number of employees, their demographic profile (age/location/gender), food preferences, rush hours, and preferred mode of payment etc. This information can be gathered through an online survey. Planning: Finalize the staffing, restaurant layout, develop food catalog/"

    Saket S. - "Assumption: This restaurant space already exists in Business campus. Hence assuming that necessary electrical, security and plumbing works are already completed. I will use the following approach Discovery: Understand the number of employees, their demographic profile (age/location/gender), food preferences, rush hours, and preferred mode of payment etc. This information can be gathered through an online survey. Planning: Finalize the staffing, restaurant layout, develop food catalog/"See full answer

    Program Sense
    Behavioral
    +1 more
Showing 3061-3080 of 3949