Interview Questions

Review this list of 4,366 interview questions and answers verified by hiring managers and candidates.
  • Netflix logoAsked at Netflix 
    Video answer for 'Design an accessible alternative to airport lounges.'

    "Design an accessible alternative to airport lounges. Clarifying questions: Is this global international airports or only US focused? - US to start Goal: To provide travelers a more accessible and comfortable travel experience. Users: Disabled / elderly travelers – need physical accessibility and sensory-friendly environments Families with kids Economy travelers – can’t access lounges but still want rest, Wi-Fi, and clean spaces. Business travelers – want work pods, reliabl"

    Eshaa D. - "Design an accessible alternative to airport lounges. Clarifying questions: Is this global international airports or only US focused? - US to start Goal: To provide travelers a more accessible and comfortable travel experience. Users: Disabled / elderly travelers – need physical accessibility and sensory-friendly environments Families with kids Economy travelers – can’t access lounges but still want rest, Wi-Fi, and clean spaces. Business travelers – want work pods, reliabl"See full answer

    Product Designer
    Product Design
  • "Let's split the experience in four parts: Time between order is placed and order is waiting to be prepped by the shopper. Time between order is prepped by the shopper and ready to be picked by the driver. Time when it's out for delivery. Post delivery experience. Now lets think through what can do wrong? How do we define wrong? A wrong would be anything where a customer has a negative experience. Let's dive into the when things could potentially go wrong. **order is placed and"

    Pree M. - "Let's split the experience in four parts: Time between order is placed and order is waiting to be prepped by the shopper. Time between order is prepped by the shopper and ready to be picked by the driver. Time when it's out for delivery. Post delivery experience. Now lets think through what can do wrong? How do we define wrong? A wrong would be anything where a customer has a negative experience. Let's dive into the when things could potentially go wrong. **order is placed and"See full answer

    Product Manager
    Analytical
    +2 more
  • Apple logoAsked at Apple 

    "Situation - A time when I worked well on a team was while I was working with the larger team at Blade to do the redesign before their IPO. Essentially, we had a month to launch a redesign (both visual and UX) of the entire project Task - I was tasked to direct all design efforts and strategy for the mobile and web experience on blade - being a lead in the trifecta group. Action - Through effective teamwork, we all led strategy and championed our areas of product, design and engineering. As a"

    Ben G. - "Situation - A time when I worked well on a team was while I was working with the larger team at Blade to do the redesign before their IPO. Essentially, we had a month to launch a redesign (both visual and UX) of the entire project Task - I was tasked to direct all design efforts and strategy for the mobile and web experience on blade - being a lead in the trifecta group. Action - Through effective teamwork, we all led strategy and championed our areas of product, design and engineering. As a"See full answer

    Product Designer
    Behavioral
    +1 more
  • OpenAI logoAsked at OpenAI 
    Product Manager
    Behavioral
    +5 more
  • 🧠 Want an expert answer to a question? Saving questions lets us know what content to make next.

  • Meta (Facebook) logoAsked at Meta (Facebook) 
    +1

    " import lombok.*; import lombok.extern.slf4j.Slf4j; import org.springframework.boot.CommandLineRunner; import org.springframework.boot.SpringApplication; import org.springframework.boot.autoconfigure.SpringBootApplication; import org.springframework.stereotype.Component; import org.springframework.stereotype.Repository; import org.springframework.stereotype.Service; import java.util.*; import java.util.concurrent.ConcurrentHashMap; import java.util.concurrent.ConcurrentMap; import java."

    Yash G. - " import lombok.*; import lombok.extern.slf4j.Slf4j; import org.springframework.boot.CommandLineRunner; import org.springframework.boot.SpringApplication; import org.springframework.boot.autoconfigure.SpringBootApplication; import org.springframework.stereotype.Component; import org.springframework.stereotype.Repository; import org.springframework.stereotype.Service; import java.util.*; import java.util.concurrent.ConcurrentHashMap; import java.util.concurrent.ConcurrentMap; import java."See full answer

    Engineering Manager
    System Design
    +2 more
  • Technical Program Manager
    Program Sense
  • Google logoAsked at Google 

    "Assumptions: User type: school children living in the USA. Form factor: mobile app on iOS and Android Problem statement School children all across the country visit museums 2-4 times in a year. The museums have info on the contents and layout but that is static. Key value proposition of product is to guide users through the museum Internal company assessment Let's assume the interview is at Google. Google's mission is to organise the world's information so this problem aligns with"

    Rahul J. - "Assumptions: User type: school children living in the USA. Form factor: mobile app on iOS and Android Problem statement School children all across the country visit museums 2-4 times in a year. The museums have info on the contents and layout but that is static. Key value proposition of product is to guide users through the museum Internal company assessment Let's assume the interview is at Google. Google's mission is to organise the world's information so this problem aligns with"See full answer

    Product Manager
    Product Design
  • Anthropic logoAsked at Anthropic 
    Software Engineer
    Behavioral
  • +1

    "It depends on how computers are distributed. Are they located within same network (behind same switch or router) or distributed across globally? Also, it depends upon if there are any security related encryption or decryption algorithms being executed. Similarly, there are so many factors involved in it. However, if a system is highly responsive then this time might be less than 1 second. For example, any google search responds in less than 1 sec. It is an interesting question and I am eager t"

    Rashmi T. - "It depends on how computers are distributed. Are they located within same network (behind same switch or router) or distributed across globally? Also, it depends upon if there are any security related encryption or decryption algorithms being executed. Similarly, there are so many factors involved in it. However, if a system is highly responsive then this time might be less than 1 second. For example, any google search responds in less than 1 sec. It is an interesting question and I am eager t"See full answer

    System Design
    Technical
  • LinkedIn logoAsked at LinkedIn 
    Product Manager
    Artificial Intelligence
  • Meta (Facebook) logoAsked at Meta (Facebook) 

    "Understand gaps team by interviewing on 1:1, reading past performance reviews and talking to old managers/cross functional Identify Goals and use the SMART framework to set those goals (Specific, Measurable, Attainable, relevant, time related) Share with team and make sure they understand them. Clarify questions if needed. Explain WHY these goals matter. Tie to company goals/mission/culture. Put together an action plan TOGETHER- give often feedback: "pinches no punches"

    Chantal C. - "Understand gaps team by interviewing on 1:1, reading past performance reviews and talking to old managers/cross functional Identify Goals and use the SMART framework to set those goals (Specific, Measurable, Attainable, relevant, time related) Share with team and make sure they understand them. Clarify questions if needed. Explain WHY these goals matter. Tie to company goals/mission/culture. Put together an action plan TOGETHER- give often feedback: "pinches no punches"See full answer

    Engineering Manager
    Behavioral
    +1 more
  • "def encode(root): if not root: return [] def dfs(node): if not node: return res.append(node.val) res.append(len(node,children)) for child_node in node.children: dfs(child_node) res = [] dfs(root) return res def decode(arr): if not arr: return None n = len(arr) i = 0 def dfs(val, children_count): if children_count == 0: return Node(val) cur_node = Node(val) cur_node.children = [] for j in range(children_count): nonlocal i i += 2 cur_node.children.append(dfs(arr[i], arr[i"

    Ying T. - "def encode(root): if not root: return [] def dfs(node): if not node: return res.append(node.val) res.append(len(node,children)) for child_node in node.children: dfs(child_node) res = [] dfs(root) return res def decode(arr): if not arr: return None n = len(arr) i = 0 def dfs(val, children_count): if children_count == 0: return Node(val) cur_node = Node(val) cur_node.children = [] for j in range(children_count): nonlocal i i += 2 cur_node.children.append(dfs(arr[i], arr[i"See full answer

    Software Engineer
    Coding
  • Adobe logoAsked at Adobe 
    Video answer for 'Given the root of a binary tree of integers, return the maximum path sum.'

    "\# Definition for a binary tree node. class TreeNode: def init(self, val=0, left=None, right=None): self.val = val self.left = left self.right = right class Solution: def maxPathSum(self, root: TreeNode) -> int: self.max_sum = float('-inf')"

    Jerry O. - "\# Definition for a binary tree node. class TreeNode: def init(self, val=0, left=None, right=None): self.val = val self.left = left self.right = right class Solution: def maxPathSum(self, root: TreeNode) -> int: self.max_sum = float('-inf')"See full answer

    Software Engineer
    Data Structures & Algorithms
    +4 more
  • Oracle logoAsked at Oracle 
    Product Manager
    Artificial Intelligence
    +1 more
  • "Goals (Prod & Safeway) User Groups: Shoppers: College Students Professionals Families Elderly New customers (not already in the store) I selected elderly due to trends on the aging population being a significant population in the next decade and it being a group we have the most opportunity as Safeway to support. Pain Points **Most likely these customers are buying things in person or someone is purchasing items for them and gettin"

    Anonymous Minnow - "Goals (Prod & Safeway) User Groups: Shoppers: College Students Professionals Families Elderly New customers (not already in the store) I selected elderly due to trends on the aging population being a significant population in the next decade and it being a group we have the most opportunity as Safeway to support. Pain Points **Most likely these customers are buying things in person or someone is purchasing items for them and gettin"See full answer

    Product Manager
    Product Design
  • Adobe logoAsked at Adobe 
    +7

    "def find_primes(n): lst=[] for i in range(2,n+1): is_prime=1 for j in range(2,int(i**0.5)+1): if i%j==0: is_prime=0 break if is_prime: lst.append(i) return lst "

    Anonymous Raccoon - "def find_primes(n): lst=[] for i in range(2,n+1): is_prime=1 for j in range(2,int(i**0.5)+1): if i%j==0: is_prime=0 break if is_prime: lst.append(i) return lst "See full answer

    Data Engineer
    Data Structures & Algorithms
    +4 more
  • "Write a function which Caesar ciphers all the strings so that the first character is "a". Use ascii code points and the modulo operator to do this. Use this function to create a hashmap between each string and the CC-a string. Then go through each key:value pair in the hashmap, and use the CC-a ciphered value as the key in a new defaultdict(list), adding the original string to the value field in the output."

    Michael B. - "Write a function which Caesar ciphers all the strings so that the first character is "a". Use ascii code points and the modulo operator to do this. Use this function to create a hashmap between each string and the CC-a string. Then go through each key:value pair in the hashmap, and use the CC-a ciphered value as the key in a new defaultdict(list), adding the original string to the value field in the output."See full answer

    Machine Learning Engineer
    Data Structures & Algorithms
    +2 more
  • Google logoAsked at Google 
    +2

    "Asked clarifying questions to know if this was a program already in existence, how long the problem had been, causes and how the problem was brought to attention. Using that information, went through a framework (provided generally below): Making sure to review documentation/existing contracts/vendors/plans. Review budget and timeline for the program. Review resources available. Review the data (or gather) and the scope of the project (city center, suburbs, few blocks, whole city, etc). Set mee"

    Anthony F. - "Asked clarifying questions to know if this was a program already in existence, how long the problem had been, causes and how the problem was brought to attention. Using that information, went through a framework (provided generally below): Making sure to review documentation/existing contracts/vendors/plans. Review budget and timeline for the program. Review resources available. Review the data (or gather) and the scope of the project (city center, suburbs, few blocks, whole city, etc). Set mee"See full answer

    Technical Program Manager
    Analytical
    +2 more
  • Google logoAsked at Google 

    "Preparing for a significant security compliance change can be overwhelming. The most efficient way to achieve GDPR compliance is through interdepartmental collaboration and the use of technology solutions that automate and validate business needs such as policy compliance, data security and required reporting. As the deadline looms, most organizations should already have started assessing the business impact, devising a company-wide implementation plan and addressing additional resource needs. E"

    Mahesh L. - "Preparing for a significant security compliance change can be overwhelming. The most efficient way to achieve GDPR compliance is through interdepartmental collaboration and the use of technology solutions that automate and validate business needs such as policy compliance, data security and required reporting. As the deadline looms, most organizations should already have started assessing the business impact, devising a company-wide implementation plan and addressing additional resource needs. E"See full answer

    Technical Program Manager
    Behavioral
    +2 more
Showing 1281-1300 of 4366