"Here is my implementation:
select
marketing_channel,
AVG(purchasevalue) as avgpurchase_value
from
attribution
group by marketing_channel
order by avgpurchasevalue DESC
;
There is no need to copy and past the line of code for calculating the average into order by, just Alias is enough because going by the order of execution in sql, Always, order by is executed after executing select clause."
Maliki U. - "Here is my implementation:
select
marketing_channel,
AVG(purchasevalue) as avgpurchase_value
from
attribution
group by marketing_channel
order by avgpurchasevalue DESC
;
There is no need to copy and past the line of code for calculating the average into order by, just Alias is enough because going by the order of execution in sql, Always, order by is executed after executing select clause."See full answer
"SQL databases are relational, NoSQL databases are non-relational. SQL databases use structured query language and have a predefined schema. NoSQL databases have dynamic schemas for unstructured data. SQL databases are vertically scalable, while NoSQL databases are horizontally scalable."
Ali H. - "SQL databases are relational, NoSQL databases are non-relational. SQL databases use structured query language and have a predefined schema. NoSQL databases have dynamic schemas for unstructured data. SQL databases are vertically scalable, while NoSQL databases are horizontally scalable."See full answer
"WHAT IS IMPORTANT TO CUSTOMER
VALUE TO THE CUSTOMER
IMPACT ON THE CUSTOMER
PRIORITIZE BASED ON THAT
the sales team wants Specific changes to customer - Value NPV etc
Client services want automation - Customer priority
"
Anonymous Mastodon - "WHAT IS IMPORTANT TO CUSTOMER
VALUE TO THE CUSTOMER
IMPACT ON THE CUSTOMER
PRIORITIZE BASED ON THAT
the sales team wants Specific changes to customer - Value NPV etc
Client services want automation - Customer priority
"See full answer
"TCP connection is established between the client and server . 3 way handshake has to complete .
Session Key Exchange between the client and the server (Hello from Server contains the Public Key , DNS name and the https version to communicate with the server)
Using the Public Key Client Creates a Session Key and sent over the internet with encryption .
Using this session Key Connection is established .
Server Receives the Session key and Decrypts it using its private Key . The Sy"
Rashmi B. - "TCP connection is established between the client and server . 3 way handshake has to complete .
Session Key Exchange between the client and the server (Hello from Server contains the Public Key , DNS name and the https version to communicate with the server)
Using the Public Key Client Creates a Session Key and sent over the internet with encryption .
Using this session Key Connection is established .
Server Receives the Session key and Decrypts it using its private Key . The Sy"See full answer
"MTBF is Mean time between failures. This is measured to figure out how reliable a system is by what is the gap between 2 failures. (Total time elapsed- Down time)/No of failures"
Kavya C. - "MTBF is Mean time between failures. This is measured to figure out how reliable a system is by what is the gap between 2 failures. (Total time elapsed- Down time)/No of failures"See full answer
System Design
Technical
🧠 Want an expert answer to a question? Saving questions lets us know what content to make next.
"Sales and Delivery app:
Ask Clarifying questions:
What all parts of the user journey does this app play a role in?
All delivery notifications go through this app.
Tesla while completing sales does ask its customer to download this app.
Sales can be completely done through the app.
Sales person at Tesla could be reached through app.
App can be used to buy other peripherals for Tesla.
Success Metrics:
Revenue:
\# of car sales completed through the delivery app.
\# of peripheral"
Anonymous Caribou - "Sales and Delivery app:
Ask Clarifying questions:
What all parts of the user journey does this app play a role in?
All delivery notifications go through this app.
Tesla while completing sales does ask its customer to download this app.
Sales can be completely done through the app.
Sales person at Tesla could be reached through app.
App can be used to buy other peripherals for Tesla.
Success Metrics:
Revenue:
\# of car sales completed through the delivery app.
\# of peripheral"See full answer
"Described a bug I found on an app designed for a specific make of tablet.
In this sequence I described:
The app the bug was found in
The priority and severity of the bug
That it was a regression to an existing working piece of functionality
The hardware and the firmware on the device the bug occurred on
The steps that led to me finding the bug and how it manifested itself
Talked about how we debugged from the point of view of:
Code
Component
Deployed application
Comparison to"
Hans - "Described a bug I found on an app designed for a specific make of tablet.
In this sequence I described:
The app the bug was found in
The priority and severity of the bug
That it was a regression to an existing working piece of functionality
The hardware and the firmware on the device the bug occurred on
The steps that led to me finding the bug and how it manifested itself
Talked about how we debugged from the point of view of:
Code
Component
Deployed application
Comparison to"See full answer
"We have to work with the c-suite to understood the direct quartly outcomes or goals. This could be our epic and then we try to break that down into business value and complexity . This will allow us to prioritize whats next.
From there we can structure a mvp to cover maybe some of these areas to understand the estimation of this work. After the first couple weeks we can structure a roadmap and then define when"
Howard H. - "We have to work with the c-suite to understood the direct quartly outcomes or goals. This could be our epic and then we try to break that down into business value and complexity . This will allow us to prioritize whats next.
From there we can structure a mvp to cover maybe some of these areas to understand the estimation of this work. After the first couple weeks we can structure a roadmap and then define when"See full answer
"Problem Statement: The Fibonacci sequence is defined as F(n) = F(n-1) + F(n-2) with F(0) = 1 and F(1) = 1.
The solution is given in the problem statement itself.
If the value of n = 0, return 1.
If the value of n = 1, return 1.
Otherwise, return the sum of data at (n - 1) and (n - 2).
Explanation: The Fibonacci sequence is a series of numbers where each number is the sum of the two preceding ones, typically starting with 0 and 1.
Java Solution:
public static int fib(int n"
Rishi G. - "Problem Statement: The Fibonacci sequence is defined as F(n) = F(n-1) + F(n-2) with F(0) = 1 and F(1) = 1.
The solution is given in the problem statement itself.
If the value of n = 0, return 1.
If the value of n = 1, return 1.
Otherwise, return the sum of data at (n - 1) and (n - 2).
Explanation: The Fibonacci sequence is a series of numbers where each number is the sum of the two preceding ones, typically starting with 0 and 1.
Java Solution:
public static int fib(int n"See full answer
"A load balancer accepts requests from clients (e.g. web browsers on the Internet) and backend services (e.g. a web server). Load balancers are useful for replicating backend services onto multiple machines to meet increased demand.
The design of a load balancer should address the following questions:
What protocols should be supported?
IP allows computers to communicate using packets, similarly to how people send letters. IP packets are addressed using an IP address and port number.
"
Anonymous Hyena - "A load balancer accepts requests from clients (e.g. web browsers on the Internet) and backend services (e.g. a web server). Load balancers are useful for replicating backend services onto multiple machines to meet increased demand.
The design of a load balancer should address the following questions:
What protocols should be supported?
IP allows computers to communicate using packets, similarly to how people send letters. IP packets are addressed using an IP address and port number.
"See full answer
"First, I would like to ask some clarifying questions. Are we talking about the business metrics dashboard
or health metrics(like response time)? - it is up to you
Do I understand right that Netflix is a subscription-based video streaming service for watchers?
So I know that they create original content for Netflix, but it is out of the scope of this question. - right
My approach will be to:
Define the business goal from Netflix’s mission
Break down the actions taken by users at each stage of the"
Yulia D. - "First, I would like to ask some clarifying questions. Are we talking about the business metrics dashboard
or health metrics(like response time)? - it is up to you
Do I understand right that Netflix is a subscription-based video streaming service for watchers?
So I know that they create original content for Netflix, but it is out of the scope of this question. - right
My approach will be to:
Define the business goal from Netflix’s mission
Break down the actions taken by users at each stage of the"See full answer
"Company Mission: To Organize the World's Information
Clarify: What type of product are we looking to build? Software, Hardware?
-> Hardware
Makes sense since Google has a strong software stack including Android TV, which is a huge business by Firestick & Nvidia Shield, as well as Chinese based hardware implementations.
Is there any restrictions for this type of approach, or are we free to go around any way we'd like?
-> You're free to take any approach you'd like.
Google has a strong c"
jantheman88 - "Company Mission: To Organize the World's Information
Clarify: What type of product are we looking to build? Software, Hardware?
-> Hardware
Makes sense since Google has a strong software stack including Android TV, which is a huge business by Firestick & Nvidia Shield, as well as Chinese based hardware implementations.
Is there any restrictions for this type of approach, or are we free to go around any way we'd like?
-> You're free to take any approach you'd like.
Google has a strong c"See full answer
"Phishing Attack Scenario (High-Level)
Attack Type: Phishing
Goal: Steal user credentials
Attack Vector: Fake email pretending to be a bank
Target: End users
Impact: Account takeover, financial loss
Detection: Email filtering, user reports
Prevention:
User awareness training
Multi-factor authentication
Email security gateways"
Dileep D. - "Phishing Attack Scenario (High-Level)
Attack Type: Phishing
Goal: Steal user credentials
Attack Vector: Fake email pretending to be a bank
Target: End users
Impact: Account takeover, financial loss
Detection: Email filtering, user reports
Prevention:
User awareness training
Multi-factor authentication
Email security gateways"See full answer
"The goal is to determine which shows get promoted to the home screen i.e the screen the user sees after launching Netflix. There are two ways to promote shows today;
Editorially - the editorial team selects the categories and shows to be shown to the users
Algorithmically - based on the historical views and contextual information such as location, time of the year, age, etc the recommendation algorithm determines a list of shows to show on the screen.
The higher level goal for Netflix is o"
Ankit J. - "The goal is to determine which shows get promoted to the home screen i.e the screen the user sees after launching Netflix. There are two ways to promote shows today;
Editorially - the editorial team selects the categories and shows to be shown to the users
Algorithmically - based on the historical views and contextual information such as location, time of the year, age, etc the recommendation algorithm determines a list of shows to show on the screen.
The higher level goal for Netflix is o"See full answer
"Clarifying questions:
How to define “price” in this interview question? Price is defined as the market value of a crypto asset (bitcoin, Ethereum, tether, BNB etc.).
Due to the characteristic of crypto assets which is time-sensitive, is this designed for a particular period of time? 1H, 1D, 1W, 1M, 1Y? No
Do we know the target customer segment given geographic location or demographic? Not specific.
Is it designed across devices? Mobile app.
Assumptions:
There are 03 cu"
Anna H. - "Clarifying questions:
How to define “price” in this interview question? Price is defined as the market value of a crypto asset (bitcoin, Ethereum, tether, BNB etc.).
Due to the characteristic of crypto assets which is time-sensitive, is this designed for a particular period of time? 1H, 1D, 1W, 1M, 1Y? No
Do we know the target customer segment given geographic location or demographic? Not specific.
Is it designed across devices? Mobile app.
Assumptions:
There are 03 cu"See full answer