Technical Interview Questions

Review this list of 328 technical interview questions and answers verified by hiring managers and candidates.
  • Amazon logoAsked at Amazon 

    "Started at 1.48 Clarifying question: Are we interested in a particular lens for this problem? Looking back in history to understand what significant changes did fast internet made in the world: -> Fast Internet - More consumption -> Fast Internet - More Adoption -> Fast Internet - Cheap Internet Let's try to see what kind of things will change in each of these categories. Let me look at it from a lens of an end user (internet consumer uses the internet for work and maintaining their socia"

    Anubhav A. - "Started at 1.48 Clarifying question: Are we interested in a particular lens for this problem? Looking back in history to understand what significant changes did fast internet made in the world: -> Fast Internet - More consumption -> Fast Internet - More Adoption -> Fast Internet - Cheap Internet Let's try to see what kind of things will change in each of these categories. Let me look at it from a lens of an end user (internet consumer uses the internet for work and maintaining their socia"See full answer

    Product Manager
    Technical
    +1 more
  • Peloton logoAsked at Peloton 

    "Determine the requirements Perform basic checks on the frontend before submitting to the server Length Check for invalid or required characters Client-side validation messaging Perform more advanced checks on the server if required Does the password include the user's name, etc Handle server-side validation messaging"

    Casey C. - "Determine the requirements Perform basic checks on the frontend before submitting to the server Length Check for invalid or required characters Client-side validation messaging Perform more advanced checks on the server if required Does the password include the user's name, etc Handle server-side validation messaging"See full answer

    Technical
    Data Structures & Algorithms
    +1 more
  • "I will compromise on the statistical parameters up to some extent (significance value and test power) and complete the test."

    Naga M. - "I will compromise on the statistical parameters up to some extent (significance value and test power) and complete the test."See full answer

    Product Manager
    Technical
  • Apple logoAsked at Apple 

    "A full stack developer could be summarized as the person who both writes the APIs and consumes the APIs. They are familiar with Databases/Data-layer services, middle-layer/application services and business logic, and finally familiar with the consumers whether front-end applications/UIs or other systems. They can understand the trade-offs up and down the stack, where to adjust along the service-call-path. Ideally they are comfortable programming both async calls (front end javascript promises, e"

    Luke P. - "A full stack developer could be summarized as the person who both writes the APIs and consumes the APIs. They are familiar with Databases/Data-layer services, middle-layer/application services and business logic, and finally familiar with the consumers whether front-end applications/UIs or other systems. They can understand the trade-offs up and down the stack, where to adjust along the service-call-path. Ideally they are comfortable programming both async calls (front end javascript promises, e"See full answer

    Software Engineer
    Technical
  • "add two strings `"

    Jonathan michael J. - "add two strings `"See full answer

    Technical
    Data Structures & Algorithms
    +1 more
  • 🧠 Want an expert answer to a question? Saving questions lets us know what content to make next.

  • "This is phased approach and would consist below steps Initiation - Identify Business Goals and Drivers, Perform TCO Analysis, Compliance Assessment and then formulating strategy Prepare: Develop Require Skill sets and roles and Technical Cultural Training through CoE, Collaboration with partners and internal stakeholders Assess: Conduct workshops, understand Application Realms and identify the cloud candidates OKRs and App Roadmap Execute: Learn, Design, Implement, Document, Depl"

    Vineet S. - "This is phased approach and would consist below steps Initiation - Identify Business Goals and Drivers, Perform TCO Analysis, Compliance Assessment and then formulating strategy Prepare: Develop Require Skill sets and roles and Technical Cultural Training through CoE, Collaboration with partners and internal stakeholders Assess: Conduct workshops, understand Application Realms and identify the cloud candidates OKRs and App Roadmap Execute: Learn, Design, Implement, Document, Depl"See full answer

    Technical
    Behavioral
  • "Set clear goals- What do you want to achieve by learning this new technology? Are you trying to build a specific project, or are you just interested in learning more about it? Having clear goals will help you stay motivated and focused. Find a good learning resource There are many different ways to learn a new technology. You can take online courses, read books, or watch tutorials. Find a resource that fits your learning style and budget. Start with the basics- Don't try to"

    Praful B. - "Set clear goals- What do you want to achieve by learning this new technology? Are you trying to build a specific project, or are you just interested in learning more about it? Having clear goals will help you stay motivated and focused. Find a good learning resource There are many different ways to learn a new technology. You can take online courses, read books, or watch tutorials. Find a resource that fits your learning style and budget. Start with the basics- Don't try to"See full answer

    Technical Program Manager
    Technical
  • Google logoAsked at Google 
    Software Engineer
    Technical
    +2 more
  • Security
    Technical
    +1 more
  • "The single forward slash xpath is called the absolute xpath. The double forward slash is called the relative xpath. The double forward slash xpaths are the most preferrable ones as it directly points to the object by its name, id, label etc."

    Santhiya V. - "The single forward slash xpath is called the absolute xpath. The double forward slash is called the relative xpath. The double forward slash xpaths are the most preferrable ones as it directly points to the object by its name, id, label etc."See full answer

    Test Engineer
    Technical
  • Coinbase logoAsked at Coinbase 
    Product Manager
    Technical
    +1 more
  • Google logoAsked at Google 

    "Goal: Increase adoption of HPC capabilities offered by Google within enterprise customer context Vision: Accelerate high computing needs of enterprise, driven by innovation and definitive business outcomes Does this align with Google's vision - YES Trend Analysis: Technology: a. Introduce Intraday liquidity calculations b. Improve fraud detection using much large volume of data c. Faster value added risk calculations. d. Graph analysis for entity linking for large volume of customer a"

    Arvind R. - "Goal: Increase adoption of HPC capabilities offered by Google within enterprise customer context Vision: Accelerate high computing needs of enterprise, driven by innovation and definitive business outcomes Does this align with Google's vision - YES Trend Analysis: Technology: a. Introduce Intraday liquidity calculations b. Improve fraud detection using much large volume of data c. Faster value added risk calculations. d. Graph analysis for entity linking for large volume of customer a"See full answer

    Technical
    Product Strategy
  • "A Denial of Service (DoS) attack is a type of cyberattack in which the attacker seeks to render a machine or network resources unavailable to its intended users by temporarily or indefinitely disrupting services. This is typically achieved by overwhelming the target with a flood of illegitimate requests. Steps to mitigate this type of attack can be varied but are not limited to the following: Network or Perimeter Security: Firewalls, IDS/IPS, Traffic and Rate Limiting, Realtime monitoring and"

    Robert W. - "A Denial of Service (DoS) attack is a type of cyberattack in which the attacker seeks to render a machine or network resources unavailable to its intended users by temporarily or indefinitely disrupting services. This is typically achieved by overwhelming the target with a flood of illegitimate requests. Steps to mitigate this type of attack can be varied but are not limited to the following: Network or Perimeter Security: Firewalls, IDS/IPS, Traffic and Rate Limiting, Realtime monitoring and"See full answer

    Security
    Technical
  • "To determine what predictions to show, our systems look for common queries that match what someone starts to enter into the search box but also consider:"

    Abdurhman M. - "To determine what predictions to show, our systems look for common queries that match what someone starts to enter into the search box but also consider:"See full answer

    Technical
    System Design
  • "Video is collection of images and we can call them as moving pictures. Let us break down the important components of the video in comparison to photos and explain how they impact : Frame rate per second : It is at which a total number of frames are captured in a video while it was shot and played then later Resolution : What resolution video was shot and played on devices ( Both can be different) Let us talk a bit deep dive about Frame rate per second. Often , a video co"

    Kk - "Video is collection of images and we can call them as moving pictures. Let us break down the important components of the video in comparison to photos and explain how they impact : Frame rate per second : It is at which a total number of frames are captured in a video while it was shot and played then later Resolution : What resolution video was shot and played on devices ( Both can be different) Let us talk a bit deep dive about Frame rate per second. Often , a video co"See full answer

    Technical
  • Robinhood logoAsked at Robinhood 

    "This is a Technical question. It tests your ability to understand high level technical concepts. Even though your job won't have any coding involved, you'll still need to understand these concepts. Being able to cover all these topics with clarity communicates confidence in your interviewer. Unfortunately, there's no formula for technical questions, but some general tips are: Use analogies when you can Break your solution into clear, bite-size steps Don't be afraid to use examples to b"

    Exponent - "This is a Technical question. It tests your ability to understand high level technical concepts. Even though your job won't have any coding involved, you'll still need to understand these concepts. Being able to cover all these topics with clarity communicates confidence in your interviewer. Unfortunately, there's no formula for technical questions, but some general tips are: Use analogies when you can Break your solution into clear, bite-size steps Don't be afraid to use examples to b"See full answer

    Product Manager
    Technical
  • Technical
    Behavioral
  • Amazon logoAsked at Amazon 

    "Use dijkstra's algorithm using priority queue "

    Priyanka G. - "Use dijkstra's algorithm using priority queue "See full answer

    Software Engineer
    Technical
    +2 more
  • Flatiron Health logoAsked at Flatiron Health 
    Software Engineer
    Technical
    +2 more
Showing 161-180 of 328