Autumn  Blick

Autumn Blick


Amazon Interview Experience for SDE Internship | AmazeWoW 2020

**Round 1 (Online Test): **Online test was conducted on Mettl platform. The duration was for 1hr 30 min. It was webcam proctored and consisted of 28 MCQs and 2 coding questions. MCQs were based on data structures, predict output, C++, and algorithms.

**Round 2: **The interview started with “tell me about yourself”. After that, he asked coding questions.

  1. Find the longest substring containing distinct characters.
  2. Ex:
Input: abbabcdd
Output: 4

#internship #interview experiences #amazon #marketing

What is GEEK

Buddha Community

Amazon Interview Experience for SDE Internship | AmazeWoW 2020
Autumn  Blick

Autumn Blick


Amazon Interview Experience for SDE Internship | AmazeWoW 2020

**Round 1 (Online Test): **Online test was conducted on Mettl platform. The duration was for 1hr 30 min. It was webcam proctored and consisted of 28 MCQs and 2 coding questions. MCQs were based on data structures, predict output, C++, and algorithms.

**Round 2: **The interview started with “tell me about yourself”. After that, he asked coding questions.

  1. Find the longest substring containing distinct characters.
  2. Ex:
Input: abbabcdd
Output: 4

#internship #interview experiences #amazon #marketing

Paolo  Hudson

Paolo Hudson


Amazon Interview Experience for FTE/6 months SDE-1 Internship

I applied for Amazon SDE-1 Internship through the AmazeWow program only for Women.

Online Test Round: It was a quite easy round. It consists of around 28 MCQs on the basic concepts of Data structure and algorithms, C/C++ outputs, Time, and Space complexity.

  1. How many push and pop operations for below operations will be required if we implement a queue using stack?
push (5), push (7), push (2), pop (), push (3),
pop (), pop (), push (6), pop (), pop ()

In this question, 4 options were given stating no of push and pop operations. The trick was when we implement a queue using stack, we will require 2 stacks and then count no. of push and pop operations.

Second Round: This round consisted of 2 coding questions which were quite easy.

  1. Given a string of type a+b=c where any one of them is unknown, we have to find its value.


 Input: x+5=7 Output: x=2

The only challenge was to consider each case and convert string to an integer.

#internship #interview experiences #amazon #marketing #amazon web services #aws

Autumn  Blick

Autumn Blick


Amazon Interview Experience for FTE SDE Internship (AmazeWoW)

AmazeWoW is a development initiative with internship and FTE SDE (Full-time Software Development Engineer) opportunities for Amazon in India, focused on bringing in top talent from engineering institutes. AmazeWoW aims at building gender balance at the entry-level for the SDE role so that with Amazon’s talent nurturing environment, the future leadership pipeline of the Amazon technology team is more diverse.

**Online Test: **There were 4 sections in the online test, code debug, coding test (two questions), Work Styles Assessment, and logical ability.

Coding Questions :

  1. Longest Palindromic Substring: Standard DP question.
  2. Find the most frequently occurring word in a sentence that is not in a given list of banned words: Divide the sentence into a stream of words, then use a hashmap to keep the count of the number of occurrences of each word that is not in the list of banned words and print the words from the hashmap with the maximum count.

#internship #interview experiences #amazon #marketing

Mikel  Okuneva

Mikel Okuneva


Amazon Interview Experience for SDE-1 | Amazon-WOW 2020

Amazon has a special program called AmazonWOW for women. It is to promote women in technology. It is a very good opportunity for women as they have to only compete with other females, not with males. The online application came in April. The program consists of a two-month internship for prefinal year student and fulltime plus Internship for final year student.

It consisted of a total 4 rounds, first was an online coding contest and then 3 telephonic interviews.

**Online test : **

The first round was an online coding round. It consisted of 2 coding questions and 28 MCQ. We had 1.2 hrs. The coding questions were quite simple but MCQs were very difficult. I would like to say that luck matters a lot in cracking online coding round.

1. First question: Find the longest common subsequence between two string. It is standard Dynamic programming question but the constraints were not very high so I solved it using recursion.

**2. Second question: **I did not find the exact question on any platform but it was very simple. You are given a string consisting of lowercase English alphabets, return the internet resource address of the string.

Internet resource address of a string is defined as


can be either http or ftp.

is a string consisting of lower case English alphabtes.

is a non mepty string of lower case English alphabtes.

Ex : httpsunrux ->

For MCQs, you must have a strong grip on OOP and c++ language.:

**Round 1: **

For this round, I was given an amazon chime link and live code editor link in which I had to code. The interviewer started by asking me my introduction and then he gave his introduction. In my introduction, I told him about my passion for competitive coding, writing and reading.

Then Immediately we moved to coding questions. He told me that I have only 45 minutes to answer so I have to come up with the best approach possible.

1. First Question: Find x ^ y mod z. I gave him the O(log(y)) approach. I covered all the edge cases when x will be zero or negative when y will be zero or negative. When y will be negative, he told me to return an error to the user. I coded properly using indentation and suitable variable and function names. I used int to store the variable but when the value is very high I should use long long int. I missed this case. He then moved to the second question.

2. Second Question:  Given a set of dependencies I have to find one of the suitable ordering of the dependencies. I told him I will use topological sort for this. He told me to explain my approach and then I coded it. But while coding I missed an edge case when there will cycle in the dependency. He told me to correct my code. I corrected my code by checking if there is a cycle present in the dependency.

3. Third Question:  For this question, I gave him two-approaches, first one was linearly counting the no of x and second was using a modified binary search. He did not ask me to code this question.

The best part was that I had already solved all these questions before so I did not get nervous there. In the end, I asked him where I can improve, He told me to check code before finally submitting to the interviewer.

After 12 days the result of this round was declared.

**Round 2: **

For this round also, I was provided with the Amazon chime link and live code link. The interviewer asked me two questions.

1.** First Question:**  Add all greater values to every node in a given BST. I gave him O(n ) time complexity solution. Initially, I had written the wrong code but my approach was right. He dry ran my code, pointed out the mistake that I made in code and told me to correct the code. I corrected the code and he was satisfied by my approach. I told him about the time complexity ie O(n). I told him if we consider internal stack then space complexity will o(n) because in the worst case the height of BST can be O(n) if it is skewed BST.

**2. Second Question: ** But in this question, He gave me three conditions.

1. You can traverse the data structure in only one direction.

2. You cannot use extra space ie in-place algorithm.

3. You can use any data structure of your choice.

My first approach was to use an array data structure. I told him that in first traversal I will find the count of negative numbers and then I will start filling my result array. But he said I cannot use extra space.

My second approach was to use a binary search tree and the result will be inorder traversal of the tree. But he told me that I have to return the data structure which I am using.

Then He asked me what are the data structure that I know. I told him I know heap, queue, stack, singly-Linked list and doubly linked list. Then suddenly doubly-linkedList came to my mind and I told him I will use doubly LinkedList. He told me that in doubly-linked you can traverse in both directions. Then I told him that will use a singly linked list. He told me to write code and dry ran my code. He was satisfied with my code.

My second interviewer was a very helpful and knowledgeable person. In the end, he said “it was nice to interview you. ”

After 11 days the second-round result was declared.

**Round 3: **

For this round also, I was provided with the amazon chime link and live code link. The interviewer was a very nice and chill person. He tried to make me comfortable. He introduced himself and then I gave my brief introduction. In this round, I was asked two questions. One was a coding question and the other was OS( operating System ) question.

1. First question:  If we have a well-optimised code, On what factors the maximum no of threads in a process depends?

We had around half an hour discussion on this topic. I told him how threads are used in the client-server application, use of threads in a text editor which simultaneously performs writing, auto-correction and suggestions. He asked me if a site has 1 million clients, then 1 million threads will be created, I told him about the use of multiple servers. I told him the no. thread depends upon the resources of the machine. I told him it will depend upon the memory of the computer. Then He wanted to know, which memory affect it, primary memory or secondary memory. I told primary memory will affect the no of threads as all the processes/ threads reside in the primary memory. I was thinking of other factors also but then he moved to coding question.

After this, we moved to coding question.

**2. Second Question: **  Find the first missing positive number in an array.

My first approach was to use hashing, the time complexity of this approach was O(n ) and the space complexity was O(n). He told me to do it in constant space. I suggested to him that whenever I will encounter an element and if it is smaller than n, then I will make element negative at that index. Then I will traverse the whole array again and if I find any index whose value is non-negative, its means that element is not present and it is the first missing positive no. If no such no. is found then the answer will be n ( size of the array ) + 1. But this approach will not work for an array containing negative and repetitive no. So I improved my code to handle the negative and repetitive no.

He was very much satisfied with my approach. In the end, he asked me to ask a question to him. I asked him how can I improve more. He seemed to be very much impressed by me. He told me that I am very sharp in handling all the edges cases and I am very focussed.


**Some important tips: **

1. Always believe in your self.

2. Communication skills matter a lot in the interview.

3. Luck is an important factor, you can not ignore it.

4. Always be positive in life. No matter how difficult the situation do not give up.

5. Practise and patient is the key.

#interview experiences #amazon #marketing #interview

Brain  Crist

Brain Crist


Citrix Bugs Allow Unauthenticated Code Injection, Data Theft

Multiple vulnerabilities in the Citrix Application Delivery Controller (ADC) and Gateway would allow code injection, information disclosure and denial of service, the networking vendor announced Tuesday. Four of the bugs are exploitable by an unauthenticated, remote attacker.

The Citrix products (formerly known as NetScaler ADC and Gateway) are used for application-aware traffic management and secure remote access, respectively, and are installed in at least 80,000 companies in 158 countries, according to a December assessment from Positive Technologies.

Other flaws announced Tuesday also affect Citrix SD-WAN WANOP appliances, models 4000-WO, 4100-WO, 5000-WO and 5100-WO.

Attacks on the management interface of the products could result in system compromise by an unauthenticated user on the management network; or system compromise through cross-site scripting (XSS). Attackers could also create a download link for the device which, if downloaded and then executed by an unauthenticated user on the management network, could result in the compromise of a local computer.

“Customers who have configured their systems in accordance with Citrix recommendations [i.e., to have this interface separated from the network and protected by a firewall] have significantly reduced their risk from attacks to the management interface,” according to the vendor.

Threat actors could also mount attacks on Virtual IPs (VIPs). VIPs, among other things, are used to provide users with a unique IP address for communicating with network resources for applications that do not allow multiple connections or users from the same IP address.

The VIP attacks include denial of service against either the Gateway or Authentication virtual servers by an unauthenticated user; or remote port scanning of the internal network by an authenticated Citrix Gateway user.

“Attackers can only discern whether a TLS connection is possible with the port and cannot communicate further with the end devices,” according to the critical Citrix advisory. “Customers who have not enabled either the Gateway or Authentication virtual servers are not at risk from attacks that are applicable to those servers. Other virtual servers e.g. load balancing and content switching virtual servers are not affected by these issues.”

A final vulnerability has been found in Citrix Gateway Plug-in for Linux that would allow a local logged-on user of a Linux system with that plug-in installed to elevate their privileges to an administrator account on that computer, the company said.

#vulnerabilities #adc #citrix #code injection #critical advisory #cve-2020-8187 #cve-2020-8190 #cve-2020-8191 #cve-2020-8193 #cve-2020-8194 #cve-2020-8195 #cve-2020-8196 #cve-2020-8197 #cve-2020-8198 #cve-2020-8199 #denial of service #gateway #information disclosure #patches #security advisory #security bugs