Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
M-groups_course2.doc
Скачиваний:
0
Добавлен:
01.07.2025
Размер:
39.11 Mб
Скачать

1.4. Information Technology (it) Interview tipical Questions

Questions About You and Your Technical Skills

  • What interests you about this position?

  • What are your technical certifications?

  • What do you do to maintain your technical certifications?

  • What automated-build tools or processes have you used?

  • What development tools have you used?

  • What languages have you programmed in?

  • What source control tools have you used?

  • What technical websites do you follow?

  • Describe a time when you were able to improve upon the design that was originally suggested.

  • Describe the most innovative change that you have initiated and what you did to implement this change.

  • Given this problem (problem is based upon job requirements), what solution would you provide. Explain your thought process.

  • How do you handle multiple deadlines?

  • How do you keep current on this industry?

  • How do you troubleshoot IT issues?

  • Tell me about the most recent project you worked on. What were your responsibilities?

  • Tell me about the project you are most proud of, and what your contribution was.

  • Give an example of where you have applied your technical knowledge in a practical way.

  • What is the biggest IT challenge you have faced and how did you handle it?

  • You are working at a client site and the CTO of the client company has asked if she can see you. The CTO wants to know how much it would cost to bring in five more people on your team. She gives you very vague requirements of the job she is looking for you to do. What would you do?

  • You have been asked to research a new business tool. You have come across two solutions. One is an on-premises solution, the other is cloud-based. Assuming they are functionally equivalent, why would you recommend one over the other?

  • You have submitted a piece of code that has broken the client's website in production. You have found this bug while you were testing, and nobody else knows about it. What is your next move?

  • You have learned that a business unit is managing a major component of the business using Excel spreadsheets and Access databases. What risks does this present, and what would you recommend be done to mitigate those risks?

Questions About the Job and the Company

  • Describe the skills you have that qualify you for this job.

  • Do you prefer to manage people or ideas?

  • Describe your production deployment process.

  • From the description of this position what do you think you will be doing on a day-to-day basis?

  • Have you worked with software vendors? How do you handle vendor relations?

  • How important is it to work directly with your business users?

  • How would you rate your key competencies for this job?

  • If hired, is there anything you would change about this IT team?

  • What challenges do you think you might expect in this job if you were hired?

  • What companies do you see as the biggest competitors to this company?

Technical Questions

  • Compare and contrast REST and SOAP web services.

  • Define authentication and authorization and the tools that are used to support them in enterprise deployments.

  • Describe the difference between optimistic and pessimistic locking.

  • Describe the elements of an in tier architecture and their appropriate use.

  • Have you used Eclipse?

  • Have you used Visual Studio?

  • How did you manage source control?

  • How much (what percentage) of your time do you spend unit testing?

  • How much reuse do you get out of the code that you develop, and how?

  • How would you describe the ideal working environment?

  • If you know you aren't going to make a project deadline what will you tell your manager and/or the client?

  • In databases, what is the difference between a delete statement and a truncate statement?

  • In network security, what is a honey pot, and why is it used?

  • What are the most important database performance metrics, and how do you monitor them?

  • What are transaction logs, and how are they used?

  • What did you do to ensure quality in your deliverables?

  • What do you consider documentation and why is it important?

  • What do you do to ensure you provide accurate project estimates?

  • What do you expect in the solution documents you are provided?

  • What elements are necessary for a successful team and why?

  • What have you done to ensure consistency across unit, quality, and production environments?

  • What is a cross site scripting attack, and how do you defend against it?

  • What is a SAN, and how is it used?

  • What is clustering, and describe its use.

  • What is ETL and when should it be used?

  • What is most important - quality or quantity?

  • What is structure?

  • What is the difference between OLAP and OLTP? When is each used?

http://datawarehouse4u.info/OLTP-vs-OLAP.html

  • What is the role of continuous integration systems in the automated-build process?

  • What is the role of SMNP?

  • http://en.wikipedia.org/wiki/Simple_Network_Management_Protocol

  • What is the role of the DMZ in network architecture? How do you enforce relational integrity in database design?

http://en.wikipedia.org/wiki/DMZ_%28computing%29

  • When is it appropriate to denormalize database design?

Exercise 1. Read the definitions to the given key-terms and analyze the context in which they are used.

Cloud engineer

specialist in cloud engineering, application of engineering disciplines to cloud computing. It brings a systematic approach to the high level concerns of commercialization, standardization, and governance of cloud computing applications.

IBM announced new cloud engineer vacancy to help businesses of all sizes take advantage of this increasingly-attractive computing model.

Quality Assurance (QA), System analyst or Tester

researches problems, plans solutions, recommends software and systems, at least at the functional level, and coordinates development to meet business or other requirements.

The main purpose of the systems analysis stage is to gather information about the existing system in order to determine the requirements for an enhanced system or a new system.

Security expert

protect client’s business reputation and classified company information in the event of data leakage or loss. By being pro-active in IT security solutions, help ensure businesses move forward, focusing on their primary business objectives, safe in the knowledge their business and IT is backed with trusted security advisers.

Our international team of security experts and developers work round-the-clock gathering information, evaluating new threats and designing new utilities for in-house and customer use.

IT trainer

may teach IT administrative support staff or an organization's non-technical business users how to operate, configure, and maintain new technology.

IT trainers must stay up to date with evolving technology.

Project manager

is an individual who is responsible for the planning, organization, resource management, and discipline pertaining to the successful completion of a specific project or objective.

Many organisations who assign individuals with little or no experience or training to a project manager role generally have a poor experience with project management.

CIO/CTO/director of IT

Chief Information Officer/ Chief Technology Officer or director of Informational Technology is a job title commonly given to the most senior executive in an enterprise responsible for the information technology and computer systems that support enterprise goals. Generally, the CIO reports to the chief executive officer, chief operations officer or chief financial officer. In military organizations, they report to the commanding officer.

The CIO manages the implementation of the useful technology to increase information accessibility and integrated systems management.

Help desk staff

are able to solve many help desk issues from another work location or their home office. While there is still a need for on-site support to effectively collaborate on some issues, remote support provides greater flexibility.

The help desk staff and supporting IT staff may not all work from the same location.

Specialized programmer

writes the programs computers use to perform their functions for certain circuit types only. The programmer follows the specifications given to him or her by a computer software engineer

Some specialized programmers can program JTAG compatible devices even when they not yet entered the device list.

Pre-sales engineer

teach everyone from customers to Laserfiche employees how to maximize their knowledge by providing technical consulting about the product suite. Train. Strategize. We inform. Acquires detailed knowledge of the Laserfiche software product suite and integrations with partners in order to design and communicate solutions for customers’ business problems. Provides technical consulting and training to the Laserfiche sales force as well as prospective clients. Answers Presales and technical questions via e-mail, conference calls and web presentations. Designs and presents targeted solutions based on explicitly and implicitly stated requirements. Develops and implements frequent technical training sessions both locally and regionally. Travels to other locations to conduct Regional Training for our end-users. Travel requirements are flexible but every Presales Engineer travels at least a few times every year.

Cisco seeks a Pre-sales Engineer in Boston or Boxborough, Massachusetts to partner with our Enterprise Account Executives in a Pre-sales, technical role, showcasing Cisco product solutions, setting up demonstrations and explaining features and benefits to customers.

Technical writer

is a professional writer who engages in technical writing and produces technical documentation.

A good technical writer has the ability to create, assimilate, and convey technical material in a concise and effective manner.

Product evangelist

author of the particular informational technology

The IT author that developed that program registered the patent for it.

IT author

a person who builds a critical mass of support for a given technology, and then establishes it as a technical standard in a market that is subject to network effects. An evangelist promotes the use of a particular product or technology through talks, articles, blogging, user demonstrations, recorded demonstrations, or the creation of sample projects. The word evangelism is taken from the context of religious evangelism due to the similarity of relaying information about a particular set of beliefs with the intention of converting the recipient.

The first so-identified product evangelist was Mike Boich, who promoted the Macintosh computer.

Career coach

people that offer a strategic service that people can use and employers can rely on when work performance, career transition, personal conduct in the workplace and/or culture fit becomes an issue.

Her career coach put her through a series of exercises every two weeks for three months, not only to assess her skills but also to clarify her values and goals.

Dissing

people or friends

He's gone out with his peeps.

Peeps

speaking or behaving rudely to someone or showing them no respect

I don’t like her dissing my friends!

Teammate

a player on the same team

Our team has good chances to win because of the capable and friendly teammates.

Exercise 2. Match the words with correct definitions:

  • Cloud engineer

  • specialist in cloud engineering

  • Quality Assurance (QA), System analyst or Tester

  • researches problems, plans solutions, recommends software and systems, at least at the functional level, and coordinates development to meet business or other requirements.

  • Security expert

  • protect client’s business reputation and classified company information in the event of data leakage or loss

  • IT trainer

  • teach IT administrative support staff or an organization's non-technical business users how to operate, configure, and maintain new technology.

  • Project manager

  • an individual who is responsible for the planning, organization, resource management, and discipline pertaining to the successful completion of a specific project or objective

  • CIO/CTO/director of IT

  • is a job title commonly given to the person in an enterprise responsible for the information technology and computer systems that support enterprise goals.

  • Help desk staff

  • able to solve many help desk issues from another work location or their home office

  • Specialized programmer

  • writes the programs computers use to perform their functions, for certain circuit types only.

  • Pre-sales engineer

  • teach everyone from customers to employees how to maximize their knowledge by providing technical consulting about the product suite. Train. Strategize.

  • Technical writer

  • is a professional writer who engages in technical writing and produces technical documentation.

  • Product evangelist

  • a person who builds a critical mass of support for a given technology, and then establishes it as a technical standard in a market that is subject to network effects.

  • IT author

  • author of the particular informational technology

  • Career coach

  • people that offer a strategic service that people can use and employers can rely on when work performance, career transition, personal conduct in the workplace and/or culture fit becomes an issue

  • Dissing

  • speaking disrespectfully to or criticize

  • Peeps

  • people

  • Teammate

  • a fellow member of a team

Exercise 3. Match the definitions with words:

  • specialist in cloud engineering

  • Cloud engineer

  • researches problems, plans solutions, recommends software and systems, at least at the functional level, and coordinates development to meet business or other requirements.

  • Quality Assurance (QA), System analyst or Tester

  • protect client’s business reputation and classified company information in the event of data leakage or loss

  • Security expert

  • teach IT administrative support staff or an organization's non-technical business users how to operate, configure, and maintain new technology.

  • IT trainer

  • an individual who is responsible for the planning, organization, resource management, and discipline pertaining to the successful completion of a specific project or objective

  • Project manager

  • is a job title commonly given to the person in an enterprise responsible for the information technology and computer systems that support enterprise goals.

  • CIO/CTO/director of IT

  • able to solve many help desk issues from another work location or their home office

  • Help desk staff

  • writes the programs computers use to perform their functions, for certain circuit types only.

  • Specialized programmer

  • teach everyone from customers to employees how to maximize their knowledge by providing technical consulting about the product suite. Train. Strategize.

  • Pre-sales engineer

  • is a professional writer who engages in technical writing and produces technical documentation.

  • Technical writer

  • a person who builds a critical mass of support for a given technology, and then establishes it as a technical standard in a market that is subject to network effects.

  • Product evangelist

  • author of the particular informational technology

  • IT author

  • people that offer a strategic service that people can use and employers can rely on when work performance, career transition, personal conduct in the workplace and/or culture fit becomes an issue

  • Career coach

  • speaking disrespectfully to or criticize

  • Dissing

  • people

  • Peeps

  • a fellow member of a team

  • Teammate

Exercise 4. Complete the following table:

IT JOB

Responsibilities

Tester

Developing or continued developing and maintenance of a software program.

Securty expert

Calculating salaries for each employee of health center.

Reception staff

Conceiving, developing, operating and maintaining cloud computing systems.

IT trainer

customer service, hands-on demonstration of IT products

Product evangelist

Writing technical blogs and articles

CTO director of IT

Exercise 5. Watch the video. http://on.aol.com/video/googles-hr-head-lazlo-bock-on-googles-hiring-process-517368592

GOOGLE'S HR HEAD LAZLO BOCK ON GOOGLE'S HIRING PROCESS

Answer the questions:

  1. Who is more likely to get a job with Google?

  2. Why is networking important in making hiring decisions?

Lesson Thirty-Two.

E-payment systems – mobile-banking - mobile payments

1.1. E-payment systems are an e-commerce business allowing payments and money transfers to be made through the Internet. Online money transfers serve as electronic alternatives to paying with traditional paper methods, such as checks and money orders.

PayPal is an acquirer, performing payment processing for online vendors, sites, and other commercial users, for which it charges a fee. It may also charge a fee for receiving money, proportional to the amount received.

Peter Thiel, the founder of PayPal, has stated that PayPal is not a bank because it does not engage in fractional-reserve banking

Other types of e-payments.

Digital currency, among its various names, is electronic money that acts as alternative currency.

Digital currency exchangers (DCEs, independent exchange providers or e-currency exchangers) are market makers which exchange fiat currency for electronic money, such as digital gold currency (DGC), and/or convert one type of digital currency (DC) into another, such as Liberty Reserve into Bitcoin. Exchangers apply a commission to transactions.

Cryptocurrencies, such as Bitcoin, Litecoin and PPCoin, are a form of digital currency which relies on cryptography, as well as proof-of-work schemes, in order to create, distribute and maintain the currency. Cryptocurrencies are usually peer-to-peer and decentralized.

Financial cryptography (FC) is the use of cryptography in applications in which financial loss could result from subversion of the message system.

Cryptographers think of the field as originating in the work of Dr David Chaum who invented the blinded signature. This special form of a cryptographic signature permitted a virtual coin to be signed without the signer seeing the actual coin, and permitted a form of digital token money that offered untraceability. This form is sometimes known as Digital currency.

A widely-used and previously-developed cryptographic mechanism is the Data Encryption Standard, which was used primarily for the protection of electronic funds transfers. However, it was the work of David Chaum that excited the cryptography community about the potential of encrypted messages as actual financial instruments.

Financial cryptography includes the mechanisms and algorithms necessary for the protection of financial transfers, in addition to the creation of new forms of money. Proof of work and various auction protocols fall under the umbrella of Financial Cryptography. Hashcash is being used to limit spam.

Financial cryptography is distinguished from traditional cryptography in that for most of recorded history, cryptography has been used almost entirely for military and diplomatic purposes.

As part of a business model, FC followed the guide of cryptography and only the simplest ideas were adopted. Account money systems protected by SSL such as PayPal and e-gold were relatively successful, but more innovative mechanisms, including blinded token money, were not.

State the following sentences as true or false:

1. Online money transfers have replaced traditional paper methods.

2. PayPal service isn’t free.

3. Digital currency has the form of e-money.

4. Digital currency exchangers convert one type of digital currency (DC) into another.

5. Dr David Chaum who invented the a cryptographic signature permitted a virtual coin to be signed without the signer seeing the actual coin.

Соседние файлы в предмете [НЕСОРТИРОВАННОЕ]