Screen C# candidates on real starter repos
55 short C# tasks, each shipping with a public test file and a language-specific runner. Candidates work in their own style; reviewers see how the code actually hangs together.

Access Badge
Manage badge factory settings. When an access badge is issued, it starts out unnamed.

Your team maintains an internal alert triage service. Each incoming alert carries five severity tags — tokens composed of a level indicator and a category code (e.g. 4S 5H 7C 8D JC). The ranking rules for these tag sets follow standard poker hand rankings.

In a user identity system, an alias cluster is a group of usernames that share exactly the same letters in a different arrangement. Two usernames belong to the same cluster if one can be formed by rearranging the letters of the other.

Given a word, compute the badge points for that word. You'll need these:

An internal billing system assigns sequential period numbers to billing cycles. Some periods are designated as extended — they receive an extra processing day for reconciliation.

An online retailer sells five distinct product SKUs. Each item costs $8 at full price. To encourage bundle purchases, the retailer offers tiered discounts when a customer buys distinct items together:

Convert an encoded payload, represented as a sequence of symbol values in one radix, to any other radix.

You are building a roster system for a developer training academy. Participants are assigned to numbered cohorts based on their experience track. The program coordinator needs to view participants grouped by cohort, with each cohort's list sorted alphabeticall…

Correctly determine the fewest number of coins needed to make an exact target amount from a supplied denomination list.

You are writing a decoder for a legacy industrial robot controller. The controller receives a continuous stream of 3-character instruction codes. Each triplet maps to a named operation. When a HALT code is encountered, execution stops immediately.

Implement a function that encodes plain English text into commit jargon. Your team uses an internal shorthand for obfuscating draft commit messages before they reach the shared log. The encoding follows a small set of deterministic rules applied word-by-word.

You are working on a small internal tool that compares two configuration snapshots.

You are cleaning imported contact records before they are saved into a CRM. Each record includes a freeform phone field entered by a human, so the data can contain spaces, dots, parentheses, hyphens, and an optional leading country code of 1.

Output the lyrics to 'The Twelve Days of Christmas'. ``text On the first day of Christmas my true love gave to me: a Partridge in a Pear Tree.

Determine if a text sample has full alphabet coverage. A sample with full coverage uses every letter of the alphabet at least once. The best-known example is: > The quick brown fox jumps over the lazy dog.

Classify a delivery drop-off location into the correct fee tier based on its distance from the warehouse.

Calculate the date of scheduled deployment windows. Typically deployment windows happen on the same day of the week. In this exercise, you will take a description of a deployment window date, and return the actual deployment date.

Refactor an expense report formatter. The expense report exercise is a refactoring exercise. There is code that prints a nicely formatted expense report, given a locale (American or Dutch) and a currency (US dollar or euro).

A maritime signal station transmits messages using a sequence of signal flags. A numeric transmission code determines which flags to raise and in what order.

Determine which team controls each zone on a contested grid. In a grid claim competition two teams—Black (B) and White (W)—place markers on a rectangular grid. A contiguous group of empty cells that is completely enclosed (horizontally and vertically) by one t…

Identify grid crossovers in an operations matrix. A grid crossover is a cell whose value is greater than or equal to every value in its row and less than or equal to every value in its column.

In a grid hunt challenge you scan a rectangular field of characters to locate hidden target strings.

Implement a Steps method that computes how many cascade steps a hailstone particle takes to reach unit mass.

Implement the response logic for a basic help-desk chatbot. The bot handles incoming support messages and replies with one of five canned responses based on the message content.

An internal post-mortem tool reconstructs incident chains. Each step in the chain describes an event and how it caused the next, building a cumulative narrative from the root cause forward.

An invoicing system needs to print amounts in words on official documents. Given an integer from 0 to 999,999,999,999, return its English representation.

Compile a standings table from match results for a small sports league. Given a list of match results, produce a formatted standings table. Each result line contains two team names and an outcome, separated by semicolons:

Simulate a ledger account supporting opening, closing, withdrawals, and deposits of money. Watch out for concurrent transactions!

Implement the logic of a letter-lock word puzzle. A letter lock is a combination lock whose tumblers are letters instead of digits. The solver guesses one letter at a time. Each correct guess reveals every occurrence of that letter in the secret word.

Your team needs a lightweight log scanning tool. Given one or more server log files, scan for lines that match a user-provided pattern and return the results as a single string.