Screen JavaScript candidates on real starter repos
46 short JavaScript tasks, each shipping with a public test file and a language-specific runner. Candidates work in their own style; reviewers see how the code actually hangs together.

Access Badge
Manage badge factory settings. When an access badge is issued, it starts out unnamed.
Your task is to convert a signal code number into a string of beacon alert patterns.

Your task is to convert an alert code number into a string of alarm chime sounds.

In a user identity system, an alias cluster is a group of usernames that share exactly the same letters in a different arrangement. Two usernames belong to the same cluster if one can be formed by rearranging the letters of the other.

For an Astral Pilot simulation, each cadet begins by generating a pilot profile they can fly with.

Given a word, compute the badge points for that word. You'll need these:

An internal billing system assigns sequential period numbers to billing cycles. Some periods are designated as extended — they receive an extra processing day for reconciliation.

Convert an encoded payload, represented as a sequence of symbol values in one radix, to any other radix.

You are building a roster system for a developer training academy. Participants are assigned to numbered cohorts based on their experience track. The program coordinator needs to view participants grouped by cohort, with each cohort's list sorted alphabeticall…

Correctly determine the fewest number of coins needed to make an exact target amount from a supplied denomination list.

You are writing a decoder for a legacy industrial robot controller. The controller receives a continuous stream of 3-character instruction codes. Each triplet maps to a named operation. If a HALT code appears, execution stops immediately.

Implement a function that encodes plain English text into commit jargon. Your team uses an internal shorthand for obfuscating draft commit messages before they reach the shared log. The encoding follows a small set of deterministic rules applied word-by-word.

You are working on a small internal tool that compares two configuration snapshots.

You are cleaning imported contact records before they are saved into a CRM. Each record includes a freeform phone field entered by a human, so the data can contain spaces, dots, parentheses, hyphens, and an optional leading country code of 1.

Output the lyrics to 'The Twelve Days of Christmas'. ``text On the first day of Christmas my true love gave to me: a Partridge in a Pear Tree.

Determine if a text sample has full alphabet coverage. A sample with full coverage uses every letter of the alphabet at least once. The best-known example is: > The quick brown fox jumps over the lazy dog.

Classify a delivery drop-off location into the correct fee tier based on its distance from the warehouse.

Calculate the date of scheduled deployment windows. Your team follows a recurring deployment schedule: releases go out on a specific day of the week each month. In this exercise, you will take a description of a deployment window date, and return the actual de…

Your assignment is to write a depot shuttle navigator. A large distribution depot uses automated shuttles to move packages between loading bays. The depot's control system needs a program to verify shuttle movements before they are dispatched.

A maritime signal station transmits messages using a sequence of signal flags. A numeric transmission code determines which flags to raise and in what order.

Identify grid crossovers in an operations matrix. A grid crossover is a cell whose value is greater than or equal to every value in its row and less than or equal to every value in its column.

In a grid hunt challenge you scan a rectangular field of characters to locate hidden target strings.

Implement a steps function that computes how many cascade steps a hailstone particle takes to reach unit mass.

Implement the response logic for a basic help-desk chatbot. The bot handles incoming support messages and replies with one of five canned responses based on the message content.

An internal post-mortem tool reconstructs incident chains. Each step in the chain describes an event and how it caused the next, building a cumulative narrative from the root cause forward.

An invoicing system needs to print amounts in words on official documents. Given an integer from 0 to 999,999,999,999, return its English representation.

Your team needs a lightweight log scanning tool. Given one or more server log files, scan for lines that match a user-provided pattern and print the results. Lines should appear in the order they are found, starting with the first match in the first file.

Read the digits shown on an industrial meter's segment display. Each digit is rendered as a 3-column × 4-row pattern of pipes (|), underscores (_), and spaces. Parse these patterns and return the corresponding numeric string.

Implement a metric dependency network. In monitoring systems, metrics often depend on other metrics. A source metric is collected directly (e.g. CPU usage), while a derived metric is computed from one or more upstream metrics (e.g.

The parcel reference checksum process is used to validate operational parcel identifiers. These normally contain dashes and look like: 3-598-21508-8