Athenahealth Technology
60+ CreditAccess Grameen Interview Questions and Answers
Q1. Maximum Subarray Sum Problem Statement
Given an array arr
of length N
consisting of integers, find the sum of the subarray (including empty subarray) with the maximum sum among all subarrays.
Explanation:
A sub...read more
Q2. Rectangular Numbers Problem Statement
Ninja has a number 'N'. Your task is to generate a pattern where the outer rectangle is filled with the number 'N', and as you move inward, the numbers decrease consecutive...read more
Q3. First Missing Positive Problem Statement
You are provided with an integer array ARR
of length 'N'. Your objective is to determine the first missing positive integer using linear time and constant space. This me...read more
Q4. Flipping Coins Problem
Gary has N coins placed in a straight line. Some coins have their head side up, and others have the tail side up.
Convention:
1 denotes the HEAD side is up.
0 denotes the TAIL side is up....read more
Q5. Problem: kth Missing Element in a Sequence
Given a strictly increasing sequence of integers VEC
, identify the Kth
missing contiguous integer element that is not present in the sequence, starting from the leftmo...read more
Q6. Find the Longest Palindromic Substring
Given a string ‘S’ composed of lowercase English letters, your task is to identify the longest palindromic substring within ‘S’.
If there are multiple longest palindromic ...read more
Q7. K Largest Elements Problem Statement
Given an unsorted array containing 'N' integers, you are required to find 'K' largest elements from the array and return them in non-decreasing order.
Input:
The first line ...read more
Q8. Sudoku Solver Problem Statement
Given a 9 x 9 2D matrix 'MATRIX', where some cells are filled with digits (1-9) and others are empty (denoted by 0), determine if there is a way to fill the empty cells such that...read more
Q9. Merge Sort Problem Statement
You are given a sequence of numbers, ARR
. Your task is to return a sorted sequence of ARR
in non-descending order using the Merge Sort algorithm.
Explanation:
The Merge Sort algorit...read more
Q10. Binary Array Sorting Problem Statement
You are provided with a binary array, i.e., an array containing only 0s and 1s. Your task is to sort this binary array and return it after sorting.
Input:
The first line ...read more
Q11. Cycle Detection in a Singly Linked List
Determine if a given singly linked list of integers forms a cycle or not.
A cycle in a linked list occurs when a node's next
points back to a previous node in the list. T...read more
Q12. Search in a Row-wise and Column-wise Sorted Matrix Problem Statement
You are given an N * N matrix of integers where each row and each column is sorted in increasing order. Your task is to find the position of ...read more
Q13. Reverse the String Problem Statement
You are given a string STR
which contains alphabets, numbers, and special characters. Your task is to reverse the string.
Example:
Input:
STR = "abcde"
Output:
"edcba"
Input...read more
Q14. Word Distance Calculation
Given a document represented as an array/list ARR
of words with length N
, find the smallest distance between two given words for multiple queries. The distance is defined as the differ...read more
Q15. N Queens Problem
Given an integer N
, find all possible placements of N
queens on an N x N
chessboard such that no two queens threaten each other.
Explanation:
A queen can attack another queen if they are in the...read more
Q16. Next Greater Element Problem Statement
You are given an array arr
of length N
. For each element in the array, find the next greater element (NGE) that appears to the right. If there is no such greater element, ...read more
Q17. Form a Triangle Problem Statement
You are provided with an integer array/list ARR
of length N. Your task is to determine if it is possible to construct at least one non-degenerate triangle using the values of t...read more
Q18. Convert Binary Tree to Mirror Tree
Convert a given binary tree into its mirror tree, where the left and right children of all non-leaf nodes are interchanged.
Input:
An integer ‘T’ denoting the number of test c...read more
Q19. Heap Sort Problem Statement
Given an array ARR
consisting of N
integers, your task is to use the Heap sort algorithm to arrange the array in non-decreasing order.
Input:
The first line of the input contains an ...read more
Q20. Level Order Traversal Problem Statement
Given a binary tree of integers, return the level order traversal of the binary tree.
Input:
The first line contains an integer 'T', representing the number of test cases...read more
Q21. Remove Character from String Problem Statement
Given a string str
and a character 'X', develop a function to eliminate all instances of 'X' from str
and return the resulting string.
Input:
The first line contai...read more
Q22. Triangle of Numbers Pattern
Ninja is tasked with printing a triangle pattern based on a given number 'N' for any test case.
Example:
Input:
N = 4
Output:
1
232
34545
4567654
Explanation:
The pattern comprises n...read more
Q23. Java: Count the frequency of characters/words and sort them based on number of occurrences in descending. Ex: "Sharing interview experience certainly helps others." - Return the maximum number of characters and...
read moreCount the frequency of characters/words and sort them based on number of occurrences in descending order.
Split the input string into individual words
Create a map to store the frequency of each character/word
Sort the map based on the number of occurrences in descending order
Return the maximum number of characters/words along with the number of occurrences
Q25. Senior Architect: Different design patterns used to design a system. Microservices patterns, retry mechanism, bulk head pattern. Generic discussion on designing a system and questions around it
Design patterns such as microservices, retry mechanism, and bulkhead pattern are used to design a system for scalability, fault tolerance, and resilience.
Microservices pattern involves breaking down a system into smaller, independent services that communicate through APIs.
Retry mechanism is used to handle transient failures by automatically retrying failed operations.
Bulkhead pattern isolates different components of a system to prevent failures in one part from affecting othe...read more
Q26. How would you design a binary tree, write a snippet to print all nodes.
Design and print all nodes of a binary tree.
Design a binary tree structure with left and right child pointers for each node.
Implement a recursive function to print all nodes of the binary tree.
Start from the root node and recursively print the left subtree, then the root, and finally the right subtree.
Q27. In fusion procedure, if autologus and non-autologus tissue graft use means what will you do?
In fusion procedure, if autologous and non-autologous tissue graft are used, the appropriate coding would depend on the specific details of the procedure.
Assign separate codes for autologous and non-autologous tissue grafts
Use the appropriate CPT codes for each type of tissue graft used
Ensure accurate documentation of the specific types of tissue grafts used in the fusion procedure
Q28. Sepsis secondary to UTI due to urinary catheter? what is PDx here
The primary diagnosis (PDx) in this case would be sepsis.
PDx would be sepsis as it is the main reason for hospitalization and treatment.
Secondary diagnoses would include UTI and urinary catheter.
The focus should be on treating the sepsis while also addressing the underlying UTI and catheter issues.
Q30. Preeclampsia is progressed to severe preeclampsia, How will you code and what is POA indicator
To code severe preeclampsia, use O14.1 with POA indicator 1 for present on admission.
Code severe preeclampsia as O14.1
Use POA indicator 1 to indicate it was present on admission
Document any additional details or complications in the medical record
Assign additional codes for any associated conditions or symptoms
Review official coding guidelines for accurate coding
Q31. sort the array, string manipulation and searching
Sorting an array and manipulating/searching strings are important skills for a Member Technical Staff.
Sorting an array can be done using built-in functions like sort() or by implementing sorting algorithms like bubble sort, merge sort, quick sort, etc.
String manipulation involves operations like concatenation, substring extraction, character replacement, etc. and can be done using built-in functions or by implementing custom functions.
Searching in strings can be done using bu...read more
Q32. How to find excisional debridement and non excisional debridement
Excisional debridement involves removal of tissue, while non-excisional debridement does not involve tissue removal.
Excisional debridement involves cutting away dead or damaged tissue from a wound
Non-excisional debridement includes methods like enzymatic debridement or autolytic debridement
To find excisional debridement in medical records, look for codes such as 11042-11047 in CPT codes
For non-excisional debridement, look for codes like 97602-97606 in CPT codes
Q33. Find largest increasing subsequence count from an array of numbers
The largest increasing subsequence count from an array of numbers is to find the length of the longest increasing subsequence.
Iterate through the array and keep track of the length of the longest increasing subsequence encountered so far.
Use dynamic programming to solve the problem efficiently.
Example: For the array [10, 22, 9, 33, 21, 50, 41, 60, 80], the longest increasing subsequence count is 6.
Q35. What are the approach found in PCS coding
Approaches in PCS coding include root operation, body part, approach, device, qualifier, and body system.
Root operation: The main action performed on the body part.
Body part: The specific body part involved in the procedure.
Approach: The method used to reach the body part for the procedure.
Device: Any tools or devices used during the procedure.
Qualifier: Additional information about the procedure.
Body system: The anatomical system related to the procedure.
Q36. What are some of the analytical functions available in SQL?
Analytical functions in SQL are used to perform calculations on sets of rows.
Aggregate functions like SUM, AVG, COUNT, MIN, MAX
Window functions like ROW_NUMBER, RANK, DENSE_RANK, LAG, LEAD
Ranking functions like NTILE, PERCENT_RANK, CUME_DIST
Statistical functions like STDDEV, VARIANCE
String functions like CONCAT, SUBSTRING, TRIM
Q40. Top 5 Frequency of word
The top 5 most frequently occurring words in a given text.
Tokenize the text into words
Create a dictionary to store word frequencies
Iterate through the words and update the dictionary
Sort the dictionary by frequency and return the top 5 words
Handle edge cases such as punctuation and stop words
Q41. How do to handle stakeholder's interests?
Handle stakeholder's interests by understanding their needs, communicating effectively, and delivering results.
Understand the stakeholders' needs and priorities
Communicate regularly and effectively with stakeholders
Involve stakeholders in decision-making processes
Deliver results that align with stakeholders' interests
Manage expectations and address concerns promptly
Q43. Add Two Numbers represented as linked lists into one linked list
The task is to add two numbers represented as linked lists and return the result as a new linked list.
Traverse both linked lists simultaneously, starting from the head
Add the corresponding nodes from both lists along with any carry from the previous addition
If the sum is greater than 9, set the carry to 1 and take the remainder as the new node value
Move to the next nodes in both lists
Continue this process until both lists are exhausted
If there is still a carry remaining, add ...read more
Q44. Reverse LL using recursion, Find the path in a btree that sums closest to a value K
Reverse LL using recursion, Find path in btree closest to sum K
Implement a recursive function to reverse a linked list
Traverse the binary tree to find all paths and calculate their sums
Keep track of the path with sum closest to K
Q45. coding to find the excel column name using given number
Convert given number to Excel column name
Use ASCII values to map numbers to characters (A=65, B=66, ...)
Divide the number by 26 to get the column name
Handle edge cases like 'Z' and multiple characters
Q46. synchronized block and method, use of lock in method
Synchronized block and method are used in Java to control access to shared resources using locks.
Synchronized block allows locking on a specific object instance or class
Synchronized method locks on the object instance
Locks prevent multiple threads from accessing the synchronized code simultaneously
Q47. Peak of mountain
The peak of a mountain is the highest point on the mountain, often offering stunning views and a sense of accomplishment.
The peak of a mountain is typically reached after a challenging climb.
Mount Everest is the highest peak in the world, standing at 29,032 feet above sea level.
Many hikers and climbers set goals to reach the peak of specific mountains as a personal challenge.
Q48. Contacts between insurances and providers
Contacts between insurances and providers involve communication regarding coverage, claims, and billing.
Insurances and providers communicate to verify coverage for services
Providers submit claims to insurances for reimbursement
Insurances and providers discuss billing and payment issues
Contracts between insurances and providers outline terms of reimbursement
Q49. Whats your approach on green field projects a
Q50. Print the output using maps in JavaScript
Printing output using maps in JavaScript
Create a new Map object
Add key-value pairs using set() method
Access values using get() method
Iterate over the map using for...of loop
Q51. Caridac ablation - root operation?
The root operation for cardiac ablation is Destruction.
The root operation for cardiac ablation is Destruction, which involves eliminating all or a portion of a body part.
Other examples of procedures with the root operation of Destruction include excision of a lesion and removal of a foreign body.
Understanding the root operation is crucial in medical coding to accurately assign the correct procedure code.
Q52. Difference between tuple and delete command
Tuple is a data structure that stores a fixed number of elements, while delete command is used to remove data from a database table.
Tuple is used to store multiple values in a single variable, while delete command is used to remove specific rows from a database table.
Tuples are immutable, meaning their values cannot be changed once they are set, while delete command permanently removes data from a table.
Example: Tuple (1, 'apple', 3.14) vs. DELETE FROM table_name WHERE condit...read more
Q53. streams program to find the numbers divisible by2
Using Java streams to find numbers divisible by 2
Use Java streams to filter numbers divisible by 2
Use the filter() method with a lambda expression to check for divisibility by 2
Collect the filtered numbers into a list or array
Q54. Height of BT
BT can refer to many things, please specify the context.
BT can refer to British Telecom, Bluetooth technology, or body temperature.
The height of British Telecom's headquarters is approximately 177 meters.
The height of a Bluetooth device is usually very small, ranging from a few millimeters to a few centimeters.
Body temperature can vary depending on the individual and the method of measurement.
Q55. Mixed HLD with Hypercholestrolemia
Mixed hyperlipidemia is a condition where there are high levels of different types of fats in the blood, including both cholesterol and triglycerides.
Mixed hyperlipidemia is a combination of high cholesterol and high triglycerides in the blood.
Hypercholesterolemia specifically refers to high levels of cholesterol in the blood.
Treatment for mixed hyperlipidemia may involve lifestyle changes, medications, and monitoring cholesterol levels.
Examples of medications used to treat m...read more
Q56. what is the sast and dast tool used
SAST (Static Application Security Testing) and DAST (Dynamic Application Security Testing) tools are commonly used in software development to identify and fix security vulnerabilities.
SAST tools analyze the source code of an application to identify potential security vulnerabilities before the code is compiled or executed. Examples include Checkmarx and Fortify.
DAST tools test the running application for vulnerabilities by simulating attacks. Examples include Burp Suite and O...read more
Q57. Sql query on 2nd highest salary
Use SQL query with ORDER BY and LIMIT to find the 2nd highest salary.
Use ORDER BY clause to sort salaries in descending order
Use LIMIT 1,1 to skip the first highest salary and get the second highest salary
Q58. Denial management of claims
Denial management of claims involves identifying reasons for claim denials and taking steps to resolve them.
Identify common reasons for claim denials such as incorrect patient information, lack of pre-authorization, or coding errors
Implement processes to prevent denials, such as verifying patient information before submitting claims
Work with payers to understand denial reasons and appeal denied claims with supporting documentation
Track denial trends to identify areas for impr...read more
Q59. Problems you have solved in your carrier
I have solved problems related to improving customer experience, optimizing business processes, and enhancing product features.
Developed a new customer feedback system that increased response rates by 30%
Streamlined the order fulfillment process resulting in a 20% reduction in delivery time
Implemented a new feature in the product that increased user engagement by 25%
Resolved a critical bug in the system that was causing frequent crashes
Identified and addressed communication g...read more
Q60. Which soap do you use?
I use a gentle and effective antibacterial soap to ensure cleanliness and hygiene.
I prefer using antibacterial soap to kill germs and prevent infections
I choose a soap with a pleasant scent to leave a fresh fragrance
I make sure the soap is gentle on skin to avoid irritation
Q61. design problem on healthcare sector
Design a mobile app for patients to easily track their medication intake and set reminders.
Include a user-friendly interface with large buttons for easy navigation.
Allow patients to input their medication schedule and receive notifications for each dose.
Incorporate a feature for patients to track their symptoms and side effects.
Integrate a database of common medications and their dosages for easy selection.
Include a secure login system to protect patients' personal health inf...read more
Q62. explain your project cicd pipeline
Our project CI/CD pipeline automates the process of building, testing, and deploying code changes.
Utilizes Jenkins for continuous integration
Includes automated testing using Selenium for frontend and JUnit for backend
Integrates with GitLab for version control
Deploys to AWS using Terraform scripts
Q63. Coding using array methods
Array methods are used to manipulate arrays in programming languages.
Array methods like map, filter, and reduce are commonly used to perform operations on arrays.
For example, you can use map to transform each element in an array, filter to remove elements based on a condition, and reduce to combine all elements into a single value.
Other array methods include forEach, find, and sort, each serving a specific purpose in array manipulation.
Top HR Questions asked in CreditAccess Grameen
Interview Process at CreditAccess Grameen
Top Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month