BNP Paribas
100+ Interview Questions and Answers
Q1. How is a change request in application serviced by development team (business analysis, code analysis, discussion with BA, requirment freeze, etc.)
A change request in an application is serviced by the development team through various stages such as business analysis, code analysis, discussion with BA, and requirement freeze.
The development team starts by analyzing the change request to understand its impact on the application.
They perform business analysis to determine the feasibility and potential risks of implementing the change.
Code analysis is conducted to assess the impact on existing code and identify any necessar...read more
Q2. What are derivatives, capital market, money market?. What is the formula for NAV?. What are forward, futures and options?.
Derivatives are financial instruments whose value is derived from an underlying asset. Capital market refers to the market for long-term securities. Money market deals with short-term borrowing and lending.
Derivatives are contracts between two parties that derive their value from an underlying asset, such as stocks, bonds, commodities, or currencies.
Capital market is where long-term securities like stocks and bonds are bought and sold.
Money market deals with short-term borrow...read more
Q3. if we dont specify anything in group by aggregator what will happen
If we don't specify anything in group by aggregator, it will return the result without any grouping.
The result will contain all the rows from the input without any aggregation.
The output will have the same number of rows as the input.
No grouping will be performed on any column.
The output will be similar to a select statement without a group by clause.
Q4. Write down a procedure to return a certain series (99, 96, 93, ...., 6, 3)
Procedure to return a series (99, 96, 93, ...., 6, 3)
Create a temporary table with a single column
Use a loop to insert values into the temporary table
Return the values from the temporary table in descending order
Q5. What's the difference between java and c++?
Java is an object-oriented language with automatic memory management, while C++ is a compiled language with manual memory management.
Java is platform-independent, while C++ is platform-dependent.
Java has a simpler syntax and is easier to learn, while C++ is more complex and difficult to master.
Java has built-in garbage collection, while C++ requires manual memory management.
Java is used for developing web applications, mobile apps, and enterprise software, while C++ is used f...read more
Q6. what do you mean by MT202 and what does its format include
MT202 is a SWIFT message type used for bank-to-bank transfers and includes information about the sender, receiver, and transaction details.
MT202 is a SWIFT message type used for bank-to-bank transfers.
It provides information about the sender, receiver, and transaction details.
The format includes fields such as sender's reference, ordering customer, beneficiary customer, and transaction amount.
Example: MT202 message format: {1:F01BANKAUSXXAXXX1234567890}{2:I202BANKDEFFXXXXU300...read more
Q7. Given sample data on two tables, write down the result sets of all types joins.
The result sets of all types of joins in SQL
Inner Join: Returns only the matching rows from both tables
Left Join: Returns all the rows from the left table and the matching rows from the right table
Right Join: Returns all the rows from the right table and the matching rows from the left table
Full Outer Join: Returns all the rows from both tables, including the unmatched rows
Cross Join: Returns the Cartesian product of both tables
Q8. What is derivative and types? What is mutual funds, what is NAV with formula, ratios, pg detailed projects ( what methods used,formula used,), about internships( what suggestions given, what did you learn)
Derivatives are financial contracts that derive their value from an underlying asset. Mutual funds are investment vehicles that pool money from multiple investors to invest in securities.
Types of derivatives include futures, options, swaps, and forwards.
NAV (Net Asset Value) is the value of a mutual fund's assets minus its liabilities, divided by the number of outstanding shares.
Ratios used in mutual fund analysis include expense ratio, turnover ratio, and Sharpe ratio.
Projec...read more
Q9. Why KYC is used in some areas and why AML is not used in that area
KYC is used to verify the identity of customers while AML is used to detect and prevent money laundering.
KYC is used to ensure that financial institutions are not used for illegal activities.
AML is not used in some areas because those areas may not have a high risk of money laundering.
KYC is mandatory in many countries for financial institutions to comply with regulations.
AML is used in areas where there is a high risk of money laundering, such as in countries with weak anti-...read more
Q10. probability of getting the even number as product when two dices are thrown
Probability of getting an even number as product when two dices are thrown.
There are 36 possible outcomes when two dice are thrown.
Out of these, 18 outcomes have an even product.
Therefore, the probability of getting an even number as product is 18/36 or 1/2 or 50%.
Q11. Job card parameters Cond parameter Define gdg and vsams Abends Sorting Joins
The interview question covers job card parameters, cond parameter, gdg and vsams, abends, sorting, and joins.
Job card parameters are used to specify job information such as job name, job class, and accounting information.
COND parameter is used to conditionally execute job steps based on the return code of previous steps.
GDG (Generation Data Group) is a group of related datasets that are created and managed together.
VSAM (Virtual Storage Access Method) is a file storage access...read more
Q12. Java memory management. What difference between equals() and ==
Equals() compares the content of objects while == compares their reference.
equals() method compares the content of two objects and returns true if they are equal.
== operator compares the reference of two objects and returns true if they refer to the same object.
equals() method can be overridden to provide custom comparison logic.
Example: String s1 = new String("hello"); String s2 = new String("hello"); s1.equals(s2) returns true while s1 == s2 returns false.
Q13. What's your understanding on financial markets and their products?
Financial markets are platforms where buyers and sellers trade financial assets, such as stocks, bonds, and commodities.
Financial markets facilitate the buying and selling of financial assets.
Products in financial markets include stocks, bonds, commodities, derivatives, and currencies.
Financial markets can be categorized into primary markets (where new securities are issued) and secondary markets (where existing securities are traded).
Q14. what kind of transformation is update strategy? explain
Update strategy is a transformation used to flag rows for insert, update, delete or reject.
Update strategy is used to control the flow of data in a mapping.
It is used to flag rows for insert, update, delete or reject.
It can be used to update a target table based on a source table.
It can be used to insert new rows into a target table.
It can be used to delete rows from a target table.
It can be used to reject rows that do not meet certain criteria.
Q15. Functions and Procedures and differences between them
Functions and procedures are both stored database objects used to perform specific tasks in SQL.
Functions return a value while procedures do not.
Functions can be used in SQL statements, whereas procedures cannot.
Functions can have input parameters and return a single value, while procedures can have input and output parameters.
Functions are typically used for calculations or data manipulation, while procedures are used for executing a series of SQL statements.
Examples of func...read more
Q16. What is liquidity of an asset?
Liquidity of an asset refers to its ability to be quickly and easily converted into cash without significant loss in value.
Liquidity is a measure of how easily an asset can be bought or sold in the market.
Highly liquid assets can be quickly converted into cash, while illiquid assets may take longer to sell.
Liquidity is important for investors as it allows them to access their funds when needed or take advantage of investment opportunities.
Examples of liquid assets include cas...read more
Q17. What are the outine protocol and explain BGP, EIGRP and ISIS.
BGP, EIGRP, and ISIS are routing protocols used in networking.
BGP (Border Gateway Protocol) is used for routing between different autonomous systems.
EIGRP (Enhanced Interior Gateway Routing Protocol) is a Cisco proprietary protocol used for routing within a single autonomous system.
ISIS (Intermediate System to Intermediate System) is a protocol used for routing within a single autonomous system, similar to EIGRP.
BGP uses a path-vector algorithm to determine the best path for ...read more
Q18. What is collateral management
Collateral management is the process of managing and monitoring collateral pledged to secure a loan or other financial obligation.
Collateral can include assets such as real estate, stocks, bonds, and commodities.
The purpose of collateral management is to mitigate credit risk and ensure that the lender has sufficient collateral to cover any potential losses.
Collateral management involves tracking the value of the collateral, monitoring any changes in its value, and taking appr...read more
Q19. What is the full form of SWIFT and its meaning?
SWIFT stands for Society for Worldwide Interbank Financial Telecommunication. It is a messaging network used by banks to securely communicate financial transactions.
SWIFT is a global financial messaging network used by banks to send and receive information about financial transactions.
It was founded in 1973 and is headquartered in Belgium.
SWIFT assigns a unique code to each bank that uses its network, called a Bank Identifier Code (BIC).
The network is used to securely transmi...read more
Q20. How trade happens in OTC market
OTC market trades happen through direct negotiations between buyers and sellers.
OTC market trades are not conducted on a centralized exchange.
Buyers and sellers negotiate directly with each other to agree on the terms of the trade.
OTC trades are typically conducted between large financial institutions and involve high-value securities such as bonds, derivatives, and commodities.
OTC trades are not subject to the same regulations as trades on a centralized exchange.
OTC trades a...read more
Q21. difference between low level and high level languages!
Low level languages are closer to machine code and hardware, while high level languages are more abstract and easier to read/write.
Low level languages are more difficult to read and write, but offer more control over hardware
High level languages are easier to read and write, but offer less control over hardware
Low level languages include assembly and machine code
High level languages include Python, Java, and C++
Q22. Did you do any process improvements?
Yes, I implemented several process improvements to streamline operations and increase efficiency.
Implemented new software to automate manual tasks
Introduced standardized procedures to reduce errors
Conducted regular process audits to identify areas for improvement
Q23. What is the meaning of splitting the share of an company?
Splitting the share of a company refers to dividing the existing shares into multiple shares, usually to increase liquidity or adjust ownership percentages.
Splitting shares does not change the overall value of the company, but increases the number of shares outstanding.
It can be done to make shares more affordable for investors or to adjust voting rights.
For example, a company with 100 shares valued at $10 each may split them into 200 shares valued at $5 each.
Share splits are...read more
Q24. What are tools you used and briefly explain and why it is used
Some tools used by Senior Linux Administrators include Ansible, Nagios, and Docker.
Ansible - used for automation of tasks and configuration management
Nagios - used for monitoring and alerting of system and network resources
Docker - used for containerization of applications for easy deployment and management
Q25. What is te difference between ledger and statement entries in reconciliation
Ledger entries are individual transactions recorded in an account, while statement entries are a summary of transactions for a period.
Ledger entries are detailed records of individual transactions, while statement entries are a summary of transactions for a period.
Ledger entries are used to create statement entries.
Statement entries are used to reconcile accounts.
For example, a ledger entry might be a check written for $100, while a statement entry would be the total amount o...read more
Q26. Accounting for investment in equity shares under fvt oci
Accounting for investment in equity shares under FVT OCI involves recognizing changes in fair value through other comprehensive income.
Equity shares are initially recognized at cost and subsequently measured at fair value.
Changes in fair value are recognized in other comprehensive income.
Dividends received are recognized in profit or loss.
Disclosure of fair value and changes in fair value is required in the financial statements.
Q27. What is MTU and how to find the MTU size for CE/PE
MTU stands for Maximum Transmission Unit. It is the largest size of data packet that can be transmitted over a network.
MTU is measured in bytes.
The default MTU size for Ethernet is 1500 bytes.
To find the MTU size for CE/PE, you can use the ping command with the -f option to set the Do Not Fragment (DNF) bit and gradually increase the packet size until you receive a 'packet needs to be fragmented but DF set' message.
Another way to find the MTU size is to use the traceroute com...read more
Q28. Itil core standards? What is continuous improvements ? How do we achieve it in the organisation. Incident, change , problem and request management ? Project management core concepts , project life cycle Scenari...
read moreQ29. write a program to find palindrome of given string
Program to find palindrome of given string
Reverse the string and compare with original
Use two pointers to compare characters from start and end
Ignore spaces and punctuation while checking
Q30. What is haircut for collaterals
Haircut for collaterals refers to the reduction in value of the collateral pledged by a borrower to secure a loan.
Haircut is the percentage reduction in the value of the collateral that a lender applies to account for market fluctuations and potential losses.
It is used to determine the amount of loan that can be extended against the collateral.
For example, if a borrower pledges a property worth $100,000 as collateral and the lender applies a 20% haircut, the maximum loan amou...read more
Q31. in c++, what are pointers?
Pointers are variables that store memory addresses of other variables or objects in C++.
Pointers allow direct manipulation of memory
They can be used to dynamically allocate memory
Pointers can be used to create complex data structures
Pointers can be used to pass arguments by reference
Example: int* ptr = # // ptr stores the memory address of num
Q32. Overall BNP Paribas functions and structure
BNP Paribas is a global banking and financial services company with a complex organizational structure.
BNP Paribas operates in over 70 countries worldwide
The company is divided into three main business lines: Retail Banking, Corporate & Institutional Banking, and Investment Solutions
BNP Paribas has a strong presence in Europe, the Americas, and Asia-Pacific regions
Q33. Where to used AML and not too used
AML is used in financial institutions to prevent money laundering, while it is not commonly used in other industries.
AML is used in financial institutions to detect and prevent money laundering and terrorist financing.
It involves the identification and verification of customers, monitoring of transactions, and reporting of suspicious activities.
AML is not commonly used in other industries, although some may have similar regulations or compliance requirements.
For example, casi...read more
Q34. Extract execution plan of a SQL query
To extract execution plan of a SQL query, use EXPLAIN or SHOW PLAN command.
Use EXPLAIN or SHOW PLAN command before the SQL query
EXPLAIN command shows the execution plan in a tabular format
SHOW PLAN command shows the execution plan in a graphical format
Execution plan helps in optimizing the query for better performance
Q35. What are BGP attributes and how can we identify
BGP attributes are characteristics used to determine the best path for routing traffic between networks.
BGP attributes include: AS Path, Next Hop, Local Preference, Multi-Exit Discriminator (MED), Weight, and Origin.
AS Path identifies the sequence of autonomous systems that the route has passed through.
Next Hop identifies the IP address of the next router in the path.
Local Preference is used to indicate the preferred path for outbound traffic.
MED is used to determine the pref...read more
Q36. Is better to take loan or raise equity for a manufacturing company
It depends on the company's financial situation and goals.
If the company has a strong credit history and cash flow, a loan may be a better option as it allows the company to maintain ownership and control.
If the company is in a growth phase and needs more capital, raising equity may be a better option as it brings in new investors and can provide more flexibility in terms of repayment.
Ultimately, the decision should be based on the company's specific needs and goals.
For examp...read more
Q37. Entire process of Trade life cycle
Trade life cycle involves various stages from order placement to settlement.
Order placement by client or trader
Trade execution by broker or dealer
Confirmation of trade details
Clearing and settlement of trade
Post-trade activities such as reporting and reconciliation
Examples of trade life cycle include equity trades, fixed income trades, and derivative trades
Q38. Which the biggest assets management company?
The biggest assets management company is BlackRock.
BlackRock is the largest asset management company in the world based on assets under management.
It was founded in 1988 and is headquartered in New York City, USA.
BlackRock offers a wide range of investment products and services to institutional and individual investors.
As of 2021, BlackRock manages over $9 trillion in assets.
Some of BlackRock's popular funds include iShares ETFs and BlackRock Global Allocation Fund.
Q39. What you think about 2008 housing market crisis?
The 2008 housing market crisis was a significant event that led to a global financial meltdown.
The crisis was triggered by the collapse of the subprime mortgage market in the United States.
It resulted in a sharp decline in housing prices, leading to widespread foreclosures and financial instability.
Many major financial institutions faced bankruptcy or had to be bailed out by governments to prevent a total collapse of the financial system.
The crisis had far-reaching effects on...read more
Q40. What is collateral and haircut?
Collateral is an asset pledged as security for a loan, while haircut is the percentage reduction in the value of the collateral.
Collateral is a form of security for a loan, which can be seized by the lender if the borrower defaults on the loan.
Haircut is the percentage reduction in the value of the collateral that the lender applies to account for market fluctuations and potential losses.
The higher the risk associated with the collateral, the higher the haircut applied by the...read more
Q41. Multi threading print odd even with 2 threads but output should be in sync
Use two threads to print odd and even numbers in sync
Create two threads, one for printing odd numbers and one for printing even numbers
Use synchronization mechanisms like mutex or semaphore to ensure output is in sync
Example: Thread 1 prints odd numbers (1, 3, 5, ...) and Thread 2 prints even numbers (2, 4, 6, ...)
Q42. what makes java portable?
Java is portable due to its platform independence and bytecode execution.
Java code is compiled into bytecode which can be executed on any platform with a JVM
JVM acts as an interpreter and translates bytecode into machine code
Java's standard library is also platform-independent
Examples of platforms that support Java include Windows, Linux, and macOS
Q43. Types of transformations you have worked on
I have worked on various types of transformations including Aggregator, Expression, Filter, Joiner, Lookup, Router, and Sorter.
Aggregator transformation for performing calculations on groups of data
Expression transformation for performing calculations and manipulating data
Filter transformation for filtering out unwanted data
Joiner transformation for joining data from multiple sources
Lookup transformation for retrieving data from a database table
Router transformation for direc...read more
Q44. write spring boot program to accept json as request. write the logic and explain
Create a Spring Boot program to accept JSON requests and process the data.
Create a Spring Boot application with a REST controller to handle incoming JSON requests.
Use @PostMapping annotation to map the endpoint for accepting JSON requests.
Use @RequestBody annotation to bind the incoming JSON data to a Java object.
Process the JSON data as needed in the controller method.
Return a response as JSON if required.
Q45. Performance tuning of SQL query
Performance tuning of SQL query
Identify slow queries using profiling tools
Optimize query structure and use indexes
Reduce data retrieval by filtering and limiting results
Avoid using subqueries and nested queries
Use appropriate data types and avoid unnecessary conversions
Q46. description and working of JVM,JDK,JRE
JVM, JDK, and JRE are essential components of Java programming language.
JVM stands for Java Virtual Machine and is responsible for executing Java code.
JDK stands for Java Development Kit and includes tools for developing Java applications.
JRE stands for Java Runtime Environment and provides the environment for running Java applications.
JDK includes JRE and additional development tools like javac, jar, and javadoc.
JVM is platform-dependent while JDK and JRE are platform-indepe...read more
Q47. Design patterns, singleton and factory explain in detail
Design patterns are reusable solutions to common problems in software design. Singleton ensures a class has only one instance, while factory creates objects without specifying the exact class.
Design patterns are best practices for solving common software design problems.
Singleton pattern ensures a class has only one instance and provides a global point of access to it.
Factory pattern creates objects without specifying the exact class to be instantiated.
Examples: Singleton - D...read more
Q48. why BNP paribas?
BNP Paribas is a leading global bank with a strong reputation for innovation and sustainability.
BNP Paribas has a strong global presence with operations in over 70 countries
The bank is committed to sustainability and has been recognized for its efforts in this area
BNP Paribas is known for its innovative approach to banking, particularly in the areas of digital transformation and fintech partnerships
Q49. Explain trade lifecycle
Trade lifecycle refers to the stages involved in a trade from initiation to settlement.
The trade lifecycle includes trade initiation, trade capture, trade confirmation, trade matching, trade settlement, and trade reconciliation.
During trade initiation, the trader decides to buy or sell a security.
Trade capture involves recording the details of the trade, such as the security, quantity, and price.
Trade confirmation is the process of verifying the details of the trade with the ...read more
Q50. what is joints? write a code to join multiple table?
Joins are used in SQL to combine rows from two or more tables based on a related column between them.
Use JOIN keyword to combine tables based on a common column
Types of joins include INNER JOIN, LEFT JOIN, RIGHT JOIN, and FULL JOIN
Example: SELECT * FROM table1 INNER JOIN table2 ON table1.column = table2.column
Q51. What is OSI and TCP/IP model
OSI and TCP/IP models are reference models used to describe how data is transmitted over a network.
OSI model has 7 layers, while TCP/IP model has 4 layers
OSI model is theoretical, while TCP/IP model is practical
OSI model is used for teaching and understanding networking concepts, while TCP/IP model is used for actual implementation
Examples of layers in OSI model: Physical, Data Link, Network, Transport, Session, Presentation, Application
Examples of layers in TCP/IP model: Net...read more
Q52. singleton pattern and how to break
Singleton pattern ensures a class has only one instance and provides a global point of access to it.
Singleton pattern involves a private constructor, a static method to access the instance, and a static variable to hold the instance.
To break the singleton pattern, one can use reflection to access the private constructor and create multiple instances.
Another way to break the singleton pattern is by using serialization and deserialization to create multiple instances.
Q53. What systems experiance do you have?
I have experience working with various systems including CRM, ERP, and database management systems.
Proficient in using CRM systems such as Salesforce and HubSpot
Familiar with ERP systems like SAP and Oracle
Skilled in database management systems like MySQL and Microsoft SQL Server
Q54. What is exception handling in java?
Exception handling in Java is a mechanism to handle runtime errors and prevent program crashes.
Exceptions are objects that represent errors or unexpected events during program execution.
Java provides try, catch, and finally blocks to handle exceptions.
try block contains the code that may throw an exception, catch block handles the exception, and finally block is executed regardless of an exception.
Example: try { // code that may throw exception } catch(Exception e) { // handl...read more
Q55. is sorter active?
Sorter can be active or inactive depending on the configuration.
Sorter transformation can be configured to be active or passive.
If active, it sorts the data based on specified criteria.
If passive, it passes the data through without sorting.
Sorter can be used to remove duplicates from data.
Sorter can also be used to sort data in ascending or descending order.
Q56. Are you interested in Java developer position?
Yes, I am interested in a Java developer position.
I have extensive experience in Java programming
I have worked on multiple Java projects in the past
I am familiar with Java frameworks like Spring and Hibernate
Q57. Difference between KYC and AML
KYC is the process of verifying the identity of a customer while AML is the process of preventing money laundering.
KYC is focused on identifying and verifying the identity of a customer
AML is focused on preventing money laundering and terrorist financing
KYC is a prerequisite for AML
KYC involves collecting and verifying customer information such as name, address, and identification documents
AML involves monitoring customer transactions and identifying suspicious activity
KYC is...read more
Q58. Functions of Asset management company
Asset management companies manage investment portfolios and provide financial services to clients.
AMCs manage investment portfolios on behalf of clients
They provide financial services such as investment advice and portfolio analysis
They charge a fee for their services
AMCs may specialize in certain types of assets, such as real estate or stocks
Examples of AMCs include BlackRock and Vanguard
Q59. 1.what is derivatives 2. What do you understand about SLAB
Derivatives are financial contracts that derive their value from an underlying asset or benchmark.
Derivatives can be used for hedging or speculation
Examples of derivatives include futures, options, and swaps
SLAB stands for Structured Legal Assistance Box, a type of settlement used in legal cases
SLAB settlements involve the creation of a trust to manage the settlement funds and distribute payments to claimants
Q60. What is Trade Life Cycle.
Trade Life Cycle refers to the stages involved in a trade from initiation to settlement.
Trade initiation
Trade execution
Trade confirmation
Clearing and settlement
Trade reconciliation
Trade reporting
Examples: equities, bonds, derivatives
Q61. Total years of exp basic details
I have 8 years of experience in software engineering.
8 years of experience in software engineering
Proficient in programming languages such as Java and Python
Experience in developing web applications using frameworks like Spring and Django
Q62. Tell mi the stages of aml
The stages of AML include customer identification, customer due diligence, transaction monitoring, and reporting.
Customer identification involves verifying the identity of customers and establishing their risk profile.
Customer due diligence involves gathering and verifying information about customers, their business activities, and sources of funds.
Transaction monitoring involves continuously monitoring customer transactions for suspicious activities or patterns.
Reporting inv...read more
Q63. What are equity swaps
Equity swaps are financial derivatives where two parties agree to exchange cash flows based on the performance of a stock or equity index.
Equity swaps involve exchanging the returns on a stock or equity index for a fixed or floating interest rate.
They are often used by investors to gain exposure to a particular stock or index without owning the underlying asset.
One party typically pays the total return on the equity, while the other pays a fixed or floating interest rate.
Equi...read more
Q64. How do you find a filename in linux server
To find a filename in a Linux server, you can use the 'find' command.
Use the 'find' command followed by the directory path and the filename you are looking for
For example, to find a file named 'example.txt' in the /home directory, you can use: find /home -name example.txt
You can also use wildcards like '*' to search for files with a certain pattern
Q65. What is equity markets?
Equity markets refer to the market where shares of publicly traded companies are bought and sold.
Equity markets provide a platform for companies to raise capital by selling shares to investors.
Investors can buy and sell shares of publicly traded companies through stock exchanges like NYSE, NASDAQ, etc.
Prices of shares in equity markets are determined by supply and demand, as well as various economic factors.
Investors can make profits by selling shares at a higher price than t...read more
Q66. Whats is BNP Paribas
BNP Paribas is a French multinational bank and financial services company.
Founded in 2000 through the merger of Banque Nationale de Paris and Paribas
Headquartered in Paris, France
Offers a range of financial services including retail banking, investment banking, and asset management
Operates in over 70 countries worldwide
One of the largest banks in the world by total assets
Q67. What is MPLS, MP-VPN, MPLS-TE.
MPLS is a protocol for efficient data transfer, MP-VPN is a VPN service using MPLS, and MPLS-TE is a traffic engineering extension of MPLS.
MPLS stands for Multiprotocol Label Switching and is used to efficiently route data packets through a network.
MP-VPN is a VPN service that uses MPLS to securely connect multiple sites or users to a private network.
MPLS-TE is an extension of MPLS that allows for more precise traffic engineering, enabling network administrators to control th...read more
Q68. Largest common prefix in string array
Find the largest common prefix among an array of strings.
Iterate through the characters of the first string and compare with the corresponding characters of other strings.
Stop when a mismatch is found or when reaching the end of any string.
Return the prefix found so far.
Q69. types of caches. explain
Caches are temporary storage areas that hold frequently accessed data for quick access.
There are several types of caches including CPU cache, disk cache, browser cache, and DNS cache.
CPU cache stores frequently accessed data from RAM for faster access.
Disk cache stores frequently accessed data from hard disk for faster access.
Browser cache stores frequently accessed web pages, images, and other resources for faster loading.
DNS cache stores frequently accessed domain name info...read more
Q70. Technical implementation of a solution
Technical implementation involves planning, designing, and executing a solution using appropriate tools and technologies.
Identify the problem and define the requirements
Choose the appropriate tools and technologies
Design the solution architecture
Develop and test the solution
Deploy and maintain the solution
Ensure scalability, security, and performance
Examples: implementing a new software system, upgrading an existing system, integrating multiple systems
Q71. Can you travel that far?
Yes, I am able to travel long distances for work.
I have experience traveling for work in the past
I am willing to travel for this opportunity
I have no restrictions that would prevent me from traveling
Q72. What is method overriding?
Method overriding is a feature in object-oriented programming where a subclass provides a specific implementation of a method that is already provided by its parent class.
In method overriding, the method in the subclass has the same name, return type, and parameters as the method in the parent class.
The purpose of method overriding is to provide a specific implementation of a method in the subclass that is different from the implementation in the parent class.
Method overridin...read more
Q73. What is VPN and VLAN
VPN is a secure connection between two networks while VLAN is a logical grouping of devices on a network.
VPN stands for Virtual Private Network and is used to securely connect two networks over the internet.
VPN uses encryption to protect data transmitted over the network.
VLAN stands for Virtual Local Area Network and is used to logically group devices on a network.
VLANs can be used to separate traffic on a network for security or performance reasons.
For example, a company mig...read more
Q74. Meaning of tcp packets
TCP packets are units of data sent over a network using the TCP protocol.
TCP packets are used to establish and maintain connections between devices on a network.
They contain information such as source and destination IP addresses, port numbers, and data.
TCP packets are reliable and ensure that data is transmitted correctly and in order.
Examples of applications that use TCP include web browsing, email, and file transfers.
Q75. What is OSI Model
The OSI Model is a conceptual framework that standardizes the functions of a telecommunication or computing system into seven layers.
The OSI Model stands for Open Systems Interconnection Model.
It helps in understanding how data is transferred from one computer to another over a network.
The seven layers are: Physical, Data Link, Network, Transport, Session, Presentation, and Application.
Each layer has specific functions and protocols to ensure smooth communication between devi...read more
Q76. What is TCP Model
TCP Model stands for Transmission Control Protocol Model, which is a communication protocol used in computer networks.
TCP Model is a conceptual model used in computer networking to understand the functions of the Internet Protocol Suite.
It consists of four layers: Application, Transport, Internet, and Link.
Each layer has specific functions and protocols that help in the transmission of data over a network.
For example, TCP (Transmission Control Protocol) operates at the Transp...read more
Q77. SQL questions to find last 5 rows
Use SQL query with ORDER BY and LIMIT to find last 5 rows
Use ORDER BY clause to sort the rows in descending order based on a column
Use LIMIT 5 to retrieve only the last 5 rows
Q78. How do you reduce docker image size
To reduce docker image size, remove unnecessary files, use multi-stage builds, minimize layers, and use smaller base images.
Remove unnecessary files and dependencies
Utilize multi-stage builds to separate build dependencies from runtime dependencies
Minimize the number of layers in the Dockerfile
Use smaller base images like Alpine instead of larger ones like Ubuntu
Q79. Hash map hash set implementation
Hash map and hash set are data structures that use hashing to store key-value pairs and unique values respectively.
Hash map uses key-value pairs where keys are hashed to find the corresponding value
Hash set stores unique values using hashing to quickly check for duplicates
Example: HashMap
map = new HashMap<>(); HashSet set = new HashSet<>();
Q80. Your experience in VBA and macros
I have extensive experience in VBA and macros.
Developed VBA macros to automate data entry and analysis in Excel
Created automated reports using VBA in Access
Used VBA to automate tasks in Outlook, such as sending emails and scheduling appointments
Q81. Ratios to identify a healthy company
Healthy companies have high liquidity, profitability, and solvency ratios.
Liquidity ratios measure a company's ability to meet short-term obligations. Examples include current ratio and quick ratio.
Profitability ratios measure a company's ability to generate profits. Examples include return on assets and return on equity.
Solvency ratios measure a company's ability to meet long-term obligations. Examples include debt-to-equity ratio and interest coverage ratio.
A healthy compan...read more
Q82. What do you know about markets
Markets refer to the exchange of goods and services between buyers and sellers in a specific area or industry.
Markets involve the buying and selling of goods and services.
They can be physical locations like a farmer's market or online platforms like Amazon.
Markets are influenced by factors such as supply and demand, competition, and consumer preferences.
Market research is essential for understanding customer needs and identifying opportunities for growth.
Marketing strategies ...read more
Q83. What is mutual funds
Mutual funds are investment vehicles that pool money from multiple investors to invest in a diversified portfolio of stocks, bonds, or other securities.
Mutual funds are managed by professional fund managers who make investment decisions on behalf of the investors.
Investors can buy shares of mutual funds, which represent a portion of the holdings in the fund.
Mutual funds offer diversification, liquidity, and professional management to investors.
Examples of mutual fund companie...read more
Q84. What is good Customer Service?
Good customer service involves providing prompt, friendly, and efficient assistance to meet the needs and exceed the expectations of customers.
Promptly addressing customer inquiries and concerns
Being friendly, polite, and empathetic towards customers
Offering efficient and effective solutions to customer problems
Going above and beyond to exceed customer expectations
Providing clear and accurate information to customers
Actively listening to customers and understanding their need...read more
Q85. ISO 27001 implementation
ISO 27001 implementation involves establishing, implementing, maintaining, and continually improving an information security management system.
Identify the scope of the ISMS (Information Security Management System)
Conduct a risk assessment and treatment
Implement security controls to mitigate identified risks
Establish an information security policy and objectives
Regularly monitor, measure, and evaluate the ISMS effectiveness
Q86. What is financial market
Financial market is a platform where buyers and sellers trade financial securities, commodities, and other fungible items.
Financial markets facilitate the exchange of assets such as stocks, bonds, currencies, and derivatives.
They provide a platform for companies to raise capital through issuing stocks or bonds.
Financial markets can be categorized into primary markets (new securities are issued) and secondary markets (existing securities are traded).
Examples of financial marke...read more
Q87. What is investment banking
Investment banking involves providing financial services to corporations, governments, and other institutions.
Facilitates mergers and acquisitions
Underwrites securities offerings
Provides financial advisory services
Assists with raising capital for clients
Engages in trading and market-making activities
Q88. What is Net Asset Value
Net Asset Value (NAV) is the value of a fund's assets minus its liabilities, divided by the number of shares outstanding.
NAV is calculated by subtracting the fund's liabilities from its assets.
The result is then divided by the number of shares outstanding to determine the NAV per share.
NAV is used to determine the price at which investors can buy or sell shares of the fund.
It is an important metric for investors to track the performance of a fund.
Q89. JWT Token structure and details
JWT token is a JSON web token used for authentication and contains three parts: header, payload, and signature.
JWT token consists of three parts: header, payload, and signature.
Header contains the type of token and the signing algorithm used.
Payload contains claims about the user and additional data.
Signature is used to verify that the sender of the JWT is who it says it is.
JWT tokens are encoded and can be easily decoded, but not tampered with as the signature will be invali...read more
Q90. Saga pattern in microservice
Saga pattern is a design pattern used in microservices architecture to manage distributed transactions.
Saga pattern breaks down a transaction into a series of smaller, independent steps.
Each step in the saga is a separate transaction that can be rolled back if needed.
If one step fails, compensating transactions can be executed to undo the changes made by previous steps.
Saga pattern helps maintain data consistency in a distributed system.
Example: In an e-commerce system, a sag...read more
Q91. write for loop in preferred language
Answer to write a for loop in preferred language
Use 'for' keyword to start the loop
Initialize a counter variable
Set the condition for the loop to continue
Increment or decrement the counter variable after each iteration
Q92. explain the trade life cycle
The trade life cycle refers to the stages involved in the processing of a trade from initiation to settlement.
Initiation: Trade is proposed and agreed upon by parties involved.
Execution: Trade is executed on the agreed terms.
Confirmation: Parties confirm the details of the trade.
Clearing: Trade details are matched and processed for settlement.
Settlement: Actual exchange of funds and securities takes place.
Post-trade: Activities such as reconciliation, reporting, and risk mana...read more
Q93. prioritising of issues
Prioritising issues involves assessing urgency, impact, and resources available to address them.
Assess urgency of each issue based on impact on business operations
Consider impact on customers or stakeholders
Evaluate resources available to address each issue
Prioritise issues based on urgency, impact, and available resources
Communicate priorities to stakeholders and team members
Q94. Controls and descripancies identified
Controls and discrepancies identified in auditing processes
Identifying key controls in the audit process to ensure accuracy and reliability of financial statements
Documenting discrepancies found during the audit and investigating root causes
Implementing corrective actions to address identified discrepancies and improve processes
Communicating findings to management and recommending improvements for future audits
Q95. Experience in relevant field
I have 5 years of experience as a Business Analyst in the finance industry.
5 years of experience as a Business Analyst
Specialized in the finance industry
Analyzed market trends and financial data
Developed strategies to improve business performance
Q96. REST API development Process
REST API development involves designing, building, testing, and deploying APIs following REST principles.
Design API endpoints based on resources and actions
Implement CRUD operations using HTTP methods
Use status codes to indicate success or failure
Secure APIs with authentication and authorization mechanisms
Document APIs with clear and concise documentation
Q97. Spring Boot Multiple datasource setup?
Spring Boot allows setting up multiple data sources for database connectivity.
Define multiple data source configurations in application.properties or application.yml
Create separate DataSource beans for each data source
Use @Primary annotation to specify the primary data source
Use @Qualifier annotation to specify the data source for specific repositories or services
Configure JPA or JDBC templates for each data source
Q98. Java 8 features and benefits
Java 8 introduced new features like lambda expressions, streams, and default methods, improving code readability and performance.
Lambda expressions allow for more concise code and easier parallel programming.
Streams provide a way to work with collections in a functional style, enabling easier processing of large data sets.
Default methods allow interfaces to have method implementations, reducing the need for abstract classes.
Optional class helps to avoid NullPointerExceptions ...read more
Q99. Real time experience with query
I have experience writing complex queries to retrieve specific data from databases in real-time.
Utilized subqueries and joins to extract data efficiently
Optimized queries for performance by using indexes and proper indexing techniques
Worked with large datasets and optimized queries to reduce response time
Used analytical functions like ROW_NUMBER() and RANK() to analyze data
Q100. Explain about process
The process involves verifying the identity of customers to ensure compliance with regulations and prevent financial crimes.
Collecting customer information and documentation
Conducting risk assessments
Performing due diligence checks
Monitoring transactions for suspicious activity
Reporting any suspicious findings to authorities
Top HR Questions asked in null
Interview Process at null
Top Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month