Chubb
30+ Interview Questions and Answers
Q1. how will you get the embeddings of long sentences/paragraphs that transformer models like BERT truncate? how will you go about using BERT for such sentences? will you use sentence embeddings or word embeddings ...
read moreTo get embeddings of long sentences/paragraphs truncated by BERT, we can use pooling techniques like mean/max pooling.
We can use pooling techniques like mean/max pooling to get embeddings of truncated sentences/paragraphs.
We can also use sliding window approach to get embeddings of overlapping segments of the long input.
For using BERT on such long inputs, we can use sentence embeddings or word embeddings depending on the task.
Models like Longformer and Reformer can handle lon...read more
Q2. There is a table matches which has team 1,team 2 and winner columns. Sample data like ind pak pak and pak ind ind and sl ban sl. So a team can play mutliple matches. Final output should be team, no of matches w...
read moreCalculate the number of matches won and lost by each team based on the given data in the matches table.
Group the data by team and count the number of matches won and lost for each team.
Use the winner column to determine the outcome of each match.
Create a query to calculate the number of matches won and lost for each team.
Example: Team A won 2 matches and lost 1 match.
Example: Team B won 1 match and lost 2 matches.
Q3. in what scenarios would you advice me to not use ReLU in my hidden layers?
Avoid ReLU when dealing with negative values or vanishing gradients.
When dealing with negative values, use Leaky ReLU or ELU instead.
When facing vanishing gradients, use other activation functions like tanh or sigmoid.
In some cases, using ReLU in all layers can lead to dead neurons.
Consider the nature of your data and the problem you are trying to solve before choosing an activation function.
Q4. How do you seperate name from emails for example *****,***** etc.. We need to get name form those mails in sql
Use SQL string functions like SUBSTRING and CHARINDEX to separate name from emails.
Use CHARINDEX to find the position of the '@' symbol in the email address.
Use SUBSTRING to extract the characters before the '@' symbol as the name.
Consider handling cases where there are multiple names or special characters in the email address.
Q5. how does backpropagation in neural networks work?
Backpropagation is a supervised learning algorithm used to train neural networks by adjusting weights to minimize error.
It involves propagating the error backwards through the network to adjust the weights of the connections between neurons.
The algorithm uses the chain rule of calculus to calculate the gradient of the error with respect to each weight.
The weights are then updated using a learning rate and the calculated gradient.
This process is repeated for multiple iteration...read more
Q6. what is universal approximation theorm?
Universal approximation theorem states that a neural network with a single hidden layer can approximate any continuous function.
A neural network with a single hidden layer can approximate any continuous function
It is a fundamental theorem in the field of deep learning
The theorem applies to a wide range of activation functions
The number of neurons required in the hidden layer may vary depending on the complexity of the function
The theorem does not guarantee the accuracy of the...read more
Q7. Explain dependency injection in .NET and how to resolve dependency?
Dependency injection in .NET is a design pattern where dependencies are injected into a class rather than the class creating them itself.
Dependency injection helps in achieving loose coupling between classes.
In .NET, dependency injection can be implemented using frameworks like Unity, Ninject, or built-in .NET Core DI container.
Dependencies can be resolved through constructor injection, property injection, or method injection.
Example: Constructor injection - public class MyCl...read more
Q8. How to separate portion before @ and after @ from mail using python?
Use Python to separate portion before and after @ in an email address.
Use the split() method to separate the email address into two parts based on the @ symbol.
Access the parts using index 0 for the portion before @ and index 1 for the portion after @.
Example: email = 'example@email.com'; parts = email.split('@'); before = parts[0]; after = parts[1];
Q9. Write a query to seperate first name, midle name and last name from full name in sql
Use SUBSTRING_INDEX function in SQL to separate first name, middle name, and last name from full name.
Use SUBSTRING_INDEX function to extract first name by specifying space as delimiter
Use SUBSTRING_INDEX function to extract last name by specifying space as delimiter and -1 as position
Use combination of SUBSTRING_INDEX and REPLACE functions to extract middle name if present
Q10. Table a has 1, 1,0,0,null and table b has 1,0,null,null. Resultant rows for all joins
The resultant rows for all joins between table a and table b with given values.
Inner join: 1
Left join: 1, 1, 0, 0, null
Right join: 1, 0, null, null
Full outer join: 1, 1, 0, 0, null, null
Q11. What is Catastrophe Modeling. What is Geocoding. How geocoding helps.
Q12. What is Pure Premium, Average Annual Loss, Probable Maximum Loss, Ground Up Loss, Net Loss
Q13. Difference between primary key and unique key.
Primary key uniquely identifies a record in a table, while unique key ensures that all values in a column are distinct.
Primary key can't have null values, while unique key can have one null value.
A table can have only one primary key, but multiple unique keys.
Primary key is used as a foreign key in other tables, while unique key is not.
Example: Employee ID can be a primary key, while email address can be a unique key.
Q14. What is the rank, Dense Rank and Row Number?
Rank, Dense Rank, and Row Number are functions used in SQL to assign a ranking to rows in a result set.
Rank function assigns a unique rank to each row based on the specified column values.
Dense Rank function assigns a unique rank to each row without any gaps.
Row Number function assigns a sequential integer to each row in the result set.
Q15. Identify the duplicate words in string and their position "hi Hello hi hello"
Identify duplicate words in a string and their positions.
Split the string into an array of words
Create a map to store word frequencies and positions
Iterate through the array and update the map
Identify words with frequency > 1 and their positions
Q16. What is SQL and diffrent joins in SQL?
SQL is a programming language used for managing and manipulating relational databases. Different joins in SQL include inner join, outer join, left join, and right join.
SQL is a standard programming language for managing and manipulating relational databases.
Different types of joins in SQL include inner join, outer join, left join, and right join.
Inner join returns rows when there is at least one match in both tables.
Outer join returns all rows from both tables, with NULL valu...read more
Q17. What are props and events in ReactJS
Props are used to pass data from parent to child components, while events are actions that occur in the application.
Props are read-only and help in maintaining the unidirectional data flow in React
Events are actions like onClick, onChange, etc. that are triggered by user interactions
Example: Passing a 'name' prop from a parent component to a child component and triggering an onClick event to update state
Q18. What you know about data pipelines in Azure
Data pipelines in Azure are used to automate the movement and transformation of data from various sources to destinations.
Data pipelines in Azure can be created using Azure Data Factory, which allows users to create, schedule, and manage data pipelines.
They can be used to ingest data from various sources such as databases, files, and streaming services, and load it into data warehouses or data lakes.
Azure Data Factory supports data transformation activities such as data clean...read more
Q19. Find the binary representation of a number
To find the binary representation of a number, convert the number to binary by dividing it by 2 and keeping track of the remainders.
Start by dividing the number by 2 and noting the remainder
Continue dividing the quotient by 2 until the quotient is 0
Write down the remainders in reverse order to get the binary representation
For example, the binary representation of 10 is 1010 (10 divided by 2 is 5 with a remainder of 0, then 2 with a remainder of 1, then 1 with a remainder of 0...read more
Q20. Define Stored procedures in sql.
Stored procedures are pre-written SQL codes that can be saved and reused multiple times.
Stored procedures are used to simplify complex queries and reduce network traffic.
They can be used to perform multiple operations in a single transaction.
They can be parameterized to accept input values and return output values.
They can be used to enforce business rules and security measures.
Examples include creating a new user, updating inventory, and generating reports.
Q21. Explain one sorting algorithm.
Bubble Sort is a simple sorting algorithm that repeatedly steps through the list, compares adjacent elements, and swaps them if they are in the wrong order.
Compares adjacent elements and swaps them if they are in the wrong order
Repeats this process until the list is sorted
Not efficient for large lists due to its O(n^2) time complexity
Example: [5, 3, 8, 2, 1] -> [3, 5, 2, 1, 8] -> [3, 2, 1, 5, 8] -> [2, 1, 3, 5, 8] -> [1, 2, 3, 5, 8]
Q22. What is cat modelling
Cat modeling is a statistical method used to estimate the probability of loss due to a catastrophic event.
It involves analyzing historical data to identify patterns and trends in losses caused by natural disasters such as hurricanes, earthquakes, and floods.
The model then uses this data to predict the likelihood and severity of future losses, which helps insurance companies to price their policies accurately and manage their risk exposure.
Cat modeling is also used by governme...read more
Q23. DSA: prime no. or not optimal approach
Optimal approach for checking if a number is prime or not using DSA
Optimal approach for checking prime numbers is to iterate up to square root of the number
Use trial division method to check divisibility by numbers up to square root of the number
Time complexity of this approach is O(sqrt(n))
Q24. Class, object with real time examples
A class is a blueprint for creating objects, which are instances of the class. Objects have attributes and behaviors.
Classes define the structure and behavior of objects.
Objects are instances of classes and have their own unique attributes and behaviors.
Example: Class 'Car' with attributes like 'color' and behaviors like 'drive'. Object 'myCar' is an instance of 'Car' with color 'red' and can drive.
Example: Class 'Person' with attributes like 'name' and behaviors like 'eat'. ...read more
Q25. What do you mean by geocoding
Geocoding is the process of converting addresses into geographic coordinates (latitude and longitude).
Geocoding helps in mapping and analyzing data based on location.
It is used in various applications like navigation, logistics, and marketing.
Examples of geocoding services include Google Maps API, Bing Maps API, and OpenStreetMap Nominatim API.
Q26. Why didn't you use some X tech stack.
Q27. What are new features in java 17
Java 17 introduces new features like Sealed Classes, Pattern Matching for switch, and Foreign Function & Memory API.
Sealed Classes allow restricting which classes can be subclasses of a superclass.
Pattern Matching for switch simplifies code by combining conditional logic with variable assignment.
Foreign Function & Memory API enables Java programs to interoperate with code written in other languages.
Q28. What is abstraction in java
Abstraction in Java is the concept of hiding the implementation details and showing only the necessary features of an object.
Abstraction allows you to define a template for a class without providing the implementation details.
It helps in reducing complexity by hiding unnecessary details and only showing the essential parts.
Abstract classes and interfaces are used to achieve abstraction in Java.
Q29. Different types of Re-Insurance.
Q30. Kafka flow how to implement
Kafka flow can be implemented using Kafka Connect and Kafka Streams for data ingestion and processing.
Use Kafka Connect to ingest data from various sources into Kafka topics
Use Kafka Streams for real-time data processing and analytics
Implement producers and consumers to interact with Kafka topics
Configure Kafka brokers, topics, and partitions for optimal performance
Q31. End to End flow of a release cycle
The end to end flow of a release cycle involves planning, development, testing, deployment, and monitoring.
Planning phase involves defining scope, setting timelines, and assigning resources.
Development phase includes coding, code reviews, and integration of features.
Testing phase involves unit testing, integration testing, and user acceptance testing.
Deployment phase includes packaging, deployment to production, and rollback procedures if needed.
Monitoring phase involves trac...read more
Q32. SQL types of normal forms
SQL normal forms are levels of organization for relational databases to reduce redundancy and improve data integrity.
First normal form (1NF) - Eliminate repeating groups and ensure each column contains atomic values.
Second normal form (2NF) - Meet 1NF requirements and have all non-key attributes fully functionally dependent on the primary key.
Third normal form (3NF) - Meet 2NF requirements and have no transitive dependencies between non-key attributes.
Boyce-Codd normal form (...read more
Q33. Tell me types of insurance.
Types of insurance include health, auto, life, home, and travel insurance.
Health insurance covers medical expenses
Auto insurance provides coverage for vehicles
Life insurance pays out a sum of money upon the insured's death
Home insurance protects against damage to the home and belongings
Travel insurance covers trip cancellations, medical emergencies, and lost luggage
Q34. How to sync db instance
To sync a db instance, use a replication process to copy data from the primary instance to secondary instances.
Set up a primary instance and one or more secondary instances
Configure replication settings on the primary instance
Monitor replication status to ensure data consistency
Perform regular backups to prevent data loss
Q35. Data structures are vvimport
Data structures are essential for efficient data storage and retrieval.
Data structures provide a way to organize and store data in a computer's memory.
They can improve the efficiency of algorithms and operations on the data.
Examples include arrays, linked lists, trees, and hash tables.
Q36. logic app in Azure
Logic Apps in Azure are a cloud service that helps you automate and orchestrate tasks, business processes, and workflows.
Logic Apps are used to automate workflows and integrate apps, data, systems, and services across enterprises or organizations.
They provide a visual designer to model and automate your process as a series of steps known as a workflow.
Logic Apps can connect to a wide variety of services and applications both in the cloud and on-premises.
They offer a wide rang...read more
Top HR Questions asked in null
Interview Process at null
Top Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month