Citibank
100+ Astute Energy Distribution Management Interview Questions and Answers
You are given an infinite supply of coins of each of denominations D = {D0, D1, D2, D3, ...... Dn-1}. You need to figure out the total number of ways W, in which you can make a change fo...read more
You have been given an integer array/list 'ARR' of size 'N'. Write a solution to check if it could become non-decreasing by modifying at most 1 element.
We define an array as non-decreasing,...read more
Q3. 1)Why do we use redefines 2) In a sortt if we have - Copy, Include, Omit, sort what is the order of processing. 3 ) How do we achieve loop in cobol. 1) What is the structure of cobol. ) What are sort DD Stateme...
read moreAnswering questions related to COBOL, SORT utility, and file usage.
1) Redefines are used in COBOL to allow multiple data items to occupy the same storage space.
2) The order of processing in a SORT statement is: Copy, Include, Omit, Sort.
3) Looping in COBOL can be achieved using PERFORM or EVALUATE statements.
4) The structure of COBOL consists of divisions, sections, paragraphs, and sentences.
5) SORT DD Statements in SORT utility define the input and output files for sorting, ...read more
Q4. Which test is used in logistic regression to check the significance of the variable
The Wald test is used in logistic regression to check the significance of the variable.
The Wald test calculates the ratio of the estimated coefficient to its standard error.
It follows a chi-square distribution with one degree of freedom.
A small p-value indicates that the variable is significant.
For example, in Python, the statsmodels library provides the Wald test in the summary of a logistic regression model.
Get second highest salary
What is indexing?
Q6. What is R square and how R square is different from Adjusted R square
R square is a statistical measure that represents the proportion of the variance in the dependent variable explained by the independent variables.
R square is a value between 0 and 1, where 0 indicates that the independent variables do not explain any of the variance in the dependent variable, and 1 indicates that they explain all of it.
It is used to evaluate the goodness of fit of a regression model.
Adjusted R square takes into account the number of predictors in the model an...read more
Q7. Are exceptions can be written in a catch block seperated by commas,?
Yes, multiple exceptions can be caught in a single catch block separated by commas.
Multiple exceptions can be caught in a single catch block separated by commas.
This can be useful when handling different types of exceptions in a similar way.
For example: catch (IOException | SQLException ex) { // handle exception }
Q8. 3. How has the Indian Economy performed in the past 2 years?
The Indian economy has experienced mixed performance in the past 2 years.
GDP growth rate has fluctuated
Demonetization and GST implementation impacted the economy
Unemployment rate has been a concern
Inflation has remained relatively low
Foreign direct investment has increased
Agricultural sector faced challenges due to weather conditions
Q9. 6. What is difference between procedure and function
Procedure is a set of instructions that performs a specific task, while function returns a value after performing a task.
Procedure does not return a value, while function does.
Functions can be called from within expressions, while procedures cannot.
Functions can have parameters passed to them, while procedures can have both parameters and arguments.
Examples of procedures include printing to the console, while examples of functions include calculating a sum or finding the leng...read more
Q10. 1) How do you achieve concurrency in your current job, and write code for it? 2) Write code for Rest API using Springboot, need to write Entity, Service, Repository, and Controller classes? 3)Volatile keywords,...
read moreAnswers to common Java Developer interview questions
1) Concurrency is achieved using multithreading in Java. Use threads, executors, or synchronized blocks. Example: using ExecutorService to run multiple tasks concurrently.
2) Rest API in Springboot: Entity class defines database table, Service class contains business logic, Repository class interacts with database, Controller class handles HTTP requests.
3) Volatile keyword provides visibility guarantee but does not support sy...read more
Q11. What is fast wrto performance?hashmap or treemap and why
HashMap is faster than TreeMap wrto performance due to its constant time complexity for most operations.
HashMap has O(1) time complexity for most operations while TreeMap has O(log n) time complexity.
HashMap is implemented using an array of buckets while TreeMap is implemented using a Red-Black Tree.
HashMap is preferred for frequent read operations while TreeMap is preferred for frequent write operations.
HashMap is unordered while TreeMap is ordered based on the natural order...read more
Q12. How to check outliers in a variable, what treatment should you use to remove such outliers
Outliers can be detected using statistical methods like box plots, z-score, and IQR. Treatment can be removal or transformation.
Use box plots to visualize outliers
Calculate z-score and remove data points with z-score greater than 3
Calculate IQR and remove data points outside 1.5*IQR
Transform data using log or square root to reduce the impact of outliers
Q13. Types of swift and how it read it. Like its fields.
Swift is a messaging system used for financial transactions. It has different types and fields for message processing.
Swift messages are categorized into 5 types - MT0xx, MT1xx, MT2xx, MT3xx, and MT9xx
Each type has its own set of fields for message processing
For example, MT103 is used for Single Customer Credit Transfer and has fields like Sender's Reference, Receiver's Reference, Amount, Currency, etc.
Q14. 10. What is difference between soft link and hard link
Soft links are pointers to the original file while hard links are additional names for the same file.
Soft links are created using the 'ln -s' command while hard links are created using the 'ln' command.
Soft links can point to files on different file systems while hard links cannot.
Deleting the original file will render a soft link useless while a hard link will still work.
Soft links have different inode numbers while hard links have the same inode number as the original file.
Q15. Can I write a try catch block inside a catch Block
Yes, it is possible to write a try catch block inside a catch block.
This is called nested try-catch block.
It is useful when we want to handle different types of exceptions in different ways.
Example: try { //code } catch (ExceptionType1 e1) { try { //code } catch (ExceptionType2 e2) { //code } } }
It is important to avoid excessive nesting as it can make the code difficult to read and maintain.
Q16. 2. How to replace male with female in Oracle
To replace male with female in Oracle, use the UPDATE statement with the SET clause.
Use the UPDATE statement with the SET clause to replace male with female in Oracle
Example: UPDATE employees SET gender='female' WHERE gender='male'
Make sure to specify the table name and column name correctly
Use WHERE clause to specify the condition for replacement
Q17. How to check multicollinearity in Logistic regression
Multicollinearity in logistic regression can be checked using correlation matrix and variance inflation factor (VIF).
Calculate the correlation matrix of the independent variables and check for high correlation coefficients.
Calculate the VIF for each independent variable and check for values greater than 5 or 10.
Consider removing one of the highly correlated variables or variables with high VIF to address multicollinearity.
Example: If variables A and B have a correlation coeff...read more
Q18. explain corporate actions and it’s types with examples
Corporate actions are events initiated by a company that can affect its stock price and shareholders.
Types of corporate actions include dividends, stock splits, mergers and acquisitions, spin-offs, and rights issues.
Dividends are payments made to shareholders from a company's profits.
Stock splits increase the number of shares outstanding while decreasing the price per share.
Mergers and acquisitions involve the combination of two or more companies.
Spin-offs occur when a compan...read more
Q19. 4.what is difference between delete and truncate
Delete removes specific rows while truncate removes all rows from a table.
Delete is a DML command while truncate is a DDL command.
Delete is slower than truncate as it logs each row deletion while truncate does not.
Delete can be rolled back while truncate cannot be rolled back.
Delete can have a WHERE clause to specify which rows to delete while truncate removes all rows.
Delete does not reset the identity of the table while truncate resets the identity of the table.
Q20. 8. Write command to replace Sam with vam on 5th line
Command to replace Sam with vam on 5th line
sed '5s/Sam/vam/' filename.txt
awk 'NR==5 {sub(/Sam/, "vam")} 1' filename.txt
Q21. Difference between Internal and External table in Hive
Internal tables store data in a Hive-managed warehouse while external tables store data outside of Hive.
Internal tables are managed by Hive and are stored in a Hive warehouse directory
External tables are not managed by Hive and can be stored in any location accessible by Hive
Dropping an internal table also drops the data while dropping an external table only drops the metadata
Internal tables are faster for querying as they are stored in a Hive-managed warehouse
External tables...read more
Q22. How will you handle a irated customer ?
I will handle an irate customer by remaining calm, empathizing with their concerns, and finding a solution to their problem.
Stay calm and composed
Listen actively to the customer's concerns
Empathize with their frustration
Apologize for any inconvenience caused
Offer a solution or alternatives
Follow up to ensure customer satisfaction
Q23. 5.what is cursor and explain type of cursor
A cursor is a database object used to manipulate data in a result set.
A cursor is used to traverse through a result set one row at a time.
There are two types of cursors: static and dynamic.
Static cursors are read-only and scroll forward only.
Dynamic cursors are updatable and can scroll in any direction.
Cursors can be used in stored procedures, triggers, and functions.
Q24. 11. write command to display biggest file on server
Use the 'du' command to display biggest file on server.
Open terminal or SSH into server
Navigate to directory to search from
Run 'du -a . | sort -n -r | head -n 1' command
The output will display the biggest file on the server
Q25. What do you think about the economic slowdown? Factors and solutions.
The economic slowdown is a complex issue with multiple factors and requires a multi-pronged approach for solutions.
Factors include global trade tensions, political instability, and technological disruptions.
Solutions may involve government intervention through fiscal and monetary policies, investment in infrastructure, and support for small businesses.
Private sector initiatives such as innovation and diversification can also contribute to economic growth.
Collaboration between...read more
Q26. 3.write to query to display 3rd highest salary
Query to display 3rd highest salary
Use the ORDER BY clause to sort the salaries in descending order
Use the LIMIT clause to limit the result to the third row
Use a subquery to exclude the top two salaries
Q27. How do you segment customers for a specific travel friendly credit card
Segment customers based on travel habits, preferences, and spending patterns to offer a tailored travel friendly credit card.
Segment customers by frequency of travel (e.g. frequent flyers, occasional travelers)
Segment customers by preferred travel destinations (e.g. domestic vs international)
Segment customers by travel spending habits (e.g. luxury travelers, budget travelers)
Offer benefits and rewards tailored to each segment to attract and retain customers
Q28. Different use cases on Xceptor and Automation Anywhere
Xceptor is used for data extraction and Automation Anywhere is used for automating repetitive tasks.
Xceptor is used in financial services for data extraction and processing.
Automation Anywhere is used for automating repetitive tasks like data entry, invoice processing, etc.
Xceptor can be used for reconciling trades and managing risk in financial services.
Automation Anywhere can be used for automating HR processes like onboarding and offboarding employees.
Xceptor can be used f...read more
Q29. How to check for all the imposed constraints on a table
To check imposed constraints on a table
Use SQL query to check for constraints on a table
Query 'sp_helpconstraint' to get all constraints on a table
Check 'sys.check_constraints' and 'sys.default_constraints' tables for more details
Q30. 7.write command to display secod last line of file
Display second last line of a file using command line.
Use the tail command with -n option to display last two lines of the file.
Then use head command with -n option to display the second last line.
Example: tail -n 2 file.txt | head -n 1
Q31. how to deal if the distribution of a variable is skewed
To deal with skewed distribution of a variable, transformations like log, square root, or box-cox can be applied.
Apply log transformation to reduce right skewness
Apply square root transformation to reduce left skewness
Apply box-cox transformation for a more generalized approach
Consider removing outliers before applying transformations
Q32. What are variable reducing techniques
Variable reducing techniques are methods used to identify and select the most relevant variables in a dataset.
Variable reducing techniques help in reducing the number of variables in a dataset.
These techniques aim to identify the most important variables that contribute significantly to the outcome.
Some common variable reducing techniques include feature selection, dimensionality reduction, and correlation analysis.
Feature selection methods like backward elimination, forward ...read more
Q33. 9. Write command to display blank line in file
Command to display blank line in file
Use echo command with empty quotes to create a blank line in a file
Syntax: echo '' >> filename
Alternatively, use printf command with newline character
Syntax: printf ' ' >> filename
Q34. Using the concept of IRR how would you decide whether to take up a project or not?
IRR helps in determining the profitability of a project and whether to take it up or not.
Calculate the IRR of the project
Compare the IRR with the required rate of return
If IRR is greater than the required rate of return, take up the project
If IRR is less than the required rate of return, reject the project
Consider other factors like risk, cash flow, and payback period before making a final decision
Q35. Insights to be provided in PPT? How will you evaluate perfomance of a unit
Insights on unit performance evaluation in PPT include key metrics, trends, and recommendations.
Include key performance indicators (KPIs) such as revenue, profit margin, customer satisfaction, and employee productivity.
Present trends over time to show improvements or declines in performance.
Provide recommendations for areas of improvement based on the analysis of the unit's performance data.
Use visual aids such as charts, graphs, and tables to enhance understanding and engage...read more
Q36. Problem Solving: How to cut cake into 8 pieces with three slice
To cut a cake into 8 pieces with three slices, make two perpendicular cuts through the center of the cake.
Make the first cut horizontally through the center of the cake, dividing it into two equal halves.
Make the second cut vertically through the center of the cake, perpendicular to the first cut, dividing it into quarters.
Make the third cut horizontally through the center of the cake, perpendicular to the second cut, dividing it into eighths.
Q37. What is difference between syndication and consortium
Syndication involves multiple parties working together to finance a project, while a consortium is a group of companies collaborating on a specific project or goal.
Syndication typically involves financial institutions coming together to provide funding for a large project or investment.
Consortiums are often formed by companies in the same industry to work together on research and development projects or to achieve a common goal.
Syndication is more focused on financing, while ...read more
Q38. How does Bank BS differ from traditional companies?
Bank BS differs from traditional companies in its focus on financial services and regulations.
Bank BS primarily deals with financial services such as lending, investments, and wealth management.
Bank BS is heavily regulated by government authorities and must adhere to strict financial regulations.
Traditional companies operate in various industries and sectors, focusing on producing goods or providing services unrelated to finance.
Traditional companies may have more flexibility...read more
Q39. What is design thinking and how it can be incorporated in banking?
Design thinking is a problem-solving approach that focuses on understanding users' needs and creating innovative solutions.
Design thinking involves empathy, ideation, prototyping, and testing.
In banking, design thinking can be used to create customer-centric products and services.
For example, banks can use design thinking to improve the user experience of their mobile apps or to create new financial products that meet the needs of underserved communities.
Design thinking can a...read more
Q40. Why is liquidity important and is it necessay in short term or long term perspective.
Liquidity is important for financial stability and is necessary in both short term and long term perspectives.
Liquidity ensures that a company can meet its short term obligations and expenses.
It allows for flexibility in managing cash flow and taking advantage of investment opportunities.
In the long term, liquidity is important for sustaining operations, growth, and weathering economic downturns.
Examples include having enough cash on hand to pay bills, access to lines of cred...read more
Q41. How has the format of balance sheet changed?
The format of balance sheet has not changed much over the years.
The basic structure of balance sheet remains the same with assets on one side and liabilities and equity on the other.
However, there have been some changes in the presentation and disclosure requirements.
For example, companies are now required to disclose more information about their assets and liabilities, such as fair value measurements and off-balance sheet arrangements.
Additionally, some companies now present...read more
Q42. What's the difference between enterprise value and equity value?
Enterprise value includes debt and equity value only includes shareholders' equity.
Enterprise value is the total value of a company, including debt and equity, while equity value only includes shareholders' equity.
Enterprise value is used to determine the total value of a company to both debt and equity holders, while equity value is used to determine the value available to shareholders.
Enterprise value is calculated as market capitalization plus debt minus cash, while equity...read more
Q43. write a program to reverse a string in On/2 time complexity
Program to reverse a string in O(n/2) time complexity
Initialize two pointers, one at the beginning and one at the end of the string
Swap characters at the two pointers and move them towards each other until they meet
Repeat until the entire string is reversed
Example: Input 'hello' -> Output 'olleh'
Q44. What is difference between join and merge?
Join is used in SQL to combine rows from two or more tables based on a related column, while merge is used in data manipulation tools like pandas to combine data frames based on common columns.
Join is typically used in SQL queries to combine rows from two or more tables based on a related column
Merge is used in data manipulation tools like pandas to combine data frames based on common columns
Join can be inner, outer, left, right, etc. depending on the requirement
Merge in pand...read more
Q45. How to write Customised immutable java class
Customised immutable java class can be written by declaring all fields as final and not providing any setters.
Declare all fields as final
Do not provide any setters
Provide a constructor to initialize all fields
Override equals() and hashCode() methods
Make the class final
Q46. What is difference between credit and counterparty risk
Credit risk is the risk of default by a borrower, while counterparty risk is the risk of default by a trading partner.
Credit risk is specific to the borrower's ability to repay a loan or debt.
Counterparty risk is broader and includes the risk of default by any party involved in a financial transaction.
Credit risk is typically associated with lending activities, while counterparty risk is more common in trading and investment activities.
Examples of credit risk include a borrow...read more
Q47. How do you feel about operations and technology?
I am passionate about operations and technology and believe they go hand in hand.
I believe that technology can greatly enhance and streamline operations processes.
I enjoy staying up to date with the latest technological advancements and finding ways to incorporate them into operations.
I understand the importance of balancing technology with human interaction and communication.
For example, implementing a new inventory management system can greatly improve efficiency and accura...read more
Q48. Why Citi, what differs us from other banks
Citi stands out from other banks due to its global presence, innovative technology, diverse product offerings, and commitment to sustainability.
Global presence: Citi operates in over 160 countries, providing a truly global network for clients and employees.
Innovative technology: Citi invests heavily in technology to deliver cutting-edge digital banking solutions and enhance customer experience.
Diverse product offerings: Citi offers a wide range of financial products and servi...read more
Q49. Explain about Hadoop Architecture
Hadoop Architecture is a distributed computing framework that allows for the processing of large data sets.
Hadoop consists of two main components: Hadoop Distributed File System (HDFS) and MapReduce.
HDFS is responsible for storing data across multiple nodes in a cluster.
MapReduce is responsible for processing the data stored in HDFS by dividing it into smaller chunks and processing them in parallel.
Hadoop also includes other components such as YARN, which manages resources in...read more
Q50. How did you manage Customer Expectations?
I manage customer expectations by setting clear goals, communicating effectively, and delivering on promises.
I establish a clear understanding of what the customer wants and needs
I communicate regularly and honestly about progress and any changes
I underpromise and overdeliver to exceed expectations
I handle any issues or concerns promptly and professionally
I follow up after completion to ensure satisfaction and address any further needs
For example, when working with a client w...read more
Q51. Guesstimates: Whatsapp database users in India
Approximately 400 million Whatsapp users in India
India has a population of over 1.3 billion
Whatsapp is one of the most popular messaging apps in India
Assuming around 30% of the population uses Whatsapp
Estimate based on internet penetration and smartphone usage in India
Q52. A table is structured with rows and columns while view is derived from table
A table is a structured collection of data organized in rows and columns, while a view is a virtual table derived from one or more tables.
Tables store data in a structured format with rows and columns, while views are virtual tables that display data from one or more tables based on a query.
Views do not store data themselves but instead display data from the underlying tables.
Views can be used to simplify complex queries, restrict access to certain columns, or provide a diffe...read more
Q53. What is router how it works how to configure
A router is a networking device that forwards data packets between computer networks.
Routers operate at the network layer of the OSI model.
They use routing tables to determine the best path for data to travel.
Routers can be configured using a web interface or command line interface.
Examples of routers include Cisco, Netgear, and TP-Link.
Configuration involves setting up IP addresses, subnet masks, and default gateways.
Q54. Difference between bagging and boosting
Bagging and boosting are ensemble methods used in machine learning to improve model performance.
Bagging involves training multiple models on different subsets of the training data and then combining their predictions through averaging or voting.
Boosting involves iteratively training models on the same dataset, with each subsequent model focusing on the samples that were misclassified by the previous model.
Bagging reduces variance and overfitting, while boosting reduces bias a...read more
Q55. How HashMap internally works in java ?
HashMap in Java is a data structure that stores key-value pairs and uses hashing to efficiently retrieve values.
HashMap uses hashing to store and retrieve key-value pairs.
It uses an array of linked lists to handle collisions.
The key's hash code is used to determine the index in the array where the key-value pair will be stored.
If two keys have the same hash code, they are stored in the same linked list.
HashMap allows one null key and multiple null values.
Example: HashMap
map ...read more
Q56. How HashSet internally works in java ?
HashSet internally uses a HashMap to store elements as keys with a dummy value.
HashSet uses a HashMap to store elements as keys with a dummy value
It does not allow duplicate elements
Elements are stored based on their hash code
HashSet does not maintain insertion order
Q57. What do you mean by collateral Management
Collateral management involves monitoring and managing the assets provided as security for financial transactions.
Collateral management ensures that the value of the collateral is sufficient to cover the risk of the transaction.
It involves tracking the value of collateral, margin calls, and collateral substitutions.
Collateral management helps mitigate counterparty credit risk in derivative transactions.
Examples of collateral include cash, securities, and other financial instr...read more
Q58. Difference between chair and cart
A chair is a piece of furniture used for sitting, while a cart is a vehicle used for transporting goods.
A chair typically has a backrest and armrests, while a cart does not.
A chair is designed for one person to sit on, while a cart can carry multiple items or people.
A chair is usually stationary, while a cart is mobile and can be pushed or pulled.
A chair is commonly found in homes, offices, and public spaces, while a cart is often used in warehouses, supermarkets, and farms.
Q59. What do you know about credit cards?
Credit cards are financial tools that allow consumers to borrow money for purchases and pay it back later with interest.
Credit cards are issued by financial institutions to consumers for making purchases and payments.
They allow users to borrow money up to a certain limit, known as the credit limit.
Users are required to pay back the borrowed amount along with interest within a specified period.
Credit cards often come with rewards programs, cashback offers, and other benefits f...read more
Q60. where do you use snyk ?
I use Snyk for identifying and fixing vulnerabilities in our codebase.
We use Snyk to scan our code repositories for security vulnerabilities
Snyk helps us prioritize and fix vulnerabilities in our applications
Integrating Snyk into our CI/CD pipeline ensures security checks are automated
Q61. You have Driving licence
Yes, I have a valid driving licence.
I have a valid driving licence and can provide it if required.
I am familiar with traffic rules and regulations.
I have a clean driving record and have never been involved in any accidents.
I am comfortable driving both manual and automatic vehicles.
I always prioritize safety while driving.
Q62. Explain the logistics regression process
Logistic regression is a statistical method used to analyze and model the relationship between a binary dependent variable and one or more independent variables.
It is a type of regression analysis used for predicting the outcome of a categorical dependent variable based on one or more predictor variables.
It uses a logistic function to model the probability of the dependent variable taking a particular value.
It is commonly used in machine learning for classification problems, ...read more
Q63. How did bank generate a review
Banks generate reviews through customer feedback, surveys, and online platforms.
Customer feedback: Banks often collect feedback from customers through surveys, feedback forms, or customer service interactions.
Surveys: Banks may conduct surveys to gather opinions and ratings from customers regarding their experiences with the bank's services.
Online platforms: Banks may have online platforms where customers can leave reviews and ratings, such as on their website or social media...read more
Q64. What is difference between plan and outlook’
Q65. What was a experience in banking
Q66. What was roll in co operative Bank
Q67. What are promises in javascript
Promises in JavaScript are objects representing the eventual completion or failure of an asynchronous operation.
Promises are used to handle asynchronous operations in JavaScript.
They can be in one of three states: pending, fulfilled, or rejected.
Promises can be chained using .then() method to handle success and failure cases.
They help in writing cleaner and more readable asynchronous code.
Example: const myPromise = new Promise((resolve, reject) => { ... });
Q68. Difference between clustering and segmentation
Clustering groups similar data points together based on features, while segmentation divides data into distinct groups based on predefined criteria.
Clustering is unsupervised learning, while segmentation is typically a supervised process.
Clustering is used in data mining and machine learning to discover patterns, while segmentation is often used in marketing to target specific customer groups.
Examples of clustering algorithms include K-means and hierarchical clustering, while...read more
Q69. Basing on kyc and Transaction monitaring
KYC and transaction monitoring are crucial for preventing financial crimes.
KYC (Know Your Customer) is the process of verifying the identity of customers and assessing their potential risks.
Transaction monitoring involves analyzing customer transactions to detect suspicious activities such as money laundering or terrorist financing.
Both KYC and transaction monitoring are important for complying with regulatory requirements and preventing financial crimes.
Examples of red flags...read more
Q70. Rest api methods and working
REST API methods are used to interact with web services using HTTP requests.
GET method is used to retrieve data from the server
POST method is used to create new data on the server
PUT method is used to update existing data on the server
DELETE method is used to delete data from the server
REST APIs use HTTP status codes to indicate the success or failure of a request
Q71. Optimal ways to work with dynamic forms
Q72. Explain Gini coefficient
Gini coefficient measures the inequality among values of a frequency distribution.
Gini coefficient ranges from 0 to 1, where 0 represents perfect equality and 1 represents perfect inequality.
It is commonly used to measure income inequality in a population.
A Gini coefficient of 0.4 or higher is considered to be a high level of inequality.
Gini coefficient can be calculated using the Lorenz curve, which plots the cumulative percentage of the total income against the cumulative p...read more
Q73. swap zeros to the end dsa array,
Swap zeros to the end of a string array
Iterate through the array and move all zeros to the end
Use two pointers to keep track of non-zero elements and zeros
Example: Input: ['a', '0', 'b', 'c', '0'], Output: ['a', 'b', 'c', '0', '0']
Q74. Can you handle pressure
Yes, I thrive under pressure and use it as motivation to exceed expectations.
I have experience working in high-pressure sales environments and have consistently met or exceeded my targets.
I am able to prioritize tasks and manage my time effectively to meet deadlines.
I remain calm and focused under pressure, and use it as an opportunity to showcase my skills and abilities.
For example, in my previous role, I was responsible for closing a major deal with a tight deadline. I work...read more
Q75. Role of Background in cucumber bdd
Background plays a crucial role in Cucumber BDD as it sets up the initial state for scenarios and helps in maintaining the context throughout the test execution.
Background is used to define steps that are common to all scenarios in a feature file.
It helps in reducing duplication of code by setting up preconditions for scenarios.
Background steps are executed before each scenario in the feature file.
It improves readability and maintainability of feature files by separating comm...read more
Q76. What is expected CTC?
Expected CTC is negotiable based on candidate's experience, skills, and the company's budget.
Expected CTC depends on the candidate's level of experience and skills.
It also depends on the company's budget and industry standards.
Negotiation is common during the offer stage to reach a mutually agreeable CTC.
Candidates can research average salaries for similar roles to have an idea of what to expect.
Q77. What is Tier1 Capital?
Tier1 Capital is a measure of a bank's financial strength, consisting of common equity and disclosed reserves.
Tier1 Capital is the core measure of a bank's financial strength.
It consists of common equity, such as common stock and retained earnings, and disclosed reserves.
Tier1 Capital is used to ensure that banks have enough capital to absorb potential losses.
Regulatory authorities require banks to maintain a minimum level of Tier1 Capital to operate safely.
Tier1 Capital rati...read more
Q78. What is Trunk What is ospf What is BGP
Trunk is a network port that carries multiple VLANs. OSPF and BGP are routing protocols used in networking.
Trunk is used to connect switches and carry multiple VLANs over a single link.
OSPF (Open Shortest Path First) is a link-state routing protocol used to determine the shortest path for data packets in a network.
BGP (Border Gateway Protocol) is an exterior gateway protocol used to exchange routing information between different autonomous systems.
Trunking is commonly used in...read more
Q79. How to perform a join in SQL
Performing a join in SQL allows you to combine rows from two or more tables based on a related column between them.
Use the JOIN keyword to specify the tables you want to join
Specify the columns you want to join on using the ON keyword
Types of joins include INNER JOIN, LEFT JOIN, RIGHT JOIN, and FULL JOIN
Example: SELECT * FROM table1 INNER JOIN table2 ON table1.column = table2.column
Q80. Explain your CI/CD pipeline?
CI/CD pipeline automates the process of integrating code changes, testing, and deploying to production.
Automates code integration, testing, and deployment
Uses tools like Jenkins, GitLab CI/CD, or CircleCI
Includes stages like build, test, deploy
Facilitates continuous delivery and deployment
Improves software quality and speed of delivery
Q81. Difference between BERT and GPT
BERT is bidirectional, GPT is unidirectional. BERT uses transformer encoder, GPT uses transformer decoder.
BERT is bidirectional, meaning it can look at both left and right context in a sentence. GPT is unidirectional, it can only look at the left context.
BERT uses transformer encoder architecture, while GPT uses transformer decoder architecture.
BERT is pretrained on masked language model and next sentence prediction tasks, while GPT is pretrained on autoregressive language mo...read more
Q82. Explain the attention mechanism
Attention mechanism allows models to focus on specific parts of input sequence when making predictions.
Attention mechanism helps models to weigh the importance of different parts of the input sequence.
It is commonly used in sequence-to-sequence models like machine translation.
Examples include Bahdanau Attention and Transformer models.
Q83. Process of previous organisation
Implemented streamlined processes to improve efficiency and customer satisfaction.
Analyzed existing processes to identify bottlenecks and inefficiencies
Developed and implemented new procedures to streamline operations
Trained staff on new processes to ensure smooth transition
Regularly monitored and evaluated the effectiveness of the new processes
Collaborated with different departments to ensure seamless integration
Q84. What is Trade life cycle
Trade life cycle refers to the stages involved in a trade from initiation to settlement.
Trade initiation: Trade is proposed and agreed upon by parties involved.
Trade execution: Trade is executed on the market.
Trade confirmation: Parties confirm the details of the trade.
Trade settlement: Payment and transfer of securities occur.
Trade reconciliation: Ensuring all details match between parties.
Trade reporting: Reporting the trade to relevant authorities.
Trade lifecycle can vary ...read more
Q85. Org structure details of HR function
The HR function is structured based on the organization's needs and goals.
The HR function may be centralized or decentralized.
It may have different departments such as recruitment, compensation and benefits, employee relations, and training and development.
The HR function may also have HR business partners who work closely with the business units to align HR strategies with business goals.
The HR function may have a Chief HR Officer (CHRO) who is responsible for overseeing the...read more
Q86. What is left join?
Left join is a type of join operation in SQL that returns all rows from the left table and the matched rows from the right table.
Left join combines rows from two tables based on a related column between them.
If there is no match for a row in the right table, NULL values are used for the columns from the right table.
Example: SELECT * FROM table1 LEFT JOIN table2 ON table1.id = table2.id;
Q87. DCF ANALYSIS STEPS WITH BRIEF MENTIONING
DCF analysis involves projecting future cash flows, discounting them back to present value, and calculating the intrinsic value of a company.
Estimate future cash flows of the company
Calculate the discount rate (WACC)
Discount the future cash flows back to present value
Sum up the present values to get the intrinsic value of the company
Compare the intrinsic value with the current market price to determine if the stock is undervalued or overvalued
Q88. What is pricing
Pricing refers to the process of determining the value of a product or service and setting a price for it.
Pricing involves analyzing costs, competition, and customer demand to determine the optimal price point.
Different pricing strategies include cost-plus pricing, value-based pricing, and competitive pricing.
Pricing decisions can impact sales, profitability, and market positioning.
Examples of pricing strategies include premium pricing for luxury products and penetration pric...read more
Q89. for-in vs for-of in javascript
Q90. Difference between table and view
A table is a collection of data stored in rows and columns, while a view is a virtual table created by a query.
Tables store actual data, while views display data from one or more tables based on a query
Tables can be modified directly, while views are read-only
Views can simplify complex queries by pre-defining joins and filters
Views can also provide security by restricting access to certain columns or rows
Q91. Java 8 features with examples
Java 8 introduced several new features including lambda expressions, streams, and default methods.
Lambda expressions allow for functional programming and concise code.
Streams provide a way to process collections of data in a parallel and functional manner.
Default methods allow for adding new functionality to interfaces without breaking existing implementations.
Method references provide a way to refer to methods without invoking them directly.
Optional class provides a way to h...read more
Q92. What is IRR?
IRR stands for Internal Rate of Return. It is a metric used to measure the profitability of an investment.
IRR is the discount rate at which the net present value of cash inflows equals the net present value of cash outflows.
It is used to evaluate the potential profitability of an investment or project.
A higher IRR indicates a more profitable investment.
IRR can be used to compare different investment opportunities with varying cash flows.
For example, if an investment has an IR...read more
Q93. What is FABX?
FABX is not a known acronym or term in finance.
Q94. Explain the accounting rule?
The accounting rule refers to the principles and guidelines that govern the preparation of financial statements.
Accounting rules ensure consistency and accuracy in financial reporting
They are established by accounting standard-setting bodies such as the FASB or IASB
Examples include the revenue recognition principle and the matching principle
Q95. Explain simple interest?
Simple interest is a basic formula used to calculate interest on a principal amount over a certain period of time.
Simple interest is calculated using the formula: I = P * r * t, where I is the interest, P is the principal amount, r is the interest rate, and t is the time period.
The interest rate is usually expressed as a percentage per year.
Simple interest does not take into account compounding, so the interest amount remains constant throughout the period.
For example, if you...read more
Q96. Explain Agile Principles
Agile principles are a set of values and practices that prioritize flexibility, collaboration, and customer satisfaction in software development.
Customer satisfaction through continuous delivery of valuable software
Embracing change and responding to it quickly
Frequent collaboration between developers and business stakeholders
Self-organizing teams that are empowered to make decisions
Regular reflection and adaptation to improve processes
Q97. Impacts of corporate tax cut.
Corporate tax cut can have positive impacts on business operations.
Lower tax rates can increase profits and cash flow, allowing for reinvestment in operations.
Reduced tax burden can also lead to increased hiring and expansion.
However, the long-term effects on the economy and government revenue must be considered.
Example: In 2017, the US corporate tax rate was reduced from 35% to 21%, leading to increased investment and job creation.
Example: In India, corporate tax rates were ...read more
Q98. Merge 2 sorted linked list
Merge 2 sorted linked lists into a single sorted linked list
Create a new linked list to store the merged result
Compare the values of the nodes from both lists and add the smaller one to the result list
Move the pointer of the list with the smaller value to the next node and repeat until both lists are empty
Q99. Automation Tools uses
Common automation tools used in testing include Selenium, Appium, JUnit, TestNG, and Cucumber.
Selenium is widely used for web application testing
Appium is popular for mobile application testing
JUnit and TestNG are commonly used for unit testing in Java
Cucumber is used for behavior-driven development testing
Q100. Thread safety of a class
Ensuring that a class can be safely used by multiple threads concurrently.
Use synchronized keyword to ensure only one thread can access critical sections at a time.
Avoid mutable shared state to prevent race conditions.
Consider using thread-safe data structures like ConcurrentHashMap or AtomicInteger.
Implementing the java.util.concurrent.locks.Lock interface for more fine-grained control over synchronization.
Top HR Questions asked in Astute Energy Distribution Management
Interview Process at Astute Energy Distribution Management
Top Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month