Cybage
50+ RBL FinServe Interview Questions and Answers
Q1. Count Ways to Reach the N-th Stair Problem Statement
You are provided with a number of stairs, and initially, you are located at the 0th stair. You need to reach the Nth stair, and you can climb one or two step...read more
The task is to determine the number of distinct ways to climb from the 0th to the Nth stair, where you can climb one or two steps at a time.
Use dynamic programming to solve this problem efficiently.
Define a recursive function to calculate the number of ways to reach each stair.
Consider base cases for 0 and 1 stairs, and then use the recursive formula to calculate for N stairs.
Use modulo 10^9+7 to handle large numbers and avoid overflow.
Optimize the solution by storing interme...read more
JVM allocates 5 types of memory areas: Method Area, Heap, Stack, PC Register, and Native Method Stack.
Method Area stores class structures, method data, and runtime constants.
Heap is where objects are allocated and memory for new objects is dynamically allocated.
Stack stores local variables and partial results, and each thread has its own stack.
PC Register holds the address of the JVM instruction currently being executed.
Native Method Stack contains native method information.
Yes, we can override or replace the embedded Tomcat server in Spring Boot.
Spring Boot allows for customization of embedded servers by excluding the default server dependency and adding a different server dependency.
For example, to replace Tomcat with Jetty, exclude Tomcat and add Jetty dependencies in the pom.xml file.
Configuration properties can also be used to customize the embedded server in Spring Boot applications.
@ComponentScan is used in class files to enable component scanning for Spring beans.
Enables Spring to automatically detect and register Spring components (beans) within the specified package(s)
Reduces the need for manual bean registration in configuration files
Can specify base packages to scan for components, or use default behavior to scan the current package and its sub-packages
The starter dependency of the Spring Boot module is spring-boot-starter.
The starter dependency provides a set of common dependencies for a specific type of application.
It helps in reducing the configuration overhead and simplifies the setup process.
For example, 'spring-boot-starter-web' includes dependencies for building web applications.
Hibernate provides optimistic and pessimistic concurrency control strategies.
Optimistic concurrency control: Uses versioning or timestamp to check for concurrent updates.
Pessimistic concurrency control: Locks the database records to prevent concurrent updates.
Examples: @Version annotation for optimistic concurrency, LockMode.UPGRADE for pessimistic concurrency.
Q7. What is Web API (applicaation programming interfeace) ?
Web API is a set of protocols and tools for building software applications that communicate with each other through the internet.
Web API allows different software applications to communicate with each other over the internet.
It uses a set of protocols and tools to enable this communication.
Web API is commonly used in web development to allow web applications to interact with each other.
Examples of Web APIs include Google Maps API, Twitter API, and Facebook API.
Q8. How to skip first 10 and last 10 rows in excel source and send to destination
Skip first and last 10 rows in Excel source and send to destination
Use a library like Apache POI or OpenXML to read and write Excel files
Identify the range of rows to be skipped using row numbers or cell values
Copy the remaining rows to a new Excel file or sheet and save it as destination
Access specifiers in Java control the visibility of classes, methods, and variables.
There are four access specifiers in Java: public, private, protected, and default.
Public: accessible from any other class.
Private: accessible only within the same class.
Protected: accessible within the same package and subclasses.
Default: accessible only within the same package.
Q10. What is the Hashmap in Java? Hashmap vs Lists
Hashmap is a data structure in Java that stores key-value pairs. It provides fast retrieval and insertion of elements.
Hashmap uses hashing to store and retrieve elements based on keys
It allows null values and only one null key
Lists are ordered collections while Hashmap is not
Lists allow duplicate elements while Hashmap does not
Q11. What is Diamond structure problem and how can it be resolved
Diamond structure problem occurs when a class inherits from two classes that have a common base class.
Diamond structure problem is a common issue in multiple inheritance where a class inherits from two classes that have a common base class.
This can lead to ambiguity in the inheritance hierarchy and can cause issues with method overriding and variable access.
One way to resolve the diamond structure problem is by using virtual inheritance, where the common base class is inherit...read more
Q12. Which code segement starts jquery execution?
The code segment that starts jquery execution is $(document).ready(function(){...});
$() is a shorthand for jQuery() function
document refers to the HTML document object
ready() method waits for the document to be fully loaded
function(){} is the code block that executes when the document is ready
Data encapsulation is the concept of bundling data with the methods that operate on that data, restricting access to the data from outside the bundle.
Data encapsulation is a fundamental principle of object-oriented programming.
It allows for the data to be hidden and only accessed through the defined methods.
Encapsulation helps in achieving data security and prevents accidental modification of data.
Example: In a class representing a bank account, the account balance data shoul...read more
Q14. Interface vs abstract class whats the difference
Interface defines only method signatures while abstract class can have both method signatures and implementations.
An interface can be implemented by multiple classes while an abstract class can only be extended by one class.
An abstract class can have constructors while an interface cannot.
An abstract class can have non-abstract methods while an interface can only have abstract methods.
An abstract class can have instance variables while an interface cannot.
Example of interface...read more
Q15. What is the need for SpringBoot?
SpringBoot is a framework that simplifies the development of Java applications by providing a lightweight, opinionated approach.
SpringBoot eliminates the need for boilerplate code and configuration, allowing developers to focus on writing business logic.
It provides a wide range of built-in features and libraries, such as embedded servers, dependency management, and auto-configuration.
SpringBoot promotes modular and scalable application development through its support for micr...read more
Q16. explain how jdbc is used for connecting to database
JDBC is a Java API that allows Java programs to connect to and interact with databases.
JDBC provides a standard interface for connecting to different types of databases.
To connect to a database using JDBC, you need to load the database driver, establish a connection, create a statement, execute SQL queries, and process the results.
Example: Class.forName("com.mysql.jdbc.Driver"); Connection conn = DriverManager.getConnection("jdbc:mysql://localhost:3306/mydatabase", "username"...read more
Q17. How do you handle error in MVC?
Errors in MVC can be handled using try-catch blocks, custom error pages, and logging.
Use try-catch blocks to catch exceptions and handle them appropriately
Create custom error pages to display user-friendly error messages
Implement logging to track errors and debug issues
Use ModelState.IsValid to validate user input and prevent errors
Use global error handling filters to handle errors across the application
Q18. What are security settings in IIS?
Security settings in IIS are configurations that help protect web applications from unauthorized access and attacks.
IIS Manager allows for configuring security settings for websites and applications
Authentication settings can be configured to control access to resources
IP and domain restrictions can be set to allow or deny access to specific clients
SSL/TLS settings can be configured to encrypt traffic between clients and servers
Request filtering can be used to block requests ...read more
No, static methods cannot be overridden in Java.
Static methods belong to the class itself, not to any specific instance of the class.
Subclasses can have static methods with the same signature as the parent class, but they are not considered overridden.
Example: Parent class has a static method 'display()', and subclass also has a static method 'display()'. These are two separate methods, not an override.
Q20. What is application pool in IIS?
Application pool is a container for applications hosted on IIS.
It provides a separate process and memory space for each application.
It helps in isolating applications from each other.
It allows for better resource management and application availability.
It can be configured with different settings like .NET framework version, identity, etc.
Q21. What is server side validation?
Server side validation is the process of validating user input on the server before processing it.
It ensures that the data received from the client is valid and secure.
It prevents malicious attacks and data breaches.
It reduces the load on the client-side and improves performance.
Examples include checking for required fields, data type, length, and format.
It is an essential part of web application security.
Dependency injection is a design pattern where components are given their dependencies rather than creating them internally.
Allows for easier testing by providing mock dependencies
Promotes loose coupling between components
Improves code reusability and maintainability
Examples: Constructor injection, Setter injection, Interface injection
Hibernate caching is a mechanism used to improve the performance of applications by reducing the number of database queries.
Hibernate caching stores frequently accessed data in memory to reduce the need for repeated database queries.
There are different levels of caching in Hibernate, such as first-level cache and second-level cache.
First-level cache is associated with the Session object and is enabled by default.
Second-level cache is shared across multiple sessions and can be...read more
Q24. Why use Advanced Java?
Advanced Java is used to develop complex and high-performance applications that require advanced features and functionalities.
Advanced Java provides advanced features like multithreading, networking, and database connectivity.
It allows for the development of robust and scalable enterprise applications.
Advanced Java frameworks like Spring and Hibernate simplify application development.
It enables the creation of secure and efficient web applications.
Advanced Java is widely used...read more
Q25. Different keys sql , use of surrogate key
SQL keys and use of surrogate key
SQL keys are used to uniquely identify records in a table
Primary key is a unique identifier for a record
Foreign key is a reference to a primary key in another table
Surrogate key is a system-generated unique identifier for a record
Surrogate keys are useful when there is no natural primary key
Q26. Which Angular version have you used
I have used Angular version 8 and 9 in my previous projects.
Used Angular 8 for a project that required advanced routing and lazy loading features
Upgraded to Angular 9 to take advantage of improved performance and Ivy rendering engine
Q27. What make you interested in coding?
I am fascinated by the problem-solving aspect of coding and the ability to create something from scratch.
Enjoy the challenge of solving complex problems
Love the creativity involved in building something new
Appreciate the logical thinking required in coding
Passionate about technology and innovation
Q28. 2. Tell what you know about Cyabge.
Cybage is a global technology consulting organization specializing in outsourced product engineering services.
Founded in 1995 and headquartered in Pune, India
Provides software development, testing, and maintenance services
Has a presence in North America, Europe, and Asia-Pacific regions
Serves industries such as healthcare, retail, banking, and finance
Has partnerships with companies like Microsoft, IBM, and Amazon Web Services
Q29. What are action filters?
Action filters are attributes that can be applied to controller actions to modify the way they behave.
Action filters are used to perform tasks before or after an action method executes.
They can be used to modify the result of an action method.
Examples include authentication filters, caching filters, and exception filters.
Q30. What is media type formatters?
Media type formatters are used to serialize and deserialize data in Web API.
Media type formatters are responsible for converting data between CLR objects and their serialized representation.
They are used in Web API to format the response data based on the client's request.
Examples of media type formatters include JSON, XML, and BSON.
Developers can create custom media type formatters to support other data formats.
Q31. What is react? What is css? What is redux?
React is a JavaScript library for building user interfaces. CSS is a styling language used to design web pages. Redux is a predictable state container for JavaScript apps.
React is used for building reusable UI components
CSS is used to style and layout web pages
Redux is used for managing the state of an application
React and Redux are often used together to build complex web applications
Q32. What is attribute handling?
Attribute handling refers to the management and manipulation of attributes in software development.
Attributes are characteristics or properties of an object or entity.
Attribute handling involves defining, accessing, modifying, and deleting attributes.
Attributes can be used to store data, control behavior, or provide metadata.
Examples of attribute handling include setting the color of a button, retrieving the size of a file, or changing the font of a text.
Attribute handling is...read more
Q33. What is serialization?
Serialization is the process of converting an object into a format that can be stored or transmitted.
Serialization is used to save the state of an object and recreate it later.
It is commonly used in network communication to transmit data between different systems.
Examples of serialization formats include JSON, XML, and binary formats like Protocol Buffers.
Serialization can also be used for caching and data persistence.
Q34. What is selector method?
Selector method is used to select and manipulate elements in a web page using CSS selectors.
Selector method is a part of CSS (Cascading Style Sheets).
It is used to select and manipulate HTML elements based on their attributes, classes, and IDs.
Examples of selector methods include getElementById(), getElementsByClassName(), and querySelectorAll().
Q35. Ssis checkpoint and breakpoint use
SSIS checkpoint and breakpoint are used for debugging and error handling in SSIS packages.
Checkpoint saves the package progress and restarts from the last successful checkpoint in case of failure.
Breakpoint pauses the package execution at a specific point to allow debugging and troubleshooting.
Both can be set at the package level or individual task level.
Checkpoint uses a checkpoint file to store the progress information.
Breakpoint can be set by right-clicking on a task and s...read more
Q36. What do you know about Cybage?
Cybage is a global technology consulting organization specializing in outsourced product engineering services.
Cybage is a global technology consulting organization
Specializes in outsourced product engineering services
Offers services in software development, testing, and maintenance
Has expertise in various domains including healthcare, finance, and retail
Has a strong focus on quality and customer satisfaction
Q37. What is CORS in microservices
CORS (Cross-Origin Resource Sharing) is a security feature that allows or restricts access to resources from different domains.
CORS is used to prevent unauthorized access to resources from different domains
It is implemented by adding specific headers to HTTP responses
CORS can be configured to allow or restrict access based on the origin domain
Examples of CORS headers include Access-Control-Allow-Origin and Access-Control-Allow-Methods
Q38. Explain what is LINQ?
LINQ (Language Integrated Query) is a feature in C# that allows for querying data from different data sources using a uniform syntax.
LINQ allows for querying data from collections, databases, XML, and more.
It provides a set of standard query operators like Where, Select, OrderBy, etc.
LINQ queries are written in a declarative syntax similar to SQL.
Example: var result = from num in numbers where num % 2 == 0 select num;
Q39. Different types of joins in SQL
Different types of joins in SQL include inner join, left join, right join, and full outer join.
Inner join: Returns rows when there is a match in both tables
Left join: Returns all rows from the left table and the matched rows from the right table
Right join: Returns all rows from the right table and the matched rows from the left table
Full outer join: Returns rows when there is a match in either table
Q40. What is REST? Explain Post
REST stands for Representational State Transfer, a software architectural style for designing networked applications.
REST is based on the idea of treating server objects as resources that can be created, updated, and deleted using standard HTTP methods.
It uses a stateless communication protocol, meaning each request from a client to a server must contain all the information necessary to understand the request.
RESTful APIs typically use endpoints to represent resources, with e...read more
Q41. Different between spring and springboot.
Spring is a framework for building Java applications, while Spring Boot is a tool for quickly creating Spring-based applications.
Spring provides a comprehensive framework for building Java applications, while Spring Boot is a tool that simplifies the process of creating Spring-based applications.
Spring requires more configuration and setup, while Spring Boot provides a more streamlined approach.
Spring Boot includes an embedded server, making it easier to deploy and run applic...read more
Q42. What are OOPS Concepts ?
OOPS Concepts are fundamental principles of Object-Oriented Programming, including Inheritance, Encapsulation, Polymorphism, and Abstraction.
Inheritance: Allows a class to inherit properties and behavior from another class.
Encapsulation: Bundling data and methods that operate on the data into a single unit.
Polymorphism: Ability to present the same interface for different data types.
Abstraction: Hiding the complex implementation details and showing only the necessary features.
Q43. Talk for 5 mins on any given topic.
Discussing the impact of artificial intelligence on society
Introduction to artificial intelligence and its applications
Positive impacts of AI on society such as improved healthcare and efficiency
Negative impacts of AI like job displacement and privacy concerns
Ethical considerations in AI development and usage
Future implications of AI on society
Q44. What is dataflow of react
React dataflow is unidirectional, from parent to child components via props and from child to parent via callbacks.
React follows a unidirectional data flow architecture.
Parent components pass data down to child components via props.
Child components can update the parent's state via callbacks.
This helps to maintain a clear and predictable flow of data throughout the application.
Redux can be used to manage more complex data flows.
Q45. explain oops concept also mvc architech
OOPs concept focuses on objects and classes, while MVC architecture separates the application into Model, View, and Controller components.
OOPs concept involves encapsulation, inheritance, polymorphism, and abstraction.
MVC architecture separates the application logic into Model (data), View (presentation), and Controller (interaction) components.
Example of OOPs concept: Creating a class 'Car' with properties like 'color' and methods like 'drive'.
Example of MVC architecture: A ...read more
Q46. Types of join in sql
Types of join in SQL
Inner join: returns only the matching rows from both tables
Left join: returns all rows from the left table and matching rows from the right table
Right join: returns all rows from the right table and matching rows from the left table
Full outer join: returns all rows from both tables
Cross join: returns the Cartesian product of both tables
Q47. what is interface
An interface is a contract that defines a set of methods that a class must implement.
An interface provides a way to achieve multiple inheritance in Java.
Interfaces are used to achieve abstraction and loose coupling.
Classes can implement multiple interfaces.
Interfaces can have default methods and static methods.
Example: The Comparable interface in Java is used to compare objects.
Q48. Explain oops concepts
OOPs concepts are fundamental principles in object-oriented programming that help in organizing and designing code.
Encapsulation: Bundling data and methods that operate on the data into a single unit (class).
Inheritance: Allowing a class to inherit properties and behavior from another class.
Polymorphism: The ability of objects to take on multiple forms or have multiple behaviors.
Abstraction: Hiding complex implementation details and showing only the necessary features of an o...read more
Q49. Reverse an array code
Reverse an array of strings in place
Iterate through half of the array and swap elements at opposite ends
Use a temporary variable to store the value being swapped
Q50. What is polymorphism
Polymorphism is the ability of a function or method to behave differently based on the object it is acting upon.
Polymorphism allows objects of different classes to be treated as objects of a common superclass.
It enables a single interface to be used for different data types.
Examples include method overloading and method overriding in object-oriented programming.
Q51. explain the oops concepts
Object-oriented programming concepts like inheritance, encapsulation, polymorphism, and abstraction.
Inheritance: Allows a class to inherit properties and behavior from another class.
Encapsulation: Bundling data and methods that operate on the data into a single unit.
Polymorphism: Ability to present the same interface for different data types.
Abstraction: Hiding the complex implementation details and showing only the necessary features.
Q52. Wrapper classes in java
Wrapper classes are used to convert primitive data types into objects.
Wrapper classes provide methods to convert primitive data types into objects and vice versa
Wrapper classes are immutable
Wrapper classes are used in collections and generics
Examples of wrapper classes include Integer, Double, Boolean, etc.
Q53. Abstract vs interface
Abstract classes are partially implemented classes while interfaces are fully abstract classes.
Abstract classes can have both implemented and abstract methods while interfaces can only have abstract methods.
A class can implement multiple interfaces but can only inherit from one abstract class.
Abstract classes can have constructors while interfaces cannot.
Interfaces are used for achieving multiple inheritance in Java.
Abstract classes are used for creating a base class for othe...read more
Q54. Explain collection framework.
Collection framework in Java provides a set of interfaces and classes to store and manipulate groups of objects.
Provides interfaces like List, Set, and Map for different types of collections
Classes like ArrayList, HashSet, and HashMap implement these interfaces
Allows easy manipulation and iteration over collections
Provides algorithms like sorting and searching for collections
Introduced in Java 1.2
Q55. Containers in SSIS
Containers in SSIS are used to group related tasks and provide a logical flow for the package.
Containers can be used to group tasks into a single unit of work
There are several types of containers in SSIS, including Sequence, For Loop, and Foreach Loop
Containers can be nested to create complex workflows
Containers can have precedence constraints to control the order in which tasks are executed
Q56. Strings in Java
Strings in Java are sequences of characters used to store and manipulate text data.
Strings in Java are immutable, meaning their values cannot be changed once they are created.
String objects can be created using the 'new' keyword or by directly assigning a string literal.
Common string operations in Java include concatenation, substring extraction, and comparison.
Q57. Pipes in Angular
Pipes in Angular are used for transforming data in templates.
Pipes are used to format data before displaying it in the view.
Angular provides built-in pipes like date, currency, uppercase, lowercase, etc.
Custom pipes can also be created for specific formatting needs.
Pipes can be chained together for multiple transformations.
Example: {{ birthday | date:'MM/dd/yyyy' }} will format the birthday date.
Top HR Questions asked in RBL FinServe
Interview Process at RBL FinServe
Top Software Engineer Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month