Filter interviews by
Be the first one to contribute and help others!
posted on 23 Aug 2023
I applied via LinkedIn and was interviewed in Jul 2023. There were 4 interview rounds.
Aptitude contain 40questions in 20mins
Suspicious transactions can be identified through various factors such as unusual amount, frequency, location, or behavior.
Look for transactions that are significantly larger or smaller than usual for the customer
Check for transactions that are out of the ordinary in terms of frequency or timing
Consider transactions from high-risk locations or countries
Review transactions that deviate from the customer's typical spendi...
posted on 31 Aug 2023
I applied via Job Fair and was interviewed in Mar 2023. There were 5 interview rounds.
3 coding questions based on Tree and kind of similar to each other. Based on dijkstra algo.
One question that was a bit lengthy, with name 'Tree of Space' you can get it from internet.
I have asked to improved my code from previous round and explain it and then they ask improve your code if if the inputs are in the form of multiple thread.
I applied via Naukri.com and was interviewed before Feb 2020. There was 1 interview round.
Gold appraisal is the process of determining the value of gold based on its purity and weight.
Gold appraisal involves testing the purity of the gold using various methods such as acid testing, X-ray fluorescence, and fire assay.
The weight of the gold is also taken into consideration when appraising its value.
The current market value of gold is also a factor in determining its appraisal value.
Appraisers may use differen...
I applied via Referral and was interviewed in Sep 2021. There were 3 interview rounds.
I applied via Naukri.com and was interviewed before Dec 2018. There were 2 interview rounds.
To assess risk in the field, credit officers can use various methods such as conducting on-site visits, analyzing financial statements, and evaluating market conditions.
Conduct on-site visits to assess the borrower's business operations and evaluate the quality of assets.
Analyze financial statements to understand the borrower's financial health, debt levels, and repayment capacity.
Evaluate market conditions and industr...
I applied via Company Website and was interviewed in May 2021. There were 3 interview rounds.
Exceptions are errors that occur during program execution and can be handled using try-catch blocks.
Checked exceptions: must be handled or declared in the method signature
Unchecked exceptions: occur at runtime and do not need to be declared
Error: serious problems that cannot be handled, such as OutOfMemoryError
Examples: NullPointerException, ArrayIndexOutOfBoundsException
Exceptions should be handled gracefully to prevent application crashes.
Use try-catch blocks to catch exceptions.
Handle exceptions at the appropriate level of abstraction.
Log exceptions to aid in debugging.
Provide meaningful error messages to the user.
Avoid catching generic exceptions.
Use finally blocks to release resources.
Consider using custom exceptions for specific error conditions.
To create a custom read-only list, use the ReadOnlyCollection class in C#.
Create a List
Use the AsReadOnly() method to create a read-only wrapper around the list.
Use the ReadOnlyCollection
Example: List
Example: var readOnlyList = myList.AsReadOnly();
Example: var trulyReadOnlyList = new ReadOnlyCollect
Collections are data structures that store and manipulate groups of related objects.
Collections are used to store and manipulate groups of related objects
They can be classified into three main categories: Lists, Sets, and Maps
Lists maintain the order of elements and allow duplicates (e.g. ArrayList, LinkedList)
Sets do not allow duplicates and do not maintain order (e.g. HashSet, TreeSet)
Maps store key-value pairs and d...
Binary search is a search algorithm that finds the position of a target value within a sorted array.
The array must be sorted before applying binary search
Compare the target value with the middle element of the array
If the target value is smaller, search the left half of the array
If the target value is larger, search the right half of the array
Repeat until the target value is found or the search space is exhausted
posted on 21 Jul 2021
Spring Security is a framework that provides authentication, authorization, and other security features for Java applications.
OAuth2 is an authorization framework that allows third-party applications to access a user's resources without sharing their credentials.
JWT (JSON Web Token) is a compact, URL-safe means of representing claims to be transferred between two parties.
SAML (Security Assertion Markup Language) is an ...
I applied via Recruitment Consultant and was interviewed in Feb 2021. There were 3 interview rounds.
I applied via Naukri.com and was interviewed in Jan 2021. There was 1 interview round.
I have a proven track record of successfully managing change in various organizations.
I am adaptable and flexible in my approach to change
I communicate effectively with all stakeholders to ensure a smooth transition
I am proactive in identifying potential issues and developing contingency plans
I am comfortable with ambiguity and can navigate through uncertainty
Example: Successfully led a team through a major restructuri...
Ability to forget and unlearn is crucial for personal growth and development.
Forgetting and unlearning old habits and beliefs can help in adopting new and better ones.
It requires conscious effort and practice to forget and unlearn things.
Examples include forgetting past mistakes and moving on, unlearning harmful biases and prejudices, and letting go of negative emotions.
Forgetting and unlearning can be difficult but it...
based on 10 reviews
Rating in categories
Team Member
5
salaries
| ₹1.3 L/yr - ₹2 L/yr |
Software Engineer
3
salaries
| ₹3.5 L/yr - ₹7.8 L/yr |
Paytm
FIS
Fiserv
PhonePe