FIS
100+ Suvarna Durga Agro Products Interview Questions and Answers
Q1. What are the first concepts of Object-Oriented Programming (OOP), the SOLID principles, and their implementation? Additionally, can you explain two design patterns theoretically and describe how you have utiliz...
read moreUnderstanding OOP concepts, SOLID principles, design patterns, and C# features for software engineering.
OOP concepts include encapsulation, inheritance, polymorphism, and abstraction.
SOLID principles consist of Single Responsibility, Open/Closed, Liskov Substitution, Interface Segregation, and Dependency Inversion.
Design patterns like Singleton and Factory Method are commonly used in software development.
In real-world context, Singleton pattern ensures a class has only one in...read more
Q2. What is empathy and how to deal with the customer if customer irritate with your service?
Empathy is the ability to understand and share the feelings of others. To deal with an irritated customer, listen actively, apologize sincerely, offer solutions, and show genuine concern.
Listen actively to the customer's concerns and frustrations.
Apologize sincerely for any inconvenience caused.
Offer solutions or alternatives to address the customer's issue.
Show genuine concern and understanding for the customer's feelings.
Maintain a calm and professional demeanor throughout ...read more
Q3. MVC architecture in dot net. asp.net core architecture and how it is different from plain dot net. Kestrel web server.
MVC architecture in ASP.NET Core is a design pattern that separates an application into three main components: Model, View, and Controller.
MVC architecture in ASP.NET Core helps in organizing code and improving maintainability.
ASP.NET Core is a cross-platform, high-performance framework for building modern, cloud-based, Internet-connected applications.
Kestrel is a cross-platform web server for ASP.NET Core that is lightweight and fast.
ASP.NET Core is different from plain .NET...read more
Q4. What are the basic OOPS concepts of Java? What is the difference between String and StringBuffer?
Basic OOPS concepts of Java include inheritance, encapsulation, polymorphism, and abstraction. String is immutable while StringBuffer is mutable.
Inheritance: Allows a class to inherit properties and behavior from another class.
Encapsulation: Bundling data and methods that operate on the data into a single unit.
Polymorphism: Ability to present the same interface for different data types.
Abstraction: Hiding the implementation details and showing only the necessary features.
Stri...read more
Q5. Which type of Job you expected like development oriented or Testing Oriented.
Q6. 1. What are convertible Bonds ? 3. What are Currency Rate Swaps ? 4. Different type of Derivative markets and explain difference between futures & forwards? 5. What is Total Return Swaps ? 6. What is Liquidity ...
read moreQuestions related to finance and banking
Convertible bonds are a type of bond that can be converted into shares of the issuing company
Currency rate swaps involve exchanging interest payments in different currencies
Derivative markets include options, futures, and swaps. Futures are standardized contracts traded on exchanges, while forwards are customized contracts traded over-the-counter
Total return swaps involve exchanging the total return of an asset or portfolio for a fixed ...read more
Q7. What do you understand by Three way handshake ?
Three way handshake is a method used in TCP/IP communication to establish a connection between a client and a server.
Three way handshake involves three steps: SYN, SYN-ACK, and ACK.
The client sends a SYN packet to the server to initiate the connection.
The server responds with a SYN-ACK packet, acknowledging the client's request.
Finally, the client sends an ACK packet to the server, confirming the connection establishment.
This process ensures reliable and synchronized communic...read more
Q8. What Are JOINS in SQL and difference between Inner JOIN and equi JOIN? Illustrate with an example.
JOINS are used in SQL to combine data from two or more tables based on a related column.
Inner JOIN returns only the matching rows from both tables
Equi JOIN is a type of Inner JOIN where the join condition is based on equality between two columns
Example: SELECT * FROM table1 INNER JOIN table2 ON table1.column = table2.column
Q9. What are the ways to enhance performance for web applications.
Ways to enhance performance for web applications include optimizing code, using caching mechanisms, minimizing HTTP requests, and utilizing content delivery networks.
Optimize code by removing unnecessary code, using efficient algorithms, and minimizing database queries.
Implement caching mechanisms such as browser caching, server-side caching, and database caching to reduce load times.
Minimize HTTP requests by combining CSS and JavaScript files, using image sprites, and reduci...read more
Q10. On which layer switch and router work and their types ?
Switches work on layer 2 and routers work on layer 3. Types of switches include unmanaged, managed, and layer 3 switches.
Switches work on layer 2 of the OSI model and routers work on layer 3.
Switches are used to connect devices within a network and forward data based on MAC addresses.
Types of switches include unmanaged, managed, and layer 3 switches.
Routers are used to connect different networks and forward data based on IP addresses.
Types of routers include edge routers, cor...read more
Q11. 3. Difference between the agile methodologies and how to find & filter the apt one for the project.
Q12. How would you debug an application to solve a production defect that was raised?
I would start by reproducing the issue, analyzing logs, checking code changes, and using debugging tools.
Reproduce the issue to understand the exact scenario where the defect occurs.
Analyze logs to identify any error messages or warnings related to the defect.
Check recent code changes to see if any recent modifications could have caused the defect.
Use debugging tools like breakpoints, logging, and profiling to trace the issue in the code.
Collaborate with team members to brain...read more
Q13. A situation when you are getting a shouting and you do not have data to justify as to why a certain thing went wrong, what would you do ?
Stay calm, acknowledge the situation, and offer to investigate and provide a report.
Remain calm and professional
Acknowledge the concern and apologize for any inconvenience
Offer to investigate the issue and provide a report as soon as possible
Ask for any additional information or details that may help in the investigation
Take steps to prevent similar issues from occurring in the future
Q14. How you can handle exceptions in case of inheritance
Exceptions in inheritance can be handled by using try-catch blocks in the derived class.
Use try-catch blocks in the derived class to catch exceptions thrown by the base class methods.
Handle exceptions specific to the derived class in the catch block.
Consider using super() to call the base class constructor within the try block.
Avoid catching general exceptions unless necessary to maintain code clarity.
Ensure proper exception handling to prevent unexpected program behavior.
Q15. Describe your current automation framework and tools being used
Our automation framework is built using Selenium WebDriver and TestNG.
We use Selenium WebDriver for browser automation
TestNG is used for test management and reporting
We also use Apache POI for data-driven testing
Our framework is designed to be modular and scalable
We have implemented page object model design pattern
We use Jenkins for continuous integration and deployment
Q16. How would you implement breaking changes in the application?
Breaking changes can be implemented by following a structured process to minimize impact on users.
Communicate the changes to stakeholders in advance
Provide detailed documentation on the changes and how to adapt to them
Implement versioning to allow users to choose when to adopt the changes
Use feature flags to gradually roll out the changes and monitor impact
Run thorough testing to ensure the changes do not introduce new bugs
Q17. What is carry in private equity ?
Carry refers to the share of profits that private equity fund managers receive after meeting certain performance benchmarks.
Carry is a form of incentive compensation for private equity fund managers.
It is typically a percentage of the profits earned by the fund after a certain hurdle rate has been met.
For example, if the hurdle rate is 8% and the fund earns a return of 15%, the carry would be calculated on the 7% excess return.
Carry is usually split between the general partne...read more
Q18. How you select the color pallette. What first things comes into your mind when designing an app for let's say banking app. What was your strength and weekness. How do you handle bad feedback from clients.
I select color palette based on brand guidelines, target audience, and industry standards. For a banking app, I consider trust, security, and professionalism.
Consider brand guidelines and colors to maintain consistency
Think about target audience and their preferences
Take into account industry standards for financial apps
For a banking app, prioritize trust, security, and professionalism
Strength: Strong understanding of color theory and design principles
Weakness: Sometimes stru...read more
Q19. Divide the array in two Halves and keep each half in ascending order without using new Array?
Divide array in two halves and keep each half in ascending order without using new Array.
Use Array.sort() method to sort the original array
Use Array.slice() method to divide the array into two halves
Use Array.reverse() method to reverse the second half of the array
Q20. What are Interfaces and Why do we need interfaces?
Interfaces are contracts that define a set of methods and properties that a class must implement.
Interfaces provide a way to achieve abstraction and polymorphism in object-oriented programming.
They allow for loose coupling between classes and promote code reusability.
Interfaces can be used to define common behavior across multiple classes.
Example: IDisposable interface in C# ensures that an object can be properly disposed of when it is no longer needed.
Example: IComparable in...read more
Q21. What is the significance of header file in programming language?
Header files in programming languages contain declarations of functions, variables, and constants that are used in multiple source files.
Header files allow for modular programming by separating interface from implementation.
They help in reducing code duplication by providing a central location for commonly used declarations.
Header files are included in source files using #include directive.
Examples of header files in C programming language include stdio.h, math.h, and string....read more
Q22. Difference between ios and android What come to your mind when talk about UK Okay with rotation shift Any leave in near future
iOS and Android are two different mobile operating systems with different features and user interfaces.
iOS is exclusive to Apple devices while Android is used by multiple manufacturers
iOS has a more closed system with limited customization options while Android is more open and customizable
iOS has a more consistent user interface across devices while Android can vary depending on the manufacturer
Android has a wider range of price points for devices while iOS devices tend to b...read more
Q23. How many round object can fit in a square box
The number of round objects that can fit in a square box depends on the size of the objects and the box.
The number of round objects that can fit in a square box depends on the size of the objects and the box dimensions.
If the round objects are small and the box is large, more objects can fit.
If the round objects are large and the box is small, fewer objects can fit.
The packing efficiency of the objects also plays a role in determining the number that can fit.
Q24. What would you do if a defect can't be fixed?
I would analyze the impact of the defect and explore alternative solutions.
Analyze the impact of the defect on the overall system functionality
Discuss with the team to brainstorm alternative solutions
Consider workarounds or temporary fixes while a permanent solution is being developed
Q25. CIA Triad and What will we lost in DOS attack ?
CIA Triad ensures data security. DOS attack can cause loss of availability.
CIA Triad stands for Confidentiality, Integrity, and Availability.
It ensures data security by protecting against unauthorized access, alteration, and destruction.
DOS attack can cause loss of availability by overwhelming a system with traffic or requests.
This can result in the system becoming unresponsive or crashing, making the data unavailable.
For example, a website may become unavailable during a DO...read more
Q26. 3. What is OTC and the process of OTC? 4. Why we hire you and what is your in the next 5 years
OTC stands for Over-The-Counter. It refers to the trading of financial instruments directly between two parties without the involvement of an exchange.
OTC trading involves direct communication between the buyer and seller, without the need for a centralized exchange.
OTC markets are less regulated than exchange-traded markets.
OTC trading is common in the foreign exchange, bond, and derivatives markets.
The process of OTC involves negotiation, pricing, and settlement between the...read more
Q27. What is inheritance and Examples in inheritance.
Inheritance is a mechanism in object-oriented programming where a class is based on another class.
Inheritance allows a subclass to inherit properties and methods from a superclass.
The subclass can also add its own properties and methods.
Examples include a Car class inheriting from a Vehicle class, or a Dog class inheriting from an Animal class.
Q28. What if your Diwali leaves get cancel 2 days before diwali What is best about your phone? How you make best use of unlimited wifi?
I would try to negotiate with my manager and see if I can take the leaves on some other dates.
I would first try to talk to my manager and explain the situation
I would try to negotiate and see if I can take the leaves on some other dates
If that is not possible, I would try to make the most of the remaining days and celebrate Diwali with my family and friends
I would also try to take some time off during the weekend to make up for the lost time
Q29. Do you know Windows Server Administration?
Yes, I have experience in Windows Server Administration.
I have experience in managing and maintaining Windows Server 2012 and 2016.
I am proficient in Active Directory, DNS, DHCP, and Group Policy Management.
I have experience in configuring and troubleshooting network services and protocols.
I am familiar with PowerShell scripting for automation and task scheduling.
I have experience in managing virtualization technologies such as Hyper-V and VMware.
Q30. A VM migration is failing to other host, what could be the possible reasons?
Possible reasons for VM migration failure to other host
Incompatible hardware or software on the destination host
Insufficient resources on the destination host
Network connectivity issues between the source and destination hosts
Security restrictions preventing the migration
Incorrect configuration of the virtual machine
Lack of permissions for the migration process
Q31. How do you manage the annual ratings?
Annual ratings are managed through a performance management system that includes goal setting, regular feedback, and performance evaluations.
Set clear and measurable goals for each employee at the beginning of the year
Provide regular feedback and coaching throughout the year to ensure employees are on track to meet their goals
Conduct formal performance evaluations at the end of the year to assess employee performance against their goals and provide ratings accordingly
Use a st...read more
Q32. How do you identify vulnerability on a system or network Device
Identifying vulnerabilities involves scanning for weaknesses and analyzing potential threats.
Perform regular vulnerability scans using tools like Nessus or OpenVAS
Analyze system logs and network traffic for suspicious activity
Stay up-to-date on security patches and advisories
Conduct penetration testing to simulate attacks and identify weaknesses
Utilize threat intelligence sources to stay informed of emerging threats
Implement security best practices such as strong passwords an...read more
Q33. What is private equity ?
Private equity is a type of investment where funds are raised from investors to acquire or invest in companies that are not publicly traded.
Private equity firms typically buy companies with the intention of improving their operations and profitability before selling them for a profit.
Private equity investments are usually made in mature companies with a proven track record of success.
Private equity firms may also provide capital to help companies expand or make acquisitions.
E...read more
Q34. Which packets are used to perform DOS attack?
Various types of packets can be used for DOS attacks, including SYN floods, UDP floods, and ICMP floods.
SYN floods involve sending a large number of SYN packets to overwhelm the target server's resources.
UDP floods involve sending a large number of UDP packets to consume the target server's bandwidth.
ICMP floods involve sending a large number of ICMP packets to flood the target server with traffic.
Other types of packets, such as HTTP GET requests or DNS queries, can also be u...read more
Q35. How we find out the factor on bloomberg
Factors on Bloomberg can be found by searching for the relevant security and selecting the 'FA' function.
Search for the security on Bloomberg
Select the 'FA' function
Review the available factors for the security
Q36. What are the design patterns in C#
Design patterns in C# are reusable solutions to common problems in software design.
Some common design patterns in C# include Singleton, Factory, Observer, and Strategy.
Design patterns help in creating maintainable and scalable code by providing proven solutions to common design problems.
For example, the Singleton pattern ensures that a class has only one instance and provides a global point of access to it.
Q37. What the main difference between a Bind and an Equity instrument?
A bind instrument is a debt instrument while an equity instrument represents ownership in a company.
A bind instrument is a loan that must be repaid with interest while an equity instrument represents ownership in a company.
Bind instruments have a fixed rate of return while equity instruments have variable returns based on the company's performance.
Examples of bind instruments include bonds and debentures while examples of equity instruments include stocks and shares.
Q38. What are the deliverables of a Business Analyst.
The deliverables of a Business Analyst include requirements documents, process models, and test plans.
Requirements documents: Business Analysts gather and document the functional and non-functional requirements of a project.
Process models: Business Analysts create process flow diagrams and models to illustrate the current and future state of business processes.
Test plans: Business Analysts develop test plans and test cases to ensure that the implemented solution meets the spe...read more
Q39. How to cut cake in 8 pieces in only 3 slices?
Cut the cake in half horizontally, then stack the halves and cut in half vertically.
Cut the cake in half horizontally with the first slice.
Stack the halves and cut in half vertically with the second slice.
Finally, cut the stack diagonally with the third slice to get 8 pieces.
Ensure the slices intersect at the center of the cake for even pieces.
Q40. What's IRD, IDD and BRD
IRD stands for Interface Requirements Document, IDD stands for Interface Design Document, and BRD stands for Business Requirements Document.
IRD is a document that outlines the requirements for the interface between different systems or components.
IDD is a document that describes the design of the interface, including the data formats, protocols, and communication methods.
BRD is a document that captures the business requirements for a project or system, including the objective...read more
Q41. 1. Java OOPs Concepts. With examples?
Q42. Difference between Abstraction and Encapsulation?
Q43. Describe the ceremonies in Agile methodology
Agile ceremonies include daily stand-ups, sprint planning, sprint review, and retrospective meetings.
Daily stand-ups: brief meetings to discuss progress and plan for the day
Sprint planning: meeting to plan the upcoming sprint
Sprint review: meeting to review the completed sprint and demo the work
Retrospective meetings: meeting to reflect on the sprint and identify areas for improvement
Q44. Observables Input Output ForJoin MergeMap Interceptors
Observables are used in RxJS to handle asynchronous operations, input/output refers to data flow, ForJoin and MergeMap are operators, interceptors are used for handling HTTP requests.
Observables are used for handling asynchronous operations in RxJS
Input/Output refers to the flow of data into and out of a system
ForJoin is used to combine multiple observables into a single observable
MergeMap is an operator used to merge observables and map their values
Interceptors are used in A...read more
Q45. What do you understand by BPO?
BPO stands for Business Process Outsourcing. It refers to the practice of contracting specific business processes to a third-party service provider.
BPO involves outsourcing non-core business functions to external vendors.
It helps companies focus on their core competencies and reduce costs.
Common BPO services include customer support, technical support, data entry, and back-office operations.
BPO can be onshore (within the same country), nearshore (in neighboring countries), or...read more
Q46. Preferred Location and DOJ
I prefer to work in a location that is easily accessible and has a good work-life balance. My preferred date of joining is within a month.
Prefer location with good work-life balance
Location should be easily accessible
Preferred date of joining within a month
Q47. What is derivatives, types of derivatives
Derivatives are financial contracts that derive their value from an underlying asset or security.
Types of derivatives include futures, options, swaps, and forwards.
Futures are contracts to buy or sell an asset at a predetermined price and date.
Options give the holder the right, but not the obligation, to buy or sell an asset at a predetermined price and date.
Swaps involve exchanging cash flows based on different financial instruments.
Forwards are similar to futures, but are c...read more
Q48. What is cx service , how can you tackle a difficult cx
CX service refers to customer experience service, and tackling a difficult CX involves active listening, empathy, problem-solving, and effective communication.
Active listening to understand the customer's concerns and needs
Showing empathy towards the customer's situation and emotions
Problem-solving to find a solution that meets the customer's expectations
Effective communication to explain the resolution and ensure customer satisfaction
Q49. How do you prioritize tasks when you have multiple deadlines to meet
I prioritize tasks based on deadlines, importance, and impact on overall goals.
I start by identifying all tasks and their respective deadlines.
I prioritize tasks based on the urgency of the deadline and the impact on overall goals.
I break down larger tasks into smaller, manageable sub-tasks to ensure progress is made consistently.
I communicate with stakeholders to set realistic expectations and adjust priorities if necessary.
I use tools like to-do lists, calendars, and projec...read more
Q50. What is your experience in Functional QA?
I have over 5 years of experience in Functional QA, including creating test plans, executing test cases, and identifying defects.
Experience creating test plans and test cases
Identifying defects and working with development teams to resolve them
Utilizing automation tools to streamline testing processes
Collaborating with cross-functional teams to ensure product quality
Experience in regression testing and performance testing
Q51. Where to store token in angular
Tokens in Angular can be stored in local storage, session storage, or as cookies.
Store tokens in local storage for persistent storage across browser sessions
Use session storage for tokens that should be cleared when the browser is closed
Store tokens as cookies for secure transmission over HTTPS
Q52. How will you prioritize tasks from different stakeholders
I will prioritize tasks based on their urgency, impact, and stakeholder importance.
Assess the urgency of each task and prioritize accordingly
Consider the impact of each task on the organization and prioritize accordingly
Take into account the importance of each stakeholder and prioritize accordingly
Communicate with stakeholders to understand their priorities and adjust accordingly
Q53. How to check which file is taking in space in system
To check which file is taking up space in the system, you can use commands like du, df, and find.
Use 'du' command to display disk usage of files and directories
Use 'df' command to display disk space usage of file systems
Use 'find' command to search for files based on size
Q54. What are different type of SWAPS
SWAPS are financial contracts that allow two parties to exchange cash flows based on different financial instruments.
Interest Rate Swaps: exchange of fixed and floating interest rate payments
Currency Swaps: exchange of principal and interest payments in different currencies
Credit Default Swaps: insurance against default on a debt obligation
Commodity Swaps: exchange of cash flows based on commodity prices
Equity Swaps: exchange of cash flows based on equity returns
Q55. How the waterfall model works?
Waterfall model is a linear sequential approach to software development.
Requirements are gathered and analyzed
Design is created based on requirements
Implementation of design is done
Testing is performed to ensure quality
Deployment and maintenance of the software
Each phase must be completed before moving to the next
Changes are difficult to implement once a phase is completed
Q56. What is the role of transfer agency in investment banking?
Transfer agency in investment banking is responsible for maintaining accurate records of investors' transactions and account balances.
Transfer agency handles the processing of investor transactions, including subscriptions, redemptions, and transfers.
They maintain accurate records of investor account balances and ensure timely and accurate reporting.
Transfer agency also handles investor communications and provides customer service support.
Examples of transfer agencies in inve...read more
Q57. What is a virtual function in c++?
A virtual function in C++ is a function that is declared within a base class and is redefined by a derived class.
Virtual functions allow a derived class to provide a specific implementation of a function that is already defined in a base class.
They are used in polymorphism to achieve runtime binding.
Example: virtual void display() = 0; // pure virtual function
Q58. What is common between HTTP, FTP, and Telnet?
They are all application layer protocols used for communication over a network.
They all operate at the application layer of the OSI model.
They all use client-server architecture for communication.
They all transmit data over a network.
Examples: HTTP is used for web browsing, FTP for file transfer, and Telnet for remote access.
Q59. 3. How to reduce attrition?
Q60. Why do you want to start with Accounting?
I have a passion for numbers and problem-solving, and I believe accounting is the foundation of finance.
I enjoy working with numbers and analyzing financial data.
I have strong attention to detail and organizational skills, which are essential in accounting.
I believe accounting is the language of business and provides a solid foundation for a career in finance.
I am interested in helping businesses make informed financial decisions and improve their overall performance.
Q61. What is trade life cycle, MBS, Types of corporate actions
Trade life cycle refers to the stages involved in a trade, MBS stands for Mortgage-Backed Securities, and corporate actions are events that affect a company's securities.
Trade life cycle includes order initiation, execution, confirmation, settlement, and post-trade activities.
Mortgage-Backed Securities (MBS) are financial instruments backed by a pool of mortgage loans.
Types of corporate actions include dividends, stock splits, mergers, acquisitions, and spin-offs.
Q62. Present example when you had to comunícate properly for project
I effectively communicated project updates to team members through regular meetings and email updates.
Scheduled weekly team meetings to discuss project progress and address any issues
Sent out detailed email updates outlining project milestones and deadlines
Encouraged open communication among team members to ensure everyone was on the same page
Q63. Explain concept of Polymorphism
Polymorphism is the ability of a single function or method to operate on different data types.
Polymorphism allows objects of different classes to be treated as objects of a common superclass.
There are two types of polymorphism: compile-time (method overloading) and runtime (method overriding).
Example: Animal class with methods eat() and sleep(). Dog and Cat classes can inherit from Animal and override these methods.
Q64. How will you solve the customer's problem ,
I will listen to the customer's problem, empathize with them, and provide a solution that meets their needs.
Listen actively to the customer's problem and ask clarifying questions
Empathize with the customer and acknowledge their frustration
Provide a solution that meets the customer's needs and preferences
Follow up with the customer to ensure their problem has been resolved
Q65. what is pesticide paradox, what is deferred status
Pesticide paradox refers to the phenomenon where running the same set of tests repeatedly can decrease their effectiveness. Deferred status is when a bug is not fixed immediately but is scheduled to be fixed later.
Pesticide paradox occurs when running the same tests repeatedly leads to the tests no longer finding new bugs.
To avoid pesticide paradox, testers need to regularly review and update their test cases.
Deferred status is when a bug is acknowledged but not fixed immedia...read more
Q66. How to segregate alphabet and numbers in a table
Use SQL queries to segregate alphabet and numbers in a table
Use the SQL function REGEXP to filter out alphabets and numbers
For example, to select only alphabets: SELECT column_name FROM table_name WHERE column_name REGEXP '^[a-zA-Z]'
For numbers: SELECT column_name FROM table_name WHERE column_name REGEXP '^[0-9]'
Q67. What is GAP and principles of revenue recognition
GAP refers to Generally Accepted Accounting Principles and revenue recognition principles dictate when and how revenue should be recorded.
GAP is a set of accounting standards used to ensure consistency in financial reporting.
Revenue recognition principles determine the timing and amount of revenue that should be recorded.
Revenue is typically recognized when it is earned and realized or realizable.
Examples of revenue recognition principles include the percentage of completion ...read more
Q68. Past work experience ? Experience in cloud ? ITIL ? INCIDENT TOOLS ?
I have experience in cloud, ITIL, and incident tools.
Worked with AWS and Azure cloud platforms
Implemented ITIL processes for incident management
Proficient in incident management tools like ServiceNow and JIRA
Q69. Journal entry for accrual
A journal entry for accrual is used to record expenses or revenues that have been incurred but not yet paid or received.
Accruals are recorded at the end of an accounting period to ensure that expenses and revenues are matched to the correct period.
The journal entry for an expense accrual involves debiting the expense account and crediting the accrued liability account.
The journal entry for a revenue accrual involves debiting the accrued revenue account and crediting the reven...read more
Q70. Explain about end to end activities like nfr validation, nfr gathering, wlm etc
End-to-end activities like NFR validation, gathering, and WLM ensure quality and performance of software.
NFR validation involves testing non-functional requirements like performance, security, and usability.
NFR gathering involves identifying and documenting non-functional requirements.
WLM (Workload Management) involves managing the workload on the system to ensure optimal performance.
Other end-to-end activities may include testing, deployment, and monitoring of the software.
T...read more
Q71. Can FIS employer become a ceo ?
Yes, as long as they have the necessary qualifications and experience.
Qualifications and experience are the key factors in becoming a CEO.
FIS employer can become a CEO if they have the necessary skills and experience.
It is not uncommon for employees to work their way up to the CEO position.
However, it ultimately depends on the company's hiring and promotion policies.
Q72. What would you do to increase the process
To increase the process, I would implement automation, streamline communication, and regularly review and update procedures.
Implement automation tools to reduce manual tasks and improve efficiency
Streamline communication channels to ensure quick and effective information sharing
Regularly review and update procedures to identify areas for improvement and optimize the process
Q73. What data points to cover for underwriting?
Data points for underwriting include financial history, credit score, employment status, and insurance claims.
Financial history (income, assets, debts)
Credit score
Employment status
Insurance claims history
Q74. explain above concepts in detail
The candidate is asked to explain certain concepts in detail related to software engineering.
Explain the concepts thoroughly with examples
Provide a clear and concise explanation of each concept
Demonstrate understanding of the concepts through practical examples
Q75. What is women empowerment?
Women empowerment refers to the process of providing women with the power to make decisions and control their lives.
It involves giving women access to education, healthcare, and job opportunities.
It also includes promoting gender equality and challenging gender stereotypes.
Examples of women empowerment include women's right to vote, equal pay for equal work, and women in leadership positions.
Women empowerment benefits not only women but also their families, communities, and s...read more
Q76. Different oops concepts and their role in frameworks developy
Object-oriented programming concepts play a vital role in developing frameworks.
Inheritance: allows a class to inherit properties and methods from another class
Encapsulation: hiding the implementation details of a class from other classes
Polymorphism: ability of an object to take on many forms
Abstraction: focusing on essential features of an object while hiding irrelevant details
Examples: Selenium WebDriver framework uses inheritance to extend the functionality of the base cl...read more
Q77. What is mining financial account?
Q78. How are created computer accounting?
Q79. Activity Lifecycle and behaviour on screen rotation
The activity lifecycle describes the different states an activity goes through during its lifetime.
When the screen is rotated, the activity is destroyed and recreated
The activity goes through the onPause(), onStop(), and onDestroy() methods
The onSaveInstanceState() method is called to save the activity's state
The onCreate() method is called again to recreate the activity
The onRestoreInstanceState() method is called to restore the saved state
Q80. What are Use case diagrams
Use case diagrams are visual representations of the interactions between users and a system.
They depict the system's functionality from the user's perspective.
They show the different actors and their roles in the system.
They illustrate the various use cases and their relationships.
They help in identifying the requirements of the system.
They aid in communication between stakeholders.
Example: A use case diagram for an online shopping system would show actors like customer, admi...read more
Q81. Is python a case sensitive?
Yes, Python is case sensitive.
Python is case sensitive, meaning variables, functions, and other identifiers must be typed with the correct capitalization to be recognized.
For example, 'myVar' and 'MyVar' would be considered as two different variables in Python.
Using incorrect capitalization can result in errors or unexpected behavior in Python code.
Q82. What is hashmap and its usage
HashMap is a data structure that stores key-value pairs and provides fast retrieval of values based on their keys.
HashMap is part of the Java Collections Framework.
It allows null values and null keys.
Keys must be unique, but values can be duplicated.
HashMap uses hashing to store and retrieve elements efficiently.
It provides constant-time performance for basic operations like get, put, and remove.
Example: HashMap
employeeSalaries = new HashMap<>();
Q83. Explain opps concept in java
OOPs concept in Java refers to Object-Oriented Programming principles like inheritance, encapsulation, polymorphism, and abstraction.
Inheritance: Allows a class to inherit properties and behavior from another class.
Encapsulation: Bundling data and methods that operate on the data into a single unit.
Polymorphism: Ability to present the same interface for different data types.
Abstraction: Hiding the implementation details and showing only the necessary features.
Q84. Write a script to fetch file from FTP server and load it into dB.
Q85. How to optimize the performance and cost in cloud
Q86. How to manage resiliency in microservices?
Q87. Tell me about FIS
FIS is a global financial technology company providing software solutions for banking and payments.
FIS offers a wide range of software solutions for financial institutions, including core banking systems, payment processing, and risk management.
The company serves clients in over 130 countries and processes over 75 billion transactions annually.
FIS was ranked #1 in the FinTech 100 list in 2020.
Some of FIS's popular products include FIS Core Banking, FIS Payments, and FIS Risk ...read more
Q88. What is inheritance
Inheritance is a concept in object-oriented programming where a class can inherit attributes and methods from another class.
Allows a class to inherit attributes and methods from another class
Promotes code reusability and reduces redundancy
Creates a parent-child relationship between classes
Derived class can access the properties and methods of the base class
Example: Class 'Car' can inherit from class 'Vehicle' to reuse common vehicle attributes and methods
Q89. Data sharing between compontent
Data sharing between components is crucial for efficient communication and collaboration.
Use a common data format for easy interpretation and integration
Implement secure data transfer protocols to protect sensitive information
Ensure data consistency and accuracy through proper validation and verification
Consider the scalability and performance of the data sharing mechanism
Examples include RESTful APIs, message queues, and shared databases
Q90. how will you test any application
I will test any application by creating test cases, executing them, analyzing results, and reporting bugs.
Understand the requirements and functionalities of the application
Create test cases based on requirements and user scenarios
Execute test cases manually or using automation tools
Analyze test results and compare them with expected outcomes
Report bugs and issues found during testing
Perform regression testing to ensure previous functionality is not affected by new changes
Q91. Why Observables over promise
Observables provide a more flexible and powerful way to handle asynchronous data streams compared to promises.
Observables can handle multiple values over time, while promises can only handle a single value.
Observables can be cancelled, while promises are not cancellable.
Observables support operators for transforming, combining, and filtering data streams.
Observables provide better error handling capabilities compared to promises.
Q92. Difference between MD5 and SHA 2
MD5 is a hash function that produces a 128-bit hash value while SHA-2 is a family of hash functions that produce hash values of varying lengths.
MD5 produces a fixed-length hash value of 128 bits while SHA-2 produces hash values of 224, 256, 384, or 512 bits.
MD5 is considered less secure than SHA-2 due to its susceptibility to collision attacks.
SHA-2 is a family of hash functions that includes SHA-224, SHA-256, SHA-384, and SHA-512.
SHA-2 is widely used for digital signatures, ...read more
Q93. What is data type of auto?
The data type of auto is determined by the value assigned to it at compile time.
The auto keyword in C++ is used to automatically deduce the data type of a variable based on its initializer.
The data type of auto can be any valid C++ type, including fundamental types, user-defined types, or even complex types like function pointers or lambda expressions.
The actual data type of auto is resolved by the compiler during compilation, so it can vary depending on the context and the v...read more
Q94. Hierarchy of knowledge objects in splunk
Splunk has a hierarchy of knowledge objects to organize and manage data.
The hierarchy includes apps, add-ons, and configurations.
Apps contain dashboards, reports, and alerts.
Add-ons provide additional functionality to apps.
Configurations include indexes, sourcetypes, and fields.
Knowledge objects can be shared across the hierarchy.
Higher level objects inherit settings from lower level objects.
Q95. How to configure Backup in cloud?
Q96. How We maintain security in Application?
Maintaining security in applications involves implementing encryption, authentication, authorization, and regular security audits.
Implement encryption to protect data in transit and at rest
Use strong authentication mechanisms like multi-factor authentication
Implement proper authorization controls to restrict access to sensitive data
Regularly conduct security audits and penetration testing to identify vulnerabilities
Q97. Explain procedure of application deployment on Windows server.
Application deployment on Windows server involves packaging the application, configuring the server, and deploying the application using tools like IIS or PowerShell.
Package the application into a deployable format such as a zip file or MSI installer
Configure the Windows server with necessary dependencies and settings for the application to run
Deploy the application using tools like Internet Information Services (IIS) or PowerShell scripts
Test the deployed application to ensu...read more
Q98. Explain lending.Origination and servicing
Lending origination and servicing involves the process of granting loans and managing them throughout their lifecycle.
Lending origination refers to the process of evaluating loan applications, determining eligibility, and approving or rejecting loans.
Lending servicing involves managing the loan after it has been originated, including collecting payments, handling customer inquiries, and managing any changes or modifications to the loan terms.
Origination and servicing activiti...read more
Q99. what is difference between tcp and udp
TCP is a connection-oriented protocol while UDP is a connectionless protocol.
TCP provides reliable, ordered, and error-checked delivery of data while UDP does not guarantee any of these.
TCP is slower but more reliable while UDP is faster but less reliable.
TCP is used for applications that require high reliability and accuracy while UDP is used for applications that require speed and efficiency.
Examples of TCP-based applications include email, file transfer, and web browsing w...read more
Q100. Explain SOLID principles
SOLID principles are a set of five design principles in object-oriented programming to make software designs more understandable, flexible, and maintainable.
S - Single Responsibility Principle: A class should have only one reason to change.
O - Open/Closed Principle: Software entities should be open for extension but closed for modification.
L - Liskov Substitution Principle: Objects of a superclass should be replaceable with objects of its subclasses without affecting the func...read more
Top HR Questions asked in Suvarna Durga Agro Products
Interview Process at Suvarna Durga Agro Products
Top Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month