Premium Employer

FIS

3.9
based on 5.3k Reviews
Filter interviews by

100+ Suvarna Durga Agro Products Interview Questions and Answers

Updated 13 Jan 2025
Popular Designations

Q1. What are the first concepts of Object-Oriented Programming (OOP), the SOLID principles, and their implementation? Additionally, can you explain two design patterns theoretically and describe how you have utiliz...

read more
Ans.

Understanding OOP concepts, SOLID principles, design patterns, and C# features for software engineering.

  • OOP concepts include encapsulation, inheritance, polymorphism, and abstraction.

  • SOLID principles consist of Single Responsibility, Open/Closed, Liskov Substitution, Interface Segregation, and Dependency Inversion.

  • Design patterns like Singleton and Factory Method are commonly used in software development.

  • In real-world context, Singleton pattern ensures a class has only one in...read more

Add your answer

Q2. What is empathy and how to deal with the customer if customer irritate with your service?

Ans.

Empathy is the ability to understand and share the feelings of others. To deal with an irritated customer, listen actively, apologize sincerely, offer solutions, and show genuine concern.

  • Listen actively to the customer's concerns and frustrations.

  • Apologize sincerely for any inconvenience caused.

  • Offer solutions or alternatives to address the customer's issue.

  • Show genuine concern and understanding for the customer's feelings.

  • Maintain a calm and professional demeanor throughout ...read more

View 2 more answers

Q3. MVC architecture in dot net. asp.net core architecture and how it is different from plain dot net. Kestrel web server.

Ans.

MVC architecture in ASP.NET Core is a design pattern that separates an application into three main components: Model, View, and Controller.

  • MVC architecture in ASP.NET Core helps in organizing code and improving maintainability.

  • ASP.NET Core is a cross-platform, high-performance framework for building modern, cloud-based, Internet-connected applications.

  • Kestrel is a cross-platform web server for ASP.NET Core that is lightweight and fast.

  • ASP.NET Core is different from plain .NET...read more

Add your answer

Q4. What are the basic OOPS concepts of Java? What is the difference between String and StringBuffer?

Ans.

Basic OOPS concepts of Java include inheritance, encapsulation, polymorphism, and abstraction. String is immutable while StringBuffer is mutable.

  • Inheritance: Allows a class to inherit properties and behavior from another class.

  • Encapsulation: Bundling data and methods that operate on the data into a single unit.

  • Polymorphism: Ability to present the same interface for different data types.

  • Abstraction: Hiding the implementation details and showing only the necessary features.

  • Stri...read more

Add your answer
Discover Suvarna Durga Agro Products interview dos and don'ts from real experiences

Q5. Which type of Job you expected like development oriented or Testing Oriented.

Add your answer

Q6. 1. What are convertible Bonds ? 3. What are Currency Rate Swaps ? 4. Different type of Derivative markets and explain difference between futures & forwards? 5. What is Total Return Swaps ? 6. What is Liquidity ...

read more
Ans.

Questions related to finance and banking

  • Convertible bonds are a type of bond that can be converted into shares of the issuing company

  • Currency rate swaps involve exchanging interest payments in different currencies

  • Derivative markets include options, futures, and swaps. Futures are standardized contracts traded on exchanges, while forwards are customized contracts traded over-the-counter

  • Total return swaps involve exchanging the total return of an asset or portfolio for a fixed ...read more

Add your answer
Are these interview questions helpful?

Q7. What do you understand by Three way handshake ?

Ans.

Three way handshake is a method used in TCP/IP communication to establish a connection between a client and a server.

  • Three way handshake involves three steps: SYN, SYN-ACK, and ACK.

  • The client sends a SYN packet to the server to initiate the connection.

  • The server responds with a SYN-ACK packet, acknowledging the client's request.

  • Finally, the client sends an ACK packet to the server, confirming the connection establishment.

  • This process ensures reliable and synchronized communic...read more

View 1 answer

Q8. What Are JOINS in SQL and difference between Inner JOIN and equi JOIN? Illustrate with an example.

Ans.

JOINS are used in SQL to combine data from two or more tables based on a related column.

  • Inner JOIN returns only the matching rows from both tables

  • Equi JOIN is a type of Inner JOIN where the join condition is based on equality between two columns

  • Example: SELECT * FROM table1 INNER JOIN table2 ON table1.column = table2.column

Add your answer
Share interview questions and help millions of jobseekers 🌟

Q9. What are the ways to enhance performance for web applications.

Ans.

Ways to enhance performance for web applications include optimizing code, using caching mechanisms, minimizing HTTP requests, and utilizing content delivery networks.

  • Optimize code by removing unnecessary code, using efficient algorithms, and minimizing database queries.

  • Implement caching mechanisms such as browser caching, server-side caching, and database caching to reduce load times.

  • Minimize HTTP requests by combining CSS and JavaScript files, using image sprites, and reduci...read more

Add your answer

Q10. On which layer switch and router work and their types ?

Ans.

Switches work on layer 2 and routers work on layer 3. Types of switches include unmanaged, managed, and layer 3 switches.

  • Switches work on layer 2 of the OSI model and routers work on layer 3.

  • Switches are used to connect devices within a network and forward data based on MAC addresses.

  • Types of switches include unmanaged, managed, and layer 3 switches.

  • Routers are used to connect different networks and forward data based on IP addresses.

  • Types of routers include edge routers, cor...read more

Add your answer

Q11. 3. Difference between the agile methodologies and how to find & filter the apt one for the project.

Add your answer

Q12. How would you debug an application to solve a production defect that was raised?

Ans.

I would start by reproducing the issue, analyzing logs, checking code changes, and using debugging tools.

  • Reproduce the issue to understand the exact scenario where the defect occurs.

  • Analyze logs to identify any error messages or warnings related to the defect.

  • Check recent code changes to see if any recent modifications could have caused the defect.

  • Use debugging tools like breakpoints, logging, and profiling to trace the issue in the code.

  • Collaborate with team members to brain...read more

Add your answer
Asked in
SME Interview

Q13. A situation when you are getting a shouting and you do not have data to justify as to why a certain thing went wrong, what would you do ?

Ans.

Stay calm, acknowledge the situation, and offer to investigate and provide a report.

  • Remain calm and professional

  • Acknowledge the concern and apologize for any inconvenience

  • Offer to investigate the issue and provide a report as soon as possible

  • Ask for any additional information or details that may help in the investigation

  • Take steps to prevent similar issues from occurring in the future

Add your answer

Q14. How you can handle exceptions in case of inheritance

Ans.

Exceptions in inheritance can be handled by using try-catch blocks in the derived class.

  • Use try-catch blocks in the derived class to catch exceptions thrown by the base class methods.

  • Handle exceptions specific to the derived class in the catch block.

  • Consider using super() to call the base class constructor within the try block.

  • Avoid catching general exceptions unless necessary to maintain code clarity.

  • Ensure proper exception handling to prevent unexpected program behavior.

Add your answer

Q15. Describe your current automation framework and tools being used

Ans.

Our automation framework is built using Selenium WebDriver and TestNG.

  • We use Selenium WebDriver for browser automation

  • TestNG is used for test management and reporting

  • We also use Apache POI for data-driven testing

  • Our framework is designed to be modular and scalable

  • We have implemented page object model design pattern

  • We use Jenkins for continuous integration and deployment

Add your answer

Q16. How would you implement breaking changes in the application?

Ans.

Breaking changes can be implemented by following a structured process to minimize impact on users.

  • Communicate the changes to stakeholders in advance

  • Provide detailed documentation on the changes and how to adapt to them

  • Implement versioning to allow users to choose when to adopt the changes

  • Use feature flags to gradually roll out the changes and monitor impact

  • Run thorough testing to ensure the changes do not introduce new bugs

Add your answer

Q17. What is carry in private equity ?

Ans.

Carry refers to the share of profits that private equity fund managers receive after meeting certain performance benchmarks.

  • Carry is a form of incentive compensation for private equity fund managers.

  • It is typically a percentage of the profits earned by the fund after a certain hurdle rate has been met.

  • For example, if the hurdle rate is 8% and the fund earns a return of 15%, the carry would be calculated on the 7% excess return.

  • Carry is usually split between the general partne...read more

View 1 answer

Q18. How you select the color pallette. What first things comes into your mind when designing an app for let's say banking app. What was your strength and weekness. How do you handle bad feedback from clients.

Ans.

I select color palette based on brand guidelines, target audience, and industry standards. For a banking app, I consider trust, security, and professionalism.

  • Consider brand guidelines and colors to maintain consistency

  • Think about target audience and their preferences

  • Take into account industry standards for financial apps

  • For a banking app, prioritize trust, security, and professionalism

  • Strength: Strong understanding of color theory and design principles

  • Weakness: Sometimes stru...read more

Add your answer

Q19. Divide the array in two Halves and keep each half in ascending order without using new Array?

Ans.

Divide array in two halves and keep each half in ascending order without using new Array.

  • Use Array.sort() method to sort the original array

  • Use Array.slice() method to divide the array into two halves

  • Use Array.reverse() method to reverse the second half of the array

Add your answer

Q20. What are Interfaces and Why do we need interfaces?

Ans.

Interfaces are contracts that define a set of methods and properties that a class must implement.

  • Interfaces provide a way to achieve abstraction and polymorphism in object-oriented programming.

  • They allow for loose coupling between classes and promote code reusability.

  • Interfaces can be used to define common behavior across multiple classes.

  • Example: IDisposable interface in C# ensures that an object can be properly disposed of when it is no longer needed.

  • Example: IComparable in...read more

Add your answer

Q21. What is the significance of header file in programming language?

Ans.

Header files in programming languages contain declarations of functions, variables, and constants that are used in multiple source files.

  • Header files allow for modular programming by separating interface from implementation.

  • They help in reducing code duplication by providing a central location for commonly used declarations.

  • Header files are included in source files using #include directive.

  • Examples of header files in C programming language include stdio.h, math.h, and string....read more

Add your answer

Q22. Difference between ios and android What come to your mind when talk about UK Okay with rotation shift Any leave in near future

Ans.

iOS and Android are two different mobile operating systems with different features and user interfaces.

  • iOS is exclusive to Apple devices while Android is used by multiple manufacturers

  • iOS has a more closed system with limited customization options while Android is more open and customizable

  • iOS has a more consistent user interface across devices while Android can vary depending on the manufacturer

  • Android has a wider range of price points for devices while iOS devices tend to b...read more

Add your answer

Q23. How many round object can fit in a square box

Ans.

The number of round objects that can fit in a square box depends on the size of the objects and the box.

  • The number of round objects that can fit in a square box depends on the size of the objects and the box dimensions.

  • If the round objects are small and the box is large, more objects can fit.

  • If the round objects are large and the box is small, fewer objects can fit.

  • The packing efficiency of the objects also plays a role in determining the number that can fit.

Add your answer

Q24. What would you do if a defect can't be fixed?

Ans.

I would analyze the impact of the defect and explore alternative solutions.

  • Analyze the impact of the defect on the overall system functionality

  • Discuss with the team to brainstorm alternative solutions

  • Consider workarounds or temporary fixes while a permanent solution is being developed

Add your answer

Q25. CIA Triad and What will we lost in DOS attack ?

Ans.

CIA Triad ensures data security. DOS attack can cause loss of availability.

  • CIA Triad stands for Confidentiality, Integrity, and Availability.

  • It ensures data security by protecting against unauthorized access, alteration, and destruction.

  • DOS attack can cause loss of availability by overwhelming a system with traffic or requests.

  • This can result in the system becoming unresponsive or crashing, making the data unavailable.

  • For example, a website may become unavailable during a DO...read more

Add your answer

Q26. 3. What is OTC and the process of OTC? 4. Why we hire you and what is your in the next 5 years

Ans.

OTC stands for Over-The-Counter. It refers to the trading of financial instruments directly between two parties without the involvement of an exchange.

  • OTC trading involves direct communication between the buyer and seller, without the need for a centralized exchange.

  • OTC markets are less regulated than exchange-traded markets.

  • OTC trading is common in the foreign exchange, bond, and derivatives markets.

  • The process of OTC involves negotiation, pricing, and settlement between the...read more

Add your answer

Q27. What is inheritance and Examples in inheritance.

Ans.

Inheritance is a mechanism in object-oriented programming where a class is based on another class.

  • Inheritance allows a subclass to inherit properties and methods from a superclass.

  • The subclass can also add its own properties and methods.

  • Examples include a Car class inheriting from a Vehicle class, or a Dog class inheriting from an Animal class.

Add your answer

Q28. What if your Diwali leaves get cancel 2 days before diwali What is best about your phone? How you make best use of unlimited wifi?

Ans.

I would try to negotiate with my manager and see if I can take the leaves on some other dates.

  • I would first try to talk to my manager and explain the situation

  • I would try to negotiate and see if I can take the leaves on some other dates

  • If that is not possible, I would try to make the most of the remaining days and celebrate Diwali with my family and friends

  • I would also try to take some time off during the weekend to make up for the lost time

Add your answer

Q29. Do you know Windows Server Administration?

Ans.

Yes, I have experience in Windows Server Administration.

  • I have experience in managing and maintaining Windows Server 2012 and 2016.

  • I am proficient in Active Directory, DNS, DHCP, and Group Policy Management.

  • I have experience in configuring and troubleshooting network services and protocols.

  • I am familiar with PowerShell scripting for automation and task scheduling.

  • I have experience in managing virtualization technologies such as Hyper-V and VMware.

Add your answer

Q30. A VM migration is failing to other host, what could be the possible reasons?

Ans.

Possible reasons for VM migration failure to other host

  • Incompatible hardware or software on the destination host

  • Insufficient resources on the destination host

  • Network connectivity issues between the source and destination hosts

  • Security restrictions preventing the migration

  • Incorrect configuration of the virtual machine

  • Lack of permissions for the migration process

Add your answer

Q31. How do you manage the annual ratings?

Ans.

Annual ratings are managed through a performance management system that includes goal setting, regular feedback, and performance evaluations.

  • Set clear and measurable goals for each employee at the beginning of the year

  • Provide regular feedback and coaching throughout the year to ensure employees are on track to meet their goals

  • Conduct formal performance evaluations at the end of the year to assess employee performance against their goals and provide ratings accordingly

  • Use a st...read more

Add your answer

Q32. How do you identify vulnerability on a system or network Device

Ans.

Identifying vulnerabilities involves scanning for weaknesses and analyzing potential threats.

  • Perform regular vulnerability scans using tools like Nessus or OpenVAS

  • Analyze system logs and network traffic for suspicious activity

  • Stay up-to-date on security patches and advisories

  • Conduct penetration testing to simulate attacks and identify weaknesses

  • Utilize threat intelligence sources to stay informed of emerging threats

  • Implement security best practices such as strong passwords an...read more

Add your answer

Q33. What is private equity ?

Ans.

Private equity is a type of investment where funds are raised from investors to acquire or invest in companies that are not publicly traded.

  • Private equity firms typically buy companies with the intention of improving their operations and profitability before selling them for a profit.

  • Private equity investments are usually made in mature companies with a proven track record of success.

  • Private equity firms may also provide capital to help companies expand or make acquisitions.

  • E...read more

View 1 answer

Q34. Which packets are used to perform DOS attack?

Ans.

Various types of packets can be used for DOS attacks, including SYN floods, UDP floods, and ICMP floods.

  • SYN floods involve sending a large number of SYN packets to overwhelm the target server's resources.

  • UDP floods involve sending a large number of UDP packets to consume the target server's bandwidth.

  • ICMP floods involve sending a large number of ICMP packets to flood the target server with traffic.

  • Other types of packets, such as HTTP GET requests or DNS queries, can also be u...read more

Add your answer

Q35. How we find out the factor on bloomberg

Ans.

Factors on Bloomberg can be found by searching for the relevant security and selecting the 'FA' function.

  • Search for the security on Bloomberg

  • Select the 'FA' function

  • Review the available factors for the security

Add your answer

Q36. What are the design patterns in C#

Ans.

Design patterns in C# are reusable solutions to common problems in software design.

  • Some common design patterns in C# include Singleton, Factory, Observer, and Strategy.

  • Design patterns help in creating maintainable and scalable code by providing proven solutions to common design problems.

  • For example, the Singleton pattern ensures that a class has only one instance and provides a global point of access to it.

Add your answer

Q37. What the main difference between a Bind and an Equity instrument?

Ans.

A bind instrument is a debt instrument while an equity instrument represents ownership in a company.

  • A bind instrument is a loan that must be repaid with interest while an equity instrument represents ownership in a company.

  • Bind instruments have a fixed rate of return while equity instruments have variable returns based on the company's performance.

  • Examples of bind instruments include bonds and debentures while examples of equity instruments include stocks and shares.

Add your answer

Q38. What are the deliverables of a Business Analyst.

Ans.

The deliverables of a Business Analyst include requirements documents, process models, and test plans.

  • Requirements documents: Business Analysts gather and document the functional and non-functional requirements of a project.

  • Process models: Business Analysts create process flow diagrams and models to illustrate the current and future state of business processes.

  • Test plans: Business Analysts develop test plans and test cases to ensure that the implemented solution meets the spe...read more

View 1 answer

Q39. How to cut cake in 8 pieces in only 3 slices?

Ans.

Cut the cake in half horizontally, then stack the halves and cut in half vertically.

  • Cut the cake in half horizontally with the first slice.

  • Stack the halves and cut in half vertically with the second slice.

  • Finally, cut the stack diagonally with the third slice to get 8 pieces.

  • Ensure the slices intersect at the center of the cake for even pieces.

Add your answer

Q40. What's IRD, IDD and BRD

Ans.

IRD stands for Interface Requirements Document, IDD stands for Interface Design Document, and BRD stands for Business Requirements Document.

  • IRD is a document that outlines the requirements for the interface between different systems or components.

  • IDD is a document that describes the design of the interface, including the data formats, protocols, and communication methods.

  • BRD is a document that captures the business requirements for a project or system, including the objective...read more

View 1 answer

Q41. 1. Java OOPs Concepts. With examples?

Add your answer

Q42. Difference between Abstraction and Encapsulation?

Add your answer

Q43. Describe the ceremonies in Agile methodology

Ans.

Agile ceremonies include daily stand-ups, sprint planning, sprint review, and retrospective meetings.

  • Daily stand-ups: brief meetings to discuss progress and plan for the day

  • Sprint planning: meeting to plan the upcoming sprint

  • Sprint review: meeting to review the completed sprint and demo the work

  • Retrospective meetings: meeting to reflect on the sprint and identify areas for improvement

Add your answer

Q44. Observables Input Output ForJoin MergeMap Interceptors

Ans.

Observables are used in RxJS to handle asynchronous operations, input/output refers to data flow, ForJoin and MergeMap are operators, interceptors are used for handling HTTP requests.

  • Observables are used for handling asynchronous operations in RxJS

  • Input/Output refers to the flow of data into and out of a system

  • ForJoin is used to combine multiple observables into a single observable

  • MergeMap is an operator used to merge observables and map their values

  • Interceptors are used in A...read more

Add your answer

Q45. What do you understand by BPO?

Ans.

BPO stands for Business Process Outsourcing. It refers to the practice of contracting specific business processes to a third-party service provider.

  • BPO involves outsourcing non-core business functions to external vendors.

  • It helps companies focus on their core competencies and reduce costs.

  • Common BPO services include customer support, technical support, data entry, and back-office operations.

  • BPO can be onshore (within the same country), nearshore (in neighboring countries), or...read more

View 2 more answers

Q46. Preferred Location and DOJ

Ans.

I prefer to work in a location that is easily accessible and has a good work-life balance. My preferred date of joining is within a month.

  • Prefer location with good work-life balance

  • Location should be easily accessible

  • Preferred date of joining within a month

Add your answer

Q47. What is derivatives, types of derivatives

Ans.

Derivatives are financial contracts that derive their value from an underlying asset or security.

  • Types of derivatives include futures, options, swaps, and forwards.

  • Futures are contracts to buy or sell an asset at a predetermined price and date.

  • Options give the holder the right, but not the obligation, to buy or sell an asset at a predetermined price and date.

  • Swaps involve exchanging cash flows based on different financial instruments.

  • Forwards are similar to futures, but are c...read more

Add your answer

Q48. What is cx service , how can you tackle a difficult cx

Ans.

CX service refers to customer experience service, and tackling a difficult CX involves active listening, empathy, problem-solving, and effective communication.

  • Active listening to understand the customer's concerns and needs

  • Showing empathy towards the customer's situation and emotions

  • Problem-solving to find a solution that meets the customer's expectations

  • Effective communication to explain the resolution and ensure customer satisfaction

Add your answer

Q49. How do you prioritize tasks when you have multiple deadlines to meet

Ans.

I prioritize tasks based on deadlines, importance, and impact on overall goals.

  • I start by identifying all tasks and their respective deadlines.

  • I prioritize tasks based on the urgency of the deadline and the impact on overall goals.

  • I break down larger tasks into smaller, manageable sub-tasks to ensure progress is made consistently.

  • I communicate with stakeholders to set realistic expectations and adjust priorities if necessary.

  • I use tools like to-do lists, calendars, and projec...read more

Add your answer

Q50. What is your experience in Functional QA?

Ans.

I have over 5 years of experience in Functional QA, including creating test plans, executing test cases, and identifying defects.

  • Experience creating test plans and test cases

  • Identifying defects and working with development teams to resolve them

  • Utilizing automation tools to streamline testing processes

  • Collaborating with cross-functional teams to ensure product quality

  • Experience in regression testing and performance testing

Add your answer

Q51. Where to store token in angular

Ans.

Tokens in Angular can be stored in local storage, session storage, or as cookies.

  • Store tokens in local storage for persistent storage across browser sessions

  • Use session storage for tokens that should be cleared when the browser is closed

  • Store tokens as cookies for secure transmission over HTTPS

Add your answer

Q52. How will you prioritize tasks from different stakeholders

Ans.

I will prioritize tasks based on their urgency, impact, and stakeholder importance.

  • Assess the urgency of each task and prioritize accordingly

  • Consider the impact of each task on the organization and prioritize accordingly

  • Take into account the importance of each stakeholder and prioritize accordingly

  • Communicate with stakeholders to understand their priorities and adjust accordingly

Add your answer

Q53. How to check which file is taking in space in system

Ans.

To check which file is taking up space in the system, you can use commands like du, df, and find.

  • Use 'du' command to display disk usage of files and directories

  • Use 'df' command to display disk space usage of file systems

  • Use 'find' command to search for files based on size

Add your answer

Q54. What are different type of SWAPS

Ans.

SWAPS are financial contracts that allow two parties to exchange cash flows based on different financial instruments.

  • Interest Rate Swaps: exchange of fixed and floating interest rate payments

  • Currency Swaps: exchange of principal and interest payments in different currencies

  • Credit Default Swaps: insurance against default on a debt obligation

  • Commodity Swaps: exchange of cash flows based on commodity prices

  • Equity Swaps: exchange of cash flows based on equity returns

Add your answer

Q55. How the waterfall model works?

Ans.

Waterfall model is a linear sequential approach to software development.

  • Requirements are gathered and analyzed

  • Design is created based on requirements

  • Implementation of design is done

  • Testing is performed to ensure quality

  • Deployment and maintenance of the software

  • Each phase must be completed before moving to the next

  • Changes are difficult to implement once a phase is completed

Add your answer

Q56. What is the role of transfer agency in investment banking?

Ans.

Transfer agency in investment banking is responsible for maintaining accurate records of investors' transactions and account balances.

  • Transfer agency handles the processing of investor transactions, including subscriptions, redemptions, and transfers.

  • They maintain accurate records of investor account balances and ensure timely and accurate reporting.

  • Transfer agency also handles investor communications and provides customer service support.

  • Examples of transfer agencies in inve...read more

Add your answer

Q57. What is a virtual function in c++?

Ans.

A virtual function in C++ is a function that is declared within a base class and is redefined by a derived class.

  • Virtual functions allow a derived class to provide a specific implementation of a function that is already defined in a base class.

  • They are used in polymorphism to achieve runtime binding.

  • Example: virtual void display() = 0; // pure virtual function

Add your answer

Q58. What is common between HTTP, FTP, and Telnet?

Ans.

They are all application layer protocols used for communication over a network.

  • They all operate at the application layer of the OSI model.

  • They all use client-server architecture for communication.

  • They all transmit data over a network.

  • Examples: HTTP is used for web browsing, FTP for file transfer, and Telnet for remote access.

Add your answer

Q59. 3. How to reduce attrition?

Add your answer

Q60. Why do you want to start with Accounting?

Ans.

I have a passion for numbers and problem-solving, and I believe accounting is the foundation of finance.

  • I enjoy working with numbers and analyzing financial data.

  • I have strong attention to detail and organizational skills, which are essential in accounting.

  • I believe accounting is the language of business and provides a solid foundation for a career in finance.

  • I am interested in helping businesses make informed financial decisions and improve their overall performance.

Add your answer

Q61. What is trade life cycle, MBS, Types of corporate actions

Ans.

Trade life cycle refers to the stages involved in a trade, MBS stands for Mortgage-Backed Securities, and corporate actions are events that affect a company's securities.

  • Trade life cycle includes order initiation, execution, confirmation, settlement, and post-trade activities.

  • Mortgage-Backed Securities (MBS) are financial instruments backed by a pool of mortgage loans.

  • Types of corporate actions include dividends, stock splits, mergers, acquisitions, and spin-offs.

Add your answer

Q62. Present example when you had to comunícate properly for project

Ans.

I effectively communicated project updates to team members through regular meetings and email updates.

  • Scheduled weekly team meetings to discuss project progress and address any issues

  • Sent out detailed email updates outlining project milestones and deadlines

  • Encouraged open communication among team members to ensure everyone was on the same page

Add your answer

Q63. Explain concept of Polymorphism

Ans.

Polymorphism is the ability of a single function or method to operate on different data types.

  • Polymorphism allows objects of different classes to be treated as objects of a common superclass.

  • There are two types of polymorphism: compile-time (method overloading) and runtime (method overriding).

  • Example: Animal class with methods eat() and sleep(). Dog and Cat classes can inherit from Animal and override these methods.

Add your answer

Q64. How will you solve the customer's problem ,

Ans.

I will listen to the customer's problem, empathize with them, and provide a solution that meets their needs.

  • Listen actively to the customer's problem and ask clarifying questions

  • Empathize with the customer and acknowledge their frustration

  • Provide a solution that meets the customer's needs and preferences

  • Follow up with the customer to ensure their problem has been resolved

Add your answer

Q65. what is pesticide paradox, what is deferred status

Ans.

Pesticide paradox refers to the phenomenon where running the same set of tests repeatedly can decrease their effectiveness. Deferred status is when a bug is not fixed immediately but is scheduled to be fixed later.

  • Pesticide paradox occurs when running the same tests repeatedly leads to the tests no longer finding new bugs.

  • To avoid pesticide paradox, testers need to regularly review and update their test cases.

  • Deferred status is when a bug is acknowledged but not fixed immedia...read more

Add your answer

Q66. How to segregate alphabet and numbers in a table

Ans.

Use SQL queries to segregate alphabet and numbers in a table

  • Use the SQL function REGEXP to filter out alphabets and numbers

  • For example, to select only alphabets: SELECT column_name FROM table_name WHERE column_name REGEXP '^[a-zA-Z]'

  • For numbers: SELECT column_name FROM table_name WHERE column_name REGEXP '^[0-9]'

Add your answer

Q67. What is GAP and principles of revenue recognition

Ans.

GAP refers to Generally Accepted Accounting Principles and revenue recognition principles dictate when and how revenue should be recorded.

  • GAP is a set of accounting standards used to ensure consistency in financial reporting.

  • Revenue recognition principles determine the timing and amount of revenue that should be recorded.

  • Revenue is typically recognized when it is earned and realized or realizable.

  • Examples of revenue recognition principles include the percentage of completion ...read more

Add your answer

Q68. Past work experience ? Experience in cloud ? ITIL ? INCIDENT TOOLS ?

Ans.

I have experience in cloud, ITIL, and incident tools.

  • Worked with AWS and Azure cloud platforms

  • Implemented ITIL processes for incident management

  • Proficient in incident management tools like ServiceNow and JIRA

Add your answer

Q69. Journal entry for accrual

Ans.

A journal entry for accrual is used to record expenses or revenues that have been incurred but not yet paid or received.

  • Accruals are recorded at the end of an accounting period to ensure that expenses and revenues are matched to the correct period.

  • The journal entry for an expense accrual involves debiting the expense account and crediting the accrued liability account.

  • The journal entry for a revenue accrual involves debiting the accrued revenue account and crediting the reven...read more

Add your answer

Q70. Explain about end to end activities like nfr validation, nfr gathering, wlm etc

Ans.

End-to-end activities like NFR validation, gathering, and WLM ensure quality and performance of software.

  • NFR validation involves testing non-functional requirements like performance, security, and usability.

  • NFR gathering involves identifying and documenting non-functional requirements.

  • WLM (Workload Management) involves managing the workload on the system to ensure optimal performance.

  • Other end-to-end activities may include testing, deployment, and monitoring of the software.

  • T...read more

Add your answer

Q71. Can FIS employer become a ceo ?

Ans.

Yes, as long as they have the necessary qualifications and experience.

  • Qualifications and experience are the key factors in becoming a CEO.

  • FIS employer can become a CEO if they have the necessary skills and experience.

  • It is not uncommon for employees to work their way up to the CEO position.

  • However, it ultimately depends on the company's hiring and promotion policies.

Add your answer

Q72. What would you do to increase the process

Ans.

To increase the process, I would implement automation, streamline communication, and regularly review and update procedures.

  • Implement automation tools to reduce manual tasks and improve efficiency

  • Streamline communication channels to ensure quick and effective information sharing

  • Regularly review and update procedures to identify areas for improvement and optimize the process

Add your answer

Q73. What data points to cover for underwriting?

Ans.

Data points for underwriting include financial history, credit score, employment status, and insurance claims.

  • Financial history (income, assets, debts)

  • Credit score

  • Employment status

  • Insurance claims history

Add your answer

Q74. explain above concepts in detail

Ans.

The candidate is asked to explain certain concepts in detail related to software engineering.

  • Explain the concepts thoroughly with examples

  • Provide a clear and concise explanation of each concept

  • Demonstrate understanding of the concepts through practical examples

Add your answer

Q75. What is women empowerment?

Ans.

Women empowerment refers to the process of providing women with the power to make decisions and control their lives.

  • It involves giving women access to education, healthcare, and job opportunities.

  • It also includes promoting gender equality and challenging gender stereotypes.

  • Examples of women empowerment include women's right to vote, equal pay for equal work, and women in leadership positions.

  • Women empowerment benefits not only women but also their families, communities, and s...read more

Add your answer

Q76. Different oops concepts and their role in frameworks developy

Ans.

Object-oriented programming concepts play a vital role in developing frameworks.

  • Inheritance: allows a class to inherit properties and methods from another class

  • Encapsulation: hiding the implementation details of a class from other classes

  • Polymorphism: ability of an object to take on many forms

  • Abstraction: focusing on essential features of an object while hiding irrelevant details

  • Examples: Selenium WebDriver framework uses inheritance to extend the functionality of the base cl...read more

Add your answer

Q77. What is mining financial account?

Add your answer

Q78. How are created computer accounting?

Add your answer

Q79. Activity Lifecycle and behaviour on screen rotation

Ans.

The activity lifecycle describes the different states an activity goes through during its lifetime.

  • When the screen is rotated, the activity is destroyed and recreated

  • The activity goes through the onPause(), onStop(), and onDestroy() methods

  • The onSaveInstanceState() method is called to save the activity's state

  • The onCreate() method is called again to recreate the activity

  • The onRestoreInstanceState() method is called to restore the saved state

Add your answer

Q80. What are Use case diagrams

Ans.

Use case diagrams are visual representations of the interactions between users and a system.

  • They depict the system's functionality from the user's perspective.

  • They show the different actors and their roles in the system.

  • They illustrate the various use cases and their relationships.

  • They help in identifying the requirements of the system.

  • They aid in communication between stakeholders.

  • Example: A use case diagram for an online shopping system would show actors like customer, admi...read more

Add your answer

Q81. Is python a case sensitive?

Ans.

Yes, Python is case sensitive.

  • Python is case sensitive, meaning variables, functions, and other identifiers must be typed with the correct capitalization to be recognized.

  • For example, 'myVar' and 'MyVar' would be considered as two different variables in Python.

  • Using incorrect capitalization can result in errors or unexpected behavior in Python code.

Add your answer

Q82. What is hashmap and its usage

Ans.

HashMap is a data structure that stores key-value pairs and provides fast retrieval of values based on their keys.

  • HashMap is part of the Java Collections Framework.

  • It allows null values and null keys.

  • Keys must be unique, but values can be duplicated.

  • HashMap uses hashing to store and retrieve elements efficiently.

  • It provides constant-time performance for basic operations like get, put, and remove.

  • Example: HashMap employeeSalaries = new HashMap<>();

Add your answer

Q83. Explain opps concept in java

Ans.

OOPs concept in Java refers to Object-Oriented Programming principles like inheritance, encapsulation, polymorphism, and abstraction.

  • Inheritance: Allows a class to inherit properties and behavior from another class.

  • Encapsulation: Bundling data and methods that operate on the data into a single unit.

  • Polymorphism: Ability to present the same interface for different data types.

  • Abstraction: Hiding the implementation details and showing only the necessary features.

Add your answer

Q84. Write a script to fetch file from FTP server and load it into dB.

Add your answer

Q85. How to optimize the performance and cost in cloud

Add your answer

Q86. How to manage resiliency in microservices?

Add your answer

Q87. Tell me about FIS

Ans.

FIS is a global financial technology company providing software solutions for banking and payments.

  • FIS offers a wide range of software solutions for financial institutions, including core banking systems, payment processing, and risk management.

  • The company serves clients in over 130 countries and processes over 75 billion transactions annually.

  • FIS was ranked #1 in the FinTech 100 list in 2020.

  • Some of FIS's popular products include FIS Core Banking, FIS Payments, and FIS Risk ...read more

Add your answer

Q88. What is inheritance

Ans.

Inheritance is a concept in object-oriented programming where a class can inherit attributes and methods from another class.

  • Allows a class to inherit attributes and methods from another class

  • Promotes code reusability and reduces redundancy

  • Creates a parent-child relationship between classes

  • Derived class can access the properties and methods of the base class

  • Example: Class 'Car' can inherit from class 'Vehicle' to reuse common vehicle attributes and methods

Add your answer

Q89. Data sharing between compontent

Ans.

Data sharing between components is crucial for efficient communication and collaboration.

  • Use a common data format for easy interpretation and integration

  • Implement secure data transfer protocols to protect sensitive information

  • Ensure data consistency and accuracy through proper validation and verification

  • Consider the scalability and performance of the data sharing mechanism

  • Examples include RESTful APIs, message queues, and shared databases

Add your answer

Q90. how will you test any application

Ans.

I will test any application by creating test cases, executing them, analyzing results, and reporting bugs.

  • Understand the requirements and functionalities of the application

  • Create test cases based on requirements and user scenarios

  • Execute test cases manually or using automation tools

  • Analyze test results and compare them with expected outcomes

  • Report bugs and issues found during testing

  • Perform regression testing to ensure previous functionality is not affected by new changes

Add your answer

Q91. Why Observables over promise

Ans.

Observables provide a more flexible and powerful way to handle asynchronous data streams compared to promises.

  • Observables can handle multiple values over time, while promises can only handle a single value.

  • Observables can be cancelled, while promises are not cancellable.

  • Observables support operators for transforming, combining, and filtering data streams.

  • Observables provide better error handling capabilities compared to promises.

Add your answer

Q92. Difference between MD5 and SHA 2

Ans.

MD5 is a hash function that produces a 128-bit hash value while SHA-2 is a family of hash functions that produce hash values of varying lengths.

  • MD5 produces a fixed-length hash value of 128 bits while SHA-2 produces hash values of 224, 256, 384, or 512 bits.

  • MD5 is considered less secure than SHA-2 due to its susceptibility to collision attacks.

  • SHA-2 is a family of hash functions that includes SHA-224, SHA-256, SHA-384, and SHA-512.

  • SHA-2 is widely used for digital signatures, ...read more

Add your answer

Q93. What is data type of auto?

Ans.

The data type of auto is determined by the value assigned to it at compile time.

  • The auto keyword in C++ is used to automatically deduce the data type of a variable based on its initializer.

  • The data type of auto can be any valid C++ type, including fundamental types, user-defined types, or even complex types like function pointers or lambda expressions.

  • The actual data type of auto is resolved by the compiler during compilation, so it can vary depending on the context and the v...read more

Add your answer

Q94. Hierarchy of knowledge objects in splunk

Ans.

Splunk has a hierarchy of knowledge objects to organize and manage data.

  • The hierarchy includes apps, add-ons, and configurations.

  • Apps contain dashboards, reports, and alerts.

  • Add-ons provide additional functionality to apps.

  • Configurations include indexes, sourcetypes, and fields.

  • Knowledge objects can be shared across the hierarchy.

  • Higher level objects inherit settings from lower level objects.

Add your answer

Q95. How to configure Backup in cloud?

Add your answer

Q96. How We maintain security in Application?

Ans.

Maintaining security in applications involves implementing encryption, authentication, authorization, and regular security audits.

  • Implement encryption to protect data in transit and at rest

  • Use strong authentication mechanisms like multi-factor authentication

  • Implement proper authorization controls to restrict access to sensitive data

  • Regularly conduct security audits and penetration testing to identify vulnerabilities

Add your answer

Q97. Explain procedure of application deployment on Windows server.

Ans.

Application deployment on Windows server involves packaging the application, configuring the server, and deploying the application using tools like IIS or PowerShell.

  • Package the application into a deployable format such as a zip file or MSI installer

  • Configure the Windows server with necessary dependencies and settings for the application to run

  • Deploy the application using tools like Internet Information Services (IIS) or PowerShell scripts

  • Test the deployed application to ensu...read more

Add your answer

Q98. Explain lending.Origination and servicing

Ans.

Lending origination and servicing involves the process of granting loans and managing them throughout their lifecycle.

  • Lending origination refers to the process of evaluating loan applications, determining eligibility, and approving or rejecting loans.

  • Lending servicing involves managing the loan after it has been originated, including collecting payments, handling customer inquiries, and managing any changes or modifications to the loan terms.

  • Origination and servicing activiti...read more

View 1 answer

Q99. what is difference between tcp and udp

Ans.

TCP is a connection-oriented protocol while UDP is a connectionless protocol.

  • TCP provides reliable, ordered, and error-checked delivery of data while UDP does not guarantee any of these.

  • TCP is slower but more reliable while UDP is faster but less reliable.

  • TCP is used for applications that require high reliability and accuracy while UDP is used for applications that require speed and efficiency.

  • Examples of TCP-based applications include email, file transfer, and web browsing w...read more

Add your answer

Q100. Explain SOLID principles

Ans.

SOLID principles are a set of five design principles in object-oriented programming to make software designs more understandable, flexible, and maintainable.

  • S - Single Responsibility Principle: A class should have only one reason to change.

  • O - Open/Closed Principle: Software entities should be open for extension but closed for modification.

  • L - Liskov Substitution Principle: Objects of a superclass should be replaceable with objects of its subclasses without affecting the func...read more

Add your answer
1
2
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos

Interview Process at Suvarna Durga Agro Products

based on 177 interviews in the last 1 year
Interview experience
4.1
Good
View more
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Interview Questions from Similar Companies

4.1
 • 773 Interview Questions
3.8
 • 405 Interview Questions
3.9
 • 264 Interview Questions
4.0
 • 242 Interview Questions
4.2
 • 214 Interview Questions
4.2
 • 147 Interview Questions
View all
Top FIS Interview Questions And Answers
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
70 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions
Get AmbitionBox app

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter