Filter interviews by
Lead time measures total time from order to delivery, while cycle time measures time taken to complete a specific task.
Lead time includes all phases: waiting, processing, and delivery. Example: Ordering a product online until it arrives.
Cycle time focuses on the active work period. Example: Time taken to assemble a product once work begins.
Lead time can be longer due to delays in waiting for resources, while cycle...
Yes, I have experience working with network/schemes mandates.
Managed implementation of network/schemes mandates for product development
Collaborated with cross-functional teams to ensure compliance with mandates
Analyzed data to track performance and make necessary adjustments
Ensured product features aligned with network/schemes requirements
Yes, I have experience working on fraud detection in previous roles.
Implemented machine learning algorithms to detect fraudulent activities
Collaborated with data scientists to improve fraud detection models
Utilized data analytics to identify patterns and anomalies in transaction data
Java is a high-level programming language known for its portability, security, and object-oriented features.
Java is platform-independent, meaning it can run on any device with a Java Virtual Machine (JVM)
It is known for its strong security features, such as automatic memory management and built-in exception handling
Java is object-oriented, allowing for the creation of reusable code through classes and objects
Popul...
JDBC steps for establishing a connection with a database
Load the JDBC driver class using Class.forName() method
Create a connection object using DriverManager.getConnection() method
Create a statement object using connection.createStatement() method
Execute SQL queries using statement.executeQuery() or statement.executeUpdate() methods
Close the connection using connection.close() method
Hashing in Java is a technique used to convert a key into an index in a hash table, allowing for efficient data retrieval.
Hashing is used to quickly retrieve data from a large dataset by converting keys into indexes in a hash table.
It involves applying a hash function to the key to generate a unique hash code.
Java provides built-in hash functions for common data types like strings and integers.
Example: HashMap and...
Postman allows users to perform CRUD operations for API testing using intuitive interface and features.
Create: Use POST method to create a new resource. Example: POST /users to add a new user.
Read: Use GET method to retrieve resource data. Example: GET /users to fetch all users.
Update: Use PUT or PATCH method to modify existing resources. Example: PUT /users/1 to update user with ID 1.
Delete: Use DELETE method to ...
Cash management process refers to the set of activities and strategies used by businesses to optimize their cash flow and liquidity.
Cash management involves monitoring and controlling the inflow and outflow of cash within an organization.
It includes activities such as cash forecasting, cash positioning, cash pooling, and cash concentration.
Cash management aims to ensure that a company has enough cash on hand to me...
ATM reconciliation is the process of comparing the transactions recorded by an ATM with the bank's records to ensure accuracy.
ATM reconciliation involves verifying the amount of cash dispensed by the ATM against the amount recorded in the bank's system.
It also involves checking for any discrepancies in the number of transactions recorded by the ATM and the bank's system.
ATM reconciliation is important for detectin...
New ATM configuration user access involves setting up permissions for different users to access specific features.
Identify the different user roles and their corresponding access levels
Set up permissions for each user role based on their responsibilities
Test the new configuration to ensure that users can only access the features they are authorized to use
New ATM configuration user access involves setting up permissions for different users to access specific features.
Identify the different user roles and their corresponding access levels
Set up permissions for each user role based on their responsibilities
Test the new configuration to ensure that users can only access the features they are authorized to use
New project implementation involves planning, execution, and monitoring to ensure successful completion.
Develop a project plan outlining goals, timeline, resources, and budget.
Assign roles and responsibilities to team members.
Monitor progress regularly and make adjustments as needed.
Communicate with stakeholders to keep them informed of project status.
Conduct post-project evaluation to identify successes and areas for ...
I applied via Approached by Company and was interviewed in Apr 2024. There was 1 interview round.
Yes, I have experience working with network/schemes mandates.
Managed implementation of network/schemes mandates for product development
Collaborated with cross-functional teams to ensure compliance with mandates
Analyzed data to track performance and make necessary adjustments
Ensured product features aligned with network/schemes requirements
PAN number creation logic involves a combination of letters and numbers based on specific algorithm.
PAN number consists of 10 characters, with the first five being letters, followed by four numbers, and ending with a letter.
The fourth character in the PAN number represents the type of holder (individual, company, etc.)
The fifth character in the PAN number represents the first letter of the surname of the PAN holder.
The...
Yes, I have experience working on fraud detection in previous roles.
Implemented machine learning algorithms to detect fraudulent activities
Collaborated with data scientists to improve fraud detection models
Utilized data analytics to identify patterns and anomalies in transaction data
I appeared for an interview in Jan 2025.
Numerical, logical reasoning
Java is a high-level programming language known for its portability, security, and object-oriented features.
Java is platform-independent, meaning it can run on any device with a Java Virtual Machine (JVM)
It is known for its strong security features, such as automatic memory management and built-in exception handling
Java is object-oriented, allowing for the creation of reusable code through classes and objects
Popular ex...
JDBC steps for establishing a connection with a database
Load the JDBC driver class using Class.forName() method
Create a connection object using DriverManager.getConnection() method
Create a statement object using connection.createStatement() method
Execute SQL queries using statement.executeQuery() or statement.executeUpdate() methods
Close the connection using connection.close() method
Hashing in Java is a technique used to convert a key into an index in a hash table, allowing for efficient data retrieval.
Hashing is used to quickly retrieve data from a large dataset by converting keys into indexes in a hash table.
It involves applying a hash function to the key to generate a unique hash code.
Java provides built-in hash functions for common data types like strings and integers.
Example: HashMap and Hash...
I appeared for an interview before Jul 2024, where I was asked the following questions.
Api , manual , automation ,
Top trending discussions
The duration of Financial Software & Systems interview process can vary, but typically it takes about less than 2 weeks to complete.
based on 21 interview experiences
Difficulty level
Duration
based on 823 reviews
Rating in categories
6-10 Yrs
Not Disclosed
Software Engineer
621
salaries
| ₹3.5 L/yr - ₹7.5 L/yr |
Technical Associate
534
salaries
| ₹2.2 L/yr - ₹5.5 L/yr |
Senior Software Engineer
296
salaries
| ₹7.9 L/yr - ₹13 L/yr |
Senior Technical Associate
277
salaries
| ₹3.8 L/yr - ₹9.2 L/yr |
Team Lead
181
salaries
| ₹5.5 L/yr - ₹11.8 L/yr |
KPIT Technologies
Thomson Reuters
HighRadius
Oracle Cerner