Filter interviews by
Lead time measures total time from order to delivery, while cycle time measures time taken to complete a specific task.
Lead time includes all phases: waiting, processing, and delivery. Example: Ordering a product online until it arrives.
Cycle time focuses on the active work period. Example: Time taken to assemble a product once work begins.
Lead time can be longer due to delays in waiting for resources, while cycle...
SQL is a standard language for managing relational databases, while PL/SQL is a procedural extension of SQL.
SQL stands for Structured Query Language and is used for querying and managing databases.
PL/SQL stands for Procedural Language/SQL and is an extension of SQL that adds procedural programming capabilities.
SQL is used for querying data, inserting, updating, and deleting records in a database.
PL/SQL allows for ...
Default constraints are rules set on a database column to automatically assign a default value if no value is specified during an insert operation.
Default constraints ensure that a specific value is assigned to a column if no value is provided during an insert operation.
They can be used to set default values for columns such as dates, numbers, or strings.
For example, a default constraint on a 'created_date' column...
Yes, I have experience working with network/schemes mandates.
Managed implementation of network/schemes mandates for product development
Collaborated with cross-functional teams to ensure compliance with mandates
Analyzed data to track performance and make necessary adjustments
Ensured product features aligned with network/schemes requirements
Yes, I have experience working on fraud detection in previous roles.
Implemented machine learning algorithms to detect fraudulent activities
Collaborated with data scientists to improve fraud detection models
Utilized data analytics to identify patterns and anomalies in transaction data
Java is a high-level programming language known for its portability, security, and object-oriented features.
Java is platform-independent, meaning it can run on any device with a Java Virtual Machine (JVM)
It is known for its strong security features, such as automatic memory management and built-in exception handling
Java is object-oriented, allowing for the creation of reusable code through classes and objects
Popul...
JDBC steps for establishing a connection with a database
Load the JDBC driver class using Class.forName() method
Create a connection object using DriverManager.getConnection() method
Create a statement object using connection.createStatement() method
Execute SQL queries using statement.executeQuery() or statement.executeUpdate() methods
Close the connection using connection.close() method
Hashing in Java is a technique used to convert a key into an index in a hash table, allowing for efficient data retrieval.
Hashing is used to quickly retrieve data from a large dataset by converting keys into indexes in a hash table.
It involves applying a hash function to the key to generate a unique hash code.
Java provides built-in hash functions for common data types like strings and integers.
Example: HashMap and...
Postman allows users to perform CRUD operations for API testing using intuitive interface and features.
Create: Use POST method to create a new resource. Example: POST /users to add a new user.
Read: Use GET method to retrieve resource data. Example: GET /users to fetch all users.
Update: Use PUT or PATCH method to modify existing resources. Example: PUT /users/1 to update user with ID 1.
Delete: Use DELETE method to ...
I am proficient in programming languages such as SQL, Python, and R.
SQL
Python
R
New ATM configuration user access involves setting up permissions for different users to access specific features.
Identify the different user roles and their corresponding access levels
Set up permissions for each user role based on their responsibilities
Test the new configuration to ensure that users can only access the features they are authorized to use
New project implementation involves planning, execution, and monitoring to ensure successful completion.
Develop a project plan outlining goals, timeline, resources, and budget.
Assign roles and responsibilities to team members.
Monitor progress regularly and make adjustments as needed.
Communicate with stakeholders to keep them informed of project status.
Conduct post-project evaluation to identify successes and areas for ...
I appeared for an interview in Feb 2025, where I was asked the following questions.
I applied via Approached by Company and was interviewed in Apr 2024. There was 1 interview round.
Yes, I have experience working with network/schemes mandates.
Managed implementation of network/schemes mandates for product development
Collaborated with cross-functional teams to ensure compliance with mandates
Analyzed data to track performance and make necessary adjustments
Ensured product features aligned with network/schemes requirements
PAN number creation logic involves a combination of letters and numbers based on specific algorithm.
PAN number consists of 10 characters, with the first five being letters, followed by four numbers, and ending with a letter.
The fourth character in the PAN number represents the type of holder (individual, company, etc.)
The fifth character in the PAN number represents the first letter of the surname of the PAN holder.
The...
Yes, I have experience working on fraud detection in previous roles.
Implemented machine learning algorithms to detect fraudulent activities
Collaborated with data scientists to improve fraud detection models
Utilized data analytics to identify patterns and anomalies in transaction data
I appeared for an interview in Jan 2025.
I applied via Naukri.com and was interviewed in Jun 2024. There was 1 interview round.
Numerical, logical reasoning
Java is a high-level programming language known for its portability, security, and object-oriented features.
Java is platform-independent, meaning it can run on any device with a Java Virtual Machine (JVM)
It is known for its strong security features, such as automatic memory management and built-in exception handling
Java is object-oriented, allowing for the creation of reusable code through classes and objects
Popular ex...
JDBC steps for establishing a connection with a database
Load the JDBC driver class using Class.forName() method
Create a connection object using DriverManager.getConnection() method
Create a statement object using connection.createStatement() method
Execute SQL queries using statement.executeQuery() or statement.executeUpdate() methods
Close the connection using connection.close() method
Hashing in Java is a technique used to convert a key into an index in a hash table, allowing for efficient data retrieval.
Hashing is used to quickly retrieve data from a large dataset by converting keys into indexes in a hash table.
It involves applying a hash function to the key to generate a unique hash code.
Java provides built-in hash functions for common data types like strings and integers.
Example: HashMap and Hash...
I applied via Company Website and was interviewed in Apr 2024. There was 1 interview round.
I appeared for an interview before Jul 2024, where I was asked the following questions.
Top trending discussions
The duration of Financial Software & Systems interview process can vary, but typically it takes about less than 2 weeks to complete.
based on 47 interview experiences
Difficulty level
Duration
based on 823 reviews
Rating in categories
6-10 Yrs
Not Disclosed
Software Engineer
622
salaries
| ₹3.2 L/yr - ₹7.5 L/yr |
Technical Associate
536
salaries
| ₹2.2 L/yr - ₹5.9 L/yr |
Senior Software Engineer
296
salaries
| ₹7.9 L/yr - ₹13 L/yr |
Senior Technical Associate
281
salaries
| ₹4.3 L/yr - ₹9.4 L/yr |
Team Lead
185
salaries
| ₹5.5 L/yr - ₹11.8 L/yr |
KPIT Technologies
Thomson Reuters
HighRadius
Oracle Cerner