Finastra
40+ Infinite Computer Solutions Interview Questions and Answers
Q1. Explain the scenario where you have faced memory leak issue?
Yes
During load testing of a web application, memory usage gradually increased over time
Identified the memory leak by monitoring memory consumption using performance testing tools
Investigated the code and found a section where objects were not being properly released
Fixed the memory leak by implementing proper object disposal and memory management techniques
Q2. What is memory leak issue? And how do you handle this?
Memory leak is a software issue where allocated memory is not released, leading to memory consumption and performance degradation.
Memory leak occurs when a program fails to deallocate memory that is no longer needed.
It can happen due to programming errors like not freeing allocated memory or losing references to it.
Memory leaks can cause the program to consume excessive memory, leading to performance issues and crashes.
To handle memory leaks, tools like profilers can be used ...read more
Q3. What is performance engineering? Explain in details
Performance engineering is the process of designing, implementing, and optimizing systems to meet performance requirements.
Performance engineering involves analyzing and understanding performance requirements
It includes designing and implementing systems to meet those requirements
Optimizing systems through load testing, stress testing, and performance tuning
Performance engineering also involves monitoring and analyzing system performance in production
Examples of performance e...read more
Q4. How does a bank treat the Accounting Entries after the activities such as Principal Repayment, Interest Dues, Write-off, Past Dues and so on?
Banks treat accounting entries for activities like principal repayment, interest dues, write-off, past dues by recording them in their financial statements.
Principal repayment is recorded as a decrease in the loan receivable account and a decrease in the cash account.
Interest dues are recorded as an increase in the interest income account and an increase in the interest receivable account.
Write-offs are recorded as a decrease in the loan receivable account and a decrease in t...read more
Q5. Difference between performance testing and engineering
Performance testing focuses on evaluating the speed, responsiveness, and stability of a system, while performance engineering involves designing and optimizing the system for optimal performance.
Performance testing is the process of testing the performance characteristics of a system under specific conditions.
Performance engineering is the proactive approach of designing, building, and optimizing a system for optimal performance.
Performance testing measures the speed, respons...read more
Q6. What are the steps involved in the initial stages of CBS implementation?
The initial stages of CBS implementation involve planning, analysis, design, development, testing, and deployment.
Planning phase involves defining project scope, objectives, and requirements.
Analysis phase includes assessing current systems and processes to identify areas for improvement.
Design phase focuses on creating a blueprint for the new CBS system.
Development phase involves building the system based on the design specifications.
Testing phase is crucial for ensuring the...read more
Q7. What is deadlock?
Deadlock is a situation where two or more processes are unable to proceed because each is waiting for the other to release a resource.
Deadlock occurs when two or more processes are stuck in a circular dependency, where each process is waiting for a resource held by another process.
It can happen in multi-threaded or multi-process environments.
Deadlock can be caused by resource contention, improper synchronization, or programming errors.
Examples of resources that can lead to de...read more
Q8. Where can be performance bottleneck?
Performance bottleneck can occur in various areas of an application.
Database queries and indexing
Network latency and bandwidth
CPU and memory usage
Code inefficiencies and poor algorithms
Third-party integrations
Hardware limitations
User load and concurrency
Application architecture
Caching and session management
Security measures
External factors such as weather or power outages
Q9. Make a power point presentation on "Generative AI and Fintech"
Generative AI and Fintech: Exploring the intersection of artificial intelligence and financial technology.
Generative AI can be used in Fintech for tasks such as fraud detection, risk assessment, and personalized financial recommendations.
Examples of Generative AI in Fintech include chatbots for customer service, algorithmic trading systems, and credit scoring models.
The combination of Generative AI and Fintech has the potential to revolutionize the financial industry by impro...read more
Q10. What is a revolving credit and non-revolving credit?
Revolving credit allows you to borrow up to a certain limit and repay it in full or in part, while non-revolving credit is a one-time loan with a fixed repayment schedule.
Revolving credit has a credit limit that can be used repeatedly, like a credit card.
Non-revolving credit is a one-time loan with a fixed repayment schedule, like a car loan.
Revolving credit allows flexibility in borrowing and repaying, while non-revolving credit has a set repayment plan.
Q11. Which kind of data storage is easy for processing XML or Files?
XML databases are easy for processing XML data, while file systems are easy for processing files.
XML databases are designed specifically for storing and querying XML data.
They provide efficient indexing and querying capabilities for XML documents.
Examples of XML databases include eXist-db, BaseX, and MarkLogic.
File systems, on the other hand, are well-suited for storing and processing files of any type.
They provide a hierarchical structure for organizing files and directories...read more
Q12. How would you make sure a dead lock doesnt happen during sql transactions?
To prevent deadlocks in SQL transactions, use proper transaction management techniques.
Use a consistent order for acquiring locks on resources to avoid circular dependencies.
Keep transactions short and release locks as soon as they are no longer needed.
Use lock timeouts to prevent transactions from waiting indefinitely.
Implement deadlock detection and resolution mechanisms.
Consider using higher isolation levels like Serializable to minimize concurrency issues.
Q13. How to troubleshoot a computer booting-up issue
To troubleshoot a computer booting-up issue, check hardware connections, run diagnostic tests, and troubleshoot software issues.
Check if all hardware connections are secure and properly connected
Run diagnostic tests to identify any hardware failures
Troubleshoot software issues by booting into safe mode or using recovery options
Check for any recent software or driver updates that may be causing conflicts
Inspect the BIOS settings and ensure they are correctly configured
Test the...read more
Q14. What is your expected CTC?
My expected CTC is negotiable based on the job responsibilities, company size, and industry standards.
My expected CTC is based on my experience, skills, and qualifications.
I have researched the market rates for Performance Testers in similar roles and industries.
I am open to discussing the compensation package and benefits offered by the company.
I believe in a fair and competitive salary that aligns with my expertise and contributions.
I am looking for a package that recognize...read more
Q15. How to handle multiple projects at a time.
To handle multiple projects at a time, prioritize tasks, set realistic deadlines, delegate when possible, and communicate effectively.
Prioritize tasks based on urgency and importance
Set realistic deadlines for each project
Delegate tasks to team members when possible
Communicate effectively with team members and stakeholders
Use project management tools to track progress and manage tasks
Manage time effectively by creating a schedule and sticking to it
Break down complex projects ...read more
Q16. How to handle CPU bottleneck?
CPU bottleneck can be handled by optimizing code, upgrading hardware, and load balancing.
Identify the root cause of the CPU bottleneck through performance monitoring tools.
Optimize the code by identifying and fixing inefficient algorithms or resource-intensive operations.
Upgrade hardware by adding more powerful CPUs or increasing the number of cores.
Implement load balancing techniques to distribute the workload across multiple CPUs or servers.
Consider vertical scaling by upgr...read more
Q17. What is load balancing?
Load balancing is the process of distributing network traffic across multiple servers to optimize performance and prevent overload.
Load balancing improves scalability and availability of applications.
It ensures that no single server is overwhelmed with traffic.
Load balancers can use various algorithms to distribute traffic, such as round-robin, least connections, or IP hash.
Examples of load balancing technologies include hardware load balancers, software load balancers, and c...read more
Q18. Difference between Customer support and Customer experience
Customer support focuses on resolving specific issues, while customer experience encompasses the overall journey and satisfaction of the customer.
Customer support involves addressing and resolving customer inquiries, problems, and complaints.
Customer experience refers to the overall perception and satisfaction of the customer throughout their interactions with a company.
Customer support is reactive, responding to specific customer needs and issues.
Customer experience is proac...read more
Q19. How JVM works?
JVM is a virtual machine that executes Java bytecode. It manages memory, provides runtime environment, and enables platform independence.
JVM stands for Java Virtual Machine.
It is responsible for interpreting and executing Java bytecode.
JVM manages memory allocation and garbage collection.
It provides a runtime environment for Java applications.
JVM enables platform independence by abstracting the underlying hardware and operating system.
JVM includes components like class loader...read more
Q20. How do you handle an irate customer
Handling an irate customer requires active listening, empathy, and problem-solving skills.
Remain calm and composed
Listen actively and let the customer vent their frustrations
Show empathy and understanding
Apologize for the inconvenience caused
Offer a solution or alternative options
Follow up to ensure customer satisfaction
Q21. Detailed E2E implementation of CBS for Loans module
End-to-end implementation of CBS for Loans module
Analyze current loan processes and requirements
Design CBS system configuration for loan products
Develop and test loan module functionalities
Integrate CBS with existing systems for loan processing
Train users on new CBS loan module
Monitor and optimize CBS loan module performance
Q22. Wht is ascy method ? Wht is inner exception? Wht is diff b/w ref nd out write sudeo code? Wht is single ton design patterns? Wht is sealed class write sudeo code?
Answers to software testing interview questions
Ascy method is not a known term in software testing
Inner exception is an exception that occurs within another exception
Ref and out are both used for passing parameters by reference, but out requires the variable to be initialized before use
Singleton design pattern is a creational pattern that ensures only one instance of a class is created and provides a global point of access to it
Sealed class is a class that cannot be inherited...read more
Q23. Campus strategy and relation and how to manage
Managing campus strategy and relations is crucial for successful recruitment.
Develop a clear campus recruitment strategy that aligns with the company's goals and values.
Build strong relationships with key stakeholders such as career services, professors, and student organizations.
Attend career fairs and other campus events to connect with potential candidates and promote the company.
Offer internships and other opportunities to engage with students and showcase the company's c...read more
Q24. What is SDLC
SDLC stands for Software Development Life Cycle. It is a process used to design, develop, and maintain software.
SDLC is a systematic approach to software development.
It consists of several phases including requirements gathering, design, coding, testing, deployment, and maintenance.
Each phase has specific activities and deliverables.
SDLC models include Waterfall, Agile, and DevOps.
Example: In the requirements gathering phase, the software developer works with stakeholders to ...read more
Q25. What is small pointer and why we use it
A small pointer is a pointer that takes up less memory space and is used to optimize memory usage and improve performance.
Small pointers are typically used in embedded systems where memory is limited
They can also be used in data structures to reduce memory overhead
Example: Using a small pointer instead of a regular pointer to store memory addresses
Q26. Give few examples of testing done in real life scenarios
Testing in real life scenarios involves checking the functionality and performance of products or services in practical situations.
Testing the durability of a new phone by dropping it from different heights
Testing the waterproof feature of a watch by submerging it in water
Testing the battery life of a laptop by using it continuously for a certain period
Testing the taste and quality of a new food product by conducting a taste test
Testing the safety features of a car by simulat...read more
Q27. use string builder type instead of string builder
Using StringBuilder type instead of string builder is incorrect.
StringBuilder is a class in Java used to create mutable strings.
Using 'string builder' instead of 'StringBuilder' will result in a compilation error.
Correct usage: StringBuilder sb = new StringBuilder();
Q28. Print last four chars of a string, explain a cicd pipeline with example
Print last four characters of a string and explain a CI/CD pipeline with an example
To print last four characters of a string, you can use string slicing in programming languages like Python or JavaScript
For example, in Python: 'string[-4:]' will give you the last four characters of the string
A CI/CD pipeline automates the process of testing and deploying code changes. It typically includes stages like build, test, deploy, and monitor
An example of a CI/CD pipeline could be: co...read more
Q29. Waterfall vs agile methodologies
Waterfall is a linear approach while Agile is iterative. Agile is more flexible and adaptable to changes.
Waterfall is a sequential process while Agile is iterative
Waterfall is more rigid and less flexible than Agile
Agile is more adaptable to changes and customer feedback
Agile promotes collaboration and teamwork while Waterfall is more individualistic
Examples of Waterfall include construction projects while Agile is commonly used in software development
Q30. What are three financial statements?
The three financial statements are the income statement, balance sheet, and cash flow statement.
Income statement: Shows a company's revenues and expenses over a specific period of time.
Balance sheet: Provides a snapshot of a company's financial position at a specific point in time, showing assets, liabilities, and equity.
Cash flow statement: Details the cash inflows and outflows of a company during a specific period, showing how changes in balance sheet and income statement a...read more
Q31. Explain the difference between stock and share.
Stock represents ownership in a company, while share is a single unit of ownership in a company.
Stock is the overall ownership of a company, while share is a single unit of that ownership.
Stock can refer to all shares of a company, while share refers to a specific unit of ownership.
Stock can include different classes of shares, such as common and preferred shares.
Shares are bought and sold on stock exchanges, while stock represents the total value of all shares.
Stockholders o...read more
Q32. What is manual testing
Manual testing is the process of manually testing software for defects, functionality, and usability.
Manual testing involves testers executing test cases without the use of automation tools.
Testers follow predefined test cases to ensure the software meets requirements.
It includes exploratory testing to uncover unexpected issues.
Examples: Regression testing, smoke testing, ad-hoc testing.
Q33. print the reverse of the string
Reverse a given string
Use a loop to iterate through the characters of the string
Append each character to a new string in reverse order
Return the reversed string
Q34. What is regression testing
Regression testing is the process of retesting a software application to ensure that new code changes have not adversely affected existing functionality.
It involves running previously executed test cases to verify that the existing features still work correctly after code changes.
Regression testing helps in identifying any defects introduced by new code changes.
Automated testing tools are often used to streamline the regression testing process.
Regression testing is an essenti...read more
Q35. Design problem of API Rate limiter
API rate limiter design problem involves balancing between preventing abuse and allowing legitimate usage.
Define rate limits based on API endpoints or user roles
Implement token bucket or leaky bucket algorithm for rate limiting
Consider using sliding window algorithm for more dynamic rate limiting
Provide clear error messages when rate limit is exceeded
Monitor and adjust rate limits based on usage patterns
Q36. Feel an attribute of function
An attribute of a function is a characteristic or property that defines its behavior or functionality.
Attributes can include things like input parameters, return type, visibility, and access modifiers.
Examples of function attributes include public/private access, static/non-static behavior, and return type like int or string.
Q37. swap the two numbers of array
Swap the positions of two numbers in an array of strings.
Iterate through the array to find the positions of the two numbers to be swapped.
Store the two numbers in temporary variables.
Swap the positions of the two numbers in the array.
Q38. Write a linked list reverse
Reversing a linked list involves changing the direction of pointers to go from the end to the beginning.
Start by initializing three pointers: current, prev, and next.
Iterate through the list, updating pointers to reverse the links.
Update the head pointer to point to the new beginning of the list.
Q39. Oops concept in brief
Oops concept is a programming paradigm based on the principles of object-oriented programming.
Encapsulation: bundling data and methods that operate on the data into a single unit (class)
Inheritance: ability of a class to inherit properties and behavior from another class
Polymorphism: ability to present the same interface for different data types
Abstraction: hiding the complex implementation details and showing only the necessary features
Q40. Design problem of using Kafka
Using Kafka for designing a system to handle real-time data streams
Ensure proper partitioning of topics to handle high throughput
Implement consumer groups for parallel processing of messages
Use Kafka Connect for integrating with external systems
Monitor Kafka cluster health and performance regularly
More about working at Finastra
Interview Process at Infinite Computer Solutions
Top Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month