FIS
100+ ExpertLancing Research Services Interview Questions and Answers
Q101. Explain procedure of application deployment on Windows server.
Application deployment on Windows server involves packaging the application, configuring the server, and deploying the application using tools like IIS or PowerShell.
Package the application into a deployable format such as a zip file or MSI installer
Configure the Windows server with necessary dependencies and settings for the application to run
Deploy the application using tools like Internet Information Services (IIS) or PowerShell scripts
Test the deployed application to ensu...read more
Q102. Explain lending.Origination and servicing
Lending origination and servicing involves the process of granting loans and managing them throughout their lifecycle.
Lending origination refers to the process of evaluating loan applications, determining eligibility, and approving or rejecting loans.
Lending servicing involves managing the loan after it has been originated, including collecting payments, handling customer inquiries, and managing any changes or modifications to the loan terms.
Origination and servicing activiti...read more
Q103. what is difference between tcp and udp
TCP is a connection-oriented protocol while UDP is a connectionless protocol.
TCP provides reliable, ordered, and error-checked delivery of data while UDP does not guarantee any of these.
TCP is slower but more reliable while UDP is faster but less reliable.
TCP is used for applications that require high reliability and accuracy while UDP is used for applications that require speed and efficiency.
Examples of TCP-based applications include email, file transfer, and web browsing w...read more
Q104. Explain SOLID principles
SOLID principles are a set of five design principles in object-oriented programming to make software designs more understandable, flexible, and maintainable.
S - Single Responsibility Principle: A class should have only one reason to change.
O - Open/Closed Principle: Software entities should be open for extension but closed for modification.
L - Liskov Substitution Principle: Objects of a superclass should be replaceable with objects of its subclasses without affecting the func...read more
Q105. Different ways of loading routes
Routes can be loaded using various methods depending on the framework used.
In Express.js, routes can be loaded using app.get(), app.post(), app.put(), app.delete() methods
In Laravel, routes can be loaded using Route::get(), Route::post(), Route::put(), Route::delete() methods
In Ruby on Rails, routes can be loaded using resources, get, post, put, patch, and delete methods
Routes can also be loaded dynamically using middleware or custom functions
Q106. What to do if swift msg is not received
Q107. What is java 8 features
Java 8 introduced several new features including lambda expressions, streams, and default methods.
Lambda expressions enable functional programming in Java.
Streams provide a new way to process collections of data.
Default methods allow adding new methods to interfaces without breaking existing implementations.
Q108. Find the length of String and reverse string
Find length and reverse of a string
Use the length() method to find the length of the string
Use StringBuilder class to reverse the string
Example: String str = 'hello'; int length = str.length(); StringBuilder reversed = new StringBuilder(str).reverse();
Q109. Favorite go-to tool for security investigation.
My favorite go-to tool for security investigation is Wireshark.
Wireshark is a powerful network protocol analyzer used for troubleshooting, analysis, development, and education.
It allows me to capture and interactively browse the traffic running on a computer network.
I can use Wireshark to analyze network traffic, identify security vulnerabilities, and troubleshoot network issues.
Wireshark supports hundreds of protocols and has features for deep inspection of hundreds of proto...read more
Q110. View child life cycle hooks
Child life cycle hooks are methods that are called at specific points in the lifecycle of a child component in Angular.
ngOnChanges: called when an input property of the component changes
ngOnInit: called once the component is initialized
ngDoCheck: called during every change detection run
ngAfterContentInit: called after content (ng-content) has been projected into the component
ngAfterContentChecked: called after every check of the projected content
ngAfterViewInit: called after ...read more
Q111. How to handle negotiation in sales
Negotiation in sales requires active listening, understanding needs, building rapport, and finding win-win solutions.
Listen actively to the client's needs and concerns
Understand the client's priorities and budget constraints
Build rapport and trust with the client to create a positive relationship
Focus on finding win-win solutions that benefit both parties
Be prepared to compromise but also know your bottom line
Q112. Speak for 2 mins about childhood memories
Childhood memories are filled with joy, innocence, and adventure.
Playing with neighborhood friends until the street lights came on
Family vacations to the beach or mountains
Celebrating birthdays with homemade cakes and games
Exploring the backyard or local park for hidden treasures
Learning to ride a bike or swim for the first time
Q113. Do you know IIS?
Yes, I know IIS.
I have experience in configuring and managing IIS servers.
I am familiar with setting up websites, application pools, and virtual directories.
I have worked with IIS versions 6, 7, and 8.
I am comfortable troubleshooting issues related to IIS.
I have used IIS to host various web applications, including ASP.NET and PHP applications.
Q114. Equals vs hashcode contract
Equals method checks for object equality while hashcode method returns a unique integer for an object.
Equals method compares two objects for equality based on their contents
Hashcode method returns a unique integer value for an object based on its contents
Both methods are used in conjunction to ensure correct behavior in collections like HashMap
Q115. What is disposable income
Disposable income is the amount of money a person or household has available to spend or save after taxes and essential expenses.
Disposable income is the net income or take-home pay after deducting taxes.
It represents the amount of money that can be used for discretionary spending or saving.
Disposable income is calculated by subtracting taxes and essential expenses, such as rent, utilities, and food, from the total income.
Examples of essential expenses include mortgage or ren...read more
Q116. Wt r the jcl abends u r faced?
I have faced JCL abends related to syntax errors, data set errors, and system errors.
Syntax errors such as missing or incorrect parameters in JCL statements
Data set errors such as incorrect allocation or access permissions
System errors such as resource unavailability or system crashes
Examples include S0C7, S322, and U4038 abends
Q117. How do you perform sprint planning
Sprint planning involves prioritizing tasks, estimating effort, assigning responsibilities, and setting goals for the upcoming sprint.
Collaborate with the product owner to understand the requirements and priorities
Estimate the effort required for each task using techniques like story points or hours
Assign tasks to team members based on their skills and availability
Set achievable goals for the sprint based on team capacity and velocity
Review and adjust the sprint plan as neede...read more
Q118. How to configure rsyslog
Rsyslog is configured by editing its configuration file, usually located at /etc/rsyslog.conf
Identify the log sources and their corresponding log files
Specify the log destination and format
Configure filters and rules to process and route logs
Restart the rsyslog service to apply changes
Use tools like logger and tail to test the configuration
Q119. How to configure a cluster
Configuring a cluster involves setting up multiple servers to work together as a single system.
Choose a cluster management tool such as Kubernetes or Apache Mesos
Determine the number of nodes and their roles in the cluster
Configure network settings and communication protocols
Set up load balancing and failover mechanisms
Ensure data consistency and replication across nodes
Q120. What is cash reconciliation o
Cash reconciliation is the process of comparing and adjusting the cash balance in an organization's accounting records with the actual cash balance.
It involves verifying the accuracy of cash transactions recorded in the accounting system
It helps identify discrepancies between the recorded cash balance and the actual cash balance
Adjustments are made to the accounting records to reflect the correct cash balance
It is an important control measure to prevent fraud and errors
Exampl...read more
Q121. Tell me the tools you are worked
Q122. What do you know about FIS
FIS is a global financial services technology company.
FIS provides a wide range of financial services and solutions to clients worldwide.
The company offers banking and payment solutions, consulting services, and risk management tools.
FIS serves clients in over 130 countries and has over 55,000 employees.
FIS is a Fortune 500 company and is headquartered in Jacksonville, Florida.
Q123. What is general ledger?
General ledger is a complete record of financial transactions of a company, organized by accounts.
It contains all debit and credit entries for each account in the company's chart of accounts.
It is used to prepare financial statements like the balance sheet and income statement.
Entries in the general ledger are usually recorded using double-entry accounting.
Examples of general ledger accounts include cash, accounts receivable, accounts payable, and expenses.
Q124. What do you understand by RSA?
RSA stands for Rivest-Shamir-Adleman, a widely used encryption algorithm for secure communication.
RSA is a public-key cryptosystem used for secure data transmission.
It involves generating a public key and a private key for encryption and decryption.
RSA encryption is based on the difficulty of factoring large prime numbers.
It is commonly used in secure communication protocols like HTTPS.
RSA can be used for digital signatures to verify the authenticity of messages.
Q125. Difference between xpath and css selectors
XPath is a language for selecting nodes in an XML document, while CSS selectors are used to select HTML elements.
XPath is more powerful and flexible than CSS selectors
CSS selectors are faster and easier to write than XPath
XPath can traverse both upwards and downwards in the document tree, while CSS selectors can only traverse downwards
XPath can select elements based on their attributes, text content, and more, while CSS selectors are limited to selecting elements based on the...read more
Q126. how to add SSL to web site
To add SSL to a website, obtain a SSL certificate and configure the web server to use it.
Obtain a SSL certificate from a trusted certificate authority
Install the SSL certificate on the web server
Configure the web server to use HTTPS instead of HTTP
Redirect HTTP traffic to HTTPS
Test the SSL certificate installation using an SSL checker tool
Q127. What is modified and Macaulay duration
Modified and Macaulay duration are measures of bond price sensitivity to changes in interest rates.
Modified duration measures the percentage change in bond price for a 1% change in yield.
Macaulay duration is the weighted average time to receive all cash flows from a bond.
Both measures help investors assess interest rate risk and make informed investment decisions.
For example, a bond with a longer Macaulay duration will be more sensitive to changes in interest rates than a bon...read more
Q128. Risk threat and vulnerability differene
Risk, threat, and vulnerability are different concepts in security.
Risk is the likelihood of a threat exploiting a vulnerability and causing harm.
Threat is a potential danger that can exploit a vulnerability.
Vulnerability is a weakness or gap in security that can be exploited by a threat.
Example: A vulnerability in a software system can be exploited by a hacker (threat) to cause a data breach (risk).
Q129. Components vs Directives
Components are reusable building blocks while directives are used to manipulate the DOM.
Components are self-contained and can be used multiple times in an application
Directives are used to add behavior to an existing DOM element
Components have their own template while directives do not
Examples of components include buttons, forms, and menus
Examples of directives include ngIf, ngFor, and ngStyle
Q130. Change detection strategy
Change detection strategy involves identifying and responding to changes in a system or process.
Define the scope of the system or process being monitored
Establish a baseline for normal behavior
Use monitoring tools to detect changes
Set thresholds for triggering alerts or actions
Implement a response plan for identified changes
Q131. javascript vs typescript
TypeScript is a superset of JavaScript that adds static typing and other features.
TypeScript catches errors at compile time, while JavaScript only catches them at runtime.
TypeScript supports object-oriented programming concepts like classes and interfaces.
TypeScript can be transpiled into JavaScript, so it can run on any browser or platform that supports JavaScript.
JavaScript is easier to learn and use for small projects, while TypeScript is better for larger, more complex pr...read more
Q132. Route guards in angular
Route guards are used in Angular to protect routes from unauthorized access.
Route guards can be used to check if a user is authenticated before allowing access to a route.
There are three types of route guards: CanActivate, CanActivateChild, and CanLoad.
CanActivate is used to protect individual routes, CanActivateChild is used to protect child routes, and CanLoad is used to protect lazy-loaded modules.
Route guards can be implemented using services or functions that return a bo...read more
Q133. Cryptography and its types
Cryptography is the practice of secure communication in the presence of third parties.
Symmetric-key cryptography
Asymmetric-key cryptography
Hash functions
Encryption algorithms
Digital signatures
Q134. Oops concepts and implementation
Oops concepts are fundamental principles of object-oriented programming used for designing and implementing software.
Encapsulation: bundling data and methods that operate on the data into a single unit
Inheritance: creating new classes using existing classes as blueprints
Polymorphism: ability of objects to take on multiple forms
Abstraction: hiding the complex implementation details and showing only the necessary features
Q135. What is Corporate action
Corporate action refers to any event initiated by a publicly-traded company that affects its stakeholders and requires their approval.
Corporate actions can be voluntary or mandatory
Examples of corporate actions include stock splits, mergers and acquisitions, dividend payments, and spin-offs
Corporate actions can have a significant impact on the value of a company's stock and its shareholders
Shareholders are typically notified of corporate actions through official announcements...read more
Q136. What is caluleter?
Q137. Difference between SSL and TLS
SSL and TLS are both cryptographic protocols used to secure internet communications.
SSL stands for Secure Sockets Layer and is an older protocol that has been largely replaced by TLS.
TLS stands for Transport Layer Security and is the successor to SSL.
TLS is more secure than SSL and offers better encryption algorithms.
TLS also supports newer protocols and ciphers, while SSL does not.
SSL is vulnerable to attacks such as POODLE and BEAST, while TLS is not.
TLS is used for securin...read more
Q138. What is capital Market.
Capital market is a financial market where long-term securities such as stocks, bonds, and other investments are traded.
Capital market is a platform for companies to raise funds for long-term investments.
It includes both primary and secondary markets.
Investors can buy and sell securities in the capital market.
Examples of capital market include stock exchanges, bond markets, and derivatives markets.
Q139. Behavior Subject vs SUbject
Behavior Subject is a type of Subject in RxJS used for emitting values and managing subscriptions.
Behavior Subject is a type of Subject in RxJS.
It emits the most recent value to new subscribers.
It retains the last emitted value and emits it immediately upon subscription.
Example: const subject = new BehaviorSubject(0);
Q140. What are routing protocols?
Routing protocols are sets of rules that determine how routers communicate with each other to forward data packets across networks.
Routing protocols are used to exchange routing information between routers.
They help routers determine the best path for forwarding data packets.
Examples of routing protocols include OSPF, BGP, and RIP.
Routing protocols can be classified as either interior gateway protocols (IGPs) or exterior gateway protocols (EGPs).
IGPs are used within a single ...read more
Q141. What is view? What is cte
A view is a virtual table created by a query. CTE stands for Common Table Expression, which is a temporary result set.
View is a saved SQL query that acts as a virtual table
CTE is a temporary result set that can be referenced within a query
Views can be used to simplify complex queries and provide a layer of abstraction
CTEs are useful for recursive queries or when a result set needs to be referenced multiple times
Q142. JAVA CODES FOR BEGINNER
Java codes for beginners include basic syntax, data types, control structures, and object-oriented programming concepts.
Learn basic syntax and data types such as int, double, and String.
Understand control structures like if-else statements and loops.
Familiarize yourself with object-oriented programming concepts like classes and objects.
Practice coding exercises and projects to reinforce your learning.
Utilize online resources and tutorials to supplement your learning.
Examples:...read more
Q143. NODE FUNCTIONS FOR BINARY
Node functions for binary are used to manipulate binary data in Node.js.
The Buffer class is used to handle binary data in Node.js.
The `toString()` method can be used to convert binary data to a string.
The `write()` method can be used to write binary data to a buffer.
The `read()` method can be used to read binary data from a buffer.
The `slice()` method can be used to extract a portion of a buffer.
The `concat()` method can be used to concatenate multiple buffers.
The `compare()`...read more
Q144. Reverse a string
Reverse a string by iterating through the characters and swapping them
Create an empty string to store the reversed string
Iterate through the characters of the original string from end to start
Append each character to the new string
Return the reversed string
Q145. What is standalone database
A standalone database is a database that is independent and does not require connection to a network or other databases.
Standalone databases are typically used for small-scale applications or for testing purposes.
They do not rely on a network connection to function.
Examples of standalone databases include SQLite and Microsoft Access.
Q146. What is borrowing, pay down
Borrowing is obtaining funds from a lender, while pay down is the act of reducing the amount owed on a loan.
Borrowing involves taking out a loan or using credit to obtain funds.
Pay down refers to making payments towards reducing the outstanding balance on a loan.
Borrowing increases debt while pay down decreases debt.
Examples: Borrowing money from a bank to purchase a car, and then making monthly payments to pay down the loan.
Examples: Using a credit card to make a purchase is...read more
Q147. Routing in angular ?
Routing in Angular is used to navigate between different components of an application.
Angular Router is a powerful tool that allows you to define navigation paths and routes in your application.
It helps in creating Single Page Applications (SPAs) by loading different components based on the URL.
Routes can be defined using the RouterModule and ActivatedRoute modules.
Navigation can be done using routerLink directive or programmatically using Router service.
Guards can be used to...read more
Q148. OOPS pillers and explanation
OOPS pillars are the four main principles of Object-Oriented Programming: Encapsulation, Inheritance, Polymorphism, and Abstraction.
Encapsulation: Bundling data and methods that operate on the data into a single unit.
Inheritance: Allowing a class to inherit properties and behavior from another class.
Polymorphism: Ability to present the same interface for different data types.
Abstraction: Hiding the complex implementation details and showing only the necessary features.
Q149. Assistant name is RBI?
Q150. How to configure IP address
Configuring an IP address involves assigning a unique numerical label to a device connected to a network.
Access the network settings on the device
Choose the option to manually configure the IP address
Enter the desired IP address, subnet mask, default gateway, and DNS server
Save the settings and restart the device if necessary
Q151. What is dependancy Injection?
Dependency Injection is a design pattern where the dependencies of a class are provided from the outside rather than created within the class itself.
Allows for easier testing by providing mock dependencies
Promotes loose coupling between classes
Improves code reusability and maintainability
Commonly implemented using frameworks like Spring in Java
Q152. What is UPS and transformer
UPS stands for Uninterruptible Power Supply, a device that provides emergency power to a load when the input power source fails. A transformer is a device that transfers electrical energy between two or more circuits through electromagnetic induction.
UPS ensures continuous power supply during power outages or fluctuations
Transformers are used to step up or step down voltage levels in electrical circuits
UPS typically uses batteries to store energy for backup power
Transformers ...read more
Q153. What's is accrual & prepaid
Accrual is recognizing revenue or expenses before cash is exchanged. Prepaid is recognizing payment before goods or services are received.
Accrual is a method of accounting that recognizes revenue or expenses before cash is exchanged.
Prepaid is a method of accounting that recognizes payment before goods or services are received.
Accruals are used to match revenue and expenses to the period in which they are earned or incurred.
Prepaid expenses are assets that represent payments ...read more
Q154. Sales documents vs Billing document
Sales documents record the sale of goods or services, while billing documents are used to request payment for those goods or services.
Sales documents typically include details of the products or services sold, such as quantity, price, and customer information.
Billing documents are generated after the sale to request payment from the customer, and may include payment terms, due dates, and total amount due.
Sales documents are used to track revenue and sales performance, while b...read more
Q155. What is Accrual?
Accrual is a method of accounting where revenues and expenses are recorded when they are earned or incurred, regardless of when cash is exchanged.
Accrual accounting recognizes revenue when it is earned, not when it is received.
Expenses are recognized when they are incurred, not when they are paid.
Accrual accounting provides a more accurate representation of a company's financial position and performance.
Examples include recognizing revenue from a sale when the goods are deliv...read more
Q156. Ssl nd tls difference
SSL and TLS are both cryptographic protocols used to secure data transmission over the internet.
SSL stands for Secure Sockets Layer and TLS stands for Transport Layer Security.
SSL is an older protocol and has been replaced by TLS.
TLS is more secure than SSL and has better encryption algorithms.
Both SSL and TLS use digital certificates to authenticate the server and establish a secure connection.
TLS is backwards compatible with SSL, meaning that TLS can be used to secure conne...read more
Q157. How does Bert embeddings work
Bert embeddings is a language model that generates contextualized word embeddings.
Bert stands for Bidirectional Encoder Representations from Transformers.
It uses a transformer architecture to generate word embeddings that take into account the context of the word.
Bert embeddings are pre-trained on large amounts of text data and can be fine-tuned for specific NLP tasks.
They have been shown to outperform traditional word embeddings like Word2Vec and GloVe.
Example applications i...read more
Q158. Any certification?
Yes, I have certifications in Java and AWS.
Certified in Java programming language
Certified in Amazon Web Services (AWS)
Q159. How to Handel difficult client
Q160. What is docker architecture?
Q161. Basic principles of security management?
Basic principles of security management involve risk assessment, access control, incident response, and security awareness.
Risk assessment: Identifying and evaluating potential risks to the organization's security.
Access control: Implementing measures to control who has access to sensitive information or resources.
Incident response: Developing plans and procedures to respond to security incidents effectively.
Security awareness: Educating employees and users about security bes...read more
Q162. What is nat?
NAT stands for Network Address Translation. It is a process of modifying IP address information in IP packet headers while in transit across a traffic routing device.
NAT is used to conserve IP addresses by allowing multiple devices to share a single public IP address.
It can also be used to provide security by hiding the internal IP addresses of a network from the public internet.
There are different types of NAT such as Static NAT, Dynamic NAT, and Port Address Translation (PA...read more
Q163. Diffrence Between tuple and list
Tuple is immutable and fixed in size, while list is mutable and can change in size.
Tuple is defined using parentheses, while list is defined using square brackets.
Tuple elements can be accessed using index, while list elements can be modified using index.
Tuple is faster than list for iteration and accessing elements.
Example: tuple = (1, 2, 3), list = [1, 2, 3]
Q164. Procedures in Mainframe
Procedures in Mainframe are sets of instructions that automate tasks and ensure consistency.
Procedures are written in JCL (Job Control Language) and can be executed manually or scheduled to run automatically.
They can be used for tasks such as backups, file transfers, and system maintenance.
Procedures can include condition codes to handle errors and exceptions.
They can also be nested within other procedures for more complex tasks.
Examples of procedures include IBM's DFSMSrmm f...read more
Q165. Necessity and process of analysis
Analysis is necessary to understand the problem and find the best solution. It involves gathering data, identifying patterns, and making informed decisions.
Analysis helps to identify the root cause of a problem
It helps to gather relevant data and information
It involves identifying patterns and trends
Analysis helps to make informed decisions and find the best solution
Examples include market analysis, financial analysis, and data analysis
Q166. different security tools
Security tools are software programs or hardware devices that help protect computer systems and networks from cyber threats.
Firewalls: monitor and control incoming and outgoing network traffic based on predetermined security rules.
Antivirus software: detects and removes malicious software, such as viruses, worms, and trojans.
Intrusion Detection Systems (IDS): monitor network traffic for suspicious activity and alert administrators.
Virtual Private Networks (VPNs): encrypt inte...read more
Q167. What is test automation
Q168. What is rollover
Rollover is the process of reinvesting funds from a mature security or investment into a new security or investment.
Rollover typically occurs when an investor's current investment reaches maturity and they choose to reinvest the funds into a similar or different investment.
Common examples of rollover include rolling over a maturing certificate of deposit (CD) into a new CD or rolling over a 401(k) account into an Individual Retirement Account (IRA).
Q169. Challenges faced in fraud department
Challenges in fraud department include evolving fraud tactics, high volume of transactions, and balancing fraud prevention with customer experience.
Evolving fraud tactics require constant monitoring and updating of fraud detection systems.
High volume of transactions increases the likelihood of fraudulent activity going unnoticed.
Balancing fraud prevention measures with providing a seamless customer experience can be challenging.
Collaborating with other departments such as IT ...read more
Q170. What is vMotion?
vMotion is a feature in VMware that allows live migration of virtual machines between physical servers without downtime.
vMotion enables workload balancing, hardware maintenance, and data center consolidation.
It requires shared storage between the source and destination hosts.
vMotion can be initiated manually or automatically based on resource utilization.
It is a key feature in VMware's vSphere suite of virtualization products.
Example: Moving a virtual machine from one host to...read more
Q171. What is loan syndication
Loan syndication is the process of involving multiple lenders to provide funds for a single borrower.
Involves multiple lenders
Used for large loan amounts
Helps spread risk among lenders
Common in project finance
Lead arranger coordinates the syndication
Q172. What is earthing
Earthing is the process of connecting electrical systems to the ground to prevent electric shocks and ensure safety.
Earthing helps to protect against electrical faults and lightning strikes.
It provides a path for fault currents to flow safely into the ground.
Earthing is essential in electrical systems to prevent damage to equipment and ensure safety of individuals.
Examples of earthing include grounding rods, grounding wires, and grounding plates.
Q173. Amendment vs addendum
An amendment is a change or alteration to an existing document, while an addendum is an additional document added to provide extra information.
Amendment modifies existing content in a document.
Addendum adds new information or details to a document.
Amendment requires all parties to agree to the changes.
Addendum can be added unilaterally by one party.
Example: An amendment to a contract changes the payment terms. An addendum to a report includes additional data.
Q174. Types of Mutual Funds
Mutual funds are investment vehicles that pool money from multiple investors to invest in a diversified portfolio of securities.
Mutual funds are managed by professional fund managers.
They offer investors the opportunity to invest in a wide range of assets, such as stocks, bonds, and commodities.
There are different types of mutual funds, including equity funds, bond funds, money market funds, and index funds.
Equity funds invest primarily in stocks, while bond funds invest in f...read more
Q175. Binary search tree program
A binary search tree program is a data structure that allows efficient searching, insertion, and deletion of elements.
The left subtree of a node contains only nodes with keys lesser than the node's key
The right subtree of a node contains only nodes with keys greater than the node's key
The left and right subtree each must also be a binary search tree
Example: Inserting elements 5, 3, 7, 1, 9, 4, and 6 in a binary search tree
Example: Searching for element 4 in the binary search ...read more
Q176. Your family back ground
My family background is diverse and multicultural.
My parents are from different countries and cultures.
I grew up speaking multiple languages at home.
My family values education and hard work.
We enjoy learning about different cultures and trying new foods.
Family gatherings are always lively and full of laughter.
Q177. Technologies you’ve worked on
I have experience working with a variety of technologies including SQL, Python, Tableau, and Jira.
SQL
Python
Tableau
Jira
Q178. Basic troubleshooting steps
Basic troubleshooting steps involve identifying the issue, gathering information, isolating the problem, testing solutions, and implementing fixes.
Identify the issue by gathering information from the user or system logs.
Isolate the problem by determining if it's a hardware or software issue.
Test solutions by trying different troubleshooting steps or tools.
Implement fixes by applying patches, updates, or configuration changes.
Document the troubleshooting process for future ref...read more
Q179. Corporate Action meaning
Corporate Action refers to an event initiated by a publicly traded company that impacts its shareholders or securities.
Corporate actions can include stock splits, dividends, mergers, acquisitions, spin-offs, and rights issues.
These actions can affect the value of the company's stock and the overall investment portfolio of shareholders.
Investors need to stay informed about corporate actions to make informed decisions about their investments.
Q180. Basic services in cloud?
Q181. Location of office
Our office is located in the heart of downtown, easily accessible by public transportation.
Located in downtown area
Accessible by public transportation
Close to major landmarks and amenities
Q182. frequency of each character
The frequency of each character in a given string is calculated and displayed.
Iterate through the string and count the occurrences of each character
Store the counts in a data structure like a hashmap or array
Return the frequency of each character
Q183. Explain ADDS Infrastructure
ADDS Infrastructure is a set of services and tools provided by Microsoft to manage users, computers, and other resources in a network.
ADDS stands for Active Directory Domain Services
It provides centralized authentication and authorization for network resources
It allows for the creation of domains, forests, and trusts
It includes tools such as Active Directory Users and Computers, Group Policy Management, and DNS Manager
It can be used to manage Windows-based servers, workstatio...read more
Q184. OSI model layers details
The OSI model is a conceptual model that characterizes and standardizes the communication functions of a telecommunication or computing system.
The OSI model has 7 layers: Physical, Data Link, Network, Transport, Session, Presentation, and Application.
Each layer has a specific function and communicates with the layers above and below it.
The Physical layer deals with the physical transmission of data, while the Application layer deals with user interfaces and data representatio...read more
Q185. Credit Flow for Payments
Credit flow for payments refers to the process of how funds are transferred from the payer to the payee.
Credit flow involves multiple parties such as banks, payment processors, and merchants.
The process typically starts with the payer initiating a payment through a payment gateway.
The payment gateway then sends the payment information to the acquiring bank, which processes the payment and sends it to the issuing bank.
The issuing bank then approves or declines the payment and ...read more
Q186. What is expected CTC
Expected CTC should be based on industry standards, experience, and skills.
Expected CTC should be in line with industry standards for the position
Consider the candidate's level of experience and skills when determining the expected CTC
Factors such as location, company size, and benefits package can also impact the expected CTC
Provide a range rather than a specific number to allow for negotiation
Q187. Discuss about OWASP features
OWASP features are security standards and best practices for web applications.
OWASP Top 10 is a list of the top 10 most critical web application security risks.
OWASP ZAP is a popular security tool for finding vulnerabilities in web applications.
OWASP ASVS provides a framework for building secure applications.
OWASP SAMM is a maturity model for software assurance that helps organizations assess and improve their security practices.
Q188. Troubleshooting techniques
Troubleshooting techniques involve identifying, isolating, and resolving issues in a systematic manner.
Gather information about the issue from users or logs
Identify the root cause of the problem
Isolate the issue to determine the scope of impact
Develop a plan to resolve the issue
Implement the solution and test to ensure it is fixed
Document the troubleshooting process for future reference
Q189. Find duplicates in array
Find duplicates in array of strings
Iterate through the array and store each element in a hash set
If an element is already in the hash set, it is a duplicate
Return a list of all duplicates found
Q190. Types of DR strategies
Q191. custom directive example
Custom directives are used in AngularJS to extend the functionality of HTML elements.
Directives are defined using the directive() method
They can be used to create reusable components
Example:
Q192. Create a SQL Procedure.
Q193. Explain OSI reference model
The OSI reference model is a conceptual framework that standardizes the functions of a telecommunication or computing system into seven layers.
The OSI model stands for Open Systems Interconnection model
It divides network communication into seven layers: Physical, Data Link, Network, Transport, Session, Presentation, and Application
Each layer has specific functions and interacts with adjacent layers for data transmission
For example, the Physical layer deals with the physical c...read more
Q194. .Net Core difference
.Net Core is a cross-platform, open-source framework for building modern applications.
Supports development on Windows, Linux, and macOS
Modular architecture allows for lightweight and efficient applications
Includes ASP.NET Core for building web applications
Provides improved performance and scalability compared to .NET Framework
Supports containerization and microservices architecture
Example: .NET Core is used to build applications like Microsoft Teams, Visual Studio Code, and A...read more
Q195. IndAS 115 Explain
IndAS 115 is a new revenue recognition standard that impacts how revenue is recognized in financial statements.
IndAS 115 replaces the existing revenue recognition standards and provides a comprehensive framework for recognizing revenue from contracts with customers.
It focuses on identifying performance obligations in a contract, determining the transaction price, allocating the transaction price to the performance obligations, and recognizing revenue when the performance obli...read more
Q196. Life cycle of loan
The life cycle of a loan involves several stages from application to repayment.
Application: Borrower submits application with necessary documents
Approval: Lender reviews application and approves or denies loan
Disbursement: Loan amount is disbursed to borrower
Repayment: Borrower makes regular payments to repay the loan
Closure: Loan is fully repaid and closed
Default: Borrower fails to repay loan leading to legal actions
Q197. Define bug cycle
Bug cycle is the process of identifying, reporting, fixing, retesting, and closing bugs in software development.
Bug is identified by QA Engineer during testing phase
Bug is reported to development team for fixing
Development team fixes the bug
QA Engineer retests the bug to verify the fix
If bug is fixed, it is closed. If not, cycle repeats
More about working at FIS
Top HR Questions asked in ExpertLancing Research Services
Interview Process at ExpertLancing Research Services
Top Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month