Goldman Sachs
300+ Planet Spark Interview Questions and Answers
Q201. What is the effect in case fiscal deficit increases on exchange rate?
Increase in fiscal deficit leads to depreciation of exchange rate.
Fiscal deficit means government spending exceeds revenue, leading to increased borrowing.
This increases the supply of domestic currency, leading to depreciation.
Investors may demand higher interest rates to compensate for increased risk, further depreciating the exchange rate.
Examples include India's rupee depreciation due to high fiscal deficit in 2013 and Argentina's peso depreciation in 2018.
Q202. How to merge multiple sorted arrays into one sorted array
Merge multiple sorted arrays into one sorted array
Iterate through each array and merge them into a single array
Use a priority queue or heap data structure to efficiently merge the arrays
Implement a merge sort algorithm to combine the arrays into one sorted array
Q203. How will you mane a LRU Cache
An LRU cache can be made using a doubly linked list and a hash map.
Create a doubly linked list to store the cache items.
Create a hash map to store the key-value pairs.
When a new item is added, check if the cache is full. If it is, remove the least recently used item from the linked list and hash map.
When an item is accessed, move it to the front of the linked list.
When an item is removed, remove it from both the linked list and hash map.
Q204. Find integer solutions of x^y=y^x.
Find integer solutions of x^y=y^x.
If x=y, then x^y=y^x=1
If x
If x>y, then x^y>y^x
Only solution is (2,4) and (4,2)
Use logarithms to prove
Q205. How can you refine your Graph traversing solution?
Refine graph traversing solution by optimizing algorithms and data structures.
Use efficient algorithms like Dijkstra's or A* for shortest path traversal.
Implement data structures like priority queues or heaps for faster traversal.
Consider using parallel processing or distributed computing for large graphs.
Optimize memory usage by using compressed data structures like succinct graphs.
Use caching to avoid redundant computations and improve performance.
Q206. difference between hedge funds and private equity
Hedge funds are actively managed investment funds that use various strategies to generate high returns, while private equity firms invest in private companies and aim to increase their value.
Hedge funds are open to a wider range of investors than private equity funds
Hedge funds use leverage to increase returns, while private equity firms use debt to finance acquisitions
Hedge funds have a shorter investment horizon than private equity firms
Private equity firms typically take a...read more
Q207. Which one is greater, (Pie power e ) or (e power pie) ?
e^π is greater than π^e.
e^π ≈ 23.14
π^e ≈ 22.46
e^π > π^e
Q208. When a message arrives at network interface card what exactly happens after that, and what is Operating system’s role in it?
What is Virtual Memory?
Q210. Print all nodes at a distance k from a given node in binary tree?
Print all nodes at a distance k from a given node in binary tree
Use Depth First Search (DFS) to traverse the tree
Maintain a variable to keep track of the distance from the given node
Print the nodes when the distance is equal to k
Design a job scheduler. Tasks will be given as inputs with an extra parameter ‘delay’.That meaning the task has to run after this ‘delay’ time.
Q212. Given an excel sheet with column names mapped to column numbers as follows :A-1 , B-2…..Z-26,AA-27…….AZ-52 and so on.Now write a function to return the column name for a given column number
Function to return column name for a given column number in Excel sheet.
Divide the given column number by 26 and get the quotient and remainder.
Convert the remainder to the corresponding column name letter.
Repeat the above steps with the quotient until quotient is zero.
Join the column name letters in reverse order to get the final column name.
Why we use linked list ?
Dynamic allocation?
Recursion?
Q214. When would Java be used over C/C++?
Java is used over C/C++ when platform independence, ease of use, and security are important.
Java is platform independent, meaning it can run on any operating system or hardware that has a Java Virtual Machine (JVM). C/C++ code needs to be compiled separately for each platform.
Java has automatic memory management, reducing the risk of memory leaks and making it easier to write and maintain code. C/C++ requires manual memory management.
Java has built-in security features, such ...read more
Q215. Can can change in working capital be negative?
Yes, change in working capital can be negative.
A negative change in working capital means that current liabilities have increased more than current assets.
This can happen when a company pays off short-term debt or reduces its inventory levels.
Negative working capital can also indicate that a company is experiencing financial difficulties.
However, it is important to analyze the reasons behind the negative change in working capital before drawing conclusions.
Negative working ca...read more
Q216. What is lazy loading? Advantages and disadvantages of the same
Q217. Design a newspaper subscription system
Design a newspaper subscription system
Create a user registration system
Allow users to select subscription plan and payment method
Provide options for delivery frequency and start/end dates
Send reminders for subscription renewal
Allow users to modify or cancel subscription
Track subscription history and payment records
Q218. Different types of collection in C# and difference between hashmap and hashtable and their internal implementation
Q219. You have the co-ordinates of two rectangles. Find in minimum number of comparisons, if they are overlapping or not
To determine if two rectangles are overlapping, compare the coordinates of their corners.
Compare the x-coordinates of the rightmost corner of the first rectangle and the leftmost corner of the second rectangle.
Compare the x-coordinates of the leftmost corner of the first rectangle and the rightmost corner of the second rectangle.
Compare the y-coordinates of the topmost corner of the first rectangle and the bottommost corner of the second rectangle.
Compare the y-coordinates of...read more
Q220. Does outlook .pst or .ost files get corrupt, if does how do you plan to recover same.
Yes, Outlook .pst or .ost files can get corrupt. Recovery can be done using scanpst.exe or third-party tools.
Corruption can occur due to various reasons such as sudden shutdown, virus attack, or oversized file.
Scanpst.exe is a built-in tool in Outlook that can be used to repair minor corruption issues.
For major corruption issues, third-party tools like Stellar Repair for Outlook can be used.
It is important to regularly backup .pst or .ost files to avoid data loss.
Q221. What is the determinant of an n*n matrix with diagonal elements all 'a' and off-diagonal elements all 1
Q222. Which one is more efficient a Join operation or a nested query
Q223. How ajax works? Difference between angular js and jquery
Q224. The classic puzzle to find where is the 1 rupee when 3 friends visit a restaurant and pay 10 Rs each
Q225. Explain what is Binary Search Tree
Binary Search Tree is a data structure where each node has at most two children, with left child less than parent and right child greater.
Nodes have at most two children - left and right
Left child is less than parent, right child is greater
Allows for efficient searching, insertion, and deletion of elements
Q226. What are the different libraries you have used in c++
Q227. Why does a company go for share buy back?
Companies go for share buyback to increase shareholder value and improve financial ratios.
To return excess cash to shareholders
To increase earnings per share by reducing the number of outstanding shares
To improve financial ratios such as return on equity and earnings per share
To signal to the market that the company believes its shares are undervalued
To prevent hostile takeovers by reducing the number of outstanding shares
Examples: Apple, Microsoft, IBM
Q228. What is elder abuse and how do you detect it
Elder abuse is mistreatment of older adults, which can be physical, emotional, financial, or sexual.
Detecting elder abuse involves looking for signs of physical injuries, such as bruises, cuts, or burns
Changes in behavior, such as withdrawal or depression, can also be a sign of elder abuse
Unexplained financial transactions or sudden changes in a senior's financial situation can indicate financial abuse
Sexual abuse can be detected by observing signs of trauma or changes in beh...read more
Q229. Find the missing number in the array? Array size is of n-1 and contains 1 to n numbers with 1 digit missing.
The missing number in the array can be found by calculating the sum of all numbers in the array and then subtracting it from the sum of numbers from 1 to n.
Calculate the sum of all numbers in the array.
Calculate the sum of numbers from 1 to n using the formula n*(n+1)/2.
Subtract the sum of array from the sum of numbers from 1 to n to find the missing number.
Q230. Puzzle: Using all(8,8,3,3) and only operators(*,/,-,+), make 24
Using 8,8,3,3 and only *, /, -, + operators, make 24.
Start with 8+8=16
Divide 3 by 3 to get 1
Multiply 16 by 1 to get 16
Add 8 to 16 to get 24
Q231. Did you made any error while processing and how it was caught?
Yes, I once made an error in processing a customer order, but it was caught during the quality check process.
Made an error in processing a customer order by entering the wrong quantity
Error was caught during the quality check process before the order was shipped out
Implemented double-checking procedures to prevent similar errors in the future
Q232. What is Asset Management
Asset management is the process of managing and optimizing a company's assets to maximize their value and minimize risk.
Asset management involves identifying, tracking, and evaluating assets
It includes developing strategies to optimize asset performance and minimize risk
Examples of assets that can be managed include financial investments, real estate, and equipment
Asset management can be done in-house or outsourced to a third-party firm
Q233. what is custodian banking
Custodian banking involves holding and safeguarding financial assets on behalf of clients.
Custodian banks provide services such as asset safekeeping, settlement of trades, and corporate actions processing.
They also offer reporting and analytics to clients on their holdings and transactions.
Examples of custodian banks include State Street, BNY Mellon, and J.P. Morgan.
Custodian banking is important for institutional investors such as pension funds, mutual funds, and hedge funds...read more
Q234. How to do setup of system or provide support clients?
To setup a system or provide support to clients, one needs to have technical knowledge and communication skills.
Understand the client's requirements and provide solutions accordingly
Install and configure hardware and software components
Provide training and support to clients
Troubleshoot and resolve technical issues
Maintain documentation and keep track of system updates
Communicate effectively with clients and team members
Q235. There are 12 rats, 11 of them are trained to eat at fast rate except one. With minimum number if bread loafs I need identify the slow rat
Q236. Write down function to select pivot element randomly in Quick Sort
Function to randomly select pivot element in Quick Sort
Generate a random index within the range of the array
Return the element at the randomly generated index as the pivot
Q237. There ‘s an array with every element repeated twice except one. Find that element
Find the element in an array that is not repeated.
Iterate through the array and use a hash table to keep track of the count of each element.
After iterating, find the element with a count of 1 in the hash table.
Return the element that is not repeated.
Q238. Given a file with business Date and contents. Extract the date(Validate it) and count all the other records in the file
Q239. Write a program that can play a Brick ball game?
A program to play Brick ball game can be developed using a game engine and programming language.
Choose a game engine like Unity or Unreal Engine to develop the game
Use a programming language like C# or C++ to code the game mechanics
Implement physics engine to simulate ball and brick collisions
Design levels with increasing difficulty and power-ups for the player
Add sound effects and music to enhance the gaming experience
Q240. What is trade life cycle
Trade life cycle refers to the stages involved in a trade from initiation to settlement.
Trade initiation - Trade is proposed and agreed upon by parties involved
Trade execution - Trade is executed on the exchange or over-the-counter market
Trade confirmation - Parties confirm the details of the trade
Trade settlement - Payment and transfer of securities occur
Trade reconciliation - Ensuring all details match between parties
Q241. How will you print all the subsets of a given set?
Printing all subsets of a given set.
Use recursion to generate all possible subsets.
For each element in the set, either include it or exclude it in the subset.
Base case is when the set is empty, print the subset.
Time complexity is O(2^n) where n is the size of the set.
Q242. what is private equity
Private equity is a type of investment where funds are raised from investors to acquire or invest in companies that are not publicly traded.
Private equity firms typically buy a controlling stake in a company and then work to improve its operations and profitability before selling it for a profit.
Private equity investments are typically made in mature companies with a proven track record of success.
Private equity firms may also invest in distressed companies with the goal of t...read more
Q243. Given a fair coin , find the expected number of trails for 4 consecutive heads
Expected number of trials for 4 consecutive heads with a fair coin.
The probability of getting 4 consecutive heads is 1/2^4 = 1/16
The expected number of trials for 4 consecutive heads is 1/p = 16
This is because the expected value of a geometric distribution with probability p is 1/p
Therefore, the expected number of flips for 4 consecutive heads is 16
Q244. What do you know about disputes, banking, complaints and SLA?
Disputes, banking, complaints, and SLA are key aspects of customer service in the financial industry.
Disputes in banking refer to disagreements between customers and financial institutions regarding transactions or services.
Complaints are formal expressions of dissatisfaction from customers about the services provided by a bank.
SLA (Service Level Agreement) is a contract between a service provider and a customer that outlines the level of service expected.
Effective handling o...read more
Q245. Given a graph, find whether there is a 3 cycle in the graph in an efficient manner
Efficiently determine if a given graph contains a 3 cycle.
Use depth-first search (DFS) to traverse the graph
For each node, check if there is a path of length 3 that ends at that node
If such a path exists, return true
If DFS completes without finding a 3 cycle, return false
Q246. Find the number of parenthesis have to be removed to make it a valid parenthesis --> (())) - 1 has to be removed, ((() -> 2 has to be removed.
Count the number of parenthesis to be removed to make it valid.
Iterate through the string and keep track of open and close parenthesis.
If a close parenthesis is encountered without a corresponding open parenthesis, increment the count of removals.
Return the total count of removals needed to make the string valid.
Q247. How do you write a callback function?
A callback function is a function that is passed as an argument to another function and is executed later.
A callback function is defined separately and passed as an argument to another function.
The function that receives the callback function can then call it at a later time.
Callback functions are commonly used in asynchronous programming or event-driven programming.
Example: function fetchData(callback) { ... }
Example: fetchData(function(data) { console.log(data); });
Q248. Find the next largest in the right side for every array element.
Find the next largest in the right side for every array element.
Iterate through the array from right to left
Use a stack to keep track of elements
Pop elements from stack until a greater element is found
If no greater element is found, assign -1
Q249. Given a stack of unsorted characters, and an empty stack, without using any extra space sort the stack elements and place them into the empty stack
Sort unsorted characters in a stack without using extra space
Pop the top element from the original stack
Compare it with the top element of the sorted stack
If the element is greater, push it to the sorted stack
If the element is smaller, pop elements from the sorted stack and push them to the original stack until the top element of the sorted stack is greater
Repeat until the original stack is empty
Q250. What are immutable classes? Write an immutable class.
Immutable classes are classes whose instances cannot be modified after creation.
Immutable classes have all fields marked as final and private.
They do not have any setter methods to modify the state of the object.
Any modification to an immutable object results in a new object being created.
Example of an immutable class: public class Person { private final String name; private final int age; public Person(String name, int age) { this.name = name; this.age = age; } public String...read more
Q251. What does investment banks do?
Investment banks provide financial services to corporations, governments, and individuals.
They help companies raise capital by issuing stocks and bonds.
They provide advisory services for mergers and acquisitions.
They facilitate trading of securities in the financial markets.
They offer research and analysis on various investment opportunities.
They assist in managing risk and provide hedging strategies.
They offer wealth management services to high-net-worth individuals.
They pla...read more
Q252. What is a strength of yours
One of my strengths is my ability to analyze complex data and identify key insights.
Strong analytical skills
Ability to think critically and problem-solve
Experience with data analysis tools such as Excel or Tableau
Q253. What is WACC? Explain in Detail
WACC stands for Weighted Average Cost of Capital. It is the average cost of all the capital used by a company.
WACC is used to determine the minimum return a company must earn on its investments to satisfy its investors.
It takes into account the cost of debt and equity, as well as the proportion of each in the company's capital structure.
The formula for WACC is: (Cost of Equity x % Equity) + (Cost of Debt x % Debt) + (Cost of Preferred Stock x % Preferred Stock)
For example, if...read more
Q254. How do you implement LRU cache?
LRU cache is implemented using a doubly linked list and a hash map.
Create a doubly linked list to keep track of the order of elements in the cache.
Create a hash map to store the key-value pairs of the cache.
When a new element is added, check if the cache is full. If it is, remove the least recently used element from the linked list and the hash map.
When an element is accessed, move it to the front of the linked list to mark it as the most recently used.
When an element is remo...read more
Q255. 2-3 design rounds eg- designing a food delivery app
Designing a food delivery app
Identify target audience and their needs
Create user-friendly interface for ordering food
Integrate payment gateway for easy transactions
Develop a tracking system for delivery status
Ensure timely delivery and quality of food
Implement customer feedback system for improvement
Partner with local restaurants for wider menu options
Q256. what is the financial news you read recently?
I read about the rise in stock prices of Tesla Inc.
Tesla's stock price rose by 8% in a single day due to the announcement of a 5-for-1 stock split.
This move will make Tesla's shares more affordable for investors.
The company's market capitalization has now surpassed that of Toyota, making it the world's most valuable automaker.
Q257. Linked list Algorithms
Linked list algorithms involve operations on linked lists, such as insertion, deletion, and traversal.
Linked list algorithms are used to manipulate data stored in linked lists.
Common operations include inserting a new node, deleting a node, and traversing the list.
Examples of linked list algorithms include reversing a linked list, finding the middle node, and detecting a loop in the list.
Q258. How to improve model performance beyond hyperopt?
To improve model performance beyond hyperopt, consider ensemble methods, feature engineering, and data augmentation.
Implement ensemble methods like bagging, boosting, or stacking to combine multiple models.
Perform feature engineering to create new informative features or transform existing ones.
Apply data augmentation techniques to increase the size and diversity of the training data.
Consider using advanced algorithms like XGBoost, Random Forest, or Neural Networks.
Regularize...read more
Q259. How to deal with the situation where Developer has not worked
Address the issue by discussing with the developer to understand the reason for not working and finding a solution together.
Schedule a meeting with the developer to discuss the situation and understand the reasons for not working.
Provide support and resources to help the developer overcome any obstacles they may be facing.
Collaborate with the developer to come up with a plan to address the issue and ensure work is completed on time.
Monitor progress closely and offer assistanc...read more
Q260. Write a perl and awk script to get the permissions of a file or a directory.
Q261. Use linux commands to find 10 most frequently occurring word in a file
Q262. features of java 8 Like lambda expression,functional interface, foreach
Java 8 introduced lambda expressions, functional interfaces, and forEach method.
Lambda expressions allow functional programming in Java.
Functional interfaces are interfaces with only one abstract method.
forEach method is used to iterate over collections in a concise way.
Stream API is also introduced in Java 8 for processing collections.
Optional class is introduced to handle null values.
Default and static methods are also introduced in interfaces.
Q264. Program for Anagrams. Different approcahes( hashing, sorting)
An anagram program can be implemented using hashing or sorting techniques.
Hashing approach: Use a hash table to store the sorted characters of each word. Compare the hash values to find anagrams.
Sorting approach: Sort the characters of each word and compare the sorted strings to find anagrams.
Example: For input ['cat', 'act', 'dog', 'god'], the hashing approach would group 'cat' and 'act' as anagrams, while the sorting approach would group 'dog' and 'god'.
Q265. Code for first non-repeating character in the string
The code finds the first non-repeating character in a given string.
Iterate through the string and count the occurrences of each character using a hash map.
Iterate through the string again and return the first character with a count of 1.
If no such character is found, return null or an empty string.
Q266. Find the shortest path in 0,1 matrix from (0,0) to (n-1,n-1)
Find shortest path in 0,1 matrix from (0,0) to (n-1,n-1)
Use Breadth First Search (BFS) algorithm to find shortest path
Create a visited matrix to keep track of visited nodes
Create a distance matrix to keep track of distance from source node
Start BFS from (0,0) and keep updating visited and distance matrices
Return distance value at (n-1,n-1) in distance matrix
Q267. Any innovation or automation done to enhance productivity.
Yes, we have implemented automation in our customer service department.
We have implemented chatbots to handle basic customer queries.
We have also automated the process of ticket creation and assignment.
This has resulted in faster resolution times and increased customer satisfaction.
We have also used data analytics to identify common customer issues and proactively address them.
This has reduced the number of customer complaints and improved overall efficiency.
Q268. Estimate the probability of finding a deer at Placement office, IIT Madras at 1:30 PM on a sunday
Q269. An ant is on the one corner of a cube. In how much time can it reach the opp side
The ant can reach the opposite side of the cube in a minimum of 3 moves.
The cube has 6 faces, so the ant needs to move to a face opposite to its starting position.
The ant can move along the edges of the cube to reach the opposite face.
The shortest path for the ant to reach the opposite face is by moving along the edges of a single face, then crossing to the adjacent face, and finally moving along the edges of the opposite face.
Therefore, the ant can reach the opposite side of...read more
Q270. Best complexity for finding two largest numbers in a set
O(n) time complexity using a single pass algorithm
Iterate through the array and keep track of the two largest numbers
Initialize two variables to store the largest and second largest numbers
Compare each element with the largest and second largest numbers and update accordingly
Return the two largest numbers
Example: [5, 8, 3, 9, 12] -> largest: 12, second largest: 9
Q271. Clone a binary tree with random pointer
Clone a binary tree with random pointer
Create a new node for each node in the original tree
Store the mapping of original node to new node in a hash map
Traverse the original tree and for each node, connect the corresponding new node's random pointer
Return the root of the new tree
Q272. Check if a linked list with 2n+1 elements is a palindrome without using any extra space
Check if a linked list with 2n+1 elements is a palindrome without using extra space
Traverse the linked list to find the middle node
Reverse the second half of the linked list
Compare the first half with the reversed second half
If all elements match, it is a palindrome
Q273. Difference between buffered IO and unbuffered IO. Advantages and disadvantages
Q274. Classify tweets as Retweet - Analytics
To classify tweets as Retweet - Analytics, we can look for the presence of 'RT' and analyze engagement metrics.
Look for the presence of 'RT' in the tweet text
Analyze engagement metrics such as number of likes, retweets, and comments
Consider the source of the tweet - if it is from a verified account or has a large following, it is more likely to be a retweet
Use machine learning algorithms to classify tweets based on patterns and features
Q275. 2008 economic crisis reasons. Most economical depressed country ever.
Q276. Swap two variables without using third variable
Swap two variables without using third variable
Use arithmetic operations to swap the values
Add the values of the two variables and store it in one variable
Subtract the value of one variable from the sum and store it in the other variable
Subtract the value of the other variable from the sum and store it in the first variable
Q277. Longest increasing subsequence and its implementation with dynamic programming
Q278. Find the peak in an array in less than O(n) time.
Find peak in array in less than O(n) time
Use binary search to find peak element
Compare middle element with its neighbors to determine direction
Repeat search in direction of larger neighbor until peak is found
Q279. How will you implement State Machine
State Machine is implemented by defining states, transitions, and actions to control the flow of a system.
Define the states of the system
Identify the possible transitions between states
Specify the actions to be performed during each transition
Implement the state transitions and actions in code
Use appropriate data structures to represent the states and transitions
Ensure proper error handling and fallback mechanisms
Q280. write a code to swap two numbers by using only 2 variables
Swap two numbers using only 2 variables
Use XOR operation to swap two numbers without using a third variable
Example: a = 5, b = 10; a = a ^ b; b = a ^ b; a = a ^ b; // a = 10, b = 5
Q281. How to tune the model performance?
To tune model performance, adjust hyperparameters, preprocess data, increase training data, and use ensemble methods.
Adjust hyperparameters such as learning rate, regularization, and batch size.
Preprocess data by scaling, normalizing, or handling missing values.
Increase training data to reduce overfitting and improve generalization.
Use ensemble methods like bagging or boosting to combine multiple models.
Perform cross-validation to evaluate model performance and select the bes...read more
Q282. Best complexity for finding the largest number in a set
The best complexity for finding the largest number in a set is O(n).
Iterate through the set and keep track of the largest number seen so far.
Compare each number to the current largest number and update if necessary.
This approach has a time complexity of O(n) and is the most efficient for finding the largest number in a set.
Q284. How will you detect a cycle in a graph?
Q285. What are the aml and kyc requirements?
AML and KYC requirements are regulations that financial institutions must follow to prevent money laundering and verify the identity of their customers.
AML (Anti-Money Laundering) requirements involve monitoring transactions, reporting suspicious activities, and conducting customer due diligence.
KYC (Know Your Customer) requirements involve verifying the identity of customers, assessing their risk level, and maintaining updated customer information.
Examples of AML and KYC req...read more
Q286. Use of Static keyword in different circumstances
The static keyword is used in different circumstances to define variables, methods, and classes.
Static variables are shared among all instances of a class
Static methods can be called without creating an instance of a class
Static classes cannot be instantiated and are used for grouping related methods and variables
Static blocks are used to initialize static variables or perform one-time actions
Q287. Find the maximum sub-array having continues numbers(i,i+1,i+2..)
Find the maximum sub-array with continuous numbers
Iterate through the array and keep track of the current sub-array sum
Update the maximum sum and sub-array indices as you iterate
Handle cases where the array contains negative numbers as well
Example: Input array [2, 3, -4, 5, 7], maximum sub-array is [2, 3, -4, 5, 7]
Q288. Number of islands variant - focused on time complexity
Count the number of islands in a 2D grid variant, focusing on time complexity.
Use Depth First Search (DFS) or Breadth First Search (BFS) to traverse the grid and mark visited islands.
Optimize by using Union Find data structure to keep track of connected islands.
Time complexity can be O(m*n) where m is the number of rows and n is the number of columns.
Q289. A time when you had to turn a negative to positive
I turned a negative situation into a positive one by finding a creative solution.
Identified the root cause of the negative situation
Brainstormed potential solutions
Implemented a creative solution that turned the situation around
Communicated effectively with team members to ensure success
Q290. Implement queue without using any data structure
Q291. What do you mean by Networking?
Networking refers to the process of connecting devices and systems to share information and resources.
Networking involves the use of hardware and software to establish connections between devices and systems.
Networking allows for the sharing of information and resources, such as files, printers, and internet access.
Networking can be done through various methods, including wired and wireless connections.
Examples of networking technologies include Ethernet, Wi-Fi, and Bluetooth...read more
Q292. What do you know about chargeback and fraud
Chargeback and fraud are common issues in financial transactions, involving unauthorized transactions and disputes.
Chargeback is a process where a customer disputes a transaction and the funds are returned to the customer.
Fraud involves unauthorized or deceptive activities to gain financial advantage.
Fraud can occur through various methods such as identity theft, phishing, and card skimming.
Fraud analysts use data analysis and investigation techniques to detect and prevent fr...read more
Q293. What is ETL and which tools have you worked on.
ETL stands for Extract, Transform, Load. It is a process of extracting data from various sources, transforming it into a usable format, and loading it into a target database.
ETL is a crucial process in data engineering for moving and transforming data between systems.
Common ETL tools include Informatica, Talend, Apache NiFi, SSIS, and Apache Spark.
ETL tools help automate the process of extracting data from different sources, transforming it according to business rules, and lo...read more
Q294. Print all nodes at a distance k from a given node
Print all nodes at a distance k from a given node
Use Depth First Search (DFS) to traverse the tree and keep track of the distance from the given node
When the distance is equal to k, add the node to the result
If the distance is less than k, continue traversing the tree recursively
If the distance is greater than k, backtrack to the parent node and continue traversing
Time complexity: O(n), Space complexity: O(h)
Q295. What do know about fixed income securities
Fixed income securities are investments that pay a fixed interest or dividend income, such as bonds and certificates of deposit.
Fixed income securities are debt instruments issued by governments, corporations, or other entities to raise capital.
Investors receive regular interest payments until the maturity date, when the principal amount is repaid.
Examples include Treasury bonds, corporate bonds, municipal bonds, and preferred stocks.
Fixed income securities are considered les...read more
Q296. What do know about bonds matching process
Bonds matching process involves pairing bond issuers with investors based on their preferences and requirements.
Bonds matching process helps bond issuers find suitable investors for their bonds
Investors specify their preferences such as bond type, duration, yield, etc.
The matching process uses algorithms to match bond issuers with investors based on their criteria
This process helps streamline the bond issuance and investment process
Q297. What will be included in RCA?
RCA stands for Root Cause Analysis and includes identifying the underlying cause of a problem or issue.
Identifying the problem or issue
Gathering data and evidence
Analyzing the data to determine the root cause
Developing and implementing solutions to address the root cause
Monitoring and evaluating the effectiveness of the solutions
Examples: RCA for a manufacturing defect, RCA for a customer complaint, RCA for a workplace accident
Q298. do I know about Obect Oriented python
Q299. What are company evaluation methods?
Company evaluation methods are techniques used to assess the financial health and performance of a company.
Financial ratio analysis
Discounted cash flow analysis
Comparable company analysis
Asset-based valuation
Earnings multiples
Scenario analysis
Market capitalization
Dividend discount model
Q300. Find if a given binary tree is a sum tree
Check if a binary tree is a sum tree
A sum tree is a binary tree where the value of each node is equal to the sum of its left and right subtree
Recursively check if the left and right subtrees are sum trees and if their sum equals the value of the current node
If the node is a leaf node, return true
If the node is null, return true
If the node is not a sum tree, return false
More about working at Goldman Sachs
Top HR Questions asked in Planet Spark
Interview Process at Planet Spark
Top Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month