Filter interviews by
I am familiar with concepts such as encryption, network security, access control, and security protocols.
Encryption methods such as AES, RSA, and DES
Network security practices like firewalls, VPNs, and intrusion detection systems
Access control mechanisms like role-based access control (RBAC) and multi-factor authentication
Security protocols such as SSL/TLS, IPsec, and SSH
Executing SQL queries involves retrieving, updating, and manipulating data in a database using structured query language.
SELECT statement: Used to retrieve data. Example: SELECT * FROM employees;
INSERT statement: Used to add new records. Example: INSERT INTO employees (name, age) VALUES ('John', 30);
UPDATE statement: Used to modify existing records. Example: UPDATE employees SET age = 31 WHERE name = 'John';
DELETE...
Code for a login page in React
Create a form component with input fields for username and password
Handle form submission and validation
Use state to store user input and handle login functionality
Composite key is a combination of multiple columns to uniquely identify a record, while primary key is a unique identifier for a record and unique key allows only unique values.
Composite key is made up of multiple columns to uniquely identify a record
Primary key is a unique identifier for a record and cannot have duplicate values
Unique key allows only unique values but can have null values
What people are saying about HSBC Group
Overloading is having multiple methods in the same class with the same name but different parameters. Overriding is implementing a method in a subclass that is already present in the superclass.
Overloading involves multiple methods with the same name but different parameters
Overriding involves implementing a method in a subclass that is already present in the superclass
Overloading is determined at compile time, wh...
Abstract class can have both abstract and non-abstract methods, while interface can only have abstract methods.
Abstract class can have method implementations, while interface cannot.
A class can implement multiple interfaces, but can only inherit from one abstract class.
Interfaces are used to define contracts for classes to implement, while abstract classes are used to provide a common base for subclasses.
Example: ...
Given a Binary Tree with integer nodes, determine the maximum level sum among all the levels in the tree. The sum for a level is defined as the sum of all node values pre...
Find the maximum level sum in a binary tree by calculating the sum of nodes at each level.
Traverse the binary tree level by level and calculate the sum of nodes at each level.
Keep track of the maximum level sum encountered so far.
Return the maximum level sum as the final result.
Given a 2D matrix MAT
of size M x N, where M and N represent the number of rows and columns respectively. Each row is sorted in non-decreasing order, and the first element of each row...
Implement a function to search for a target integer in a 2D matrix with sorted rows.
Iterate through each row of the matrix and perform a binary search on each row to find the target integer.
Start the binary search by considering the entire row as a sorted array.
If the target is found in any row, return 'TRUE'; otherwise, return 'FALSE'.
Static polymorphism refers to the mechanism where the method to be called is determined at compile time.
Method overloading is an example of static polymorphism where the method to be called is resolved at compile time based on the method signature.
Compile-time polymorphism is another term for static polymorphism.
Static polymorphism is achieved through function overloading and operator overloading.
Given a Singly Linked List of integers, your task is to reverse the Linked List by altering the links between the nodes.
The first line of input is an integer...
Reverse a singly linked list by altering the links between nodes.
Iterate through the linked list and reverse the links between nodes.
Keep track of the previous, current, and next nodes while reversing the links.
Update the head of the linked list to the last node after reversal.
They posed questions assessing logical and analytical aptitude.
After completing and passing the aptitude round, I was allowed to take the coding round exam, where the questions ranged from easy to medium level.
Question related to Aptitude
2 coding question both are simple
I am a recent graduate with a degree in Computer Science from XYZ University. I am currently located in City, State.
Recent graduate with a degree in Computer Science
Currently located in City, State
Code for a login page in React
Create a form component with input fields for username and password
Handle form submission and validation
Use state to store user input and handle login functionality
I applied via Campus Placement and was interviewed in Nov 2024. There were 4 interview rounds.
I believe it was easy; they provided a total of 60 questions.
Two coding questions were provided: one was easy, and the other was hard.
Quick Sort is a popular sorting algorithm that uses divide and conquer strategy to sort elements in an array.
Quick Sort picks a pivot element and partitions the array around the pivot.
It recursively sorts the sub-arrays on either side of the pivot.
The process continues until the entire array is sorted.
Example: Given array [5, 2, 9, 3, 7], after Quick Sort it becomes [2, 3, 5, 7, 9].
I applied via Campus Placement and was interviewed in Jun 2024. There were 4 interview rounds.
Round 1 - 70 Technical MCQ + 2 Coding
Round 2 (Right after round 1 if you clear it) - MCQs from C language, OOPs, Java, OS, CN, Digital Electronics, Microprocessors, DSA
Coding Questions - Arrays and Graphs
Executing SQL queries involves retrieving, updating, and manipulating data in a database using structured query language.
SELECT statement: Used to retrieve data. Example: SELECT * FROM employees;
INSERT statement: Used to add new records. Example: INSERT INTO employees (name, age) VALUES ('John', 30);
UPDATE statement: Used to modify existing records. Example: UPDATE employees SET age = 31 WHERE name = 'John';
DELETE stat...
I am familiar with concepts such as encryption, network security, access control, and security protocols.
Encryption methods such as AES, RSA, and DES
Network security practices like firewalls, VPNs, and intrusion detection systems
Access control mechanisms like role-based access control (RBAC) and multi-factor authentication
Security protocols such as SSL/TLS, IPsec, and SSH
Composite key is a combination of multiple columns to uniquely identify a record, while primary key is a unique identifier for a record and unique key allows only unique values.
Composite key is made up of multiple columns to uniquely identify a record
Primary key is a unique identifier for a record and cannot have duplicate values
Unique key allows only unique values but can have null values
Dependency Injection is a design pattern that allows for better code modularity and testing by injecting dependencies at runtime.
Promotes loose coupling between classes, making code easier to manage.
In Spring Boot, you can use annotations like @Autowired to inject dependencies.
Facilitates easier unit testing by allowing mock dependencies to be injected.
Example: Instead of creating a new instance of a service in a contr...
90min test, questions from oops, http, css, java, analtical ability
1 easy 1 med, 1 easy enuf to pass
I appeared for an interview in Oct 2024, where I was asked the following questions.
I applied via Campus Placement
General aptitude questions
I admire this company's innovation and culture, and I handle conflicts by promoting open communication and collaboration.
I chose this company for its commitment to cutting-edge technology and a collaborative work environment.
In handling conflicts, I encourage team members to express their viewpoints openly, fostering a culture of respect.
For example, in a previous project, I mediated a disagreement between two develope...
I applied via Job Fair and was interviewed in May 2023. There were 3 interview rounds.
1 Reverse a link list
2. Simple mathematical Problem
I appeared for an interview in Mar 2022.
Round duration - 90 minutes
Round difficulty - Medium
2 programming questions, MCQs based on OS, DBMS, OOPS and web fundamentals
Given a 2D matrix MAT
of size M x N, where M and N represent the number of rows and columns respectively. Each row is sorted in non-decreasing order, and the first element of each ro...
Implement a function to search for a target integer in a 2D matrix with sorted rows.
Iterate through each row of the matrix and perform a binary search on each row to find the target integer.
Start the binary search by considering the entire row as a sorted array.
If the target is found in any row, return 'TRUE'; otherwise, return 'FALSE'.
Given a Singly Linked List of integers, your task is to reverse the Linked List by altering the links between the nodes.
The first line of input is an intege...
Reverse a singly linked list by altering the links between nodes.
Iterate through the linked list and reverse the links between nodes.
Keep track of the previous, current, and next nodes while reversing the links.
Update the head of the linked list to the last node after reversal.
Round duration - 40 minutes
Round difficulty - Easy
This round had 2 coding questions and some basic questions revolving around OOPs
Given a singly linked list of integers, determine if it is a palindrome. Return true if it is a palindrome, otherwise return false.
1 -> 2 -...
Check if a given singly linked list of integers is a palindrome or not.
Traverse the linked list to find the middle element using slow and fast pointers.
Reverse the second half of the linked list.
Compare the first half with the reversed second half to determine if it is a palindrome.
Example: Input: 1 -> 2 -> 3 -> 2 -> 1 -> NULL, Output: true
Given a Binary Tree with integer nodes, determine the maximum level sum among all the levels in the tree. The sum for a level is defined as the sum of all node values pr...
Find the maximum level sum in a binary tree by calculating the sum of nodes at each level.
Traverse the binary tree level by level and calculate the sum of nodes at each level.
Keep track of the maximum level sum encountered so far.
Return the maximum level sum as the final result.
Abstract class can have both abstract and non-abstract methods, while interface can only have abstract methods.
Abstract class can have method implementations, while interface cannot.
A class can implement multiple interfaces, but can only inherit from one abstract class.
Interfaces are used to define contracts for classes to implement, while abstract classes are used to provide a common base for subclasses.
Example: Abstr...
Overloading is having multiple methods in the same class with the same name but different parameters. Overriding is implementing a method in a subclass that is already present in the superclass.
Overloading involves multiple methods with the same name but different parameters
Overriding involves implementing a method in a subclass that is already present in the superclass
Overloading is determined at compile time, while o...
Static polymorphism refers to the mechanism where the method to be called is determined at compile time.
Method overloading is an example of static polymorphism where the method to be called is resolved at compile time based on the method signature.
Compile-time polymorphism is another term for static polymorphism.
Static polymorphism is achieved through function overloading and operator overloading.
Round duration - 30 minutes
Round difficulty - Easy
Was conducted a couple of hours after the previous Tech round. The round was a HR one, behavioral questions and discussion around my hobbies :)
Tip 1 : Be very thorough with your resume. You will be properly grilled.
Tip 2 : Be clear with the basics of atleast one programming language, and have competitive programming experience
Tip 3 : Have projects in your resume from different domains. For a fresher, HSBC looks for a jack of all trades instead of a master of one, so having projects in different domains with be greatly beneficial
Tip 1 : Have multiple projects
Tip 2 : Have a decent skillset, with good educational background
posted on 25 Jun 2022
Based on intermediate Data structures
based on 9 interview experiences
Difficulty level
Duration
based on 4 reviews
Rating in categories
Assistant Manager
2.8k
salaries
| ₹6 L/yr - ₹13.4 L/yr |
Manager
2.2k
salaries
| ₹13.9 L/yr - ₹24 L/yr |
Senior Software Engineer
1.7k
salaries
| ₹13.1 L/yr - ₹23.7 L/yr |
Assistant Vice President
1.7k
salaries
| ₹25 L/yr - ₹42.9 L/yr |
Software Engineer
1.5k
salaries
| ₹7.8 L/yr - ₹14 L/yr |
Wells Fargo
JPMorgan Chase & Co.
Cholamandalam Investment & Finance
Citicorp