HSBC Group
200+ Datahash Interview Questions and Answers
Q1. Contains Duplicate Problem Statement
Given an array of integers ARR
and an integer K
, determine if there exist two distinct indices i
and j
such that ARR[i] == ARR[j]
and | i - j | <= K
.
Input:
The first line c...read more
Given an array of integers and an integer K, determine if there exist two distinct indices i and j such that ARR[i] == ARR[j] and | i - j | <= K.
Iterate through the array and keep track of the indices of each element using a hashmap.
Check if the current element already exists in the hashmap within a distance of K.
Return 'Yes' if a pair of such indices exists, otherwise return 'No'.
Q2. Palindromic Linked List Problem Statement
Given a singly linked list of integers, determine if it is a palindrome. Return true if it is a palindrome, otherwise return false.
Example:
Input:
1 -> 2 -> 3 -> 2 -> ...read more
Check if a given singly linked list of integers is a palindrome or not.
Traverse the linked list to find the middle element using slow and fast pointers.
Reverse the second half of the linked list.
Compare the first half with the reversed second half to determine if it is a palindrome.
Example: Input: 1 -> 2 -> 3 -> 2 -> 1 -> NULL, Output: true
Q3. Search in a 2D Matrix
Given a 2D matrix MAT
of size M x N, where M and N represent the number of rows and columns respectively. Each row is sorted in non-decreasing order, and the first element of each row is g...read more
Implement a function to search for a target integer in a 2D matrix with sorted rows.
Iterate through each row of the matrix and perform a binary search on each row to find the target integer.
Start the binary search by considering the entire row as a sorted array.
If the target is found in any row, return 'TRUE'; otherwise, return 'FALSE'.
Q4. Maximum Level Sum in a Binary Tree
Given a Binary Tree with integer nodes, determine the maximum level sum among all the levels in the tree. The sum for a level is defined as the sum of all node values present ...read more
Find the maximum level sum in a binary tree by calculating the sum of nodes at each level.
Traverse the binary tree level by level and calculate the sum of nodes at each level.
Keep track of the maximum level sum encountered so far.
Return the maximum level sum as the final result.
Q5. Reverse Linked List Problem Statement
Given a Singly Linked List of integers, your task is to reverse the Linked List by altering the links between the nodes.
Input:
The first line of input is an integer T, rep...read more
Reverse a singly linked list by altering the links between nodes.
Iterate through the linked list and reverse the links between nodes.
Keep track of the previous, current, and next nodes while reversing the links.
Update the head of the linked list to the last node after reversal.
Q6. Power Calculation Problem Statement
Given a number x
and an exponent n
, compute xn
. Accept x
and n
as input from the user, and display the result.
Note:
You can assume that 00 = 1
.
Input:
Two integers separated...read more
Calculate x raised to the power of n. Handle edge case of 0^0 = 1.
Accept x and n as input from user
Compute x^n and display the result
Handle edge case of 0^0 = 1
Ensure x is between 0 and 8, n is between 0 and 9
Q7. Inversion Count Problem
Given an integer array ARR
of size N
with all distinct values, determine the total number of 'Inversions' that exist.
Explanation:
An inversion is a pair of indices (i, j)
such that:
AR...read more
Count the total number of inversions in an integer array.
Iterate through the array and for each element, check how many elements to its right are smaller than it.
Use a merge sort based approach to efficiently count the inversions.
Keep track of the count of inversions while merging the sorted subarrays.
Example: For input [2, 4, 1, 3, 5], there are 3 inversions: (2, 1), (4, 1), and (4, 3).
Q8. Palindrome Linked List Problem Statement
You are provided with a singly linked list of integers. Your task is to determine whether the given singly linked list is a palindrome. Return true
if it is a palindrome...read more
Check if a given singly linked list is a palindrome or not.
Traverse the linked list to find the middle element using slow and fast pointers.
Reverse the second half of the linked list.
Compare the first half with the reversed second half to determine if it's a palindrome.
Q9. How will you find the top 5 customer of HSBC from the entire world?
Top 5 customers of HSBC can be found by analyzing transaction history and account balances.
Analyze transaction history of all HSBC customers worldwide
Identify customers with highest transaction volumes and account balances
Rank customers based on transaction volumes and account balances
Select top 5 customers based on ranking
Consider other factors such as creditworthiness and profitability
Q10. Technical : 1. What is hedge/mutual fund ? 2. What is equalization payment ? 3. What are corporate actions and its types ? 4. Basic accrual journals 5. What are trading participants ( stock exch, clearing house...
read moreAnswers to technical questions related to fund administration.
Hedge funds are alternative investment vehicles that use various strategies to generate high returns.
Mutual funds are investment vehicles that pool money from multiple investors to invest in a diversified portfolio of securities.
Equalization payment is a payment made to investors in a mutual fund to ensure that all investors receive the same distribution of income and capital gains.
Corporate actions are events init...read more
Ninja is a genius in mathematics. He got an interview call from MIT. During the interview, the professor asked Ninja a challenging question.
Given two integers 'N1' and 'N2', the professor ...read more
Calculate the fraction when one integer is divided by another, with repeating decimal parts enclosed in parentheses.
Divide the first integer by the second integer to get the fraction
Identify if the decimal part is repeating and enclose it in parentheses
Return the fraction for each test case
The data structures used for implementing an LRU cache are doubly linked list and hash map.
Doubly linked list is used to maintain the order of recently used elements.
Hash map is used for fast lookups to check if an element is present in the cache or not.
When a new element is accessed, it is moved to the front of the linked list to indicate it as the most recently used.
Q13. One puzzles--How to calculate the average no of person coming to the airport daily?
The average number of people coming to the airport daily can be calculated by taking the total number of people arriving and departing and dividing it by two.
Collect data on the number of arrivals and departures for a given period, such as a week or a month.
Add the number of arrivals and departures together to get the total number of people coming to the airport.
Divide the total number by the number of days in the period to get the average number of people coming to the airpo...read more
Q14. Find Slope Problem Statement
Given a linked list where each node represents coordinates on the Cartesian plane, your task is to determine the minimum and maximum slope between consecutive points.
Example:
Input...read more
Given a linked list of coordinates, find the starting nodes of segments with maximum and minimum slopes between consecutive points.
Traverse the linked list and calculate slopes between consecutive points
Identify the segments with maximum and minimum slopes
Return the starting nodes of these segments
Functional dependency is a relationship between attributes in a database table, while transitive dependency occurs when an attribute is functionally dependent on another attribute.
Functional dependency: A determines B, where the value of A uniquely determines the value of B.
Transitive dependency: A determines B, and B determines C, therefore A indirectly determines C.
Example of functional dependency: Employee ID determines Employee Name.
Example of transitive dependency: Emplo...read more
Abstract class can have both abstract and non-abstract methods, while interface can only have abstract methods.
Abstract class can have method implementations, while interface cannot.
A class can implement multiple interfaces, but can only inherit from one abstract class.
Interfaces are used to define contracts for classes to implement, while abstract classes are used to provide a common base for subclasses.
Example: Abstract class 'Shape' with abstract method 'calculateArea' and...read more
Normalization is the process of organizing data in a database to reduce redundancy and improve data integrity.
Normalization is used to eliminate data redundancy and ensure data integrity.
There are different normal forms such as 1NF, 2NF, 3NF, BCNF, and 4NF.
Each normal form has specific rules to follow in order to achieve it.
For example, 1NF ensures that each column contains atomic values, 2NF eliminates partial dependencies, and 3NF removes transitive dependencies.
Q18. What do you mean from sanctions and embargo If we have to adjust 100 billion/ million money in the economy and suppse we have 3 months time. What all can we do to apportionment and allocation of given money tha...
read moreA bootstrap program is a small program that initializes the operating system during the boot process.
Bootstrap program is the first code that runs when a computer is turned on.
It loads the operating system kernel into memory and starts its execution.
It performs hardware checks, sets up memory, and initializes system components.
Examples include GRUB for Linux and NTLDR for Windows.
Q20. How to find the no of petrol pump in the city
Use online maps or directories to find the number of petrol pumps in the city.
Search for petrol pumps on online maps like Google Maps or MapQuest.
Use online directories like Yelp or Yellow Pages to find petrol pumps in the city.
Check with local authorities or city websites for a list of petrol pumps in the area.
Ask locals or taxi drivers for recommendations on petrol pumps in the city.
Overloading is having multiple methods in the same class with the same name but different parameters. Overriding is implementing a method in a subclass that is already present in the superclass.
Overloading involves multiple methods with the same name but different parameters
Overriding involves implementing a method in a subclass that is already present in the superclass
Overloading is determined at compile time, while overriding is determined at runtime
Q22. What is DBMS and RDBMS and difference between them?
DBMS stands for Database Management System, while RDBMS stands for Relational Database Management System. RDBMS is a type of DBMS.
DBMS is a software system that allows users to define, create, maintain and control access to the database.
RDBMS is a type of DBMS that stores data in a structured format using tables with rows and columns.
RDBMS enforces a set of rules called ACID properties to ensure data integrity, while DBMS may not necessarily enforce these rules.
Examples of DB...read more
Q23. 1. What is udf in Spark? 2. Write PySpark code to check the validity of mobile_number column
UDF stands for User-Defined Function in Spark. It allows users to define their own functions to process data.
UDFs can be written in different programming languages like Python, Scala, and Java.
UDFs can be used to perform complex operations on data that are not available in built-in functions.
PySpark code to check the validity of mobile_number column can be written using regular expressions and the `regexp_extract` function.
Example: `df.select('mobile_number', regexp_extract('...read more
Q24. What are the lions of HSBC? Do you know the symbol and story behind it?
The lions of HSBC are a symbol of strength and stability. They represent the bank's commitment to its customers.
The lions are a pair of bronze statues that stand guard outside HSBC's headquarters in London.
They were designed by sculptor Nick Elphick and installed in 2002.
The lions are modeled after the original lions that stood outside the bank's Shanghai office in the early 20th century.
The lions are a symbol of the bank's heritage and its commitment to its customers.
The lio...read more
Q25. How to understand customer behaviour based on credit card transaction? What would be your approach?
To understand customer behaviour based on credit card transaction, I would analyze spending patterns, transaction frequency, and purchase categories.
Analyze spending patterns to identify high and low spenders
Analyze transaction frequency to identify regular and irregular customers
Analyze purchase categories to identify customer preferences and interests
Use data visualization tools to identify trends and patterns
Compare customer behavior to industry benchmarks and competitors
I...read more
Q26. Sanctions screen and type of risks and different sanctions
Q27. Merge two unsorted lists such that the output list is sorted. You are free to use inbuilt sorting functions to sort the input lists
Merge two unsorted lists into a sorted list using inbuilt sorting functions.
Use inbuilt sorting functions to sort the input lists
Merge the sorted lists using a merge algorithm
Return the merged and sorted list
Q28. What are the 4 pillars of OOPs?
Encapsulation, Inheritance, Polymorphism, Abstraction
Encapsulation: Bundling data and methods that operate on the data into a single unit
Inheritance: Ability of a class to inherit properties and behavior from another class
Polymorphism: Ability to present the same interface for different data types
Abstraction: Hiding the complex implementation details and showing only the necessary features
DELETE removes specific rows from a table, while TRUNCATE removes all rows and resets auto-increment values.
DELETE is a DML command, while TRUNCATE is a DDL command.
DELETE can be rolled back, while TRUNCATE cannot be rolled back.
DELETE triggers ON DELETE triggers, while TRUNCATE does not trigger any triggers.
DELETE is slower as it logs individual row deletions, while TRUNCATE is faster as it deallocates data pages.
Example: DELETE FROM table_name WHERE condition; TRUNCATE tabl...read more
Normalization is the process of organizing data in a database to reduce redundancy and improve data integrity. Denormalization is the opposite process.
Normalization involves breaking down data into smaller, more manageable tables to reduce redundancy.
Denormalization involves combining tables to improve query performance.
Normalization helps maintain data integrity by reducing the risk of anomalies.
Denormalization can improve read performance but may lead to data redundancy.
Exa...read more
Q31. what is the difference between clustering and classification.
Clustering groups data points based on similarity while classification assigns labels to data points based on predefined categories.
Clustering is unsupervised learning while classification is supervised learning.
Clustering is used to find patterns in data while classification is used to predict the category of a data point.
Examples of clustering algorithms include k-means and hierarchical clustering while examples of classification algorithms include decision trees and logist...read more
Q32. What is Enterprise Value of a firm and how to calculate
Enterprise Value is the total value of a company, including debt and equity.
Enterprise Value = Market Capitalization + Debt - Cash
Market Capitalization = Total number of shares outstanding x current market price per share
Debt = Total outstanding debt of the company
Cash = Total cash and cash equivalents held by the company
EV is used to determine the true value of a company, as it takes into account both debt and equity
EV can be used to compare companies with different capital ...read more
Q33. How to ingest csv file to spark dataframe and write it to hive table.
Ingest CSV file to Spark dataframe and write to Hive table.
Create SparkSession object
Read CSV file using SparkSession.read.csv() method
Create a dataframe from the CSV file
Create a Hive table using SparkSession.sql() method
Write the dataframe to the Hive table using dataframe.write.saveAsTable() method
Q34. What is Object oriented programming?
Object oriented programming is a programming paradigm based on the concept of objects, which can contain data and code.
Objects are instances of classes, which define the structure and behavior of the objects.
Encapsulation, inheritance, and polymorphism are key principles of object oriented programming.
Example: Inheritance allows a class to inherit properties and methods from another class.
Example: Encapsulation hides the internal state of an object and only exposes necessary ...read more
Static polymorphism refers to the mechanism where the method to be called is determined at compile time.
Method overloading is an example of static polymorphism where the method to be called is resolved at compile time based on the method signature.
Compile-time polymorphism is another term for static polymorphism.
Static polymorphism is achieved through function overloading and operator overloading.
Q36. SQL query for getting 2nd highest salary from each department
SQL query to retrieve the second highest salary from each department
Use the RANK() function to assign a rank to each salary within each department
Filter the results to only include rows with a rank of 2
Group the results by department to get the second highest salary for each department
Q37. What are the sanction country, how risk is calculated, constitution documents required for like Pvt Ltd, partnership, limited co. , Nri documents , onboarding process.
Sanctioned countries, risk calculation, and required documents for onboarding different types of entities and NRIs.
Sanctioned countries include Iran, North Korea, Syria, and others.
Risk is calculated based on factors such as the country's political stability, economic conditions, and regulatory environment.
Constitution documents required for Pvt Ltd, partnership, and limited co. include certificate of incorporation, partnership deed, and memorandum of association.
NRI document...read more
A stack follows Last In First Out (LIFO) order while a queue follows First In First Out (FIFO) order.
Stack: elements are added and removed from the top (like a stack of plates)
Queue: elements are added at the rear and removed from the front (like a line of people)
Stack: push() and pop() operations
Queue: enqueue() and dequeue() operations
Example: Undo functionality in text editors (stack) vs. printer queue (queue)
Q39. How to delete duplicate rows from a table
To delete duplicate rows from a table, use the DISTINCT keyword or GROUP BY clause.
Use the DISTINCT keyword to select unique rows from the table.
Use the GROUP BY clause to group the rows by a specific column and select the unique rows.
Use the DELETE statement with a subquery to delete the duplicate rows.
Create a new table with the unique rows and drop the old table.
Q40. Write down code implementing all 4 pillars of OOPs.
Code implementing all 4 pillars of OOPs
Encapsulation: Encapsulate data within classes and provide public methods to access and modify the data.
Inheritance: Create a hierarchy of classes where child classes inherit attributes and methods from parent classes.
Polymorphism: Allow objects of different classes to be treated as objects of a common superclass through method overriding and overloading.
Abstraction: Hide complex implementation details and only show the necessary feature...read more
Q41. What is SQL and who its different from mySQL?
SQL is a standard language for managing databases, while MySQL is a specific open-source relational database management system.
SQL stands for Structured Query Language and is used to communicate with databases.
SQL is a standard language that can be used with various database management systems.
MySQL is a specific open-source relational database management system that uses SQL.
MySQL is one of the most popular database management systems that uses SQL for querying and managing ...read more
Q42. Monolith to microservice migration journey ? what all decisions needs to be taken and how the entire migration took place.
Monolith to microservice migration involves breaking down a large application into smaller, independent services.
Evaluate the current monolith architecture and identify the components that can be decoupled into microservices.
Define the boundaries of each microservice to ensure they are cohesive and loosely coupled.
Choose the right technology stack for each microservice based on its requirements and scalability needs.
Implement communication mechanisms between microservices suc...read more
Q43. What are different types of join? And how they differ from each other?
Different types of join include inner, outer, left, right, cross, and self join.
Inner join returns only the matching rows from both tables.
Outer join returns all rows from both tables and null values for non-matching rows.
Left join returns all rows from the left table and null values for non-matching rows from the right table.
Right join returns all rows from the right table and null values for non-matching rows from the left table.
Cross join returns the Cartesian product of b...read more
Q44. Tell me about some important event in terms of economics and how it has affected the markets?
The 2008 financial crisis had a significant impact on the global markets.
The 2008 financial crisis was triggered by the collapse of Lehman Brothers, a major investment bank.
It led to a severe credit crunch and a global recession.
Stock markets around the world experienced sharp declines, with the Dow Jones Industrial Average losing over 50% of its value.
The crisis exposed weaknesses in the financial system and led to increased regulation and reforms.
Central banks implemented u...read more
Q45. What are the window functions you have used?
Window functions are used to perform calculations across a set of rows that are related to the current row.
Commonly used window functions include ROW_NUMBER, RANK, DENSE_RANK, LAG, LEAD, FIRST_VALUE, LAST_VALUE, and NTILE.
Window functions are used in conjunction with the OVER clause to define the window or set of rows to perform the calculation on.
Window functions can be used to calculate running totals, moving averages, and other aggregate calculations.
Window functions are s...read more
Q46. Write a code to find the 2nd largest element in an array.
Code to find the 2nd largest element in an array
Sort the array in descending order and return the element at index 1
Iterate through the array and keep track of the two largest elements
Handle edge cases like arrays with less than 2 elements
Q47. Describe the situation when someone used your computer without informing you?
I was frustrated when someone used my computer without informing me.
I discovered that someone had used my computer without my knowledge.
I felt frustrated and violated because my personal space was invaded.
I confronted the person and asked them why they used my computer without informing me.
I emphasized the importance of respecting personal boundaries and seeking permission before using someone else's belongings.
I took measures to ensure the security of my computer and persona...read more
Q48. How do you handles null values in PySpark
Null values in PySpark are handled using functions such as dropna(), fillna(), and replace().
dropna() function is used to drop rows or columns with null values
fillna() function is used to fill null values with a specified value or method
replace() function is used to replace null values with a specified value
coalesce() function is used to replace null values with the first non-null value in a list of columns
Private and special IP addresses are reserved ranges of IP addresses used for specific purposes.
Private IP addresses are used within a private network and are not routable on the internet.
Special IP addresses include loopback address (127.0.0.1) and broadcast address (255.255.255.255).
Private IP ranges include 10.0.0.0 to 10.255.255.255, 172.16.0.0 to 172.31.255.255, and 192.168.0.0 to 192.168.255.255.
Q50. How to make pivot table range auto and how to adjust pivot to not show nil value.
To make pivot table range auto, select the data range and press Ctrl + T. To adjust pivot to not show nil value, go to PivotTable Options > Layout & Format > uncheck 'Show items with no data'.
To make pivot table range auto, select the data range and press Ctrl + T.
To adjust pivot to not show nil value, go to PivotTable Options > Layout & Format > uncheck 'Show items with no data'.
Q51. Why is enterprise value more important than an equity value, tell the difference between the two
Enterprise value is more important than equity value as it includes debt and cash, giving a more accurate picture of a company's total value.
Enterprise value takes into account a company's debt and cash, while equity value only considers the value of the company's shares.
Enterprise value is a more comprehensive measure of a company's total value, as it reflects the cost of acquiring the entire business.
Equity value can be misleading as it does not account for a company's debt...read more
Q52. How the connect two grids which are different frequencies?
Q53. What is imputer function in PySpark
Imputer function in PySpark is used to replace missing values in a DataFrame.
Imputer is a transformer in PySpark ML library.
It replaces missing values in a DataFrame with either mean, median, or mode of the column.
It can be used with both numerical and categorical columns.
Example: imputer = Imputer(inputCols=['col1', 'col2'], outputCols=['col1_imputed', 'col2_imputed'], strategy='mean')
Example: imputed_df = imputer.fit(df).transform(df)
Q54. Case studies how to target customers based on data base
Targeting customers based on database requires analyzing data and creating personalized campaigns.
Analyze customer data to identify patterns and preferences
Segment customers based on demographics, behavior, and interests
Create personalized campaigns using targeted messaging and offers
Use A/B testing to optimize campaigns and improve results
Q55. How did you implement transformational changes explain with example
Implemented transformational changes through clear communication, collaboration, and a focus on the end goal.
Identified areas for improvement and set clear goals
Engaged stakeholders and communicated the vision for change
Collaborated with team members to develop and implement new processes
Provided training and support to ensure successful adoption of changes
Measured and evaluated the impact of changes to ensure success
Example: Implemented a new project management system that s...read more
The OSI Reference Model defines 7 layers that represent different functions in networking.
Physical Layer - deals with physical connections and signals (e.g. cables, hubs)
Data Link Layer - manages data transfer between devices on the same network (e.g. Ethernet)
Network Layer - handles routing and forwarding of data packets (e.g. IP)
Transport Layer - ensures reliable data delivery (e.g. TCP)
Session Layer - establishes, maintains, and terminates connections (e.g. SSL)
Presentatio...read more
Q57. Finance elective of first term – What are the different ratios? What ratios to apply in different sectors?
Different ratios used in finance and their application in different sectors.
Different ratios used in finance include liquidity ratios, profitability ratios, solvency ratios, and efficiency ratios.
Liquidity ratios measure a company's ability to meet short-term obligations, such as the current ratio and quick ratio.
Profitability ratios assess a company's ability to generate profits, such as return on equity and gross profit margin.
Solvency ratios evaluate a company's long-term ...read more
Q58. Difference between C and C++?
C is a procedural programming language while C++ is an object-oriented programming language.
C is a procedural programming language, while C++ supports both procedural and object-oriented programming.
C does not have classes and objects, while C++ does.
C does not support function overloading, while C++ does.
C does not have exception handling, while C++ does.
C does not have namespaces, while C++ does.
Q59. What are different types of banking products?
Banking products include savings accounts, checking accounts, loans, credit cards, and investment accounts.
Savings accounts: earn interest on deposited funds
Checking accounts: used for daily transactions and bill payments
Loans: borrowed money with interest
Credit cards: allows purchases on credit with interest
Investment accounts: used to invest in stocks, bonds, and mutual funds
Q60. Difference between Delete, Truncate and Drop?
Delete removes specific rows from a table, Truncate removes all rows from a table, and Drop removes the table itself.
Delete is a DML command that removes specific rows from a table based on a condition.
Truncate is a DDL command that removes all rows from a table but keeps the table structure.
Drop is a DDL command that removes the entire table along with its structure.
Q61. How can a company remove its debt but not affect the cash flow?
A company can remove its debt without affecting cash flow by refinancing debt at lower interest rates, increasing revenue, or selling assets.
Refinance debt at lower interest rates to reduce debt burden
Increase revenue through sales growth or cost-cutting measures
Sell assets to generate cash and pay off debt
Negotiate with creditors for better repayment terms
Q62. What is your area of interest?
My area of interest is machine learning and artificial intelligence.
I enjoy working with large datasets and developing algorithms to analyze and extract insights from them.
I have experience with various machine learning techniques such as regression, classification, and clustering.
I am also interested in natural language processing and computer vision.
Some examples of my work include developing a recommendation system for an e-commerce website and building a chatbot for custo...read more
Q63. What is merge sort and its Algorithm ?
Merge sort is a divide and conquer algorithm that divides the input array into two halves, sorts them recursively, and then merges them.
Divide the input array into two halves
Recursively sort each half
Merge the sorted halves back together
Q64. If worked for RestAPI ? what is the use of swagger ? what is the content of Swagger documentation ?
Swagger is a tool used for documenting and testing REST APIs.
Swagger is used for documenting REST APIs by providing a user-friendly interface to view and interact with API endpoints.
It allows developers to easily understand the functionality of an API, including available endpoints, request/response formats, and authentication methods.
Swagger documentation typically includes information such as API endpoints, request parameters, response formats, error codes, and authenticati...read more
Q65. How to handle difficult situations with stakeholder
Handling difficult situations with stakeholders requires effective communication, active listening, and problem-solving skills.
Stay calm and professional
Listen actively to their concerns
Acknowledge their perspective
Identify the root cause of the issue
Collaborate on finding a solution
Communicate clearly and transparently
Follow up to ensure resolution
Q66. Is one time item in CFO an alarming item for a comany seeking debt?
Yes, one-time items in CFO can be alarming for a company seeking debt.
One-time items can distort the true financial health of a company
Lenders may view one-time items as unsustainable sources of income
It may raise concerns about the company's ability to generate consistent cash flow
Companies should provide explanations for one-time items to lenders
Q67. How would you approach regulatory changes, how would you identify stakeholders?
Approach regulatory changes by conducting thorough research, engaging with relevant stakeholders, and implementing necessary adjustments.
Research current regulations and upcoming changes
Identify key stakeholders such as regulatory bodies, industry associations, and internal departments
Engage with stakeholders to understand their concerns and gather feedback
Collaborate with legal and compliance teams to ensure adherence to regulations
Implement necessary changes and communicate...read more
Q68. How would resolve the customer query if your facing a vulnerable customer
I would handle the query with empathy and patience, ensuring their needs are met.
Listen actively and attentively to their concerns
Acknowledge their emotions and validate their feelings
Provide clear and concise information
Offer support and assistance in finding a solution
Follow up to ensure their satisfaction
Q69. What do you check in a business continuity plan?
A business continuity plan should include checks for critical business functions, communication strategies, data backup procedures, and testing protocols.
Critical business functions and processes
Communication strategies for internal and external stakeholders
Data backup and recovery procedures
Testing protocols to ensure the plan is effective
Emergency response and escalation procedures
Q70. How bank works and major keys items of banking BS
Banking involves accepting deposits and lending money. Major items in banking balance sheet include assets, liabilities, and equity.
Banks accept deposits from customers and use the funds to make loans to other customers
Assets on a bank's balance sheet include cash, loans, and investments
Liabilities on a bank's balance sheet include deposits and borrowings
Equity on a bank's balance sheet represents the value of the bank's assets minus its liabilities
Banks are regulated by gove...read more
Q71. Tell me what all electronic components you know
Q72. Make the customer get full service and go back with smile
To make the customer get full service and go back with a smile, provide personalized attention, exceed expectations, resolve issues promptly, and create a positive and memorable experience.
Offer personalized attention and listen to the customer's needs
Exceed customer expectations by going the extra mile
Resolve any issues or complaints promptly and effectively
Create a positive and friendly atmosphere
Provide clear and helpful communication
Offer additional perks or surprises to ...read more
Q73. What to do if wrong report was sent by you?
Acknowledge the mistake, inform the concerned parties, and provide the correct report as soon as possible.
Admit the mistake and take responsibility
Notify the recipients of the incorrect report
Provide the correct report as soon as possible
Take steps to prevent similar mistakes in the future
Q74. Revenue recognition -How would you recognise revenue and walk through
Revenue recognition involves identifying when and how revenue should be recorded in financial statements.
Revenue should be recognized when it is earned and realized or realizable
The amount of revenue recognized should be the amount that is expected to be received
Revenue recognition should follow the matching principle
Examples of revenue recognition methods include percentage of completion, completed contract, and installment sales
Revenue recognition may also involve accountin...read more
Q75. What concepts do you know in Cybersecurity?
I am familiar with concepts such as encryption, network security, access control, and security protocols.
Encryption methods such as AES, RSA, and DES
Network security practices like firewalls, VPNs, and intrusion detection systems
Access control mechanisms like role-based access control (RBAC) and multi-factor authentication
Security protocols such as SSL/TLS, IPsec, and SSH
Q76. How do you solve conflicts?
I approach conflicts by actively listening, identifying the root cause, and finding a mutually beneficial solution.
Listen to all parties involved and understand their perspectives
Identify the root cause of the conflict
Brainstorm potential solutions with all parties
Find a mutually beneficial solution
Communicate the solution clearly and ensure all parties agree
Q77. What is the life cycle of an LC?
The life cycle of an LC refers to its stages from design to disposal.
Design and development
Manufacturing and testing
Installation and commissioning
Operation and maintenance
Decommissioning and disposal
Q78. Tell me about your understanding on Agile methodologies?
Agile methodologies are iterative approaches to software development that prioritize flexibility, collaboration, and customer feedback.
Agile methodologies involve breaking down projects into smaller, manageable tasks called sprints.
They emphasize continuous collaboration between cross-functional teams, including developers, testers, and product owners.
Agile promotes adaptability and responding to change over rigid planning.
Common Agile frameworks include Scrum, Kanban, and Ex...read more
Q79. What orchestration tools have you worked on? Which tool do you support?
I have experience working with orchestration tools such as Ansible, Puppet, and Chef. Currently, I support Ansible for automation and configuration management.
Worked with Ansible, Puppet, and Chef for orchestration
Currently supporting Ansible for automation and configuration management
Q80. Is negative working capital good for a comapny?
Negative working capital can be good for a company as it indicates efficient management of assets and liabilities.
Negative working capital can indicate that a company is effectively using its short-term assets to fund its short-term liabilities.
It can show that a company is able to quickly convert inventory or accounts receivable into cash to meet its short-term obligations.
However, sustained negative working capital may also indicate liquidity issues or over-reliance on shor...read more
Q81. Discuss a scenario where you convinced a difficult customer
I convinced a difficult customer by actively listening to their concerns and finding a mutually beneficial solution.
Listened attentively to the customer's complaints and acknowledged their frustrations
Empathized with the customer's situation and showed understanding
Offered a solution that addressed the customer's concerns and met their needs
Followed up with the customer to ensure their satisfaction with the resolution
Q82. What do you mean by Negative new screening?
Negative news screening refers to the process of identifying and flagging any negative or adverse information about individuals or entities.
Negative news screening is a part of the Know Your Customer (KYC) process in which individuals or entities are checked against various databases and sources for any negative or adverse information.
It helps in identifying potential risks, such as involvement in criminal activities, fraud, money laundering, or being associated with sanction...read more
Q83. Design patterns - Prototype and Factory. How would you use Factory pattern in case of inheritence
Factory pattern is used to create objects without exposing the instantiation logic to the client. It can be used in inheritance to create objects of different subclasses.
Factory pattern can be used to create objects of different subclasses without exposing the instantiation logic to the client
It allows for flexibility in creating objects based on certain conditions or parameters
Factory pattern can be used in inheritance to create objects of different subclasses based on the t...read more
Q84. Model validation metrics in regulatory and scoring models
Model validation metrics are crucial for regulatory and scoring models.
Regulatory models require validation metrics to ensure compliance with regulations and standards.
Scoring models require validation metrics to ensure accuracy and reliability of the model.
Common validation metrics include accuracy, precision, recall, F1 score, and ROC curve analysis.
Validation metrics should be chosen based on the specific requirements of the model and the industry it is being used in.
Regul...read more
Q85. Different kind of Joins in DBMS ?
Different types of joins in DBMS include inner join, outer join, left join, right join, and full join.
Inner join: Returns rows when there is a match in both tables.
Outer join: Returns all rows from one table and only matching rows from the other table.
Left join: Returns all rows from the left table and the matched rows from the right table.
Right join: Returns all rows from the right table and the matched rows from the left table.
Full join: Returns rows when there is a match i...read more
Q86. How far do you forecast in a DCF model
The forecast period in a DCF model depends on the nature of the business and the industry it operates in.
The forecast period typically ranges from 5 to 10 years.
For stable and mature businesses, a longer forecast period may be appropriate.
For rapidly changing industries, a shorter forecast period may be more appropriate.
The forecast period should be supported by reasonable assumptions about future growth rates, margins, and capital expenditures.
The terminal value should accou...read more
Q87. 1.What is Fixed income 2.What is Forex 3.Types of Derivatives
Fixed income refers to investments that pay a fixed rate of return, Forex is the foreign exchange market, and derivatives are financial instruments whose value is derived from an underlying asset.
Fixed income investments include bonds, treasury bills, and certificates of deposit.
Forex, or foreign exchange, is the market where currencies are traded.
Types of derivatives include options, futures, and swaps.
Q88. Difference between Stacks and Queues?
Stacks are Last In First Out (LIFO) data structures, while Queues are First In First Out (FIFO) data structures.
Stacks: Elements are added and removed from the same end, like a stack of plates. Example: Undo feature in text editors.
Queues: Elements are added at the rear and removed from the front, like a line of people waiting. Example: Print queue in a printer.
Q89. How to transfer file in network within 2 locations ?
Files can be transferred between 2 locations on a network using various methods.
Use file transfer protocols like FTP, SFTP, or TFTP
Use cloud storage services like Dropbox, Google Drive, or OneDrive
Use network file sharing protocols like SMB or NFS
Use remote desktop software like TeamViewer or Remote Desktop Connection
Use email to send small files as attachments
Q90. What is Managed table and External table in hive
Managed tables are physically stored in Hive's warehouse directory while external tables are not.
Managed tables are created and managed by Hive while external tables are created outside of Hive.
Managed tables are physically stored in Hive's warehouse directory while external tables are not.
Managed tables are deleted when the table is dropped while external tables are not.
Managed tables are used for internal purposes while external tables are used for external purposes.
Example...read more
Q91. What is the role of boundary query in sqoop
Boundary query in Sqoop is used to import data within a specific range of values.
Boundary query is used to import data within a specific range of values
It is used with the --boundary-query option in Sqoop
It is useful when importing large datasets and you only need a subset of the data
For example, importing data from a database table where the values in a particular column fall within a specific range
Q92. What you will do if more work load ?
I will prioritize tasks, delegate responsibilities, and communicate with my team to ensure timely completion of all work.
Assess the workload and prioritize tasks based on urgency and importance
Delegate responsibilities to team members based on their strengths and workload
Communicate with team members to ensure everyone is aware of their responsibilities and deadlines
Monitor progress and provide support as needed
Consider hiring additional staff or outsourcing work if necessary
Q93. What is testing? why is important
Testing is the process of evaluating a system or component to ensure it meets specified requirements.
Testing helps identify defects or errors in software or systems.
It ensures that the software or system functions as intended.
Testing helps improve the quality and reliability of the software or system.
It provides confidence to stakeholders that the software or system is ready for use.
Testing helps in identifying and mitigating risks.
Examples of testing include functional testi...read more
Q94. What is variable frequency drive?
Q95. DBMS Keys - Composite Key, Primary Key vs Unique Key
Composite key is a combination of multiple columns to uniquely identify a record, while primary key is a unique identifier for a record and unique key allows only unique values.
Composite key is made up of multiple columns to uniquely identify a record
Primary key is a unique identifier for a record and cannot have duplicate values
Unique key allows only unique values but can have null values
Q96. How is EMIR is seperate from SFTR?
EMIR and SFTR are both regulatory frameworks for financial transactions, but they have different scopes and requirements.
EMIR (European Market Infrastructure Regulation) focuses on OTC derivatives reporting and clearing obligations.
SFTR (Securities Financing Transaction Regulation) focuses on reporting securities financing transactions, such as repurchase agreements and securities lending.
EMIR covers a wider range of financial instruments and counterparties compared to SFTR.
B...read more
Q97. Please explain the Quick Sort algorithm and its process of reallocation.
Quick Sort is a popular sorting algorithm that uses divide and conquer strategy to sort elements in an array.
Quick Sort picks a pivot element and partitions the array around the pivot.
It recursively sorts the sub-arrays on either side of the pivot.
The process continues until the entire array is sorted.
Example: Given array [5, 2, 9, 3, 7], after Quick Sort it becomes [2, 3, 5, 7, 9].
Q98. What will be bring on table as Program Mananger?
I will bring strong leadership skills, technical expertise, and a proven track record of successfully managing complex programs.
Strong leadership skills to effectively manage cross-functional teams
Technical expertise to understand and drive technology initiatives
Proven track record of successfully managing complex programs, such as implementing a new software system or launching a product
Ability to prioritize tasks, allocate resources, and meet deadlines
Excellent communicatio...read more
Q99. What is the difference between Basel and IFRS9 norms
Basel norms focus on capital adequacy and risk management for banks, while IFRS9 norms focus on accounting standards for financial instruments.
Basel norms are set by the Basel Committee on Banking Supervision to ensure banks maintain adequate capital to cover risks.
IFRS9 norms are accounting standards set by the International Financial Reporting Standards Foundation to address classification and measurement of financial instruments.
Basel norms primarily focus on risk manageme...read more
Q100. What is top command in shell scripting
Top command is a Linux utility that displays the system's processes in real-time.
Displays the processes running on the system
Updates the list of processes in real-time
Provides information on CPU usage, memory usage, and process IDs
Can be used to monitor system performance and identify resource-intensive processes
Top HR Questions asked in Datahash
Interview Process at Datahash
Top Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month