Add office photos
Employer?
Claim Account for FREE

HSBC Group

4.0
based on 4.8k Reviews
Video summary
Proud winner of ABECA 2024 - AmbitionBox Employee Choice Awards
Filter interviews by

200+ Datahash Interview Questions and Answers

Updated 15 Jan 2025
Popular Designations

Q1. Contains Duplicate Problem Statement

Given an array of integers ARR and an integer K, determine if there exist two distinct indices i and j such that ARR[i] == ARR[j] and | i - j | <= K.

Input:

The first line c...read more
Ans.

Given an array of integers and an integer K, determine if there exist two distinct indices i and j such that ARR[i] == ARR[j] and | i - j | <= K.

  • Iterate through the array and keep track of the indices of each element using a hashmap.

  • Check if the current element already exists in the hashmap within a distance of K.

  • Return 'Yes' if a pair of such indices exists, otherwise return 'No'.

Add your answer

Q2. Palindromic Linked List Problem Statement

Given a singly linked list of integers, determine if it is a palindrome. Return true if it is a palindrome, otherwise return false.

Example:

Input:
1 -> 2 -> 3 -> 2 -> ...read more
Ans.

Check if a given singly linked list of integers is a palindrome or not.

  • Traverse the linked list to find the middle element using slow and fast pointers.

  • Reverse the second half of the linked list.

  • Compare the first half with the reversed second half to determine if it is a palindrome.

  • Example: Input: 1 -> 2 -> 3 -> 2 -> 1 -> NULL, Output: true

Add your answer

Q3. Search in a 2D Matrix

Given a 2D matrix MAT of size M x N, where M and N represent the number of rows and columns respectively. Each row is sorted in non-decreasing order, and the first element of each row is g...read more

Ans.

Implement a function to search for a target integer in a 2D matrix with sorted rows.

  • Iterate through each row of the matrix and perform a binary search on each row to find the target integer.

  • Start the binary search by considering the entire row as a sorted array.

  • If the target is found in any row, return 'TRUE'; otherwise, return 'FALSE'.

Add your answer

Q4. Maximum Level Sum in a Binary Tree

Given a Binary Tree with integer nodes, determine the maximum level sum among all the levels in the tree. The sum for a level is defined as the sum of all node values present ...read more

Ans.

Find the maximum level sum in a binary tree by calculating the sum of nodes at each level.

  • Traverse the binary tree level by level and calculate the sum of nodes at each level.

  • Keep track of the maximum level sum encountered so far.

  • Return the maximum level sum as the final result.

Add your answer
Discover Datahash interview dos and don'ts from real experiences

Q5. Reverse Linked List Problem Statement

Given a Singly Linked List of integers, your task is to reverse the Linked List by altering the links between the nodes.

Input:

The first line of input is an integer T, rep...read more
Ans.

Reverse a singly linked list by altering the links between nodes.

  • Iterate through the linked list and reverse the links between nodes.

  • Keep track of the previous, current, and next nodes while reversing the links.

  • Update the head of the linked list to the last node after reversal.

Add your answer

Q6. Power Calculation Problem Statement

Given a number x and an exponent n, compute xn. Accept x and n as input from the user, and display the result.

Note:

You can assume that 00 = 1.

Input:
Two integers separated...read more
Ans.

Calculate x raised to the power of n. Handle edge case of 0^0 = 1.

  • Accept x and n as input from user

  • Compute x^n and display the result

  • Handle edge case of 0^0 = 1

  • Ensure x is between 0 and 8, n is between 0 and 9

Add your answer
Are these interview questions helpful?

Q7. Inversion Count Problem

Given an integer array ARR of size N with all distinct values, determine the total number of 'Inversions' that exist.

Explanation:

An inversion is a pair of indices (i, j) such that:

  • AR...read more
Ans.

Count the total number of inversions in an integer array.

  • Iterate through the array and for each element, check how many elements to its right are smaller than it.

  • Use a merge sort based approach to efficiently count the inversions.

  • Keep track of the count of inversions while merging the sorted subarrays.

  • Example: For input [2, 4, 1, 3, 5], there are 3 inversions: (2, 1), (4, 1), and (4, 3).

Add your answer

Q8. Palindrome Linked List Problem Statement

You are provided with a singly linked list of integers. Your task is to determine whether the given singly linked list is a palindrome. Return true if it is a palindrome...read more

Ans.

Check if a given singly linked list is a palindrome or not.

  • Traverse the linked list to find the middle element using slow and fast pointers.

  • Reverse the second half of the linked list.

  • Compare the first half with the reversed second half to determine if it's a palindrome.

Add your answer
Share interview questions and help millions of jobseekers 🌟

Q9. How will you find the top 5 customer of HSBC from the entire world?

Ans.

Top 5 customers of HSBC can be found by analyzing transaction history and account balances.

  • Analyze transaction history of all HSBC customers worldwide

  • Identify customers with highest transaction volumes and account balances

  • Rank customers based on transaction volumes and account balances

  • Select top 5 customers based on ranking

  • Consider other factors such as creditworthiness and profitability

Add your answer

Q10. Technical : 1. What is hedge/mutual fund ? 2. What is equalization payment ? 3. What are corporate actions and its types ? 4. Basic accrual journals 5. What are trading participants ( stock exch, clearing house...

read more
Ans.

Answers to technical questions related to fund administration.

  • Hedge funds are alternative investment vehicles that use various strategies to generate high returns.

  • Mutual funds are investment vehicles that pool money from multiple investors to invest in a diversified portfolio of securities.

  • Equalization payment is a payment made to investors in a mutual fund to ensure that all investors receive the same distribution of income and capital gains.

  • Corporate actions are events init...read more

Add your answer
Q11. Ninja and Mathematics

Ninja is a genius in mathematics. He got an interview call from MIT. During the interview, the professor asked Ninja a challenging question.

Given two integers 'N1' and 'N2', the professor ...read more

Ans.

Calculate the fraction when one integer is divided by another, with repeating decimal parts enclosed in parentheses.

  • Divide the first integer by the second integer to get the fraction

  • Identify if the decimal part is repeating and enclose it in parentheses

  • Return the fraction for each test case

Add your answer
Q12. Which data structures are used for implementing an LRU cache?
Ans.

The data structures used for implementing an LRU cache are doubly linked list and hash map.

  • Doubly linked list is used to maintain the order of recently used elements.

  • Hash map is used for fast lookups to check if an element is present in the cache or not.

  • When a new element is accessed, it is moved to the front of the linked list to indicate it as the most recently used.

View 1 answer

Q13. One puzzles--How to calculate the average no of person coming to the airport daily?

Ans.

The average number of people coming to the airport daily can be calculated by taking the total number of people arriving and departing and dividing it by two.

  • Collect data on the number of arrivals and departures for a given period, such as a week or a month.

  • Add the number of arrivals and departures together to get the total number of people coming to the airport.

  • Divide the total number by the number of days in the period to get the average number of people coming to the airpo...read more

Add your answer

Q14. Find Slope Problem Statement

Given a linked list where each node represents coordinates on the Cartesian plane, your task is to determine the minimum and maximum slope between consecutive points.

Example:

Input...read more
Ans.

Given a linked list of coordinates, find the starting nodes of segments with maximum and minimum slopes between consecutive points.

  • Traverse the linked list and calculate slopes between consecutive points

  • Identify the segments with maximum and minimum slopes

  • Return the starting nodes of these segments

Add your answer
Q15. What do you understand by functional dependency and transitive dependency in DBMS?
Ans.

Functional dependency is a relationship between attributes in a database table, while transitive dependency occurs when an attribute is functionally dependent on another attribute.

  • Functional dependency: A determines B, where the value of A uniquely determines the value of B.

  • Transitive dependency: A determines B, and B determines C, therefore A indirectly determines C.

  • Example of functional dependency: Employee ID determines Employee Name.

  • Example of transitive dependency: Emplo...read more

Add your answer
Q16. How is an abstract class different from an interface?
Ans.

Abstract class can have both abstract and non-abstract methods, while interface can only have abstract methods.

  • Abstract class can have method implementations, while interface cannot.

  • A class can implement multiple interfaces, but can only inherit from one abstract class.

  • Interfaces are used to define contracts for classes to implement, while abstract classes are used to provide a common base for subclasses.

  • Example: Abstract class 'Shape' with abstract method 'calculateArea' and...read more

Add your answer
Q17. What is normalization and what are the different types of normalization?
Ans.

Normalization is the process of organizing data in a database to reduce redundancy and improve data integrity.

  • Normalization is used to eliminate data redundancy and ensure data integrity.

  • There are different normal forms such as 1NF, 2NF, 3NF, BCNF, and 4NF.

  • Each normal form has specific rules to follow in order to achieve it.

  • For example, 1NF ensures that each column contains atomic values, 2NF eliminates partial dependencies, and 3NF removes transitive dependencies.

Add your answer

Q18. What do you mean from sanctions and embargo If we have to adjust 100 billion/ million money in the economy and suppse we have 3 months time. What all can we do to apportionment and allocation of given money tha...

read more
Add your answer
Q19. What is a bootstrap program in an operating system?
Ans.

A bootstrap program is a small program that initializes the operating system during the boot process.

  • Bootstrap program is the first code that runs when a computer is turned on.

  • It loads the operating system kernel into memory and starts its execution.

  • It performs hardware checks, sets up memory, and initializes system components.

  • Examples include GRUB for Linux and NTLDR for Windows.

View 1 answer

Q20. How to find the no of petrol pump in the city

Ans.

Use online maps or directories to find the number of petrol pumps in the city.

  • Search for petrol pumps on online maps like Google Maps or MapQuest.

  • Use online directories like Yelp or Yellow Pages to find petrol pumps in the city.

  • Check with local authorities or city websites for a list of petrol pumps in the area.

  • Ask locals or taxi drivers for recommendations on petrol pumps in the city.

Add your answer
Q21. What is the difference between overloading and overriding?
Ans.

Overloading is having multiple methods in the same class with the same name but different parameters. Overriding is implementing a method in a subclass that is already present in the superclass.

  • Overloading involves multiple methods with the same name but different parameters

  • Overriding involves implementing a method in a subclass that is already present in the superclass

  • Overloading is determined at compile time, while overriding is determined at runtime

Add your answer

Q22. What is DBMS and RDBMS and difference between them?

Ans.

DBMS stands for Database Management System, while RDBMS stands for Relational Database Management System. RDBMS is a type of DBMS.

  • DBMS is a software system that allows users to define, create, maintain and control access to the database.

  • RDBMS is a type of DBMS that stores data in a structured format using tables with rows and columns.

  • RDBMS enforces a set of rules called ACID properties to ensure data integrity, while DBMS may not necessarily enforce these rules.

  • Examples of DB...read more

Add your answer

Q23. 1. What is udf in Spark? 2. Write PySpark code to check the validity of mobile_number column

Ans.

UDF stands for User-Defined Function in Spark. It allows users to define their own functions to process data.

  • UDFs can be written in different programming languages like Python, Scala, and Java.

  • UDFs can be used to perform complex operations on data that are not available in built-in functions.

  • PySpark code to check the validity of mobile_number column can be written using regular expressions and the `regexp_extract` function.

  • Example: `df.select('mobile_number', regexp_extract('...read more

Add your answer

Q24. What are the lions of HSBC? Do you know the symbol and story behind it?

Ans.

The lions of HSBC are a symbol of strength and stability. They represent the bank's commitment to its customers.

  • The lions are a pair of bronze statues that stand guard outside HSBC's headquarters in London.

  • They were designed by sculptor Nick Elphick and installed in 2002.

  • The lions are modeled after the original lions that stood outside the bank's Shanghai office in the early 20th century.

  • The lions are a symbol of the bank's heritage and its commitment to its customers.

  • The lio...read more

Add your answer

Q25. How to understand customer behaviour based on credit card transaction? What would be your approach?

Ans.

To understand customer behaviour based on credit card transaction, I would analyze spending patterns, transaction frequency, and purchase categories.

  • Analyze spending patterns to identify high and low spenders

  • Analyze transaction frequency to identify regular and irregular customers

  • Analyze purchase categories to identify customer preferences and interests

  • Use data visualization tools to identify trends and patterns

  • Compare customer behavior to industry benchmarks and competitors

  • I...read more

Add your answer

Q26. Sanctions screen and type of risks and different sanctions

Add your answer

Q27. Merge two unsorted lists such that the output list is sorted. You are free to use inbuilt sorting functions to sort the input lists

Ans.

Merge two unsorted lists into a sorted list using inbuilt sorting functions.

  • Use inbuilt sorting functions to sort the input lists

  • Merge the sorted lists using a merge algorithm

  • Return the merged and sorted list

Add your answer

Q28. What are the 4 pillars of OOPs?

Ans.

Encapsulation, Inheritance, Polymorphism, Abstraction

  • Encapsulation: Bundling data and methods that operate on the data into a single unit

  • Inheritance: Ability of a class to inherit properties and behavior from another class

  • Polymorphism: Ability to present the same interface for different data types

  • Abstraction: Hiding the complex implementation details and showing only the necessary features

Add your answer
Q29. Explain the difference between the DELETE and TRUNCATE commands in a DBMS.
Ans.

DELETE removes specific rows from a table, while TRUNCATE removes all rows and resets auto-increment values.

  • DELETE is a DML command, while TRUNCATE is a DDL command.

  • DELETE can be rolled back, while TRUNCATE cannot be rolled back.

  • DELETE triggers ON DELETE triggers, while TRUNCATE does not trigger any triggers.

  • DELETE is slower as it logs individual row deletions, while TRUNCATE is faster as it deallocates data pages.

  • Example: DELETE FROM table_name WHERE condition; TRUNCATE tabl...read more

Add your answer
Q30. What is meant by normalization and denormalization?
Ans.

Normalization is the process of organizing data in a database to reduce redundancy and improve data integrity. Denormalization is the opposite process.

  • Normalization involves breaking down data into smaller, more manageable tables to reduce redundancy.

  • Denormalization involves combining tables to improve query performance.

  • Normalization helps maintain data integrity by reducing the risk of anomalies.

  • Denormalization can improve read performance but may lead to data redundancy.

  • Exa...read more

Add your answer

Q31. what is the difference between clustering and classification.

Ans.

Clustering groups data points based on similarity while classification assigns labels to data points based on predefined categories.

  • Clustering is unsupervised learning while classification is supervised learning.

  • Clustering is used to find patterns in data while classification is used to predict the category of a data point.

  • Examples of clustering algorithms include k-means and hierarchical clustering while examples of classification algorithms include decision trees and logist...read more

Add your answer

Q32. What is Enterprise Value of a firm and how to calculate

Ans.

Enterprise Value is the total value of a company, including debt and equity.

  • Enterprise Value = Market Capitalization + Debt - Cash

  • Market Capitalization = Total number of shares outstanding x current market price per share

  • Debt = Total outstanding debt of the company

  • Cash = Total cash and cash equivalents held by the company

  • EV is used to determine the true value of a company, as it takes into account both debt and equity

  • EV can be used to compare companies with different capital ...read more

Add your answer

Q33. How to ingest csv file to spark dataframe and write it to hive table.

Ans.

Ingest CSV file to Spark dataframe and write to Hive table.

  • Create SparkSession object

  • Read CSV file using SparkSession.read.csv() method

  • Create a dataframe from the CSV file

  • Create a Hive table using SparkSession.sql() method

  • Write the dataframe to the Hive table using dataframe.write.saveAsTable() method

Add your answer

Q34. What is Object oriented programming?

Ans.

Object oriented programming is a programming paradigm based on the concept of objects, which can contain data and code.

  • Objects are instances of classes, which define the structure and behavior of the objects.

  • Encapsulation, inheritance, and polymorphism are key principles of object oriented programming.

  • Example: Inheritance allows a class to inherit properties and methods from another class.

  • Example: Encapsulation hides the internal state of an object and only exposes necessary ...read more

View 1 answer
Q35. What is meant by static polymorphism?
Ans.

Static polymorphism refers to the mechanism where the method to be called is determined at compile time.

  • Method overloading is an example of static polymorphism where the method to be called is resolved at compile time based on the method signature.

  • Compile-time polymorphism is another term for static polymorphism.

  • Static polymorphism is achieved through function overloading and operator overloading.

Add your answer

Q36. SQL query for getting 2nd highest salary from each department

Ans.

SQL query to retrieve the second highest salary from each department

  • Use the RANK() function to assign a rank to each salary within each department

  • Filter the results to only include rows with a rank of 2

  • Group the results by department to get the second highest salary for each department

View 1 answer

Q37. What are the sanction country, how risk is calculated, constitution documents required for like Pvt Ltd, partnership, limited co. , Nri documents , onboarding process.

Ans.

Sanctioned countries, risk calculation, and required documents for onboarding different types of entities and NRIs.

  • Sanctioned countries include Iran, North Korea, Syria, and others.

  • Risk is calculated based on factors such as the country's political stability, economic conditions, and regulatory environment.

  • Constitution documents required for Pvt Ltd, partnership, and limited co. include certificate of incorporation, partnership deed, and memorandum of association.

  • NRI document...read more

Add your answer
Q38. How is a stack different from a queue?
Ans.

A stack follows Last In First Out (LIFO) order while a queue follows First In First Out (FIFO) order.

  • Stack: elements are added and removed from the top (like a stack of plates)

  • Queue: elements are added at the rear and removed from the front (like a line of people)

  • Stack: push() and pop() operations

  • Queue: enqueue() and dequeue() operations

  • Example: Undo functionality in text editors (stack) vs. printer queue (queue)

Add your answer

Q39. How to delete duplicate rows from a table

Ans.

To delete duplicate rows from a table, use the DISTINCT keyword or GROUP BY clause.

  • Use the DISTINCT keyword to select unique rows from the table.

  • Use the GROUP BY clause to group the rows by a specific column and select the unique rows.

  • Use the DELETE statement with a subquery to delete the duplicate rows.

  • Create a new table with the unique rows and drop the old table.

Add your answer

Q40. Write down code implementing all 4 pillars of OOPs.

Ans.

Code implementing all 4 pillars of OOPs

  • Encapsulation: Encapsulate data within classes and provide public methods to access and modify the data.

  • Inheritance: Create a hierarchy of classes where child classes inherit attributes and methods from parent classes.

  • Polymorphism: Allow objects of different classes to be treated as objects of a common superclass through method overriding and overloading.

  • Abstraction: Hide complex implementation details and only show the necessary feature...read more

Add your answer

Q41. What is SQL and who its different from mySQL?

Ans.

SQL is a standard language for managing databases, while MySQL is a specific open-source relational database management system.

  • SQL stands for Structured Query Language and is used to communicate with databases.

  • SQL is a standard language that can be used with various database management systems.

  • MySQL is a specific open-source relational database management system that uses SQL.

  • MySQL is one of the most popular database management systems that uses SQL for querying and managing ...read more

Add your answer

Q42. Monolith to microservice migration journey ? what all decisions needs to be taken and how the entire migration took place.

Ans.

Monolith to microservice migration involves breaking down a large application into smaller, independent services.

  • Evaluate the current monolith architecture and identify the components that can be decoupled into microservices.

  • Define the boundaries of each microservice to ensure they are cohesive and loosely coupled.

  • Choose the right technology stack for each microservice based on its requirements and scalability needs.

  • Implement communication mechanisms between microservices suc...read more

Add your answer

Q43. What are different types of join? And how they differ from each other?

Ans.

Different types of join include inner, outer, left, right, cross, and self join.

  • Inner join returns only the matching rows from both tables.

  • Outer join returns all rows from both tables and null values for non-matching rows.

  • Left join returns all rows from the left table and null values for non-matching rows from the right table.

  • Right join returns all rows from the right table and null values for non-matching rows from the left table.

  • Cross join returns the Cartesian product of b...read more

Add your answer

Q44. Tell me about some important event in terms of economics and how it has affected the markets?

Ans.

The 2008 financial crisis had a significant impact on the global markets.

  • The 2008 financial crisis was triggered by the collapse of Lehman Brothers, a major investment bank.

  • It led to a severe credit crunch and a global recession.

  • Stock markets around the world experienced sharp declines, with the Dow Jones Industrial Average losing over 50% of its value.

  • The crisis exposed weaknesses in the financial system and led to increased regulation and reforms.

  • Central banks implemented u...read more

Add your answer

Q45. What are the window functions you have used?

Ans.

Window functions are used to perform calculations across a set of rows that are related to the current row.

  • Commonly used window functions include ROW_NUMBER, RANK, DENSE_RANK, LAG, LEAD, FIRST_VALUE, LAST_VALUE, and NTILE.

  • Window functions are used in conjunction with the OVER clause to define the window or set of rows to perform the calculation on.

  • Window functions can be used to calculate running totals, moving averages, and other aggregate calculations.

  • Window functions are s...read more

Add your answer

Q46. Write a code to find the 2nd largest element in an array.

Ans.

Code to find the 2nd largest element in an array

  • Sort the array in descending order and return the element at index 1

  • Iterate through the array and keep track of the two largest elements

  • Handle edge cases like arrays with less than 2 elements

Add your answer

Q47. Describe the situation when someone used your computer without informing you?

Ans.

I was frustrated when someone used my computer without informing me.

  • I discovered that someone had used my computer without my knowledge.

  • I felt frustrated and violated because my personal space was invaded.

  • I confronted the person and asked them why they used my computer without informing me.

  • I emphasized the importance of respecting personal boundaries and seeking permission before using someone else's belongings.

  • I took measures to ensure the security of my computer and persona...read more

View 1 answer

Q48. How do you handles null values in PySpark

Ans.

Null values in PySpark are handled using functions such as dropna(), fillna(), and replace().

  • dropna() function is used to drop rows or columns with null values

  • fillna() function is used to fill null values with a specified value or method

  • replace() function is used to replace null values with a specified value

  • coalesce() function is used to replace null values with the first non-null value in a list of columns

Add your answer
Q49. What are private and special IP addresses?
Ans.

Private and special IP addresses are reserved ranges of IP addresses used for specific purposes.

  • Private IP addresses are used within a private network and are not routable on the internet.

  • Special IP addresses include loopback address (127.0.0.1) and broadcast address (255.255.255.255).

  • Private IP ranges include 10.0.0.0 to 10.255.255.255, 172.16.0.0 to 172.31.255.255, and 192.168.0.0 to 192.168.255.255.

Add your answer

Q50. How to make pivot table range auto and how to adjust pivot to not show nil value.

Ans.

To make pivot table range auto, select the data range and press Ctrl + T. To adjust pivot to not show nil value, go to PivotTable Options > Layout & Format > uncheck 'Show items with no data'.

  • To make pivot table range auto, select the data range and press Ctrl + T.

  • To adjust pivot to not show nil value, go to PivotTable Options > Layout & Format > uncheck 'Show items with no data'.

Add your answer

Q51. Why is enterprise value more important than an equity value, tell the difference between the two

Ans.

Enterprise value is more important than equity value as it includes debt and cash, giving a more accurate picture of a company's total value.

  • Enterprise value takes into account a company's debt and cash, while equity value only considers the value of the company's shares.

  • Enterprise value is a more comprehensive measure of a company's total value, as it reflects the cost of acquiring the entire business.

  • Equity value can be misleading as it does not account for a company's debt...read more

Add your answer

Q52. How the connect two grids which are different frequencies?

Add your answer

Q53. What is imputer function in PySpark

Ans.

Imputer function in PySpark is used to replace missing values in a DataFrame.

  • Imputer is a transformer in PySpark ML library.

  • It replaces missing values in a DataFrame with either mean, median, or mode of the column.

  • It can be used with both numerical and categorical columns.

  • Example: imputer = Imputer(inputCols=['col1', 'col2'], outputCols=['col1_imputed', 'col2_imputed'], strategy='mean')

  • Example: imputed_df = imputer.fit(df).transform(df)

Add your answer

Q54. Case studies how to target customers based on data base

Ans.

Targeting customers based on database requires analyzing data and creating personalized campaigns.

  • Analyze customer data to identify patterns and preferences

  • Segment customers based on demographics, behavior, and interests

  • Create personalized campaigns using targeted messaging and offers

  • Use A/B testing to optimize campaigns and improve results

View 1 answer
Asked in
AVP Interview

Q55. How did you implement transformational changes explain with example

Ans.

Implemented transformational changes through clear communication, collaboration, and a focus on the end goal.

  • Identified areas for improvement and set clear goals

  • Engaged stakeholders and communicated the vision for change

  • Collaborated with team members to develop and implement new processes

  • Provided training and support to ensure successful adoption of changes

  • Measured and evaluated the impact of changes to ensure success

  • Example: Implemented a new project management system that s...read more

Add your answer
Q56. Define the 7 different layers of the OSI Reference Model.
Ans.

The OSI Reference Model defines 7 layers that represent different functions in networking.

  • Physical Layer - deals with physical connections and signals (e.g. cables, hubs)

  • Data Link Layer - manages data transfer between devices on the same network (e.g. Ethernet)

  • Network Layer - handles routing and forwarding of data packets (e.g. IP)

  • Transport Layer - ensures reliable data delivery (e.g. TCP)

  • Session Layer - establishes, maintains, and terminates connections (e.g. SSL)

  • Presentatio...read more

Add your answer

Q57. Finance elective of first term – What are the different ratios? What ratios to apply in different sectors?

Ans.

Different ratios used in finance and their application in different sectors.

  • Different ratios used in finance include liquidity ratios, profitability ratios, solvency ratios, and efficiency ratios.

  • Liquidity ratios measure a company's ability to meet short-term obligations, such as the current ratio and quick ratio.

  • Profitability ratios assess a company's ability to generate profits, such as return on equity and gross profit margin.

  • Solvency ratios evaluate a company's long-term ...read more

Add your answer

Q58. Difference between C and C++?

Ans.

C is a procedural programming language while C++ is an object-oriented programming language.

  • C is a procedural programming language, while C++ supports both procedural and object-oriented programming.

  • C does not have classes and objects, while C++ does.

  • C does not support function overloading, while C++ does.

  • C does not have exception handling, while C++ does.

  • C does not have namespaces, while C++ does.

View 1 answer

Q59. What are different types of banking products?

Ans.

Banking products include savings accounts, checking accounts, loans, credit cards, and investment accounts.

  • Savings accounts: earn interest on deposited funds

  • Checking accounts: used for daily transactions and bill payments

  • Loans: borrowed money with interest

  • Credit cards: allows purchases on credit with interest

  • Investment accounts: used to invest in stocks, bonds, and mutual funds

Add your answer

Q60. Difference between Delete, Truncate and Drop?

Ans.

Delete removes specific rows from a table, Truncate removes all rows from a table, and Drop removes the table itself.

  • Delete is a DML command that removes specific rows from a table based on a condition.

  • Truncate is a DDL command that removes all rows from a table but keeps the table structure.

  • Drop is a DDL command that removes the entire table along with its structure.

View 1 answer

Q61. How can a company remove its debt but not affect the cash flow?

Ans.

A company can remove its debt without affecting cash flow by refinancing debt at lower interest rates, increasing revenue, or selling assets.

  • Refinance debt at lower interest rates to reduce debt burden

  • Increase revenue through sales growth or cost-cutting measures

  • Sell assets to generate cash and pay off debt

  • Negotiate with creditors for better repayment terms

Add your answer

Q62. What is your area of interest?

Ans.

My area of interest is machine learning and artificial intelligence.

  • I enjoy working with large datasets and developing algorithms to analyze and extract insights from them.

  • I have experience with various machine learning techniques such as regression, classification, and clustering.

  • I am also interested in natural language processing and computer vision.

  • Some examples of my work include developing a recommendation system for an e-commerce website and building a chatbot for custo...read more

Add your answer

Q63. What is merge sort and its Algorithm ?

Ans.

Merge sort is a divide and conquer algorithm that divides the input array into two halves, sorts them recursively, and then merges them.

  • Divide the input array into two halves

  • Recursively sort each half

  • Merge the sorted halves back together

Add your answer

Q64. If worked for RestAPI ? what is the use of swagger ? what is the content of Swagger documentation ?

Ans.

Swagger is a tool used for documenting and testing REST APIs.

  • Swagger is used for documenting REST APIs by providing a user-friendly interface to view and interact with API endpoints.

  • It allows developers to easily understand the functionality of an API, including available endpoints, request/response formats, and authentication methods.

  • Swagger documentation typically includes information such as API endpoints, request parameters, response formats, error codes, and authenticati...read more

Add your answer

Q65. How to handle difficult situations with stakeholder

Ans.

Handling difficult situations with stakeholders requires effective communication, active listening, and problem-solving skills.

  • Stay calm and professional

  • Listen actively to their concerns

  • Acknowledge their perspective

  • Identify the root cause of the issue

  • Collaborate on finding a solution

  • Communicate clearly and transparently

  • Follow up to ensure resolution

View 1 answer

Q66. Is one time item in CFO an alarming item for a comany seeking debt?

Ans.

Yes, one-time items in CFO can be alarming for a company seeking debt.

  • One-time items can distort the true financial health of a company

  • Lenders may view one-time items as unsustainable sources of income

  • It may raise concerns about the company's ability to generate consistent cash flow

  • Companies should provide explanations for one-time items to lenders

Add your answer

Q67. How would you approach regulatory changes, how would you identify stakeholders?

Ans.

Approach regulatory changes by conducting thorough research, engaging with relevant stakeholders, and implementing necessary adjustments.

  • Research current regulations and upcoming changes

  • Identify key stakeholders such as regulatory bodies, industry associations, and internal departments

  • Engage with stakeholders to understand their concerns and gather feedback

  • Collaborate with legal and compliance teams to ensure adherence to regulations

  • Implement necessary changes and communicate...read more

Add your answer

Q68. How would resolve the customer query if your facing a vulnerable customer

Ans.

I would handle the query with empathy and patience, ensuring their needs are met.

  • Listen actively and attentively to their concerns

  • Acknowledge their emotions and validate their feelings

  • Provide clear and concise information

  • Offer support and assistance in finding a solution

  • Follow up to ensure their satisfaction

Add your answer

Q69. What do you check in a business continuity plan?

Ans.

A business continuity plan should include checks for critical business functions, communication strategies, data backup procedures, and testing protocols.

  • Critical business functions and processes

  • Communication strategies for internal and external stakeholders

  • Data backup and recovery procedures

  • Testing protocols to ensure the plan is effective

  • Emergency response and escalation procedures

Add your answer

Q70. How bank works and major keys items of banking BS

Ans.

Banking involves accepting deposits and lending money. Major items in banking balance sheet include assets, liabilities, and equity.

  • Banks accept deposits from customers and use the funds to make loans to other customers

  • Assets on a bank's balance sheet include cash, loans, and investments

  • Liabilities on a bank's balance sheet include deposits and borrowings

  • Equity on a bank's balance sheet represents the value of the bank's assets minus its liabilities

  • Banks are regulated by gove...read more

Add your answer

Q71. Tell me what all electronic components you know

Add your answer

Q72. Make the customer get full service and go back with smile

Ans.

To make the customer get full service and go back with a smile, provide personalized attention, exceed expectations, resolve issues promptly, and create a positive and memorable experience.

  • Offer personalized attention and listen to the customer's needs

  • Exceed customer expectations by going the extra mile

  • Resolve any issues or complaints promptly and effectively

  • Create a positive and friendly atmosphere

  • Provide clear and helpful communication

  • Offer additional perks or surprises to ...read more

View 1 answer

Q73. What to do if wrong report was sent by you?

Ans.

Acknowledge the mistake, inform the concerned parties, and provide the correct report as soon as possible.

  • Admit the mistake and take responsibility

  • Notify the recipients of the incorrect report

  • Provide the correct report as soon as possible

  • Take steps to prevent similar mistakes in the future

Add your answer

Q74. Revenue recognition -How would you recognise revenue and walk through

Ans.

Revenue recognition involves identifying when and how revenue should be recorded in financial statements.

  • Revenue should be recognized when it is earned and realized or realizable

  • The amount of revenue recognized should be the amount that is expected to be received

  • Revenue recognition should follow the matching principle

  • Examples of revenue recognition methods include percentage of completion, completed contract, and installment sales

  • Revenue recognition may also involve accountin...read more

Add your answer

Q75. What concepts do you know in Cybersecurity?

Ans.

I am familiar with concepts such as encryption, network security, access control, and security protocols.

  • Encryption methods such as AES, RSA, and DES

  • Network security practices like firewalls, VPNs, and intrusion detection systems

  • Access control mechanisms like role-based access control (RBAC) and multi-factor authentication

  • Security protocols such as SSL/TLS, IPsec, and SSH

Add your answer

Q76. How do you solve conflicts?

Ans.

I approach conflicts by actively listening, identifying the root cause, and finding a mutually beneficial solution.

  • Listen to all parties involved and understand their perspectives

  • Identify the root cause of the conflict

  • Brainstorm potential solutions with all parties

  • Find a mutually beneficial solution

  • Communicate the solution clearly and ensure all parties agree

View 1 answer

Q77. What is the life cycle of an LC?

Ans.

The life cycle of an LC refers to its stages from design to disposal.

  • Design and development

  • Manufacturing and testing

  • Installation and commissioning

  • Operation and maintenance

  • Decommissioning and disposal

Add your answer

Q78. Tell me about your understanding on Agile methodologies?

Ans.

Agile methodologies are iterative approaches to software development that prioritize flexibility, collaboration, and customer feedback.

  • Agile methodologies involve breaking down projects into smaller, manageable tasks called sprints.

  • They emphasize continuous collaboration between cross-functional teams, including developers, testers, and product owners.

  • Agile promotes adaptability and responding to change over rigid planning.

  • Common Agile frameworks include Scrum, Kanban, and Ex...read more

Add your answer

Q79. What orchestration tools have you worked on? Which tool do you support?

Ans.

I have experience working with orchestration tools such as Ansible, Puppet, and Chef. Currently, I support Ansible for automation and configuration management.

  • Worked with Ansible, Puppet, and Chef for orchestration

  • Currently supporting Ansible for automation and configuration management

Add your answer

Q80. Is negative working capital good for a comapny?

Ans.

Negative working capital can be good for a company as it indicates efficient management of assets and liabilities.

  • Negative working capital can indicate that a company is effectively using its short-term assets to fund its short-term liabilities.

  • It can show that a company is able to quickly convert inventory or accounts receivable into cash to meet its short-term obligations.

  • However, sustained negative working capital may also indicate liquidity issues or over-reliance on shor...read more

Add your answer

Q81. Discuss a scenario where you convinced a difficult customer

Ans.

I convinced a difficult customer by actively listening to their concerns and finding a mutually beneficial solution.

  • Listened attentively to the customer's complaints and acknowledged their frustrations

  • Empathized with the customer's situation and showed understanding

  • Offered a solution that addressed the customer's concerns and met their needs

  • Followed up with the customer to ensure their satisfaction with the resolution

Add your answer

Q82. What do you mean by Negative new screening?

Ans.

Negative news screening refers to the process of identifying and flagging any negative or adverse information about individuals or entities.

  • Negative news screening is a part of the Know Your Customer (KYC) process in which individuals or entities are checked against various databases and sources for any negative or adverse information.

  • It helps in identifying potential risks, such as involvement in criminal activities, fraud, money laundering, or being associated with sanction...read more

View 1 answer

Q83. Design patterns - Prototype and Factory. How would you use Factory pattern in case of inheritence

Ans.

Factory pattern is used to create objects without exposing the instantiation logic to the client. It can be used in inheritance to create objects of different subclasses.

  • Factory pattern can be used to create objects of different subclasses without exposing the instantiation logic to the client

  • It allows for flexibility in creating objects based on certain conditions or parameters

  • Factory pattern can be used in inheritance to create objects of different subclasses based on the t...read more

Add your answer

Q84. Model validation metrics in regulatory and scoring models

Ans.

Model validation metrics are crucial for regulatory and scoring models.

  • Regulatory models require validation metrics to ensure compliance with regulations and standards.

  • Scoring models require validation metrics to ensure accuracy and reliability of the model.

  • Common validation metrics include accuracy, precision, recall, F1 score, and ROC curve analysis.

  • Validation metrics should be chosen based on the specific requirements of the model and the industry it is being used in.

  • Regul...read more

Add your answer

Q85. Different kind of Joins in DBMS ?

Ans.

Different types of joins in DBMS include inner join, outer join, left join, right join, and full join.

  • Inner join: Returns rows when there is a match in both tables.

  • Outer join: Returns all rows from one table and only matching rows from the other table.

  • Left join: Returns all rows from the left table and the matched rows from the right table.

  • Right join: Returns all rows from the right table and the matched rows from the left table.

  • Full join: Returns rows when there is a match i...read more

Add your answer

Q86. How far do you forecast in a DCF model

Ans.

The forecast period in a DCF model depends on the nature of the business and the industry it operates in.

  • The forecast period typically ranges from 5 to 10 years.

  • For stable and mature businesses, a longer forecast period may be appropriate.

  • For rapidly changing industries, a shorter forecast period may be more appropriate.

  • The forecast period should be supported by reasonable assumptions about future growth rates, margins, and capital expenditures.

  • The terminal value should accou...read more

Add your answer

Q87. 1.What is Fixed income 2.What is Forex 3.Types of Derivatives

Ans.

Fixed income refers to investments that pay a fixed rate of return, Forex is the foreign exchange market, and derivatives are financial instruments whose value is derived from an underlying asset.

  • Fixed income investments include bonds, treasury bills, and certificates of deposit.

  • Forex, or foreign exchange, is the market where currencies are traded.

  • Types of derivatives include options, futures, and swaps.

Add your answer

Q88. Difference between Stacks and Queues?

Ans.

Stacks are Last In First Out (LIFO) data structures, while Queues are First In First Out (FIFO) data structures.

  • Stacks: Elements are added and removed from the same end, like a stack of plates. Example: Undo feature in text editors.

  • Queues: Elements are added at the rear and removed from the front, like a line of people waiting. Example: Print queue in a printer.

Add your answer

Q89. How to transfer file in network within 2 locations ?

Ans.

Files can be transferred between 2 locations on a network using various methods.

  • Use file transfer protocols like FTP, SFTP, or TFTP

  • Use cloud storage services like Dropbox, Google Drive, or OneDrive

  • Use network file sharing protocols like SMB or NFS

  • Use remote desktop software like TeamViewer or Remote Desktop Connection

  • Use email to send small files as attachments

Add your answer

Q90. What is Managed table and External table in hive

Ans.

Managed tables are physically stored in Hive's warehouse directory while external tables are not.

  • Managed tables are created and managed by Hive while external tables are created outside of Hive.

  • Managed tables are physically stored in Hive's warehouse directory while external tables are not.

  • Managed tables are deleted when the table is dropped while external tables are not.

  • Managed tables are used for internal purposes while external tables are used for external purposes.

  • Example...read more

Add your answer

Q91. What is the role of boundary query in sqoop

Ans.

Boundary query in Sqoop is used to import data within a specific range of values.

  • Boundary query is used to import data within a specific range of values

  • It is used with the --boundary-query option in Sqoop

  • It is useful when importing large datasets and you only need a subset of the data

  • For example, importing data from a database table where the values in a particular column fall within a specific range

Add your answer

Q92. What you will do if more work load ?

Ans.

I will prioritize tasks, delegate responsibilities, and communicate with my team to ensure timely completion of all work.

  • Assess the workload and prioritize tasks based on urgency and importance

  • Delegate responsibilities to team members based on their strengths and workload

  • Communicate with team members to ensure everyone is aware of their responsibilities and deadlines

  • Monitor progress and provide support as needed

  • Consider hiring additional staff or outsourcing work if necessary

Add your answer

Q93. What is testing? why is important

Ans.

Testing is the process of evaluating a system or component to ensure it meets specified requirements.

  • Testing helps identify defects or errors in software or systems.

  • It ensures that the software or system functions as intended.

  • Testing helps improve the quality and reliability of the software or system.

  • It provides confidence to stakeholders that the software or system is ready for use.

  • Testing helps in identifying and mitigating risks.

  • Examples of testing include functional testi...read more

View 1 answer

Q94. What is variable frequency drive?

Add your answer

Q95. DBMS Keys - Composite Key, Primary Key vs Unique Key

Ans.

Composite key is a combination of multiple columns to uniquely identify a record, while primary key is a unique identifier for a record and unique key allows only unique values.

  • Composite key is made up of multiple columns to uniquely identify a record

  • Primary key is a unique identifier for a record and cannot have duplicate values

  • Unique key allows only unique values but can have null values

Add your answer

Q96. How is EMIR is seperate from SFTR?

Ans.

EMIR and SFTR are both regulatory frameworks for financial transactions, but they have different scopes and requirements.

  • EMIR (European Market Infrastructure Regulation) focuses on OTC derivatives reporting and clearing obligations.

  • SFTR (Securities Financing Transaction Regulation) focuses on reporting securities financing transactions, such as repurchase agreements and securities lending.

  • EMIR covers a wider range of financial instruments and counterparties compared to SFTR.

  • B...read more

Add your answer

Q97. Please explain the Quick Sort algorithm and its process of reallocation.

Ans.

Quick Sort is a popular sorting algorithm that uses divide and conquer strategy to sort elements in an array.

  • Quick Sort picks a pivot element and partitions the array around the pivot.

  • It recursively sorts the sub-arrays on either side of the pivot.

  • The process continues until the entire array is sorted.

  • Example: Given array [5, 2, 9, 3, 7], after Quick Sort it becomes [2, 3, 5, 7, 9].

Add your answer

Q98. What will be bring on table as Program Mananger?

Ans.

I will bring strong leadership skills, technical expertise, and a proven track record of successfully managing complex programs.

  • Strong leadership skills to effectively manage cross-functional teams

  • Technical expertise to understand and drive technology initiatives

  • Proven track record of successfully managing complex programs, such as implementing a new software system or launching a product

  • Ability to prioritize tasks, allocate resources, and meet deadlines

  • Excellent communicatio...read more

Add your answer

Q99. What is the difference between Basel and IFRS9 norms

Ans.

Basel norms focus on capital adequacy and risk management for banks, while IFRS9 norms focus on accounting standards for financial instruments.

  • Basel norms are set by the Basel Committee on Banking Supervision to ensure banks maintain adequate capital to cover risks.

  • IFRS9 norms are accounting standards set by the International Financial Reporting Standards Foundation to address classification and measurement of financial instruments.

  • Basel norms primarily focus on risk manageme...read more

Add your answer

Q100. What is top command in shell scripting

Ans.

Top command is a Linux utility that displays the system's processes in real-time.

  • Displays the processes running on the system

  • Updates the list of processes in real-time

  • Provides information on CPU usage, memory usage, and process IDs

  • Can be used to monitor system performance and identify resource-intensive processes

Add your answer
1
2
3
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos

Interview Process at Datahash

based on 380 interviews
Interview experience
4.2
Good
View more
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Interview Questions from Similar Companies

3.8
 • 403 Interview Questions
3.6
 • 184 Interview Questions
4.0
 • 173 Interview Questions
4.1
 • 148 Interview Questions
View all
Top HSBC Group Interview Questions And Answers
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
70 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter