Incedo
100+ Interview Questions and Answers
Q1. DSA - Nth Fibonacci no with memoization, Find duplicate node in Linked list, Binary tree DSA questions, Project based tech questions, OOPS, Puzzle
Interview questions for Software Engineer position covering DSA, project-based tech questions, OOPS, and puzzle.
Be prepared to answer DSA questions such as finding the Nth Fibonacci number with memoization, finding duplicate nodes in a linked list, and binary tree DSA questions.
Expect project-based tech questions that may require you to explain your approach to solving a particular problem.
Brush up on OOPS concepts and be ready to apply them to real-world scenarios.
Be prepare...read more
Q2. Write a query to find out the 2nd largest salary from Employees
Query to find 2nd largest salary from Employees
Use ORDER BY and LIMIT
Exclude the highest salary using subquery
Handle cases where there are ties
Q3. what is shadow DOM? what are synthetic Events? What is UNIT testing?
Shadow DOM is a way to encapsulate the styling and structure of a web component, synthetic events are events created by the browser to mimic real events, and unit testing is a method to test individual units or components of a software.
Shadow DOM allows for scoped styles and markup within a web component.
Synthetic events are events like 'click' or 'change' that are created by the browser to simulate user interactions.
Unit testing involves testing individual units or component...read more
Q4. Difference between hashmap and concurrent hashmap?
Hashmap is not thread-safe while Concurrent Hashmap is thread-safe.
Hashmap is not suitable for multi-threaded environments as it can lead to race conditions and data inconsistencies.
Concurrent Hashmap allows multiple threads to access and modify the map concurrently without any data inconsistencies.
Concurrent Hashmap uses a technique called lock striping to achieve thread-safety.
Concurrent Hashmap is slower than Hashmap due to the overhead of maintaining thread-safety.
Use Has...read more
Q5. What is Capital market, define debt securities, are you comfortable working in Night Shifts, what is custodian, and who is broker?
Capital market is a platform where companies and governments raise funds through debt and equity securities. Debt securities are loans that investors provide to the issuer.
Capital market is a platform for raising funds through securities
Debt securities are loans provided by investors to the issuer
Working in night shifts is comfortable for me
Custodian is a financial institution that holds securities on behalf of clients
Broker is a person or firm that buys and sells securities ...read more
Q6. What do you understand by market capitalisation?
Market capitalisation is the total value of a company's outstanding shares.
Market cap is calculated by multiplying the current stock price by the total number of outstanding shares.
It is used to determine the size of a company and its overall worth.
Companies with higher market caps are generally considered more stable and less risky investments.
For example, Apple Inc. has a market cap of over $2 trillion as of 2021.
Market cap can fluctuate based on changes in stock price and ...read more
Q7. Difference between Hashtable and hashmap?
Hashtable is synchronized while hashmap is not.
Hashtable is thread-safe while hashmap is not.
Hashtable does not allow null keys or values while hashmap allows one null key and multiple null values.
Hashtable is slower than hashmap due to synchronization.
Hashtable is a legacy class while hashmap is a newer implementation.
Q8. How to calculate Net Asset Value?
Net Asset Value is calculated by subtracting liabilities from assets and dividing by the number of outstanding shares.
Calculate the total value of all assets
Subtract the total value of all liabilities
Divide the result by the number of outstanding shares
NAV = (Total Assets - Total Liabilities) / Number of Outstanding Shares
Example: If a company has $10 million in assets and $5 million in liabilities, with 1 million outstanding shares, the NAV would be $5 per share.
Q9. what is STP, HSRP,FRRP, what is the difference between hsrp and vrrp and why hsrp is better than vrrf
STP, HSRP, and FRRP are network protocols used for redundancy and failover. HSRP and VRRP are similar but HSRP is preferred.
STP (Spanning Tree Protocol) prevents loops in a network by disabling redundant links
HSRP (Hot Standby Router Protocol) and VRRP (Virtual Router Redundancy Protocol) provide redundancy by allowing multiple routers to share a virtual IP address
FRRP (Fast Router Redundancy Protocol) is a Cisco proprietary protocol that provides faster failover than HSRP an...read more
Q10. Difference between Private Equity and Public Equity?
Private equity involves investing in private companies, while public equity involves investing in publicly traded companies.
Private equity firms invest in companies that are not publicly traded
Public equity involves buying shares of publicly traded companies
Private equity firms typically acquire a controlling stake in the company they invest in
Public equity investors do not have control over the company
Private equity investments are typically held for a longer period of time ...read more
Q11. What is Event Loop? and how it works?
Event Loop is a mechanism in JavaScript that allows for asynchronous operations to be executed in a non-blocking way.
Event Loop is responsible for handling asynchronous operations in JavaScript.
It continuously checks the call stack for any functions that need to be executed.
If the call stack is empty, it checks the callback queue for any pending tasks.
It moves tasks from the callback queue to the call stack for execution.
Event Loop ensures that the JavaScript engine is not bl...read more
Q12. Tell me about different opps concepts
Object-oriented programming concepts like inheritance, polymorphism, encapsulation, and abstraction.
Inheritance: Allows a class to inherit properties and behavior from another class.
Polymorphism: Ability for objects to be treated as instances of their parent class.
Encapsulation: Bundling data and methods that operate on the data into a single unit.
Abstraction: Hiding the complex implementation details and showing only the necessary features.
Q13. Find the second largest number in an array
Find the second largest number in an array of strings
Convert the array of strings to an array of integers
Sort the array in descending order
Return the second element in the sorted array
Q14. What is Primary Key in sql
Primary key is a unique identifier for a record in a database table.
Primary key ensures data integrity and helps in faster data retrieval.
It cannot have null values and must be unique for each record.
It can be a single column or a combination of columns.
Examples: employee_id, order_number, customer_id
Q15. Differentiate Mutual Fund, Hedge Fund, Private Equity
Mutual funds pool money from multiple investors to invest in a diversified portfolio of securities. Hedge funds are actively managed investment funds that use a variety of strategies to achieve high returns. Private equity involves investing in privately held companies or buying out public companies to take them private.
Mutual funds pool money from multiple investors to invest in a diversified portfolio of securities.
Hedge funds are actively managed investment funds that use ...read more
Q16. Difference between General Partner and Limited Partner?
General partners have unlimited liability and manage the business, while limited partners have limited liability and do not manage the business.
General partners have unlimited liability for the debts and obligations of the business, while limited partners have limited liability and are only liable for the amount of their investment.
General partners manage the day-to-day operations of the business, while limited partners do not have a say in management decisions.
General partne...read more
Q17. What do you mean by Capital Markets?
Capital markets refer to financial markets where long-term securities are traded.
Capital markets are where companies and governments raise funds by issuing stocks, bonds, and other securities.
These markets are typically for long-term investments and have a lower liquidity than other financial markets.
Examples of capital markets include the New York Stock Exchange, NASDAQ, and the bond market.
Investors in capital markets are typically institutional investors such as pension fu...read more
Q18. 1. What is a loop in switching? 2. How do you say vlan 200 working on switch? 3. How do you say ethernet frame is tagged or untagged? 4. Regarding project 5. Python string slicing 6. Max vlans allowed on single...
read moreTechnical questions related to switching, VLANs, and Python string slicing for Lead Engineer position.
A loop in switching occurs when a broadcast packet is forwarded endlessly between switches.
To say VLAN 200 is working on a switch, you can check the VLAN database or use the show vlan command.
An ethernet frame is tagged when it has a VLAN ID added to its header, and untagged when it does not.
Regarding the project, provide details on the scope, timeline, and deliverables.
Pytho...read more
Q19. How to release, renew IP in CMD?
To release and renew IP in CMD, use the commands 'ipconfig /release' and 'ipconfig /renew'.
Open Command Prompt
Type 'ipconfig /release' and press Enter to release the current IP address
Type 'ipconfig /renew' and press Enter to obtain a new IP address
You can also use 'ipconfig /all' to view detailed information about network interfaces
Q20. How your Automation Framework is organized ?
Our Automation Framework is organized in a modular and scalable way.
We use a Page Object Model design pattern
We have separate modules for test data, test scripts, and test reports
We use a central configuration file for easy maintenance
We have a library of reusable functions
We use version control to manage changes
We have a clear naming convention for easy identification
Q21. What do you mean by Mutual Funds?
Mutual funds are investment vehicles that pool money from multiple investors to invest in stocks, bonds, and other securities.
Mutual funds are managed by professional fund managers
Investors buy shares in the mutual fund and the value of their investment is determined by the performance of the underlying securities
Mutual funds offer diversification and can be a good option for investors who want exposure to a variety of securities
Examples of mutual fund companies include Vangu...read more
Q22. what is xlate table in ASA and ipsec tunnel trouble shooting
The xlate table in ASA is used to keep track of translations between internal and external IP addresses. It is important for IPsec tunnel troubleshooting.
The xlate table is used to map internal IP addresses to external IP addresses
It is important for troubleshooting IPsec tunnels because it allows you to see if traffic is being translated correctly
You can view the xlate table using the 'show xlate' command in the ASA CLI
If there are issues with the xlate table, it can cause I...read more
Q23. What is private equity ? What is limited partners ? What is NAV ? What is IRR ?
Private equity is an alternative investment class where investors pool capital to invest in private companies.
Limited partners are investors who provide capital to a private equity fund but have limited liability.
NAV (Net Asset Value) is the value of a fund's assets minus its liabilities.
IRR (Internal Rate of Return) is a metric used to measure the profitability of an investment over time.
Private equity firms typically acquire companies, improve their operations, and sell the...read more
Q24. what is encapsulation and loading process.also write an code for Reverse string
Encapsulation is the process of hiding internal details of an object and providing access only through defined methods.
Encapsulation helps in achieving data abstraction and data hiding.
It allows for better control over the data and prevents direct access to it.
Loading process refers to the process of loading a program or data into memory for execution.
Reverse string code example: function reverseString(str) { return str.split('').reverse().join(''); }
Q25. what is encapsulation and loading process. Also write an code for reverse string
Encapsulation is the process of hiding internal implementation details and providing a public interface. Loading process refers to the steps involved in loading a program or data into memory.
Encapsulation helps in achieving data abstraction and information hiding.
It allows for better control over data and prevents unauthorized access.
Loading process involves steps like parsing, linking, and loading the program or data into memory.
Here's an example code for reversing a string:...read more
Q26. 1)What is the props and state 2)what is react 3) what is HoC 4)What is redux 5)class and functional component 6) map,for,forEach,await, 7)reducer 8)all Hooks
A set of questions related to software engineering concepts and technologies.
Props and state are used in React to manage and pass data between components.
React is a JavaScript library used for building user interfaces.
Higher-Order Components (HoC) are functions that take a component and return an enhanced version of it.
Redux is a predictable state container for JavaScript apps, commonly used with React.
Class components and functional components are two ways to define componen...read more
Q27. What do you understand by Mutual funds?
Mutual funds are investment vehicles that pool money from multiple investors to invest in a diversified portfolio of securities.
Mutual funds are managed by professional fund managers who make investment decisions on behalf of the investors.
Investors can buy shares of mutual funds, which represent their ownership in the fund's portfolio.
Mutual funds offer diversification, liquidity, and professional management to investors.
There are different types of mutual funds such as equi...read more
Q28. If the user would not get OTP to access the profile?
If the user does not receive OTP to access their profile, they should first check their internet connection and then contact customer support.
Check internet connection to ensure OTP delivery
Contact customer support for assistance
Verify contact information for accuracy
Consider alternative authentication methods
Q29. What would happened if the user would not be able to use the card?
If the user is unable to use the card, they may experience inconvenience, potential financial loss, and may need to contact the card issuer for assistance.
User may face inconvenience in making purchases or transactions
User may incur financial loss if unable to access funds on the card
User may need to contact the card issuer for assistance or to report the issue
Q30. Angle between hands of clock on 10:25? Trains traveling towards eachother give speed where will they collide?
Angle between hands of clock at 10:25 is 147.5 degrees. Trains will collide at midpoint of their initial positions.
To calculate angle between hands of clock, use formula: |(30*H)-(11/2)*M|
For 10:25, H=10 and M=25, so angle = |(30*10)-(11/2)*25| = 147.5 degrees
When two trains are traveling towards each other, their relative speed is added to get the collision speed.
The collision point is the midpoint of their initial positions along the track.
For example, if train A starts at ...read more
Q31. intro sql query to print all unique values from table what are operations of stack data structure.
SQL query to print all unique values from a table and operations of stack data structure.
For SQL query, use SELECT DISTINCT column_name FROM table_name.
Stack data structure operations include push, pop, peek, and isEmpty.
Example: SELECT DISTINCT city FROM customers;
Example: Pushing an element onto the stack: stack.push(5);
Q32. Intro do one try have two catches?(yes) Merge sort for given example
Yes, one try can have two catches in a try-catch block.
A try block can have multiple catch blocks to handle different types of exceptions.
The catch blocks are executed in the order they are written.
If an exception is caught in the first catch block, the subsequent catch blocks are not executed.
Example: try { //code } catch (ExceptionType1 e) { //handle exception } catch (ExceptionType2 e) { //handle exception }
Q33. How would i f-identify whether the access was done the member or the scammer
To identify whether the access was done by the member or the scammer, analyze login patterns, IP addresses, device information, and behavior.
Analyze login patterns - look for unusual login times or frequency
Check IP addresses - compare the location of the access to the member's usual locations
Review device information - see if the device used for access matches the member's known devices
Monitor behavior - look for any suspicious activity or changes in behavior
Q34. polymorphism and explain about virtual polymorphism
Polymorphism is the ability of a single function or method to operate on different types of data.
Polymorphism allows objects of different classes to be treated as objects of a common superclass.
Virtual polymorphism is achieved through virtual functions in C++.
Virtual functions allow a function in a base class to be overridden in a derived class.
Example: Animal class with virtual function 'makeSound' overridden in Dog and Cat classes.
Q35. How you do forecasting. Which excel functions do you use
I use various excel functions for forecasting such as TREND, FORECAST, and GROWTH.
I analyze historical data to identify trends and patterns
I use functions like TREND to project future values based on historical data
I use functions like FORECAST to estimate future values based on existing data
I use functions like GROWTH to project future values based on exponential growth
I also use other statistical functions like AVERAGE, STDEV, and CORREL to analyze data
I ensure accuracy by ...read more
Q36. Explain oops concept with example
OOPs concept is a programming paradigm based on the concept of objects, which can contain data in the form of fields and code in the form of procedures.
OOPs stands for Object-Oriented Programming
Key concepts include Inheritance, Encapsulation, Polymorphism, and Abstraction
Example: Inheritance allows a class to inherit properties and behavior from another class
Q37. What is difference between general partner and limited partner
General partners have management control and unlimited liability, while limited partners have no management control and limited liability.
General partners have unlimited liability for the debts and obligations of the partnership.
Limited partners have limited liability, meaning they are only liable up to the amount of their investment.
General partners have management control and are actively involved in the day-to-day operations of the business.
Limited partners have no managem...read more
Q38. Write code reverse link list ..? Write code to convert digital to binary format ?
Code to reverse a linked list and convert digital to binary format.
Create a new linked list and traverse the original list, adding each node to the beginning of the new list
To convert digital to binary, use the built-in function or write a function to divide the number by 2 and store the remainder in a stack until the quotient is 0, then pop the stack to get the binary representation
Q39. what is java , development of calculator ,development for web page
Java is a programming language used for developing various applications including calculators and web pages.
Java is an object-oriented language
Calculator development involves creating a GUI and implementing mathematical operations
Web development involves using Java frameworks like Spring and Hibernate
Java is platform-independent and can run on any operating system
Q40. How to fix system hang without restarting
To fix system hang without restarting, try these steps.
Check for any running processes that may be causing the hang and end them
Clear temporary files and cache
Update drivers and software
Run a virus scan
Check for any hardware issues
Try a system restore to a previous point
Use command prompt to run system file checker (sfc /scannow)
Q41. meaning of subject for which you are applying
The subject for which I am applying is the specific area of expertise or focus of the role I am seeking.
Explain how your skills and experience align with the subject matter of the role
Discuss any relevant projects or achievements related to the subject
Highlight any specialized knowledge or training you have in the subject area
Q42. MIDDLE OF LINKED LIST
To find the middle element of a linked list
Traverse the linked list using two pointers - one moving one node at a time and the other moving two nodes at a time
When the faster pointer reaches the end of the list, the slower pointer will be at the middle element
If the list has even number of elements, there are two middle elements
Q43. Did you use docker? And how did you build image
Q44. write code for virtual polymorphism and explain
Virtual polymorphism allows objects of different classes to be treated as objects of a common superclass.
Create a base class with virtual functions
Create derived classes that override the virtual functions
Use pointers or references of the base class to call the overridden functions
Q45. Analysis of Financial statements
Analysis of financial statements involves reviewing and interpreting a company's financial data to assess its performance and make informed decisions.
Review income statement, balance sheet, and cash flow statement to understand financial health
Calculate key financial ratios like profitability, liquidity, and solvency ratios
Compare current financial data with historical data and industry benchmarks
Identify trends, strengths, weaknesses, and areas for improvement
Use financial a...read more
Q46. Limited Partner vs General Partner
Limited partners are passive investors with limited liability, while general partners are actively involved in managing the business with unlimited liability.
Limited partners have limited liability and are not involved in the day-to-day operations of the business.
General partners have unlimited liability and are actively involved in managing the business.
Limited partners typically contribute capital to the business but do not have a say in its management.
General partners are ...read more
Q47. Nav calculation capital of call distribution notice
NAV calculation capital of call distribution notice
NAV (Net Asset Value) calculation involves determining the value of a fund's assets minus its liabilities
Capital call is a request for additional funds from investors in a private equity fund
Distribution notice is a document sent to investors detailing the distribution of profits or income from an investment
Q48. What is the function of custodian bank
Custodian banks are financial institutions responsible for safeguarding assets, such as securities and cash, on behalf of institutional clients.
Provide safekeeping of assets
Settle trades on behalf of clients
Collect income on assets
Process corporate actions
Provide reporting and other administrative services
Act as a liaison between the client and the investment manager
Q49. When should we go for redux and context api
Redux for complex state management, Context API for simpler state sharing
Use Redux for complex state management with multiple components needing access to the same state
Context API is suitable for simpler state sharing between parent and child components
Redux is more suitable for larger applications with a lot of state changes and actions
Context API is easier to set up and use for smaller applications or components
Q50. What are the Linux commands you have used
Q51. Understanding of investment banking?
Investment banking involves providing financial services to corporations, governments, and other institutions, including raising capital, mergers and acquisitions, and advisory services.
Facilitates capital raising for corporations through issuing stocks and bonds
Assists in mergers and acquisitions by advising on deals and facilitating transactions
Provides financial advisory services to clients on various strategic matters
Involves underwriting securities offerings and trading ...read more
Q52. Palindrome number program in c++
Palindrome number program in C++
A palindrome number is a number that remains the same when its digits are reversed
To check if a number is palindrome, we can compare the original number with its reverse
We can use a loop to reverse the number and then compare it with the original number
Q53. what is ssl offloading in f5
SSL offloading is a process of removing SSL encryption from incoming traffic and decrypting it before sending it to the backend servers.
SSL offloading is performed by a load balancer like F5 to reduce the processing load on backend servers.
It improves server performance and reduces latency by offloading SSL processing to a dedicated hardware or software.
F5 SSL offloading can be configured to support multiple SSL certificates and protocols like TLS 1.3.
It can also perform SSL ...read more
Q54. REVERSE THE ARRAY
Reverse the array of strings
Create a new array and iterate through the original array in reverse order
Use a for loop or array.reverse() method to reverse the array
Ensure the original array remains unchanged
Q55. have you worked on integration ?
Yes, I have worked on integration in Salesforce development.
I have experience integrating Salesforce with external systems using REST and SOAP APIs.
I have worked on integrating Salesforce with third-party applications like MailChimp and DocuSign.
I have implemented custom integrations using tools like Salesforce Connect and MuleSoft.
I have experience with data mapping, transformation, and synchronization during integration projects.
Q56. Definition of IRR, NPV, NAV
IRR, NPV, and NAV are financial metrics used to evaluate the profitability and value of investments.
IRR (Internal Rate of Return) is the discount rate that makes the net present value of all cash flows from a particular investment equal to zero.
NPV (Net Present Value) is the difference between the present value of cash inflows and outflows of an investment.
NAV (Net Asset Value) is the value of a fund's assets minus its liabilities, divided by the number of shares outstanding....read more
Q57. What do you know about private equity
Private equity involves investing in privately held companies to acquire ownership stakes and drive growth.
Private equity firms raise capital from investors to acquire ownership stakes in private companies
They aim to drive growth and improve operations to increase the value of their investments
Private equity investments are typically held for a number of years before being sold or taken public
Private equity firms often use leverage to finance acquisitions, which can increase ...read more
Q58. Simple xpath without using Index reverse strings with words separately
Reverse strings with words separately using simple xpath without using index
Use XPath function to split the string into words
Reverse each word individually using XPath function
Concatenate the reversed words back together
Q59. Write a code to reverse the string
Code to reverse a string
Use a loop to iterate through the characters of the string
Swap the characters from start to end of the string
Continue swapping until you reach the middle of the string
Q60. Write a code to swap two number
Swapping two numbers using a temporary variable
Create a temporary variable to store one of the numbers
Assign the value of the first number to the second number
Assign the value of the temporary variable to the first number
Q61. General rules of accounting?
General rules of accounting include consistency, relevance, reliability, and comparability.
Consistency: Accounting methods should be applied consistently from one period to another.
Relevance: Financial information should be relevant to the decision-making needs of users.
Reliability: Financial information should be reliable and free from bias or error.
Comparability: Financial information should be comparable across different companies or periods.
Example: Using the same depreci...read more
Q62. What is polymorphism
Polymorphism is the ability of an object to take on many forms.
Polymorphism allows objects of different classes to be treated as if they are of the same class.
It can be achieved through method overloading or method overriding.
Example: A shape class can have different subclasses like circle, square, etc. and all can be treated as shapes.
Polymorphism helps in achieving code reusability and flexibility.
Q63. What is abstraction
Abstraction is the process of hiding complex implementation details and exposing only necessary information.
Abstraction allows us to focus on the essential features of an object or system.
It helps in reducing complexity and increasing efficiency.
Examples of abstraction include encapsulation, inheritance, and interfaces in object-oriented programming.
Abstraction is used in various fields such as software engineering, mathematics, and art.
Q64. Write a program to reverse even words in string?
Program to reverse even words in a string
Split the string into words
Iterate through the words and reverse the even-indexed words
Join the words back into a string
Q65. What is ur 5year goal
My 5-year goal is to become a lead software developer in a reputable tech company, leading a team of developers and working on cutting-edge projects.
Advance my technical skills by learning new programming languages and technologies
Gain experience in project management and leadership roles
Contribute to open-source projects and attend tech conferences to network and stay updated with industry trends
Q66. Expertise in which technology
My expertise lies in Java and related technologies.
Proficient in Java programming language and its frameworks like Spring and Hibernate
Experience in developing web applications using HTML, CSS, JavaScript, and AngularJS
Familiarity with database technologies like MySQL and Oracle
Knowledge of software development methodologies like Agile and Scrum
Experience in leading and mentoring a team of developers
Q67. what all exceptions you know ?
Some common exceptions in Salesforce development include DMLException, QueryException, and LimitException.
DMLException: Thrown when an error occurs while performing DML operations like insert, update, delete.
QueryException: Thrown when an error occurs while querying data from the database.
LimitException: Thrown when governor limits are exceeded, such as SOQL query limit or CPU time limit.
Q68. Possible mirror Substring from the given string
Find possible mirror substrings in a given string
Iterate through the string and check for mirror substrings
Use two pointers to check for mirror substrings
Examples: 'abcddcba' -> ['abcddcba', 'cddc', 'dd']
Q69. How did you deploy your models
Q70. Why governor limits ?
Governor limits are in place to ensure efficient use of resources and prevent abuse in Salesforce platform.
Governor limits help in maintaining system performance and preventing monopolization of resources.
They ensure fair usage of resources among all users on the platform.
Examples include limits on number of records retrieved in a single query, number of SOQL queries executed, and CPU time consumed.
Governor limits also help in preventing infinite loops and runaway code that c...read more
Q71. Guesstimate about number of flights in India
There are approximately 2.5 million flights in India annually.
India is one of the fastest growing aviation markets in the world.
Major airports like Delhi, Mumbai, Bangalore, and Chennai handle a large number of flights daily.
Airlines like IndiGo, SpiceJet, and Air India operate numerous domestic and international flights.
The number of flights has been increasing steadily over the years due to growing demand for air travel.
Q72. Skills in my resule
My skills include programming languages like Java, Python, and C++, as well as experience with databases and problem-solving.
Proficient in Java, Python, and C++ programming languages
Experience with databases such as MySQL and MongoDB
Strong problem-solving skills demonstrated through projects and coding challenges
Q73. What is wealth management ?
Wealth management involves financial planning, investment management, and other financial services to help individuals and families grow and protect their wealth.
Involves creating a personalized financial plan based on individual goals and risk tolerance
Includes investment management to grow wealth through various asset classes
Provides services such as retirement planning, tax planning, estate planning, and risk management
Often offered by financial advisors, wealth managers, ...read more
Q74. What is derivative market?
Derivative market is a financial market where financial instruments derive their value from an underlying asset.
Derivatives are contracts between two parties that derive their value from an underlying asset such as stocks, bonds, commodities, currencies, or interest rates.
Common types of derivatives include futures, options, swaps, and forwards.
Derivative markets are used for hedging, speculation, and arbitrage.
Participants in derivative markets include institutional investor...read more
Q75. Difference between ArrayList and LinkedList?
ArrayList is implemented as a resizable array, while LinkedList is implemented as a doubly linked list.
ArrayList provides fast random access, LinkedList provides fast insertion and deletion.
ArrayList uses more memory as it needs to allocate a fixed size array, LinkedList uses more memory for storing references to the next and previous elements.
Example: ArrayList is better for scenarios where random access is required, while LinkedList is better for scenarios where frequent in...read more
Q76. Difference between HashMap and HashTable?
HashMap is non-synchronized and allows null values, while HashTable is synchronized and does not allow null values.
HashMap is non-synchronized, meaning it is not thread-safe, while HashTable is synchronized and thread-safe.
HashMap allows null values for both keys and values, while HashTable does not allow null keys or values.
HashMap is faster than HashTable as it is non-synchronized, but HashTable is preferred in multi-threaded environments for its thread-safety.
Example: Hash...read more
Q77. Regression testing and sanity difference
Regression testing is retesting of previously tested functionality, while sanity testing is a quick check to ensure basic functionality is working.
Regression testing is performed to ensure that changes or fixes in the software do not introduce new defects or impact existing functionality.
It involves retesting of the entire application or a specific set of test cases.
Regression testing is usually performed after major changes or enhancements to the software.
Sanity testing is a...read more
Q78. What is nav describe
NAV stands for Net Asset Value, which represents the per-share value of a mutual fund or exchange-traded fund (ETF).
NAV is calculated by subtracting a fund's liabilities from its assets and dividing by the number of shares outstanding.
It is used to determine the price at which investors can buy or sell shares of the fund.
NAV is typically calculated at the end of each trading day.
For example, if a mutual fund has assets worth $100 million and liabilities worth $10 million, and...read more
Q79. what is case management?
Case management is the process of managing and coordinating the various aspects of a case or project.
It involves identifying and assessing the needs of the case or project
Developing a plan of action to address those needs
Assigning tasks and responsibilities to team members
Monitoring progress and making adjustments as necessary
Ensuring that all stakeholders are informed and involved in the process
Examples include legal case management, project management, and healthcare case m...read more
Q80. What is docker, what is DevOps
Docker is a containerization platform that allows applications to be packaged and run in isolated environments. DevOps is a software development methodology that focuses on collaboration, automation, and integration between development and operations teams.
Docker is a tool designed to make it easier to create, deploy, and run applications by using containers.
Containers allow a developer to package up an application with all parts it needs, such as libraries and other dependen...read more
Q81. Write C code and C++ code
Providing C and C++ code for Senior Software Engineer position
For C code, demonstrate knowledge of pointers, memory allocation, and basic data structures
For C++ code, showcase understanding of object-oriented programming, inheritance, and polymorphism
Provide clear and concise code with proper commenting and formatting
Q82. what is SNAT in f5
SNAT stands for Secure Network Address Translation and is a feature in F5 that allows for the translation of IP addresses.
SNAT is used to translate the source IP address of outgoing traffic to a different IP address.
This can be useful in scenarios where multiple devices are sharing a single public IP address.
SNAT can also be used to improve security by hiding the actual IP address of a device from the public internet.
F5 offers a variety of SNAT options, including automap SNAT...read more
Q83. Explain day to day activity as Pm
As a Project Manager, day to day activities include overseeing project progress, communicating with team members and stakeholders, resolving issues, and tracking deadlines.
Communicating with team members and stakeholders to provide updates and gather feedback
Monitoring project progress and ensuring tasks are completed on time
Identifying and resolving any issues or roadblocks that may arise
Tracking deadlines and ensuring project stays on schedule
Conducting regular meetings to ...read more
Q84. Difference between git and sub git
Git is a version control system used for tracking changes in source code, while Subversion (SVN) is another version control system with similar features.
Git is distributed, allowing for offline work and faster branching and merging.
Subversion is centralized, requiring a network connection for most operations.
Git uses a staging area for changes before committing, while Subversion commits changes directly to the repository.
Git has a more complex branching and merging model comp...read more
Q85. what is LMS ?
LMS stands for Learning Management System, a software application for the administration, documentation, tracking, reporting, and delivery of educational courses or training programs.
LMS helps organizations deliver online courses and training programs to employees or students.
It allows for the creation and management of courses, assessments, and learning materials.
LMS can track learner progress, generate reports, and provide analytics on course performance.
Popular LMS platfor...read more
Q86. What is database and scaling
Database is a structured collection of data, scaling refers to increasing capacity to handle more data or users.
Database is a structured collection of data organized for easy access, retrieval, and management
Scaling refers to the ability of a system to handle increased workload or growth
Scaling can involve adding more servers, increasing storage capacity, or optimizing performance
Examples of scaling in databases include sharding, replication, and vertical or horizontal scalin...read more
Q87. What is hedge fund?
A hedge fund is an investment fund that pools capital from accredited individuals or institutional investors and invests in a variety of assets.
Hedge funds are typically only accessible to high-net-worth individuals or institutional investors.
They often use leverage and derivatives to amplify returns.
Hedge funds can invest in a wide range of assets including stocks, bonds, commodities, and currencies.
They aim to generate high returns for their investors, often through active ...read more
Q88. What are bad debts
Bad debts are debts that are unlikely to be recovered by a company or individual.
Bad debts are typically the result of customers failing to pay their debts on time or at all.
Companies often write off bad debts as a loss on their financial statements.
Bad debts can negatively impact a company's cash flow and profitability.
Examples of bad debts include unpaid invoices, defaulted loans, and credit card debt that is not repaid.
Q89. What is hege fund
A hedge fund is an investment fund that pools capital from accredited individuals or institutional investors and invests in a variety of assets.
Hedge funds typically use a variety of strategies to achieve high returns, including leverage, short selling, and derivatives trading.
They are known for their flexibility in investment strategies and ability to generate high returns, but also come with higher fees and risks.
Hedge funds are usually only available to accredited investor...read more
Q90. Explain Rest assured automation
Rest Assured is a Java library used for API automation testing, specifically for testing RESTful APIs.
Rest Assured is an open-source Java library that provides a domain-specific language for writing powerful API tests.
It simplifies the process of sending HTTP requests and validating responses in API automation.
Rest Assured supports various authentication methods, request and response specifications, and assertion capabilities.
It can be integrated with popular testing framewor...read more
Q91. Why choose .Net core
High performance, cross-platform compatibility, open-source, modern development features
Cross-platform compatibility allows for deployment on various operating systems
High performance due to optimized runtime and just-in-time compilation
Open-source community support for continuous improvement and updates
Modern development features like dependency injection, modular architecture, and improved performance monitoring
Example: .Net Core allows for easy migration of existing .Net a...read more
Q92. What is shadow DOM
Shadow DOM is a way to encapsulate the styling and structure of a web component, preventing styles from leaking out or clashing with the rest of the page.
Shadow DOM allows for creating self-contained components with their own styles and markup
It helps in preventing styles from the main document affecting the component and vice versa
Shadow DOM can be created using the 'shadowRoot' property of an element
Q93. Merge 2 list using linked list
Merge two linked lists into one
Create a new linked list to store the merged list
Iterate through both input linked lists and add nodes to the new list in sorted order
Update the next pointers accordingly
Q94. Explain OSI model
The OSI model is a conceptual framework used to describe the communication functions of a network.
The model has 7 layers, each with a specific function.
The layers are: Physical, Data Link, Network, Transport, Session, Presentation, and Application.
Each layer communicates with the layer above and below it.
The model helps ensure interoperability between different network devices and software.
Example: When you visit a website, the Application layer sends a request to the Transpo...read more
Q95. Diff b/w interface and abstract
Interface is a contract that defines the methods a class must implement, while abstract class can have both implemented and abstract methods.
Interface can only have abstract methods and constants, while abstract class can have both abstract and non-abstract methods.
A class can implement multiple interfaces but can only inherit from one abstract class.
Interfaces are used to achieve multiple inheritance in Java, while abstract classes are used to provide a common base for subcl...read more
Q96. Performance tunning in react
Performance tuning in React involves optimizing code for faster rendering and improved user experience.
Identify and eliminate unnecessary re-renders by using shouldComponentUpdate or React.memo
Use PureComponent or memo to prevent unnecessary re-renders of components
Avoid using inline functions in render methods to prevent unnecessary re-renders
Optimize component rendering by splitting large components into smaller ones
Use React DevTools to analyze component performance and id...read more
Q97. IR Response for P1 ticket
IR Response for P1 ticket involves immediate investigation, containment, and resolution of critical security incidents.
Immediately triage the incident to determine severity and impact
Contain the incident to prevent further damage or data loss
Gather evidence and conduct forensic analysis to identify root cause
Coordinate with relevant teams for remediation and recovery
Document all actions taken and lessons learned for future incidents
Q98. Core concepts of Reactjs
Reactjs is a JavaScript library for building user interfaces.
Component-based architecture
Virtual DOM for efficient updates
JSX for writing HTML in JavaScript
State management with setState()
Lifecycle methods like componentDidMount()
Q99. code to write in java
Write a Java code to reverse a string
Use StringBuilder to reverse the string
Convert the string to StringBuilder, call reverse() method, and convert back to string
Handle null or empty string cases
Q100. ArrayList vs LinkedList
ArrayList is better for random access and LinkedList is better for frequent insertions and deletions.
ArrayList uses dynamic array to store elements, allowing fast random access but slower insertions and deletions.
LinkedList uses doubly linked list to store elements, allowing fast insertions and deletions but slower random access.
Example: Use ArrayList when you need to frequently access elements by index. Use LinkedList when you need to frequently add or remove elements.
More about working at Incedo
Top HR Questions asked in null
Interview Process at null
Top Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month