Add office photos
Employer?
Claim Account for FREE

MasterCard

4.0
based on 656 Reviews
Filter interviews by

100+ Asp Management Interview Questions and Answers

Updated 15 Nov 2024
Popular Designations
Q1. Longest Palindromic Subsequence

You have been given a string ‘A’ consisting of lower case English letters. Your task is to find the length of the longest palindromic subsequence in ‘A’.

A subsequence is a sequen...read more

View 2 more answers
Q2. Word Pattern

You have been given two strings 'S' and ‘T’. Your task is to find if ‘S’ follows the same pattern as ‘T’.

Here follow means a full match, i.e. there is a bijection between a letter of ‘T’ and a non-...read more

Add your answer
Q3. Check If The String Is A Palindrome

You are given a string 'S'. Your task is to check whether the string is palindrome or not. For checking palindrome, consider alphabets and numbers only and ignore the symbols ...read more

Ans.

The task is to check whether a given string is a palindrome or not, considering only alphabets and numbers and ignoring symbols and whitespaces.

  • Convert the string to lowercase and remove all symbols and whitespaces.

  • Reverse the modified string and compare it with the original string.

  • If they are equal, then the string is a palindrome.

  • If not, then the string is not a palindrome.

View 2 more answers
Q4. Maximum Subarray Sum

Given an array of numbers, find the maximum sum of any contiguous subarray of the array.

For example, given the array [34, -50, 42, 14, -5, 86], the maximum sum would be 137, since we would ...read more

Ans.

The maximum sum of any contiguous subarray in an array is found using Kadane's algorithm in O(N) time.

  • Initialize two variables, maxSum and currentSum, both set to the first element of the array.

  • Iterate through the array from the second element.

  • For each element, update currentSum by adding the element to it.

  • If currentSum becomes negative, reset it to 0.

  • If currentSum is greater than maxSum, update maxSum.

  • After iterating through the array, maxSum will contain the maximum subarra...read more

View 3 more answers
Discover Asp Management interview dos and don'ts from real experiences
Q5. Min Steps to one using DP

You are given a positive integer 'N’. Your task is to find and return the minimum number of steps that 'N' has to take to get reduced to 1.

You can perform any one of the following 3 st...read more

Ans.

The task is to find the minimum number of steps required to reduce a positive integer to 1 using three given operations.

  • Use dynamic programming to solve the problem efficiently.

  • Create an array to store the minimum steps required for each number from 1 to N.

  • Iterate from 2 to N and calculate the minimum steps for each number based on the three operations.

  • Return the minimum steps for N.

View 2 more answers
Q6. Level Order Traversal

You have been given a Binary Tree of integers. You are supposed to return the level order traversal of the given tree.

For example:
For the given binary tree 

Example

The level order traversal wil...read more
Add your answer
Are these interview questions helpful?
Q7. Next Greater Node In Linked List

Ninjas are often known for their superhuman strength and valour. In a given set of linked ninja villages of different clans, their strongest ninjas want to know whether there exi...read more

View 2 more answers
Q8. Square Root (Integral)

Given a number N, find its square root. You need to find and print only the integral part of square root of N.

For eg. if number given is 18, answer is 4.

Input format :
Integer N 
Output ...read more
Ans.

The task is to find the integral part of the square root of a given number.

  • Use the built-in square root function to find the square root of the number.

  • Convert the result to an integer by rounding down or using the floor function.

  • Print the integer part of the square root as the output.

View 1 answer
Share interview questions and help millions of jobseekers 🌟
Q9. Technical Questions

What is the difference between MongoDB and MySQL?

If you remove an object attribute, is it deleted from the database?

Why is Node.js Single-threaded?

What is piping in Node.js?

What is reconcili...read more

Add your answer
Q10. SQL Qusestions

SQL queries (basic, nested, and the on containing where,having,group by,order by, like, etc..)
SQL Joins, and which is the fastest?
DDL vs DML

Ans.

The question is about SQL queries, SQL joins, and the difference between DDL and DML.

  • SQL queries can be basic or nested and can involve various clauses like WHERE, HAVING, GROUP BY, ORDER BY, LIKE, etc.

  • SQL joins are used to combine rows from different tables based on a related column between them.

  • The fastest join depends on the specific scenario and the data involved.

  • DDL (Data Definition Language) is used to define and modify the structure of database objects, while DML (Data...read more

Add your answer

Q11. If you are going to open an e-commerce website like Flipkart what will be the things that you will have to keep in mind.

Ans.

To open an e-commerce website like Flipkart, one must keep in mind various factors such as target audience, product range, user experience, logistics, and marketing.

  • Identify the target audience and their preferences

  • Offer a wide range of products to cater to different needs

  • Ensure a seamless user experience with easy navigation and quick loading time

  • Establish a robust logistics network for timely delivery and hassle-free returns

  • Invest in effective marketing strategies to reach ...read more

Add your answer

Q12. Java program to find sum and multplication of int inp ex: 123 return sum and addition

Ans.

Java program to find sum and multiplication of an integer input.

  • Use the modulus operator to extract each digit from the input integer.

  • Add the extracted digits to calculate the sum.

  • Multiply the extracted digits to calculate the multiplication.

View 1 answer

Q13. Write java stream to find output JSON object is input contains State and filters ....> outout shoudl be resultant of both

Ans.

Java stream to filter JSON object by State and other filters

  • Use Java Stream API to filter JSON objects based on State and other filters

  • Create a Predicate to filter the JSON objects based on the given filters

  • Use the filter() method of Stream to apply the Predicate on the JSON objects

  • Collect the filtered JSON objects using the collect() method of Stream

Add your answer

Q14. 3. How do you deal with senior customer when you don't have enough data?

Ans.

Communicate transparently and offer alternative solutions.

  • Explain the limitations of the available data and the potential risks of making decisions based on incomplete information.

  • Offer alternative solutions that can be implemented with the available data.

  • Collaborate with the customer to identify additional data sources or explore other options to gather more data.

  • Provide regular updates on the progress of data collection and analysis.

  • Ensure that all decisions are based on so...read more

Add your answer
Q15. Basic HR Questions

What do you know about mastercard?
Are you free to relocate after lockdown ends?

Add your answer
Q16. OS Questions

What are the benefits of a multiprocessor system?
Explain demand paging?
What is virtual memory?
deadlock

Ans.

Benefits of multiprocessor system, demand paging, virtual memory, and deadlock explained.

  • Benefits of a multiprocessor system include increased processing power, improved performance, and better resource utilization.

  • Demand paging is a memory management technique where pages are loaded into memory only when they are needed.

  • Virtual memory is a memory management technique that allows the execution of processes that are larger than the available physical memory.

  • Deadlock is a situa...read more

Add your answer

Q17. What if your application is down for 1 hour in one site in prod?

Ans.

I would investigate the root cause, work on fixing the issue, and implement measures to prevent it from happening again.

  • Investigate the root cause of the downtime, such as network issues, server failures, or software bugs

  • Work on fixing the issue promptly to minimize impact on users and business operations

  • Implement measures to prevent similar downtime in the future, such as redundancy, monitoring, and failover mechanisms

Add your answer

Q18. How do you make sure a throttling system process dropped messages from a slow downstream service?

Ans.

Implement a throttling system to handle dropped messages from a slow downstream service.

  • Implement a queue to store messages from the downstream service.

  • Set a maximum queue size and drop messages when the queue is full.

  • Use a timestamp to track when messages were received and process them in order.

  • Implement a retry mechanism to reprocess dropped messages after a certain time.

  • Monitor the queue size and processing speed to adjust throttling parameters as needed.

Add your answer

Q19. Guesstimate the number of people travelling by local metro in mumbai

Ans.

The number of people travelling by local metro in Mumbai is estimated to be in millions.

  • Mumbai has a population of over 20 million people.

  • The local metro is a popular mode of transportation in Mumbai.

  • During peak hours, the metro trains are usually crowded.

  • The metro network in Mumbai is extensive, covering various parts of the city.

  • The number of daily commuters on the metro can be estimated based on population density and transportation preferences.

Add your answer

Q20. 1. Brief your existing/last Project architecture ? 2. Design patterns used in microservice architecture ?(Since my last project was microservices) 3. What is saga pattern? 4. 2 Scenario based question - Data lo...

read more
Ans.

Answering questions related to microservice architecture, design patterns, Kafka cluster data loss prevention, and monitoring/recovery in Appdynamics.

  • My last project architecture was based on microservices, utilizing design patterns such as Circuit Breaker, Service Registry, and API Gateway.

  • Saga pattern is used in microservices to manage distributed transactions across multiple services.

  • In the event of data loss in a Kafka cluster, it is important to have proper replication a...read more

Add your answer

Q21. 1. How to choose optimum probability threshold from ROC?

Ans.

To choose optimum probability threshold from ROC, we need to balance between sensitivity and specificity.

  • Choose the threshold that maximizes the sum of sensitivity and specificity

  • Use Youden's J statistic to find the optimal threshold

  • Consider the cost of false positives and false negatives

  • Use cross-validation to evaluate the performance of different thresholds

Add your answer

Q22. Reliance fresh wants to open a store in north-eastern part of India. Should it or should it not?

Ans.

Yes, Reliance Fresh should open a store in the north-eastern part of India.

  • The north-eastern part of India has a growing population and increasing consumer demand.

  • Reliance Fresh can tap into the untapped market potential in the region.

  • Opening a store in the north-eastern part of India can help Reliance Fresh expand its presence and increase its market share.

  • Reliance Fresh can leverage its existing supply chain and distribution network to efficiently serve customers in the reg...read more

Add your answer

Q23. How many feature you have added to your application by providing inputs through user stories as long as Agile frameworks is concerned?

Ans.

I have added 50 features through user stories in Agile framework.

  • I have been working on Agile framework for 2 years.

  • I have added features like user login, payment gateway integration, and search functionality.

  • I prioritize user stories based on business value and impact.

  • I collaborate with the development team to ensure the features are implemented correctly.

  • I continuously gather feedback from users to improve the application.

Add your answer

Q24. 2. How to test time series trend break up?

Ans.

To test time series trend break up, statistical tests like Augmented Dickey-Fuller test can be used.

  • Augmented Dickey-Fuller test can be used to check if a time series is stationary or not.

  • If the time series is not stationary, we can use differencing to make it stationary.

  • After differencing, we can again perform the Augmented Dickey-Fuller test to check for stationarity.

  • If there is a significant change in the mean or variance of the time series, we can use change point detecti...read more

Add your answer

Q25. Revenue collected by the barbers of Kanpur in an year

Ans.

I don't have the available data to answer this question.

  • Need data on number of barbers in Kanpur

  • Need data on average revenue per barber

  • Need data on number of working days in a year

  • Need data on number of customers per barber per day

Add your answer

Q26. What do you know about our Market Development Role?

Ans.

Market Development Role involves identifying and pursuing new business opportunities to expand the company's market share.

  • Market Development Role focuses on identifying new markets and customer segments

  • It involves conducting market research and analysis to understand customer needs and preferences

  • The role also involves developing marketing strategies and campaigns to target new customers

  • Examples of Market Development initiatives include launching new products, entering new ge...read more

Add your answer

Q27. The company wants to launch a premium credit card. How would you strategise to target the right customer segment? Complete thought process around the case was asked.

Ans.

To target the right customer segment for a premium credit card, I would analyze customer data, conduct market research, and create targeted marketing campaigns.

  • Conduct market research to identify potential customer segments who are likely to be interested in a premium credit card.

  • Analyze existing customer data to understand spending habits, income levels, and credit history to identify potential target segments.

  • Create targeted marketing campaigns that highlight the benefits a...read more

Add your answer

Q28. What is difference between Interface and abstract class?

Ans.

Interface is a contract that defines the methods a class must implement, while abstract class can have both abstract and concrete methods.

  • Interface cannot have any implementation, while abstract class can have both abstract and concrete methods.

  • A class can implement multiple interfaces but can only inherit from one abstract class.

  • Interfaces are used to achieve multiple inheritance in Java, while abstract classes are used to provide a common base for subclasses.

  • Interfaces are ...read more

Add your answer

Q29. What are the usecases where CQRS pattern can be used ?

Ans.

CQRS pattern can be used in scenarios where read and write operations need to be separated for better scalability and performance.

  • CQRS can be used in applications with complex domain models that require different models for reading and writing data.

  • It can be beneficial in scenarios where read operations heavily outnumber write operations.

  • CQRS is useful when there is a need to optimize read and write operations independently.

  • Examples include e-commerce platforms for handling p...read more

Add your answer

Q30. How will you resolve eventual consistency in a relational DB from design perspective ?

Ans.

Implementing eventual consistency in a relational DB involves careful design and use of techniques like conflict resolution and versioning.

  • Use timestamp-based conflict resolution to handle conflicting updates.

  • Implement versioning to track changes and resolve conflicts.

  • Consider using distributed transactions or distributed consensus algorithms like Paxos or Raft.

  • Use compensating transactions to rollback changes in case of conflicts.

  • Implement retry mechanisms to handle temporar...read more

Add your answer

Q31. Types of financial statements and how to analyse financial statements and furure projections.

Ans.

Financial statements include balance sheet, income statement, and cash flow statement. Analysis involves ratio analysis and trend analysis.

  • Balance sheet shows assets, liabilities, and equity at a specific point in time

  • Income statement shows revenue, expenses, and profit/loss over a period of time

  • Cash flow statement shows cash inflows and outflows over a period of time

  • Ratio analysis involves comparing financial ratios to industry benchmarks or historical data

  • Trend analysis inv...read more

Add your answer

Q32. There are 25 horses among which you need to find fastest 3. You don't have a timer and a race can be among maximum 5 horses. Find minimum number of races required.

Ans.

Minimum 7 races are required to find the fastest 3 horses.

  • Divide the 25 horses into 5 groups of 5 horses each.

  • Conduct a race among each group, identifying the fastest horse in each race.

  • Take the top 3 horses from each race and conduct a final race among them.

  • The top 3 horses in the final race will be the fastest 3 horses overall.

Add your answer

Q33. How to pass input field values from form to db. How to make code testable/loosely coupled.

Ans.

Pass input field values from form to db by using a data access layer and dependency injection for testability.

  • Create a data access layer to handle interactions with the database.

  • Use parameterized queries to prevent SQL injection.

  • Implement dependency injection to decouple the code and make it testable.

  • Mock the data access layer in unit tests to isolate database interactions.

  • Use interfaces to define contracts between components for easier testing.

Add your answer

Q34. What are the ways to secure REST API?

Ans.

Securing REST API involves using authentication, authorization, encryption, and input validation.

  • Use authentication methods like OAuth, JWT, or API keys to verify the identity of clients.

  • Implement authorization to control access to resources based on user roles and permissions.

  • Encrypt data transmission using HTTPS to protect sensitive information from being intercepted.

  • Validate and sanitize input data to prevent injection attacks like SQL injection or XSS.

Add your answer

Q35. Any example where you introduced a change in the process?

Ans.

Yes

  • Introduced a change in the development process to implement continuous integration

  • Implemented a new code review process to improve code quality

  • Introduced automated testing to catch bugs early in the development cycle

Add your answer

Q36. What are risks? Can you elaborate different types of risks?

Ans.

Risks are potential events that can cause harm or loss. There are various types of risks.

  • Financial risk - loss of money or assets

  • Operational risk - failure of processes, systems or people

  • Reputational risk - damage to brand or image

  • Legal risk - violation of laws or regulations

  • Strategic risk - failure to meet business objectives

  • Physical risk - harm to people or property

  • Cybersecurity risk - data breaches or cyber attacks

Add your answer

Q37. If the 3rd position in a string contains 'b' replace it with 'v'

Ans.

Replace 'b' with 'v' in the 3rd position of each string in an array

  • Iterate through each string in the array

  • Check if the 3rd position contains 'b'

  • If yes, replace 'b' with 'v'

Add your answer

Q38. How to maintain security in Microservices ?

Ans.

Maintaining security in Microservices involves implementing authentication, authorization, encryption, and monitoring.

  • Implement authentication and authorization mechanisms to control access to microservices.

  • Use encryption to secure communication between microservices.

  • Implement monitoring and logging to detect and respond to security incidents.

  • Regularly update dependencies and patches to address security vulnerabilities.

  • Implement rate limiting and throttling to prevent abuse a...read more

Add your answer

Q39. Customerz who have done transaction in more than 10 consecutive days

Ans.

To identify customers who have made transactions on more than 10 consecutive days.

  • Identify customers who have made transactions every day for at least 10 days in a row.

  • Check transaction history for each customer to determine consecutive days of transactions.

  • Create a list of customers who meet the criteria.

  • Consider using SQL queries or data visualization tools to analyze the data.

  • Example: Customer A made transactions on days 1-10 consecutively, while Customer B only made trans...read more

Add your answer

Q40. Find sub sudoko in given multi dimensional int. array

Ans.

Finding sub sudoko in a multi-dimensional integer array.

  • Iterate through each row and column to find sub-sudoku

  • Check if each sub-grid contains all numbers from 1 to 9

  • If yes, then it is a sub-sudoku

  • If no, then move to the next sub-grid

Add your answer

Q41. Parent child component communication in react?

Ans.

Parent child component communication in React involves passing data from parent to child components and triggering events from child to parent components.

  • Use props to pass data from parent to child components

  • Use callback functions to trigger events from child to parent components

  • Context API can be used for passing data to deeply nested components

Add your answer

Q42. What are SSL certificates?

Ans.

SSL certificates are digital certificates that authenticate the identity of a website and encrypt information sent to the server.

  • SSL certificates ensure secure communication between a user's browser and a website's server.

  • They use encryption to protect sensitive data such as login credentials, credit card information, etc.

  • SSL certificates are issued by Certificate Authorities (CAs) and contain information about the website's owner and the CA's digital signature.

  • Examples of SS...read more

Add your answer

Q43. Detailed flow from FE to BE to db.

Ans.

The flow of data from the front end to the back end to the database.

  • Front end sends a request to the back end server.

  • Back end processes the request and interacts with the database.

  • Database retrieves or updates the data and sends it back to the back end.

  • Back end sends the response to the front end for display.

Add your answer

Q44. Can abstract class instantiated?

Ans.

No, abstract classes cannot be instantiated.

  • Abstract classes are meant to be inherited and extended by other classes.

  • Attempting to instantiate an abstract class will result in a compilation error.

  • Abstract classes can have abstract methods that must be implemented by the subclass.

Add your answer

Q45. How to optimize react application?

Ans.

Optimizing a React application involves code splitting, lazy loading, minimizing bundle size, using memoization, and optimizing render performance.

  • Implement code splitting to load only necessary code for each route or component.

  • Utilize lazy loading to defer loading of non-essential components until they are needed.

  • Minimize bundle size by removing unused code, optimizing images, and using tree shaking.

  • Use memoization techniques like useMemo and useCallback to avoid unnecessary...read more

Add your answer

Q46. What is useRef, useMemo, useCallback?

Ans.

useRef is used to persist a value across renders, useMemo is used to memoize expensive calculations, useCallback is used to memoize functions.

  • useRef is commonly used to access DOM elements or persist values between renders.

  • useMemo is used to memoize expensive calculations to avoid re-computation.

  • useCallback is used to memoize functions to prevent unnecessary re-renders.

  • Example: useRef can be used to store a reference to an input element in a form.

  • Example: useMemo can be used ...read more

Add your answer

Q47. How will you create a new wallet from scratch today?

Ans.

To create a new wallet from scratch, I would start by researching the latest technologies and security measures, then design a user-friendly interface, develop the backend infrastructure, and conduct thorough testing before launching.

  • Research the latest technologies and security measures for wallet development

  • Design a user-friendly interface for easy navigation and accessibility

  • Develop the backend infrastructure to securely store and manage user data

  • Conduct thorough testing t...read more

Add your answer

Q48. What is the difference between web service and REST API?

Ans.

Web service is a generic term for any service available over the internet, while REST API is a specific type of web service that follows REST architectural principles.

  • Web service is a broad term that encompasses any service available over the internet, including SOAP, REST, and others.

  • REST API is a specific type of web service that follows the principles of Representational State Transfer (REST).

  • REST APIs use standard HTTP methods like GET, POST, PUT, DELETE to perform CRUD o...read more

Add your answer

Q49. Routing how to use proxy

Ans.

Routing through a proxy involves configuring the proxy server to forward requests to the destination server.

  • Configure the proxy server to listen for incoming requests

  • Configure the proxy server to forward requests to the destination server

  • Configure the client to use the proxy server for outgoing requests

  • Use a proxy server to bypass network restrictions or improve performance

  • Examples: Nginx, Apache, Squid

Add your answer

Q50. What is app.use in .net core?

Ans.

app.use in .NET Core is used to add middleware to the request pipeline.

  • app.use is a method used in ASP.NET Core to add middleware components to the request pipeline.

  • Middleware components are software components that are executed in the request pipeline to handle requests and responses.

  • Middleware components can perform tasks such as authentication, logging, error handling, and more.

  • Example: app.use(new MiddlewareComponent());

Add your answer

Q51. How will you go about optimising a query?

Ans.

Optimising a query involves identifying bottlenecks and improving efficiency.

  • Identify slow-performing queries using tools like query execution plans.

  • Optimize database indexes to speed up query performance.

  • Limit the number of columns and rows returned in the query.

  • Avoid using SELECT * and instead specify only the necessary columns.

  • Use appropriate data types and avoid unnecessary data conversions.

  • Consider denormalizing data for frequently accessed queries.

  • Use query hints or opt...read more

Add your answer

Q52. Explain spring security,oauth2 ,jwt,saml and tls level security

Ans.

Spring Security is a framework that provides authentication, authorization, and other security features for Java applications.

  • OAuth2 is an authorization framework that allows third-party applications to access a user's resources without sharing their credentials.

  • JWT (JSON Web Token) is a compact, URL-safe means of representing claims to be transferred between two parties.

  • SAML (Security Assertion Markup Language) is an XML-based standard for exchanging authentication and autho...read more

Add your answer

Q53. What do you know about financial inclusion?

Ans.

Financial inclusion refers to the availability and accessibility of financial services to all individuals and businesses, regardless of their income level or location.

  • Financial inclusion aims to promote economic growth and reduce poverty by providing access to financial services such as banking, insurance, and credit.

  • It is particularly important for individuals and businesses in developing countries, rural areas, and low-income communities who may not have access to tradition...read more

Add your answer

Q54. Java code to find numbe of repeated characters in String

Ans.

Java code to find number of repeated characters in a String.

  • Create a HashMap to store characters and their counts.

  • Iterate through the String and update the counts in the HashMap.

  • Count the characters with counts greater than 1 to find repeated characters.

Add your answer

Q55. SQL code to fetch second highest salary

Ans.

SQL query to fetch second highest salary

  • Use ORDER BY and LIMIT to get the second highest salary

  • SELECT DISTINCT to avoid duplicates

  • Use subquery to avoid hardcoding the salary value

Add your answer

Q56. Delete rows from table that are 6 months old from current date

Ans.

Use SQL query with WHERE clause to delete rows older than 6 months from current date

  • Use CURRENT_DATE() function to get current date

  • Use DATE_SUB() function to subtract 6 months from current date

  • Write a DELETE query with WHERE clause to delete rows older than calculated date

Add your answer

Q57. Processing semi structured data

Ans.

Processing semi structured data involves extracting and organizing information from data that does not fit neatly into a traditional database structure.

  • Use tools like Apache Spark or Hadoop for processing semi structured data

  • Utilize techniques like data parsing, data cleaning, and data transformation

  • Consider using NoSQL databases like MongoDB for storing semi structured data

  • Examples include processing JSON, XML, or log files

Add your answer

Q58. What is dependency injection?

Ans.

Dependency injection is a design pattern in which components are given their dependencies rather than creating them internally.

  • Dependency injection helps in achieving loose coupling between classes.

  • It allows for easier testing by mocking dependencies.

  • There are three types of dependency injection: constructor injection, setter injection, and interface injection.

  • Example: Instead of a class creating an instance of another class it needs, the instance is provided to it through co...read more

Add your answer

Q59. Do you think data analysis job is overrated?

Ans.

No, data analysis job is not overrated as it plays a crucial role in decision-making and problem-solving.

  • Data analysis helps in identifying trends and patterns in data

  • It provides valuable insights for businesses to make informed decisions

  • Data analysis is essential for optimizing processes and improving efficiency

  • It can uncover hidden opportunities and potential risks

  • Many industries rely on data analysis for strategic planning and forecasting

Add your answer

Q60. what are the different types of commands in sql

Ans.

Different types of commands in SQL include Data Definition Language (DDL), Data Manipulation Language (DML), Data Control Language (DCL), and Transaction Control Language (TCL).

  • DDL commands are used to define the structure of database objects such as CREATE, ALTER, DROP.

  • DML commands are used to manipulate data in the database such as SELECT, INSERT, UPDATE, DELETE.

  • DCL commands are used to control access to data in the database such as GRANT, REVOKE.

  • TCL commands are used to ma...read more

Add your answer

Q61. Implement lag() and lead() without using lag() or lead()

Ans.

Implement lag() and lead() functions without using lag() or lead()

  • To implement lag(), shift the values in the array by one position to the right

  • To implement lead(), shift the values in the array by one position to the left

  • For example, to implement lag() on [1, 2, 3, 4], you can shift the values to get [null, 1, 2, 3]

  • For lead(), you can shift the values to get [2, 3, 4, null]

Add your answer

Q62. Guess the numbers of laptops sold in india every year

Ans.

It is estimated that around 10-12 million laptops are sold in India every year.

  • Approximately 10-12 million laptops are sold in India annually.

  • Sales numbers may vary based on market trends and economic factors.

  • Brands like HP, Dell, Lenovo, and Asus are popular choices among consumers in India.

Add your answer

Q63. Do you have knowledge about KPIs

Ans.

Yes, KPIs are key performance indicators used to measure the success of a product or project.

  • KPIs are specific metrics used to evaluate the performance of a product or project.

  • They help track progress towards goals and objectives.

  • Examples of KPIs include conversion rates, customer satisfaction scores, and revenue growth.

  • KPIs should be aligned with the overall business strategy and objectives.

Add your answer

Q64. how does a typical Agile product work

Ans.

Agile product development involves iterative and incremental development cycles to quickly deliver value to customers.

  • Cross-functional teams work in short iterations called sprints

  • Prioritize features based on customer feedback and business value

  • Regularly review and adapt to changes in requirements

  • Deliver working software frequently, typically every 2-4 weeks

Add your answer

Q65. Difference between Kafka and RabbitMQ ?

Ans.

Kafka is a distributed streaming platform while RabbitMQ is a message broker.

  • Kafka is designed for high-throughput, fault-tolerant, real-time data streaming.

  • RabbitMQ is a traditional message broker that follows the AMQP protocol.

  • Kafka uses a publish-subscribe model while RabbitMQ uses a message queuing model.

  • Kafka is horizontally scalable and provides strong durability guarantees.

  • RabbitMQ supports multiple messaging protocols and has more advanced routing capabilities.

Add your answer

Q66. Difference between Ada boosting and gradient boosting?

Ans.

AdaBoosting and Gradient Boosting are both boosting algorithms, but differ in their approach to assigning weights to misclassified data points.

  • AdaBoosting assigns higher weights to misclassified data points in each iteration, while Gradient Boosting adjusts the weights based on the gradient of the loss function.

  • AdaBoosting is more prone to overfitting, while Gradient Boosting is more robust and can handle noisy data.

  • AdaBoosting is less computationally expensive than Gradient ...read more

Add your answer

Q67. Create a list of decreasing integers along with date

Ans.

List of decreasing integers with dates

  • Create an array of strings with decreasing integers and corresponding dates

  • Start with the highest integer and oldest date, and decrease the integer with each subsequent date

  • Example: ['10 - 2022-01-01', '9 - 2022-01-02', '8 - 2022-01-03', ...]

Add your answer

Q68. Tell me what you know about MasterCards.

Ans.

MasterCards are a type of payment card that can be used to make purchases at various merchants worldwide.

  • MasterCards are issued by financial institutions and can be used to make purchases at millions of merchants worldwide.

  • They offer various benefits such as cashback rewards, travel insurance, and fraud protection.

  • MasterCards come in different types such as credit cards, debit cards, and prepaid cards.

  • Examples of MasterCards include the Mastercard World Elite, Mastercard Blac...read more

Add your answer

Q69. Company fit and expectations of Compensation etc.

Ans.

Company fit is crucial for long-term success. Compensation expectations should align with industry standards and experience.

  • Research the company culture and values to ensure alignment with personal values and work style.

  • Understand the company's expectations for the role and how your skills and experience can meet or exceed them.

  • Discuss compensation openly and transparently, considering industry standards, your experience level, and the value you bring to the company.

  • Negotiate...read more

Add your answer

Q70. Loss functions used in classification algorithms?

Ans.

Loss functions are used to measure the error between predicted and actual values in classification algorithms.

  • Common loss functions include cross-entropy, hinge loss, and squared hinge loss.

  • Cross-entropy is commonly used in logistic regression and neural networks.

  • Hinge loss is used in support vector machines.

  • Squared hinge loss is a variant of hinge loss that penalizes outliers more heavily.

  • The choice of loss function depends on the specific problem and the desired trade-off b...read more

Add your answer

Q71. Design Calendar System

Ans.

Design a calendar system for scheduling events and managing time.

  • Include features like creating events, setting reminders, and viewing schedules.

  • Allow users to set recurring events and customize event details.

  • Implement a user-friendly interface for easy navigation and interaction.

  • Integrate with other applications for seamless data sharing.

  • Consider scalability and performance for handling large amounts of data.

Add your answer

Q72. How do you delete duplicate values

Ans.

To delete duplicate values, use SQL queries with DISTINCT keyword or programming languages like Python with sets.

  • In SQL, use SELECT DISTINCT to retrieve unique values

  • In Python, convert list to set to automatically remove duplicates

  • Use pandas library in Python to drop duplicates in a DataFrame

Add your answer

Q73. How would you copy a large dataset

Ans.

Use a data migration tool to copy the dataset efficiently.

  • Utilize a data migration tool like AWS Data Pipeline, Apache Nifi, or Talend to copy the dataset.

  • Break down the dataset into smaller chunks to avoid overwhelming the system.

  • Ensure proper data validation and error handling during the copying process.

  • Consider using parallel processing to speed up the copying process.

  • Monitor the progress of the dataset copying to track any issues or bottlenecks.

Add your answer

Q74. What is partitioning

Ans.

Partitioning is the process of dividing a large dataset into smaller, more manageable parts.

  • Partitioning helps in parallel processing of data

  • It improves query performance by reducing the amount of data that needs to be scanned

  • Partitioning can be done based on various criteria like range, hash, list, etc.

  • Examples of partitioning include sharding in MongoDB and partitioning in Hadoop Distributed File System (HDFS)

Add your answer

Q75. How would ONDC impact Amazon?

Ans.

ONDC would impact Amazon by increasing competition and potentially leading to lower prices for consumers.

  • ONDC would introduce more competition in the online retail space, forcing Amazon to innovate and improve its services to stay ahead.

  • Amazon may need to lower prices or offer better deals to compete with other online retailers on the ONDC platform.

  • ONDC could also provide Amazon with opportunities to reach new customers and expand its market share.

  • Amazon may need to adjust it...read more

Add your answer

Q76. Cross border analysis of statements.

Ans.

Cross border analysis of statements involves examining financial statements of companies operating in different countries.

  • It helps identify potential risks and opportunities for investment

  • It involves analyzing financial statements of companies operating in different countries

  • Factors such as currency exchange rates, political stability, and regulatory environment are taken into consideration

  • Example: Analyzing the financial statements of a multinational corporation with operati...read more

Add your answer

Q77. Current project

Ans.

Currently working on developing a web application for a healthcare company.

  • Utilizing React.js for front-end development

  • Implementing RESTful APIs using Node.js and Express

  • Working with a PostgreSQL database for data storage

Add your answer

Q78. How do you mitigate risks?

Ans.

I mitigate risks by identifying potential risks, analyzing their impact, and implementing measures to prevent or minimize them.

  • Identify potential risks

  • Analyze the impact of each risk

  • Implement measures to prevent or minimize risks

  • Regularly review and update risk management plan

  • Communicate risks and mitigation strategies to stakeholders

Add your answer

Q79. Why microservices why not monolithic.

Ans.

Microservices offer scalability, flexibility, and resilience compared to monolithic architecture.

  • Microservices allow for independent development and deployment of services.

  • Scalability is easier with microservices as individual components can be scaled independently.

  • Microservices promote fault isolation, preventing a single service failure from bringing down the entire system.

  • Flexibility is increased as different technologies can be used for different services.

  • Microservices en...read more

Add your answer

Q80. Explain Spring MVC structure

Ans.

Spring MVC is a framework for building web applications in Java.

  • Model: Represents the data of the application

  • View: Represents the UI of the application

  • Controller: Handles the user input and updates the model and view accordingly

  • DispatcherServlet: Front controller that receives all incoming requests and routes them to the appropriate handler

  • RequestMapping: Annotation used to map web requests to specific handler methods

Add your answer

Q81. Different ways of CRM?

Ans.

Different ways of CRM include operational, analytical, and collaborative CRM.

  • Operational CRM focuses on automating and improving customer-facing processes such as sales, marketing, and customer service.

  • Analytical CRM uses data analysis to gain insights into customer behavior and preferences, allowing for more targeted marketing and personalized experiences.

  • Collaborative CRM involves integrating customer data across different departments and channels to provide a seamless and ...read more

Add your answer

Q82. Describe the web application architecture.

Ans.

Web application architecture refers to the structure and layout of components in a web application.

  • Web application architecture typically consists of client-side and server-side components.

  • Client-side components include the user interface and any client-side scripts.

  • Server-side components include the server, application logic, and database.

  • Common architectures include MVC (Model-View-Controller) and microservices.

  • Examples of web application architectures include single-page a...read more

Add your answer

Q83. Describe design patterns in Microservice

Ans.

Design patterns in Microservices are reusable solutions to common problems encountered in designing and implementing microservices architecture.

  • Design patterns help in structuring microservices for scalability, resilience, and maintainability.

  • Some common design patterns in microservices include Service Registry, Circuit Breaker, API Gateway, and Event Sourcing.

  • Service Registry pattern involves a central registry that allows services to discover and communicate with each other...read more

Add your answer

Q84. difference between union and union all

Ans.

Union combines and removes duplicates, Union All combines without removing duplicates.

  • Union combines result sets and removes duplicates

  • Union All combines result sets without removing duplicates

  • Union is slower than Union All as it involves removing duplicates

  • Union All is faster than Union as it does not remove duplicates

Add your answer

Q85. What is collection framework

Ans.

Collection framework is a unified architecture for representing and manipulating collections of objects in Java.

  • It provides interfaces (List, Set, Map) and classes (ArrayList, HashSet, HashMap) to store and manipulate groups of objects.

  • Collections framework simplifies the process of storing, retrieving, and manipulating data in Java programs.

  • It allows developers to work with collections of objects in a consistent and efficient manner.

  • Example: ArrayList is a class that impleme...read more

Add your answer

Q86. what is data driven testing

Ans.

Data driven testing is a testing approach where test cases are created based on data from external sources.

  • Test cases are designed based on input data and expected output data

  • Allows for testing multiple scenarios with different data sets

  • Reduces the need for manual intervention in test case creation and execution

Add your answer

Q87. what is problem management

Ans.

Problem management is the process of identifying, analyzing, and resolving recurring issues to minimize their impact on the system.

  • Problem management aims to prevent incidents from occurring by addressing their root causes.

  • It involves documenting and tracking problems, analyzing their patterns, and implementing corrective actions.

  • Examples of problem management activities include trend analysis, root cause analysis, and implementing preventive measures.

  • It helps improve system ...read more

Add your answer

Q88. Financial analysis methods

Ans.

Financial analysis methods include ratio analysis, trend analysis, and cash flow analysis.

  • Ratio analysis involves comparing financial ratios to industry benchmarks or historical data.

  • Trend analysis looks at changes in financial data over time to identify patterns and potential future outcomes.

  • Cash flow analysis examines the inflows and outflows of cash to determine a company's liquidity and ability to meet financial obligations.

Add your answer

Q89. Micro service design patterns

Ans.

Micro service design patterns are architectural patterns used to design and implement microservices.

  • Service discovery

  • Circuit breaker

  • API gateway

  • Event sourcing

  • Saga pattern

Add your answer

Q90. architecture of current project

Ans.

The architecture of the current project follows a microservices design pattern with separate services for different functionalities.

  • Utilizes RESTful APIs for communication between services

  • Uses Docker containers for deployment and scalability

  • Implements service discovery and load balancing with tools like Eureka or Consul

Add your answer

Q91. What is money laundering

Ans.

Money laundering is the illegal process of making large amounts of money generated by a criminal activity, such as drug trafficking or terrorist funding, appear to have come from a legitimate source.

  • Money laundering involves disguising the origins of illegally obtained money by passing it through a complex sequence of banking transfers or commercial transactions.

  • It is often done to make the money appear as if it was earned legally and to avoid detection by authorities.

  • Money l...read more

Add your answer

Q92. What is mastercard

Ans.

Mastercard is a global payment technology company that provides secure and convenient payment solutions.

  • Global payment technology company

  • Provides secure and convenient payment solutions

  • Accepted by millions of merchants worldwide

Add your answer

Q93. importance of education

Ans.

Education is important for personal and professional growth.

  • Education provides knowledge and skills necessary for job performance.

  • It helps in developing critical thinking and problem-solving abilities.

  • Education also enhances communication and interpersonal skills.

  • It opens up opportunities for career advancement and higher salaries.

  • Education contributes to personal growth and self-awareness.

  • Examples: learning new cleaning techniques, safety procedures, and customer service ski...read more

Add your answer
Asked in
SDE Interview

Q94. E mail classifier using ML

Ans.

Email classifier using ML

  • Use supervised learning algorithms like Naive Bayes or Support Vector Machines

  • Preprocess email data by tokenizing, removing stop words, and stemming

  • Split data into training and testing sets for model evaluation

  • Evaluate model performance using metrics like accuracy, precision, recall, and F1 score

Add your answer

Q95. Explain SOLID principle

Ans.

SOLID is a set of five design principles to make software designs more understandable, flexible, and maintainable.

  • S - Single Responsibility Principle: A class should have only one reason to change.

  • O - Open/Closed Principle: Software entities should be open for extension but closed for modification.

  • L - Liskov Substitution Principle: Objects of a superclass should be replaceable with objects of its subclasses without affecting the program's correctness.

  • I - Interface Segregation...read more

Add your answer

Q96. Memory Allocation in Java

Ans.

Memory allocation in Java is managed by the JVM using the heap and stack memory areas.

  • Java uses the heap memory for storing objects and the stack memory for storing method calls and local variables.

  • Memory allocation in Java is automatic and managed by the garbage collector.

  • Java provides the 'new' keyword to allocate memory for objects on the heap.

  • Primitive data types are stored on the stack, while objects are stored on the heap.

Add your answer
Asked in
SDE Interview

Q97. Different scopes of a bean

Ans.

The different scopes of a bean in software development.

  • Singleton: A single instance of the bean is created and shared across the application.

  • Prototype: A new instance of the bean is created every time it is requested.

  • Request: A new instance of the bean is created for each HTTP request.

  • Session: A new instance of the bean is created for each user session.

  • Global session: A new instance of the bean is created for each global HTTP session.

Add your answer
Ans.

Spring is a powerful and lightweight framework for building Java applications.

  • Spring provides comprehensive infrastructure support for developing Java applications.

  • It promotes good design practices such as dependency injection and aspect-oriented programming.

  • Spring Boot simplifies the setup and configuration of Spring applications.

  • Spring MVC is a popular module for building web applications.

  • Spring Data JPA simplifies data access with JPA.

  • Spring Security provides authenticatio...read more

Add your answer
Ans.

Java 8 introduced new features like lambda expressions, streams, and functional interfaces.

  • Lambda expressions allow for more concise code and easier parallel programming.

  • Streams provide a way to work with collections in a functional style.

  • Functional interfaces can have only one abstract method and are used for lambda expressions.

  • Optional class helps to avoid NullPointerExceptions.

  • Default methods allow interfaces to have method implementations.

  • Method references provide a way t...read more

Add your answer

Q100. To test culture fir

Ans.

Testing culture fit is essential for successful consultant-client relationships.

  • Conducting behavioral interviews to assess values and work style

  • Observing how the candidate interacts with team members and clients

  • Reviewing past experiences and projects to gauge alignment with company culture

Add your answer
1
2
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos

Interview Process at Asp Management

based on 67 interviews in the last 1 year
Interview experience
3.7
Good
View more
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Interview Questions from Similar Companies

3.8
 • 399 Interview Questions
3.6
 • 173 Interview Questions
3.6
 • 170 Interview Questions
4.3
 • 156 Interview Questions
3.8
 • 140 Interview Questions
3.3
 • 138 Interview Questions
View all
Top MasterCard Interview Questions And Answers
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
70 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions
Get AmbitionBox app

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter