MasterCard
100+ Panchayat Samiti Interview Questions and Answers
You have been given a string ‘A’ consisting of lower case English letters. Your task is to find the length of the longest palindromic subsequence in ‘A’.
A subsequence is a sequen...read more
You have been given two strings 'S' and ‘T’. Your task is to find if ‘S’ follows the same pattern as ‘T’.
Here follow means a full match, i.e. there is a bijection between a letter of ‘T’ and a non-...read more
You are given a string 'S'. Your task is to check whether the string is palindrome or not. For checking palindrome, consider alphabets and numbers only and ignore the symbols ...read more
The task is to check whether a given string is a palindrome or not, considering only alphabets and numbers and ignoring symbols and whitespaces.
Convert the string to lowercase and remove all symbols and whitespaces.
Reverse the modified string and compare it with the original string.
If they are equal, then the string is a palindrome.
If not, then the string is not a palindrome.
Given an array of numbers, find the maximum sum of any contiguous subarray of the array.
For example, given the array [34, -50, 42, 14, -5, 86], the maximum sum would be 137, since we would ...read more
The maximum sum of any contiguous subarray in an array is found using Kadane's algorithm in O(N) time.
Initialize two variables, maxSum and currentSum, both set to the first element of the array.
Iterate through the array from the second element.
For each element, update currentSum by adding the element to it.
If currentSum becomes negative, reset it to 0.
If currentSum is greater than maxSum, update maxSum.
After iterating through the array, maxSum will contain the maximum subarra...read more
You are given a positive integer 'N’. Your task is to find and return the minimum number of steps that 'N' has to take to get reduced to 1.
You can perform any one of the following 3 st...read more
The task is to find the minimum number of steps required to reduce a positive integer to 1 using three given operations.
Use dynamic programming to solve the problem efficiently.
Create an array to store the minimum steps required for each number from 1 to N.
Iterate from 2 to N and calculate the minimum steps for each number based on the three operations.
Return the minimum steps for N.
You have been given a Binary Tree of integers. You are supposed to return the level order traversal of the given tree.
For example:
For the given binary tree
The level order traversal wil...read more
Ninjas are often known for their superhuman strength and valour. In a given set of linked ninja villages of different clans, their strongest ninjas want to know whether there exi...read more
Given a number N, find its square root. You need to find and print only the integral part of square root of N.
For eg. if number given is 18, answer is 4.
Input format :
Integer N
Output ...read more
The task is to find the integral part of the square root of a given number.
Use the built-in square root function to find the square root of the number.
Convert the result to an integer by rounding down or using the floor function.
Print the integer part of the square root as the output.
What is the difference between MongoDB and MySQL?
If you remove an object attribute, is it deleted from the database?
Why is Node.js Single-threaded?
What is piping in Node.js?
What is reconcili...read more
SQL queries (basic, nested, and the on containing where,having,group by,order by, like, etc..)
SQL Joins, and which is the fastest?
DDL vs DML
The question is about SQL queries, SQL joins, and the difference between DDL and DML.
SQL queries can be basic or nested and can involve various clauses like WHERE, HAVING, GROUP BY, ORDER BY, LIKE, etc.
SQL joins are used to combine rows from different tables based on a related column between them.
The fastest join depends on the specific scenario and the data involved.
DDL (Data Definition Language) is used to define and modify the structure of database objects, while DML (Data...read more
Q11. If you are going to open an e-commerce website like Flipkart what will be the things that you will have to keep in mind.
To open an e-commerce website like Flipkart, one must keep in mind various factors such as target audience, product range, user experience, logistics, and marketing.
Identify the target audience and their preferences
Offer a wide range of products to cater to different needs
Ensure a seamless user experience with easy navigation and quick loading time
Establish a robust logistics network for timely delivery and hassle-free returns
Invest in effective marketing strategies to reach ...read more
Q12. Java program to find sum and multplication of int inp ex: 123 return sum and addition
Java program to find sum and multiplication of an integer input.
Use the modulus operator to extract each digit from the input integer.
Add the extracted digits to calculate the sum.
Multiply the extracted digits to calculate the multiplication.
Q13. Write java stream to find output JSON object is input contains State and filters ....> outout shoudl be resultant of both
Java stream to filter JSON object by State and other filters
Use Java Stream API to filter JSON objects based on State and other filters
Create a Predicate to filter the JSON objects based on the given filters
Use the filter() method of Stream to apply the Predicate on the JSON objects
Collect the filtered JSON objects using the collect() method of Stream
Q14. 3. How do you deal with senior customer when you don't have enough data?
Communicate transparently and offer alternative solutions.
Explain the limitations of the available data and the potential risks of making decisions based on incomplete information.
Offer alternative solutions that can be implemented with the available data.
Collaborate with the customer to identify additional data sources or explore other options to gather more data.
Provide regular updates on the progress of data collection and analysis.
Ensure that all decisions are based on so...read more
What do you know about mastercard?
Are you free to relocate after lockdown ends?
What are the benefits of a multiprocessor system?
Explain demand paging?
What is virtual memory?
deadlock
Benefits of multiprocessor system, demand paging, virtual memory, and deadlock explained.
Benefits of a multiprocessor system include increased processing power, improved performance, and better resource utilization.
Demand paging is a memory management technique where pages are loaded into memory only when they are needed.
Virtual memory is a memory management technique that allows the execution of processes that are larger than the available physical memory.
Deadlock is a situa...read more
Q17. What if your application is down for 1 hour in one site in prod?
I would investigate the root cause, work on fixing the issue, and implement measures to prevent it from happening again.
Investigate the root cause of the downtime, such as network issues, server failures, or software bugs
Work on fixing the issue promptly to minimize impact on users and business operations
Implement measures to prevent similar downtime in the future, such as redundancy, monitoring, and failover mechanisms
Q18. How do you make sure a throttling system process dropped messages from a slow downstream service?
Implement a throttling system to handle dropped messages from a slow downstream service.
Implement a queue to store messages from the downstream service.
Set a maximum queue size and drop messages when the queue is full.
Use a timestamp to track when messages were received and process them in order.
Implement a retry mechanism to reprocess dropped messages after a certain time.
Monitor the queue size and processing speed to adjust throttling parameters as needed.
Q19. Guesstimate the number of people travelling by local metro in mumbai
The number of people travelling by local metro in Mumbai is estimated to be in millions.
Mumbai has a population of over 20 million people.
The local metro is a popular mode of transportation in Mumbai.
During peak hours, the metro trains are usually crowded.
The metro network in Mumbai is extensive, covering various parts of the city.
The number of daily commuters on the metro can be estimated based on population density and transportation preferences.
Q20. 1. Brief your existing/last Project architecture ? 2. Design patterns used in microservice architecture ?(Since my last project was microservices) 3. What is saga pattern? 4. 2 Scenario based question - Data lo...
read moreAnswering questions related to microservice architecture, design patterns, Kafka cluster data loss prevention, and monitoring/recovery in Appdynamics.
My last project architecture was based on microservices, utilizing design patterns such as Circuit Breaker, Service Registry, and API Gateway.
Saga pattern is used in microservices to manage distributed transactions across multiple services.
In the event of data loss in a Kafka cluster, it is important to have proper replication a...read more
Q21. 1. How to choose optimum probability threshold from ROC?
To choose optimum probability threshold from ROC, we need to balance between sensitivity and specificity.
Choose the threshold that maximizes the sum of sensitivity and specificity
Use Youden's J statistic to find the optimal threshold
Consider the cost of false positives and false negatives
Use cross-validation to evaluate the performance of different thresholds
Q22. Reliance fresh wants to open a store in north-eastern part of India. Should it or should it not?
Yes, Reliance Fresh should open a store in the north-eastern part of India.
The north-eastern part of India has a growing population and increasing consumer demand.
Reliance Fresh can tap into the untapped market potential in the region.
Opening a store in the north-eastern part of India can help Reliance Fresh expand its presence and increase its market share.
Reliance Fresh can leverage its existing supply chain and distribution network to efficiently serve customers in the reg...read more
Q23. How many feature you have added to your application by providing inputs through user stories as long as Agile frameworks is concerned?
I have added 50 features through user stories in Agile framework.
I have been working on Agile framework for 2 years.
I have added features like user login, payment gateway integration, and search functionality.
I prioritize user stories based on business value and impact.
I collaborate with the development team to ensure the features are implemented correctly.
I continuously gather feedback from users to improve the application.
Q24. 2. How to test time series trend break up?
To test time series trend break up, statistical tests like Augmented Dickey-Fuller test can be used.
Augmented Dickey-Fuller test can be used to check if a time series is stationary or not.
If the time series is not stationary, we can use differencing to make it stationary.
After differencing, we can again perform the Augmented Dickey-Fuller test to check for stationarity.
If there is a significant change in the mean or variance of the time series, we can use change point detecti...read more
Q25. Revenue collected by the barbers of Kanpur in an year
I don't have the available data to answer this question.
Need data on number of barbers in Kanpur
Need data on average revenue per barber
Need data on number of working days in a year
Need data on number of customers per barber per day
Q26. What do you know about our Market Development Role?
Market Development Role involves identifying and pursuing new business opportunities to expand the company's market share.
Market Development Role focuses on identifying new markets and customer segments
It involves conducting market research and analysis to understand customer needs and preferences
The role also involves developing marketing strategies and campaigns to target new customers
Examples of Market Development initiatives include launching new products, entering new ge...read more
Q27. The company wants to launch a premium credit card. How would you strategise to target the right customer segment? Complete thought process around the case was asked.
To target the right customer segment for a premium credit card, I would analyze customer data, conduct market research, and create targeted marketing campaigns.
Conduct market research to identify potential customer segments who are likely to be interested in a premium credit card.
Analyze existing customer data to understand spending habits, income levels, and credit history to identify potential target segments.
Create targeted marketing campaigns that highlight the benefits a...read more
Q28. What is difference between Interface and abstract class?
Interface is a contract that defines the methods a class must implement, while abstract class can have both abstract and concrete methods.
Interface cannot have any implementation, while abstract class can have both abstract and concrete methods.
A class can implement multiple interfaces but can only inherit from one abstract class.
Interfaces are used to achieve multiple inheritance in Java, while abstract classes are used to provide a common base for subclasses.
Interfaces are ...read more
Q29. What are the usecases where CQRS pattern can be used ?
CQRS pattern can be used in scenarios where read and write operations need to be separated for better scalability and performance.
CQRS can be used in applications with complex domain models that require different models for reading and writing data.
It can be beneficial in scenarios where read operations heavily outnumber write operations.
CQRS is useful when there is a need to optimize read and write operations independently.
Examples include e-commerce platforms for handling p...read more
Q30. How will you resolve eventual consistency in a relational DB from design perspective ?
Implementing eventual consistency in a relational DB involves careful design and use of techniques like conflict resolution and versioning.
Use timestamp-based conflict resolution to handle conflicting updates.
Implement versioning to track changes and resolve conflicts.
Consider using distributed transactions or distributed consensus algorithms like Paxos or Raft.
Use compensating transactions to rollback changes in case of conflicts.
Implement retry mechanisms to handle temporar...read more
Q31. Types of financial statements and how to analyse financial statements and furure projections.
Financial statements include balance sheet, income statement, and cash flow statement. Analysis involves ratio analysis and trend analysis.
Balance sheet shows assets, liabilities, and equity at a specific point in time
Income statement shows revenue, expenses, and profit/loss over a period of time
Cash flow statement shows cash inflows and outflows over a period of time
Ratio analysis involves comparing financial ratios to industry benchmarks or historical data
Trend analysis inv...read more
Q32. How to pass input field values from form to db. How to make code testable/loosely coupled.
Pass input field values from form to db by using a data access layer and dependency injection for testability.
Create a data access layer to handle interactions with the database.
Use parameterized queries to prevent SQL injection.
Implement dependency injection to decouple the code and make it testable.
Mock the data access layer in unit tests to isolate database interactions.
Use interfaces to define contracts between components for easier testing.
Q33. There are 25 horses among which you need to find fastest 3. You don't have a timer and a race can be among maximum 5 horses. Find minimum number of races required.
Minimum 7 races are required to find the fastest 3 horses.
Divide the 25 horses into 5 groups of 5 horses each.
Conduct a race among each group, identifying the fastest horse in each race.
Take the top 3 horses from each race and conduct a final race among them.
The top 3 horses in the final race will be the fastest 3 horses overall.
Q34. What are the ways to secure REST API?
Securing REST API involves using authentication, authorization, encryption, and input validation.
Use authentication methods like OAuth, JWT, or API keys to verify the identity of clients.
Implement authorization to control access to resources based on user roles and permissions.
Encrypt data transmission using HTTPS to protect sensitive information from being intercepted.
Validate and sanitize input data to prevent injection attacks like SQL injection or XSS.
Q35. Any example where you introduced a change in the process?
Yes
Introduced a change in the development process to implement continuous integration
Implemented a new code review process to improve code quality
Introduced automated testing to catch bugs early in the development cycle
Q36. What are risks? Can you elaborate different types of risks?
Risks are potential events that can cause harm or loss. There are various types of risks.
Financial risk - loss of money or assets
Operational risk - failure of processes, systems or people
Reputational risk - damage to brand or image
Legal risk - violation of laws or regulations
Strategic risk - failure to meet business objectives
Physical risk - harm to people or property
Cybersecurity risk - data breaches or cyber attacks
Q37. If the 3rd position in a string contains 'b' replace it with 'v'
Replace 'b' with 'v' in the 3rd position of each string in an array
Iterate through each string in the array
Check if the 3rd position contains 'b'
If yes, replace 'b' with 'v'
Q38. How to maintain security in Microservices ?
Maintaining security in Microservices involves implementing authentication, authorization, encryption, and monitoring.
Implement authentication and authorization mechanisms to control access to microservices.
Use encryption to secure communication between microservices.
Implement monitoring and logging to detect and respond to security incidents.
Regularly update dependencies and patches to address security vulnerabilities.
Implement rate limiting and throttling to prevent abuse a...read more
Q39. Customerz who have done transaction in more than 10 consecutive days
To identify customers who have made transactions on more than 10 consecutive days.
Identify customers who have made transactions every day for at least 10 days in a row.
Check transaction history for each customer to determine consecutive days of transactions.
Create a list of customers who meet the criteria.
Consider using SQL queries or data visualization tools to analyze the data.
Example: Customer A made transactions on days 1-10 consecutively, while Customer B only made trans...read more
Q40. Find sub sudoko in given multi dimensional int. array
Finding sub sudoko in a multi-dimensional integer array.
Iterate through each row and column to find sub-sudoku
Check if each sub-grid contains all numbers from 1 to 9
If yes, then it is a sub-sudoku
If no, then move to the next sub-grid
Q41. Parent child component communication in react?
Parent child component communication in React involves passing data from parent to child components and triggering events from child to parent components.
Use props to pass data from parent to child components
Use callback functions to trigger events from child to parent components
Context API can be used for passing data to deeply nested components
Q42. What are SSL certificates?
SSL certificates are digital certificates that authenticate the identity of a website and encrypt information sent to the server.
SSL certificates ensure secure communication between a user's browser and a website's server.
They use encryption to protect sensitive data such as login credentials, credit card information, etc.
SSL certificates are issued by Certificate Authorities (CAs) and contain information about the website's owner and the CA's digital signature.
Examples of SS...read more
Q43. Detailed flow from FE to BE to db.
The flow of data from the front end to the back end to the database.
Front end sends a request to the back end server.
Back end processes the request and interacts with the database.
Database retrieves or updates the data and sends it back to the back end.
Back end sends the response to the front end for display.
Q44. Can abstract class instantiated?
No, abstract classes cannot be instantiated.
Abstract classes are meant to be inherited and extended by other classes.
Attempting to instantiate an abstract class will result in a compilation error.
Abstract classes can have abstract methods that must be implemented by the subclass.
Q45. How to optimize react application?
Optimizing a React application involves code splitting, lazy loading, minimizing bundle size, using memoization, and optimizing render performance.
Implement code splitting to load only necessary code for each route or component.
Utilize lazy loading to defer loading of non-essential components until they are needed.
Minimize bundle size by removing unused code, optimizing images, and using tree shaking.
Use memoization techniques like useMemo and useCallback to avoid unnecessary...read more
Q46. What is useRef, useMemo, useCallback?
useRef is used to persist a value across renders, useMemo is used to memoize expensive calculations, useCallback is used to memoize functions.
useRef is commonly used to access DOM elements or persist values between renders.
useMemo is used to memoize expensive calculations to avoid re-computation.
useCallback is used to memoize functions to prevent unnecessary re-renders.
Example: useRef can be used to store a reference to an input element in a form.
Example: useMemo can be used ...read more
Q47. How will you create a new wallet from scratch today?
To create a new wallet from scratch, I would start by researching the latest technologies and security measures, then design a user-friendly interface, develop the backend infrastructure, and conduct thorough testing before launching.
Research the latest technologies and security measures for wallet development
Design a user-friendly interface for easy navigation and accessibility
Develop the backend infrastructure to securely store and manage user data
Conduct thorough testing t...read more
Q48. What is the difference between web service and REST API?
Web service is a generic term for any service available over the internet, while REST API is a specific type of web service that follows REST architectural principles.
Web service is a broad term that encompasses any service available over the internet, including SOAP, REST, and others.
REST API is a specific type of web service that follows the principles of Representational State Transfer (REST).
REST APIs use standard HTTP methods like GET, POST, PUT, DELETE to perform CRUD o...read more
Q49. Routing how to use proxy
Routing through a proxy involves configuring the proxy server to forward requests to the destination server.
Configure the proxy server to listen for incoming requests
Configure the proxy server to forward requests to the destination server
Configure the client to use the proxy server for outgoing requests
Use a proxy server to bypass network restrictions or improve performance
Examples: Nginx, Apache, Squid
Q50. What is app.use in .net core?
app.use in .NET Core is used to add middleware to the request pipeline.
app.use is a method used in ASP.NET Core to add middleware components to the request pipeline.
Middleware components are software components that are executed in the request pipeline to handle requests and responses.
Middleware components can perform tasks such as authentication, logging, error handling, and more.
Example: app.use(new MiddlewareComponent());
Q51. How will you go about optimising a query?
Optimising a query involves identifying bottlenecks and improving efficiency.
Identify slow-performing queries using tools like query execution plans.
Optimize database indexes to speed up query performance.
Limit the number of columns and rows returned in the query.
Avoid using SELECT * and instead specify only the necessary columns.
Use appropriate data types and avoid unnecessary data conversions.
Consider denormalizing data for frequently accessed queries.
Use query hints or opt...read more
Q52. Explain spring security,oauth2 ,jwt,saml and tls level security
Spring Security is a framework that provides authentication, authorization, and other security features for Java applications.
OAuth2 is an authorization framework that allows third-party applications to access a user's resources without sharing their credentials.
JWT (JSON Web Token) is a compact, URL-safe means of representing claims to be transferred between two parties.
SAML (Security Assertion Markup Language) is an XML-based standard for exchanging authentication and autho...read more
Q53. What do you know about financial inclusion?
Financial inclusion refers to the availability and accessibility of financial services to all individuals and businesses, regardless of their income level or location.
Financial inclusion aims to promote economic growth and reduce poverty by providing access to financial services such as banking, insurance, and credit.
It is particularly important for individuals and businesses in developing countries, rural areas, and low-income communities who may not have access to tradition...read more
Q54. Java code to find numbe of repeated characters in String
Java code to find number of repeated characters in a String.
Create a HashMap to store characters and their counts.
Iterate through the String and update the counts in the HashMap.
Count the characters with counts greater than 1 to find repeated characters.
Q55. SQL code to fetch second highest salary
SQL query to fetch second highest salary
Use ORDER BY and LIMIT to get the second highest salary
SELECT DISTINCT to avoid duplicates
Use subquery to avoid hardcoding the salary value
Q56. Delete rows from table that are 6 months old from current date
Use SQL query with WHERE clause to delete rows older than 6 months from current date
Use CURRENT_DATE() function to get current date
Use DATE_SUB() function to subtract 6 months from current date
Write a DELETE query with WHERE clause to delete rows older than calculated date
Q57. What is dependency injection?
Dependency injection is a design pattern in which components are given their dependencies rather than creating them internally.
Dependency injection helps in achieving loose coupling between classes.
It allows for easier testing by mocking dependencies.
There are three types of dependency injection: constructor injection, setter injection, and interface injection.
Example: Instead of a class creating an instance of another class it needs, the instance is provided to it through co...read more
Q58. Processing semi structured data
Processing semi structured data involves extracting and organizing information from data that does not fit neatly into a traditional database structure.
Use tools like Apache Spark or Hadoop for processing semi structured data
Utilize techniques like data parsing, data cleaning, and data transformation
Consider using NoSQL databases like MongoDB for storing semi structured data
Examples include processing JSON, XML, or log files
Q59. Do you think data analysis job is overrated?
No, data analysis job is not overrated as it plays a crucial role in decision-making and problem-solving.
Data analysis helps in identifying trends and patterns in data
It provides valuable insights for businesses to make informed decisions
Data analysis is essential for optimizing processes and improving efficiency
It can uncover hidden opportunities and potential risks
Many industries rely on data analysis for strategic planning and forecasting
Q60. what are the different types of commands in sql
Different types of commands in SQL include Data Definition Language (DDL), Data Manipulation Language (DML), Data Control Language (DCL), and Transaction Control Language (TCL).
DDL commands are used to define the structure of database objects such as CREATE, ALTER, DROP.
DML commands are used to manipulate data in the database such as SELECT, INSERT, UPDATE, DELETE.
DCL commands are used to control access to data in the database such as GRANT, REVOKE.
TCL commands are used to ma...read more
Q61. Implement lag() and lead() without using lag() or lead()
Implement lag() and lead() functions without using lag() or lead()
To implement lag(), shift the values in the array by one position to the right
To implement lead(), shift the values in the array by one position to the left
For example, to implement lag() on [1, 2, 3, 4], you can shift the values to get [null, 1, 2, 3]
For lead(), you can shift the values to get [2, 3, 4, null]
Q62. Guess the numbers of laptops sold in india every year
It is estimated that around 10-12 million laptops are sold in India every year.
Approximately 10-12 million laptops are sold in India annually.
Sales numbers may vary based on market trends and economic factors.
Brands like HP, Dell, Lenovo, and Asus are popular choices among consumers in India.
Q63. Do you have knowledge about KPIs
Yes, KPIs are key performance indicators used to measure the success of a product or project.
KPIs are specific metrics used to evaluate the performance of a product or project.
They help track progress towards goals and objectives.
Examples of KPIs include conversion rates, customer satisfaction scores, and revenue growth.
KPIs should be aligned with the overall business strategy and objectives.
Q64. how does a typical Agile product work
Agile product development involves iterative and incremental development cycles to quickly deliver value to customers.
Cross-functional teams work in short iterations called sprints
Prioritize features based on customer feedback and business value
Regularly review and adapt to changes in requirements
Deliver working software frequently, typically every 2-4 weeks
Q65. Difference between Kafka and RabbitMQ ?
Kafka is a distributed streaming platform while RabbitMQ is a message broker.
Kafka is designed for high-throughput, fault-tolerant, real-time data streaming.
RabbitMQ is a traditional message broker that follows the AMQP protocol.
Kafka uses a publish-subscribe model while RabbitMQ uses a message queuing model.
Kafka is horizontally scalable and provides strong durability guarantees.
RabbitMQ supports multiple messaging protocols and has more advanced routing capabilities.
Q66. Difference between Ada boosting and gradient boosting?
AdaBoosting and Gradient Boosting are both boosting algorithms, but differ in their approach to assigning weights to misclassified data points.
AdaBoosting assigns higher weights to misclassified data points in each iteration, while Gradient Boosting adjusts the weights based on the gradient of the loss function.
AdaBoosting is more prone to overfitting, while Gradient Boosting is more robust and can handle noisy data.
AdaBoosting is less computationally expensive than Gradient ...read more
Q67. Create a list of decreasing integers along with date
List of decreasing integers with dates
Create an array of strings with decreasing integers and corresponding dates
Start with the highest integer and oldest date, and decrease the integer with each subsequent date
Example: ['10 - 2022-01-01', '9 - 2022-01-02', '8 - 2022-01-03', ...]
Q68. Tell me what you know about MasterCards.
MasterCards are a type of payment card that can be used to make purchases at various merchants worldwide.
MasterCards are issued by financial institutions and can be used to make purchases at millions of merchants worldwide.
They offer various benefits such as cashback rewards, travel insurance, and fraud protection.
MasterCards come in different types such as credit cards, debit cards, and prepaid cards.
Examples of MasterCards include the Mastercard World Elite, Mastercard Blac...read more
Q69. Company fit and expectations of Compensation etc.
Company fit is crucial for long-term success. Compensation expectations should align with industry standards and experience.
Research the company culture and values to ensure alignment with personal values and work style.
Understand the company's expectations for the role and how your skills and experience can meet or exceed them.
Discuss compensation openly and transparently, considering industry standards, your experience level, and the value you bring to the company.
Negotiate...read more
Q70. Loss functions used in classification algorithms?
Loss functions are used to measure the error between predicted and actual values in classification algorithms.
Common loss functions include cross-entropy, hinge loss, and squared hinge loss.
Cross-entropy is commonly used in logistic regression and neural networks.
Hinge loss is used in support vector machines.
Squared hinge loss is a variant of hinge loss that penalizes outliers more heavily.
The choice of loss function depends on the specific problem and the desired trade-off b...read more
Q71. Design Calendar System
Design a calendar system for scheduling events and managing time.
Include features like creating events, setting reminders, and viewing schedules.
Allow users to set recurring events and customize event details.
Implement a user-friendly interface for easy navigation and interaction.
Integrate with other applications for seamless data sharing.
Consider scalability and performance for handling large amounts of data.
Q72. How do you delete duplicate values
To delete duplicate values, use SQL queries with DISTINCT keyword or programming languages like Python with sets.
In SQL, use SELECT DISTINCT to retrieve unique values
In Python, convert list to set to automatically remove duplicates
Use pandas library in Python to drop duplicates in a DataFrame
Q73. How would you copy a large dataset
Use a data migration tool to copy the dataset efficiently.
Utilize a data migration tool like AWS Data Pipeline, Apache Nifi, or Talend to copy the dataset.
Break down the dataset into smaller chunks to avoid overwhelming the system.
Ensure proper data validation and error handling during the copying process.
Consider using parallel processing to speed up the copying process.
Monitor the progress of the dataset copying to track any issues or bottlenecks.
Q74. What is partitioning
Partitioning is the process of dividing a large dataset into smaller, more manageable parts.
Partitioning helps in parallel processing of data
It improves query performance by reducing the amount of data that needs to be scanned
Partitioning can be done based on various criteria like range, hash, list, etc.
Examples of partitioning include sharding in MongoDB and partitioning in Hadoop Distributed File System (HDFS)
Q75. How would ONDC impact Amazon?
ONDC would impact Amazon by increasing competition and potentially leading to lower prices for consumers.
ONDC would introduce more competition in the online retail space, forcing Amazon to innovate and improve its services to stay ahead.
Amazon may need to lower prices or offer better deals to compete with other online retailers on the ONDC platform.
ONDC could also provide Amazon with opportunities to reach new customers and expand its market share.
Amazon may need to adjust it...read more
Q76. Cross border analysis of statements.
Cross border analysis of statements involves examining financial statements of companies operating in different countries.
It helps identify potential risks and opportunities for investment
It involves analyzing financial statements of companies operating in different countries
Factors such as currency exchange rates, political stability, and regulatory environment are taken into consideration
Example: Analyzing the financial statements of a multinational corporation with operati...read more
Q77. Current project
Currently working on developing a web application for a healthcare company.
Utilizing React.js for front-end development
Implementing RESTful APIs using Node.js and Express
Working with a PostgreSQL database for data storage
Q78. How do you mitigate risks?
I mitigate risks by identifying potential risks, analyzing their impact, and implementing measures to prevent or minimize them.
Identify potential risks
Analyze the impact of each risk
Implement measures to prevent or minimize risks
Regularly review and update risk management plan
Communicate risks and mitigation strategies to stakeholders
Q79. Why microservices why not monolithic.
Microservices offer scalability, flexibility, and resilience compared to monolithic architecture.
Microservices allow for independent development and deployment of services.
Scalability is easier with microservices as individual components can be scaled independently.
Microservices promote fault isolation, preventing a single service failure from bringing down the entire system.
Flexibility is increased as different technologies can be used for different services.
Microservices en...read more
Q80. Explain Spring MVC structure
Spring MVC is a framework for building web applications in Java.
Model: Represents the data of the application
View: Represents the UI of the application
Controller: Handles the user input and updates the model and view accordingly
DispatcherServlet: Front controller that receives all incoming requests and routes them to the appropriate handler
RequestMapping: Annotation used to map web requests to specific handler methods
Q81. Different ways of CRM?
Different ways of CRM include operational, analytical, and collaborative CRM.
Operational CRM focuses on automating and improving customer-facing processes such as sales, marketing, and customer service.
Analytical CRM uses data analysis to gain insights into customer behavior and preferences, allowing for more targeted marketing and personalized experiences.
Collaborative CRM involves integrating customer data across different departments and channels to provide a seamless and ...read more
Q82. Describe the web application architecture.
Web application architecture refers to the structure and layout of components in a web application.
Web application architecture typically consists of client-side and server-side components.
Client-side components include the user interface and any client-side scripts.
Server-side components include the server, application logic, and database.
Common architectures include MVC (Model-View-Controller) and microservices.
Examples of web application architectures include single-page a...read more
Q83. Describe design patterns in Microservice
Design patterns in Microservices are reusable solutions to common problems encountered in designing and implementing microservices architecture.
Design patterns help in structuring microservices for scalability, resilience, and maintainability.
Some common design patterns in microservices include Service Registry, Circuit Breaker, API Gateway, and Event Sourcing.
Service Registry pattern involves a central registry that allows services to discover and communicate with each other...read more
Q84. difference between union and union all
Union combines and removes duplicates, Union All combines without removing duplicates.
Union combines result sets and removes duplicates
Union All combines result sets without removing duplicates
Union is slower than Union All as it involves removing duplicates
Union All is faster than Union as it does not remove duplicates
Q85. What is collection framework
Collection framework is a unified architecture for representing and manipulating collections of objects in Java.
It provides interfaces (List, Set, Map) and classes (ArrayList, HashSet, HashMap) to store and manipulate groups of objects.
Collections framework simplifies the process of storing, retrieving, and manipulating data in Java programs.
It allows developers to work with collections of objects in a consistent and efficient manner.
Example: ArrayList is a class that impleme...read more
Q86. what is data driven testing
Data driven testing is a testing approach where test cases are created based on data from external sources.
Test cases are designed based on input data and expected output data
Allows for testing multiple scenarios with different data sets
Reduces the need for manual intervention in test case creation and execution
Q87. what is problem management
Problem management is the process of identifying, analyzing, and resolving recurring issues to minimize their impact on the system.
Problem management aims to prevent incidents from occurring by addressing their root causes.
It involves documenting and tracking problems, analyzing their patterns, and implementing corrective actions.
Examples of problem management activities include trend analysis, root cause analysis, and implementing preventive measures.
It helps improve system ...read more
Q88. Financial analysis methods
Financial analysis methods include ratio analysis, trend analysis, and cash flow analysis.
Ratio analysis involves comparing financial ratios to industry benchmarks or historical data.
Trend analysis looks at changes in financial data over time to identify patterns and potential future outcomes.
Cash flow analysis examines the inflows and outflows of cash to determine a company's liquidity and ability to meet financial obligations.
Q89. Micro service design patterns
Micro service design patterns are architectural patterns used to design and implement microservices.
Service discovery
Circuit breaker
API gateway
Event sourcing
Saga pattern
Q90. architecture of current project
The architecture of the current project follows a microservices design pattern with separate services for different functionalities.
Utilizes RESTful APIs for communication between services
Uses Docker containers for deployment and scalability
Implements service discovery and load balancing with tools like Eureka or Consul
Q91. What is money laundering
Money laundering is the illegal process of making large amounts of money generated by a criminal activity, such as drug trafficking or terrorist funding, appear to have come from a legitimate source.
Money laundering involves disguising the origins of illegally obtained money by passing it through a complex sequence of banking transfers or commercial transactions.
It is often done to make the money appear as if it was earned legally and to avoid detection by authorities.
Money l...read more
Q92. What is mastercard
Mastercard is a global payment technology company that provides secure and convenient payment solutions.
Global payment technology company
Provides secure and convenient payment solutions
Accepted by millions of merchants worldwide
Q93. importance of education
Education is important for personal and professional growth.
Education provides knowledge and skills necessary for job performance.
It helps in developing critical thinking and problem-solving abilities.
Education also enhances communication and interpersonal skills.
It opens up opportunities for career advancement and higher salaries.
Education contributes to personal growth and self-awareness.
Examples: learning new cleaning techniques, safety procedures, and customer service ski...read more
Q94. E mail classifier using ML
Email classifier using ML
Use supervised learning algorithms like Naive Bayes or Support Vector Machines
Preprocess email data by tokenizing, removing stop words, and stemming
Split data into training and testing sets for model evaluation
Evaluate model performance using metrics like accuracy, precision, recall, and F1 score
Q95. Explain SOLID principle
SOLID is a set of five design principles to make software designs more understandable, flexible, and maintainable.
S - Single Responsibility Principle: A class should have only one reason to change.
O - Open/Closed Principle: Software entities should be open for extension but closed for modification.
L - Liskov Substitution Principle: Objects of a superclass should be replaceable with objects of its subclasses without affecting the program's correctness.
I - Interface Segregation...read more
Q96. Memory Allocation in Java
Memory allocation in Java is managed by the JVM using the heap and stack memory areas.
Java uses the heap memory for storing objects and the stack memory for storing method calls and local variables.
Memory allocation in Java is automatic and managed by the garbage collector.
Java provides the 'new' keyword to allocate memory for objects on the heap.
Primitive data types are stored on the stack, while objects are stored on the heap.
Q97. Different scopes of a bean
The different scopes of a bean in software development.
Singleton: A single instance of the bean is created and shared across the application.
Prototype: A new instance of the bean is created every time it is requested.
Request: A new instance of the bean is created for each HTTP request.
Session: A new instance of the bean is created for each user session.
Global session: A new instance of the bean is created for each global HTTP session.
Q98. Spring in depth
Spring is a powerful and lightweight framework for building Java applications.
Spring provides comprehensive infrastructure support for developing Java applications.
It promotes good design practices such as dependency injection and aspect-oriented programming.
Spring Boot simplifies the setup and configuration of Spring applications.
Spring MVC is a popular module for building web applications.
Spring Data JPA simplifies data access with JPA.
Spring Security provides authenticatio...read more
Q99. Java 8 in deptg
Java 8 introduced new features like lambda expressions, streams, and functional interfaces.
Lambda expressions allow for more concise code and easier parallel programming.
Streams provide a way to work with collections in a functional style.
Functional interfaces can have only one abstract method and are used for lambda expressions.
Optional class helps to avoid NullPointerExceptions.
Default methods allow interfaces to have method implementations.
Method references provide a way t...read more
Q100. To test culture fir
Testing culture fit is essential for successful consultant-client relationships.
Conducting behavioral interviews to assess values and work style
Observing how the candidate interacts with team members and clients
Reviewing past experiences and projects to gauge alignment with company culture
Top HR Questions asked in Panchayat Samiti
Interview Process at Panchayat Samiti
Top Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month