Mobikwik
40+ Crest Steel & Power Interview Questions and Answers
Q1. Sort 0 and 1 Problem Statement
Given an integer array ARR
of size N
containing only integers 0 and 1, implement a function to sort this array. The solution should scan the array only once without using any addi...read more
Q2. Maximum Frequency Number Problem Statement
Given an array of integers with numbers in random order, write a program to find and return the number which appears the most frequently in the array.
If multiple elem...read more
Q3. Maximum Subarray Sum Problem Statement
Given an array of integers, determine the maximum possible sum of any contiguous subarray within the array.
Example:
Input:
array = [34, -50, 42, 14, -5, 86]
Output:
137
E...read more
Q4. Buy and Sell Stock Problem Statement
Imagine you are Harshad Mehta's friend, and you have been given the stock prices of a particular company for the next 'N' days. You can perform up to two buy-and-sell transa...read more
Q5. Reverse Linked List Problem Statement
Given a singly linked list of integers, return the head of the reversed linked list.
Example:
Initial linked list: 1 -> 2 -> 3 -> 4 -> NULL
Reversed linked list: 4 -> 3 -> 2...read more
Q6. Kth Smallest Element Problem Statement
You are provided with an array of integers ARR
of size N
and an integer K
. Your task is to find and return the K
-th smallest value present in the array. All elements in th...read more
Q7. Trapping Rain Water
You are provided with an array ARR
of integers representing an elevation map, where ARR[i]
denotes the elevation of the ith
bar. Determine the maximum amount of rainwater that can be trapped...read more
Q8. Shortest Path in a Binary Matrix Problem Statement
Given a binary matrix of size N * M
where each element is either 0 or 1, find the shortest path from a source cell to a destination cell, consisting only of 1s...read more
Q9. Valid Perfect Square Check
An integer N
is provided, and the task is to determine if N
is a perfect square. A perfect square refers to an integer which can be expressed as the square of another integer.
Sample ...read more
Q10. Bottom View of Binary Tree Problem Statement
Given a binary tree, the task is to print its bottom view from left to right. Assume the left and the right child nodes make a 45-degree angle with their parent node...read more
Q11. Longest Substring with At Most K Distinct Characters
Given a string S
of length N
and an integer K
, find the length of the longest substring that contains at most K
distinct characters.
Input:
The first line co...read more
Q12. Find Duplicates in an Array
Given an array ARR
of size 'N', where each integer is in the range from 0 to N - 1, identify all elements that appear more than once.
Return the duplicate elements in any order. If n...read more
Q13. Merge Sort Problem Statement
Given a sequence of numbers 'ARR', your task is to return a sorted sequence of 'ARR' in non-descending order using the Merge Sort algorithm.
Example:
Input:
ARR = [5, 3, 8, 6, 2]
Ou...read more
Q14. Ninja and Bombs Problem Statement
Ninja wants to travel from his house to his best friend's house. The locations of the houses are on a 2D coordinate plane, where Ninja's house is located at the origin (0, 0). ...read more
Q15. K Sum Subset Problem Statement
You are provided with an array arr
of size N
and an integer K
. Your objective is to compute the maximum sum of a subset of the array such that this sum does not exceed K
.
Example:...read more
Q16. Mean, Median, and Mode Problem Statement
Given an integer array ARR
of size N
, you need to compute the following three statistical measures:
- Mean: Implement the function
mean()
to calculate the mean of the arr...read more
Q17. Triplets with Given Sum Problem
Given an array or list ARR
consisting of N
integers, your task is to identify all distinct triplets within the array that sum up to a specified number K
.
Explanation:
A triplet i...read more
Q18. Diamond Pattern Grid Problem
Create a grid pattern of size R rows and C columns, where each cell contains a diamond-like shape of size S. The diamond shape is made with characters ‘/’ and ‘\’ for the borders, ‘...read more
Q20. How can you collect NPA payment in case costumer contact has been missing
To collect NPA payment when customer contact is missing, utilize various methods such as skip tracing, contacting references, using social media, and legal actions if necessary.
Perform skip tracing to locate the customer's current contact information.
Contact references provided by the customer to gather any updated contact details.
Utilize social media platforms to search for the customer and attempt to establish contact.
Send written communication to the customer's last known ...read more
Q21. Design a system that can handle 10 lacs transactions per second
Design a system to handle 10 lacs transactions per second.
Use distributed systems and load balancing to handle the high volume of transactions.
Implement caching mechanisms to reduce database load.
Use high-performance hardware and optimize code for speed.
Consider using a NoSQL database for faster read/write operations.
Implement fault-tolerant mechanisms to ensure system reliability.
Use asynchronous processing to handle requests quickly.
Consider using a message queue to handle ...read more
Q22. How to exploit/test for the same
To exploit/test for vulnerabilities, use penetration testing tools and techniques to simulate attacks and identify weaknesses.
Use vulnerability scanners to identify potential vulnerabilities
Conduct penetration testing to simulate attacks and identify weaknesses
Perform social engineering tests to assess human vulnerabilities
Use fuzzing techniques to identify software vulnerabilities
Conduct code reviews to identify potential vulnerabilities
Test for security misconfigurations
Use...read more
Q23. Create an custom hashmap with all the function with oops concept
Create a custom hashmap with OOPs concepts
Create a class for the hashmap with private variables for key and value
Implement methods for adding, removing and retrieving elements
Use inheritance to create a separate class for each type of data to be stored
Use encapsulation to protect the data and ensure proper access
Use polymorphism to allow for different types of data to be stored in the same hashmap
Q24. what is the bridge between swiftui and uikit
The bridge between SwiftUI and UIKit is represented by the UIViewRepresentable and UIViewControllerRepresentable protocols.
UIViewRepresentable and UIViewControllerRepresentable protocols allow SwiftUI views to interact with UIKit views and controllers respectively.
UIViewRepresentable is used to wrap a UIKit view and make it available to SwiftUI.
UIViewControllerRepresentable is used to wrap a UIKit view controller and make it available to SwiftUI.
These protocols enable develop...read more
Q26. What are the strategies you are using to enhance your callers productivity and make them fruitful.
I implement training programs, provide resources, set clear goals, and offer regular feedback to enhance caller productivity.
Implementing training programs to improve skills and knowledge
Providing resources such as tools and technology to streamline processes
Setting clear goals and expectations for callers to work towards
Offering regular feedback and coaching to help callers improve performance
Q27. What you tell when customer said I don't pay this amount? ?
Explain the importance of paying the amount and address any concerns the customer may have.
Explain the reasons for the amount owed (e.g. services provided, products purchased)
Discuss the consequences of not paying the amount (e.g. late fees, credit score impact)
Offer solutions or payment plans to help the customer meet their financial obligations
Listen to the customer's concerns and try to find a mutually beneficial resolution
Q28. How do you increase the productivity of your callers.
Increasing caller productivity through training, motivation, and efficient tools.
Provide comprehensive training on product knowledge and communication skills
Implement performance incentives to motivate callers to meet and exceed targets
Utilize efficient call center software and tools to streamline processes and improve efficiency
Q30. types of init and their behavior
There are designated initializers in Swift that have specific behaviors, such as convenience init and required init.
Designated initializers are primary initializers for a class and must call a designated initializer from its superclass.
Convenience initializers are secondary initializers that must call another initializer in the same class.
Required initializers must be implemented by all subclasses of a class.
Q31. Difference between SSRF & CSRF
SSRF is an attack that allows an attacker to send a crafted request from a vulnerable web application. CSRF is an attack that tricks a victim into performing an action on a website without their knowledge or consent.
SSRF stands for Server-Side Request Forgery while CSRF stands for Cross-Site Request Forgery.
SSRF allows an attacker to send a request from a vulnerable server to a third-party server while CSRF tricks a victim into performing an action on a website.
SSRF can be us...read more
Q32. How do you reduce idle percentage.
To reduce idle percentage, focus on optimizing workflow, improving communication, setting clear goals, and monitoring performance.
Optimize workflow by identifying and eliminating bottlenecks or inefficiencies.
Improve communication among team members to ensure tasks are being completed efficiently.
Set clear goals and expectations for employees to keep them focused and motivated.
Monitor performance regularly to identify areas for improvement and provide feedback.
Implement time ...read more
Q33. Name Qualifications Experience How convenience a merchant
I am a highly qualified and experienced professional who can provide convenience to merchants through my expertise and skills.
Qualifications: MBA in Marketing, Certified Fintech Professional
Experience: 10+ years in sales and marketing, 5+ years in fintech industry
Convenience to merchant: By offering personalized solutions, optimizing processes, and providing excellent customer service
Example: Implementing a new POS system to streamline transactions and improve efficiency
Q34. Are you ready to loot customers?
Q35. 1. Process for projections 2. Team leading experience
Q36. implement Delegate pattern
Delegate pattern is a design pattern in which an object delegates some of its responsibilities to another object.
Create a protocol defining the methods that the delegate should implement
Declare a delegate property in the delegating class
Set the delegate property to the object that will act as the delegate
Call the delegate methods from the delegating class
Q37. Are you ready to lie 100%?
Q38. Are you ready to steal money?
Q39. Low level design of rate limiter
Rate limiter is a system that controls the rate of traffic sent or received by a network interface.
Implement a token bucket algorithm to track and limit the rate of requests
Use a sliding window algorithm to track the number of requests within a specific time frame
Consider using a distributed rate limiter for scalability and fault tolerance
Q40. LRU Cache Design framework for exception handling
Design a framework for exception handling in a LRU Cache system
Implement try-catch blocks to handle exceptions
Use specific exception classes for different types of errors
Consider using logging mechanisms to track and debug exceptions
Implement a global exception handler to catch unhandled exceptions
Q41. Buidling products from 0 to 1 experience
Experience in developing products from ideation to launch
Identifying market needs and opportunities
Creating a product roadmap and strategy
Leading cross-functional teams in product development
Iterating on prototypes based on user feedback
Launching and scaling the product successfully
Q42. 1.Messaging queue working like Kafka
Messaging queue system similar to Kafka for real-time data processing and streaming
Kafka is a distributed streaming platform capable of handling high volumes of data in real-time
It uses topics to organize data streams and partitions for scalability
Producers publish messages to topics and consumers subscribe to topics to receive messages
Kafka provides fault tolerance, scalability, and high throughput for data processing
Example: Apache Kafka, Amazon Kinesis, Google Cloud Pub/Su...read more
Q43. How to improve chrome browser
Improve Chrome browser by optimizing performance, enhancing security, and adding new features.
Optimize memory usage to improve performance
Enhance security by regularly updating security protocols
Add new features like built-in ad blocker or improved tab management
Improve compatibility with web standards and technologies
Q44. 1. Design notification system
Design a notification system for timely alerts and updates.
Identify the target audience and their preferred communication channels (email, SMS, push notifications, etc.)
Define the types of notifications to be sent (urgent alerts, reminders, updates, etc.)
Implement a user-friendly interface for users to manage their notification preferences
Include features like scheduling notifications, customizing notification settings, and tracking delivery status
Ensure the system is scalabl...read more
Top HR Questions asked in Crest Steel & Power
Interview Process at Crest Steel & Power
Top Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month