Add office photos
Engaged Employer

Mobikwik

4.0
based on 397 Reviews
Filter interviews by

40+ Crest Steel & Power Interview Questions and Answers

Updated 30 Oct 2024

Q1. Sort 0 and 1 Problem Statement

Given an integer array ARR of size N containing only integers 0 and 1, implement a function to sort this array. The solution should scan the array only once without using any addi...read more

Add your answer

Q2. Maximum Frequency Number Problem Statement

Given an array of integers with numbers in random order, write a program to find and return the number which appears the most frequently in the array.

If multiple elem...read more

Add your answer

Q3. Maximum Subarray Sum Problem Statement

Given an array of integers, determine the maximum possible sum of any contiguous subarray within the array.

Example:

Input:
array = [34, -50, 42, 14, -5, 86]
Output:
137
E...read more
Add your answer

Q4. Buy and Sell Stock Problem Statement

Imagine you are Harshad Mehta's friend, and you have been given the stock prices of a particular company for the next 'N' days. You can perform up to two buy-and-sell transa...read more

Add your answer
Discover Crest Steel & Power interview dos and don'ts from real experiences

Q5. Reverse Linked List Problem Statement

Given a singly linked list of integers, return the head of the reversed linked list.

Example:

Initial linked list: 1 -> 2 -> 3 -> 4 -> NULL
Reversed linked list: 4 -> 3 -> 2...read more
Add your answer

Q6. Kth Smallest Element Problem Statement

You are provided with an array of integers ARR of size N and an integer K. Your task is to find and return the K-th smallest value present in the array. All elements in th...read more

Add your answer
Are these interview questions helpful?

Q7. Trapping Rain Water

You are provided with an array ARR of integers representing an elevation map, where ARR[i] denotes the elevation of the ith bar. Determine the maximum amount of rainwater that can be trapped...read more

Add your answer

Q8. Shortest Path in a Binary Matrix Problem Statement

Given a binary matrix of size N * M where each element is either 0 or 1, find the shortest path from a source cell to a destination cell, consisting only of 1s...read more

Add your answer
Share interview questions and help millions of jobseekers 🌟

Q9. Valid Perfect Square Check

An integer N is provided, and the task is to determine if N is a perfect square. A perfect square refers to an integer which can be expressed as the square of another integer.

Sample ...read more

Add your answer

Q10. Bottom View of Binary Tree Problem Statement

Given a binary tree, the task is to print its bottom view from left to right. Assume the left and the right child nodes make a 45-degree angle with their parent node...read more

Add your answer

Q11. Longest Substring with At Most K Distinct Characters

Given a string S of length N and an integer K, find the length of the longest substring that contains at most K distinct characters.

Input:

The first line co...read more
Add your answer

Q12. Find Duplicates in an Array

Given an array ARR of size 'N', where each integer is in the range from 0 to N - 1, identify all elements that appear more than once.

Return the duplicate elements in any order. If n...read more

Add your answer

Q13. Merge Sort Problem Statement

Given a sequence of numbers 'ARR', your task is to return a sorted sequence of 'ARR' in non-descending order using the Merge Sort algorithm.

Example:

Input:
ARR = [5, 3, 8, 6, 2]
Ou...read more
Add your answer

Q14. Ninja and Bombs Problem Statement

Ninja wants to travel from his house to his best friend's house. The locations of the houses are on a 2D coordinate plane, where Ninja's house is located at the origin (0, 0). ...read more

Add your answer

Q15. K Sum Subset Problem Statement

You are provided with an array arr of size N and an integer K. Your objective is to compute the maximum sum of a subset of the array such that this sum does not exceed K.

Example:...read more

Add your answer

Q16. Mean, Median, and Mode Problem Statement

Given an integer array ARR of size N, you need to compute the following three statistical measures:

  1. Mean: Implement the function mean() to calculate the mean of the arr...read more
Add your answer

Q17. Triplets with Given Sum Problem

Given an array or list ARR consisting of N integers, your task is to identify all distinct triplets within the array that sum up to a specified number K.

Explanation:

A triplet i...read more

Add your answer

Q18. Diamond Pattern Grid Problem

Create a grid pattern of size R rows and C columns, where each cell contains a diamond-like shape of size S. The diamond shape is made with characters ‘/’ and ‘\’ for the borders, ‘...read more

Add your answer
Q19. How would you implement multiple RecyclerViews on a magnified screen in an Android application?
Add your answer

Q20. How can you collect NPA payment in case costumer contact has been missing

Ans.

To collect NPA payment when customer contact is missing, utilize various methods such as skip tracing, contacting references, using social media, and legal actions if necessary.

  • Perform skip tracing to locate the customer's current contact information.

  • Contact references provided by the customer to gather any updated contact details.

  • Utilize social media platforms to search for the customer and attempt to establish contact.

  • Send written communication to the customer's last known ...read more

View 1 answer

Q21. Design a system that can handle 10 lacs transactions per second

Ans.

Design a system to handle 10 lacs transactions per second.

  • Use distributed systems and load balancing to handle the high volume of transactions.

  • Implement caching mechanisms to reduce database load.

  • Use high-performance hardware and optimize code for speed.

  • Consider using a NoSQL database for faster read/write operations.

  • Implement fault-tolerant mechanisms to ensure system reliability.

  • Use asynchronous processing to handle requests quickly.

  • Consider using a message queue to handle ...read more

Add your answer

Q22. How to exploit/test for the same

Ans.

To exploit/test for vulnerabilities, use penetration testing tools and techniques to simulate attacks and identify weaknesses.

  • Use vulnerability scanners to identify potential vulnerabilities

  • Conduct penetration testing to simulate attacks and identify weaknesses

  • Perform social engineering tests to assess human vulnerabilities

  • Use fuzzing techniques to identify software vulnerabilities

  • Conduct code reviews to identify potential vulnerabilities

  • Test for security misconfigurations

  • Use...read more

Add your answer

Q23. Create an custom hashmap with all the function with oops concept

Ans.

Create a custom hashmap with OOPs concepts

  • Create a class for the hashmap with private variables for key and value

  • Implement methods for adding, removing and retrieving elements

  • Use inheritance to create a separate class for each type of data to be stored

  • Use encapsulation to protect the data and ensure proper access

  • Use polymorphism to allow for different types of data to be stored in the same hashmap

Add your answer

Q24. what is the bridge between swiftui and uikit

Ans.

The bridge between SwiftUI and UIKit is represented by the UIViewRepresentable and UIViewControllerRepresentable protocols.

  • UIViewRepresentable and UIViewControllerRepresentable protocols allow SwiftUI views to interact with UIKit views and controllers respectively.

  • UIViewRepresentable is used to wrap a UIKit view and make it available to SwiftUI.

  • UIViewControllerRepresentable is used to wrap a UIKit view controller and make it available to SwiftUI.

  • These protocols enable develop...read more

Add your answer
Q25. How would you implement various activities related to cart functionality in an e-commerce application?
Add your answer

Q26. What are the strategies you are using to enhance your callers productivity and make them fruitful.

Ans.

I implement training programs, provide resources, set clear goals, and offer regular feedback to enhance caller productivity.

  • Implementing training programs to improve skills and knowledge

  • Providing resources such as tools and technology to streamline processes

  • Setting clear goals and expectations for callers to work towards

  • Offering regular feedback and coaching to help callers improve performance

Add your answer

Q27. What you tell when customer said I don't pay this amount? ?

Ans.

Explain the importance of paying the amount and address any concerns the customer may have.

  • Explain the reasons for the amount owed (e.g. services provided, products purchased)

  • Discuss the consequences of not paying the amount (e.g. late fees, credit score impact)

  • Offer solutions or payment plans to help the customer meet their financial obligations

  • Listen to the customer's concerns and try to find a mutually beneficial resolution

Add your answer

Q28. How do you increase the productivity of your callers.

Ans.

Increasing caller productivity through training, motivation, and efficient tools.

  • Provide comprehensive training on product knowledge and communication skills

  • Implement performance incentives to motivate callers to meet and exceed targets

  • Utilize efficient call center software and tools to streamline processes and improve efficiency

Add your answer
Q29. Can you design a Google Search Engine?
Add your answer

Q30. types of init and their behavior

Ans.

There are designated initializers in Swift that have specific behaviors, such as convenience init and required init.

  • Designated initializers are primary initializers for a class and must call a designated initializer from its superclass.

  • Convenience initializers are secondary initializers that must call another initializer in the same class.

  • Required initializers must be implemented by all subclasses of a class.

Add your answer

Q31. Difference between SSRF & CSRF

Ans.

SSRF is an attack that allows an attacker to send a crafted request from a vulnerable web application. CSRF is an attack that tricks a victim into performing an action on a website without their knowledge or consent.

  • SSRF stands for Server-Side Request Forgery while CSRF stands for Cross-Site Request Forgery.

  • SSRF allows an attacker to send a request from a vulnerable server to a third-party server while CSRF tricks a victim into performing an action on a website.

  • SSRF can be us...read more

Add your answer

Q32. How do you reduce idle percentage.

Ans.

To reduce idle percentage, focus on optimizing workflow, improving communication, setting clear goals, and monitoring performance.

  • Optimize workflow by identifying and eliminating bottlenecks or inefficiencies.

  • Improve communication among team members to ensure tasks are being completed efficiently.

  • Set clear goals and expectations for employees to keep them focused and motivated.

  • Monitor performance regularly to identify areas for improvement and provide feedback.

  • Implement time ...read more

Add your answer

Q33. Name Qualifications Experience How convenience a merchant

Ans.

I am a highly qualified and experienced professional who can provide convenience to merchants through my expertise and skills.

  • Qualifications: MBA in Marketing, Certified Fintech Professional

  • Experience: 10+ years in sales and marketing, 5+ years in fintech industry

  • Convenience to merchant: By offering personalized solutions, optimizing processes, and providing excellent customer service

  • Example: Implementing a new POS system to streamline transactions and improve efficiency

Add your answer

Q34. Are you ready to loot customers?

Add your answer

Q35. 1. Process for projections 2. Team leading experience

Add your answer

Q36. implement Delegate pattern

Ans.

Delegate pattern is a design pattern in which an object delegates some of its responsibilities to another object.

  • Create a protocol defining the methods that the delegate should implement

  • Declare a delegate property in the delegating class

  • Set the delegate property to the object that will act as the delegate

  • Call the delegate methods from the delegating class

Add your answer

Q37. Are you ready to lie 100%?

Add your answer

Q38. Are you ready to steal money?

Add your answer

Q39. Low level design of rate limiter

Ans.

Rate limiter is a system that controls the rate of traffic sent or received by a network interface.

  • Implement a token bucket algorithm to track and limit the rate of requests

  • Use a sliding window algorithm to track the number of requests within a specific time frame

  • Consider using a distributed rate limiter for scalability and fault tolerance

Add your answer

Q40. LRU Cache Design framework for exception handling

Ans.

Design a framework for exception handling in a LRU Cache system

  • Implement try-catch blocks to handle exceptions

  • Use specific exception classes for different types of errors

  • Consider using logging mechanisms to track and debug exceptions

  • Implement a global exception handler to catch unhandled exceptions

Add your answer

Q41. Buidling products from 0 to 1 experience

Ans.

Experience in developing products from ideation to launch

  • Identifying market needs and opportunities

  • Creating a product roadmap and strategy

  • Leading cross-functional teams in product development

  • Iterating on prototypes based on user feedback

  • Launching and scaling the product successfully

Add your answer

Q42. 1.Messaging queue working like Kafka

Ans.

Messaging queue system similar to Kafka for real-time data processing and streaming

  • Kafka is a distributed streaming platform capable of handling high volumes of data in real-time

  • It uses topics to organize data streams and partitions for scalability

  • Producers publish messages to topics and consumers subscribe to topics to receive messages

  • Kafka provides fault tolerance, scalability, and high throughput for data processing

  • Example: Apache Kafka, Amazon Kinesis, Google Cloud Pub/Su...read more

Add your answer

Q43. How to improve chrome browser

Ans.

Improve Chrome browser by optimizing performance, enhancing security, and adding new features.

  • Optimize memory usage to improve performance

  • Enhance security by regularly updating security protocols

  • Add new features like built-in ad blocker or improved tab management

  • Improve compatibility with web standards and technologies

Add your answer

Q44. 1. Design notification system

Ans.

Design a notification system for timely alerts and updates.

  • Identify the target audience and their preferred communication channels (email, SMS, push notifications, etc.)

  • Define the types of notifications to be sent (urgent alerts, reminders, updates, etc.)

  • Implement a user-friendly interface for users to manage their notification preferences

  • Include features like scheduling notifications, customizing notification settings, and tracking delivery status

  • Ensure the system is scalabl...read more

Add your answer
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos
Top Mobikwik Interview Questions And Answers
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
70 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter