Add office photos
Employer?
Claim Account for FREE

Morgan Stanley

3.7
based on 1.5k Reviews
Video summary
Filter interviews by

60+ UBS Interview Questions and Answers

Updated 27 Jan 2025
Popular Designations

Q1. Can you explain dcf to me? Can dcf be applied to equity?

Ans.

DCF is a valuation method used to estimate the value of an investment based on its future cash flows.

  • DCF involves projecting future cash flows and discounting them back to their present value.

  • It can be applied to equity by estimating the future cash flows of a company and discounting them back to their present value to determine the company's intrinsic value.

  • DCF is commonly used in investment banking and finance to value companies and assets.

  • It is important to use realistic a...read more

Add your answer

Q2. What is market cap and how would you explain in Lehman terms?

Ans.

Market cap is the total value of a company's outstanding shares. It's calculated by multiplying the current stock price by the number of shares outstanding.

  • Market cap is short for market capitalization.

  • It's a measure of a company's size and value.

  • It's calculated by multiplying the current stock price by the number of shares outstanding.

  • For example, if a company has 1 million shares outstanding and the current stock price is $50, the market cap would be $50 million.

  • Market cap ...read more

Add your answer

Q3. What is enterprise value and how is it calculated?

Ans.

Enterprise value is the total value of a company, including debt and equity.

  • Enterprise value is calculated by adding market capitalization, debt, and minority interest, and then subtracting cash and cash equivalents.

  • It represents the total value of a company that an acquirer would have to pay to take over the company.

  • Enterprise value is a more accurate representation of a company's value than market capitalization alone.

  • For example, if a company has a market capitalization of...read more

Add your answer

Q4. Given an array with length n , find highest value which occurs same number of times within the array. [3,8,3,2,1,3,2] 3 occurs 3 times output=3. [4,6,7,6,7,5,4,2,4,9,4,1,9] 4 occurs 3 times output=4

Ans.

Find the highest value that occurs the same number of times within an array.

  • Iterate through the array and count the occurrences of each value.

  • Store the counts in a dictionary or hash map.

  • Find the maximum count and check which value(s) have that count.

  • Return the highest value among those with the maximum count.

View 1 answer
Discover UBS interview dos and don'ts from real experiences

Q5. Tell me about Yourself. What excel functions are you aware of?

Ans.

I am a detail-oriented analyst with knowledge of various Excel functions.

  • I am proficient in basic functions such as SUM, AVERAGE, MAX, MIN, COUNT, etc.

  • I am also familiar with more advanced functions such as VLOOKUP, HLOOKUP, INDEX, MATCH, IF, AND, OR, etc.

  • I have experience using PivotTables, PivotCharts, and creating macros to automate tasks.

  • I am constantly learning and exploring new functions to improve my skills.

Add your answer

Q6. Candies Distribution Problem Statement

Prateek is a kindergarten teacher with a mission to distribute candies to students based on their performance. Each student must get at least one candy, and if two student...read more

Ans.

Determine the minimum number of candies needed to distribute to students based on their performance and ratings.

  • Iterate through the array of student ratings and assign 1 candy to each student initially.

  • Then iterate from left to right and check if the current student's rating is higher than the previous student, if so, assign candies accordingly.

  • Similarly, iterate from right to left to handle cases where the current student's rating is higher than the next student.

  • Keep track o...read more

Add your answer
Are these interview questions helpful?

Q7. Trapping Rainwater Problem Statement

You are given an array ARR of long type, which represents an elevation map where ARR[i] denotes the elevation of the ith bar. Calculate the total amount of rainwater that ca...read more

Ans.

Calculate the total amount of rainwater that can be trapped within given elevation map.

  • Iterate through the array to find the maximum height on the left and right of each bar.

  • Calculate the amount of water that can be trapped above each bar by taking the minimum of the maximum heights on the left and right.

  • Sum up the trapped water above each bar to get the total trapped water for the elevation map.

Add your answer

Q8. Types of valuation and reason for using each one of them

Ans.

Valuation methods include market, income, and asset-based approaches, each used for different purposes.

  • Market approach: based on comparable sales of similar assets in the market

  • Income approach: based on the present value of expected future income generated by the asset

  • Asset-based approach: based on the value of the asset's tangible and intangible assets

  • Market approach is commonly used for real estate, income approach for businesses, and asset-based approach for liquidation or...read more

Add your answer
Share interview questions and help millions of jobseekers 🌟

Q9. Given a class @Data class Account{String name; String acctBalance;}. Write logic to get Map using Stream API which shows the balance of each person i,e, key will be the name of the account holder and value will...

read more
Ans.

Logic to get Map using Stream API to show balance of each person

  • Use Stream API to group accounts by name

  • Use map() to get the sum of balances for each group

  • Collect the results into a Map

Add your answer

Q10. What are Hedge Funds? Components of Financial Statements

Ans.

Hedge funds are alternative investment vehicles that use pooled funds to employ various strategies to generate high returns.

  • Hedge funds are privately owned and managed investment funds

  • They use a variety of investment strategies such as long-short equity, global macro, and event-driven

  • They are typically only available to accredited investors due to their high-risk nature

  • Components of financial statements include balance sheet, income statement, and cash flow statement

Add your answer

Q11. What is weak reference? garbage collection in case of such references?

Ans.

Weak reference is a reference that does not prevent the object from being garbage collected.

  • Weak references are used to refer to objects that can be garbage collected if there are no strong references to them.

  • They are typically used in scenarios where you want to hold a reference to an object, but don't want to prevent it from being collected.

  • Weak references are implemented using weak reference queues, which allow you to perform actions when weakly referenced objects are abou...read more

View 1 answer

Q12. Find number of occurrences of a character in string. Provide multiple approaches for the solution and choose the best why? For "string aabcadd output=a3b1c1d2

Ans.

Count occurrences of a character in a string and output in a specific format.

  • Use a hash table to store the count of each character.

  • Loop through the string and update the count in the hash table.

  • Create the output string using the hash table.

Add your answer

Q13. Internal implementation of HashSet? Which scenario will generate same hashcode for a HashMap?

Ans.

HashSet is implemented using a HashMap internally. Same hashcode is generated when two objects have the same value for hashCode() and equals() methods.

  • HashSet internally uses a HashMap to store its elements.

  • The hashcode of an object is generated using the hashCode() method.

  • If two objects have the same value for hashCode() and equals() methods, they will generate the same hashcode.

  • For example, if two String objects have the same content, they will generate the same hashcode.

View 1 answer

Q14. Implementation of singleton pattern and ways of breaking it? singleton pattern implementation in a multithreaded environment?

Ans.

Singleton pattern ensures a class has only one instance, while allowing global access to it.

  • Implement a private constructor to prevent direct instantiation.

  • Create a static method to provide a single point of access to the instance.

  • Use lazy initialization to create the instance only when needed.

  • Ensure thread safety in a multithreaded environment using synchronization or double-checked locking.

  • Breaking the singleton pattern can be done by using reflection, serialization, or clo...read more

View 1 answer

Q15. What is SQL Cursor? Index? Aggregate Functions examples?

Ans.

SQL Cursor is a database object used to manipulate data row by row.

  • Cursor is used to fetch and process data row by row

  • Index is a database object used to speed up data retrieval

  • Aggregate functions are used to perform calculations on a set of values

  • Examples of aggregate functions are SUM, AVG, COUNT, MAX, MIN

Add your answer

Q16. Validate BST Problem Statement

Given a binary tree with N nodes, determine whether the tree is a Binary Search Tree (BST). If it is a BST, return true; otherwise, return false.

A binary search tree (BST) is a b...read more

Ans.

Validate if a binary tree is a Binary Search Tree (BST) or not.

  • Check if the left subtree of a node contains only nodes with data less than the node's data.

  • Check if the right subtree of a node contains only nodes with data greater than the node's data.

  • Ensure both the left and right subtrees are also binary search trees.

  • Traverse the tree in an inorder manner and check if the elements are in sorted order.

  • Recursively validate each node's value against its parent's value range.

Add your answer

Q17. What are hedge funds, and what are their products and structures?

Ans.

Hedge funds are investment funds that pool capital from accredited individuals or institutional investors and use various strategies to generate high returns.

  • Hedge funds typically have high minimum investment requirements and are only available to accredited investors.

  • They often use leverage and derivatives to amplify returns.

  • Hedge funds can invest in a wide range of assets, including stocks, bonds, commodities, and real estate.

  • Common hedge fund strategies include long/short ...read more

Add your answer

Q18. What are bonds and what are the different types of bonds?

Ans.

Bonds are debt securities issued by companies or governments to raise capital. Different types include corporate bonds, municipal bonds, and treasury bonds.

  • Bonds are essentially loans that investors give to companies or governments in exchange for periodic interest payments and the return of the bond's face value at maturity.

  • Corporate bonds are issued by corporations to raise capital for various purposes, such as expansion or acquisitions.

  • Municipal bonds are issued by state a...read more

Add your answer

Q19. What is the difference between the dirty price and the clean price of a bond?

Ans.

Dirty price includes accrued interest while clean price does not.

  • Dirty price includes accrued interest that the buyer must pay to the seller on top of the bond's market price.

  • Clean price is the market price of the bond without the accrued interest added.

  • The difference between the dirty price and the clean price is the accrued interest.

  • For example, if a bond has a clean price of $1,000 and accrued interest of $20, the dirty price would be $1,020.

Add your answer

Q20. Qtns on job description

Ans.

The question is about the job description.

  • Clarify the responsibilities and duties of the job

  • Ask about the required skills and qualifications

  • Inquire about the work environment and company culture

Add your answer

Q21. What are corporate actions and what are their types?

Ans.

Corporate actions are events initiated by a public company that impact its shareholders and securities.

  • Types of corporate actions include dividends, stock splits, mergers and acquisitions, rights issues, and spin-offs.

  • Dividends are payments made to shareholders from a company's profits.

  • Stock splits involve dividing existing shares into multiple shares to lower the price per share.

  • Mergers and acquisitions occur when two companies combine or one company buys another.

  • Rights issu...read more

Add your answer

Q22. Annotations : @Component vs @service, @Controller vs @RESTController, @Configuration, @Transactional

Ans.

Annotations used in Spring Framework for defining components and services.

  • Annotations like @Component, @Service, and @Controller are used for defining components in Spring Framework.

  • @RestController is used for defining RESTful web services.

  • @Configuration is used for defining configuration classes.

  • @Transactional is used for defining transactional methods.

  • All these annotations help in defining and managing dependencies in Spring Framework.

Add your answer

Q23. Convert String from Camel case to Snake case

Ans.

Converts a string from Camel case to Snake case.

  • Loop through the string and check for uppercase letters

  • Insert an underscore before each uppercase letter

  • Convert the string to lowercase

Add your answer

Q24. How HashMaps in Java work internally

Ans.

HashMaps in Java use hashing to store key-value pairs, allowing for fast retrieval and insertion.

  • HashMap uses a hash table to store key-value pairs.

  • Keys are hashed to determine the index where the value will be stored.

  • Collisions are resolved using linked lists or balanced trees.

  • HashMap allows null keys and values.

  • Example: HashMap map = new HashMap<>();

Add your answer

Q25. What is fix income products

Ans.

Fixed income products are investments that pay a fixed interest or dividend income until maturity.

  • Fixed income products include bonds, certificates of deposit (CDs), and preferred stocks.

  • Investors receive regular interest payments from fixed income products.

  • The principal amount is returned to the investor at maturity.

  • Fixed income products are considered less risky than stocks but offer lower potential returns.

View 1 answer

Q26. optimized solutions and core principles applied in OOPS

Ans.

Optimized solutions and core principles applied in OOPS

  • Encapsulation, Inheritance, Polymorphism, Abstraction are core principles of OOPS

  • Optimized solutions can be achieved through efficient algorithms and data structures

  • Design patterns like Singleton, Factory, Observer can also be used for optimized solutions

Add your answer

Q27. Option pricing model- BSM assumptions and explanation

Ans.

Black-Scholes-Merton (BSM) model is a mathematical model used for pricing options.

  • BSM model assumes constant risk-free rate, constant volatility, and lognormal distribution of stock prices.

  • It assumes no dividends are paid during the option's life.

  • The model assumes the option can only be exercised at expiration.

  • The underlying stock follows a geometric Brownian motion.

  • The model is used to calculate the theoretical price of European-style options.

  • BSM formula: C = S0*N(d1) - X*e^...read more

Add your answer

Q28. write classes and methods for bookmyshow

Ans.

Classes and methods for bookmyshow to manage booking and ticketing system.

  • Create a class for Ticket with attributes like ticket ID, showtime, seat number, etc.

  • Create a class for Show with attributes like movie name, theater, showtime, etc.

  • Create a class for Booking with attributes like booking ID, tickets booked, total price, etc.

  • Methods like bookTicket() to book a ticket, cancelTicket() to cancel a ticket, getAvailableSeats() to check available seats, etc.

Add your answer

Q29. check palindrome , anagram of string with O(n)

Ans.

To check palindrome and anagram of a string with O(n), use a hash table to store character frequencies.

  • Create a hash table to store the frequency of each character in the string.

  • For palindrome, check that no more than one character has an odd frequency.

  • For anagram, compare the hash tables of the two strings.

  • If the hash tables are equal, the strings are anagrams.

  • If the hash tables differ by only one character, the strings are palindrome anagrams.

  • If the hash tables differ by mo...read more

Add your answer

Q30. OTC products and how does it works

Ans.

OTC products are over-the-counter medications that can be purchased without a prescription.

  • OTC products are typically used to treat minor ailments such as headaches, colds, and allergies.

  • They work by targeting specific symptoms or conditions, such as pain, inflammation, or congestion.

  • Examples of OTC products include pain relievers like ibuprofen and acetaminophen, allergy medications like loratadine and cetirizine, and cough and cold remedies like dextromethorphan and guaifen...read more

Add your answer

Q31. What is Cbv process

Ans.

CBV process refers to Cost-Based Valuation process used in finance to determine the value of a company or asset.

  • CBV process involves analyzing the costs associated with a company or asset to determine its value.

  • It takes into account the expenses incurred in production, marketing, distribution, and other operational activities.

  • CBV process helps in understanding the financial health and potential profitability of a company or asset.

  • Examples of costs considered in CBV process in...read more

Add your answer

Q32. Process is throwing Out of Memory Error , describe the steps you will take to debug and then interviewer went down in Memory Management concepts and garbage collection algo's of JVM in great detail.

Ans.

To debug Out of Memory Error, analyze memory usage and garbage collection algorithm of JVM.

  • Analyze heap dump to identify memory leaks

  • Check if JVM is running out of heap space

  • Analyze garbage collection logs to identify any issues

  • Tune JVM parameters to optimize memory usage

  • Consider using a profiler to identify memory-intensive code

  • Check for any large objects or arrays that may be causing the issue

Add your answer

Q33. Concurrent package: internal working of CopyOnWriteArrayList Diff between synchronized collection and concurrent collection

Ans.

Explaining CopyOnWriteArrayList and difference between synchronized and concurrent collections.

  • CopyOnWriteArrayList is a thread-safe variant of ArrayList where all mutative operations are implemented by making a new copy of the underlying array.

  • Synchronized collections use a single lock to synchronize access to the collection, while concurrent collections use multiple locks to allow concurrent access.

  • Concurrent collections are designed to handle high-concurrency scenarios, wh...read more

Add your answer

Q34. Why is ATM option delta 0.5

Ans.

ATM option delta is 0.5 because it represents a 50% chance of the option expiring in-the-money.

  • ATM option delta is 0.5 because it is at-the-money, meaning the option strike price is equal to the current underlying asset price.

  • Delta measures the sensitivity of an option's price to changes in the underlying asset price.

  • A delta of 0.5 indicates a 50% probability of the option expiring in-the-money.

  • ATM options have the highest gamma and vega values compared to other options.

  • For e...read more

Add your answer

Q35. SQL query for second highest salary

Ans.

SQL query to find second highest salary

  • Use ORDER BY and LIMIT to get the highest salary

  • Use subquery to exclude the highest salary and get the second highest

Add your answer

Q36. Array Problem of DSA Medium

Ans.

The array problem involves manipulating an array of strings.

  • Use built-in array methods like map, filter, and reduce for efficient manipulation.

  • Consider sorting the array based on specific criteria.

  • Think about using regular expressions for string manipulation.

  • Handle edge cases like empty arrays or null values appropriately.

Add your answer

Q37. Design Patterns and Design Principles

Ans.

Design patterns and principles are essential for creating maintainable and scalable software.

  • Design patterns are reusable solutions to common software problems.

  • Design principles are guidelines for creating software that is easy to maintain and extend.

  • Examples of design patterns include Singleton, Factory, and Observer.

  • Examples of design principles include SOLID, DRY, and KISS.

Add your answer

Q38. Explain options and it’s pricing

Ans.

Options are financial instruments that give the holder the right, but not the obligation, to buy or sell an underlying asset at a specified price within a specific time period.

  • Options can be call options or put options

  • Call options give the holder the right to buy the underlying asset at a specified price within a specific time period

  • Put options give the holder the right to sell the underlying asset at a specified price within a specific time period

  • The price of an option is de...read more

Add your answer

Q39. How to get non repeating substring from a string

Ans.

To get non-repeating substring from a string, we can use the sliding window technique.

  • Create a hash set to store the characters in the current window.

  • Iterate through the string and add each character to the hash set.

  • If a repeating character is found, remove the first character from the hash set and move the window.

  • Keep track of the longest non-repeating substring found so far.

  • Return the longest non-repeating substring.

Add your answer

Q40. Tell me about any of the design patterns you are familiar with

Ans.

I am familiar with design patterns such as Singleton, Factory, Observer, and MVC.

  • Singleton pattern ensures a class has only one instance and provides a global point of access to it.

  • Factory pattern creates objects without specifying the exact class of object that will be created.

  • Observer pattern defines a one-to-many dependency between objects so that when one object changes state, all its dependents are notified and updated automatically.

  • MVC (Model-View-Controller) pattern se...read more

Add your answer

Q41. Write program to find the largest number present in array having increasing then decreasing numbers.

Ans.

Program to find largest number in array with increasing then decreasing numbers.

  • Find the peak element in the array using binary search.

  • If peak element is at index 0 or last index, return it.

  • Else, search for largest element in left and right subarrays.

Add your answer

Q42. how will you onboard stakeholders for cloud migration

Ans.

Onboarding stakeholders for cloud migration involves communication, training, and collaboration.

  • Communicate the benefits of cloud migration to stakeholders, addressing any concerns or questions they may have.

  • Provide training sessions to educate stakeholders on the new cloud technology and how it will impact their work.

  • Collaborate with stakeholders to gather feedback, address any issues, and ensure a smooth transition to the cloud.

  • Create a detailed onboarding plan with clear t...read more

Add your answer

Q43. Can you explain FX Option and Credit Default Swap

Ans.

FX Option is a financial derivative that gives the holder the right but not the obligation to exchange one currency for another at a predetermined exchange rate. Credit Default Swap is a financial contract that allows the buyer to transfer the credit risk of a bond or loan to a seller.

  • FX Option is used to hedge against currency risk in international trade

  • Credit Default Swap is used to protect against the risk of default on a bond or loan

  • FX Option can be either a call option o...read more

Add your answer

Q44. Working of HashMap Use of Equals and Hashcode method in case of HashMap

Ans.

HashMap is a data structure that stores key-value pairs and uses hashcode and equals methods for efficient retrieval.

  • HashMap uses hashcode to generate an index for the key-value pair

  • If two keys have the same hashcode, equals method is used to check for equality

  • If equals method returns true, the value associated with the key is returned

  • If equals method returns false, a collision occurs and the key-value pair is stored in a linked list at the index

Add your answer

Q45. Explain any one product

Ans.

iPhone 12

  • The latest smartphone from Apple

  • Comes in four different models: iPhone 12, iPhone 12 mini, iPhone 12 Pro, and iPhone 12 Pro Max

  • Features a new A14 Bionic chip for faster performance

  • Has a Ceramic Shield front cover for improved durability

  • Supports 5G connectivity for faster internet speeds

  • Has a dual-camera system with Night mode for better low-light photography

Add your answer

Q46. What is your understanding on Product control role

Ans.

Product control role involves monitoring and managing the financial performance of a product or business line.

  • Responsible for ensuring accurate and timely financial reporting

  • Analyzing and interpreting financial data to identify trends and areas for improvement

  • Developing and implementing financial controls and processes

  • Collaborating with other departments to ensure product profitability

  • Examples: monitoring the performance of a specific product line, managing inventory levels a...read more

Add your answer

Q47. Thread: print odd and even number in sequence using Threads

Ans.

Printing odd and even numbers in sequence using threads.

  • Create two threads, one for odd and one for even numbers.

  • Use a shared variable to keep track of the current number.

  • Use synchronized block to ensure only one thread is executing at a time.

  • Use wait() and notify() methods to signal the other thread.

  • Terminate the threads when the desired number of iterations is reached.

Add your answer

Q48. Dividends , accounting entries for dividends What are golden parachutes? Stock split Bonus entry Difference between Futures and forwards.

Add your answer

Q49. How will you manage data and risk governance

Ans.

I will establish clear policies, procedures, and controls to ensure data integrity and minimize risks.

  • Implementing data governance frameworks to define roles, responsibilities, and processes for managing data

  • Leveraging technology solutions such as data encryption, access controls, and monitoring tools

  • Regularly conducting risk assessments to identify potential vulnerabilities and mitigate them

  • Ensuring compliance with regulatory requirements such as GDPR or HIPAA

  • Providing train...read more

Add your answer

Q50. Design problem to show how to retrieve data from dataverse model

Ans.

Retrieve data from dataverse model design problem

  • Identify the specific data to be retrieved from the dataverse model

  • Create a query to extract the desired data

  • Utilize appropriate filters and conditions to narrow down the search results

  • Implement the query in the code to fetch the data

  • Handle any errors or exceptions that may occur during the retrieval process

Add your answer

Q51. Design Something similar as auto correct/suggestions functionality of Google search.

Ans.

Design an auto-suggestion feature for a search engine.

  • Implement a search algorithm that suggests relevant keywords based on user input.

  • Use machine learning to improve the accuracy of suggestions over time.

  • Allow users to easily select and add suggested keywords to their search query.

Add your answer

Q52. How will you estimate rish for projects

Ans.

Risk for projects can be estimated by considering factors such as project complexity, team experience, stakeholder involvement, and external dependencies.

  • Assess project complexity and potential challenges

  • Evaluate team experience and expertise in handling similar projects

  • Consider stakeholder involvement and communication

  • Identify external dependencies and potential risks

  • Use risk management techniques such as risk registers and risk analysis

Add your answer

Q53. Collections in java

Ans.

Collections in Java are used to store and manipulate groups of objects.

  • Collections framework provides interfaces (List, Set, Map) and classes (ArrayList, HashSet, HashMap) for storing and manipulating data

  • Collections offer methods for adding, removing, and accessing elements in a collection

  • Collections can be sorted, filtered, and iterated over using various methods

Add your answer

Q54. Difference between implicit and explicit wait

Ans.

Implicit wait is a global wait applied to all elements, while explicit wait is applied to specific elements.

  • Implicit wait is set once and applied to all elements in the script

  • Explicit wait is set for specific elements and waits until a certain condition is met

  • Implicit wait is not recommended as it can slow down the script unnecessarily

  • Explicit wait is more efficient as it only waits for the necessary time

  • Example of implicit wait: driver.manage().timeouts().implicitlyWait(10, ...read more

Add your answer

Q55. How and where did you implement threads

Ans.

Implemented threads in a multi-threaded application to improve performance and concurrency.

  • Implemented threads in a multi-threaded application to handle multiple tasks concurrently

  • Used threads to improve performance by parallelizing tasks

  • Implemented threads in a web server to handle multiple client requests simultaneously

Add your answer

Q56. Tell me about Futures, Forwards, Swaps and CDS

Add your answer

Q57. Tell me about different classes of assets

Ans.

Different classes of assets include fixed assets, current assets, intangible assets, and financial assets.

  • Fixed assets: Tangible assets like property, plant, and equipment

  • Current assets: Liquid assets like cash, accounts receivable, and inventory

  • Intangible assets: Non-physical assets like patents, trademarks, and goodwill

  • Financial assets: Investments like stocks, bonds, and derivatives

Add your answer

Q58. Design a system for a company in hospitality

Ans.

Design a system for a company in hospitality

  • Implement a centralized reservation system for booking rooms, tables, and other services

  • Incorporate a customer feedback system to gather reviews and ratings for continuous improvement

  • Include a staff scheduling and management module to efficiently allocate resources

  • Integrate a payment gateway for secure transactions and invoicing

  • Utilize data analytics to track customer preferences and trends for personalized experiences

Add your answer

Q59. How to multiply 2 strings

Ans.

It is not possible to multiply 2 strings in a mathematical sense.

  • Strings can be concatenated using the + operator.

  • To repeat a string, use the * operator followed by the number of repetitions.

  • To convert a string to a number, use the parseInt() or parseFloat() functions.

Add your answer

Q60. DO YOU HAVE CODING BACKGROUND?

Ans.

Yes, I have a strong coding background with experience in multiple programming languages.

  • Proficient in languages such as Java, Python, and C++

  • Experience with web development technologies like HTML, CSS, and JavaScript

  • Familiarity with database management systems such as SQL

  • Developed various software applications and projects

Add your answer

Q61. SQL Query to find nth salary

Ans.

SQL query to find nth salary

  • Use ORDER BY and LIMIT clauses

  • Use subquery to exclude previous salaries

Add your answer

Q62. Difference between MT 103 and 202

Ans.

MT 103 is a SWIFT payment message type used for cash transfers, while MT 202 is for bank-to-bank transfers.

  • MT 103 is used for customer payments and transfers, while MT 202 is for bank-to-bank transfers

  • MT 103 is a single customer credit transfer, while MT 202 is a general financial institution transfer

  • MT 103 is used for international wire transfers, while MT 202 is used for interbank transfers

  • MT 103 includes details of the sender, receiver, and transaction amount, while MT 202...read more

Add your answer

Q63. New changes in Swift regulation

Ans.

Swift regulation has undergone new changes.

  • The changes aim to improve transparency and reduce risks in the financial industry.

  • One of the changes is the introduction of the Legal Entity Identifier (LEI) requirement for certain transactions.

  • Another change is the implementation of the ISO 20022 messaging standard for cross-border payments.

  • The changes will impact financial institutions and their clients.

  • Compliance with the new regulations is mandatory.

Add your answer

Q64. To print last column in unix

Ans.

To print last column in unix

  • Use the command 'cut' with the delimiter option '-d' and specify the delimiter

  • Specify the field option '-f' and set it to the last field using '$'

  • Example: 'cut -d ',' -f $' filename.csv' will print the last column of a CSV file

Add your answer

Q65. Design automated Parking Lot.

Ans.

Automated parking lot design with efficient space utilization and user-friendly interface.

  • Use sensors to detect available parking spots

  • Implement a central computer system to manage parking allocation

  • Incorporate user-friendly interface for easy navigation and payment

  • Maximize space utilization with multi-level parking and compact car storage

  • Ensure safety measures are in place for pedestrians and vehicles

Add your answer

Q66. Please explain Singapore WHT

Ans.

Singapore WHT stands for Singapore Withholding Tax, which is a tax deducted at source on certain types of income.

  • Singapore WHT is applicable on payments such as interest, royalties, and services provided by non-residents.

  • The tax rate for Singapore WHT varies depending on the type of income and the tax treaty between Singapore and the country of the recipient.

  • Singapore WHT is usually deducted by the payer of the income and remitted to the Inland Revenue Authority of Singapore ...read more

Add your answer

Q67. Modules in Anaible

Ans.

Modules in Ansible are reusable, standalone scripts that can be used to perform specific tasks.

  • Modules can be written in any programming language

  • Modules can be executed on remote hosts

  • Modules can be used to install packages, manage files, and perform other tasks

  • Modules can be found in the Ansible library or created by users

  • Examples of modules include apt, yum, and copy

Add your answer

Q68. Please explain CRS

Ans.

CRS stands for Common Reporting Standard, a global standard for the automatic exchange of financial account information between tax authorities.

  • CRS was developed by the Organisation for Economic Co-operation and Development (OECD) to combat tax evasion.

  • It requires financial institutions to collect and report information on foreign tax residents to their local tax authorities.

  • Over 100 countries have committed to implementing CRS, including major financial centers like Switzerl...read more

Add your answer
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos

Interview Process at UBS

based on 59 interviews
Interview experience
4.0
Good
View more
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Interview Questions from Similar Companies

3.5
 • 309 Interview Questions
4.2
 • 191 Interview Questions
3.9
 • 180 Interview Questions
3.6
 • 168 Interview Questions
3.3
 • 151 Interview Questions
View all
Top Morgan Stanley Interview Questions And Answers
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
75 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter