i
NTT DATA Business Solutions
Filter interviews by
I applied via Company Website and was interviewed in May 2023. There were 4 interview rounds.
Money laundering is the illegal process of making large amounts of money generated by a criminal activity, such as drug trafficking or terrorist funding, appear to have come from a legitimate source.
Money laundering involves disguising the origins of illegally obtained money.
It typically involves a series of transactions to make the money appear legitimate.
Money laundering can involve complex financial transactions and...
KYC (Know Your Customer) is a process used by financial institutions to verify the identity of their clients and assess potential risks of illegal activities.
KYC helps prevent fraud, money laundering, and terrorist financing.
It ensures compliance with regulations and helps build trust with customers.
KYC involves collecting and verifying customer information such as identity, address, and financial transactions.
Examples...
Stages to prevent money laundering involve customer due diligence, monitoring transactions, reporting suspicious activities, and ongoing training.
Customer due diligence - Verify customer identity and assess risk level
Transaction monitoring - Regularly review transactions for suspicious activities
Reporting suspicious activities - Report any suspicious transactions to authorities
Ongoing training - Provide training to emp...
Anti money laundering (AML) refers to a set of laws, regulations, and procedures designed to prevent criminals from disguising illegally obtained funds as legitimate income.
AML involves detecting and reporting suspicious activities that could be related to money laundering or terrorist financing
Financial institutions are required to have AML programs in place to comply with regulations
Examples of AML measures include c...
Identification allows for personalized services, targeted marketing, enhanced security, and efficient communication.
Personalized services: Identification helps businesses tailor their products or services to meet individual customer needs.
Targeted marketing: Knowing the identity of customers allows for more effective marketing strategies.
Enhanced security: Identification helps prevent fraud and unauthorized access to s...
Top trending discussions
I applied via Campus Placement and was interviewed in Jan 2021. There were 3 interview rounds.
I applied via Campus Placement and was interviewed before Jan 2021. There were 4 interview rounds.
I applied via Naukri.com and was interviewed in Aug 2021. There was 1 interview round.
posted on 26 Aug 2021
I applied via Naukri.com and was interviewed in Feb 2021. There was 1 interview round.
Answers to various technical questions related to Java programming.
Java is preferred for its platform independence, object-oriented nature, and vast community support.
Functional programming in Java allows for more concise and readable code, and better support for parallel processing.
Wrapper classes are used to convert primitive data types into objects, and vice versa.
Fibonacci series is a sequence of numbers where each...
I applied via Naukri.com and was interviewed in Apr 2021. There were 3 interview rounds.
I appeared for an interview before Dec 2020.
Round duration - 60 Minutes
Round difficulty - Medium
This round focused more on the Operating Systems part followed by some questions from Microservices Architecture.
Bootstrap program is the initial code that runs when a computer is powered on, loading the operating system into memory.
Bootstrap program is stored in ROM or firmware.
It initializes the system hardware and loads the operating system kernel into memory.
Examples include BIOS in PCs and UEFI in modern systems.
Memory protection in operating systems is a feature that prevents a process from accessing memory that has not been allocated to it.
Memory protection helps prevent one process from interfering with the memory of another process.
It ensures that each process can only access memory that has been allocated to it.
Examples of memory protection mechanisms include segmentation and paging.
Segmentation divides memory into segmen...
Four necessary and sufficient conditions for deadlock
Mutual exclusion: Resources cannot be shared between processes. Example: Process A holding Resource 1 and waiting for Resource 2, while Process B holding Resource 2 and waiting for Resource 1.
Hold and wait: Processes hold resources while waiting for others. Example: Process A holding Resource 1 and waiting for Resource 2, while Process B holding Resource 2 and waitin...
Microservices design is characterized by modularity, independence, scalability, and resilience.
Modularity: Microservices are designed as independent modules that can be developed, deployed, and scaled separately.
Independence: Each microservice operates independently and communicates with other services through APIs.
Scalability: Microservices allow for scaling specific components of an application based on demand.
Resili...
Different strategies for deploying microservices include blue-green deployment, canary deployment, rolling deployment, and feature flagging.
Blue-green deployment involves running two identical production environments, with one serving as the active environment while the other is on standby. Traffic is switched from one environment to the other once the new version is deemed stable.
Canary deployment gradually rolls out ...
Round duration - 60 Minutes
Round difficulty - Medium
This round was preety much mixed and contained questions from DBMS, Java and more importantly Spring Boot.
Normalization is needed in a database to reduce data redundancy, improve data integrity, and optimize database performance.
Eliminates data redundancy by breaking down data into smaller tables
Reduces update anomalies and inconsistencies in data
Improves data integrity by enforcing relationships between tables
Optimizes database performance by reducing storage space and improving query efficiency
Views in SQL are virtual tables that are generated based on the result set of a SELECT query.
Views are not stored physically in the database, but are dynamically generated when queried.
They can be used to simplify complex queries by encapsulating logic and joining multiple tables.
Views can also be used to restrict access to certain columns or rows of a table.
Example: CREATE VIEW vw_employee AS SELECT emp_id, emp_name F
Dependency injection is a design pattern where components are given their dependencies rather than creating them internally.
Allows for easier testing by providing mock dependencies
Promotes loose coupling between components
Improves code reusability and maintainability
Examples: Constructor injection, Setter injection, Interface injection
Profiles in Spring Boot allow for different configurations to be applied based on the environment or specific needs.
Profiles can be used to define different sets of configurations for different environments such as development, testing, and production.
By using profiles, you can easily switch between configurations without changing the code.
Profiles are typically defined in application.properties or application.yml file...
Access specifiers in Java control the visibility of classes, methods, and variables.
There are four access specifiers in Java: public, protected, default (no specifier), and private.
Public: accessible from any other class.
Protected: accessible within the same package or subclasses.
Default: accessible only within the same package.
Private: accessible only within the same class.
JIT compiler stands for Just-In-Time compiler, which compiles code during runtime instead of ahead of time.
JIT compiler translates bytecode into machine code on the fly
Improves performance by optimizing frequently executed code
Examples include Java HotSpot, .NET CLR's JIT compiler
Round duration - 30 Minutes
Round difficulty - Easy
This is a cultural fitment testing round .HR was very frank and asked standard questions. Then we discussed about my role.
Tip 1 : Must do Previously asked Interview as well as Online Test Questions.
Tip 2 : Go through all the previous interview experiences from Codestudio and Leetcode.
Tip 3 : Do at-least 2 good projects and you must know every bit of them.
Tip 1 : Have at-least 2 good projects explained in short with all important points covered.
Tip 2 : Every skill must be mentioned.
Tip 3 : Focus on skills, projects and experiences more.
I applied via Recruitment Consulltant and was interviewed before Aug 2021. There was 1 interview round.
posted on 16 Jul 2021
based on 1 interview
Interview experience
Consultant
430
salaries
| ₹5.1 L/yr - ₹19 L/yr |
Associate Consultant
318
salaries
| ₹2.8 L/yr - ₹11.4 L/yr |
Senior Consultant
318
salaries
| ₹10 L/yr - ₹32 L/yr |
Senior Associate
278
salaries
| ₹1.6 L/yr - ₹8.4 L/yr |
HC & Insurance OPS Associate
240
salaries
| ₹1.5 L/yr - ₹4.5 L/yr |
DXC Technology
Mphasis
Sutherland Global Services
Optum Global Solutions