Oracle
50+ Microsoft Partner Network Interview Questions and Answers
Q1. Find the Second Largest Element
Given an array or list of integers 'ARR', identify the second largest element in 'ARR'.
If a second largest element does not exist, return -1.
Example:
Input:
ARR = [2, 4, 5, 6, ...read more
Q2. Rotational Equivalence of Strings Problem Statement
Given two strings 'P' and 'Q' of equal length, determine if string 'P' can be transformed into string 'Q' by cyclically rotating it to the right any number of...read more
Q3. Best Time To Buy and Sell Stock Problem Statement
You are given an array 'PRICES' of 'N' integers, where 'PRICES[i]' represents the price of a certain stock on the i-th day. An integer 'K' is also provided, ind...read more
Q4. Kth Largest Element Problem Statement
Ninja enjoys working with numbers, and Alice challenges him to find the Kth largest value from a given list of numbers.
Input:
The first line contains an integer 'T', repre...read more
Q5. Number of Islands Problem Statement
You are provided with a 2-dimensional matrix having N
rows and M
columns, containing only 1s (land) and 0s (water). Your goal is to determine the number of islands in this ma...read more
Q6. Detect and Remove Loop in Linked List
For a given singly linked list, identify if a loop exists and remove it, adjusting the linked list in place. Return the modified linked list.
Expected Complexity:
Aim for a...read more
Q7. Subarray With Given Sum Problem Statement
Given an array ARR
of N integers and an integer S, determine if there exists a contiguous subarray within the array with a sum equal to S. If such a subarray exists, re...read more
Q8. Remove BST Keys Outside Given Range
Given a Binary Search Tree (BST) and a specified range [min, max], your task is to remove all keys from the BST that fall outside this range. The BST should remain valid afte...read more
Q9. Form a 8-digit number (from 1,2,3,4) in the pattern same as 312132. here in the given pattern 3-digits comes in between 3, 2-digits comes in between 2, and 1-digit comes in between 1. My answer was
Form an 8-digit number in the pattern 312132 with digits 1, 2, 3, and 4.
The pattern is 3 digits between 3, 2 digits between 2, and 1 digit between 1.
The number can start with any digit.
The remaining digits can be arranged in any order.
Q10. How is a file transferred via ftp and how exactly does FTP work? How many sockets would be required for one file transfer? (I could not really get what he tried to ask)
FTP transfers files using a client-server model with separate control and data connections. Multiple sockets are used for one file transfer.
FTP works on a client-server model where the client initiates a connection to the server.
Two separate connections are established for file transfer - a control connection for commands and a data connection for actual file transfer.
The control connection is used to send commands like login, change directory, etc.
The data connection is used...read more
Q11. Given a linked list of string, print the node having the same strings but in reverse order. for example Given linked list: |ram|->|manish|->|mohan|->|rajesh|->|mar|->|nahom|->|tips|->null. Now linked list conta...
read moreIterate through the linked list and store the strings in a stack. Then pop the strings from the stack to print them in reverse order.
Create a stack to store the strings as you iterate through the linked list.
Pop the strings from the stack to print them in reverse order.
Example: If the linked list contains |ram|->|manish|->|mohan|->|rajesh|->|mar|->|nahom|->|tips|->null, the output should be tips, nahom, mar, rajesh, mohan, manish, ram.
Q12. What is the path followed if my system wants to connect to some given IP of another system?
The path followed to connect to a given IP of another system involves multiple steps and protocols.
First, the system resolves the domain name to an IP address using DNS.
Then, the system establishes a TCP connection to the destination IP.
Next, data is exchanged between the systems using the TCP protocol.
Finally, the connection is terminated once the data transfer is complete.
Q13. How will you reduce the impact of authentication requests being sent to your authentication platform?
Implementing caching mechanisms and optimizing authentication processes can help reduce the impact of authentication requests on the authentication platform.
Implement caching mechanisms to store authentication tokens locally and reduce the need for frequent requests to the authentication platform.
Optimize authentication processes by using efficient algorithms and data structures to quickly verify user credentials.
Implement rate limiting to prevent excessive authentication req...read more
Q15. What is Deferred Tax Liabilities and can it shown under Non Current Assets
Deferred Tax Liabilities are future tax obligations that arise due to temporary differences between accounting and tax rules.
Deferred Tax Liabilities are recorded on the balance sheet as a non-current liability.
They represent taxes that a company will have to pay in the future when the temporary differences reverse.
Temporary differences can arise from items such as depreciation, inventory valuation, and revenue recognition.
Deferred Tax Liabilities are calculated by applying t...read more
Q16. A DNS infrastructure is being bombarded with requests. How will you remediate/reduce it's impact?
Implement rate limiting, increase capacity, use caching, and implement security measures.
Implement rate limiting to restrict the number of requests per client or IP address.
Increase the capacity of the DNS infrastructure by adding more servers or upgrading existing ones.
Use caching to store frequently accessed DNS records and reduce the load on the infrastructure.
Implement security measures such as firewall rules to block malicious requests and protect against DDoS attacks.
Q17. What will be your design consideration for a highly available application?
Design considerations for a highly available application include redundancy, fault tolerance, load balancing, and disaster recovery.
Implementing redundancy in critical components to ensure continuous operation
Utilizing fault-tolerant architecture to handle failures without impacting availability
Implementing load balancing to distribute traffic evenly across multiple servers
Setting up disaster recovery mechanisms to quickly recover from unexpected outages
Q18. What is Excepted Credit Loss - What are the 2 methods that the Standard prescribes
Expected Credit Loss (ECL) is a measure of the potential loss that a financial institution may incur due to default or impairment of its credit exposures.
ECL is a key concept in financial accounting and reporting.
It is used to estimate the amount of credit losses that a financial institution is likely to experience in the future.
The two methods prescribed by the Standard are the General Approach and the Simplified Approach.
Under the General Approach, financial institutions ar...read more
Q19. What algorithm is used for garbage collection in Java?
Q20. What is Deferred Revenue and Accrued Revenue
Deferred revenue is income received in advance for goods or services that will be delivered in the future. Accrued revenue is income earned but not yet received.
Deferred revenue is a liability on the balance sheet.
It represents revenue that has been received but not yet earned.
Examples of deferred revenue include prepaid subscriptions, advance payments for services, or gift cards.
Accrued revenue is an asset on the balance sheet.
It represents revenue that has been earned but n...read more
Q21. what is BCNF, difference between other forms ?
Q22. Difference between where and having clause ?
Q23. Write a CPU Scheduler implemeting priority scheduling in C language - 20 lines of code, 10 minutes time. Also give the data structure to use
Priority scheduling CPU scheduler implemented in C language with a 20-line code limit.
Use an array of structs to store process information including priority.
Sort the processes based on priority before scheduling.
Implement a function to switch between processes based on priority levels.
Q24. Search words with matching prefixes. How to solve in multiple vms if data is huge
To search words with matching prefixes in multiple vms with huge data, use parallel processing and divide data among vms.
Divide the data into chunks and distribute them among multiple virtual machines for parallel processing
Each VM can search for words with matching prefixes in their assigned chunk of data
Combine the results from all VMs to get the final list of words with matching prefixes
Q25. What kind of work you have done with respect to performance tuning?
Q26. Program for Fibonacci numbers (Space Otimized Method)
Program to generate Fibonacci numbers using space optimized method.
Use two variables to store the last two Fibonacci numbers instead of an array.
Iterate through the sequence by updating the variables with the sum of the previous two numbers.
Repeat until the desired number of Fibonacci numbers is generated.
Q27. Differences between Previous and Current Revenue Recognition
The current revenue recognition standards have changed compared to the previous standards.
Previous standards recognized revenue when it was realized or realizable and earned, while current standards focus on the transfer of control of goods or services.
Under previous standards, revenue could be recognized over time using percentage-of-completion method, while current standards require the use of input or output methods to measure progress towards completion.
The current standa...read more
Q28. Juggling algorithm ? Write a program to find all triplets whose sum is 0 from a given array of numbers ?
Q29. What does errors in 4xx format usually mean?
Errors in 4xx format usually indicate client-side errors.
4xx errors are typically caused by the client sending a request that is incorrect or cannot be fulfilled.
Examples include 400 Bad Request, 401 Unauthorized, 403 Forbidden, and 404 Not Found.
These errors are different from 5xx errors which indicate server-side issues.
Q30. Aspects of bill? Table Structure? Difference between all three scripts? UI, portal types
Q31. try catch finally block how many characters to delete to make a string palindrome how to run test parallely in test ng
Q32. how many zero's in the right side of 21!
Q33. program to print the middle of a given linked list
Program to find and print the middle element of a linked list
Traverse the linked list using two pointers - one moving one node at a time and the other moving two nodes at a time
When the faster pointer reaches the end of the list, the slower pointer will be at the middle element
Print the value of the middle element
Q34. Distributed memory - cache consistency problem, issues and solutions
Distributed memory cache consistency problem arises when multiple processors access the same data stored in a distributed memory system.
Cache coherence protocols like MESI (Modified, Exclusive, Shared, Invalid) are used to maintain consistency among caches in a distributed memory system.
Invalidation-based protocols involve invalidating a cache line in all other caches when one cache writes to it.
Update-based protocols involve updating all copies of a cache line in different c...read more
Q35. fetch the data for state and city based n country selection
Q36. FInd the range of available IP addres based in the input IP and subnet
Calculate the range of available IP addresses based on input IP and subnet.
Determine the network address and broadcast address using the input IP and subnet mask.
Calculate the range of available IP addresses between the network address and broadcast address.
Exclude the network address and broadcast address from the range of available IP addresses.
Q37. what are 12 factors of cloud native application ?
Q38. what is normalization ?
Q39. function to reverse a linked list
Function to reverse a linked list
Create three pointers: prev, current, next
Iterate through the linked list, updating pointers accordingly
Set the next of current to prev, move prev and current pointers forward
Return the new head of the reversed linked list
Q40. function to detect loop in a linked list
Use Floyd's Tortoise and Hare algorithm to detect loop in a linked list.
Initialize two pointers, slow and fast, at the head of the linked list.
Move slow pointer by one step and fast pointer by two steps.
If they meet at any point, there is a loop in the linked list.
Q41. Sum of largest and smallest elements of an array
Find the sum of the largest and smallest elements in an array of strings.
Convert the strings to numbers before finding the largest and smallest elements.
Handle cases where the array is empty or contains non-numeric strings.
Example: For array ['5', '2', '10', '1'], the sum would be 11 (1 + 10).
Q42. extra curricular activities ?
I have participated in various extra curricular activities throughout my academic journey.
I have been a member of the school's debate team for three years.
I have also been actively involved in community service, volunteering at a local shelter.
I have played the piano for eight years and have performed in several school concerts.
I have participated in the school's annual science fair, presenting my own research project.
I have been a member of the school's drama club, performin...read more
Q43. what are all optimisation technique
Q44. How DHCP works?
Q45. Dynamic memory allocation in c
Dynamic memory allocation in C allows for allocating memory at runtime, enabling flexibility in memory usage.
Use functions like malloc(), calloc(), and realloc() to allocate memory dynamically.
Remember to free the allocated memory using free() to prevent memory leaks.
Dynamic memory allocation is commonly used for creating arrays of unknown size or for resizing arrays during runtime.
Q46. How to design bookmyshow?
Q47. Fair Value Accounting of Investments
Fair value accounting is a method used to measure and report the value of investments based on their current market prices.
Fair value accounting is used to provide more accurate and relevant information about the value of investments.
It involves measuring the value of investments based on their current market prices.
This method is used for both financial assets and liabilities.
Fair value accounting helps in assessing the performance and risk associated with investments.
It req...read more
Q48. Indexing in dbms
Indexing in DBMS is a technique to improve the performance of database queries by creating a data structure that allows faster data retrieval.
Indexing involves creating an index on one or more columns of a table.
Indexes are used to speed up the search, sorting, and joining of data.
Types of indexes include B-tree, hash, bitmap, and clustered indexes.
Indexes can be created on primary keys, foreign keys, or frequently searched columns.
Example: Creating an index on the 'name' col...read more
Q49. Plans about higher studies
I am planning to pursue a Master's degree in Computer Science.
I have researched various universities and programs that align with my career goals.
I am currently preparing for the required standardized tests.
I am also working on strengthening my application by gaining relevant work experience and participating in extracurricular activities.
I am open to both full-time and part-time programs, depending on my work commitments.
I am excited to continue learning and growing in my fi...read more
Q50. What is hashmap ?
Q51. Challenging project so far
Designing a sustainable housing project in a remote area with limited resources
Overcoming logistical challenges such as transportation of materials
Finding innovative solutions for energy and water supply
Working closely with local community to ensure project sustainability
Q52. Race condition simulation
Race condition simulation involves creating scenarios where multiple processes access shared resources simultaneously.
Use multithreading to simulate concurrent access to shared variables
Introduce delays or randomization to increase likelihood of race conditions
Monitor for unexpected behavior or data corruption
Example: Simulating multiple threads incrementing a shared counter without proper synchronization
Q53. design custom load balancers
Q54. system design on hackerrank
Q55. Design short url
More about working at Oracle
Top HR Questions asked in Microsoft Partner Network
Interview Process at Microsoft Partner Network
Top Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month