Add office photos
Engaged Employer

Oracle

3.7
based on 5.3k Reviews
Video summary
Filter interviews by

50+ Microsoft Partner Network Interview Questions and Answers

Updated 10 Mar 2025
Popular Designations

Q1. Find the Second Largest Element

Given an array or list of integers 'ARR', identify the second largest element in 'ARR'.

If a second largest element does not exist, return -1.

Example:

Input:
ARR = [2, 4, 5, 6, ...read more
Add your answer

Q2. Rotational Equivalence of Strings Problem Statement

Given two strings 'P' and 'Q' of equal length, determine if string 'P' can be transformed into string 'Q' by cyclically rotating it to the right any number of...read more

Add your answer

Q3. Best Time To Buy and Sell Stock Problem Statement

You are given an array 'PRICES' of 'N' integers, where 'PRICES[i]' represents the price of a certain stock on the i-th day. An integer 'K' is also provided, ind...read more

Add your answer

Q4. Kth Largest Element Problem Statement

Ninja enjoys working with numbers, and Alice challenges him to find the Kth largest value from a given list of numbers.

Input:

The first line contains an integer 'T', repre...read more
Add your answer
Discover Microsoft Partner Network interview dos and don'ts from real experiences

Q5. Number of Islands Problem Statement

You are provided with a 2-dimensional matrix having N rows and M columns, containing only 1s (land) and 0s (water). Your goal is to determine the number of islands in this ma...read more

Add your answer

Q6. Detect and Remove Loop in Linked List

For a given singly linked list, identify if a loop exists and remove it, adjusting the linked list in place. Return the modified linked list.

Expected Complexity:

Aim for a...read more

Add your answer
Are these interview questions helpful?

Q7. Subarray With Given Sum Problem Statement

Given an array ARR of N integers and an integer S, determine if there exists a contiguous subarray within the array with a sum equal to S. If such a subarray exists, re...read more

Add your answer

Q8. Remove BST Keys Outside Given Range

Given a Binary Search Tree (BST) and a specified range [min, max], your task is to remove all keys from the BST that fall outside this range. The BST should remain valid afte...read more

Add your answer
Share interview questions and help millions of jobseekers 🌟

Q9. Form a 8-digit number (from 1,2,3,4) in the pattern same as 312132. here in the given pattern 3-digits comes in between 3, 2-digits comes in between 2, and 1-digit comes in between 1. My answer was

Ans.

Form an 8-digit number in the pattern 312132 with digits 1, 2, 3, and 4.

  • The pattern is 3 digits between 3, 2 digits between 2, and 1 digit between 1.

  • The number can start with any digit.

  • The remaining digits can be arranged in any order.

Add your answer

Q10. How is a file transferred via ftp and how exactly does FTP work? How many sockets would be required for one file transfer? (I could not really get what he tried to ask)

Ans.

FTP transfers files using a client-server model with separate control and data connections. Multiple sockets are used for one file transfer.

  • FTP works on a client-server model where the client initiates a connection to the server.

  • Two separate connections are established for file transfer - a control connection for commands and a data connection for actual file transfer.

  • The control connection is used to send commands like login, change directory, etc.

  • The data connection is used...read more

Add your answer

Q11. Given a linked list of string, print the node having the same strings but in reverse order. for example Given linked list: |ram|->|manish|->|mohan|->|rajesh|->|mar|->|nahom|->|tips|->null. Now linked list conta...

read more
Ans.

Iterate through the linked list and store the strings in a stack. Then pop the strings from the stack to print them in reverse order.

  • Create a stack to store the strings as you iterate through the linked list.

  • Pop the strings from the stack to print them in reverse order.

  • Example: If the linked list contains |ram|->|manish|->|mohan|->|rajesh|->|mar|->|nahom|->|tips|->null, the output should be tips, nahom, mar, rajesh, mohan, manish, ram.

Add your answer

Q12. What is the path followed if my system wants to connect to some given IP of another system?

Ans.

The path followed to connect to a given IP of another system involves multiple steps and protocols.

  • First, the system resolves the domain name to an IP address using DNS.

  • Then, the system establishes a TCP connection to the destination IP.

  • Next, data is exchanged between the systems using the TCP protocol.

  • Finally, the connection is terminated once the data transfer is complete.

Add your answer

Q13. How will you reduce the impact of authentication requests being sent to your authentication platform?

Ans.

Implementing caching mechanisms and optimizing authentication processes can help reduce the impact of authentication requests on the authentication platform.

  • Implement caching mechanisms to store authentication tokens locally and reduce the need for frequent requests to the authentication platform.

  • Optimize authentication processes by using efficient algorithms and data structures to quickly verify user credentials.

  • Implement rate limiting to prevent excessive authentication req...read more

Add your answer
Q14. How would you design an online gaming application?
Add your answer

Q15. What is Deferred Tax Liabilities and can it shown under Non Current Assets

Ans.

Deferred Tax Liabilities are future tax obligations that arise due to temporary differences between accounting and tax rules.

  • Deferred Tax Liabilities are recorded on the balance sheet as a non-current liability.

  • They represent taxes that a company will have to pay in the future when the temporary differences reverse.

  • Temporary differences can arise from items such as depreciation, inventory valuation, and revenue recognition.

  • Deferred Tax Liabilities are calculated by applying t...read more

Add your answer

Q16. A DNS infrastructure is being bombarded with requests. How will you remediate/reduce it's impact?

Ans.

Implement rate limiting, increase capacity, use caching, and implement security measures.

  • Implement rate limiting to restrict the number of requests per client or IP address.

  • Increase the capacity of the DNS infrastructure by adding more servers or upgrading existing ones.

  • Use caching to store frequently accessed DNS records and reduce the load on the infrastructure.

  • Implement security measures such as firewall rules to block malicious requests and protect against DDoS attacks.

Add your answer

Q17. What will be your design consideration for a highly available application?

Ans.

Design considerations for a highly available application include redundancy, fault tolerance, load balancing, and disaster recovery.

  • Implementing redundancy in critical components to ensure continuous operation

  • Utilizing fault-tolerant architecture to handle failures without impacting availability

  • Implementing load balancing to distribute traffic evenly across multiple servers

  • Setting up disaster recovery mechanisms to quickly recover from unexpected outages

Add your answer

Q18. What is Excepted Credit Loss - What are the 2 methods that the Standard prescribes

Ans.

Expected Credit Loss (ECL) is a measure of the potential loss that a financial institution may incur due to default or impairment of its credit exposures.

  • ECL is a key concept in financial accounting and reporting.

  • It is used to estimate the amount of credit losses that a financial institution is likely to experience in the future.

  • The two methods prescribed by the Standard are the General Approach and the Simplified Approach.

  • Under the General Approach, financial institutions ar...read more

Add your answer

Q19. What algorithm is used for garbage collection in Java?

Add your answer

Q20. What is Deferred Revenue and Accrued Revenue

Ans.

Deferred revenue is income received in advance for goods or services that will be delivered in the future. Accrued revenue is income earned but not yet received.

  • Deferred revenue is a liability on the balance sheet.

  • It represents revenue that has been received but not yet earned.

  • Examples of deferred revenue include prepaid subscriptions, advance payments for services, or gift cards.

  • Accrued revenue is an asset on the balance sheet.

  • It represents revenue that has been earned but n...read more

Add your answer

Q21. what is BCNF, difference between other forms ?

Add your answer

Q22. Difference between where and having clause ?

Add your answer

Q23. Write a CPU Scheduler implemeting priority scheduling in C language - 20 lines of code, 10 minutes time. Also give the data structure to use

Ans.

Priority scheduling CPU scheduler implemented in C language with a 20-line code limit.

  • Use an array of structs to store process information including priority.

  • Sort the processes based on priority before scheduling.

  • Implement a function to switch between processes based on priority levels.

Add your answer

Q24. Search words with matching prefixes. How to solve in multiple vms if data is huge

Ans.

To search words with matching prefixes in multiple vms with huge data, use parallel processing and divide data among vms.

  • Divide the data into chunks and distribute them among multiple virtual machines for parallel processing

  • Each VM can search for words with matching prefixes in their assigned chunk of data

  • Combine the results from all VMs to get the final list of words with matching prefixes

Add your answer

Q25. What kind of work you have done with respect to performance tuning?

Add your answer

Q26. Program for Fibonacci numbers (Space Otimized Method)

Ans.

Program to generate Fibonacci numbers using space optimized method.

  • Use two variables to store the last two Fibonacci numbers instead of an array.

  • Iterate through the sequence by updating the variables with the sum of the previous two numbers.

  • Repeat until the desired number of Fibonacci numbers is generated.

Add your answer

Q27. Differences between Previous and Current Revenue Recognition

Ans.

The current revenue recognition standards have changed compared to the previous standards.

  • Previous standards recognized revenue when it was realized or realizable and earned, while current standards focus on the transfer of control of goods or services.

  • Under previous standards, revenue could be recognized over time using percentage-of-completion method, while current standards require the use of input or output methods to measure progress towards completion.

  • The current standa...read more

Add your answer

Q28. Juggling algorithm ? Write a program to find all triplets whose sum is 0 from a given array of numbers ?

Add your answer

Q29. What does errors in 4xx format usually mean?

Ans.

Errors in 4xx format usually indicate client-side errors.

  • 4xx errors are typically caused by the client sending a request that is incorrect or cannot be fulfilled.

  • Examples include 400 Bad Request, 401 Unauthorized, 403 Forbidden, and 404 Not Found.

  • These errors are different from 5xx errors which indicate server-side issues.

Add your answer

Q30. Aspects of bill? Table Structure? Difference between all three scripts? UI, portal types

Add your answer

Q31. try catch finally block how many characters to delete to make a string palindrome how to run test parallely in test ng

Add your answer

Q32. how many zero's in the right side of 21!

Add your answer

Q33. program to print the middle of a given linked list

Ans.

Program to find and print the middle element of a linked list

  • Traverse the linked list using two pointers - one moving one node at a time and the other moving two nodes at a time

  • When the faster pointer reaches the end of the list, the slower pointer will be at the middle element

  • Print the value of the middle element

Add your answer

Q34. Distributed memory - cache consistency problem, issues and solutions

Ans.

Distributed memory cache consistency problem arises when multiple processors access the same data stored in a distributed memory system.

  • Cache coherence protocols like MESI (Modified, Exclusive, Shared, Invalid) are used to maintain consistency among caches in a distributed memory system.

  • Invalidation-based protocols involve invalidating a cache line in all other caches when one cache writes to it.

  • Update-based protocols involve updating all copies of a cache line in different c...read more

Add your answer

Q35. fetch the data for state and city based n country selection

Add your answer

Q36. FInd the range of available IP addres based in the input IP and subnet

Ans.

Calculate the range of available IP addresses based on input IP and subnet.

  • Determine the network address and broadcast address using the input IP and subnet mask.

  • Calculate the range of available IP addresses between the network address and broadcast address.

  • Exclude the network address and broadcast address from the range of available IP addresses.

Add your answer

Q37. what are 12 factors of cloud native application ?

Add your answer

Q38. what is normalization ?

Add your answer

Q39. function to reverse a linked list

Ans.

Function to reverse a linked list

  • Create three pointers: prev, current, next

  • Iterate through the linked list, updating pointers accordingly

  • Set the next of current to prev, move prev and current pointers forward

  • Return the new head of the reversed linked list

Add your answer

Q40. function to detect loop in a linked list

Ans.

Use Floyd's Tortoise and Hare algorithm to detect loop in a linked list.

  • Initialize two pointers, slow and fast, at the head of the linked list.

  • Move slow pointer by one step and fast pointer by two steps.

  • If they meet at any point, there is a loop in the linked list.

Add your answer

Q41. Sum of largest and smallest elements of an array

Ans.

Find the sum of the largest and smallest elements in an array of strings.

  • Convert the strings to numbers before finding the largest and smallest elements.

  • Handle cases where the array is empty or contains non-numeric strings.

  • Example: For array ['5', '2', '10', '1'], the sum would be 11 (1 + 10).

Add your answer

Q42. extra curricular activities ?

Ans.

I have participated in various extra curricular activities throughout my academic journey.

  • I have been a member of the school's debate team for three years.

  • I have also been actively involved in community service, volunteering at a local shelter.

  • I have played the piano for eight years and have performed in several school concerts.

  • I have participated in the school's annual science fair, presenting my own research project.

  • I have been a member of the school's drama club, performin...read more

Add your answer

Q43. what are all optimisation technique

Add your answer

Q44. How DHCP works?

Add your answer

Q45. Dynamic memory allocation in c

Ans.

Dynamic memory allocation in C allows for allocating memory at runtime, enabling flexibility in memory usage.

  • Use functions like malloc(), calloc(), and realloc() to allocate memory dynamically.

  • Remember to free the allocated memory using free() to prevent memory leaks.

  • Dynamic memory allocation is commonly used for creating arrays of unknown size or for resizing arrays during runtime.

Add your answer

Q46. How to design bookmyshow?

Add your answer

Q47. Fair Value Accounting of Investments

Ans.

Fair value accounting is a method used to measure and report the value of investments based on their current market prices.

  • Fair value accounting is used to provide more accurate and relevant information about the value of investments.

  • It involves measuring the value of investments based on their current market prices.

  • This method is used for both financial assets and liabilities.

  • Fair value accounting helps in assessing the performance and risk associated with investments.

  • It req...read more

Add your answer

Q48. Indexing in dbms

Ans.

Indexing in DBMS is a technique to improve the performance of database queries by creating a data structure that allows faster data retrieval.

  • Indexing involves creating an index on one or more columns of a table.

  • Indexes are used to speed up the search, sorting, and joining of data.

  • Types of indexes include B-tree, hash, bitmap, and clustered indexes.

  • Indexes can be created on primary keys, foreign keys, or frequently searched columns.

  • Example: Creating an index on the 'name' col...read more

Add your answer

Q49. Plans about higher studies

Ans.

I am planning to pursue a Master's degree in Computer Science.

  • I have researched various universities and programs that align with my career goals.

  • I am currently preparing for the required standardized tests.

  • I am also working on strengthening my application by gaining relevant work experience and participating in extracurricular activities.

  • I am open to both full-time and part-time programs, depending on my work commitments.

  • I am excited to continue learning and growing in my fi...read more

Add your answer

Q50. What is hashmap ?

Add your answer

Q51. Challenging project so far

Ans.

Designing a sustainable housing project in a remote area with limited resources

  • Overcoming logistical challenges such as transportation of materials

  • Finding innovative solutions for energy and water supply

  • Working closely with local community to ensure project sustainability

Add your answer

Q52. Race condition simulation

Ans.

Race condition simulation involves creating scenarios where multiple processes access shared resources simultaneously.

  • Use multithreading to simulate concurrent access to shared variables

  • Introduce delays or randomization to increase likelihood of race conditions

  • Monitor for unexpected behavior or data corruption

  • Example: Simulating multiple threads incrementing a shared counter without proper synchronization

Add your answer

Q53. design custom load balancers

Add your answer

Q54. system design on hackerrank

Add your answer

Q55. Design short url

Add your answer

More about working at Oracle

#22 Best Mega Company - 2022
#3 Best Internet/Product Company - 2022
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos

Interview Process at Microsoft Partner Network

based on 629 interviews
Interview experience
4.1
Good
View more
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Interview Questions from Similar Companies

4.0
 • 642 Interview Questions
3.8
 • 334 Interview Questions
4.0
 • 289 Interview Questions
3.6
 • 204 Interview Questions
4.0
 • 196 Interview Questions
4.3
 • 191 Interview Questions
View all
Top Oracle Interview Questions And Answers
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
75 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter