PayU Payments
30+ Champ Info Software Interview Questions and Answers
Q1. Maximum Subarray Sum Problem Statement
Given an array arr
of length N
consisting of integers, find the sum of the subarray (including empty subarray) with the maximum sum among all subarrays.
Explanation:
A sub...read more
Find the sum of the subarray with the maximum sum among all subarrays in an array of integers.
Iterate through the array and keep track of the maximum sum subarray seen so far.
Use Kadane's algorithm to efficiently find the maximum subarray sum.
Consider the case where all elements in the array are negative.
Handle the case where the array contains only one element.
Q2. Zigzag Traversal of Binary Tree
Given a binary tree with integer values in its nodes, your task is to print the zigzag traversal of the tree.
Note:
In zigzag order, level 1 is printed from left to right, level ...read more
Implement a function to print the zigzag traversal of a binary tree.
Traverse the tree level by level, alternating the direction of traversal for each level.
Use a queue to keep track of nodes at each level.
Print the nodes in zigzag order as per the given pattern.
Q3. Alternate Positive and Negative Numbers
Given an array arr
that contains an equal number of positive and negative elements, rearrange the given array such that positive and negative numbers are arranged alterna...read more
Rearrange an array with equal positive and negative numbers alternatively while maintaining relative order.
Iterate through the array and separate positive and negative numbers into two separate arrays.
Merge the two arrays alternatively into the original array.
Ensure the relative order of positive and negative numbers is maintained.
Q4. Prime Numbers Identification
Given a positive integer N
, your task is to identify all prime numbers less than or equal to N
.
Explanation:
A prime number is a natural number greater than 1 that has no positive d...read more
Identify all prime numbers less than or equal to a given positive integer N.
Iterate from 2 to N and check if each number is prime
Use the Sieve of Eratosthenes algorithm for better efficiency
Optimize by only checking up to the square root of N for divisors
Q5. Reverse Only Letters Problem Statement
You are given a string S
. The task is to reverse the letters of the string while keeping non-alphabet characters in their original position.
Example:
Input:
S = "a-bcd"
Ou...read more
Reverse the letters of a string while keeping non-alphabet characters in their original position.
Iterate through the string and store the non-alphabet characters in their original positions
Reverse the letters of the string using two pointers technique
Combine the reversed letters with the non-alphabet characters to get the final reversed string
Design a URL shortener with database and necessary components
Use a unique identifier for each URL to generate short links
Store the original URL and corresponding short link in a database
Implement a redirect mechanism to redirect short links to original URLs
Consider implementing analytics to track usage and performance
Ensure scalability and reliability of the system
A locator in Selenium is used to identify web elements on a web page. There are different types of locators like ID, class name, xpath, etc.
Locators are used to find and interact with web elements on a web page
Some common types of locators in Selenium are ID, class name, xpath, CSS selector, name, tag name, link text, and partial link text
Each locator type has its own syntax and usage, for example, ID locator uses 'id=' followed by the element's ID attribute value
DBMS was used to store and manage data in the project, handled problems by optimizing queries and database design.
Used DBMS to store and manage project data efficiently
Optimized queries for better performance
Designed database schema to handle data effectively
Resolved concurrency issues by implementing proper locking mechanisms
Q9. What are the different types of microservices that are commonly utilized?
Common types of microservices include API gateways, service discovery, and event-driven architecture.
API gateways: Acts as a single entry point for multiple microservices, handling authentication, routing, and load balancing.
Service discovery: Allows microservices to find and communicate with each other dynamically, without hardcoding IP addresses.
Event-driven architecture: Microservices communicate through events, enabling loosely coupled systems and scalability.
Caching micr...read more
Manual testing is done by humans, while automated testing is done using tools and scripts.
Manual testing involves testers executing test cases manually without the use of automation tools.
Automated testing involves using tools and scripts to execute test cases automatically.
Manual testing is time-consuming and prone to human error, while automated testing is faster and more reliable.
Manual testing is suitable for exploratory testing and ad-hoc testing, while automated testing...read more
Q11. What types of IT Service Management (ITSM) tools are available?
ITSM tools are software solutions that help organizations manage and optimize their IT services.
Incident management tools
Change management tools
Problem management tools
Asset management tools
Service catalog tools
Service desk tools
Q12. Which dashboards do you use for monitoring purposes?
I use Grafana and Kibana dashboards for monitoring purposes.
Grafana is used for visualizing time series data and monitoring metrics.
Kibana is used for analyzing and visualizing logs and other time-series data.
A test automation framework consists of different parts like libraries, tools, and guidelines to support automated testing.
Libraries: reusable code modules for common functions like data manipulation, assertions, and interactions with the application under test
Tools: software programs used to create, execute, and manage automated tests, such as Selenium, Appium, or JUnit
Guidelines: best practices and standards for writing test scripts, organizing test cases, and reporting tes...read more
Q14. What are joins in SQL, and how do they function?
Joins in SQL are used to combine rows from two or more tables based on a related column between them.
Joins are used to retrieve data from multiple tables based on a related column.
Common types of joins include INNER JOIN, LEFT JOIN, RIGHT JOIN, and FULL JOIN.
INNER JOIN returns rows when there is at least one match in both tables.
LEFT JOIN returns all rows from the left table and the matched rows from the right table.
RIGHT JOIN returns all rows from the right table and the mat...read more
Q15. What is the maximum salary in the employee table?
The maximum salary in the employee table can be found by querying the database for the highest salary value.
Query the employee table for the maximum salary using SQL: SELECT MAX(salary) FROM employee;
Check for any outliers or errors in the salary data before determining the maximum value.
Consider any potential bonuses or additional compensation that may affect the salary values.
Q16. What are the different types of VLOOKUP formulas?
VLOOKUP formulas are used in Excel to search for a value in a table and return a corresponding value from another column.
VLOOKUP with exact match: =VLOOKUP(lookup_value, table_array, col_index_num, FALSE)
VLOOKUP with approximate match: =VLOOKUP(lookup_value, table_array, col_index_num, TRUE)
VLOOKUP with wildcard characters: =VLOOKUP(CONCATENATE('*', lookup_value, '*'), table_array, col_index_num, FALSE)
Q17. What types of APIs have you used?
I have used RESTful APIs, SOAP APIs, and GraphQL APIs in my previous projects.
RESTful APIs: Used for creating, updating, reading, and deleting resources over HTTP.
SOAP APIs: Used for exchanging structured information in the implementation of web services.
GraphQL APIs: Used for querying specific data requirements and receiving a predictable response.
Q18. what is regularisation
Regularisation is a technique used in machine learning to prevent overfitting by adding a penalty term to the loss function.
Regularisation helps to control the complexity of a model and reduce the impact of irrelevant features.
It adds a penalty term to the loss function, which encourages the model to have smaller weights.
There are different types of regularisation techniques such as L1 (Lasso) and L2 (Ridge) regularisation.
L1 regularisation can lead to sparse models by settin...read more
Q19. How does current work helps solving use cases for PayU
My current work involves analyzing transaction data to identify patterns and trends, which can help PayU optimize their payment processing services.
Analyzing transaction data to identify fraudulent activities and improve security measures for PayU
Developing predictive models to forecast transaction volumes and optimize payment processing times
Utilizing machine learning algorithms to personalize user experiences and increase customer satisfaction
Collaborating with cross-functi...read more
Q20. What type of database is used?
The type of database used is a relational database management system (RDBMS).
Uses tables to store data
Supports SQL for querying and managing data
Examples include MySQL, PostgreSQL, Oracle
Q21. What is aml how cdd and edd are conducted
AML stands for Anti-Money Laundering. CDD (Customer Due Diligence) and EDD (Enhanced Due Diligence) are processes conducted to identify and verify customers to prevent money laundering and terrorist financing.
AML is a set of regulations and procedures designed to prevent money laundering and terrorist financing.
CDD involves verifying the identity of customers, assessing their risk level, and monitoring their transactions.
EDD is conducted for high-risk customers and involves g...read more
Q22. What is precision and recall
Precision and recall are two important metrics used to evaluate the performance of a classification model.
Precision measures the proportion of true positives among all the predicted positives.
Recall measures the proportion of true positives among all the actual positives.
Precision and recall are inversely related and a trade-off exists between them.
A high precision means that the model is good at predicting positive cases, while a high recall means that the model is good at i...read more
Q23. Deep dive into java concepts. Max diameter of a tree in java.
Max diameter of a tree in Java is the longest path between any two nodes in a tree.
The diameter of a tree can be calculated by finding the longest path between any two nodes in the tree.
This can be done by finding the longest path from the root to a leaf node, and then finding the longest path from another leaf node to the root.
The sum of these two paths gives the diameter of the tree.
Q24. What is rnn and lstm
RNN stands for Recurrent Neural Network and LSTM stands for Long Short-Term Memory. They are types of neural networks used for sequential data processing.
RNN is a type of neural network that can process sequential data by maintaining a memory of past inputs.
LSTM is a type of RNN that can handle the vanishing gradient problem and can remember long-term dependencies.
LSTM has gates that control the flow of information into and out of the memory cell.
Both RNN and LSTM are commonl...read more
Cross-browser testing is the process of testing a website or web application across different web browsers to ensure consistent functionality and appearance.
Ensures compatibility with various browsers such as Chrome, Firefox, Safari, and Internet Explorer
Identifies and fixes any issues related to browser-specific behaviors
Helps in delivering a seamless user experience across different platforms
Uses tools like Selenium, BrowserStack, and CrossBrowserTesting for automated testi...read more
Q26. Connect master and slave instances of a DB in spring boot project
Use Spring Boot configuration to connect master and slave instances of a DB
Configure multiple data sources in application.properties or application.yml file
Use @Primary annotation for the master data source and @Qualifier annotation for the slave data source
Define separate DataSource, JdbcTemplate, and EntityManager beans for each data source
Use @Transactional annotation with the appropriate data source to specify which database to use for transactions
Q27. Lazy loading and eager loading in Java in context of Singleton class
Lazy loading defers the initialization of an object until it is actually needed, while eager loading initializes the object immediately.
Lazy loading is commonly used in Singleton pattern to delay the creation of the instance until it is requested.
Eager loading initializes the Singleton instance at the time of class loading.
Lazy loading can help improve performance by only creating the instance when needed, while eager loading can lead to higher memory consumption.
Example: Laz...read more
Q28. WHAT IS OOPS, INHERITANCE, STATIC DYNAMIC BINDING
OOPS is Object-Oriented Programming, Inheritance is the ability of a class to inherit properties and behavior from another class, Static Binding is resolved at compile time, Dynamic Binding is resolved at runtime.
OOPS stands for Object-Oriented Programming, which is a programming paradigm based on the concept of objects.
Inheritance is a feature in OOP that allows a class to inherit properties and behavior from another class.
Static Binding is also known as early binding, where...read more
XPath is a query language used to navigate through XML documents and locate elements based on their attributes or structure.
XPath stands for XML Path Language.
It is used to select nodes or elements in an XML document.
XPath uses path expressions to navigate through the document tree.
Examples: //div[@class='example'] selects all div elements with class 'example'.
Examples: /bookstore/book[1] selects the first book element under the bookstore element.
Q30. Check if paranthesis are balanced or not
To check if parentheses are balanced, use a stack data structure to keep track of opening and closing parentheses.
Use a stack to push opening parentheses and pop when encountering a closing parenthesis
If stack is empty when encountering a closing parenthesis, return false
After iterating through all parentheses, if stack is empty, return true
Q31. Right view of a Binary Search tree
The right view of a Binary Search Tree shows the nodes that are visible when viewing the tree from the right side.
The right view of a Binary Search Tree includes the rightmost node at each level.
Nodes at each level that are not visible from the right side are not included in the right view.
Example: For the Binary Search Tree with values 1, 2, 3, 4, 5, the right view would be 1, 3, 5.
Q32. What technologies you have worked on?
I have experience working with a variety of technologies including Java, Python, SQL, and AWS.
Java
Python
SQL
AWS
Q33. Global Exception handler in Spring boot
Global exception handler in Spring Boot handles all exceptions thrown by the application.
Global exception handler can be implemented using @ControllerAdvice annotation in Spring Boot.
It allows centralized exception handling for all controllers in the application.
You can define methods annotated with @ExceptionHandler to handle specific exceptions.
Global exception handler can return custom error responses or redirect to error pages.
Q34. Merge two sorted linked lists
Merge two sorted linked lists into a single sorted linked list
Create a new linked list to store the merged result
Iterate through both input linked lists and compare nodes to determine the order in which they should be added to the result list
Handle cases where one list is longer than the other
Q35. tell us some risks identified
Some risks identified include budget overruns, scope creep, resource constraints, and stakeholder conflicts.
Budget overruns: Potential for unexpected expenses exceeding the allocated budget.
Scope creep: Risk of project scope expanding beyond initial requirements.
Resource constraints: Possibility of not having enough resources (time, money, personnel) to complete the project.
Stakeholder conflicts: Risks associated with disagreements or conflicting interests among project stake...read more
Q36. What is api ?
API stands for Application Programming Interface. It is a set of rules and protocols that allows different software applications to communicate with each other.
APIs define the methods and data formats that applications can use to request and exchange information.
They allow developers to access the functionality of a system or service without needing to understand its internal workings.
Examples of APIs include Google Maps API for embedding maps in websites, Twitter API for acc...read more
Q37. What is rest api ?
REST API stands for Representational State Transfer Application Programming Interface. It is a set of rules and protocols for building and interacting with web services.
REST API is a type of web service that allows communication between different systems over the internet.
It uses standard HTTP methods like GET, POST, PUT, DELETE to perform operations on resources.
REST APIs typically return data in JSON or XML format.
They are stateless, meaning each request from a client to a ...read more
Q38. find the angle at 3:20
To find the angle at 3:20, we need to calculate the minute hand's position relative to the hour hand.
Calculate the angle made by the hour hand with the 12 o'clock position at 3:20 (20 minutes past 3)
Calculate the angle made by the minute hand with the 12 o'clock position at 3:20
Find the difference between the two angles to get the angle at 3:20
Q39. LCA in binary tree
LCA in binary tree refers to finding the lowest common ancestor of two nodes in a binary tree.
Start from the root and traverse down the tree to find the paths to the two nodes
Compare the paths to find the last common node between them, which is the LCA
If one of the nodes is the ancestor of the other, return that node as the LCA
Top HR Questions asked in Champ Info Software
Interview Process at Champ Info Software
Top Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month