Add office photos
Employer?
Claim Account for FREE

Phenom

4.1
based on 331 Reviews
Filter interviews by

40+ The Oriental Insurance Co. Interview Questions and Answers

Updated 12 Nov 2024
Popular Designations

Q1. For Example: N Cards are placed, if you flip a card, the next card will get reversed. If we move left to right, how much time will it take to get all cards reversed- question based on time complexity?

Ans.

To reverse N cards, time complexity is O(N).

  • The time complexity to reverse N cards is O(N).

  • The algorithm needs to flip each card once, so the time complexity is linear.

  • The time it takes to reverse all cards is directly proportional to the number of cards.

  • For example, if there are 10 cards, it will take 10 flips to reverse all of them.

Add your answer

Q2. Explain the approach to any questions from round 1 & how it could be improved.

Ans.

Explaining approach to round 1 questions and suggestions for improvement.

  • I reviewed the questions and identified areas where I struggled or needed clarification.

  • I researched and practiced those topics to improve my understanding.

  • I also sought feedback from others who had experience with similar questions.

  • To improve, I suggest providing more context or examples in the questions.

  • It would also be helpful to provide feedback on areas where candidates commonly struggle.

Add your answer

Q3. Balanced Parentheses Combinations

Given an integer N representing the number of pairs of parentheses, find all the possible combinations of balanced parentheses using the given number of pairs.

Explanation:

Con...read more

Add your answer

Q4. Longest Unique Substring Problem Statement

Given a string input of length 'n', your task is to determine the length of the longest substring that contains no repeating characters.

Explanation:

A substring is a ...read more

Add your answer
Discover The Oriental Insurance Co. interview dos and don'ts from real experiences

Q5. Design a CRM tool for HR's and Job Seekers. with features like 1.Profile Management 2.Job Application Tracking 3.Job Posting and Searching 4.Scalable and Database Design 5.Handling large data base and latency

Ans.

A CRM tool for HR's and Job Seekers with features like Profile Management, Job Application Tracking, Job Posting and Searching, Scalable Database Design, and Handling large database and latency.

  • Implement user-friendly interface for profile management with options to update personal information, skills, and experience.

  • Create a dashboard for job seekers to track their job applications, including status updates and interview schedules.

  • Allow HR's to post job openings with detaile...read more

Add your answer

Q6. Count the number of subarrays in a given array whose sum is divisible by k.

Ans.

Count subarrays in an array whose sum is divisible by k.

  • Create a prefix sum array to keep track of the sum of elements up to a certain index.

  • Use a hash table to store the frequency of remainders when the prefix sum is divided by k.

  • For each prefix sum, check if there exists a previous prefix sum with the same remainder.

  • If yes, add the frequency of that remainder to the count of subarrays.

  • Update the frequency of the current remainder in the hash table.

  • Return the count of subarr...read more

Add your answer
Are these interview questions helpful?

Q7. DId you use Kubernetes and how do you tell kubernetes to have n number of instances up all the time?

Ans.

Yes, Kubernetes can be used to manage n number of instances by defining the desired number in the deployment configuration.

  • Define the desired number of instances in the 'replicas' field of the deployment configuration.

  • For example, setting 'replicas: 3' will ensure that Kubernetes maintains 3 instances of the application running at all times.

  • Kubernetes will automatically scale the number of instances up or down based on the defined replicas and resource availability.

Add your answer

Q8. How to find Path from Root to any node in Binary Tree

Ans.

To find the path from the root to any node in a binary tree, perform a depth-first search and keep track of the path taken.

  • Perform a depth-first search starting from the root node

  • Keep track of the path taken using a stack or array

  • When the target node is found, the path will be stored in the stack or array

Add your answer
Share interview questions and help millions of jobseekers 🌟

Q9. How to handle fault tolearnace ? Monitoring and logging using Prometheus, Grafana and ELK (elastic search,Logstash,Kibana). Ensure Redundancy and fail over mechanisms.

Ans.

Handling fault tolerance involves monitoring and logging with Prometheus, Grafana, and ELK, as well as implementing redundancy and failover mechanisms.

  • Implement health checks to monitor the status of services and applications

  • Set up alerts and notifications for abnormal behavior or failures

  • Use Prometheus for metric collection and Grafana for visualization of data

  • Utilize ELK stack for centralized logging and analysis of logs

  • Implement redundancy by having multiple instances of c...read more

Add your answer

Q10. Print all valid IP Addresses from a given input of strings.

Ans.

Print all valid IP Addresses from a given input of strings.

  • Split the input string into 4 parts and check if each part is a valid IP address component

  • Use regular expressions to validate each component

  • Use nested loops to generate all possible combinations of valid IP addresses

Add your answer

Q11. What is SingleTon and how to make it Non-Clonable

Ans.

Singleton is a design pattern that restricts the instantiation of a class to one object and provides a global point of access to that instance.

  • Ensure private constructor to prevent instantiation of multiple objects.

  • Provide a static method to access the single instance.

  • Use a static variable to hold the single instance.

  • Implement a private clone method to prevent cloning of the instance.

Add your answer

Q12. Integer to roman, sort an array containing only 0,1,2 in single iteration.

Ans.

Use two pointers to swap 0s to the beginning and 2s to the end while keeping 1s in the middle.

  • Initialize two pointers, one for 0s (left) and one for 2s (right).

  • Iterate through the array and swap 0s to the left pointer and 2s to the right pointer.

  • Example: Input array = ['2', '1', '0', '2', '1', '0'], Output array = ['0', '0', '1', '1', '2', '2']

Add your answer

Q13. Advantages of async and threading and their scope.

Ans.

Async and threading offer advantages in improving performance and responsiveness in software development.

  • Async allows for non-blocking operations, improving responsiveness by allowing other tasks to continue while waiting for a response.

  • Threading enables parallel execution of tasks, utilizing multiple CPU cores to improve performance.

  • Async is more suitable for I/O-bound operations, while threading is better for CPU-bound tasks.

  • Combining async and threading can maximize perfor...read more

Add your answer

Q14. 1. Product Prioritization 2. Fav product and why, what would you improve in that 3. Situational questions like what if one of the KPIs go down(usage for ex), how will you resolve it 4. When have you used data t...

read more
Ans.

Interview questions for Senior Product Analyst

  • For product prioritization, I use a combination of customer feedback, market trends, and business goals

  • My favorite product is XYZ because of its user-friendly interface and seamless integration with other tools. I would improve its reporting capabilities

  • If a KPI goes down, I would investigate the root cause and work with the team to come up with a plan to address it. For example, if usage is down, we could conduct user surveys to ...read more

Add your answer

Q15. Email Validation using Javascript

Ans.

Email validation can be done using regular expressions in JavaScript.

  • Use regex to check if email is in correct format

  • Check for presence of '@' and '.' in email

  • Ensure that there are no spaces in email

  • Validate email on both client and server side

Add your answer

Q16. Reverse a String using recursion.

Ans.

Reverse a string using recursion

  • Create a recursive function that takes a string as input

  • Base case: if the string is empty, return an empty string

  • Recursive case: return the last character of the string concatenated with the result of calling the function on the substring excluding the last character

Add your answer

Q17. What is the process followed to better engage with customers ?

Ans.

To better engage with customers, the process involves active listening, clear communication, personalized interactions, prompt responses, and continuous improvement.

  • Active listening: Paying attention to customer needs and concerns.

  • Clear communication: Using simple and concise language to avoid confusion.

  • Personalized interactions: Tailoring the support to meet individual customer requirements.

  • Prompt responses: Providing timely and efficient solutions.

  • Continuous improvement: Ga...read more

Add your answer

Q18. What troubleshooting tools were used by you earlier in your previous responsibility ?

Ans.

I have used various troubleshooting tools in my previous responsibility as a Technical Support Lead.

  • Network diagnostic tools like ping, traceroute, and nslookup

  • Remote desktop tools like TeamViewer and AnyDesk

  • System monitoring tools like Task Manager and Resource Monitor

  • Log analysis tools like Event Viewer and Log Parser

  • Hardware diagnostic tools like memtest86 and CPU-Z

  • Software debugging tools like Visual Studio Debugger and Xcode Instruments

Add your answer

Q19. How can swap the numbers without using the third variable

Ans.

To swap numbers without using a third variable, use arithmetic operations.

  • Add the two numbers to get the first number

  • Subtract the second number from the sum to get the second number

  • Subtract the original first number from the sum to get the original second number

Add your answer

Q20. What is the toughest challenge faced with customer in recent times

Ans.

The toughest challenge faced with customers in recent times is managing high call volumes and long wait times.

  • Managing high call volumes and long wait times

  • Ensuring timely resolution of customer issues

  • Maintaining customer satisfaction despite the challenges

  • Balancing workload and resources effectively

  • Implementing efficient call routing and queuing systems

  • Providing clear communication and updates to customers

Add your answer

Q21. Exchanging numbers without third variable

Ans.

To exchange numbers without a third variable, use addition and subtraction operations.

  • Add the two numbers to get the sum.

  • Subtract the first number from the sum to get the second number.

  • Subtract the second number from the sum to get the first number.

View 1 answer

Q22. Explain about Global interpreter lock.

Ans.

Global Interpreter Lock (GIL) is a mutex that protects access to Python objects, preventing multiple threads from executing Python bytecodes simultaneously.

  • GIL is a mechanism used in CPython to ensure that only one thread executes Python bytecode at a time.

  • It prevents multiple threads from executing Python code concurrently, which can cause issues with thread safety.

  • GIL can impact the performance of multi-threaded Python programs, as only one thread can execute Python code at...read more

Add your answer

Q23. Two sum leetcode model

Ans.

Given an array of integers, return indices of the two numbers such that they add up to a specific target.

  • Use a hashmap to store the difference between the target and each element as keys and their indices as values.

  • Iterate through the array and check if the current element's complement exists in the hashmap.

  • Return the indices of the two numbers that add up to the target.

Add your answer

Q24. How could you resolve the troubleshooting issues?

Ans.

I would resolve troubleshooting issues by following a systematic approach and utilizing my technical knowledge and problem-solving skills.

  • Identify the problem by gathering information from the user

  • Analyze the symptoms and possible causes

  • Perform diagnostic tests to narrow down the issue

  • Apply known solutions or troubleshoot step-by-step

  • Document the troubleshooting process and solution for future reference

  • Provide clear and concise instructions to the user

  • Follow up with the user ...read more

Add your answer

Q25. DBMS Locking exmple with a scenario

Ans.

DBMS locking is a mechanism to manage concurrent access to data in a database to prevent data corruption.

  • Locking is used to ensure data integrity and consistency in a multi-user environment.

  • Types of locks include shared locks, exclusive locks, and update locks.

  • Example scenario: Two users trying to update the same record simultaneously - one user gets an exclusive lock while the other waits.

  • Deadlocks can occur when two transactions are waiting for each other to release locks.

Add your answer

Q26. How to implement queue

Ans.

A queue can be implemented using arrays or linked lists. It follows the FIFO principle.

  • Create an empty array or linked list

  • Enqueue elements at the end of the queue

  • Dequeue elements from the front of the queue

  • Implement methods like isEmpty, isFull, peek, etc.

  • Example: Queue implemented using an array - https://www.geeksforgeeks.org/queue-set-1introduction-and-array-implementation/

Add your answer

Q27. Coding round - sort the list without builtin methods and in a optimised way - return list of palindromes in the given list - internship exp

Ans.

Sort list without built-in methods, return palindromes in array of strings

  • Implement quicksort algorithm to sort the list without using built-in methods

  • Iterate through the list and check if each element is a palindrome

  • Return a new list containing only the palindromes

Add your answer

Q28. Different ways to tackle data imbalances, missing data, etc.

Ans.

Various techniques like resampling, data augmentation, imputation, and ensemble methods can be used to tackle data imbalances and missing data.

  • Resampling techniques like oversampling (SMOTE) and undersampling can balance class distribution.

  • Data augmentation methods like generating synthetic data points can help in increasing the size of the minority class.

  • Imputation techniques like mean, median, mode imputation can be used to fill missing values.

  • Ensemble methods like Random F...read more

Add your answer

Q29. What is your expected CTC?

Ans.

I expect a competitive salary based on my experience, skills, and the responsibilities of the Technical Support Lead role.

  • I have researched the average salary range for Technical Support Lead positions in the industry.

  • I have considered my years of experience and expertise in technical support.

  • I have taken into account the level of responsibility and leadership required for the role.

  • I am open to negotiation based on the overall compensation package offered.

  • I am looking for a f...read more

Add your answer

Q30. Explain the design process with one of the portfolio projects

Ans.

Redesigning a mobile app for a seamless user experience

  • Conducted user research to identify pain points and user needs

  • Created wireframes and prototypes to visualize design concepts

  • Iterated on designs based on user feedback and usability testing

  • Collaborated with developers to ensure design feasibility

  • Final design focused on intuitive navigation and clean aesthetics

Add your answer

Q31. - reverse linked list - level order traversal - sorting

Ans.

Reverse linked list, level order traversal, and sorting are common algorithms in data structures and algorithms.

  • To reverse a linked list, iterate through the list and change the pointers to reverse the order.

  • For level order traversal, use a queue data structure to traverse the tree level by level.

  • Sorting can be done using various algorithms like bubble sort, quicksort, or mergesort.

Add your answer

Q32. LRU cache program

Ans.

LRU cache program is a data structure that stores the most recently used items.

  • LRU cache is typically implemented using a doubly linked list and a hashmap.

  • When a new item is accessed, it is moved to the front of the list.

  • If the cache is full, the least recently used item is removed from the end of the list.

  • Example: If the cache has a capacity of 3 and items A, B, C are accessed in that order, the cache will store C, B, A.

  • Example: If item B is accessed again, it will move to t...read more

Add your answer

Q33. what is the port number of sftp server

Ans.

The port number of sftp server is 22.

  • The default port number for sftp server is 22.

  • Port 22 is used for secure file transfer over SSH protocol.

  • It is important to ensure that port 22 is open and accessible for sftp connections.

Add your answer

Q34. explain about closures, currying, es features

Add your answer

Q35. Application support experience

Ans.

I have extensive experience in application support, including troubleshooting, maintenance, and upgrades.

  • I have worked with a variety of applications, including both custom-built and off-the-shelf software.

  • I am skilled in identifying and resolving issues, whether they are related to software bugs, user errors, or hardware problems.

  • I have experience with monitoring and maintaining application performance, including identifying and addressing bottlenecks and other issues.

  • I am f...read more

Add your answer

Q36. Different gradient optimizations.

Ans.

Different gradient optimization algorithms improve training efficiency in machine learning models.

  • Gradient Descent: Basic optimization algorithm that updates parameters in the opposite direction of the gradient.

  • Stochastic Gradient Descent (SGD): Updates parameters using a subset of training data at each iteration.

  • Mini-batch Gradient Descent: Combines features of both Gradient Descent and SGD by using a small batch of training data.

  • Adam: Adaptive Moment Estimation algorithm th...read more

Add your answer

Q37. What is hoisting in javascript

Ans.

Hoisting is a behavior in JavaScript where variable and function declarations are moved to the top of their containing scope during the compilation phase.

  • Variable declarations are hoisted to the top of their scope, but not their assignments.

  • Function declarations are fully hoisted, meaning they can be called before they are declared.

  • Hoisting can lead to unexpected behavior if not understood properly.

Add your answer

Q38. String match DP problem.

Ans.

String match DP problem involves finding the longest common subsequence between two strings.

  • Use dynamic programming to solve this problem efficiently.

  • Create a 2D array to store the lengths of common subsequences.

  • Iterate through the strings to fill the array and find the longest common subsequence.

  • Example: Given strings 'ABCD' and 'ACD', the longest common subsequence is 'ACD'.

Add your answer

Q39. CNNs vs MLP vs RNNs

Ans.

CNNs are used for image recognition, MLPs for simple classification tasks, and RNNs for sequential data like text or time series.

  • CNNs are best suited for image recognition tasks due to their ability to capture spatial dependencies.

  • MLPs are commonly used for simple classification tasks where the input features are independent of each other.

  • RNNs are ideal for sequential data like text or time series where the order of input data matters.

  • CNN example: Image classification tasks l...read more

Add your answer

Q40. what is vpc ?

Ans.

VPC stands for Virtual Private Cloud, a virtual network dedicated to a specific user in the cloud.

  • VPC allows users to create isolated networks within the cloud environment.

  • It provides control over network settings, such as IP address ranges, subnets, route tables, and network gateways.

  • VPC helps in securing resources by defining security groups and network access control lists (ACLs).

Add your answer

Q41. Projects in Deep learning

Add your answer

Q42. Rain water trapping problem

Ans.

Rain water trapping problem involves calculating the amount of rainwater that can be trapped between buildings or structures.

  • Calculate the maximum height of water that can be trapped at each point between two buildings.

  • Calculate the difference between the height of the building and the height of water at each point.

  • Sum up the differences to get the total amount of rainwater that can be trapped.

  • Example: Given heights of buildings [3, 0, 2, 0, 4], the amount of rainwater that c...read more

Add your answer
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos

Interview Process at The Oriental Insurance Co.

based on 39 interviews
Interview experience
4.2
Good
View more
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Interview Questions from Similar Companies

3.7
 • 2.8k Interview Questions
3.9
 • 733 Interview Questions
3.7
 • 419 Interview Questions
3.9
 • 268 Interview Questions
4.2
 • 223 Interview Questions
4.0
 • 158 Interview Questions
View all
Top Phenom Interview Questions And Answers
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
70 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter