Premium Employer

Societe Generale Global Solution Centre

3.9
based on 2.2k Reviews
Filter interviews by

100+ Interview Questions and Answers

Updated 22 Nov 2024
Popular Designations
Q1. Spiral Matrix

You are given a 2-D array 'MATRIX' of dimensions N x M, of integers. You need to return the spiral path of the matrix.

Example Of Spiral Path:

Spiral path of a matrix

Input Format:
The first line contains an integer 'T' ...read more
View 4 more answers
Q2. Common elements between array of strings

Given two 1-dimensional arrays containing strings of lowercase alphabets, print the elements that are common in both the arrays i.e. the strings that are present in both ...read more

View 4 more answers
Q3. Decimal to Octal Conversion

You are given a decimal number as input. You need to convert this number into its equivalent in the octal number system. The octal number system is the number system with a base value...read more

View 2 more answers
Q4. Cube of Matrix

Given an M x N sized 2D array 'MATRIX', return the (i * i + j * j) value for elements in which the sum of cube of digits of the element is equal to the element itself. Here, 'i' is the row number ...read more

View 3 more answers
Discover null interview dos and don'ts from real experiences

Q5. Which one is better - Java with DB or PL/SQL and why?

Ans.

Java with DB is better than PL/SQL as it offers more flexibility and scalability.

  • Java with DB allows for easier integration with other technologies

  • Java offers more advanced programming features than PL/SQL

  • Java with DB can handle larger and more complex data sets

  • PL/SQL is limited to Oracle databases only

  • Java with DB is more widely used and has a larger community for support

Add your answer

Q6. What is the difference between SQL and NoSQL? Why MongoDB and not MySQL .

Ans.

SQL is a relational database while NoSQL is non-relational. MongoDB is preferred for scalability and flexibility.

  • SQL is table-based while NoSQL is document-based

  • SQL is structured while NoSQL is unstructured

  • SQL is vertically scalable while NoSQL is horizontally scalable

  • MongoDB is preferred for its ability to handle large amounts of unstructured data and its flexibility in schema design

  • MySQL is preferred for its strong ACID compliance and well-established community support

Add your answer
Are these interview questions helpful?

Q7. What is a linked list ? How does it works in Java ?

Ans.

A linked list is a linear data structure where each element is a separate object with a pointer to the next element.

  • In Java, a linked list is implemented using the LinkedList class in the java.util package.

  • LinkedList class provides methods like add(), remove(), get(), etc. to manipulate the list.

  • Each element in the list is represented by a node object which contains the data and a reference to the next node.

  • Linked lists are useful when the size of the list is not known before...read more

Add your answer

Q8. Explain what is a deadlock ?how to avoid it ? What different algorithm are there.

Ans.

A deadlock is a situation where two or more processes are unable to proceed due to a circular dependency.

  • Deadlock occurs when two or more processes are waiting for each other to release resources.

  • To avoid deadlock, use techniques like resource allocation graph, banker's algorithm, and deadlock prevention.

  • Resource allocation graph is a visual representation of resource allocation and can help identify potential deadlocks.

  • Banker's algorithm is a resource allocation and deadlock...read more

Add your answer
Share interview questions and help millions of jobseekers 🌟

Q9. What is Counterparty Credit Risk? What is CVA and how is it calculated?

Ans.

Counterparty Credit Risk is the risk of loss due to a counterparty defaulting on a financial contract. CVA is the cost of this risk.

  • Counterparty Credit Risk is the risk that a party in a financial contract will default on their obligations.

  • CVA (Credit Valuation Adjustment) is the cost of this risk and is calculated as the difference between the risk-free portfolio value and the value of the portfolio with counterparty credit risk.

  • CVA takes into account the probability of defa...read more

Add your answer

Q10. Two tables are given, write the output for all types of JOINS.

Ans.

Answering types of JOINS for two given tables.

  • INNER JOIN: returns only matching rows from both tables

  • LEFT JOIN: returns all rows from left table and matching rows from right table

  • RIGHT JOIN: returns all rows from right table and matching rows from left table

  • FULL OUTER JOIN: returns all rows from both tables and NULL values where there is no match

  • CROSS JOIN: returns all possible combinations of rows from both tables

Add your answer

Q11. Are you familiar with oops concepts? Explain

Ans.

Yes, OOPs concepts are fundamental to object-oriented programming and include inheritance, encapsulation, abstraction, and polymorphism.

  • Inheritance allows a class to inherit properties and methods from a parent class.

  • Encapsulation is the practice of hiding data and methods within a class to prevent direct access.

  • Abstraction is the process of simplifying complex systems by breaking them down into smaller, more manageable parts.

  • Polymorphism allows objects to take on multiple fo...read more

Add your answer

Q12. What is dynamic SQL and how do you execute it?

Ans.

Dynamic SQL is a technique to generate SQL statements at runtime based on user input or other conditions.

  • Dynamic SQL is used to create flexible and customizable queries.

  • It allows for the creation of complex queries with multiple conditions.

  • Dynamic SQL can be executed using prepared statements or by concatenating strings.

  • It is important to properly sanitize user input to prevent SQL injection attacks.

Add your answer

Q13. Write a query to retrieve a particular value from the data

Ans.

Query to retrieve a particular value from data

  • Identify the table and column where the value is stored

  • Use SELECT statement with WHERE clause to filter the data

  • Specify the value to retrieve in the SELECT statement

Add your answer

Q14. Insertion & Deletion in Binary Tree involving all the cases along with Time & Space Complexity.

Ans.

Explanation of insertion and deletion in binary tree with time and space complexity.

  • Insertion: Traverse the tree to find the appropriate position and insert the new node. Time complexity: O(log n) for balanced tree, O(n) for skewed tree. Space complexity: O(1).

  • Deletion: Find the node to be deleted and replace it with its inorder successor or predecessor. Time complexity: O(log n) for balanced tree, O(n) for skewed tree. Space complexity: O(1).

  • Cases: Insertion - root node, lea...read more

Add your answer

Q15. Two tables are given and four outputs are given. Identify the type of join for each output.

Ans.

Identifying type of join for given outputs of two tables.

  • Inner join: returns only the matching rows from both tables.

  • Left join: returns all rows from left table and matching rows from right table.

  • Right join: returns all rows from right table and matching rows from left table.

  • Full outer join: returns all rows from both tables and matching rows from both tables.

Add your answer

Q16. How did you use database systems in your projects

Ans.

I have used database systems extensively in my projects.

  • Designed and implemented database schema for various applications

  • Used SQL queries to retrieve and manipulate data

  • Integrated databases with web applications using ORM frameworks like Hibernate

  • Optimized database performance by indexing and query optimization

  • Implemented data migration scripts to move data between databases

  • Used NoSQL databases like MongoDB for scalable and flexible data storage

Add your answer

Q17. What are the types of triggers?

Ans.

Triggers are database objects that are used to automatically execute a response when a certain event occurs.

  • DML Triggers

  • DDL Triggers

  • Logon Triggers

  • CLR Triggers

  • INSTEAD OF Triggers

Add your answer

Q18. What are the documents delivered by a BA in a data migration project?

Ans.

BA delivers various documents in a data migration project.

  • Requirements document

  • Data mapping document

  • Data quality report

  • Test cases and test results

  • User acceptance testing (UAT) plan

  • Training materials

  • Data migration plan

Add your answer

Q19. What is the difference between BDD and TDD? Elaborate with examples

Ans.

BDD focuses on behavior while TDD focuses on testing.

  • BDD stands for Behavior Driven Development while TDD stands for Test Driven Development.

  • BDD emphasizes on the behavior of the system from the user's perspective.

  • TDD emphasizes on testing the code and ensuring it meets the requirements.

  • BDD uses natural language to describe the behavior of the system in scenarios.

  • TDD uses code to test the functionality of the system.

  • BDD involves collaboration between developers, testers, and ...read more

Add your answer

Q20. What is the difference between a user story and an epic?

Ans.

A user story is a small, specific requirement while an epic is a larger, more general requirement.

  • User stories are typically written from the perspective of the end user and describe a specific action or feature they need.

  • Epics are larger requirements that may encompass multiple user stories and often require more time and resources to complete.

  • User stories are often used in agile development to break down larger requirements into smaller, more manageable pieces.

  • Epics can be ...read more

Add your answer

Q21. What is VAR? What is SVAR? What is delta of short put? How vol affect the market? What is importance of Risk analysis ?

Ans.

VAR stands for Value at Risk, SVAR stands for Structural Vector Autoregression, delta of short put measures sensitivity of option price to changes in underlying asset price, volatility affects market by influencing pricing and risk perception, Risk analysis is important for identifying and managing potential risks.

  • VAR is a statistical measure used to quantify the level of financial risk within a firm or portfolio.

  • SVAR is a statistical technique used to analyze the impact of s...read more

Add your answer

Q22. Audit frameworks and standards you have worked with?

Ans.

I have worked with various audit frameworks and standards such as ISO 31000, COSO, and NIST.

  • ISO 31000 - international standard for risk management

  • COSO - framework for internal control

  • NIST - cybersecurity framework

  • Familiar with auditing principles and practices

  • Experience in conducting risk assessments and audits

Add your answer

Q23. How is Counterparty Credit Risk reduced or mitigated?

Ans.

Counterparty Credit Risk can be reduced or mitigated through various methods.

  • Performing credit checks on counterparties

  • Establishing credit limits for counterparties

  • Collateralizing transactions

  • Using netting agreements

  • Diversifying counterparties

  • Monitoring credit exposure regularly

Add your answer

Q24. What are ACID Properties ?

Ans.

ACID Properties are a set of properties that ensure database transactions are processed reliably.

  • ACID stands for Atomicity, Consistency, Isolation, and Durability.

  • Atomicity ensures that a transaction is treated as a single, indivisible unit of work.

  • Consistency ensures that a transaction brings the database from one valid state to another.

  • Isolation ensures that concurrent transactions do not interfere with each other.

  • Durability ensures that once a transaction is committed, it ...read more

Add your answer

Q25. Coding question - swap 2 numbers without using 3rd variable

Ans.

Swap 2 numbers without using a third variable

  • Use bitwise XOR operation to swap two numbers without using a third variable

  • Example: a = 5, b = 7. a = a XOR b, b = a XOR b, a = a XOR b

  • Ensure to handle edge cases like swapping same numbers or zero

Add your answer

Q26. Experience in doing audit, reporting and documentation?

Ans.

Yes, I have experience in audit, reporting and documentation.

  • I have conducted internal audits to ensure compliance with company policies and procedures.

  • I have prepared reports on audit findings and presented them to management.

  • I have maintained accurate documentation of audit results and corrective actions taken.

  • For example, in my previous role as a Risk Analyst, I conducted audits of vendor contracts and prepared reports on areas of potential risk.

  • I also maintained documenta...read more

Add your answer

Q27. What are the various methods of VaR calculation?

Ans.

VaR can be calculated using historical simulation, parametric method, and Monte Carlo simulation.

  • Historical simulation uses past data to estimate potential losses.

  • Parametric method assumes a normal distribution of returns and calculates VaR based on mean and standard deviation.

  • Monte Carlo simulation uses random sampling to simulate potential outcomes and estimate VaR.

  • Other methods include delta-normal method and extreme value theory.

  • The choice of method depends on the nature ...read more

Add your answer

Q28. What are the ceremonies in a Scrum delivery model?

Ans.

Scrum ceremonies include Sprint Planning, Daily Stand-up, Sprint Review, and Sprint Retrospective.

  • Sprint Planning - planning the work to be done in the upcoming sprint

  • Daily Stand-up - a daily meeting to discuss progress and plan for the day

  • Sprint Review - a meeting to review the work completed in the sprint

  • Sprint Retrospective - a meeting to reflect on the sprint and identify areas for improvement

Add your answer

Q29. How to work in pressurized environment. Handling priority production bugs

Ans.

To work in a pressurized environment and handle priority production bugs, one must prioritize tasks, communicate effectively, stay calm under pressure, and seek help when needed.

  • Prioritize tasks based on their impact on the production environment

  • Communicate effectively with team members and stakeholders to understand the urgency and impact of the bugs

  • Stay calm under pressure and avoid making hasty decisions

  • Break down complex problems into smaller, manageable tasks

  • Seek help fr...read more

Add your answer

Q30. What are monetary expectations?

Ans.

Monetary expectations refer to the amount of money an individual expects to earn or receive in a particular role or position.

  • Monetary expectations are often discussed during job interviews to ensure that both the employer and employee are on the same page regarding salary and benefits.

  • Factors that may influence monetary expectations include education, experience, industry standards, and cost of living.

  • For an Assistant Risk Manager position, monetary expectations may vary depe...read more

Add your answer

Q31. Explain overriding in PL/SQL

Ans.

Overriding in PL/SQL is the ability to define a subprogram in a child package that has the same name and signature as a subprogram in a parent package.

  • Overriding allows a child package to provide its own implementation of a subprogram that is already defined in a parent package.

  • The child subprogram must have the same name and signature as the parent subprogram.

  • The child subprogram can have a different implementation than the parent subprogram.

  • Overriding is useful for customiz...read more

Add your answer

Q32. Risk management process?

Ans.

Risk management process involves identifying, assessing, prioritizing, and mitigating risks to minimize their impact on an organization.

  • Identify potential risks

  • Assess the likelihood and impact of each risk

  • Prioritize risks based on their level of severity

  • Develop and implement strategies to mitigate or manage risks

  • Monitor and review the effectiveness of risk management strategies

  • Continuously improve the risk management process

  • Example: A company identifies the risk of a cyber at...read more

Add your answer

Q33. Explain formulae to calculate Expected Loss?

Ans.

Expected Loss formulae calculates the potential loss from credit risk.

  • Expected Loss = Probability of Default x Exposure at Default x Loss Given Default

  • Probability of Default is the likelihood of a borrower defaulting on a loan

  • Exposure at Default is the amount of money owed by the borrower at the time of default

  • Loss Given Default is the percentage of the Exposure at Default that is not recoverable

  • Expected Loss is used to estimate the potential loss from credit risk

  • It helps ban...read more

Add your answer

Q34. What are the main tenets of Basel 4?

Ans.

Basel 4 is a set of banking regulations that aim to strengthen the resilience of the banking sector.

  • Basel 4 introduces new capital requirements for banks

  • It includes a new standardized approach for credit risk

  • It also introduces a new output floor to limit the variability of risk-weighted assets

  • Basel 4 aims to improve the comparability and transparency of banks' risk-weighted assets

  • It also includes new requirements for market risk and operational risk

  • Basel 4 is expected to be i...read more

Add your answer

Q35. What do you mean by beta in an equity?

Ans.

Beta is a measure of a stock's volatility in relation to the overall market.

  • Beta is calculated by comparing the stock's returns to the returns of a benchmark index, usually the S&P 500.

  • A beta of 1 indicates that the stock's price will move in line with the market.

  • A beta greater than 1 indicates that the stock is more volatile than the market, while a beta less than 1 indicates that the stock is less volatile than the market.

  • Beta is used by investors to assess the risk of a st...read more

Add your answer

Q36. Main differences between Basel 3 and Basel 4?

Ans.

Basel 4 is an updated version of Basel 3 with stricter regulations and additional requirements.

  • Basel 4 includes new requirements for market risk, credit risk, and operational risk.

  • Basel 4 introduces a new standardized approach for measuring counterparty credit risk.

  • Basel 4 requires banks to hold more capital against their exposures.

  • Basel 4 also includes new disclosure requirements for banks.

  • Basel 4 is expected to be implemented gradually over the next few years.

Add your answer

Q37. Write a query using below data to find out last string from emp table?

Ans.

Query to find last string from emp table

  • Use the ORDER BY clause with DESC keyword to sort the table in descending order

  • Use the LIMIT keyword to limit the result to 1 row

  • Assuming the last string refers to the last row in the table

Add your answer

Q38. Spring boot create a stateless microservice write CRUD api explain how will you write what will you return

Ans.

I would use Spring Boot to create a stateless microservice with CRUD API, returning appropriate responses for each operation.

  • Use @RestController annotation to define RESTful endpoints

  • Implement methods for Create, Read, Update, and Delete operations using @PostMapping, @GetMapping, @PutMapping, @DeleteMapping annotations

  • Return appropriate HTTP status codes (e.g. 200 for successful operation, 404 for not found, 400 for bad request)

  • Return response entities with relevant data (e....read more

Add your answer

Q39. Given a list of string if number is even do plus 1 convert to odd else keep it as is and return the converted list , then write junit test cases

Ans.

Convert even numbers in a list of strings to odd by adding 1

  • Iterate through the list of strings and check if each element is a number

  • If the number is even, convert it to odd by adding 1

  • Return the modified list of strings

Add your answer

Q40. Do you know what is Spring boot?

Ans.

Spring Boot is a Java-based framework used for creating standalone, production-grade Spring-based applications.

  • Spring Boot simplifies the process of developing Spring applications by providing a set of default configurations.

  • It allows for easy deployment of applications by embedding the application server within the application itself.

  • Spring Boot includes features like auto-configuration, starter dependencies, and production-ready metrics.

  • Example: Creating a RESTful web servi...read more

Add your answer

Q41. What is the difference between PL SQL AND SQL?

Ans.

PL/SQL is a procedural language extension to SQL used for writing complex queries and programs.

  • SQL is used for querying and manipulating data in a database

  • PL/SQL is used for writing complex queries and programs

  • PL/SQL is a procedural language that extends SQL with programming constructs like loops and conditional statements

  • PL/SQL is used to create stored procedures, functions, and triggers in Oracle databases

Add your answer

Q42. 1) Working of concurrent hash map 2) Why method overloading is compile time polymorphism and method overriding is run time polymorphism

Ans.

Explanation of concurrent hash map and compile time vs run time polymorphism

  • Concurrent hash map allows multiple threads to access and modify the map concurrently without any external synchronization

  • Method overloading is compile time polymorphism as the decision of which method to call is made by the compiler at compile time based on the number and types of arguments passed

  • Method overriding is run time polymorphism as the decision of which method to call is made at runtime bas...read more

Add your answer

Q43. Project and audit experience?

Ans.

I have extensive project and audit experience in risk management.

  • Managed risk assessments for multiple projects and provided recommendations for risk mitigation.

  • Conducted internal audits to ensure compliance with company policies and procedures.

  • Collaborated with cross-functional teams to identify potential risks and develop risk management plans.

  • Developed and implemented risk management strategies to minimize potential losses.

  • Conducted regular risk assessments to identify eme...read more

Add your answer

Q44. What is Fat Tail Loss?

Ans.

Fat tail loss refers to the extreme losses that occur due to rare events with high impact.

  • Fat tail loss is a type of risk that is often overlooked because it is associated with rare events.

  • It is called 'fat tail' because the probability distribution of the event has a fatter tail than a normal distribution.

  • Examples of fat tail events include natural disasters, terrorist attacks, and financial market crashes.

  • Fat tail losses can have a significant impact on businesses and econo...read more

Add your answer

Q45. what is capital budgeting

Ans.

Capital budgeting is the process of planning and managing a firm's long-term investments.

  • Involves evaluating potential investments and deciding which ones to pursue

  • Considers factors such as cash flows, risks, and returns

  • Helps in determining the best allocation of resources for maximum profitability

  • Examples include building a new factory, purchasing equipment, or launching a new product

View 1 answer

Q46. what is diff betn delete truncate drop

Ans.

Delete removes specific rows from a table, truncate removes all rows from a table, and drop removes an entire table.

  • Delete is a DML command, while truncate and drop are DDL commands.

  • Delete can be rolled back, while truncate and drop cannot be rolled back.

  • Delete is slower than truncate and drop as it logs individual row deletions.

  • Delete can have a WHERE clause to specify conditions, while truncate and drop do not support conditions.

  • Example: DELETE FROM table_name WHERE conditi...read more

Add your answer

Q47. Difference between levered and unelevered beta

Ans.

Levered beta includes the impact of debt on a company's risk, while unlevered beta does not.

  • Levered beta measures a company's risk with debt included in the calculation.

  • Unlevered beta measures a company's risk without considering the impact of debt.

  • Levered beta is higher than unlevered beta for companies with debt.

  • Unlevered beta is useful for comparing the risk of companies with different capital structures.

Add your answer

Q48. Explain ACID properties

Ans.

ACID properties are a set of properties that guarantee reliability and consistency in database transactions.

  • Atomicity: All operations in a transaction are either completed successfully or not at all.

  • Consistency: Data is always in a valid state before and after a transaction.

  • Isolation: Transactions are isolated from each other until they are completed.

  • Durability: Once a transaction is committed, its changes are permanent and cannot be lost.

Add your answer

Q49. Explain Normalisation in DBMS

Ans.

Normalization in DBMS is the process of organizing data in a database to reduce redundancy and improve data integrity.

  • Normalization involves breaking down a database into smaller, more manageable tables.

  • It helps in reducing data redundancy by storing data in a structured manner.

  • Normalization ensures data integrity by minimizing data anomalies.

  • There are different normal forms like 1NF, 2NF, 3NF, BCNF, etc.

  • Example: In a database of students, instead of storing student details i...read more

Add your answer

Q50. Write code to count number of occurrences for every character in a word

Ans.

Code to count occurrences of each character in a word

  • Create an array of size 256 to store count of each character

  • Iterate through the word and increment count for each character

  • Print the count for each character

Add your answer

Q51. How to handle message related issues via Kubernetes!

Ans.

Message related issues in Kubernetes can be handled by troubleshooting network configurations, checking pod logs, and monitoring resource usage.

  • Troubleshoot network configurations to ensure proper communication between pods

  • Check pod logs for any error messages or issues related to message passing

  • Monitor resource usage to identify any bottlenecks or performance issues affecting message delivery

Add your answer

Q52. How hasmap works internally

Ans.

HashMap works internally by using a hash function to map keys to their corresponding values in an array of linked lists.

  • HashMap uses a hash function to determine the index of the key-value pair in the array.

  • Collisions can occur when multiple keys hash to the same index, which is resolved by using linked lists at each index.

  • When retrieving a value, the hash function is used to find the correct index and then the linked list is searched for the key.

  • HashMap dynamically resizes w...read more

Add your answer

Q53. Difference between parameterized and copy constructed

Ans.

Parameterized constructor accepts parameters to initialize an object, while copy constructor creates a new object by copying an existing object.

  • Parameterized constructor is used to initialize an object with specific values.

  • Copy constructor creates a new object by copying values from an existing object.

  • Example: Parameterized constructor - Car(int year, String model) { this.year = year; this.model = model; }

  • Example: Copy constructor - Car(Car otherCar) { this.year = otherCar.ye...read more

Add your answer

Q54. What is bond accounting

Ans.

Bond accounting refers to the process of recording and reporting the financial transactions related to bonds.

  • It involves tracking the issuance, interest payments, and maturity of bonds

  • It also includes calculating the amortization of bond premiums and discounts

  • Bond accounting is important for accurate financial reporting and compliance with accounting standards

  • Examples of bond accounting software include Bloomberg Terminal and Thomson Reuters Eikon

Add your answer

Q55. Explain Clean price and Dirty price

Ans.

Clean price is the price of a bond excluding accrued interest, while dirty price includes accrued interest.

  • Clean price is the price of a bond without any accrued interest

  • Dirty price is the price of a bond including accrued interest

  • Accrued interest is the interest that has accumulated on a bond since its last coupon payment

  • Clean price + accrued interest = dirty price

  • Dirty price is also known as the full or invoice price

Add your answer

Q56. What are difference between SQL and PL SQL

Ans.

SQL is a standard language for managing relational databases, while PL/SQL is a procedural language extension for SQL.

  • SQL is a standard language for querying and manipulating data in relational databases.

  • PL/SQL is a procedural language extension for SQL, allowing for more complex programming logic.

  • SQL is used for data manipulation and retrieval, while PL/SQL is used for writing stored procedures and functions.

  • SQL statements are executed one at a time, while PL/SQL blocks can ...read more

Add your answer

Q57. Diffence between correlated and non correlated subquary?

Ans.

Correlated subquery refers to a subquery that is dependent on the outer query, while non-correlated subquery can be executed independently.

  • Correlated subquery is executed for each row processed by the outer query, while non-correlated subquery is executed only once.

  • Correlated subquery is slower in performance compared to non-correlated subquery.

  • Example: SELECT * FROM table1 WHERE column1 = (SELECT MAX(column2) FROM table2 WHERE table1.id = table2.id)

Add your answer

Q58. add two linked list minimum cost path print all the nodes in a tree except the leaf nodes.

Ans.

The question asks for adding two linked lists, finding the minimum cost path, and printing all nodes in a tree except the leaf nodes.

  • To add two linked lists, traverse both lists simultaneously and add corresponding nodes.

  • To find the minimum cost path, use algorithms like Dijkstra's or A*.

  • To print all nodes in a tree except the leaf nodes, perform a depth-first traversal and print non-leaf nodes.

Add your answer

Q59. Write s query to find maximum salary from EMP?

Ans.

Query to find maximum salary from EMP

  • Use the MAX() function to find the maximum salary

  • Specify the column name for salary in the SELECT statement

  • Specify the table name and column name for salary in the FROM clause

Add your answer

Q60. Testing strategies and techniques

Ans.

Testing strategies and techniques are essential for ensuring software quality and identifying defects.

  • Testing strategies include black box, white box, and gray box testing

  • Techniques include unit testing, integration testing, and acceptance testing

  • Automation testing can improve efficiency and reduce human error

  • Exploratory testing can uncover unexpected defects

  • Risk-based testing prioritizes testing based on potential impact

  • Regression testing ensures that changes do not introduc...read more

Add your answer

Q61. Do you know about CD/CI?

Ans.

CD/CI stands for Continuous Delivery/Continuous Integration, a software development practice to automate the process of testing and deploying code changes.

  • CD/CI is a software development practice that involves automating the process of testing and deploying code changes.

  • Continuous Integration (CI) involves automatically building and testing code changes as they are committed to the repository.

  • Continuous Delivery (CD) involves automatically deploying code changes to production...read more

Add your answer

Q62. How you can make added advantage to process

Ans.

By implementing automation and streamlining processes, added advantage can be achieved.

  • Identify bottlenecks and inefficiencies in the current process

  • Implement automation to reduce manual labor and increase efficiency

  • Streamline processes to reduce waste and improve productivity

  • Regularly review and optimize processes to ensure continued improvement

Add your answer

Q63. Where the abstraction implemented in your framework

Ans.

Abstraction is implemented in the framework through interfaces and base classes.

  • Abstraction is achieved through interfaces which define the contract for classes to implement.

  • Base classes provide common functionality that can be inherited by concrete classes.

  • Abstraction helps in decoupling the implementation details from the actual test cases.

  • Example: Interface 'ITestCase' defines methods like 'executeTest' which are implemented by classes like 'LoginTestCase'.

Add your answer

Q64. Explain the process of Change Management process from starting till end.

Ans.

Change management process involves planning, implementing, and monitoring changes to ensure successful outcomes.

  • Identify the need for change

  • Plan the change including scope, resources, and timeline

  • Communicate the change to stakeholders

  • Implement the change with proper training and support

  • Monitor and evaluate the change for effectiveness

  • Make adjustments as needed

  • Close the change management process with documentation

View 1 answer

Q65. Integration between Apache and WebLogic, IHS and WebSphere

Add your answer

Q66. what KPIs would be used for unbalanced datasets

Ans.

KPIs for unbalanced datasets include precision, recall, F1 score, ROC AUC, and confusion matrix.

  • Precision: measures the proportion of true positive predictions among all positive predictions

  • Recall: measures the proportion of true positive predictions among all actual positive instances

  • F1 score: balances precision and recall into a single metric

  • ROC AUC: measures the area under the receiver operating characteristic curve

  • Confusion matrix: provides a breakdown of true positive, f...read more

Add your answer

Q67. What are Solid principles

Ans.

SOLID principles are a set of five design principles that help make software designs more understandable, flexible, and maintainable.

  • Single Responsibility Principle (SRP) - A class should have only one reason to change.

  • Open/Closed Principle (OCP) - Software entities should be open for extension but closed for modification.

  • Liskov Substitution Principle (LSP) - Objects of a superclass should be replaceable with objects of its subclasses without affecting the functionality.

  • Inter...read more

Add your answer

Q68. what is indices

Ans.

Indices are statistical measures used to track the performance of a specific group of assets or market.

  • Indices are used to provide a snapshot of the overall market or a specific sector.

  • They are often used as benchmarks for investment performance.

  • Examples include the S&P 500, Dow Jones Industrial Average, and NASDAQ Composite.

Add your answer

Q69. What is the logic for merge sort What is inheritance

Ans.

Merge sort is a divide and conquer algorithm that sorts an array by dividing it into two halves, sorting them separately, and then merging the sorted halves.

  • Divide the unsorted list into n sublists, each containing one element

  • Repeatedly merge sublists to produce new sorted sublists until there is only one sublist remaining

  • Merge operation involves comparing elements from two sublists and adding the smaller one to the final sorted list

  • Example: [38, 27, 43, 3, 9, 82, 10] -> [3, ...read more

Add your answer

Q70. Difference between 2 way and 3 way merge sort

Ans.

2 way merge sort involves splitting the array into 2 parts and merging them, while 3 way merge sort involves splitting the array into 3 parts and merging them.

  • 2 way merge sort splits the array into 2 parts and merges them recursively.

  • 3 way merge sort splits the array into 3 parts and merges them recursively.

  • 2 way merge sort has a time complexity of O(n log n), same as 3 way merge sort.

Add your answer

Q71. Uses cases about kubernetes docker

Ans.

Kubernetes and Docker are popular tools for containerization and orchestration of applications.

  • Kubernetes is a container orchestration platform that automates the deployment, scaling, and management of containerized applications.

  • Docker is a containerization platform that allows developers to package applications and their dependencies into a standardized unit for software development.

  • Use cases for Kubernetes and Docker include microservices architecture, continuous integratio...read more

Add your answer

Q72. Write a program on number pattern

Ans.

Program to print number pattern

  • Use nested loops to print the pattern

  • The outer loop controls the number of rows

  • The inner loop controls the number of columns

  • Use conditional statements to determine the pattern

Add your answer

Q73. Different types of financial instrument

Ans.

Financial instruments are assets that can be traded, such as stocks, bonds, derivatives, and currencies.

  • Stocks: Represent ownership in a company and can be bought and sold on stock exchanges.

  • Bonds: Represent debt owed by a company or government and pay interest to the bondholder.

  • Derivatives: Financial contracts whose value is derived from the performance of an underlying asset, index, or interest rate.

  • Currencies: Used for trading and investment purposes in the foreign exchang...read more

Add your answer

Q74. What values shall you bring to table?

Ans.

I bring a strong sense of ethics, a commitment to excellence, and a collaborative approach to problem-solving.

  • Strong sense of ethics: I prioritize doing what is right and ethical, even when it may be difficult or unpopular.

  • Commitment to excellence: I strive to deliver high-quality work and continuously improve my skills and knowledge.

  • Collaborative approach: I believe in working closely with others to find the best solutions to complex problems. I value diverse perspectives an...read more

Add your answer

Q75. Desing a secure rest API

Ans.

Designing a secure REST API involves implementing authentication, authorization, encryption, and input validation.

  • Use HTTPS to encrypt data in transit

  • Implement OAuth or JWT for authentication and authorization

  • Validate and sanitize input to prevent injection attacks

  • Limit access to sensitive data with role-based access control

Add your answer

Q76. Preorder of tree

Ans.

Preorder traversal of a tree visits the root node first, then recursively visits the left subtree and right subtree.

  • Start at the root node

  • Visit the root node

  • Recursively traverse the left subtree

  • Recursively traverse the right subtree

Add your answer

Q77. Explain Trade Life Cycle

Ans.

Trade Life Cycle is the process of a trade from initiation to settlement.

  • Trade initiation

  • Order routing

  • Execution

  • Confirmation

  • Clearing and settlement

  • Trade reporting

View 1 answer

Q78. What you know about Trade Life Cycle

Ans.

Trade life cycle refers to the stages involved in a trade from initiation to settlement.

  • Trade initiation: Trade is proposed and agreed upon by parties involved.

  • Trade execution: Trade is executed on the exchange or over-the-counter market.

  • Trade confirmation: Parties confirm the details of the trade.

  • Trade settlement: Payment and transfer of securities occur to complete the trade.

  • Trade reconciliation: Any discrepancies are resolved post-settlement.

Add your answer

Q79. Explain your architecture proposal low level design

Ans.

The low level design of my architecture proposal focuses on detailed components and interactions.

  • Detailed breakdown of system components and their interactions

  • Specific technologies and tools used for implementation

  • Data flow diagrams and sequence diagrams for each component

  • Error handling and recovery mechanisms

  • Scalability and performance considerations

Add your answer

Q80. Name two authors from the literary movement in France

Ans.

Gustave Flaubert and Emile Zola are two prominent authors from the literary movement in France.

  • Gustave Flaubert is known for his novel 'Madame Bovary' which is considered a masterpiece of realism.

  • Emile Zola is famous for his series of novels called 'Les Rougon-Macquart' which explores the impact of heredity and environment on characters.

Add your answer

Q81. Toughest Project Handled

Ans.

Developing a real-time monitoring system for a large-scale financial trading platform

  • Implemented complex algorithms to analyze market data in real-time

  • Designed a scalable architecture to handle high volume of transactions

  • Worked closely with traders and analysts to understand requirements and make necessary adjustments

  • Managed a team of developers to ensure project milestones were met

Add your answer

Q82. Explain Fixed Income Securities.

Ans.

Fixed income securities are debt instruments that pay a fixed interest rate over a specific period of time.

  • Fixed income securities are also known as bonds.

  • They are issued by governments, corporations, and other entities to raise capital.

  • Investors receive regular interest payments until the bond matures, at which point they receive the principal amount.

  • The interest rate on fixed income securities is determined by the creditworthiness of the issuer and the prevailing market int...read more

Add your answer

Q83. Type of customer and documents

Ans.

Different types of customers may require different types of documents for analysis.

  • Different types of customers may include individual consumers, businesses, government agencies, etc.

  • Documents required for analysis may include financial statements, invoices, contracts, market research reports, etc.

  • Understanding the type of customer and the documents they provide is crucial for accurate analysis.

Add your answer

Q84. How many joins are in SQL?

Ans.

The number of joins in SQL can vary depending on the complexity of the query.

  • The number of joins in SQL can range from 0 (no joins) to multiple joins in a single query.

  • Common types of joins include INNER JOIN, LEFT JOIN, RIGHT JOIN, and FULL JOIN.

  • Joins are used to combine rows from two or more tables based on a related column between them.

  • Example: SELECT * FROM table1 INNER JOIN table2 ON table1.id = table2.id;

Add your answer

Q85. Fundamentals of .netcore

Ans.

Fundamentals of .NET Core include cross-platform compatibility, high performance, and open-source framework.

  • Cross-platform compatibility allows .NET Core applications to run on Windows, macOS, and Linux.

  • High performance is achieved through features like just-in-time compilation and efficient memory management.

  • Open-source framework encourages community contributions and rapid development.

  • Support for modern development practices like microservices and containerization.

Add your answer

Q86. Different functions of Investment Bank.

Ans.

Investment banks perform various functions such as underwriting, M&A advisory, sales and trading, research, and asset management.

  • Underwriting: helping companies issue securities and managing the process of selling them to investors

  • M&A advisory: advising companies on mergers and acquisitions

  • Sales and trading: buying and selling securities on behalf of clients

  • Research: providing analysis and recommendations on companies and industries

  • Asset management: managing investment portfo...read more

Add your answer

Q87. what is polymorphism

Ans.

Polymorphism is the ability of an object to take on many forms. It allows objects of different classes to be treated as the same type.

  • Polymorphism is a fundamental concept in object-oriented programming.

  • It allows a single interface to be used for different types of objects.

  • Polymorphism is achieved through method overriding and method overloading.

  • Example: A parent class Animal can have multiple child classes like Dog, Cat, and Bird. They can all be treated as Animals.

  • Polymorph...read more

Add your answer

Q88. Corporate action and its types explain

Ans.

Corporate actions are events initiated by a public company that impact its shareholders and securities.

  • Corporate actions can include dividends, stock splits, mergers, acquisitions, spin-offs, and rights issues.

  • Dividends are payments made to shareholders from a company's profits.

  • Stock splits involve dividing existing shares into multiple shares to lower the price per share.

  • Mergers and acquisitions involve two companies combining or one company buying another.

  • Spin-offs involve ...read more

Add your answer

Q89. Square root of a number in log n time

Ans.

Using binary search, square root of a number can be found in log n time.

  • Choose a range for the square root

  • Use binary search to find the square root within the range

  • Adjust the range based on whether the guess is too high or too low

Add your answer

Q90. What do you know about SG GSC?

Ans.

SG GSC is a global technology and operations hub of Societe Generale, a French multinational investment bank.

  • SG GSC provides IT and operations support to Societe Generale's businesses worldwide.

  • It has a presence in India, Romania, and Canada.

  • The company offers services in areas such as application development, infrastructure management, and cybersecurity.

  • SG GSC has won several awards for its work in the IT and banking industry, including the NASSCOM Corporate Award for Excell...read more

Add your answer

Q91. What are the NAV cycle

Ans.

NAV cycle refers to the process of calculating the Net Asset Value of a mutual fund.

  • NAV cycle involves calculating the total value of a mutual fund's assets, subtracting liabilities, and dividing by the number of outstanding shares.

  • This process typically occurs at the end of each trading day to determine the fund's price per share.

  • NAV cycle helps investors understand the value of their investments in the mutual fund.

Add your answer

Q92. What is Regulatory Reporting

Ans.

Regulatory reporting is the process of submitting information to regulatory authorities to ensure compliance with laws and regulations.

  • Regulatory reporting involves providing detailed financial and operational information to regulatory bodies.

  • It is essential for ensuring transparency, accountability, and compliance with laws and regulations.

  • Examples include submitting financial statements to the SEC or reporting on capital adequacy to banking regulators.

Add your answer

Q93. explain joins types is joins

Ans.

Join types in SQL are used to combine rows from two or more tables based on a related column between them.

  • Inner join: returns only the matching rows from both tables

  • Left join: returns all rows from the left table and the matching rows from the right table

  • Right join: returns all rows from the right table and the matching rows from the left table

  • Full outer join: returns all rows from both tables, including the unmatched rows

  • Cross join: returns the Cartesian product of both tabl...read more

Add your answer

Q94. Data wrangling in R

Ans.

Data wrangling in R involves cleaning, transforming, and preparing data for analysis.

  • Use packages like dplyr and tidyr for data manipulation

  • Handle missing values using functions like na.omit() or complete.cases()

  • Reshape data using functions like gather() and spread()

  • Use regular expressions to extract and manipulate text data

  • Visualize data using ggplot2 package

Add your answer

Q95. Whatvis the challennging situation

Ans.

The challenging situation is managing a team with conflicting personalities and work styles.

  • Identify each team member's strengths and weaknesses

  • Encourage open communication and collaboration

  • Set clear expectations and goals for the team

  • Address conflicts promptly and constructively

  • Provide opportunities for team building and bonding activities

Add your answer

Q96. Culture difference between india and France

Ans.

India and France have significant cultural differences in terms of language, cuisine, traditions, and social norms.

  • Language: India has hundreds of languages and dialects, while France primarily speaks French.

  • Cuisine: Indian cuisine is known for its use of spices and vegetarian dishes, while French cuisine is famous for its cheeses, wines, and pastries.

  • Traditions: India has a rich history of festivals and rituals, while France is known for its art, fashion, and literature.

  • Soci...read more

Add your answer

Q97. Features of latest version of c sharp

Ans.

C# 9.0 introduces new features like records, init-only setters, and top-level statements.

  • Records provide a concise syntax for defining immutable types.

  • Init-only setters allow setting properties only during object initialization.

  • Top-level statements allow writing code without a class or namespace.

  • Improved pattern matching with logical patterns and relational patterns.

  • Function pointers and improved support for native interop.

  • New target-typed expressions and covariant returns.

  • So...read more

Add your answer

Q98. How is command system network?

Ans.

Command system network is a centralized system that controls and coordinates various devices and processes.

  • Command system network typically consists of a central server or controller that communicates with multiple devices or subsystems.

  • It allows for centralized monitoring, control, and coordination of various processes or equipment.

  • Examples include industrial automation systems, smart home systems, and military command and control systems.

Add your answer

Q99. Implement an Hashset using Hashmap

Ans.

Implementing a Hashset using Hashmap

  • Create a Hashmap with the elements as keys and a dummy value as value

  • Use the keySet() method to get all the keys in the Hashmap and return them as a HashSet

Add your answer

Q100. Write an SQL query

Ans.

SQL query to retrieve all employees from a specific department

  • Use SELECT statement to retrieve data

  • Specify the columns to be selected

  • Use WHERE clause to filter by department

Add your answer
1
2
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos

Interview Process at null

based on 95 interviews in the last 1 year
Interview experience
4.1
Good
View more
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Interview Questions from Similar Companies

4.0
 • 683 Interview Questions
4.2
 • 310 Interview Questions
3.6
 • 195 Interview Questions
4.0
 • 148 Interview Questions
4.2
 • 135 Interview Questions
4.1
 • 133 Interview Questions
View all
Top Societe Generale Global Solution Centre Interview Questions And Answers
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
70 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions
Get AmbitionBox app

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter