Societe Generale Global Solution Centre
100+ Interview Questions and Answers
You are given a 2-D array 'MATRIX' of dimensions N x M, of integers. You need to return the spiral path of the matrix.
Example Of Spiral Path:
Input Format:
The first line contains an integer 'T' ...read more
Given two 1-dimensional arrays containing strings of lowercase alphabets, print the elements that are common in both the arrays i.e. the strings that are present in both ...read more
You are given a decimal number as input. You need to convert this number into its equivalent in the octal number system. The octal number system is the number system with a base value...read more
Given an M x N sized 2D array 'MATRIX', return the (i * i + j * j) value for elements in which the sum of cube of digits of the element is equal to the element itself. Here, 'i' is the row number ...read more
Q5. Which one is better - Java with DB or PL/SQL and why?
Java with DB is better than PL/SQL as it offers more flexibility and scalability.
Java with DB allows for easier integration with other technologies
Java offers more advanced programming features than PL/SQL
Java with DB can handle larger and more complex data sets
PL/SQL is limited to Oracle databases only
Java with DB is more widely used and has a larger community for support
Q6. What is the difference between SQL and NoSQL? Why MongoDB and not MySQL .
SQL is a relational database while NoSQL is non-relational. MongoDB is preferred for scalability and flexibility.
SQL is table-based while NoSQL is document-based
SQL is structured while NoSQL is unstructured
SQL is vertically scalable while NoSQL is horizontally scalable
MongoDB is preferred for its ability to handle large amounts of unstructured data and its flexibility in schema design
MySQL is preferred for its strong ACID compliance and well-established community support
Q7. What is a linked list ? How does it works in Java ?
A linked list is a linear data structure where each element is a separate object with a pointer to the next element.
In Java, a linked list is implemented using the LinkedList class in the java.util package.
LinkedList class provides methods like add(), remove(), get(), etc. to manipulate the list.
Each element in the list is represented by a node object which contains the data and a reference to the next node.
Linked lists are useful when the size of the list is not known before...read more
Q8. Explain what is a deadlock ?how to avoid it ? What different algorithm are there.
A deadlock is a situation where two or more processes are unable to proceed due to a circular dependency.
Deadlock occurs when two or more processes are waiting for each other to release resources.
To avoid deadlock, use techniques like resource allocation graph, banker's algorithm, and deadlock prevention.
Resource allocation graph is a visual representation of resource allocation and can help identify potential deadlocks.
Banker's algorithm is a resource allocation and deadlock...read more
Q9. What is Counterparty Credit Risk? What is CVA and how is it calculated?
Counterparty Credit Risk is the risk of loss due to a counterparty defaulting on a financial contract. CVA is the cost of this risk.
Counterparty Credit Risk is the risk that a party in a financial contract will default on their obligations.
CVA (Credit Valuation Adjustment) is the cost of this risk and is calculated as the difference between the risk-free portfolio value and the value of the portfolio with counterparty credit risk.
CVA takes into account the probability of defa...read more
Q10. Two tables are given, write the output for all types of JOINS.
Answering types of JOINS for two given tables.
INNER JOIN: returns only matching rows from both tables
LEFT JOIN: returns all rows from left table and matching rows from right table
RIGHT JOIN: returns all rows from right table and matching rows from left table
FULL OUTER JOIN: returns all rows from both tables and NULL values where there is no match
CROSS JOIN: returns all possible combinations of rows from both tables
Q11. Are you familiar with oops concepts? Explain
Yes, OOPs concepts are fundamental to object-oriented programming and include inheritance, encapsulation, abstraction, and polymorphism.
Inheritance allows a class to inherit properties and methods from a parent class.
Encapsulation is the practice of hiding data and methods within a class to prevent direct access.
Abstraction is the process of simplifying complex systems by breaking them down into smaller, more manageable parts.
Polymorphism allows objects to take on multiple fo...read more
Q12. What is dynamic SQL and how do you execute it?
Dynamic SQL is a technique to generate SQL statements at runtime based on user input or other conditions.
Dynamic SQL is used to create flexible and customizable queries.
It allows for the creation of complex queries with multiple conditions.
Dynamic SQL can be executed using prepared statements or by concatenating strings.
It is important to properly sanitize user input to prevent SQL injection attacks.
Q13. Write a query to retrieve a particular value from the data
Query to retrieve a particular value from data
Identify the table and column where the value is stored
Use SELECT statement with WHERE clause to filter the data
Specify the value to retrieve in the SELECT statement
Q14. Insertion & Deletion in Binary Tree involving all the cases along with Time & Space Complexity.
Explanation of insertion and deletion in binary tree with time and space complexity.
Insertion: Traverse the tree to find the appropriate position and insert the new node. Time complexity: O(log n) for balanced tree, O(n) for skewed tree. Space complexity: O(1).
Deletion: Find the node to be deleted and replace it with its inorder successor or predecessor. Time complexity: O(log n) for balanced tree, O(n) for skewed tree. Space complexity: O(1).
Cases: Insertion - root node, lea...read more
Q15. Two tables are given and four outputs are given. Identify the type of join for each output.
Identifying type of join for given outputs of two tables.
Inner join: returns only the matching rows from both tables.
Left join: returns all rows from left table and matching rows from right table.
Right join: returns all rows from right table and matching rows from left table.
Full outer join: returns all rows from both tables and matching rows from both tables.
Q16. How did you use database systems in your projects
I have used database systems extensively in my projects.
Designed and implemented database schema for various applications
Used SQL queries to retrieve and manipulate data
Integrated databases with web applications using ORM frameworks like Hibernate
Optimized database performance by indexing and query optimization
Implemented data migration scripts to move data between databases
Used NoSQL databases like MongoDB for scalable and flexible data storage
Q17. What are the types of triggers?
Triggers are database objects that are used to automatically execute a response when a certain event occurs.
DML Triggers
DDL Triggers
Logon Triggers
CLR Triggers
INSTEAD OF Triggers
Q18. What are the documents delivered by a BA in a data migration project?
BA delivers various documents in a data migration project.
Requirements document
Data mapping document
Data quality report
Test cases and test results
User acceptance testing (UAT) plan
Training materials
Data migration plan
Q19. What is the difference between BDD and TDD? Elaborate with examples
BDD focuses on behavior while TDD focuses on testing.
BDD stands for Behavior Driven Development while TDD stands for Test Driven Development.
BDD emphasizes on the behavior of the system from the user's perspective.
TDD emphasizes on testing the code and ensuring it meets the requirements.
BDD uses natural language to describe the behavior of the system in scenarios.
TDD uses code to test the functionality of the system.
BDD involves collaboration between developers, testers, and ...read more
Q20. What is the difference between a user story and an epic?
A user story is a small, specific requirement while an epic is a larger, more general requirement.
User stories are typically written from the perspective of the end user and describe a specific action or feature they need.
Epics are larger requirements that may encompass multiple user stories and often require more time and resources to complete.
User stories are often used in agile development to break down larger requirements into smaller, more manageable pieces.
Epics can be ...read more
Q21. What is VAR? What is SVAR? What is delta of short put? How vol affect the market? What is importance of Risk analysis ?
VAR stands for Value at Risk, SVAR stands for Structural Vector Autoregression, delta of short put measures sensitivity of option price to changes in underlying asset price, volatility affects market by influencing pricing and risk perception, Risk analysis is important for identifying and managing potential risks.
VAR is a statistical measure used to quantify the level of financial risk within a firm or portfolio.
SVAR is a statistical technique used to analyze the impact of s...read more
Q22. Audit frameworks and standards you have worked with?
I have worked with various audit frameworks and standards such as ISO 31000, COSO, and NIST.
ISO 31000 - international standard for risk management
COSO - framework for internal control
NIST - cybersecurity framework
Familiar with auditing principles and practices
Experience in conducting risk assessments and audits
Q23. How is Counterparty Credit Risk reduced or mitigated?
Counterparty Credit Risk can be reduced or mitigated through various methods.
Performing credit checks on counterparties
Establishing credit limits for counterparties
Collateralizing transactions
Using netting agreements
Diversifying counterparties
Monitoring credit exposure regularly
Q24. What are ACID Properties ?
ACID Properties are a set of properties that ensure database transactions are processed reliably.
ACID stands for Atomicity, Consistency, Isolation, and Durability.
Atomicity ensures that a transaction is treated as a single, indivisible unit of work.
Consistency ensures that a transaction brings the database from one valid state to another.
Isolation ensures that concurrent transactions do not interfere with each other.
Durability ensures that once a transaction is committed, it ...read more
Q25. Coding question - swap 2 numbers without using 3rd variable
Swap 2 numbers without using a third variable
Use bitwise XOR operation to swap two numbers without using a third variable
Example: a = 5, b = 7. a = a XOR b, b = a XOR b, a = a XOR b
Ensure to handle edge cases like swapping same numbers or zero
Q26. Experience in doing audit, reporting and documentation?
Yes, I have experience in audit, reporting and documentation.
I have conducted internal audits to ensure compliance with company policies and procedures.
I have prepared reports on audit findings and presented them to management.
I have maintained accurate documentation of audit results and corrective actions taken.
For example, in my previous role as a Risk Analyst, I conducted audits of vendor contracts and prepared reports on areas of potential risk.
I also maintained documenta...read more
Q27. What are the various methods of VaR calculation?
VaR can be calculated using historical simulation, parametric method, and Monte Carlo simulation.
Historical simulation uses past data to estimate potential losses.
Parametric method assumes a normal distribution of returns and calculates VaR based on mean and standard deviation.
Monte Carlo simulation uses random sampling to simulate potential outcomes and estimate VaR.
Other methods include delta-normal method and extreme value theory.
The choice of method depends on the nature ...read more
Q28. What are the ceremonies in a Scrum delivery model?
Scrum ceremonies include Sprint Planning, Daily Stand-up, Sprint Review, and Sprint Retrospective.
Sprint Planning - planning the work to be done in the upcoming sprint
Daily Stand-up - a daily meeting to discuss progress and plan for the day
Sprint Review - a meeting to review the work completed in the sprint
Sprint Retrospective - a meeting to reflect on the sprint and identify areas for improvement
Q29. How to work in pressurized environment. Handling priority production bugs
To work in a pressurized environment and handle priority production bugs, one must prioritize tasks, communicate effectively, stay calm under pressure, and seek help when needed.
Prioritize tasks based on their impact on the production environment
Communicate effectively with team members and stakeholders to understand the urgency and impact of the bugs
Stay calm under pressure and avoid making hasty decisions
Break down complex problems into smaller, manageable tasks
Seek help fr...read more
Q30. What are monetary expectations?
Monetary expectations refer to the amount of money an individual expects to earn or receive in a particular role or position.
Monetary expectations are often discussed during job interviews to ensure that both the employer and employee are on the same page regarding salary and benefits.
Factors that may influence monetary expectations include education, experience, industry standards, and cost of living.
For an Assistant Risk Manager position, monetary expectations may vary depe...read more
Q31. Explain overriding in PL/SQL
Overriding in PL/SQL is the ability to define a subprogram in a child package that has the same name and signature as a subprogram in a parent package.
Overriding allows a child package to provide its own implementation of a subprogram that is already defined in a parent package.
The child subprogram must have the same name and signature as the parent subprogram.
The child subprogram can have a different implementation than the parent subprogram.
Overriding is useful for customiz...read more
Q32. Risk management process?
Risk management process involves identifying, assessing, prioritizing, and mitigating risks to minimize their impact on an organization.
Identify potential risks
Assess the likelihood and impact of each risk
Prioritize risks based on their level of severity
Develop and implement strategies to mitigate or manage risks
Monitor and review the effectiveness of risk management strategies
Continuously improve the risk management process
Example: A company identifies the risk of a cyber at...read more
Q33. Explain formulae to calculate Expected Loss?
Expected Loss formulae calculates the potential loss from credit risk.
Expected Loss = Probability of Default x Exposure at Default x Loss Given Default
Probability of Default is the likelihood of a borrower defaulting on a loan
Exposure at Default is the amount of money owed by the borrower at the time of default
Loss Given Default is the percentage of the Exposure at Default that is not recoverable
Expected Loss is used to estimate the potential loss from credit risk
It helps ban...read more
Q34. What are the main tenets of Basel 4?
Basel 4 is a set of banking regulations that aim to strengthen the resilience of the banking sector.
Basel 4 introduces new capital requirements for banks
It includes a new standardized approach for credit risk
It also introduces a new output floor to limit the variability of risk-weighted assets
Basel 4 aims to improve the comparability and transparency of banks' risk-weighted assets
It also includes new requirements for market risk and operational risk
Basel 4 is expected to be i...read more
Q35. What do you mean by beta in an equity?
Beta is a measure of a stock's volatility in relation to the overall market.
Beta is calculated by comparing the stock's returns to the returns of a benchmark index, usually the S&P 500.
A beta of 1 indicates that the stock's price will move in line with the market.
A beta greater than 1 indicates that the stock is more volatile than the market, while a beta less than 1 indicates that the stock is less volatile than the market.
Beta is used by investors to assess the risk of a st...read more
Q36. Main differences between Basel 3 and Basel 4?
Basel 4 is an updated version of Basel 3 with stricter regulations and additional requirements.
Basel 4 includes new requirements for market risk, credit risk, and operational risk.
Basel 4 introduces a new standardized approach for measuring counterparty credit risk.
Basel 4 requires banks to hold more capital against their exposures.
Basel 4 also includes new disclosure requirements for banks.
Basel 4 is expected to be implemented gradually over the next few years.
Q37. Write a query using below data to find out last string from emp table?
Query to find last string from emp table
Use the ORDER BY clause with DESC keyword to sort the table in descending order
Use the LIMIT keyword to limit the result to 1 row
Assuming the last string refers to the last row in the table
Q38. Spring boot create a stateless microservice write CRUD api explain how will you write what will you return
I would use Spring Boot to create a stateless microservice with CRUD API, returning appropriate responses for each operation.
Use @RestController annotation to define RESTful endpoints
Implement methods for Create, Read, Update, and Delete operations using @PostMapping, @GetMapping, @PutMapping, @DeleteMapping annotations
Return appropriate HTTP status codes (e.g. 200 for successful operation, 404 for not found, 400 for bad request)
Return response entities with relevant data (e....read more
Q39. Given a list of string if number is even do plus 1 convert to odd else keep it as is and return the converted list , then write junit test cases
Convert even numbers in a list of strings to odd by adding 1
Iterate through the list of strings and check if each element is a number
If the number is even, convert it to odd by adding 1
Return the modified list of strings
Q40. Do you know what is Spring boot?
Spring Boot is a Java-based framework used for creating standalone, production-grade Spring-based applications.
Spring Boot simplifies the process of developing Spring applications by providing a set of default configurations.
It allows for easy deployment of applications by embedding the application server within the application itself.
Spring Boot includes features like auto-configuration, starter dependencies, and production-ready metrics.
Example: Creating a RESTful web servi...read more
Q41. What is the difference between PL SQL AND SQL?
PL/SQL is a procedural language extension to SQL used for writing complex queries and programs.
SQL is used for querying and manipulating data in a database
PL/SQL is used for writing complex queries and programs
PL/SQL is a procedural language that extends SQL with programming constructs like loops and conditional statements
PL/SQL is used to create stored procedures, functions, and triggers in Oracle databases
Q42. 1) Working of concurrent hash map 2) Why method overloading is compile time polymorphism and method overriding is run time polymorphism
Explanation of concurrent hash map and compile time vs run time polymorphism
Concurrent hash map allows multiple threads to access and modify the map concurrently without any external synchronization
Method overloading is compile time polymorphism as the decision of which method to call is made by the compiler at compile time based on the number and types of arguments passed
Method overriding is run time polymorphism as the decision of which method to call is made at runtime bas...read more
Q43. Project and audit experience?
I have extensive project and audit experience in risk management.
Managed risk assessments for multiple projects and provided recommendations for risk mitigation.
Conducted internal audits to ensure compliance with company policies and procedures.
Collaborated with cross-functional teams to identify potential risks and develop risk management plans.
Developed and implemented risk management strategies to minimize potential losses.
Conducted regular risk assessments to identify eme...read more
Q44. What is Fat Tail Loss?
Fat tail loss refers to the extreme losses that occur due to rare events with high impact.
Fat tail loss is a type of risk that is often overlooked because it is associated with rare events.
It is called 'fat tail' because the probability distribution of the event has a fatter tail than a normal distribution.
Examples of fat tail events include natural disasters, terrorist attacks, and financial market crashes.
Fat tail losses can have a significant impact on businesses and econo...read more
Q45. what is capital budgeting
Capital budgeting is the process of planning and managing a firm's long-term investments.
Involves evaluating potential investments and deciding which ones to pursue
Considers factors such as cash flows, risks, and returns
Helps in determining the best allocation of resources for maximum profitability
Examples include building a new factory, purchasing equipment, or launching a new product
Q46. what is diff betn delete truncate drop
Delete removes specific rows from a table, truncate removes all rows from a table, and drop removes an entire table.
Delete is a DML command, while truncate and drop are DDL commands.
Delete can be rolled back, while truncate and drop cannot be rolled back.
Delete is slower than truncate and drop as it logs individual row deletions.
Delete can have a WHERE clause to specify conditions, while truncate and drop do not support conditions.
Example: DELETE FROM table_name WHERE conditi...read more
Q47. Difference between levered and unelevered beta
Levered beta includes the impact of debt on a company's risk, while unlevered beta does not.
Levered beta measures a company's risk with debt included in the calculation.
Unlevered beta measures a company's risk without considering the impact of debt.
Levered beta is higher than unlevered beta for companies with debt.
Unlevered beta is useful for comparing the risk of companies with different capital structures.
Q48. Explain ACID properties
ACID properties are a set of properties that guarantee reliability and consistency in database transactions.
Atomicity: All operations in a transaction are either completed successfully or not at all.
Consistency: Data is always in a valid state before and after a transaction.
Isolation: Transactions are isolated from each other until they are completed.
Durability: Once a transaction is committed, its changes are permanent and cannot be lost.
Q49. Explain Normalisation in DBMS
Normalization in DBMS is the process of organizing data in a database to reduce redundancy and improve data integrity.
Normalization involves breaking down a database into smaller, more manageable tables.
It helps in reducing data redundancy by storing data in a structured manner.
Normalization ensures data integrity by minimizing data anomalies.
There are different normal forms like 1NF, 2NF, 3NF, BCNF, etc.
Example: In a database of students, instead of storing student details i...read more
Q50. Write code to count number of occurrences for every character in a word
Code to count occurrences of each character in a word
Create an array of size 256 to store count of each character
Iterate through the word and increment count for each character
Print the count for each character
Q51. How to handle message related issues via Kubernetes!
Message related issues in Kubernetes can be handled by troubleshooting network configurations, checking pod logs, and monitoring resource usage.
Troubleshoot network configurations to ensure proper communication between pods
Check pod logs for any error messages or issues related to message passing
Monitor resource usage to identify any bottlenecks or performance issues affecting message delivery
Q52. How hasmap works internally
HashMap works internally by using a hash function to map keys to their corresponding values in an array of linked lists.
HashMap uses a hash function to determine the index of the key-value pair in the array.
Collisions can occur when multiple keys hash to the same index, which is resolved by using linked lists at each index.
When retrieving a value, the hash function is used to find the correct index and then the linked list is searched for the key.
HashMap dynamically resizes w...read more
Q53. Difference between parameterized and copy constructed
Parameterized constructor accepts parameters to initialize an object, while copy constructor creates a new object by copying an existing object.
Parameterized constructor is used to initialize an object with specific values.
Copy constructor creates a new object by copying values from an existing object.
Example: Parameterized constructor - Car(int year, String model) { this.year = year; this.model = model; }
Example: Copy constructor - Car(Car otherCar) { this.year = otherCar.ye...read more
Q54. What is bond accounting
Bond accounting refers to the process of recording and reporting the financial transactions related to bonds.
It involves tracking the issuance, interest payments, and maturity of bonds
It also includes calculating the amortization of bond premiums and discounts
Bond accounting is important for accurate financial reporting and compliance with accounting standards
Examples of bond accounting software include Bloomberg Terminal and Thomson Reuters Eikon
Q55. Explain Clean price and Dirty price
Clean price is the price of a bond excluding accrued interest, while dirty price includes accrued interest.
Clean price is the price of a bond without any accrued interest
Dirty price is the price of a bond including accrued interest
Accrued interest is the interest that has accumulated on a bond since its last coupon payment
Clean price + accrued interest = dirty price
Dirty price is also known as the full or invoice price
Q56. What are difference between SQL and PL SQL
SQL is a standard language for managing relational databases, while PL/SQL is a procedural language extension for SQL.
SQL is a standard language for querying and manipulating data in relational databases.
PL/SQL is a procedural language extension for SQL, allowing for more complex programming logic.
SQL is used for data manipulation and retrieval, while PL/SQL is used for writing stored procedures and functions.
SQL statements are executed one at a time, while PL/SQL blocks can ...read more
Q57. Diffence between correlated and non correlated subquary?
Correlated subquery refers to a subquery that is dependent on the outer query, while non-correlated subquery can be executed independently.
Correlated subquery is executed for each row processed by the outer query, while non-correlated subquery is executed only once.
Correlated subquery is slower in performance compared to non-correlated subquery.
Example: SELECT * FROM table1 WHERE column1 = (SELECT MAX(column2) FROM table2 WHERE table1.id = table2.id)
Q58. add two linked list minimum cost path print all the nodes in a tree except the leaf nodes.
The question asks for adding two linked lists, finding the minimum cost path, and printing all nodes in a tree except the leaf nodes.
To add two linked lists, traverse both lists simultaneously and add corresponding nodes.
To find the minimum cost path, use algorithms like Dijkstra's or A*.
To print all nodes in a tree except the leaf nodes, perform a depth-first traversal and print non-leaf nodes.
Q59. Write s query to find maximum salary from EMP?
Query to find maximum salary from EMP
Use the MAX() function to find the maximum salary
Specify the column name for salary in the SELECT statement
Specify the table name and column name for salary in the FROM clause
Q60. Testing strategies and techniques
Testing strategies and techniques are essential for ensuring software quality and identifying defects.
Testing strategies include black box, white box, and gray box testing
Techniques include unit testing, integration testing, and acceptance testing
Automation testing can improve efficiency and reduce human error
Exploratory testing can uncover unexpected defects
Risk-based testing prioritizes testing based on potential impact
Regression testing ensures that changes do not introduc...read more
Q61. Do you know about CD/CI?
CD/CI stands for Continuous Delivery/Continuous Integration, a software development practice to automate the process of testing and deploying code changes.
CD/CI is a software development practice that involves automating the process of testing and deploying code changes.
Continuous Integration (CI) involves automatically building and testing code changes as they are committed to the repository.
Continuous Delivery (CD) involves automatically deploying code changes to production...read more
Q62. How you can make added advantage to process
By implementing automation and streamlining processes, added advantage can be achieved.
Identify bottlenecks and inefficiencies in the current process
Implement automation to reduce manual labor and increase efficiency
Streamline processes to reduce waste and improve productivity
Regularly review and optimize processes to ensure continued improvement
Q63. Where the abstraction implemented in your framework
Abstraction is implemented in the framework through interfaces and base classes.
Abstraction is achieved through interfaces which define the contract for classes to implement.
Base classes provide common functionality that can be inherited by concrete classes.
Abstraction helps in decoupling the implementation details from the actual test cases.
Example: Interface 'ITestCase' defines methods like 'executeTest' which are implemented by classes like 'LoginTestCase'.
Q64. Explain the process of Change Management process from starting till end.
Change management process involves planning, implementing, and monitoring changes to ensure successful outcomes.
Identify the need for change
Plan the change including scope, resources, and timeline
Communicate the change to stakeholders
Implement the change with proper training and support
Monitor and evaluate the change for effectiveness
Make adjustments as needed
Close the change management process with documentation
Q65. Integration between Apache and WebLogic, IHS and WebSphere
Q66. what KPIs would be used for unbalanced datasets
KPIs for unbalanced datasets include precision, recall, F1 score, ROC AUC, and confusion matrix.
Precision: measures the proportion of true positive predictions among all positive predictions
Recall: measures the proportion of true positive predictions among all actual positive instances
F1 score: balances precision and recall into a single metric
ROC AUC: measures the area under the receiver operating characteristic curve
Confusion matrix: provides a breakdown of true positive, f...read more
Q67. What are Solid principles
SOLID principles are a set of five design principles that help make software designs more understandable, flexible, and maintainable.
Single Responsibility Principle (SRP) - A class should have only one reason to change.
Open/Closed Principle (OCP) - Software entities should be open for extension but closed for modification.
Liskov Substitution Principle (LSP) - Objects of a superclass should be replaceable with objects of its subclasses without affecting the functionality.
Inter...read more
Q68. what is indices
Indices are statistical measures used to track the performance of a specific group of assets or market.
Indices are used to provide a snapshot of the overall market or a specific sector.
They are often used as benchmarks for investment performance.
Examples include the S&P 500, Dow Jones Industrial Average, and NASDAQ Composite.
Q69. What is the logic for merge sort What is inheritance
Merge sort is a divide and conquer algorithm that sorts an array by dividing it into two halves, sorting them separately, and then merging the sorted halves.
Divide the unsorted list into n sublists, each containing one element
Repeatedly merge sublists to produce new sorted sublists until there is only one sublist remaining
Merge operation involves comparing elements from two sublists and adding the smaller one to the final sorted list
Example: [38, 27, 43, 3, 9, 82, 10] -> [3, ...read more
Q70. Difference between 2 way and 3 way merge sort
2 way merge sort involves splitting the array into 2 parts and merging them, while 3 way merge sort involves splitting the array into 3 parts and merging them.
2 way merge sort splits the array into 2 parts and merges them recursively.
3 way merge sort splits the array into 3 parts and merges them recursively.
2 way merge sort has a time complexity of O(n log n), same as 3 way merge sort.
Q71. Uses cases about kubernetes docker
Kubernetes and Docker are popular tools for containerization and orchestration of applications.
Kubernetes is a container orchestration platform that automates the deployment, scaling, and management of containerized applications.
Docker is a containerization platform that allows developers to package applications and their dependencies into a standardized unit for software development.
Use cases for Kubernetes and Docker include microservices architecture, continuous integratio...read more
Q72. Write a program on number pattern
Program to print number pattern
Use nested loops to print the pattern
The outer loop controls the number of rows
The inner loop controls the number of columns
Use conditional statements to determine the pattern
Q73. Different types of financial instrument
Financial instruments are assets that can be traded, such as stocks, bonds, derivatives, and currencies.
Stocks: Represent ownership in a company and can be bought and sold on stock exchanges.
Bonds: Represent debt owed by a company or government and pay interest to the bondholder.
Derivatives: Financial contracts whose value is derived from the performance of an underlying asset, index, or interest rate.
Currencies: Used for trading and investment purposes in the foreign exchang...read more
Q74. What values shall you bring to table?
I bring a strong sense of ethics, a commitment to excellence, and a collaborative approach to problem-solving.
Strong sense of ethics: I prioritize doing what is right and ethical, even when it may be difficult or unpopular.
Commitment to excellence: I strive to deliver high-quality work and continuously improve my skills and knowledge.
Collaborative approach: I believe in working closely with others to find the best solutions to complex problems. I value diverse perspectives an...read more
Q75. Desing a secure rest API
Designing a secure REST API involves implementing authentication, authorization, encryption, and input validation.
Use HTTPS to encrypt data in transit
Implement OAuth or JWT for authentication and authorization
Validate and sanitize input to prevent injection attacks
Limit access to sensitive data with role-based access control
Q76. Preorder of tree
Preorder traversal of a tree visits the root node first, then recursively visits the left subtree and right subtree.
Start at the root node
Visit the root node
Recursively traverse the left subtree
Recursively traverse the right subtree
Q77. Explain Trade Life Cycle
Trade Life Cycle is the process of a trade from initiation to settlement.
Trade initiation
Order routing
Execution
Confirmation
Clearing and settlement
Trade reporting
Q78. What you know about Trade Life Cycle
Trade life cycle refers to the stages involved in a trade from initiation to settlement.
Trade initiation: Trade is proposed and agreed upon by parties involved.
Trade execution: Trade is executed on the exchange or over-the-counter market.
Trade confirmation: Parties confirm the details of the trade.
Trade settlement: Payment and transfer of securities occur to complete the trade.
Trade reconciliation: Any discrepancies are resolved post-settlement.
Q79. Explain your architecture proposal low level design
The low level design of my architecture proposal focuses on detailed components and interactions.
Detailed breakdown of system components and their interactions
Specific technologies and tools used for implementation
Data flow diagrams and sequence diagrams for each component
Error handling and recovery mechanisms
Scalability and performance considerations
Q80. Name two authors from the literary movement in France
Gustave Flaubert and Emile Zola are two prominent authors from the literary movement in France.
Gustave Flaubert is known for his novel 'Madame Bovary' which is considered a masterpiece of realism.
Emile Zola is famous for his series of novels called 'Les Rougon-Macquart' which explores the impact of heredity and environment on characters.
Q81. Toughest Project Handled
Developing a real-time monitoring system for a large-scale financial trading platform
Implemented complex algorithms to analyze market data in real-time
Designed a scalable architecture to handle high volume of transactions
Worked closely with traders and analysts to understand requirements and make necessary adjustments
Managed a team of developers to ensure project milestones were met
Q82. Explain Fixed Income Securities.
Fixed income securities are debt instruments that pay a fixed interest rate over a specific period of time.
Fixed income securities are also known as bonds.
They are issued by governments, corporations, and other entities to raise capital.
Investors receive regular interest payments until the bond matures, at which point they receive the principal amount.
The interest rate on fixed income securities is determined by the creditworthiness of the issuer and the prevailing market int...read more
Q83. Type of customer and documents
Different types of customers may require different types of documents for analysis.
Different types of customers may include individual consumers, businesses, government agencies, etc.
Documents required for analysis may include financial statements, invoices, contracts, market research reports, etc.
Understanding the type of customer and the documents they provide is crucial for accurate analysis.
Q84. How many joins are in SQL?
The number of joins in SQL can vary depending on the complexity of the query.
The number of joins in SQL can range from 0 (no joins) to multiple joins in a single query.
Common types of joins include INNER JOIN, LEFT JOIN, RIGHT JOIN, and FULL JOIN.
Joins are used to combine rows from two or more tables based on a related column between them.
Example: SELECT * FROM table1 INNER JOIN table2 ON table1.id = table2.id;
Q85. Fundamentals of .netcore
Fundamentals of .NET Core include cross-platform compatibility, high performance, and open-source framework.
Cross-platform compatibility allows .NET Core applications to run on Windows, macOS, and Linux.
High performance is achieved through features like just-in-time compilation and efficient memory management.
Open-source framework encourages community contributions and rapid development.
Support for modern development practices like microservices and containerization.
Q86. Different functions of Investment Bank.
Investment banks perform various functions such as underwriting, M&A advisory, sales and trading, research, and asset management.
Underwriting: helping companies issue securities and managing the process of selling them to investors
M&A advisory: advising companies on mergers and acquisitions
Sales and trading: buying and selling securities on behalf of clients
Research: providing analysis and recommendations on companies and industries
Asset management: managing investment portfo...read more
Q87. what is polymorphism
Polymorphism is the ability of an object to take on many forms. It allows objects of different classes to be treated as the same type.
Polymorphism is a fundamental concept in object-oriented programming.
It allows a single interface to be used for different types of objects.
Polymorphism is achieved through method overriding and method overloading.
Example: A parent class Animal can have multiple child classes like Dog, Cat, and Bird. They can all be treated as Animals.
Polymorph...read more
Q88. Corporate action and its types explain
Corporate actions are events initiated by a public company that impact its shareholders and securities.
Corporate actions can include dividends, stock splits, mergers, acquisitions, spin-offs, and rights issues.
Dividends are payments made to shareholders from a company's profits.
Stock splits involve dividing existing shares into multiple shares to lower the price per share.
Mergers and acquisitions involve two companies combining or one company buying another.
Spin-offs involve ...read more
Q89. Square root of a number in log n time
Using binary search, square root of a number can be found in log n time.
Choose a range for the square root
Use binary search to find the square root within the range
Adjust the range based on whether the guess is too high or too low
Q90. What do you know about SG GSC?
SG GSC is a global technology and operations hub of Societe Generale, a French multinational investment bank.
SG GSC provides IT and operations support to Societe Generale's businesses worldwide.
It has a presence in India, Romania, and Canada.
The company offers services in areas such as application development, infrastructure management, and cybersecurity.
SG GSC has won several awards for its work in the IT and banking industry, including the NASSCOM Corporate Award for Excell...read more
Q91. What are the NAV cycle
NAV cycle refers to the process of calculating the Net Asset Value of a mutual fund.
NAV cycle involves calculating the total value of a mutual fund's assets, subtracting liabilities, and dividing by the number of outstanding shares.
This process typically occurs at the end of each trading day to determine the fund's price per share.
NAV cycle helps investors understand the value of their investments in the mutual fund.
Q92. What is Regulatory Reporting
Regulatory reporting is the process of submitting information to regulatory authorities to ensure compliance with laws and regulations.
Regulatory reporting involves providing detailed financial and operational information to regulatory bodies.
It is essential for ensuring transparency, accountability, and compliance with laws and regulations.
Examples include submitting financial statements to the SEC or reporting on capital adequacy to banking regulators.
Q93. explain joins types is joins
Join types in SQL are used to combine rows from two or more tables based on a related column between them.
Inner join: returns only the matching rows from both tables
Left join: returns all rows from the left table and the matching rows from the right table
Right join: returns all rows from the right table and the matching rows from the left table
Full outer join: returns all rows from both tables, including the unmatched rows
Cross join: returns the Cartesian product of both tabl...read more
Q94. Data wrangling in R
Data wrangling in R involves cleaning, transforming, and preparing data for analysis.
Use packages like dplyr and tidyr for data manipulation
Handle missing values using functions like na.omit() or complete.cases()
Reshape data using functions like gather() and spread()
Use regular expressions to extract and manipulate text data
Visualize data using ggplot2 package
Q95. Whatvis the challennging situation
The challenging situation is managing a team with conflicting personalities and work styles.
Identify each team member's strengths and weaknesses
Encourage open communication and collaboration
Set clear expectations and goals for the team
Address conflicts promptly and constructively
Provide opportunities for team building and bonding activities
Q96. Culture difference between india and France
India and France have significant cultural differences in terms of language, cuisine, traditions, and social norms.
Language: India has hundreds of languages and dialects, while France primarily speaks French.
Cuisine: Indian cuisine is known for its use of spices and vegetarian dishes, while French cuisine is famous for its cheeses, wines, and pastries.
Traditions: India has a rich history of festivals and rituals, while France is known for its art, fashion, and literature.
Soci...read more
Q97. Features of latest version of c sharp
C# 9.0 introduces new features like records, init-only setters, and top-level statements.
Records provide a concise syntax for defining immutable types.
Init-only setters allow setting properties only during object initialization.
Top-level statements allow writing code without a class or namespace.
Improved pattern matching with logical patterns and relational patterns.
Function pointers and improved support for native interop.
New target-typed expressions and covariant returns.
So...read more
Q98. How is command system network?
Command system network is a centralized system that controls and coordinates various devices and processes.
Command system network typically consists of a central server or controller that communicates with multiple devices or subsystems.
It allows for centralized monitoring, control, and coordination of various processes or equipment.
Examples include industrial automation systems, smart home systems, and military command and control systems.
Q99. Implement an Hashset using Hashmap
Implementing a Hashset using Hashmap
Create a Hashmap with the elements as keys and a dummy value as value
Use the keySet() method to get all the keys in the Hashmap and return them as a HashSet
Q100. Write an SQL query
SQL query to retrieve all employees from a specific department
Use SELECT statement to retrieve data
Specify the columns to be selected
Use WHERE clause to filter by department
Top HR Questions asked in null
Interview Process at null
Top Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month