Add office photos
Employer?
Claim Account for FREE

Thales

3.6
based on 370 Reviews
Filter interviews by

20+ Nordea Bank Interview Questions and Answers

Updated 16 Sep 2024

Q1. Reverse a String Problem Statement

Given a string STR containing characters from [a-z], [A-Z], [0-9], and special characters, determine the reverse of the string.

Input:

The input starts with a single integer '...read more
Ans.

Reverse a given string containing characters from [a-z], [A-Z], [0-9], and special characters.

  • Iterate through the characters of the string from end to start and append them to a new string to get the reversed string.

  • Use built-in functions like reverse() or StringBuilder in languages like Java for efficient reversal.

  • Handle special characters and numbers along with alphabets while reversing the string.

  • Ensure to print each reversed string on a separate line as per the output for...read more

Add your answer

Q2. Duplicate Characters in a String

Given a string 'S' of length 'N', identify and return all the characters in the string that appear more than once along with their frequency.

Example:

Input:
 N = 5
S = 'GEEK'
O...read more
Ans.

Identify and return all characters in a string that appear more than once along with their frequency.

  • Iterate through the string and count the frequency of each character using a hashmap.

  • Return characters with frequency greater than 1 in an array of tuples.

Add your answer

Q3. String Palindrome Verification

Given a string, your task is to determine if it is a palindrome considering only alphanumeric characters.

Input:

The input is a single string without any leading or trailing space...read more
Ans.

Check if a given string is a palindrome considering only alphanumeric characters.

  • Remove non-alphanumeric characters from the input string before checking for palindrome.

  • Use two pointers approach to compare characters from start and end of the string.

  • Convert all characters to lowercase for case-insensitive comparison.

  • Return true if the string is a palindrome, false otherwise.

Add your answer

Q4. Nth Fibonacci Number Problem Statement

Calculate the Nth term in the Fibonacci sequence, where the sequence is defined as follows: F(n) = F(n-1) + F(n-2), with initial conditions F(1) = F(2) = 1.

Input:

The inp...read more
Ans.

Calculate the Nth Fibonacci number efficiently using dynamic programming.

  • Use dynamic programming to store previously calculated Fibonacci numbers to avoid redundant calculations.

  • Start with base cases F(1) and F(2) as 1, then iterate to calculate subsequent Fibonacci numbers.

  • Optimize the solution to have a time complexity of O(N) by storing and reusing calculated values.

Add your answer
Discover Nordea Bank interview dos and don'ts from real experiences
Q5. What is the cut command in Linux and how do you use it?
Ans.

The cut command in Linux is used to extract sections from each line of input.

  • Used to cut out specific sections of text from a file or input stream

  • Can specify the delimiter used to separate fields

  • Options include -c for characters, -f for fields, and -d to specify the delimiter

  • Example: cut -d',' -f1,3 file.txt

Add your answer
Q6. What is the Find command in Linux and how is it used?
Ans.

The Find command in Linux is used to search for files and directories based on specified criteria.

  • Used to search for files and directories in a specified directory

  • Criteria can include file name, size, permissions, and more

  • Can be combined with other commands like -exec to perform actions on found files

Add your answer
Are these interview questions helpful?
Q7. Can you explain your approach to project scaling in AWS?
Ans.

My approach to project scaling in AWS involves utilizing auto-scaling groups, load balancers, and monitoring tools.

  • Utilize auto-scaling groups to automatically adjust the number of EC2 instances based on traffic patterns

  • Implement load balancers to distribute incoming traffic evenly across multiple instances

  • Use monitoring tools like CloudWatch to track performance metrics and make informed scaling decisions

Add your answer

Q8. Anagrams Problem Statement

You are given an array/list of strings called inputStr. Your task is to return the strings as groups of anagrams such that strings belonging to the same group are anagrams of each oth...read more

Ans.

Given an array of strings, group the strings that are anagrams of each other.

  • Iterate through the array of strings and sort each string alphabetically to create a key for grouping.

  • Use a hashmap to store the sorted string as key and the list of anagrams as value.

  • Return the values of the hashmap as the grouped anagrams.

Add your answer
Share interview questions and help millions of jobseekers 🌟

Q9. 2. reverse a string, find a duplicate in a string.

Ans.

Reverse a string and find a duplicate in an array of strings.

  • To reverse a string, we can use the built-in reverse() method or loop through the string and append each character to a new string in reverse order.

  • To find a duplicate in an array of strings, we can use a hash table to keep track of the frequency of each string and return the first string with a frequency greater than 1.

Add your answer

Q10. String Manipulation program

Ans.

Create a program for string manipulation using an array of strings.

  • Use built-in string manipulation functions like substring, replace, and concat.

  • Iterate through the array of strings to perform different manipulations.

  • Consider edge cases like empty strings or null values.

  • Example: Reverse each string in the array and concatenate them together.

Add your answer

Q11. Internal Working of HashMap

Ans.

HashMap is a data structure that stores key-value pairs and uses hashing to efficiently retrieve values.

  • HashMap internally uses an array of linked lists to store key-value pairs.

  • When a key-value pair is added, the key is hashed to determine the index in the array where it will be stored.

  • If multiple keys hash to the same index, a linked list is used to handle collisions.

  • To retrieve a value, the key is hashed again to find the index and then the linked list is searched for the ...read more

Add your answer

Q12. Sorting Algorithm

Ans.

Sorting algorithm is a method of arranging elements in a specific order.

  • Common sorting algorithms include bubble sort, insertion sort, selection sort, merge sort, quick sort, and heap sort.

  • The choice of sorting algorithm depends on the size of the data set, the data type, and the desired time complexity.

  • Sorting algorithms can be implemented in various programming languages such as Java, Python, and C++.

Add your answer

Q13. Project works previous organizations

Ans.

I have worked on various projects in my previous organizations ranging from web development to data analysis.

  • Developed a web application for tracking sales data using Angular and Node.js

  • Led a team in implementing a machine learning model for predicting customer churn using Python and TensorFlow

  • Collaborated with cross-functional teams to integrate a new CRM system into existing workflows

Add your answer

Q14. Which tools you have worked on?

Ans.

I have worked on a variety of tools including Adobe FrameMaker, MadCap Flare, Microsoft Word, and Confluence.

  • Adobe FrameMaker

  • MadCap Flare

  • Microsoft Word

  • Confluence

Add your answer

Q15. OOPS Concepts in .NET

Ans.

OOPS Concepts in .NET include encapsulation, inheritance, polymorphism, and abstraction.

  • Encapsulation: Bundling data and methods that operate on the data into a single unit.

  • Inheritance: Allowing a class to inherit properties and behavior from another class.

  • Polymorphism: Ability to present the same interface for different data types.

  • Abstraction: Hiding the complex implementation details and showing only the necessary features.

Add your answer

Q16. Define Abstraction 2 cubes puzzle Define laws of cn

Ans.

Abstraction is the process of hiding complex implementation details and exposing only the necessary information.

  • Abstraction helps in reducing complexity and increasing efficiency.

  • It allows us to focus on the essential features of an object or system.

  • For example, a car's dashboard abstracts the complex workings of the car's engine and presents only the necessary information to the driver.

Add your answer

Q17. Polymorphism types?

Ans.

Polymorphism types include compile-time polymorphism (static binding) and runtime polymorphism (dynamic binding).

  • Compile-time polymorphism is achieved through function overloading and operator overloading.

  • Runtime polymorphism is achieved through virtual functions and function overriding.

  • Examples: Compile-time polymorphism - function overloading in C++, Runtime polymorphism - virtual functions in C++.

Add your answer

Q18. What are Single sourcing documents.

Ans.

Single sourcing documents is the practice of creating content that can be reused across multiple documents or formats.

  • Single sourcing helps to reduce duplication of effort and ensures consistency in content.

  • Content is typically stored in a central repository and can be easily updated and reused as needed.

  • Examples include using variables or snippets in a documentation tool to insert the same content in multiple places.

  • Single sourcing can also involve creating content in a stru...read more

Add your answer

Q19. Tell more about SDLC

Ans.

SDLC stands for Software Development Life Cycle, a process used by software development teams to design, develop, and test high-quality software.

  • SDLC consists of several phases including planning, analysis, design, implementation, testing, and maintenance.

  • Each phase has its own set of activities and deliverables to ensure the successful completion of the software project.

  • Examples of SDLC models include Waterfall, Agile, and DevOps, each with its own approach to software devel...read more

Add your answer

Q20. what is your CTC

Ans.

My current CTC is $40,000 per year.

  • My current CTC is $40,000 per year

  • CTC stands for Cost to Company

  • It includes salary, bonuses, benefits, and any other perks provided by the company

Add your answer

Q21. Explain Natting

Ans.

Natting stands for Network Address Translation, a process used to modify network address information in packet headers while in transit.

  • Natting allows multiple devices on a local network to share a single public IP address

  • Types of Natting include Static NAT, Dynamic NAT, and Port Address Translation (PAT)

  • Natting helps improve security by hiding internal IP addresses from external networks

  • Example: A company uses NAT to allow multiple internal devices to access the internet usi...read more

Add your answer
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos

Interview Process at Nordea Bank

based on 37 interviews
Interview experience
4.0
Good
View more
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Interview Questions from Similar Companies

4.1
 • 2.2k Interview Questions
3.9
 • 304 Interview Questions
4.0
 • 284 Interview Questions
4.2
 • 223 Interview Questions
3.9
 • 205 Interview Questions
4.1
 • 161 Interview Questions
View all
Top Thales Interview Questions And Answers
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
75 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter