Filter interviews by
I applied via Walk-in and was interviewed in Apr 2022. There were 2 interview rounds.
Import/Export any Questions
Top trending discussions
I applied via Referral and was interviewed in Apr 2021. There were 4 interview rounds.
Weak reference is a reference that does not prevent the object from being garbage collected.
Weak references are used to refer to objects that can be garbage collected if there are no strong references to them.
They are typically used in scenarios where you want to hold a reference to an object, but don't want to prevent it from being collected.
Weak references are implemented using weak reference queues, which allow you ...
Singleton pattern ensures a class has only one instance, while allowing global access to it.
Implement a private constructor to prevent direct instantiation.
Create a static method to provide a single point of access to the instance.
Use lazy initialization to create the instance only when needed.
Ensure thread safety in a multithreaded environment using synchronization or double-checked locking.
Breaking the singleton patt...
Annotations used in Spring Framework for defining components and services.
Annotations like @Component, @Service, and @Controller are used for defining components in Spring Framework.
@RestController is used for defining RESTful web services.
@Configuration is used for defining configuration classes.
@Transactional is used for defining transactional methods.
All these annotations help in defining and managing dependencies i
HashSet is implemented using a HashMap internally. Same hashcode is generated when two objects have the same value for hashCode() and equals() methods.
HashSet internally uses a HashMap to store its elements.
The hashcode of an object is generated using the hashCode() method.
If two objects have the same value for hashCode() and equals() methods, they will generate the same hashcode.
For example, if two String objects have...
SQL Cursor is a database object used to manipulate data row by row.
Cursor is used to fetch and process data row by row
Index is a database object used to speed up data retrieval
Aggregate functions are used to perform calculations on a set of values
Examples of aggregate functions are SUM, AVG, COUNT, MAX, MIN
Generate palindrome string with given length and distinct characters.
Create a char array of length n and fill it with distinct characters.
Loop through the array and add the characters in reverse order to create a palindrome.
Repeat the process until the required number of palindromes are generated.
If k is less than the length of the palindrome, use the first k distinct characters.
Find the highest value that occurs the same number of times within an array.
Iterate through the array and count the occurrences of each value.
Store the counts in a dictionary or hash map.
Find the maximum count and check which value(s) have that count.
Return the highest value among those with the maximum count.
Count occurrences of a character in a string and output in a specific format.
Use a hash table to store the count of each character.
Loop through the string and update the count in the hash table.
Create the output string using the hash table.
Converts a string from Camel case to Snake case.
Loop through the string and check for uppercase letters
Insert an underscore before each uppercase letter
Convert the string to lowercase
Logic to get Map using Stream API to show balance of each person
Use Stream API to group accounts by name
Use map() to get the sum of balances for each group
Collect the results into a Map
posted on 26 Mar 2020
I applied via Naukri.com and was interviewed before Mar 2019. There were 5 interview rounds.
posted on 25 Mar 2021
I applied via Naukri.com and was interviewed in Sep 2021. There were 3 interview rounds.
posted on 2 Jul 2021
I applied via Recruitment Consultant and was interviewed in Jun 2021. There were 6 interview rounds.
I applied via Referral and was interviewed in Apr 2021. There were 4 interview rounds.
IPO stands for Initial Public Offering. It is the process by which a private company becomes a publicly-traded company by offering its shares to the public.
IPO is a way for companies to raise capital by selling shares to the public.
It allows private companies to become publicly traded on stock exchanges.
During an IPO, shares are offered to institutional investors and individual investors.
The company's valuation and sha...
Bonds are debt securities that are issued by companies, governments, and other organizations to raise capital.
Government bonds: Issued by governments to finance their operations
Corporate bonds: Issued by companies to finance their operations
Municipal bonds: Issued by local governments to finance public projects
Treasury bonds: Issued by the US government to finance its operations
Junk bonds: High-risk, high-yield bonds i
Capital markets are where financial instruments such as stocks, bonds, and commodities are traded between investors and institutions.
Capital markets are a platform for companies to raise capital by issuing stocks and bonds.
Investors can buy and sell financial instruments in the capital markets.
The capital markets are divided into primary and secondary markets.
Examples of capital markets include the New York Stock Excha...
Short term liabilities are debts or obligations that are due within a year or less.
Short term loans
Accounts payable
Accrued expenses
Current portion of long-term debt
Unearned revenue
I applied via Naukri.com
Private equity invests in established companies while venture capital invests in startups.
Private equity firms invest in mature companies with a proven track record.
Venture capital firms invest in startups with high growth potential.
Private equity firms typically acquire a controlling stake in the company they invest in.
Venture capital firms usually take a minority stake in the company.
Private equity firms focus on gen...
The strategy to come out of private equity involves identifying potential buyers, preparing the company for sale, and negotiating the terms of the sale.
Identify potential buyers through market research and networking
Prepare the company for sale by improving financials, streamlining operations, and addressing any legal or regulatory issues
Negotiate the terms of the sale, including price, payment structure, and any conti...
Fundamental analysis is a method of evaluating a security by examining its intrinsic value.
It involves analyzing financial and economic data to determine the underlying value of a security
The objective is to identify undervalued or overvalued securities
Factors considered include financial statements, industry trends, management quality, and macroeconomic conditions
Example: analyzing a company's revenue growth, profit m...
EPS is earnings per share, while P/E ratio is the price-to-earnings ratio.
EPS is a company's net profit divided by the number of outstanding shares.
P/E ratio is the current market price of a share divided by its EPS.
P/E ratio is used to determine if a stock is overvalued or undervalued.
A high P/E ratio may indicate that investors have high expectations for future growth.
A low P/E ratio may indicate that investors have
Enterprise Value is the total value of a company's equity and debt.
Enterprise Value = Market Capitalization + Total Debt - Cash and Cash Equivalents
It is used to determine the total value of a company, including its debt
EV is often used in financial analysis to compare companies with different capital structures
Example: If a company has a market cap of $100 million, total debt of $50 million, and cash and cash equivale
Annual reports contain more than just financials, such as management discussion and analysis, corporate governance, and sustainability reports.
Management discussion and analysis provides insights into the company's strategy, operations, and future plans.
Corporate governance section highlights the company's policies and practices related to ethical conduct, board composition, and executive compensation.
Sustainability re...
I applied via Naukri.com and was interviewed in Sep 2020. There were 3 interview rounds.
Log files are used to record events and actions in a system or application.
Log files can be used for debugging and troubleshooting.
They can also be used for auditing and compliance purposes.
Log files can help identify security breaches or unauthorized access.
They can be used to monitor system performance and identify bottlenecks.
Log files can be analyzed to gain insights into user behavior and usage patterns.
Debugging is the process of identifying and fixing errors in a program or project.
Debugging involves analyzing code and identifying errors
Tools like debuggers and logging can aid in the process
Common errors include syntax errors, logic errors, and runtime errors
Debugging should be done systematically and thoroughly
Testing and retesting is important to ensure all errors are fixed
Accessibility of variable or function
Variables and functions should be accessible to the parts of the code that need them
Accessibility can be controlled using access modifiers like public, private, and protected
Accessibility can also be affected by the scope of the variable or function
based on 21 reviews
Rating in categories
Executive Accountant
4
salaries
| ₹1.2 L/yr - ₹4.2 L/yr |
Import Manager
4
salaries
| ₹6.2 L/yr - ₹6.5 L/yr |
Graphic Designer
3
salaries
| ₹2.4 L/yr - ₹2.4 L/yr |
Merchandiser
3
salaries
| ₹2.3 L/yr - ₹5 L/yr |
Divisional Merchandising Manager
3
salaries
| ₹11 L/yr - ₹12 L/yr |
Bajaj Finserv
Wells Fargo
JPMorgan Chase & Co.
HSBC Group