UBS
200+ Genius KIds Interview Questions and Answers
Q1. Pattern Printing Task
You are tasked with printing a specific pattern based on the given number of rows, 'N'. For any input value of 'N', generate and print a pattern as described in the example.
Input:
1 5
Ou...read more
The task is to print a specific pattern based on the given number of rows, 'N'.
Iterate through each row and print the numbers in the specified pattern
Start with the first row, then move to the next row in a spiral pattern
Ensure there is exactly one space between each value in a row
Q2. Find Missing Number In String Problem Statement
You have a sequence of consecutive nonnegative integers. By appending all integers end-to-end, you formed a string S
without any separators. During this process, ...read more
Given a string of consecutive nonnegative integers with one missing number, find the missing integer.
Iterate through all possible substrings and check if they form a valid sequence of consecutive integers.
If a valid sequence is found, return the missing number.
Handle cases where there are multiple missing numbers, all numbers are present, or the string is invalid.
Consider the constraints provided to optimize the solution.
Example: For input '1113', the missing number is 12.
Q3. Angle Calculation Between Clock Hands
Given a specific time in hours and minutes, your task is to calculate the smallest possible angle between the hour hand and the minute hand of a clock.
Example:
Input:
T = ...read more
Calculate the smallest angle between the hour and minute hands of a clock for a given time.
Calculate the angles formed by the hour and minute hands separately
Find the absolute difference between the two angles
Return the smaller angle as the result
Q4. If I have 1 to 10 numbers in an array and if one of the numbers is missing then how will you find out which one is the missing number?
To find the missing number in an array of 1 to 10 numbers, calculate the sum of all numbers and subtract the sum of the given array.
Calculate the sum of numbers from 1 to 10 using the formula n * (n + 1) / 2
Calculate the sum of the given array
Subtract the sum of the given array from the sum of numbers from 1 to 10
The result will be the missing number
Q5. String Transformation Problem
Given a string (STR
) of length N
, you are tasked to create a new string through the following method:
Select the smallest character from the first K
characters of STR
, remove it fr...read more
Given a string and an integer, create a new string by selecting the smallest character from the first K characters of the input string and repeating the process until the input string is empty.
Iterate through the input string, selecting the smallest character from the first K characters each time.
Remove the selected character from the input string and append it to the new string.
Continue this process until the input string is empty.
Return the final new string formed.
Q6. Merge K Sorted Arrays Problem Statement
Given 'K' different arrays that are individually sorted in ascending order, merge all these arrays into a single array that is also sorted in ascending order.
Input
The f...read more
Merge K sorted arrays into a single sorted array.
Create a min heap to store the first element of each array along with the array index.
Pop the top element from the heap, add it to the result array, and push the next element from the same array back to the heap.
Continue this process until all elements are processed.
Time complexity can be optimized using a priority queue or merge sort technique.
Q7. Sort 0 1 2 Problem Statement
Given an integer array arr
of size 'N' containing only 0s, 1s, and 2s, write an algorithm to sort the array.
Input:
The first line contains an integer 'T' representing the number of...read more
Sort an array of 0s, 1s, and 2s in linear time complexity.
Use three pointers to keep track of 0s, 1s, and 2s while iterating through the array.
Swap elements based on the values encountered to sort the array in-place.
Ensure to handle edge cases like all 0s, all 1s, and all 2s in the array.
Q8. There is a closed room with 3 bulbs and there are three switches outside. You can toggle any two switches once without looking inside the room and map the bulbs to their corresponding switches. (Since I had don...
read moreYou can map the bulbs to their corresponding switches by toggling two switches and leaving one switch untouched.
Toggle switch 1 and switch 2, leave switch 3 untouched.
After a few minutes, toggle switch 2 back to its original position.
Enter the room and observe the bulbs.
The bulb that is on corresponds to switch 1, the bulb that is off and still warm corresponds to switch 2, and the bulb that is off and cool corresponds to switch 3.
Q9. Find Maximum Number by At-most K Swaps
Given an array of non-negative integers representing the digits of a number and an integer 'K', calculate the maximum possible number by swapping its digits up to 'K' time...read more
Given an array of digits and an integer K, find the maximum number by swapping digits up to K times.
Sort the digits in non-increasing order to maximize the number.
Swap the digits to achieve the maximum number within the given number of swaps.
Handle cases where there are repeating digits and leading zeros.
Q10. Move Zeroes to End Problem Statement
Given an unsorted array of integers, modify the array such that all the zeroes are moved to the end, while maintaining the order of non-zero elements as they appear original...read more
Move all zeroes to the end of an unsorted array while maintaining the order of non-zero elements.
Iterate through the array and keep track of the index to place non-zero elements.
Once all non-zero elements are placed, fill the rest of the array with zeroes.
Ensure to maintain the relative order of non-zero elements.
Example: Input: [0, 1, -2, 3, 4, 0, 5, -27, 9, 0], Output: [1, -2, 3, 4, 5, -27, 9, 0, 0, 0]
Q11. BST Node Deletion Problem
Given a binary search tree (BST) and a key value K
, your task is to delete the node with value K
. It is guaranteed that a node with value K
exists in the BST.
Explanation:
A binary sea...read more
Delete a node with a given value from a binary search tree (BST).
Traverse the BST to find the node with the value K to be deleted.
Handle different cases like node with no children, one child, or two children.
Update the pointers of the parent node and child nodes accordingly.
Recursively delete the node and adjust the tree structure.
Return the root of the modified BST after deletion.
Q12. Android: What do you mean by ‘target API level’? Which software do u use to build android apps? What do you mean by APK?
Target API level is the version of Android that an app is designed to run on. Android Studio is used to build Android apps. APK is the file format for Android apps.
Target API level determines the minimum version of Android that an app can run on
Android Studio is the official IDE for building Android apps
APK stands for Android Package Kit and is the file format for Android apps
Q13. What is encapsulation, data hiding and abstraction?
Encapsulation is the bundling of data and methods into a single unit. Data hiding is the concept of restricting access to data. Abstraction is the process of simplifying complex systems.
Encapsulation combines data and methods into a single unit, providing better control and security.
Data hiding restricts access to data, allowing only specific methods to manipulate it.
Abstraction simplifies complex systems by providing a high-level view, hiding unnecessary details.
Example: A c...read more
Q14. Java questions:What are abstract classes?What are final classes?What are static classes? Difference between static and nonstatic classes. What is inheritance? Give example and explain
Explanation of abstract, final, and static classes and inheritance in Java.
Abstract classes are classes that cannot be instantiated and are meant to be extended by other classes.
Final classes are classes that cannot be extended by other classes.
Static classes are nested classes that can be accessed without creating an instance of the outer class.
Static classes are different from non-static classes in that they cannot access non-static members of the outer class.
Inheritance is...read more
Q15. Convert Min Heap to Max Heap Problem Statement
Given an array representation of a min-heap of size 'n', your task is to convert this array into a max-heap.
Input:
The first line of input contains an integer ‘T’...read more
Convert a given min-heap array into a max-heap array.
Iterate through the given min-heap array and build a max-heap array by swapping elements.
Start from the last non-leaf node and heapify down to maintain the max-heap property.
Ensure that the output array satisfies the max-heap property.
Example: For min-heap [1,2,3,6,7,8], the max-heap would be [8,7,3,6,2,1].
Types of keys in a DBMS include primary key, foreign key, candidate key, and super key.
Primary key uniquely identifies each record in a table (e.g. employee ID)
Foreign key links two tables together (e.g. department ID in employee table)
Candidate key is a unique key that can be chosen as the primary key (e.g. email address)
Super key is a set of attributes that uniquely identifies a record (e.g. combination of first name and last name)
Q17. Preorder Traversal of a BST Problem Statement
Given an array PREORDER
representing the preorder traversal of a Binary Search Tree (BST) with N
nodes, construct the original BST.
Each element in the given array ...read more
Given a preorder traversal of a BST, construct the BST and return its inorder traversal.
Create a binary search tree from the preorder traversal array
Return the inorder traversal of the constructed BST
Ensure each element in the array is distinct
Q18. Tell me abt ur project and which data structures u used in them.
I developed a project for data analysis using Python and utilized various data structures such as lists, dictionaries, and sets.
Used lists to store and manipulate data
Used dictionaries to map key-value pairs for efficient data retrieval
Used sets to perform operations such as union and intersection
Implemented algorithms such as sorting and searching using appropriate data structures
Q19. 5. Mention one quality which sets u apart from the other ppl
My ability to empathize with others sets me apart from others.
I have a natural ability to understand and relate to people's emotions.
I am able to put myself in other people's shoes and see things from their perspective.
This quality helps me to build strong relationships with others and resolve conflicts effectively.
For example, in my previous job, I was able to diffuse a tense situation between two coworkers by listening to both sides and finding a common ground.
I believe tha...read more
Q20. What is the difference between the roles being offered at Credit Suisse for IITM students?
The roles offered at Credit Suisse for IITM students vary in terms of responsibilities and focus areas.
The roles may differ in terms of the department or division within Credit Suisse.
Some roles may be more focused on technology and software development, while others may be more finance-oriented.
Different roles may have varying levels of client interaction or require different skill sets.
Examples of roles offered may include software engineer, financial analyst, risk manageme...read more
Q21. If your account balance was multiplied by a million, what would you do with it?
If my account balance was multiplied by a million, I would invest in various areas, donate to charities, and fulfill my dreams.
Invest in stocks, real estate, and businesses to grow wealth
Donate to charities and support causes that are important to me
Travel the world and experience different cultures
Buy a dream house and a luxury car
Invest in my education and personal development
Mapping an ER diagram to a relational schema involves identifying entities, attributes, relationships, and keys.
Identify entities in the ER diagram and map them to tables in the relational schema.
Identify attributes of each entity and map them to columns in the corresponding tables.
Identify relationships between entities and represent them using foreign keys in the tables.
Identify keys (primary and foreign) to maintain data integrity and relationships between tables.
Static methods belong to the class itself, while non-static methods belong to instances of the class.
Static methods can be called without creating an instance of the class.
Non-static methods can only be called on an instance of the class.
Static methods cannot access non-static variables or methods directly.
Non-static methods can access both static and non-static variables and methods.
Example: Math.sqrt() is a static method, while String.length() is a non-static method.
WCF services provide advantages such as interoperability, security, reliability, and flexibility.
Interoperability: WCF allows communication between different platforms and technologies.
Security: WCF supports various security mechanisms like message encryption and authentication.
Reliability: WCF ensures reliable message delivery through features like reliable messaging.
Flexibility: WCF supports multiple communication protocols and message formats.
Example: WCF can be used to cr...read more
Design a lift with features like quick response time, spacious interior, clear signage, and emergency communication.
Ensure quick response time for minimal waiting
Provide a spacious interior for comfort and ease of movement
Include clear signage for easy navigation
Install emergency communication system for safety
Q26. If an egg is thrown from a 1000 storeyed building, determine from what minimum floor it should be thrown for it to crack.”
The egg will crack if thrown from any floor above the ground floor.
The egg will crack due to the impact with the ground.
The height of the building does not affect the cracking of the egg.
Therefore, the egg will crack if thrown from any floor above the ground floor.
Q27. Have you taken any course on functional programming on Coursera?
Yes, I have taken a course on functional programming on Coursera.
I have completed the course 'Functional Programming Principles in Scala' on Coursera.
The course covered topics such as higher-order functions, recursion, and immutable data structures.
I gained a solid understanding of functional programming concepts and how to apply them in practice.
I also completed programming assignments and quizzes to reinforce my learning.
Q28. 3) What is operator overloading?( Explain with a pseudo code.)
Operator overloading is a feature in programming languages that allows operators to have different behaviors depending on the types of operands.
Operator overloading enables the use of operators with custom types.
It allows the same operator to perform different operations based on the types of operands.
In languages like C++, you can define how operators like +, -, *, etc. work with user-defined types.
Pseudo code example: class Vector { int x, y; Vector operator+(Vector v) { re...read more
Procedural programming focuses on procedures and functions, while Object-Oriented Programming focuses on objects and classes.
Procedural programming uses a top-down approach, breaking down tasks into smaller procedures/functions.
Object-Oriented Programming uses objects that contain data and methods to manipulate that data.
In procedural programming, data and functions are separate entities, while in OOP, they are encapsulated within objects.
OOP promotes reusability and modulari...read more
Q30. Entry for purchases? Purchases was recorded as Rs.100 first, then it increased to Rs.105, what will be the entry?
The entry for purchases will be updated to reflect the increase from Rs.100 to Rs.105.
The original entry for purchases was Rs.100
The updated entry for purchases will be Rs.105
The entry will be updated in the accounting software or ledger
The accounts affected will be the purchases account and the accounts payable account
Q31. What in your opinion would be the repercussions if the fiscal cliff was not avoided, both in US and in the global economy. Will India be affected and why?
Failure to avoid fiscal cliff could lead to severe economic repercussions globally and in the US, with India also being affected.
The US economy could experience a recession, with a potential decrease in GDP and increase in unemployment rates
Global financial markets could experience volatility and uncertainty
India could be affected due to its close economic ties with the US, with potential impacts on trade and investment
The failure to address the fiscal cliff could also lead t...read more
Q32. How a bond is valued? What is the difference between Bond’s duration and maturity? How a bond exposure to risk can be mitigated?
Answering questions related to bond valuation, duration, maturity, and risk mitigation.
A bond's value is determined by its present value of future cash flows
Duration measures the bond's sensitivity to interest rate changes
Maturity is the date when the bond's principal is repaid
Risk exposure can be mitigated by diversification, credit analysis, and hedging strategies
Q33. There is a boat with 100 rungs. How many rungs will be submerged in water on a high tide?
The number of rungs submerged in water on a high tide depends on the height of the tide.
The higher the tide, the more rungs will be submerged
The depth of the water at the location of the boat also affects the number of submerged rungs
The shape and size of the boat can also impact the number of submerged rungs
Q34. Which sorting technique is better and why?
There is no definitive answer as to which sorting technique is better, as it depends on the specific requirements and constraints of the problem.
The choice of sorting technique depends on factors such as the size of the data set, the distribution of the data, and the available resources.
Some commonly used sorting techniques include bubble sort, insertion sort, selection sort, merge sort, quicksort, and heapsort.
Bubble sort is simple but inefficient for large data sets, while ...read more
Q35. U have a array of size million. It contains values 0-9.Sort it
Sort an array of size million containing values 0-9.
Use counting sort algorithm for efficient sorting
Create a count array to store the count of each element
Modify the count array to store the actual position of each element
Iterate through the input array and place each element in its correct position
Time complexity: O(n+k), where n is the size of the input array and k is the range of input values
Q36. What is the difference between a Primary and Secondary Market?
Primary market is where new securities are issued, while secondary market is where already issued securities are traded.
Primary market deals with new securities issuance
Secondary market deals with already issued securities trading
Primary market is where companies raise capital through IPOs
Secondary market is where investors buy and sell securities among themselves
Primary market is less liquid than secondary market
Q37. If there was a hole of dimension x on a beach, how much sand does it contain?
The amount of sand in a hole of dimension x on a beach cannot be determined without additional information.
The volume of sand in the hole depends on the depth of the hole as well as its length and width.
To calculate the volume, the formula V = lwh can be used, where l is the length, w is the width, and h is the depth of the hole.
Without knowing the specific dimensions of the hole, it is impossible to determine the amount of sand it contains.
Q38. Do you know about functional programming?
Yes, functional programming is a programming paradigm that treats computation as the evaluation of mathematical functions.
Functional programming focuses on immutability and pure functions.
It avoids changing state and mutable data.
Higher-order functions and recursion are commonly used in functional programming.
Examples of functional programming languages include Haskell, Lisp, and Scala.
Q39. You love playing chess? What is going on in the chess world right now? How to detect cheaters in a chess game? How to test efficacy of a drug? What are the assumptions of Linear Regression? What do you know abo...
read moreA range of questions from chess to drug efficacy testing and statistical concepts.
The chess world is currently dealing with the issue of detecting cheaters in online games through the use of algorithms and data analysis.
Drug efficacy testing involves conducting clinical trials to determine the effectiveness of a drug in treating a specific condition.
Linear regression assumes a linear relationship between the independent and dependent variables and that the errors are normally...read more
Q40. What is the concept of Seclending, Repurchase and Reverse Repurchase Agreement?
Seclending is a process of lending securities for a short period of time in exchange for collateral.
Seclending involves borrowing and lending of securities.
The borrower provides collateral to the lender in exchange for the securities.
The borrower pays a fee to the lender for the use of the securities.
Repurchase agreement involves the sale of securities with an agreement to repurchase them at a later date.
Reverse repurchase agreement involves the purchase of securities with an...read more
Q41. One quality that makes me different from the rest of my class with example
I have a unique perspective on problem-solving.
I approach problems from different angles, considering multiple solutions.
I am not afraid to think outside the box and challenge conventional wisdom.
I have a track record of coming up with innovative solutions.
For example, in a group project, while everyone was focused on a single approach, I suggested an alternative method that turned out to be more efficient and successful.
Different types of indexing in DBMS include primary, secondary, clustered, non-clustered, unique, and composite indexing.
Primary indexing: Index based on the primary key of a table.
Secondary indexing: Index based on a non-primary key column.
Clustered indexing: Physically rearranges the table's rows based on the indexed column.
Non-clustered indexing: Creates a separate structure for the index.
Unique indexing: Ensures that no two rows have the same indexed value.
Composite index...read more
Q43. How are the BSE and NSE different from each other and how are their indexes calculated?
BSE and NSE are two major stock exchanges in India. Their indexes are calculated differently.
BSE is the oldest stock exchange in Asia while NSE is the largest in terms of market capitalization
BSE index is calculated based on the market capitalization of the companies listed on it while NSE index is calculated based on the free-float market capitalization
BSE index is called Sensex while NSE index is called Nifty
Sensex has 30 companies while Nifty has 50 companies
Q44. What is a dangling pointer? What if we try to dereference it?
A dangling pointer is a pointer that points to a memory location that has been deallocated or freed. Dereferencing it can cause a program to crash.
Dangling pointers occur when memory is freed or deallocated, but the pointer still points to that memory location.
Dereferencing a dangling pointer can cause a segmentation fault or access violation.
Dangling pointers can be avoided by setting the pointer to NULL after freeing the memory it points to.
Use C# to connect to a SQL Server backend or database.
Use SqlConnection class to establish a connection to the SQL Server.
Use SqlCommand class to execute SQL queries.
Handle exceptions using try-catch blocks.
Remember to close the connection after use.
Q46. What are the KYC documents we collect during the review?
KYC documents include government-issued ID, proof of address, and financial statements.
Government-issued ID such as passport, driver's license, or national ID card
Proof of address such as utility bills or bank statements
Financial statements such as tax returns or bank statements
Additional documents may be required depending on the client's profile or risk level
Q47. Difference between procedural oriented and object oriented concepts
Procedural programming focuses on procedures and functions, while object-oriented programming focuses on objects and their interactions.
Procedural programming is based on a step-by-step procedure or set of instructions.
Object-oriented programming is based on the concept of objects, which encapsulate data and behavior.
Procedural programming is more focused on the algorithmic approach.
Object-oriented programming promotes code reusability and modularity.
In procedural programming...read more
Q48. Tell me abt Linked List in java
Linked List is a data structure in Java that stores a sequence of elements with pointers to the next element.
Each element in a Linked List is called a node and contains a value and a pointer to the next node.
Linked Lists are dynamic and can grow or shrink in size during runtime.
Insertion and deletion operations are efficient in Linked Lists compared to arrays.
Traversal in a Linked List is slower compared to arrays as it requires following pointers.
Java provides LinkedList cla...read more
Q49. Types of indices in Relational databases.
Indices in relational databases are used to improve query performance by allowing faster data retrieval.
Clustered index: Determines the physical order of data in a table.
Non-clustered index: Creates a separate structure that contains a copy of the indexed columns and a pointer to the actual data.
Unique index: Ensures that the indexed columns contain unique values.
Composite index: Combines multiple columns into a single index.
Covering index: Includes all the columns required b...read more
Q50. Various means of power generation and which one had maximum efficiency?
Various means of power generation and their efficiency
Renewable sources like solar and wind have high efficiency
Fossil fuels like coal and gas have lower efficiency
Nuclear power has high efficiency but also poses safety concerns
Hydroelectric power has high efficiency but requires specific geographical conditions
Efficiency also depends on the technology used for power generation
Q51. 1) What is Polymorphism in Java?
Polymorphism in Java refers to the ability of an object to take on many forms.
Polymorphism allows objects of different classes to be treated as objects of a common superclass.
It enables methods to be overridden in a subclass with the same name but different implementation.
Polymorphism is achieved through method overriding and method overloading.
Example: A superclass Animal with a method 'makeSound()', and subclasses Dog and Cat that override this method.
Q52. How is runtime polymorphism implemented?How does the compiler understand this?
Runtime polymorphism is implemented through virtual functions and dynamic binding.
Virtual functions are declared in base class and overridden in derived class
Dynamic binding is used to determine which function to call at runtime
Compiler uses virtual function table to understand runtime polymorphism
Q53. What is a derivative? Types of derivatives
A derivative is a financial contract whose value is based on an underlying asset or security.
Derivatives can be used for hedging or speculation.
Types of derivatives include futures, options, swaps, and forwards.
Futures contracts obligate the buyer to purchase an asset at a predetermined price and time.
Options contracts give the buyer the right, but not the obligation, to buy or sell an asset at a predetermined price and time.
Swaps involve exchanging cash flows based on differ...read more
Q54. Type of Corporate Action, What is Life Cycle of Any Event/CA?
The life cycle of a corporate action involves several stages from announcement to completion.
Corporate actions can include events such as mergers, acquisitions, stock splits, and dividend payments.
The first stage is the announcement, where the company publicly declares the event and its details.
Next, there is a record date where shareholders are identified and eligible to receive the benefits of the event.
The third stage is the ex-date, where the stock price is adjusted to re...read more
Q55. How many tennis balls can fill INS Vikrant?”
It is not possible to determine the exact number of tennis balls that can fill INS Vikrant without specific measurements.
The size and capacity of INS Vikrant is not provided in the question.
The volume of INS Vikrant needs to be known to calculate the number of tennis balls it can hold.
Without the necessary data, it is impossible to give a precise answer.
Q56. How well do you understand Investment Bank?
I have a strong understanding of investment banks and their functions.
I am familiar with the role of investment banks in facilitating capital raising and mergers and acquisitions.
I understand the various departments within an investment bank, such as sales and trading, research, and investment banking.
I am knowledgeable about financial products and services offered by investment banks, including equities, fixed income, and derivatives.
I am aware of the regulatory environment ...read more
Q57. Find the expected number of coin tosses to get 3 consecutive heads?
The expected number of coin tosses to get 3 consecutive heads is 14.
The probability of getting a head in a single coin toss is 1/2.
The probability of getting 3 consecutive heads is (1/2)^3 = 1/8.
The expected number of tosses to get 3 consecutive heads is the reciprocal of the probability, which is 8.
However, the first two tosses can be tails, so we need to add 2 more tosses, making the total expected number of tosses 14.
Q58. Why do we not use the phrase "we accept the null hypothesis"?
The phrase 'we accept the null hypothesis' is not used because it implies the null hypothesis is true.
The null hypothesis is assumed to be true until proven otherwise
We can only reject or fail to reject the null hypothesis
Accepting the null hypothesis implies it is true, which is not necessarily the case
Q59. You have studied economics right,what a balance sheet comprises of?
A balance sheet comprises of assets, liabilities, and equity.
A balance sheet is a financial statement that shows a company's financial position at a specific point in time.
Assets are resources owned by the company, such as cash, inventory, and property.
Liabilities are obligations owed by the company, such as loans and accounts payable.
Equity represents the residual interest in the assets of the company after deducting liabilities.
The balance sheet equation is Assets = Liabili...read more
Q60. Draw the payoff curves of a Call Option and Put Option
Payoff curves of a Call Option and Put Option
A Call Option gives the holder the right to buy an underlying asset at a specified price (strike price) on or before a specified date (expiration date)
The payoff of a Call Option is positive when the price of the underlying asset is higher than the strike price
The payoff of a Call Option is limited to the premium paid for the option
A Put Option gives the holder the right to sell an underlying asset at a specified price (strike pric...read more
Q61. Pitch Credit Suisse to a Manager for 1 minute.
Credit Suisse is a leading global financial services company offering a wide range of investment banking and wealth management services.
Credit Suisse has a strong reputation in the financial services industry.
They provide comprehensive investment banking services, including mergers and acquisitions, capital raising, and advisory services.
Their wealth management division offers personalized solutions for high-net-worth individuals and institutions.
Credit Suisse has a global pr...read more
Q62. What are derivatives? Types of derivatives
Derivatives are financial contracts that derive their value from an underlying asset or security.
Types include futures, options, swaps, and forwards
Used for hedging, speculation, and arbitrage
Can be based on stocks, bonds, commodities, currencies, and more
Q63. What do you know about impairment loss, Journal entry for provision and Depreciation, Tell something about investment banking and financial products
Impairment loss is a reduction in the value of an asset, provision is an estimate of a liability, depreciation is the allocation of an asset's cost over its useful life, investment banking deals with raising capital and financial products are instruments used for investment and risk management.
Impairment loss occurs when the carrying value of an asset exceeds its recoverable amount.
Journal entry for provision involves debiting the expense account and crediting the provision a...read more
Q64. 1. Explain Derivetive process flow. 2. How do you control risk in the present process?
Derivative process flow involves identifying, analyzing, and managing financial risks associated with derivative products.
The process starts with identifying the underlying asset or security.
Next, the derivative product is selected based on the desired risk exposure.
The risk associated with the derivative product is then analyzed and quantified.
Risk management strategies are implemented to control and mitigate the identified risks.
These strategies may include hedging, diversi...read more
Q65. What is the difference between GDP and GNP?
GDP measures the value of goods and services produced within a country's borders, while GNP measures the value produced by a country's residents, regardless of location.
GDP measures the economic output of a country within its borders
GNP measures the economic output of a country's residents, regardless of location
GDP includes foreign residents and businesses within the country's borders
GNP includes the country's residents and businesses, regardless of location
GDP is used to me...read more
Q66. What would you do if the company gets bonds?
I would analyze the terms of the bond and its impact on the company's financials.
Review the interest rate and maturity date of the bond
Assess the impact on the company's debt-to-equity ratio
Evaluate the potential benefits and risks of issuing bonds
Consider alternative financing options
Communicate findings to management and make recommendations
Types of polymorphism in OOP include compile-time polymorphism (method overloading) and runtime polymorphism (method overriding).
Compile-time polymorphism: achieved through method overloading, where multiple methods have the same name but different parameters.
Runtime polymorphism: achieved through method overriding, where a subclass provides a specific implementation of a method defined in its superclass.
Example: Compile-time polymorphism - having multiple calculateArea metho...read more
Q68. You are designing an e commerce website which database will you choose and what will you use for authentication given that you can't use JWT or even third party like Google authentication
I would choose a relational database like MySQL and implement a custom authentication system using session management.
Choose a relational database like MySQL for storing user data, product information, and orders.
Implement a custom authentication system using session management to securely authenticate users without JWT or third-party services.
Use encryption techniques to store and validate user passwords securely.
Utilize secure coding practices to prevent common security vul...read more
An abstract class is a class that cannot be instantiated and is used as a blueprint for other classes to inherit from.
Cannot be instantiated directly
May contain abstract methods that must be implemented by subclasses
Can have both abstract and concrete methods
Used to define common behavior for subclasses
Q70. What are the problems you can face and how to remediate it?
Possible problems and solutions
Possible problems include technical issues, communication breakdowns, and resource constraints.
To remediate technical issues, ensure proper maintenance and regular updates.
To address communication breakdowns, establish clear lines of communication and encourage open dialogue.
To overcome resource constraints, prioritize tasks and allocate resources effectively.
Regular monitoring and evaluation can help identify and address problems before they es...read more
Q71. How do you think an investment bank works?
Investment banks help companies and governments raise money by issuing and selling securities.
Investment banks act as intermediaries between issuers of securities and investors.
They help companies and governments raise capital by underwriting securities offerings.
They also provide advisory services for mergers and acquisitions, and other financial transactions.
Investment banks may also engage in trading and market-making activities.
Examples of investment banks include Goldman...read more
Q72. 1. Why Credit Suisse?
Credit Suisse offers a dynamic and challenging work environment with opportunities for growth and development.
Credit Suisse is a leading global financial services company with a strong reputation
The company offers a diverse range of products and services to clients worldwide
Credit Suisse values innovation, collaboration, and a commitment to excellence
Working at Credit Suisse provides opportunities for personal and professional growth
The company has a strong focus on corporate...read more
Q73. 2) Why Investment Banking?
Investment banking offers exciting opportunities for financial analysis, strategic decision-making, and client relationship management.
Opportunity to work on high-profile deals and transactions
Challenging and dynamic work environment
Opportunity to develop strong financial analysis and modeling skills
Exposure to a wide range of industries and sectors
Opportunity to work with top-tier clients and build strong professional networks
A final class in Java is a class that cannot be extended or subclassed.
Final classes are marked with the 'final' keyword in Java.
Final classes are often used for utility classes or classes that should not be modified or extended.
Example: 'String' class in Java is a final class.
API Level in Android is a unique integer value assigned to each version of the Android platform.
API Level determines the Android framework API features available to an app.
Developers specify the minimum API Level required for their app to run.
Higher API Levels offer more features but may limit app compatibility with older devices.
For example, Android 11 has API Level 30.
Operator overloading allows operators to be redefined for user-defined types.
Operator overloading allows defining custom behavior for operators like +, -, *, /, etc.
It is achieved by defining special member functions like operator+(), operator-(), etc.
For example, overloading the + operator for a custom class to concatenate two objects.
Multithreading in Java allows multiple threads to execute concurrently, improving performance and responsiveness.
Multithreading allows multiple tasks to run concurrently within a single program.
Each thread has its own stack and runs independently, sharing resources like memory.
Java provides built-in support for multithreading through the Thread class and Runnable interface.
Example: Creating a new thread using Thread class or implementing Runnable interface.
Q78. What is the present inflation rate?
The present inflation rate varies by country and region.
In the United States, the inflation rate was 5.4% in July 2021.
In India, the inflation rate was 5.59% in July 2021.
In the Eurozone, the inflation rate was 2.2% in July 2021.
Inflation rates can be affected by factors such as supply and demand, government policies, and global events.
Q79. What is your basis of investing in an IPO?
I invest in IPOs based on the company's financials, market demand, and industry trends.
Research the company's financials and growth potential
Analyze market demand for the company's products/services
Consider industry trends and competition
Evaluate the management team and their track record
Assess the IPO valuation and potential for future growth
Diversify your portfolio to manage risk
Examples: Airbnb, Snowflake, DoorDash
Q80. Is ADO.NET part of VB.NET?
Yes, ADO.NET is part of VB.NET.
ADO.NET is a data access technology in the .NET framework.
It provides a set of classes and APIs for accessing and manipulating data from different data sources.
VB.NET is a programming language that can utilize ADO.NET for database operations.
ADO.NET allows developers to connect to databases, execute queries, and retrieve data in a structured manner.
Example: Dim connection As New SqlConnection(connectionString)
Q81. How do you think credit card companies make money?
Credit card companies make money through interest charges, fees, and merchant fees.
Interest charges on balances carried over from month to month
Fees such as annual fees, late payment fees, and balance transfer fees
Merchant fees charged to businesses for accepting credit card payments
Rewards programs funded by interchange fees paid by merchants
Foreign transaction fees for purchases made outside of the card's home country
Q82. What is the reason behind the recent recession?
The recent recession was caused by a combination of factors including the housing market crash, high levels of debt, and global economic instability.
Housing market crash led to a decrease in consumer spending and investment
High levels of debt made it difficult for individuals and businesses to borrow money
Global economic instability, including the European debt crisis, affected international trade and investment
Government policies and regulations also played a role in the rec...read more
Q83. How does Money Laundering affect Financial Market?
Money laundering can have a negative impact on financial markets by increasing risks and reducing investor confidence.
Money laundering can lead to an increase in financial crime, which can destabilize markets and reduce investor confidence.
It can also lead to reputational damage for financial institutions, which can result in loss of business and revenue.
Money laundering can distort market prices and affect the allocation of resources, leading to inefficiencies in the financi...read more
Q84. What are the details of the stock market and its various products?
The stock market is a platform where investors can buy and sell shares of publicly traded companies.
Stocks represent ownership in a company and can be bought and sold on stock exchanges like NYSE and NASDAQ.
Bonds are debt securities issued by companies or governments to raise capital.
Mutual funds pool money from multiple investors to invest in a diversified portfolio of stocks, bonds, or other securities.
Options give investors the right, but not the obligation, to buy or sell...read more
Q85. Explain the torque and which material has greater torque iron or Al
Torque is the twisting force that causes rotation. Iron has greater torque than Al due to its higher magnetic properties.
Torque is a measure of the twisting force that causes rotation.
It is calculated as the product of force and the perpendicular distance from the axis of rotation to the line of action of the force.
Iron has greater torque than Al due to its higher magnetic properties.
This is because magnetic materials like iron have a greater tendency to align themselves with...read more
Q86. What are applications of chemical engineering?
Chemical engineering has applications in various industries such as pharmaceuticals, food, energy, and materials.
Designing and optimizing chemical processes
Developing new materials and products
Improving energy efficiency and reducing environmental impact
Designing and operating chemical plants
Developing and testing new drugs and therapies
Creating new food products and improving food safety
Developing new sources of energy and improving existing ones
Q87. Explain food prices are soaring even though India's inflation rate is negative currently?
Food prices are influenced by various factors beyond inflation rate.
Food prices are affected by supply and demand factors.
Transportation and storage costs also impact food prices.
Weather conditions and natural disasters can affect crop yields and prices.
Government policies and subsidies can also impact food prices.
Consumer preferences and trends can also influence food prices.
Inflation rate may not accurately reflect the cost of food items.
For example, the cost of vegetables ...read more
Q88. Tell me about the eurozone crisis?
The eurozone crisis refers to the economic and financial difficulties faced by some countries in the European Union.
The crisis began in 2009 with the Greek debt crisis and spread to other countries in the eurozone.
It was caused by a combination of factors including high levels of debt, low economic growth, and structural problems within the eurozone.
The crisis led to bailouts of several countries by the European Central Bank and the International Monetary Fund.
Austerity measu...read more
Q89. What do you know about the Libor Scam?
The Libor Scam was a manipulation of the London Interbank Offered Rate (Libor) by banks to benefit their own trading positions.
Libor is a benchmark interest rate used globally for financial products
Banks were found to have manipulated the rate to benefit their own trading positions
The scandal resulted in billions of dollars in fines for banks involved
Several high-profile bankers were also convicted for their involvement
The scandal led to reforms in the way Libor is calculated...read more
Q90. difference between function overloading and overriding
Function overloading is having multiple functions with the same name but different parameters. Function overriding is having a derived class implement a method with the same name and parameters as a method in the base class.
Function overloading is a compile-time polymorphism concept.
Function overriding is a run-time polymorphism concept.
Function overloading is used to provide different ways of calling the same function.
Function overriding is used to provide a specific impleme...read more
Q91. Why Credit Suisse?
Credit Suisse is a leading global financial services company with a strong reputation and a wide range of opportunities for growth and development.
Credit Suisse is known for its expertise in investment banking and wealth management.
The company has a global presence and offers diverse career opportunities in various locations.
Credit Suisse has a strong commitment to innovation and technology, which aligns with my interests and skills.
The company has a solid track record of fin...read more
Q92. 2) What is multithreading?
Multithreading is the ability of a CPU to execute multiple threads concurrently, improving performance and responsiveness.
Multithreading allows multiple threads to run concurrently within a single process.
Each thread has its own program counter, stack, and set of registers.
Threads share the same memory space, allowing them to communicate and share data.
Multithreading can improve performance by utilizing idle CPU time and parallelizing tasks.
Examples of multithreading include ...read more
Q93. Tell me abt class Vector
Vector is a class in C++ that represents a dynamic array.
It allows for efficient insertion and deletion of elements.
It automatically resizes itself as elements are added or removed.
It can be used to implement other data structures like stacks and queues.
Example: vector
v; v.push_back(5); v.push_back(10); Example: vector
names = {"Alice", "Bob", "Charlie"};
Q94. 1. How DHCP works DORA process along with DMZ environment 2.What is APIPA and DHCP helper IP 3.what is default time for assigning a New IP address to client
Explanation of DHCP, DORA process, DMZ environment, APIPA, DHCP helper IP, and default time for assigning a new IP address.
DHCP assigns IP addresses to devices on a network
DORA process involves Discover, Offer, Request, and Acknowledge
DMZ environment is a network segment that separates an internal network from an external network
APIPA is Automatic Private IP Addressing, used when DHCP is not available
DHCP helper IP is used to forward DHCP requests to a DHCP server on a differ...read more
Q95. How do you categorise risk in KYC and What are the risks involved
Risk in KYC is categorized based on the level of threat posed by a customer's profile and activities.
Risk is categorized as low, medium, or high based on factors such as customer profile, transaction history, and geographical location.
Examples of risks involved in KYC include money laundering, terrorist financing, fraud, and identity theft.
KYC analysts assess the risks associated with each customer to ensure compliance with regulations and prevent financial crimes.
Q96. Estimate the number of street lamps in Kanpur?
Estimating the number of street lamps in Kanpur is challenging without specific data.
The number of street lamps in Kanpur can vary depending on factors like population density, road network, and urban development.
One approach to estimate the number of street lamps is to consider the average number of lamps per kilometer of road.
Another approach is to analyze the city's electricity consumption data to determine the approximate number of street lamps.
Local government records or...read more
Q97. What DRIP, Right/EXRI Event, What is Difference between CHOS and VOLU Event type? What is MT564 and MT568, What is EX and Record Date?
Answering questions related to DRIP, Right/EXRI Event, CHOS and VOLU Event type, MT564, MT568, EX and Record Date.
DRIP stands for Dividend Reinvestment Plan, where dividends are reinvested to purchase additional shares of the same stock.
Right/EXRI Event refers to the event where a company issues new shares of stock to existing shareholders.
CHOS and VOLU Event type are both related to corporate actions, where CHOS refers to a change in the number of shares outstanding and VOLU...read more
Q98. ES6 features Shallow cloning and deep cloning How to deep clone nested objects? Hoisting JS execution cycle - call stack, event loop and callbacks
ES6 features, shallow and deep cloning, hoisting, JS execution cycle.
ES6 features include arrow functions, template literals, let and const, destructuring, spread and rest operators, etc.
Shallow cloning creates a new object with the same properties as the original object. Deep cloning creates a new object with all nested objects also cloned.
To deep clone nested objects, use a recursive function or a library like lodash.
Hoisting is the behavior of moving variable and function ...read more
Q99. Functional interface in Java 8 and it's purpose.
Functional interface is an interface with only one abstract method. It enables lambda expressions and method references.
Functional interface is used to enable lambda expressions and method references in Java 8.
It has only one abstract method and can have any number of default or static methods.
Examples of functional interfaces are Runnable, Consumer, Predicate, Function, etc.
Q100. How to perform DFS migration and DHCP server migration from older server to newer servers
DFS and DHCP server migration can be performed using various methods.
For DFS migration, use the DFS Management console to create a new replication group and add the new server as a member. Then, use the DFSRDIAG command to monitor the replication status.
For DHCP server migration, use the DHCP Migration tool to export the DHCP database from the old server and import it to the new server. Then, authorize the new DHCP server in Active Directory.
Ensure that all necessary configur...read more
Top HR Questions asked in Genius KIds
Interview Process at Genius KIds
Top Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month