
UBS


200+ UBS Interview Questions and Answers
Polymorphism in Java allows objects of different classes to be treated as objects of a common superclass.
Polymorphism is achieved through method overriding and method overloading.
Method overriding allows a subclass to provide a specific implementation of a method that is already provided by its superclass.
Method overloading allows multiple methods with the same name but different parameters to coexist in the same class.
Polymorphism helps in achieving flexibility and reusabili...read more
Q102. what is var, methods to calculate var, derivatives and types, option strategies, delta gamma theta
Q103. Difference between method and function
Method is a function that belongs to a class or object, while function is a standalone block of code.
A method is called on an object or class instance, while a function is called independently.
A method can access and modify the state of an object, while a function cannot.
A method is defined within a class or object, while a function is defined outside of them.
Example of a method: object.methodName(), example of a function: functionName().
Q104. What does strict mode do? Accessibility in react How forwardRef works? Keys in react controlled components, uncontrolled components, how to use those?
Explaining the features and usage of ReactJS
Strict mode catches common mistakes and enforces best practices
ForwardRef allows passing refs to child components
Keys help React identify which items have changed, added, or removed
Controlled components are stateful and rely on props to update, while uncontrolled components manage their own state
Accessibility in React involves using ARIA attributes and semantic HTML
Q105. What are the different risk associated with trades?
Trades are associated with various risks such as market risk, credit risk, liquidity risk, operational risk, and legal risk.
Market risk: the risk of loss due to changes in market conditions
Credit risk: the risk of loss due to counterparty default
Liquidity risk: the risk of loss due to inability to sell assets quickly
Operational risk: the risk of loss due to inadequate or failed processes, systems, or human errors
Legal risk: the risk of loss due to non-compliance with laws and...read more
Q106. Do you recommend Multiple Hypothesis Testing?
It depends on the context and purpose of the study.
Multiple hypothesis testing can increase the risk of false positives.
It may be necessary in certain fields such as genomics.
Adjusting for multiple comparisons can help control the false discovery rate.
Consider the cost-benefit of multiple testing correction.
Consult with a statistician to determine the appropriate approach.
Q107. IF YOU MAKE ANY MISTAKE IN PREPARATION OF BALANCESHEET, HOW YOU WILLSOLVE IT?
I would carefully review the balancesheet, identify the mistake, and make the necessary adjustments with proper documentation.
Review the balancesheet thoroughly to identify the mistake
Check for any errors in calculations or data entry
Consult with colleagues or supervisors for assistance if needed
Make the necessary adjustments with proper documentation to show the correction
Ensure the balancesheet accurately reflects the financial position of the company
Q108. Do you have good Wifi and laptop/Desktop
Yes, I have good Wifi and a reliable laptop.
I have a high-speed internet connection with a stable Wifi signal.
My laptop is a recent model with good processing power and memory.
I also have a desktop computer that I use for more demanding tasks.
I regularly update my software and hardware to ensure optimal performance.
Q109. Event that we had organized in SPACE
We organized a stargazing event in SPACE.
The event took place in a specially designed observatory.
Participants had the opportunity to view various celestial objects through telescopes.
Astronomy experts gave informative presentations about the night sky.
There were interactive activities for children, such as building model rockets.
Food and refreshments were provided for attendees to enjoy during the event.
Q110. What is QE? Why is it used?
QE stands for Quantitative Easing. It is a monetary policy used by central banks to stimulate the economy.
QE involves the central bank buying government bonds or other securities from the market to increase the money supply.
The increased money supply is intended to lower interest rates, encourage borrowing and spending, and boost economic activity.
QE is typically used when interest rates are already low and traditional monetary policy measures are no longer effective.
Examples...read more
Q111. Day to day responsibilities in current organization, DevOps tool currently using, CICD pipeline, Automation related
In my current role, I am responsible for managing the CICD pipeline and implementing automation using various DevOps tools.
Managing and maintaining the CICD pipeline for multiple applications
Implementing automation using tools like Jenkins, Ansible, and Docker
Creating and maintaining infrastructure as code using Terraform
Working closely with development teams to ensure smooth deployment of code changes
Monitoring and troubleshooting production issues related to deployment and ...read more
Q112. India's current inflation rate, GDP, fiscal deficit etc
India's current inflation rate is high while GDP growth rate is low. Fiscal deficit is also a concern.
Inflation rate is currently at 6.26% as of June 2021
GDP growth rate for FY 2020-21 was -7.7%
Fiscal deficit for FY 2020-21 was 9.3% of GDP
COVID-19 pandemic has had a significant impact on the economy
Q113. If you want to check if an OLS is best fit how would you quantify
To quantify if an OLS is the best fit, one can use metrics like R-squared, adjusted R-squared, AIC, BIC, and F-statistic.
Calculate the R-squared value - a higher R-squared indicates a better fit
Calculate the adjusted R-squared value - it penalizes for adding unnecessary variables
Check the AIC and BIC values - lower values indicate a better fit
Analyze the F-statistic - a significant F-statistic suggests the model is a good fit
Q114. If there are 2 time series model how to check if both have same distribution
Use statistical tests like Kolmogorov-Smirnov test or Anderson-Darling test to compare the distributions of the two time series models.
Apply Kolmogorov-Smirnov test to compare the cumulative distribution functions of the two time series models.
Use Anderson-Darling test to compare the empirical distribution functions of the two time series models.
Plot histograms of the two time series models and visually inspect for similarities or differences.
Q115. What is compliance? What is regulatory reporting? How good are you with regards to Advance Excel & Python & Macros
Compliance is the act of adhering to laws, regulations, and standards set by governing bodies.
Compliance ensures that organizations operate within legal and ethical boundaries.
It involves identifying and mitigating risks, implementing policies and procedures, and monitoring activities.
Regulatory reporting is the process of submitting information to regulatory authorities to demonstrate compliance.
Advanced Excel, Python, and Macros are useful tools for analyzing data and autom...read more
Q116. What are your experiences or strategies for preparing PowerPoint presentations?
I have extensive experience creating visually appealing and informative PowerPoint presentations.
I always start by outlining the key points and structure of the presentation.
I use a consistent color scheme and font style throughout the slides for a professional look.
I incorporate visuals such as charts, graphs, and images to enhance understanding and engagement.
I practice the presentation multiple times to ensure smooth delivery and timing.
I always have a backup plan in case ...read more
A dangling pointer in C is a pointer that points to a memory location that has been deallocated, leading to potential crashes or undefined behavior.
Dangling pointers occur when memory is deallocated but the pointer is not updated or set to NULL.
Accessing a dangling pointer can result in reading or writing to invalid memory locations.
Example: int *ptr = malloc(sizeof(int)); free(ptr); *ptr = 10; // Accessing a dangling pointer.
Q118. Implement your hash map class?
Hash map class implementation using an array of strings.
Create an array of strings to store key-value pairs
Use a hash function to map keys to indices in the array
Handle collisions using a collision resolution technique like chaining or open addressing
Implement methods to add, remove, and retrieve key-value pairs
Consider resizing the array if it becomes too full or too empty
Q119. Database query to find second highest salary
Query to find second highest salary in a database
Use the SELECT statement to retrieve all salaries in descending order
Use the LIMIT keyword to limit the result set to the second row
Use the OFFSET keyword to skip the first row
Example: SELECT salary FROM employees ORDER BY salary DESC LIMIT 1 OFFSET 1
An APK file is a package file format used for distributing and installing applications on Android devices.
APK stands for Android Package Kit
Contains all the necessary files for an Android app to be installed on a device
Can be downloaded from app stores like Google Play or third-party websites
Q121. how to find elements that are not available in dom in selenium? exception in selenium
To find elements not available in DOM in Selenium, use try-catch block to handle NoSuchElementException.
Use try-catch block to handle NoSuchElementException when trying to find elements not available in DOM.
Catch the exception and handle it appropriately in the code.
Use WebDriverWait with ExpectedConditions to wait for the element to be present before interacting with it.
Q122. Different keys in DBMS.
Different keys in DBMS
Primary key: uniquely identifies each record in a table
Foreign key: establishes a link between two tables
Candidate key: a minimal set of attributes that can uniquely identify a record
Super key: a set of attributes that can uniquely identify a record
Composite key: a key that consists of multiple attributes
Alternate key: a candidate key that is not selected as the primary key
Q123. What are the important ratios of liquidity reporting and it’s significance
Important liquidity ratios include current ratio, quick ratio, and cash ratio. They measure a company's ability to meet short-term obligations.
Current ratio: Compares current assets to current liabilities. A ratio above 1 indicates a company can cover its short-term obligations.
Quick ratio: Similar to current ratio but excludes inventory from current assets. Provides a more conservative measure of liquidity.
Cash ratio: Measures a company's ability to cover short-term liabilit...read more
Q124. Design a system where images and documents would be transferred to client.
Design a system for transferring images and documents to clients.
Use a secure file transfer protocol like SFTP or HTTPS
Implement a user-friendly interface for clients to upload and download files
Utilize cloud storage for scalability and accessibility
Include encryption for data security
Implement version control for tracking changes
Q125. Projects undertaken Differe BA scenarios How do u handle difficult stakeholders Agile Requirement prioritization
Answering questions related to Business Analyst role
For projects undertaken, discuss the scope, objectives, and deliverables
Provide examples of different BA scenarios and how you handled them
When dealing with difficult stakeholders, actively listen, empathize, and find common ground
Explain your understanding and experience with Agile methodology
Discuss your approach to requirement prioritization and how you involve stakeholders in the process
Q126. What are the different types of derivatives?
Derivatives are financial instruments whose value is derived from an underlying asset or group of assets.
Types of derivatives include options, futures, forwards, and swaps.
Options give the holder the right, but not the obligation, to buy or sell an asset at a specified price before or on a specified date.
Futures are contracts to buy or sell an asset at a future date for a price agreed upon today.
Forwards are similar to futures but are customized contracts traded over-the-coun...read more
Q127. What are the current regulatory regulations that are undergoing significant changes
Some current regulatory regulations undergoing significant changes include GDPR, CCPA, and HIPAA.
GDPR (General Data Protection Regulation) in Europe is being updated to address data privacy concerns.
CCPA (California Consumer Privacy Act) is evolving to enhance consumer data protection rights.
HIPAA (Health Insurance Portability and Accountability Act) is seeing changes to improve healthcare data security.
Q128. How would you process millions of records in an excel file
Use programming language to read and process data from Excel file efficiently.
Use a programming language like Python, Java, or C# to read the Excel file.
Utilize libraries like pandas in Python or Apache POI in Java for efficient data processing.
Implement batch processing or parallel processing to handle millions of records efficiently.
Optimize code for memory management and performance to avoid crashes or slowdowns.
Consider using cloud services like AWS Glue or Azure Data Fac...read more
Q129. What are derivatives?
Derivatives are financial instruments that derive their value from an underlying asset or security.
Derivatives can be used for hedging or speculation.
Examples of derivatives include futures, options, and swaps.
Derivatives can be traded on exchanges or over-the-counter.
Derivatives can be complex and involve significant risk.
Derivatives played a role in the 2008 financial crisis.
Q130. What is Prime Services?
Prime Services is a suite of financial services offered by investment banks to hedge funds and other institutional clients.
Prime brokerage
Securities lending
Cash management
Risk management
Trade execution
Reporting and analytics
Examples: Goldman Sachs Prime Services, J.P. Morgan Prime Services
Q131. What is a trade? What types of securities you work on?
Q132. What is the Cadence of Risk assessment in the industry
Risk assessment cadence varies by industry and project complexity.
Risk assessments should be conducted at regular intervals throughout the project lifecycle.
The frequency of risk assessments may increase during high-risk phases of the project.
Risk assessments should be conducted whenever there is a significant change in project scope or objectives.
Some industries, such as healthcare and finance, may have more stringent risk assessment requirements due to regulatory compliance...read more
Q133. Have you ever worked with machine learning algorithms?
Yes, I have experience working with machine learning algorithms in various projects.
I have implemented supervised learning algorithms such as linear regression, logistic regression, and support vector machines.
I have also worked with unsupervised learning algorithms like k-means clustering and principal component analysis.
I have experience with deep learning algorithms such as neural networks and convolutional neural networks.
I have used machine learning algorithms for tasks ...read more
Q134. What is Hypothesis Testing?
Hypothesis testing is a statistical method used to determine whether a hypothesis about a population is likely to be true or not.
It involves formulating a null hypothesis and an alternative hypothesis
A sample is taken from the population and data is collected
The data is analyzed using statistical tests to determine the probability of obtaining the observed results if the null hypothesis is true
If the probability is low, the null hypothesis is rejected in favor of the alternat...read more
Q135. What do you know about the specific process in question?
The specific process in question involves conducting inspections and investigations to ensure compliance with regulations and laws.
Conducting site visits to gather evidence
Interviewing relevant parties
Reviewing documentation and records
Issuing warnings or citations for non-compliance
Preparing reports on findings
Q136. How you copied on Prem data to cloud? How you implemented model in your application? How you made your Hadoop clusters secure?
We used various tools and techniques to copy on-prem data to cloud, implemented the model in our application, and secured our Hadoop clusters.
We used tools like AWS DataSync and Azure Data Factory to transfer data from on-premises to cloud
For implementing the model, we used frameworks like TensorFlow and PyTorch
To secure our Hadoop clusters, we implemented authentication and authorization mechanisms, enabled encryption, and used firewalls and VPNs
We also regularly monitored o...read more
Q137. How to upgrade Elasticsearch without any downtime?
Upgrade Elasticsearch without downtime
Create a new Elasticsearch cluster with the latest version
Configure the new cluster to replicate data from the old cluster
Gradually move traffic to the new cluster
Monitor the replication progress and ensure data consistency
Once all traffic is on the new cluster, decommission the old cluster
Q138. What is Max Likelihood estimation?
Max likelihood estimation is a statistical method used to estimate the parameters of a probability distribution.
It assumes that the observed data is generated from a specific probability distribution.
The method estimates the parameters of the distribution that maximize the likelihood of observing the data.
It is commonly used in fields such as finance, engineering, and biology to make predictions based on observed data.
For example, it can be used to estimate the probability of...read more
Q139. GroupingBy method program in Java 8
GroupingBy method in Java 8 is used to group elements based on a specified property.
GroupingBy method is a part of the java.util.stream package
It takes a classifier function as an argument to group elements based on a property
It returns a Map
> where K is the property used for grouping and List contains the elements that belong to that group Example: Map
> employeesByDepartment = employees.stream().collect(Collectors.groupingBy(Employee::getDepartment));
Q140. 1. Tell me about yourself. 2. What are different treatment in valuations? 3. Are you familiar with SQL?
I am a finance graduate with experience in valuations and proficiency in SQL.
Different treatments in valuations include market approach, income approach, and asset-based approach.
Market approach involves comparing the subject company to similar companies that have been sold recently.
Income approach focuses on the present value of future cash flows generated by the business.
Asset-based approach values the company based on its tangible and intangible assets.
SQL is a programming...read more
Q141. What is a NULL pointer
A NULL pointer is a pointer that does not point to any memory location.
It is represented by the value 0 or NULL.
Dereferencing a NULL pointer results in a segmentation fault.
It is commonly used to indicate the end of a linked list or array.
Q142. Different types of risk in finance
Different types of risk in finance include market risk, credit risk, liquidity risk, operational risk, and legal risk.
Market risk refers to the potential for losses due to changes in market conditions, such as fluctuations in interest rates, exchange rates, or stock prices.
Credit risk is the risk of default by borrowers or counterparties, leading to potential losses for lenders or investors.
Liquidity risk is the risk of not being able to buy or sell assets quickly enough to p...read more
Q143. Micro services platform - how would you deliver value out of it
Q144. What is the difference between bank And Company balance sheet
Bank balance sheet includes assets and liabilities specific to banking operations, while company balance sheet includes assets and liabilities related to overall business operations.
Bank balance sheet focuses on financial instruments like loans, deposits, and securities.
Company balance sheet includes assets like property, equipment, and intangible assets.
Bank balance sheet typically has a higher proportion of liquid assets compared to a company balance sheet.
Company balance s...read more
Q145. What are the three keys of UBS stands for
The three keys of UBS stands for Understanding, Breadth, and Scale.
Understanding: Deep knowledge and expertise in the financial industry.
Breadth: Wide range of products and services offered to clients.
Scale: Global presence and ability to handle large transactions.
Q146. what is kyc? what if bank fails to do kyc
KYC stands for Know Your Customer. If a bank fails to do KYC, it may face legal and financial consequences.
KYC is a process where financial institutions verify the identity of their customers to prevent fraud, money laundering, and terrorist financing.
If a bank fails to do KYC, it may face penalties from regulatory authorities, reputational damage, and increased risk of financial crimes.
Examples of KYC measures include verifying customer identity through documents like passpo...read more
Q147. What is virtual function
A virtual function is a function in a base class that is overridden in a derived class.
Virtual functions allow polymorphism in C++
They are declared using the virtual keyword
The function is resolved at runtime based on the object type
Virtual functions can be pure virtual, meaning they have no implementation in the base class
Example: virtual void print() = 0; // pure virtual function
Q148. how function overloading works
Function overloading allows multiple functions with the same name but different parameters.
Functions with the same name but different parameters can be defined in the same scope
The compiler determines which function to call based on the number and types of arguments passed
Overloading can improve code readability and reduce the need for multiple function names
Example: void print(int x), void print(float x), void print(char x)
Example: int sum(int a, int b), float sum(float a, f...read more
Q149. What is equity,derivative etc
Equity refers to ownership in a company, while derivatives are financial contracts based on the value of an underlying asset.
Equity represents ownership in a company and can be in the form of stocks or shares.
Derivatives are financial contracts that derive their value from an underlying asset such as stocks, bonds, or commodities.
Examples of derivatives include futures, options, and swaps.
Derivatives are often used for hedging or speculation purposes.
Both equity and derivativ...read more
Q150. Scenarios for a manager to handle
Managers may face various scenarios in their work. Here are some pointers to handle them.
Identify the problem and its root cause
Develop a plan of action
Communicate effectively with team members
Delegate tasks appropriately
Monitor progress and adjust plan as needed
Provide feedback and recognition
Handle conflicts and difficult conversations
Stay organized and prioritize tasks
Q151. What is QA Testing? Why do you want to join UBS?
QA testing is the process of ensuring that software products meet the required quality standards.
QA testing involves identifying defects and errors in software products.
It includes testing the functionality, performance, security, and usability of software.
QA testing is done throughout the software development life cycle to ensure that the final product meets the customer's requirements.
Examples of QA testing tools include Selenium, JMeter, and Appium.
Q152. What is dynamic memory allocation in Java
Dynamic memory allocation in Java refers to the process of allocating memory for objects at runtime.
Dynamic memory allocation allows for objects to be created and destroyed during program execution.
The 'new' keyword is used to dynamically allocate memory for objects in Java.
Dynamic memory allocation helps in managing memory efficiently by allocating memory only when needed.
Example: int[] arr = new int[5]; dynamically allocates memory for an integer array of size 5.
Q153. What do you know about the bank?
The bank is a financial institution that provides various banking services to its customers.
The bank offers services such as savings accounts, checking accounts, loans, and credit cards.
It may have multiple branches in different locations.
The bank may have partnerships with other financial institutions.
It may have a mobile app or online banking platform for customers to access their accounts.
The bank may have certain eligibility criteria for opening accounts or obtaining loan...read more
Q154. What is KYC and AML?
KYC stands for Know Your Customer and AML stands for Anti-Money Laundering.
KYC is the process of verifying the identity of a customer or client before doing business with them.
AML is a set of laws, regulations, and procedures designed to prevent the illegal generation of income through money laundering.
KYC and AML are important for financial institutions to prevent fraud, terrorism financing, and other illegal activities.
Examples of KYC and AML measures include verifying cust...read more
Q155. compare UI drop down value stored in array and its corresponding values from DB
Comparing UI dropdown values stored in array with corresponding values from DB
Retrieve UI dropdown values from array and corresponding values from DB
Iterate through both arrays to compare each value
Use a loop to check if each value in UI dropdown array matches the corresponding value in DB
Q156. What databases have you worked on?
I have worked on various databases including MySQL, Oracle, and MongoDB.
MySQL
Oracle
MongoDB
Q157. What do you know about Liquidity risk?
Liquidity risk refers to the risk that a company or financial institution may not be able to meet its short-term financial obligations.
Liquidity risk is the risk that an entity may not have enough liquid assets to meet its short-term liabilities.
It can arise from mismatches between assets and liabilities, sudden withdrawals of funds, or inability to sell assets quickly.
Examples include a bank facing a sudden surge in withdrawals or a company unable to access credit markets du...read more
Q158. Accounting entry for foreign exchange gains and losses on consolidation
Foreign exchange gains and losses on consolidation are accounted for in the financial statements.
Foreign exchange gains and losses on consolidation are recognized in the income statement.
Gains or losses are calculated by comparing the functional currency of the subsidiary with the reporting currency of the parent company.
If the functional currency strengthens against the reporting currency, it results in a gain. If it weakens, it results in a loss.
The gain or loss is recorded...read more
Q159. what is PE ratio? explain balance sheet
PE ratio is a financial metric used to evaluate a company's stock price compared to its earnings per share.
PE ratio is calculated by dividing the market price per share by the earnings per share
It helps investors determine if a stock is overvalued or undervalued
A high PE ratio may indicate that a stock is overvalued, while a low PE ratio may indicate that it is undervalued
Balance sheet is a financial statement that shows a company's assets, liabilities, and equity at a specif...read more
Q160. What are the different types of traders?
There are different types of traders such as day traders, swing traders, position traders, scalpers, and algorithmic traders.
Day traders buy and sell securities within the same day.
Swing traders hold securities for a few days to a few weeks.
Position traders hold securities for a longer period of time, usually months to years.
Scalpers make multiple trades in a short period of time to profit from small price movements.
Algorithmic traders use computer programs to execute trades ...read more
Q161. Risk and controls are correlated
Yes, risk and controls are correlated.
Risk management involves identifying, assessing, and mitigating risks, while controls are measures put in place to manage those risks.
Effective controls can reduce the likelihood and impact of risks, while inadequate controls can increase risk.
For example, implementing cybersecurity controls can reduce the risk of a data breach.
However, over-reliance on controls can also create new risks, such as complacency or a false sense of security.
Q162. What is PEP and how to you define it
PEP stands for Politically Exposed Person, referring to individuals who hold prominent public positions or have close associations with such individuals.
PEPs are individuals who are entrusted with prominent public functions, such as government officials, heads of state, or high-ranking military officers.
Family members or close associates of PEPs are also considered as PEPs due to their potential influence and access to resources.
Financial institutions are required to conduct ...read more
Q163. Rules of Debit and Credit - Accountancy
Rules of Debit and Credit are the fundamental principles of double-entry accounting.
Debit refers to the left-hand side of an account and Credit refers to the right-hand side.
Debit increases assets and expenses, while Credit increases liabilities, equity, and revenue.
Every transaction must have equal Debit and Credit amounts to maintain the balance sheet.
Examples: Debit - Cash, Expenses; Credit - Accounts Payable, Revenue.
Q164. Effects of a negative inflation rate
Negative inflation rate can lead to deflation and economic instability.
Deflation can lead to decreased consumer spending and business investment.
It can also lead to job losses and decreased economic growth.
Countries with negative inflation rates may struggle to pay off debt.
Central banks may implement policies to increase inflation rates.
Examples of countries with negative inflation rates include Japan and Switzerland.
Function overloading is when multiple functions have the same name but different parameters or return types.
Function overloading allows multiple functions with the same name to be defined in a class or namespace.
The functions must have different parameters or return types to be considered overloaded.
Example: void print(int num) and void print(string text) are overloaded functions with the same name 'print'.
A virtual function is a function in a base class that is declared using the keyword 'virtual' and can be overridden by a function in a derived class.
Virtual functions allow for dynamic polymorphism in object-oriented programming.
They are used to achieve runtime binding and enable the implementation of the concept of function overriding.
Virtual functions are typically used in inheritance hierarchies to provide a common interface for derived classes.
Example: virtual void displa...read more
Templates in C++ are a feature that allows for generic programming by creating reusable code.
Templates allow for writing generic functions or classes that can work with any data type.
Templates are defined using the 'template' keyword followed by the template parameter list.
Example: template <class T> T add(T a, T b) { return a + b; }
Q168. How do you Structure Database? Make Design ?
A well-structured database design is crucial for efficient data management.
Identify entities and their relationships
Normalize data to reduce redundancy
Choose appropriate data types and constraints
Consider performance and scalability
Document the design and update as needed
Q169. What are derivatives in finance?
Derivatives in finance are financial instruments whose value is derived from the value of an underlying asset.
Derivatives can be used for hedging against risk, speculating on price movements, or gaining exposure to assets without owning them.
Common types of derivatives include options, futures, forwards, and swaps.
Options give the holder the right, but not the obligation, to buy or sell an asset at a specified price before or on a specified date.
Futures are contracts to buy o...read more
Q170. What is yield is it same as coupon
Yield is not the same as coupon. Yield is the return on investment, taking into account the current market price of the bond.
Yield is the return on investment for a bond, taking into account the current market price.
Coupon is the fixed interest rate paid by the bond issuer to the bondholder.
Yield can be higher or lower than the coupon rate, depending on the bond's current market price.
For example, a bond with a $1,000 face value and a 5% coupon rate may have a yield of 4% if ...read more
Q171. Do you know about hedge funds?
Hedge funds are investment funds that use various strategies to generate high returns for their investors.
Hedge funds are typically only available to accredited investors due to their high-risk nature.
They often use leverage and derivatives to amplify returns.
Hedge funds can invest in a wide range of assets, including stocks, bonds, commodities, and currencies.
Some famous hedge funds include Bridgewater Associates, Renaissance Technologies, and Citadel.
Hedge funds are known f...read more
Q172. What is a V-table?
A V-table is a virtual table used in programming languages to implement polymorphism.
It is used in object-oriented programming languages like C++ and Java.
It contains pointers to functions that can be overridden by derived classes.
It allows objects of different classes to be treated as if they are of the same class.
It is used to implement dynamic binding or late binding.
It is also known as a virtual function table or dispatch table.
Q173. Current project implementation and design
Currently leading the implementation and design of a new project
Developing project timelines and milestones
Collaborating with cross-functional teams to ensure successful implementation
Utilizing project management tools to track progress and identify potential roadblocks
Iterating on design based on user feedback and testing
Ensuring alignment with overall strategic goals and objectives
Q174. What is Var! And what are different methods
Var! is a keyword used in VBA to declare a variable with a specific data type.
Var! is used to declare a variable as Single data type.
It is a shorthand notation for declaring a variable with a specific data type.
Other shorthand notations include Var%, Var&, and Var$ for Integer, Long, and String data types respectively.
Q175. Define virtual dom, viewport, redux, use effect hook
Virtual DOM is a lightweight copy of the actual DOM, viewport is the visible area of a web page, Redux is a state management tool, useEffect hook is used for side effects in React components.
Virtual DOM is a lightweight copy of the actual DOM, used for efficient updates.
Viewport is the visible area of a web page on a device's screen.
Redux is a state management tool for managing application state in a predictable way.
useEffect hook is used in React functional components to per...read more
Q176. Stakeholder management and identifying risk in the process
Stakeholder management and risk identification are crucial for effective product equities control.
Identify key stakeholders and their needs
Communicate effectively with stakeholders to manage expectations
Regularly assess potential risks and develop mitigation strategies
Stay up-to-date with industry regulations and standards
Collaborate with cross-functional teams to ensure all aspects of the product are considered
Examples: identifying potential supply chain disruptions, managin...read more
Q177. What is polymrphism
Polymorphism is the ability of an object to take on many forms.
Polymorphism allows objects of different classes to be treated as if they are of the same class.
It is achieved through method overriding and method overloading.
Examples include method overriding in inheritance and implementing interfaces in Java.
Polymorphism helps in achieving loose coupling and flexibility in code design.
Q178. What is Interest rate derivative ?
Interest rate derivative is a financial contract whose value is based on the interest rate of an underlying financial asset.
Interest rate derivatives are used to hedge against interest rate risk or speculate on future interest rate movements.
Examples include interest rate swaps, interest rate options, and interest rate futures.
They allow investors to manage their exposure to interest rate fluctuations without actually owning the underlying asset.
Q179. What is defaulting?
Defaulting is the failure to fulfill a financial obligation or debt repayment.
Defaulting occurs when a borrower fails to make timely payments on a loan or debt.
It can result in penalties, fees, and damage to the borrower's credit score.
Examples include defaulting on a mortgage, car loan, or credit card debt.
Defaulting can also refer to the failure to meet contractual obligations in other areas, such as defaulting on a lease agreement.
Q180. What is happening in the markets
The markets are currently experiencing volatility due to global economic uncertainty and geopolitical tensions.
Global economic uncertainty, such as trade tensions between US and China, Brexit negotiations, and slowing growth in major economies
Geopolitical tensions, including conflicts in the Middle East and North Korea's nuclear program
Market reactions to central bank policies and interest rate changes
Impact of COVID-19 pandemic on global markets and supply chains
Q181. Where we store the object of string
Objects of String are stored in the String Pool in Java.
String objects are stored in the String Pool, a special memory area in Java heap memory.
String literals are automatically stored in the String Pool.
String objects created using the new keyword are not stored in the String Pool.
String.intern() method can be used to store a String object in the String Pool.
Q182. What is query parameters and path param
Query parameters are used to pass data to a web server through the URL, while path parameters are part of the URL itself.
Query parameters are key-value pairs added to the end of a URL after a '?'
Path parameters are variables within the URL path itself, denoted by curly braces {}
Example of query parameter: www.example.com/api/users?id=123
Example of path parameter: www.example.com/api/users/{userId}
Q183. Is duration adjustment always +ve or -ve
Duration adjustment can be positive or negative depending on the direction of interest rate movement.
Duration adjustment is positive when interest rates decrease, leading to an increase in bond prices.
Duration adjustment is negative when interest rates increase, resulting in a decrease in bond prices.
Investors use duration adjustment to hedge against interest rate risk in their portfolios.
Q184. What are templates
Templates are pre-designed documents or files that serve as a starting point for creating new documents or files.
Templates can be used for various purposes such as creating resumes, business cards, invoices, and presentations.
They save time and effort by providing a pre-designed layout and structure.
Templates can be customized to fit specific needs and preferences.
They are commonly used in software applications like Microsoft Word, PowerPoint, and Excel.
Templates can also be ...read more
Q185. What are bonds? And types of bonds?
Bonds are debt securities issued by companies or governments to raise capital. Types include corporate, municipal, and treasury bonds.
Bonds are essentially loans that investors make to the issuer.
The issuer promises to pay back the principal amount plus interest over a set period of time.
Corporate bonds are issued by companies, municipal bonds by local governments, and treasury bonds by the federal government.
Bonds are generally considered less risky than stocks, but offer lo...read more
Q186. Different joins in SQL
Different joins in SQL
Inner join: returns only matching rows from both tables
Left join: returns all rows from left table and matching rows from right table
Right join: returns all rows from right table and matching rows from left table
Full outer join: returns all rows from both tables
Cross join: returns all possible combinations of rows from both tables
Q187. What Is Corporate Actions?
Corporate actions refer to events initiated by a publicly-traded company that can affect the value of its securities.
Corporate actions can include stock splits, dividends, mergers and acquisitions, spin-offs, and rights issues.
These actions can have a significant impact on the price of a company's stock and can affect the value of an investor's portfolio.
Investors need to stay informed about corporate actions to make informed decisions about buying, selling, or holding a comp...read more
Q188. what is aml and risk that client bring
AML stands for Anti-Money Laundering and refers to the measures taken by financial institutions to prevent and detect money laundering activities. Risk that clients bring includes the potential for involvement in illegal activities or financial fraud.
AML involves implementing policies and procedures to identify and report suspicious activities that may be related to money laundering or terrorist financing.
Clients may pose a risk if they engage in large, frequent, or unusual t...read more
Q189. Risk and Compliance in financial institutions
Q190. How do you best learn new information?
I learn best by actively engaging with the material through hands-on activities, discussions, and visual aids.
Engage in hands-on activities to apply new information
Participate in discussions to deepen understanding
Use visual aids such as diagrams or charts to reinforce learning
Q191. Explain budgeting, allocations, rolling forecast process.
Budgeting involves setting financial goals, allocations distribute resources, and rolling forecast process adjusts plans based on new information.
Budgeting is the process of creating a financial plan for a specific period, typically a year, outlining expected revenues and expenses.
Allocations involve distributing resources, such as funds or manpower, to different departments or projects based on the budget.
Rolling forecast process is a continuous planning approach where forec...read more
Q192. Why Compliance?
Compliance ensures ethical and legal business practices, protects the company's reputation, and mitigates financial and legal risks.
Compliance is necessary to adhere to laws and regulations
It helps prevent financial crimes such as money laundering and fraud
It protects the company's reputation and builds trust with customers
Non-compliance can result in hefty fines and legal action
Examples of compliance regulations include KYC, AML, GDPR, and HIPAA
Q193. Do you follow current finiancial trends?
Yes, I actively follow current financial trends to stay informed and make informed decisions.
I regularly read financial news articles from reputable sources such as Bloomberg, CNBC, and The Wall Street Journal.
I follow key economic indicators such as GDP growth, inflation rates, and unemployment rates.
I monitor stock market trends and analyze market data to identify potential investment opportunities.
I stay updated on regulatory changes and industry developments that may impa...read more
Q194. Write code for finding palindrome of a string
Code to find palindrome of a string
Iterate through the string from both ends and compare characters
Use two pointers, one starting from the beginning and one from the end
If characters at both pointers match, continue checking until they meet in the middle
If all characters match, the string is a palindrome
Q195. How to call rest api in Angular
To call a REST API in Angular, use the HttpClient module to make HTTP requests.
Import HttpClientModule in app.module.ts
Inject HttpClient in the component/service where API call needs to be made
Use HttpClient methods like get(), post(), put(), delete() to make API calls
Subscribe to the Observable returned by HttpClient methods to get the response data
Handle errors using catchError() method
Q196. How Python data structures stored in memory
Q197. Make 120 using 5 zeros
Using 5 zeros, make 120.
Use factorials: 5! = 120
Use mathematical operations: 0! + 0! + 0! + 0! + 0! + 120 = 120
Use binary: 0b1111000 = 120
Use hexadecimal: 0x78 = 120
Q198. How to calculate VaR for Bonds
VaR for bonds can be calculated using historical simulation, parametric method, or Monte Carlo simulation.
Historical simulation involves using historical data to calculate potential losses.
Parametric method uses statistical techniques to estimate potential losses based on assumptions about the distribution of bond returns.
Monte Carlo simulation involves generating multiple scenarios and calculating potential losses in each scenario.
Example: For a bond portfolio with a 95% con...read more
Q199. What is VaR how to calculate
VaR stands for Value at Risk, a measure used to estimate the potential loss in value of a portfolio over a specified time period under normal market conditions.
VaR is calculated by determining the maximum potential loss within a specified confidence level over a given time horizon.
There are different methods to calculate VaR, including historical simulation, parametric method, and Monte Carlo simulation.
For example, the parametric method calculates VaR using the mean and stan...read more
Q200. React testing How to test hooks?
Hooks can be tested using React Testing Library or Enzyme.
Use React Testing Library's renderHook() method to test hooks
Test the hook's return value and its behavior on re-renders
Use Enzyme's shallow() or mount() methods to test hooks
Mock any external dependencies used in the hook
Test edge cases and error handling
Top HR Questions asked in UBS
Interview Process at UBS

Top Interview Questions from Similar Companies








Reviews
Interviews
Salaries
Users/Month

