UnitedHealth
80+ Speridian Technologies Interview Questions and Answers
Q1. There are 100 people standing in a circle, the first person has a gun he starts shooting the person next to him and hands over the gun to the 3rd person and so on. Who will be the last person surviving?
The last person surviving will be the 73rd person.
The pattern of shooting skips every second person.
After each round of shooting, the number of people remaining is halved.
The last person standing will be the one who is skipped in every round of shooting.
Q2. There are 20 blue balls and 13 red balls in a container. I pick up randomly 2 balls from the container if the colour of the balls is same then I replace them with a blue ball and if otherwise then I replace the...
read moreThe last ball will be red.
If the first two balls are of different colors, they will be replaced with a red ball.
If the first two balls are of the same color, they will be replaced with a blue ball.
The number of balls in the container does not affect the outcome.
The last ball will be red because there are more red balls than blue balls in the container.
Q3. There are 100 people. 1st person has a sword. He kills 2nd person and gives the sword to 3rd person. He kills 4th and gives the sword to 5th person.99th person kill 100th person and gives the sword to 1st perso...
read moreThe 100th person will be alive.
The pattern shows that every even numbered person is killed and every odd numbered person receives the sword.
The sword eventually comes back to the 1st person who started the cycle.
Therefore, the 100th person will be killed by the 99th person and the sword will go back to the 1st person.
Hence, the 1st person will be the only one left alive.
Q4. Reverse a Number Problem Statement
Ninja wants to find the reverse of a given number but needs your assistance.
Example:
Input:
T = 2
N = 10400
N = 12345
Output:
401
54321
Explanation:
If a number has trailing zer...read more
Reverse a given number while excluding trailing zeros.
Iterate through the digits of the number from right to left.
Skip any trailing zeros while reversing the number.
Store the reversed number and return it as the output.
Q5. Problem Statement: Delete Node In A Linked List
Given a singly linked list of integers and a reference to a node, your task is to delete that specific node from the linked list. Each node in the linked list has...read more
Given a singly linked list of integers and a reference to a node, delete the specified node from the linked list.
Traverse the linked list to find the node to be deleted
Update the pointers to skip over the node to be deleted
Print the modified linked list after deletion
Q6. Prime Numbers in Interval Problem Statement
You are provided with a positive integer N
. Your task is to return all the prime numbers that are less than or equal to N
.
Input:
The input consists of an integer 'T'...read more
Return all prime numbers less than or equal to a given positive integer N.
Create a function that takes an integer N as input
Iterate from 2 to N and check if each number is prime
Return a list of prime numbers less than or equal to N in ascending order
Q7. Given a square with side L and a circle is inscribed in it. Find the area in the square except the circle. (Pretty simple apti question)
Area of square except inscribed circle
Find area of square
Subtract area of circle from square
Area of square = L^2, Area of circle = pi*(L/2)^2
Answer = L^2 - pi*(L/2)^2
Q8. There are 8 balls out of which only one ball is heavier. You have a weighing balance. In how many attempts (Min and Max) can u find the heavier ball?
Find the heavier ball out of 8 using a weighing balance in minimum and maximum attempts.
Divide the balls into 3 groups of 3, 3, and 2.
Weigh the first two groups against each other.
If they balance, the heavier ball is in the third group.
If one group is heavier, weigh two balls from that group against each other.
If they balance, the heavier ball is the remaining one.
If one ball is heavier, that is the answer.
In the worst case, it takes 3 attempts to find the heavier ball.
Q9. There are 11 balls out of which only one ball is heavier. You have a weighing balance. In how many attempts (Min) can u find the heavier ball?
In 3 attempts, the heavier ball can be found using the weighing balance.
Divide the balls into 3 groups of 3, 3, and 5 balls.
Weigh the first two groups against each other.
If they balance, the heavier ball is in the third group. Weigh two balls from the third group against each other to find the heavier one.
If they don't balance, the heavier ball is in the heavier group. Take two balls from the heavier group and weigh them against each other to find the heavier one.
Q10. Bubble Sort Problem Statement
Sort the given unsorted array consisting of N non-negative integers in non-decreasing order using the Bubble Sort algorithm.
Input:
The first line contains an integer 'T' represent...read more
Bubble Sort algorithm is used to sort an array of non-negative integers in non-decreasing order.
Bubble Sort compares adjacent elements and swaps them if they are in the wrong order.
Repeat this process until the array is sorted.
Time complexity of Bubble Sort is O(n^2) in worst case.
Example: For input 6 2 8 4 10, output will be 2 4 6 8 10.
Q11. What is SDLC(Software Development Life Cycle) and what are it's phases?
SDLC is a process followed by software development teams to design, develop and test high-quality software.
SDLC stands for Software Development Life Cycle
It consists of several phases including planning, analysis, design, implementation, testing, and maintenance
Each phase has its own set of activities and deliverables
The goal of SDLC is to produce high-quality software that meets customer requirements and is delivered on time and within budget
Examples of SDLC models include W...read more
Q12. What are the things other than indexes and tables present in a dbms? (Ans - Views, .. etc.)
Other than indexes and tables, a DBMS also includes views, stored procedures, triggers, and functions.
Views: Virtual tables that are based on the result of a query. They provide a way to simplify complex queries and restrict access to data.
Stored Procedures: Precompiled sets of SQL statements that can be executed with a single command. They enhance performance and allow for code reusability.
Triggers: Special types of stored procedures that are automatically executed when a sp...read more
Q13. Count Inversions Problem Statement
Given an integer array ARR
of size N
, your task is to find the total number of inversions that exist in the array.
An inversion is defined for a pair of integers in the array ...read more
Count the total number of inversions in an integer array.
Iterate through the array and for each pair of elements, check if the conditions for inversion are met.
Use a nested loop to compare each pair of elements efficiently.
Keep a count of the inversions found and return the total count at the end.
Q14. Maximum Subarray Sum Problem Statement
Given an array of integers, determine the maximum possible sum of any contiguous subarray within the array.
Example:
Input:
array = [34, -50, 42, 14, -5, 86]
Output:
137
E...read more
Find the maximum sum of any contiguous subarray within an array of integers.
Iterate through the array and keep track of the maximum sum of subarrays encountered so far.
At each index, decide whether to include the current element in the subarray or start a new subarray.
Use Kadane's algorithm to solve the problem efficiently.
Example: For array [34, -50, 42, 14, -5, 86], the maximum subarray sum is 137.
Q15. Merge Sort Problem Statement
You are given a sequence of numbers, ARR
. Your task is to return a sorted sequence of ARR
in non-descending order using the Merge Sort algorithm.
Explanation:
The Merge Sort algorit...read more
Implement Merge Sort algorithm to sort a sequence of numbers in non-descending order.
Divide the input array into two halves recursively until each array has only one element.
Merge the sorted halves to produce a completely sorted array.
Time complexity of Merge Sort is O(n log n).
Example: Input: [3, 1, 4, 1, 5], Output: [1, 1, 3, 4, 5]
Q16. Copy and Reverse the Array
Given an array of non-negative integers ARR
, your task is to create another array COPY_ARR
with the elements of ARR
in reverse order.
Input:
The first line contains an integer T
denot...read more
Create a new array with elements of given array in reverse order.
Iterate through the given array in reverse order and copy elements to a new array.
Ensure to handle edge cases like empty array or single element array.
Use a temporary variable to swap elements for in-place reversal if required.
Q17. There are 'n' balls out of which only one ball is heavier. You have a weighing balance. Come up with a formula to find the heavier ball
Use a binary search approach to find the heavier ball among 'n' balls using a weighing balance.
Divide the 'n' balls into two equal groups and weigh them on the balance.
If one group is heavier, repeat the process with that group.
If both groups weigh the same, the heavier ball is among the remaining unweighed balls.
Continue dividing and weighing until the heavier ball is found.
Q18. How indexes are implemented? (Ans - B Trees, B+ Trees)
Indexes are implemented using B Trees and B+ Trees.
B Trees and B+ Trees are data structures used to organize and efficiently search data in databases.
B Trees are balanced search trees that store data in nodes with multiple children.
B+ Trees are similar to B Trees but have additional features like leaf nodes that form a linked list.
Indexes are created on specific columns of a database table to improve query performance.
When a query is executed, the database uses the index to q...read more
Ref is used for passing arguments by reference, Out is used for returning multiple values.
Ref keyword is used for passing arguments by reference, allowing the method to modify the original value.
Out keyword is used for returning multiple values from a method, as it does not require the variable to be initialized before being passed.
ViewData, ViewBag, and TempData are ways to pass data between controllers and views in ASP.NET MVC.
ViewData is a dictionary object used to pass data from controller to view. It requires typecasting.
ViewBag is a dynamic property used to pass data from controller to view. No typecasting is required.
TempData is a dictionary object used to pass data from one controller to another or from one action to another.
Managed code is executed by the CLR with memory management, while unmanaged code is executed directly by the operating system without memory management.
Managed code is executed by the Common Language Runtime (CLR) in .NET framework.
Unmanaged code is executed directly by the operating system without CLR.
Managed code provides automatic memory management through garbage collection.
Unmanaged code requires manual memory management.
Examples of managed code include C# and VB.NET, wh...read more
Q22. Reverse Linked List Problem Statement
Given a singly linked list of integers, return the head of the reversed linked list.
Example:
Initial linked list: 1 -> 2 -> 3 -> 4 -> NULL
Reversed linked list: 4 -> 3 -> 2...read more
Reverse a singly linked list of integers and return the head of the reversed linked list.
Iterate through the linked list and reverse the pointers to point to the previous node.
Update the head of the reversed linked list as the last node encountered.
Ensure to handle edge cases like empty list or single node list.
Time complexity should be O(N) and space complexity should be O(1).
Q23. How many soft drinks can be sold on a particular day in J&K?
The number of soft drinks sold in J&K on a particular day depends on various factors such as population, demand, availability, and marketing strategies.
The population of J&K can be a factor in determining the potential number of soft drink sales.
The demand for soft drinks can vary based on factors such as weather, events, and cultural preferences.
The availability of soft drinks in J&K, including distribution channels and retail outlets, can impact sales.
Marketing strategies, ...read more
Q24. What is ‘vlookup’ in excel? Difference between vlookup and hlookup.
VLOOKUP is a function in Excel used to search for a value in the first column of a range and return a corresponding value from another column.
VLOOKUP stands for vertical lookup.
It is commonly used to find specific data in large datasets.
The function takes four arguments: lookup value, table array, column index number, and range lookup.
VLOOKUP is case-insensitive and requires an exact match or an approximate match.
The function returns the value from the corresponding row in th...read more
Q25. Draw a activity flow diagram for ola cabs management system and washing machine .
Activity flow diagrams for Ola cabs management system and washing machine.
Ola cabs management system: User books a cab -> Driver accepts the ride -> User gets picked up -> User reaches destination -> Payment is made.
Washing machine: User selects wash cycle -> Machine fills with water -> Detergent is added -> Machine agitates clothes -> Water drains -> Clothes are rinsed -> Machine spins clothes -> Cycle ends.
Q26. Maximize Stock Trading Profit
You are given an array prices
, representing stock prices over N consecutive days. Your goal is to compute the maximum profit achievable by performing multiple transactions (i.e., b...read more
Calculate maximum profit by buying and selling stocks multiple times.
Iterate through the array of stock prices and find all increasing sequences of prices.
Calculate profit for each increasing sequence and add them up to get the maximum profit.
Make sure to sell before buying again to maximize profit.
Triggers in SQL Server are special types of stored procedures that are automatically executed when certain events occur in a database.
Types of triggers include DML triggers (for INSERT, UPDATE, DELETE operations), DDL triggers (for CREATE, ALTER, DROP operations), and Logon triggers.
Triggers can be set to fire before or after the triggering event.
Examples of triggers include auditing changes to a table using an INSERT trigger, enforcing business rules using an UPDATE trigger,...read more
Generic collections in C# allow for type-safe collections, while non-generic collections do not enforce type safety.
Generic collections use type parameters to specify the type of elements they can contain, ensuring type safety.
Non-generic collections do not specify the type of elements they can contain, leading to potential runtime errors if incorrect types are used.
Example of generic collection: List<string> names = new List<string>();
Example of non-generic collection: Array...read more
Q29. LCA of Binary Tree Problem Statement
You are given a binary tree consisting of distinct integers and two nodes, X
and Y
. Your task is to find and return the Lowest Common Ancestor (LCA) of these two nodes.
The ...read more
Find the Lowest Common Ancestor (LCA) of two nodes in a binary tree.
Traverse the binary tree to find the paths from the root to each node, then compare the paths to find the LCA.
Use recursion to traverse the tree efficiently and find the LCA.
Handle cases where one node is an ancestor of the other node.
Consider edge cases like when one or both nodes are not present in the tree.
Optimize the solution to achieve the desired time complexity.
Q30. How many facebook users are there in the world?
The exact number of Facebook users worldwide is constantly changing, but as of October 2021, there are over 2.8 billion monthly active users.
As of October 2021, Facebook reported having over 2.8 billion monthly active users.
The number of Facebook users is constantly changing as new users join and others deactivate or delete their accounts.
Facebook's user base is spread across different countries and demographics.
The number of Facebook users can be influenced by factors such a...read more
Q31. What are the roles of a database administrator?
A database administrator manages and maintains databases, ensuring their security, performance, and availability.
Designing and implementing database structures
Installing and configuring database software
Monitoring and optimizing database performance
Ensuring data integrity and security
Backing up and restoring databases
Troubleshooting and resolving database issues
Collaborating with developers and system administrators
Planning and implementing database upgrades and migrations
Q32. You are given a triangle with height h and base length b and a square of side length a. How many squares can you fit in triangle? Need to derive formula
Formula to calculate number of squares that can fit inside a triangle
Calculate the area of the triangle and the area of the square
Divide the area of the triangle by the area of the square to get the number of squares that can fit inside the triangle
Formula: (h*b)/(a*a)
Q33. Write a program to find factorial using recursion (again, simple one)
A program to find factorial using recursion.
Define a function that takes an integer as input.
Check if the input is 0 or 1, return 1 in that case.
Otherwise, call the function recursively with input-1 and multiply it with the input.
Q34. Guesstimate : Number if tractors sold in haryana in a year.
Approximately 50,000 tractors are sold in Haryana every year.
Consider the population of Haryana and the number of farmers in the state.
Look at the agricultural output of Haryana and the demand for tractors in the region.
Take into account the number of tractor dealerships in Haryana and their sales figures.
Research the sales figures of major tractor manufacturers in Haryana.
Assume a growth rate based on the previous year's sales figures.
Consider any government policies or subs...read more
Q35. Word Presence in Sentence
Determine if a given word 'W' is present in the sentence 'S' as a complete word. The word should not merely be a substring of another word.
Input:
The first line contains an integer 'T...read more
Check if a given word is present in a sentence as a complete word, not a substring.
Split the sentence into words using spaces as delimiters.
Check if the given word matches any of the words in the sentence exactly.
Ensure the word is not part of a larger word in the sentence.
Output 'Yes' if the word is found as a complete word, 'No' otherwise.
Q36. Types of integrity in dbms? (Ans- Foreign, referential, domain)
Types of integrity in DBMS include foreign, referential, and domain.
Foreign integrity ensures that foreign key values in a table match primary key values in another table.
Referential integrity ensures that relationships between tables are maintained, preventing orphaned or invalid data.
Domain integrity ensures that data in a column adheres to specified data types, formats, or constraints.
For example, in a database for an online store, foreign integrity would ensure that a cus...read more
Normal forms in database management systems help in organizing data to reduce redundancy and improve data integrity.
Normal forms are rules used to design relational database tables to minimize redundancy and dependency.
Boyce-Codd Normal Form (BCNF) is a stricter version of Third Normal Form (3NF) where every determinant is a candidate key.
BCNF helps in eliminating anomalies like insertion, update, and deletion anomalies.
For example, consider a table with columns {StudentID, C...read more
Q38. What are generic and non-generic collections in .net?
Generic collections are type-safe and can store any type of data. Non-generic collections can only store objects of type 'object'.
Generic collections are preferred as they provide compile-time type safety.
Non-generic collections are slower and can cause runtime errors if the wrong type is added.
Examples of generic collections include List
, Dictionary , and Queue . Examples of non-generic collections include ArrayList and Hashtable.
Q39. What are the ways to improve performance of stored procedures?
Ways to improve performance of stored procedures
Use SET NOCOUNT ON to reduce network traffic
Avoid using SELECT *
Use table variables instead of temporary tables
Avoid using cursors
Use appropriate indexes
Avoid using scalar functions
Minimize the use of triggers
Use stored procedures instead of ad hoc queries
Q40. Binary Palindrome Check
Given an integer N
, determine whether its binary representation is a palindrome.
Input:
The first line contains an integer 'T' representing the number of test cases.
The next 'T' lines e...read more
Check if the binary representation of a given integer is a palindrome.
Convert the integer to binary representation
Check if the binary representation is a palindrome by comparing it with its reverse
Return true if it is a palindrome, false otherwise
Q41. What are indexes, views? (DBMS)
Indexes are data structures that improve the speed of data retrieval operations in a database. Views are virtual tables created from queries.
Indexes are used to quickly locate data in a database by creating a sorted structure that allows for efficient searching.
Views are virtual tables that are created by executing a query and storing the result set as a named object.
Indexes can be created on one or more columns of a table to improve the performance of SELECT, UPDATE, and DEL...read more
WHILE is used in loops to repeatedly execute a block of code, while HAVING is used in SQL queries to filter results based on aggregate functions.
WHILE is used in programming languages like SQL to create loops for executing a block of code multiple times.
HAVING is used in SQL queries to filter results based on aggregate functions like SUM, COUNT, AVG, etc.
WHILE is used for iterative operations, while HAVING is used for filtering grouped results in SQL queries.
I have worked with SQL queries and JOIN operations in database management projects.
Used INNER JOIN to combine rows from two or more tables based on a related column between them.
Utilized LEFT JOIN to return all rows from the left table and the matched rows from the right table.
Implemented WHERE clause to filter rows based on specified conditions.
Employed GROUP BY to group rows that have the same values into summary rows.
Executed subqueries to nest one query within another que...read more
Q44. Estimate the market size of 4K and 8K display screens
Estimating the market size of 4K and 8K display screens.
Analyze sales data and market research reports
Consider the adoption rate of 4K and 8K technology
Evaluate the market demand from various industries (entertainment, gaming, advertising, etc.)
Assess the pricing and availability of 4K and 8K displays
Factor in the growth potential and competition in the market
Q45. What is agile methodology?
Agile methodology is an iterative and incremental approach to software development.
Agile methodology emphasizes collaboration, flexibility, and customer satisfaction.
It involves breaking down the project into small, manageable tasks called user stories.
Teams work in short iterations called sprints, typically 1-4 weeks long.
Regular meetings like daily stand-ups and sprint reviews are held to track progress and gather feedback.
Adaptability and continuous improvement are key pri...read more
Q46. • Output and error checking of sql queries.
Output and error checking of SQL queries involves verifying the correctness of query results and handling any potential errors.
Verify the correctness of query results by comparing them with expected output
Check for syntax errors and correct them before executing the query
Handle runtime errors by using try-catch blocks or error handling mechanisms
Validate input parameters to prevent SQL injection attacks
Use appropriate error logging and reporting mechanisms to track and resolv...read more
Q47. 1) Model building process of one of my previous projects 2) Random forest hyperparameters 3) ROC curve, using the ROC curve to set probability cutoffs in classication models 4) Gradient boosting techniques like...
read moreData Scientist interview questions on model building, random forest, ROC curve, gradient boosting, and real estate valuation
For model building, I followed the CRISP-DM process and used various algorithms like logistic regression, decision trees, and random forest
Random forest hyperparameters include number of trees, maximum depth, minimum samples split, and minimum samples leaf
ROC curve is a graphical representation of the trade-off between true positive rate and false positi...read more
Q48. • Estimate the % of smokers in institute
Estimating the percentage of smokers in an institute.
Collect data on the number of smokers and the total population in the institute.
Calculate the ratio of smokers to the total population.
Multiply the ratio by 100 to get the percentage of smokers.
Consider conducting surveys or analyzing existing data to gather information.
Take into account any potential biases or limitations in the data collection process.
Fragmentation is the division of memory into smaller blocks, while segmentation is the division of memory into logical segments.
Fragmentation divides memory into smaller blocks, leading to wasted space and inefficient memory usage.
Segmentation divides memory into logical segments based on program structure or data types.
Fragmentation can occur due to external fragmentation (unused memory between allocated blocks) or internal fragmentation (unused memory within allocated block...read more
Q50. differences between them and how it is better than linear regression
Logistic regression is used for classification while linear regression is used for regression analysis.
Logistic regression predicts the probability of an event occurring, while linear regression predicts the value of a continuous variable.
Logistic regression uses a sigmoid function to map input values to a probability between 0 and 1.
Linear regression assumes a linear relationship between the independent and dependent variables, while logistic regression does not.
Logistic reg...read more
Q51. What is managed and unmanaged code?
Managed code is executed by the CLR while unmanaged code is executed by the operating system.
Managed code is written in languages like C#, VB.NET, etc. and is compiled into Intermediate Language (IL) code.
Unmanaged code is written in languages like C, C++, etc. and is compiled into machine code.
Managed code is executed by the Common Language Runtime (CLR) while unmanaged code is executed by the operating system.
Managed code provides automatic memory management while unmanaged...read more
Q52. Build a stack using queues and vice versa
Stack using queues: push() - enqueue to queue1, pop() - dequeue from queue2 after transferring n-1 elements from queue1 to queue2
To push an element, enqueue it to queue1
To pop an element, transfer n-1 elements from queue1 to queue2, dequeue the last element from queue1 and swap the names of queue1 and queue2
Queue using stacks: enqueue() - push to stack1, dequeue() - pop from stack2 after transferring all elements from stack1 to stack2
To implement a queue using stacks, maintai...read more
Q53. Difference between in, out and ref parameters?
In, out and ref are parameter modifiers in C# used to pass arguments to a method.
In parameters are read-only and used to pass values to a method.
Out parameters are write-only and used to return values from a method.
Ref parameters are read-write and used to pass values to and from a method.
In parameters are passed by value, out and ref parameters are passed by reference.
In parameters are optional, out and ref parameters are required.
Q54. Difference between viewdata, viewbag and tempdata?
Difference between viewdata, viewbag and tempdata
ViewData is used to pass data from controller to view
ViewBag is a dynamic object used to pass data from controller to view
TempData is used to pass data between controller actions or redirects
Q55. What are triggers and types?
Triggers are database objects that automatically execute in response to certain events.
Triggers can be used to enforce business rules or perform complex calculations.
Types of triggers include DML triggers, DDL triggers, and logon triggers.
DML triggers fire in response to data manipulation language (DML) events, such as INSERT, UPDATE, or DELETE statements.
DDL triggers fire in response to data definition language (DDL) events, such as CREATE, ALTER, or DROP statements.
Logon tr...read more
Q56. Is there any process improvements you have done so far? Explain it in details and what were outcome of it?
Yes, I have implemented a process improvement by automating the invoice approval process.
Implemented an automated invoice approval process using software
Reduced the time taken for invoice approval from 2 days to 1 day
Eliminated errors caused by manual data entry
Improved communication between departments
Increased efficiency and productivity
Q57. What are the responsibilities and how to creat dashboards, how to creat workflows and how to creat field configuration
As a Jira Administrator, responsibilities include creating dashboards, workflows, and field configurations.
Creating dashboards involves selecting relevant gadgets and configuring them to display the desired information.
Creating workflows involves defining the steps and transitions for an issue to move through its lifecycle.
Creating field configurations involves customizing the fields that appear on an issue and their behavior.
Jira Administrators are also responsible for manag...read more
Q58. Why UHG; Analytics?
UHG; Analytics offers a unique opportunity to combine my passion for data analysis with the healthcare industry.
UHG is a leading healthcare organization with a strong focus on analytics.
Working at UHG will allow me to contribute to improving healthcare outcomes through data-driven insights.
The company's commitment to innovation and cutting-edge technology aligns with my career goals.
UHG's vast data resources provide an excellent platform for conducting meaningful analytics pr...read more
Q59. 3. Check if two strings are anagram
Check if two strings are anagram
Sort both strings and compare them
Use a hash table to count the frequency of each character in both strings and compare the hash tables
Use an array of size 26 to count the frequency of each letter in both strings and compare the arrays
Q60. What are architectural, structural, behavioural design patterns? Why we need them?
Architectural, structural, and behavioral design patterns are reusable solutions to common software design problems.
Architectural patterns define the overall structure of a software system
Structural patterns describe how objects and classes can be combined to form larger structures
Behavioral patterns focus on communication between objects and how they operate together
Design patterns help to improve software quality, maintainability, and scalability
Examples include MVC, Single...read more
Q61. Implement doubly linked list
Doubly linked list is a data structure where each node has a pointer to both previous and next nodes.
Create a Node class with data, prev and next pointers
Create a LinkedList class with head and tail pointers
Implement methods to add, remove and traverse nodes
Q62. Guesstimate : India's Deodrant market
The Indian deodorant market is a growing industry with a large consumer base and increasing demand for premium and natural products.
The deodorant market in India has been experiencing steady growth over the years.
The market is driven by factors such as increasing disposable income, urbanization, and changing lifestyles.
There is a growing awareness among consumers about personal hygiene and grooming, leading to higher demand for deodorants.
The market is highly competitive with...read more
Q63. What is Is Relationship and As Relationship in oops?
Is Relationship and As Relationship are two types of relationships in object-oriented programming.
Is Relationship is a type of relationship where one class is a subset of another class.
As Relationship is a type of relationship where one class is a type of another class.
Is Relationship is denoted by a solid line with a closed arrowhead pointing towards the superclass.
As Relationship is denoted by a dotted line with an open arrowhead pointing towards the superclass.
Example of I...read more
Q64. what is SVM (Support Vector Machines
SVM is a machine learning algorithm used for classification and regression analysis.
SVM finds the best hyperplane that separates data into different classes.
It works by maximizing the margin between the hyperplane and the closest data points.
SVM can handle both linear and non-linear data using kernel functions.
It is widely used in image classification, text classification, and bioinformatics.
SVM has been shown to be effective in solving complex problems with high-dimensional ...read more
Q65. What is the code for a patient on dialysis
The code for a patient on dialysis is I12.0
The ICD-10 code for a patient on dialysis is I12.0
This code is used to indicate chronic kidney disease stage 5
It is important to accurately assign the correct code for patients on dialysis for proper billing and medical records
Q66. 2. Reverse number with sign
Reverse a number while preserving its sign.
Extract the sign of the number using Math.sign()
Reverse the absolute value of the number using string manipulation
Convert the reversed string back to a number and multiply by the sign
Q67. What is Screen scraping and data scraping
Screen scraping is extracting data from a website's HTML code, while data scraping is extracting data from various sources.
Screen scraping involves extracting data from the visual representation of a website, usually using automation tools like web scrapers.
Data scraping involves extracting data from various sources such as databases, APIs, and documents.
Both screen scraping and data scraping are used to collect and analyze data for various purposes like market research, pric...read more
Q68. Explain override. Why we need virtual?
Override is used to provide a new implementation of a method in a subclass. Virtual is needed to allow the method to be overridden.
Override is used to change the behavior of a method in a subclass
Virtual is used to allow the method to be overridden in a subclass
Without virtual, a subclass cannot override a method from its parent class
Override is used to implement polymorphism in object-oriented programming
Q69. Write a program to sort the array and remove duplicates.
Program to sort and remove duplicates from an array.
Use built-in sort() method to sort the array in ascending order.
Loop through the sorted array and remove duplicates using filter() method.
Return the sorted and duplicate-free array.
Q70. Difference b/w full and partial selectors
Full selectors select all descendants of a specified element, while partial selectors select only direct children.
Full selectors use a space between the parent and child elements, while partial selectors use the > symbol.
Full selectors are more general and can target multiple levels of descendants, while partial selectors are more specific and target only direct children.
Example of full selector: div p selects all
elements inside
elements.Example of partial selector: div > ...read more
Q71. How to settle down the employees bonus?
Settling employee bonuses involves determining the amount, timing, and method of payment.
Determine the amount of the bonus based on performance, company profits, or other factors
Decide on the timing of the bonus, such as end of year or quarterly
Choose the method of payment, such as cash, check, or direct deposit
Communicate the bonus structure and payment details clearly to employees
Consider tax implications and ensure compliance with labor laws
Q72. What is Active Directory
Active Directory is a Microsoft service that manages network resources and user accounts.
It is used to authenticate and authorize users and computers in a Windows domain network.
It stores information about users, groups, computers, and other network resources.
It allows administrators to manage network resources from a central location.
It provides a hierarchical structure for organizing network resources.
It supports single sign-on for users to access multiple network resources...read more
Q73. What is Medical coding
Medical coding is the process of converting healthcare diagnoses, procedures, medical services, and equipment into universal medical alphanumeric codes.
Medical coding helps in accurately documenting patient diagnoses and treatments for insurance claims and medical records
Coders use code sets like ICD-10, CPT, and HCPCS to assign specific codes to medical procedures and diagnoses
These codes ensure uniformity and accuracy in medical billing and reimbursement processes
Medical co...read more
Q74. How do you deal with an angry customer?
I remain calm, listen actively, empathize with their situation, apologize for any inconvenience, and work towards finding a solution.
Remain calm and composed
Listen actively to understand their concerns
Empathize with their situation
Apologize for any inconvenience caused
Work towards finding a solution that satisfies the customer
Q75. Random forest splitting mechanisms details
Random forest uses decision trees to split data into subsets based on feature importance.
Random forest builds multiple decision trees and selects the best split based on feature importance.
Each decision tree splits data into subsets based on a randomly selected subset of features.
The best split is determined by minimizing impurity or maximizing information gain.
Random forest can handle missing values and outliers.
Random forest can be used for classification and regression tas...read more
Q76. What is multi threading
Multi threading is the ability of a program to perform multiple tasks concurrently.
It allows for better utilization of CPU resources
It can improve program performance and responsiveness
Examples include web servers handling multiple requests simultaneously and video games rendering graphics while processing user input
Q77. CA technology tools experience, if any?
Yes, I have experience with CA technology tools.
I have worked extensively with CA Agile Central (formerly Rally) for project management and agile development.
I am familiar with CA Service Virtualization for creating virtual services and simulating real-world scenarios.
I have used CA Release Automation for continuous delivery and deployment.
I have experience with CA Application Performance Management for monitoring and optimizing application performance.
I have worked with CA U...read more
Q78. What is extend keyword
The extend keyword is used to add properties and methods to an existing object.
Used in JavaScript to add properties and methods to an object
Can be used to inherit properties and methods from a parent object
Syntax: Object.assign(target, ...sources)
Example: const obj1 = {a: 1}; const obj2 = {b: 2}; const obj3 = {...obj1, ...obj2};
Q79. What is claims
Claims are requests made by individuals or organizations to an insurance company for compensation or coverage for a loss or damage.
Claims are made to insurance companies for compensation or coverage.
They are requests for reimbursement or payment for a loss or damage.
Claims can be related to various types of insurance, such as auto, health, property, or liability.
Insurance companies evaluate claims to determine if they are valid and covered by the policy.
Claims processing invo...read more
Q80. What is Zaur in Microsoft
Zaur is not a term or technology in Microsoft.
Zaur is not a known term or technology in Microsoft
It is possible that the interviewer may have misspoken or meant to ask a different question
It is important to clarify the question with the interviewer to provide an accurate answer
Q81. How many element of em
The question is unclear and lacks context, making it difficult to provide a specific answer.
Ask for clarification on what 'element of em' refers to
Request more information on the context of the question
Q82. Why is here no unity
Lack of unity can be attributed to various factors such as cultural differences, political divisions, and social inequalities.
Cultural differences: Different cultures may have conflicting values, beliefs, and traditions, leading to a lack of unity.
Political divisions: Political parties or ideologies can create divisions and hinder unity among people.
Social inequalities: Economic disparities, discrimination, and social injustices can create divisions and prevent unity.
Lack of ...read more
Q83. What is insurance
Insurance is a financial product that provides protection against specific risks in exchange for payment of a premium.
Insurance is a contract between an individual or entity and an insurance company.
The individual or entity pays a premium to the insurance company in exchange for coverage against specific risks.
Insurance can cover various aspects such as health, property, life, and liability.
Examples of insurance include health insurance, car insurance, life insurance, and hom...read more
Q84. Sepsis guidelines
Sepsis guidelines are protocols followed by healthcare providers to diagnose and treat sepsis in patients.
Sepsis guidelines help healthcare providers quickly identify and treat sepsis to prevent complications.
Guidelines typically include criteria for diagnosing sepsis, such as the presence of infection and signs of systemic inflammation.
Treatment protocols may involve administering antibiotics, fluids, and other supportive care.
Early recognition and treatment of sepsis are cr...read more
Top HR Questions asked in Speridian Technologies
Interview Process at Speridian Technologies
Top Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month