Wolters Kluwer
40+ MEHUL GEO PROJECTS LLP Interview Questions and Answers
Q1. Water Jug Problem Statement
You have two water jugs with capacities X
and Y
liters respectively, both initially empty. You also have an infinite water supply. The goal is to determine if it is possible to measu...read more
The problem is to determine whether it is possible to measure a specific amount of water using two jugs with given capacities.
The jugs can be filled, emptied, and water can be poured from one jug to another.
If the target measure is achievable, there must be exactly Z liters of water in one or both jugs.
We can solve this problem using the concept of the greatest common divisor (GCD) of the jug capacities.
If Z is divisible by the GCD of X and Y, then it is possible to measure Z...read more
Q2. Minimum Sum in Matrix Problem Statement
You are given a 2D matrix ARR
consisting of integers with dimensions N x 3
, where N
represents the number of rows.
Your task is to calculate the smallest sum possible by ...read more
The task is to find the smallest sum possible while taking one element from each row, following certain rules.
Iterate through each row of the matrix
For each row, find the minimum element that can be selected based on the rules
Add the selected minimum element to the sum
Return the final sum
Q3. Problem: Deletion in Circular Linked List
You are provided with a Circular Linked List of integers and a specific integer, referred to as 'key'
.
Your task is to implement a function that locates the specified k...read more
Q4. Rearrange Array: Move Negative Numbers to the Beginning
Given an array ARR
consisting of N
integers, rearrange the elements such that all negative numbers are located before all positive numbers. The order of e...read more
Q5. How you justify customer if any bug is reproduced in production?
I would explain the root cause of the bug and provide a plan to fix it.
Acknowledge the issue and apologize for the inconvenience caused
Explain the root cause of the bug and how it was missed during testing
Provide a plan to fix the bug and a timeline for the fix
Assure the customer that steps will be taken to prevent similar issues in the future
Offer compensation or a workaround if possible
Q6. How you will test two reports that point to seperate database?
To test two reports that point to separate databases, compare the data in both reports and verify their accuracy.
Identify the databases that the reports are pointing to
Retrieve the data from both databases
Compare the data in the reports to ensure they match
Verify the accuracy of the data by cross-referencing with the original sources
Perform data integrity checks to ensure the data is consistent and complete
Q7. What you know about Regulatory Reporting?
Regulatory reporting refers to the submission of data to regulatory agencies to ensure compliance with laws and regulations.
Regulatory reporting is mandatory for companies in various industries such as finance, healthcare, and energy.
It involves collecting and submitting data on various aspects of the business such as financial performance, risk management, and compliance with regulations.
The data is submitted to regulatory agencies such as the SEC, FDA, and EPA.
Regulatory re...read more
Q8. What is Function overriding and Overloading?
Function overriding is when a subclass provides a different implementation of a method already defined in its superclass. Function overloading is when multiple methods with the same name but different parameters are defined in a class.
Function overriding is used to achieve runtime polymorphism.
In function overriding, the method signature remains the same but the implementation is different in the subclass.
Function overloading is used to achieve compile-time polymorphism.
In fu...read more
Q9. Which ML algorithm did you use in your project?
I used the Random Forest algorithm in my project.
Random Forest is an ensemble learning method that combines multiple decision trees to make predictions.
It is used for both classification and regression tasks.
Random Forest reduces overfitting and provides feature importance.
Example: I used Random Forest to predict customer churn in a telecom company.
Q10. Have you worked on monitoring windows applications? Explain
Yes, I have experience in monitoring windows applications.
I have used tools like Microsoft System Center Operations Manager (SCOM) and SolarWinds to monitor windows applications.
I have set up alerts and notifications for critical events and thresholds.
I have also created custom dashboards to track performance metrics and identify issues.
Examples of applications I have monitored include Microsoft Exchange, SQL Server, and IIS.
I have worked with both on-premises and cloud-based...read more
Q11. Profit and loss account and Balance sheet Difference
The profit and loss account shows the company's revenues, expenses, and net profit or loss for a specific period. The balance sheet provides a snapshot of the company's assets, liabilities, and equity at a specific point in time.
Profit and loss account shows the financial performance of a company over a specific period, usually a year.
It includes revenues, expenses, and the resulting net profit or loss.
Balance sheet shows the financial position of a company at a specific poin...read more
Q12. Explain event monitoring and the tools used in support
Event monitoring is the process of tracking and analyzing system events to identify issues and improve performance.
Tools used for event monitoring include Nagios, Zabbix, and SolarWinds.
Event monitoring can help detect security breaches, system failures, and performance issues.
It involves setting up alerts and notifications for specific events and analyzing data to identify patterns and trends.
Event monitoring can also be used for compliance and auditing purposes.
Real-time mo...read more
Q13. How do you use CI/CD pipeline in operations?
CI/CD pipeline is used in operations to automate the deployment process and ensure consistency and reliability.
CI/CD pipeline is used to automate the build, test, and deployment process of applications.
It ensures consistency and reliability by automating the entire process, reducing the risk of human error.
It allows for faster deployment of applications, as changes can be quickly tested and deployed.
It also enables continuous monitoring and feedback, allowing for quick identi...read more
Q14. What do you understand by joins in sql?
Joins in SQL are used to combine rows from two or more tables based on a related column between them.
Joins are used to retrieve data from multiple tables in a single query.
Common types of joins include inner join, left join, right join, and full outer join.
Joins are performed using the JOIN keyword and specifying the columns to join on.
Joins can be used to combine tables based on matching values or non-matching values.
Joins help in creating relationships between tables and fe...read more
Q15. Which is optional configure or configure sevice in startup.cs file? Read about constructors Ctor chaining
The optional configuration in startup.cs file is ConfigureService.
Configure method is used to define how the ASP.NET Core application will respond to HTTP requests.
ConfigureServices method is used to configure services for dependency injection.
Configure method is called after ConfigureServices method in the startup.cs file.
Q16. What is Sql? And what is a database?
SQL is a programming language used for managing and manipulating relational databases. A database is a structured collection of data.
SQL is used to retrieve, insert, update, and delete data from a database.
A database is a software system that stores and organizes data in a structured manner.
SQL allows users to define the structure of a database, create tables, and establish relationships between tables.
Examples of databases include MySQL, Oracle, and SQL Server.
Q17. How to implement authentication and authorisation in Web api
Authentication and authorization can be implemented in Web API using various methods such as OAuth, JWT, and Identity Framework.
Use OAuth for third-party authentication and authorization
Use JWT for token-based authentication and authorization
Use Identity Framework for role-based authentication and authorization
Implement HTTPS to secure communication between client and server
Use secure password storage techniques such as hashing and salting
Implement rate limiting to prevent br...read more
Q18. 5 Important Components in Test Plan?
5 important components in a test plan are objectives, scope, test strategy, test cases, and test environment.
Objectives: Clearly define the purpose and goals of testing.
Scope: Define the boundaries of testing, what is included and excluded.
Test Strategy: Define the approach to testing, including types of testing and tools used.
Test Cases: Define the specific tests to be executed, including expected results.
Test Environment: Define the hardware, software, and network configura...read more
Q19. Tell me one critical problem statement of your application in which you have automated and the solution you have provided for the same
One critical problem statement automated was testing the login functionality for multiple user roles
Automated testing of login functionality for different user roles
Used Selenium WebDriver to automate login process
Created test scripts to simulate login scenarios for admin, user, and guest roles
Q20. What is GST rate applicable to our industry
The GST rate applicable to your industry depends on the type of goods or services you provide.
GST rates range from 0% to 28% depending on the category of goods or services
Some goods and services are exempt from GST
For example, the GST rate for processed food items is 5%, while it is 18% for luxury items like cars
It is important to consult with a tax expert to determine the exact GST rate applicable to your industry
Q21. What is token based authentication
Token based authentication is a security mechanism that uses a token to authenticate a user instead of a password.
Tokens are generated by the server and sent to the client upon successful login
The client then sends the token with each subsequent request to the server
The server verifies the token and grants access to protected resources
Tokens can have an expiration time and can be revoked by the server
Examples include JWT, OAuth2, and SAML
Q22. What is Product life cycle?
Product life cycle refers to the stages a product goes through from its introduction to its decline and eventual discontinuation.
The stages of product life cycle are: introduction, growth, maturity, decline, and discontinuation.
During the introduction stage, the product is launched and marketed to create awareness and generate demand.
In the growth stage, sales and revenue increase rapidly as the product gains popularity.
During the maturity stage, sales growth slows down and t...read more
Q23. What are solid principles with example
SOLID principles are design principles for object-oriented programming.
Single Responsibility Principle: A class should have only one reason to change.
Open-Closed Principle: Software entities should be open for extension but closed for modification.
Liskov Substitution Principle: Subtypes must be substitutable for their base types.
Interface Segregation Principle: Clients should not be forced to depend on interfaces they do not use.
Dependency Inversion Principle: High-level modu...read more
Q24. What is TDS rate applicable on Rent
TDS rate applicable on Rent is 10% if the annual rent exceeds Rs. 2.4 lakhs.
TDS stands for Tax Deducted at Source
The rate of TDS on rent is 10%
If the annual rent exceeds Rs. 2.4 lakhs, TDS is applicable
The TDS amount is deducted by the tenant and deposited with the government
The TDS certificate is issued by the tenant to the landlord
Q25. What is Accounting Standards 9 on
Accounting Standards 9 (AS 9) is on Revenue Recognition.
AS 9 provides guidelines for recognizing revenue in financial statements.
It outlines the criteria for revenue recognition and the methods of measurement.
It also covers the treatment of revenue from specific transactions such as sales of goods, rendering of services, and construction contracts.
AS 9 is important for ensuring accurate financial reporting and transparency in business operations.
Q26. What is Identity and access management?
Identity and access management (IAM) is the process of managing digital identities and controlling access to resources.
IAM involves creating and managing user accounts and permissions
It ensures that only authorized users have access to sensitive data and systems
IAM solutions include single sign-on (SSO), multi-factor authentication (MFA), and role-based access control (RBAC)
Examples of IAM tools include Okta, Microsoft Azure Active Directory, and Ping Identity
Q27. Which tool you have worked on IAM?
I have worked on Oracle Identity Manager (OIM) for IAM.
I have experience in configuring and managing user access and permissions using OIM.
I have worked on creating and managing roles, policies, and workflows in OIM.
I have also worked on integrating OIM with other systems such as Active Directory and LDAP.
One example of my work with OIM includes setting up a self-service portal for users to request access to specific applications.
Q28. What is A B testing in design?
A B testing in design is a method of comparing two versions of a webpage or app to determine which one performs better.
Involves creating two versions (A and B) with one differing element
Randomly showing each version to users
Analyzing user behavior and performance metrics to determine the better version
Commonly used in web design, marketing campaigns, and user experience testing
Q29. What is design patterns and examples
Design patterns are reusable solutions to common software problems.
Design patterns provide a common language for developers to communicate solutions.
Examples include Singleton, Factory, Observer, and Decorator patterns.
Design patterns can improve code quality, maintainability, and scalability.
Patterns can be categorized into creational, structural, and behavioral patterns.
Understanding design patterns is important for senior software engineers.
Q30. Explain train-test in Scikit learn
Train-test split is a method used to divide a dataset into training and testing sets for model evaluation in Scikit learn.
Split the dataset into two subsets: training set and testing set
Training set is used to train the model, while testing set is used to evaluate the model's performance
Common split ratios are 70-30 or 80-20 for training and testing sets
Example: X_train, X_test, y_train, y_test = train_test_split(X, y, test_size=0.3, random_state=42)
Q31. How mixin work in less?
Mixins in Less are reusable code blocks that can be included in other style rules.
Mixins are defined using the .mixin() function in Less.
They can be included in other style rules using the .mixinName(); syntax.
Mixins can take parameters and return values, allowing for dynamic styling.
Example: .border-radius(@radius) { border-radius: @radius; }
Example usage: .myElement { .border-radius(5px); }
Q32. What is user persona?
User persona is a fictional representation of a target user group based on research and data.
User persona helps in understanding the needs, behaviors, and goals of the target audience.
It includes demographic information, preferences, pain points, and motivations.
Example: A user persona for an e-commerce website might be 'Sara, a 30-year-old working professional who values convenience and quality.'
Q33. What is computation of Income?
Q34. Python program for string,list and oop concepts
Python program demonstrating string, list, and OOP concepts.
Create a class with attributes and methods
Use string methods like split(), join(), and replace()
Manipulate lists using append(), pop(), and slicing
Demonstrate inheritance and polymorphism
Q35. Explain Apriori Method
Apriori method is a popular algorithm for frequent itemset mining in data mining.
Used for finding frequent itemsets in transactional databases
Based on the concept of association rule mining
Involves generating candidate itemsets and pruning based on support threshold
Example: If {milk, bread} is a frequent itemset, then {milk} and {bread} are also frequent
Q36. SDLC in detail
SDLC stands for Software Development Life Cycle. It is a process used to develop software applications.
SDLC is a structured approach that consists of various phases such as requirements gathering, design, development, testing, deployment, and maintenance.
Each phase has specific activities and deliverables that ensure the successful development and delivery of software.
SDLC models include Waterfall, Agile, Spiral, and Iterative.
Waterfall model follows a sequential approach whe...read more
Q37. What is javascript?
JavaScript is a programming language commonly used for creating interactive effects within web browsers.
JavaScript is a high-level, interpreted programming language.
It is used to make web pages interactive and dynamic.
JavaScript can be used for client-side and server-side development.
Commonly used frameworks/libraries include React, Angular, and Vue.
Example: document.getElementById('demo').innerHTML = 'Hello, World!';
Q38. What is view encapsulation
View encapsulation is a technique used to isolate components in a web application from each other.
It prevents styles and scripts from bleeding into other components.
It helps in maintaining code quality and reducing conflicts.
It can be achieved using Shadow DOM or CSS modules.
Angular provides view encapsulation by default.
Q39. Deatiled conversion of the role, work expectation
The role of a Buyer involves sourcing, negotiating, and purchasing goods and services for a company.
Researching potential suppliers and evaluating their products and services
Negotiating prices and terms of contracts with suppliers
Monitoring inventory levels and forecasting demand
Collaborating with other departments to ensure timely delivery of goods
Analyzing market trends and identifying cost-saving opportunities
Q40. What is the current package
I'm sorry, could you please clarify what package you are referring to?
It's important to understand the context of the question before answering
Ask for more information to provide an accurate response
Q41. Importantance of AI & ML for invoice review.
AI & ML are important for invoice review as they automate processes, improve accuracy, and save time and costs.
AI & ML automate the invoice review process, reducing the need for manual intervention.
They can accurately identify errors, discrepancies, and fraudulent activities in invoices.
By analyzing historical data, AI & ML can predict invoice approval or rejection patterns.
They can extract relevant information from invoices, such as vendor details, amounts, and dates.
AI & ML...read more
Q42. Deep dive in technical Azure services
Azure offers a wide range of technical services for cloud computing and storage.
Azure Virtual Machines for running Windows or Linux
Azure App Service for building and deploying web and mobile apps
Azure Functions for serverless computing
Azure Storage for scalable and secure storage
Azure Cosmos DB for globally distributed databases
Azure Kubernetes Service for container orchestration
Azure Cognitive Services for AI and machine learning
Azure DevOps for continuous integration and de...read more
Q43. Managing conflicting priorities
Managing conflicting priorities involves prioritizing tasks, communication, flexibility, and problem-solving.
Prioritize tasks based on importance and deadlines
Communicate with stakeholders to understand their needs and expectations
Be flexible and willing to adjust plans as needed
Use problem-solving skills to find solutions that satisfy all parties involved
Q44. Write a program to reverse the string
Program to reverse a string using array of characters
Create an array of characters from the input string
Iterate through the array in reverse order and append each character to a new string
Return the reversed string
Q45. Individual fear is comfortable
Individual fear can be comfortable due to familiarity and predictability.
Familiarity with fear can make it comfortable as it becomes a known entity
Predictability of fear can provide a sense of control and security
Some individuals may find comfort in their fears as it gives them a sense of identity or purpose
Q46. what is oops ?
Object-oriented programming paradigm that focuses on objects and classes for code organization and reusability.
Encapsulation: bundling data and methods that operate on the data into a single unit (object)
Inheritance: ability of a class to inherit properties and behavior from another class
Polymorphism: ability to present the same interface for different data types
Abstraction: hiding the complex implementation details and showing only the necessary features
Q47. Difficulties faced
Some difficulties faced include managing complex codebases, debugging tricky issues, and keeping up with new technologies.
Managing complex codebases with multiple dependencies
Debugging tricky issues such as memory leaks or race conditions
Keeping up with new technologies and frameworks to stay competitive
Q48. oops concept in java
Oops concept in Java refers to Object-Oriented Programming principles like Inheritance, Encapsulation, Polymorphism, and Abstraction.
Inheritance allows a class to inherit properties and behavior from another class.
Encapsulation involves bundling data and methods that operate on the data into a single unit.
Polymorphism allows objects to be treated as instances of their parent class.
Abstraction hides the implementation details and only shows the necessary features of an object.
More about working at Wolters Kluwer
Top HR Questions asked in MEHUL GEO PROJECTS LLP
Interview Process at MEHUL GEO PROJECTS LLP
Top Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month