Faster and better experience!
Filter interviews by
Polymorphism allows methods to do different things based on the object that it is acting upon, enhancing flexibility in code.
Polymorphism is a core concept in OOP, enabling objects to be treated as instances of their parent class.
There are two types: compile-time (method overloading) and runtime (method overriding).
Example of method overloading: multiple methods with the same name but different parameters.
Example ...
Java is a high-level, object-oriented programming language designed for portability, performance, and ease of use.
Platform-independent: Write once, run anywhere (WORA) - Java code can run on any device with a Java Virtual Machine (JVM).
Object-oriented: Supports concepts like inheritance, encapsulation, and polymorphism, making code reusable and modular.
Rich API: Provides a vast set of libraries and frameworks, suc...
OOP in Java is a programming paradigm based on objects, emphasizing encapsulation, inheritance, polymorphism, and abstraction.
Encapsulation: Bundling data and methods that operate on the data within one unit (class). Example: A class 'Car' with attributes like 'speed' and methods like 'accelerate()'.
Inheritance: Mechanism where one class inherits properties and behavior from another. Example: 'Sedan' class inherit...
Hashing is a process that transforms input data into a fixed-size string of characters, typically for data integrity and security.
Hash functions take an input (or 'message') and return a fixed-size string of bytes.
Common hashing algorithms include MD5, SHA-1, and SHA-256.
Hashing is used in password storage to securely store user credentials.
A hash is deterministic; the same input will always produce the same outpu...
Nmap is a powerful open-source network scanning tool used for network discovery and security auditing.
Nmap stands for Network Mapper.
It can identify hosts and services on a network, including open ports.
Commonly used for security assessments and vulnerability scanning.
Example command: 'nmap -sS 192.168.1.1' performs a stealth SYN scan.
Nmap can also detect operating systems and service versions.
A Banking Profit and Loss (P&L) statement is a financial document that shows the revenues, expenses, and profits of a bank over a specific period of time.
It includes details of interest income, fees and commissions, operating expenses, provisions for loan losses, and net income.
The statement helps in analyzing the financial performance and profitability of the bank.
It is an essential tool for stakeholders, inv...
Improving model efficiency involves feature selection, hyperparameter tuning, and ensemble methods.
Perform feature selection to reduce dimensionality and focus on relevant features
Optimize hyperparameters using techniques like grid search or random search
Utilize ensemble methods like bagging or boosting to improve model performance
Consider using more advanced algorithms like deep learning for complex data patterns
Hadoop is a distributed storage system while Spark is a distributed processing engine.
Hadoop is primarily used for storing and processing large volumes of data in a distributed environment.
Spark is designed for fast data processing and can perform in-memory computations, making it faster than Hadoop for certain tasks.
Hadoop uses MapReduce for processing data, while Spark uses Resilient Distributed Datasets (RDDs) ...
Unix commands for permissions
chmod - change file mode bits
chown - change file owner and group
ls - list directory contents with permissions
umask - set default file permissions
AML's main purpose is to prevent and detect money laundering and terrorist financing.
Preventing and detecting money laundering
Preventing and detecting terrorist financing
Identifying and reporting suspicious activity
Complying with regulatory requirements
Protecting the reputation of the institution
Conducting due diligence on customers and transactions
Cybersecurity is the practice of protecting systems, networks, and data from digital attacks and unauthorized access.
Involves safeguarding information systems from cyber threats like malware and phishing.
Includes measures such as firewalls, encryption, and intrusion detection systems.
Examples of cyber threats: ransomware attacks, data breaches, and denial-of-service attacks.
Focuses on both hardware and software securit...
Hashing is a process that transforms input data into a fixed-size string of characters, typically for data integrity and security.
Hash functions take an input (or 'message') and return a fixed-size string of bytes.
Common hashing algorithms include MD5, SHA-1, and SHA-256.
Hashing is used in password storage to securely store user credentials.
A hash is deterministic; the same input will always produce the same output.
Has...
Encoding is the process of converting data into a specific format for efficient transmission or storage.
Encoding transforms data into a different format, such as converting text to binary.
Common encoding schemes include Base64, URL encoding, and ASCII.
Base64 is often used to encode binary data for transmission over text-based protocols.
URL encoding replaces unsafe ASCII characters with a '%' followed by two hexadecimal...
Nmap is a powerful open-source network scanning tool used for network discovery and security auditing.
Nmap stands for Network Mapper.
It can identify hosts and services on a network, including open ports.
Commonly used for security assessments and vulnerability scanning.
Example command: 'nmap -sS 192.168.1.1' performs a stealth SYN scan.
Nmap can also detect operating systems and service versions.
CIA principles ensure data security through Confidentiality, Integrity, and Availability.
Confidentiality: Protecting sensitive information from unauthorized access (e.g., encryption).
Integrity: Ensuring data accuracy and consistency (e.g., checksums to verify data integrity).
Availability: Ensuring that information is accessible when needed (e.g., redundant systems to prevent downtime).
I am currently working as a Senior Financial Analyst at a multinational corporation.
Preparing financial reports and analysis
Budgeting and forecasting
Providing financial recommendations to senior management
Collaborating with various departments on financial matters
CIR ratio stands for Cash Interest Coverage ratio, which measures a company's ability to pay interest expenses with its operating cash flow.
CIR ratio is calculated by dividing operating cash flow by total interest expenses.
A higher CIR ratio indicates that a company is more capable of covering its interest expenses with its cash flow.
A lower CIR ratio may indicate financial distress or an inability to generate enough c...
RoTE is a financial metric used to evaluate the profitability of a company's tangible equity.
RoTE is calculated by dividing net income by average tangible equity.
It measures how efficiently a company is using its tangible assets to generate profit.
Planning and budgeting involve setting financial goals, allocating resources, and monitoring performance to achieve desired RoTE.
For example, a company may set a target RoTE ...
A Banking Profit and Loss (P&L) statement is a financial document that shows the revenues, expenses, and profits of a bank over a specific period of time.
It includes details of interest income, fees and commissions, operating expenses, provisions for loan losses, and net income.
The statement helps in analyzing the financial performance and profitability of the bank.
It is an essential tool for stakeholders, investor...
I appeared for an interview in Apr 2025, where I was asked the following questions.
I applied via Referral and was interviewed in May 2024. There were 2 interview rounds.
Hadoop architecture is a distributed computing framework for processing large data sets across clusters of computers.
Hadoop consists of HDFS (Hadoop Distributed File System) for storage and MapReduce for processing.
HDFS divides data into blocks and stores them across multiple nodes in a cluster.
MapReduce is a programming model for processing large data sets in parallel across a distributed cluster.
Hadoop also includes ...
Hadoop is a distributed storage system while Spark is a distributed processing engine.
Hadoop is primarily used for storing and processing large volumes of data in a distributed environment.
Spark is designed for fast data processing and can perform in-memory computations, making it faster than Hadoop for certain tasks.
Hadoop uses MapReduce for processing data, while Spark uses Resilient Distributed Datasets (RDDs) for f...
I appeared for an interview in Mar 2024.
Maths and general knowledge
Environmental studies
I am a dedicated Process Advisor with expertise in optimizing workflows and enhancing operational efficiency across various industries.
Background in process improvement methodologies, such as Lean and Six Sigma.
Experience in analyzing data to identify bottlenecks and implement solutions.
Worked with cross-functional teams to streamline operations, resulting in a 20% increase in productivity.
Strong communication skills, ...
I applied via Job Portal and was interviewed in Sep 2023. There was 1 interview round.
Credit risk is the risk of loss due to a borrower's failure to repay a loan or meet contractual obligations.
Credit risk is the risk that a borrower will default on a loan or debt obligation.
It is the potential loss that a lender may suffer if a borrower fails to make payments.
Factors that contribute to credit risk include the borrower's credit history, financial stability, and economic conditions.
Lenders use credit sco...
I applied via Referral and was interviewed before Aug 2023. There were 2 interview rounds.
Regression is a statistical method to predict continuous outcomes, while classification is used to predict categorical outcomes.
Regression is used when the target variable is continuous, such as predicting house prices based on features like size and location.
Classification is used when the target variable is categorical, like predicting whether an email is spam or not based on its content.
Regression models include lin...
Hyper parameters are settings that are set before the learning process begins and affect the learning process itself.
Hyper parameters are not learned during the training process, but are set before training begins.
They control the learning process and impact the performance of the model.
Examples include learning rate, number of hidden layers, and batch size in neural networks.
Improving model efficiency involves feature selection, hyperparameter tuning, and ensemble methods.
Perform feature selection to reduce dimensionality and focus on relevant features
Optimize hyperparameters using techniques like grid search or random search
Utilize ensemble methods like bagging or boosting to improve model performance
Consider using more advanced algorithms like deep learning for complex data patterns
I appeared for an interview before Mar 2024, where I was asked the following questions.
Top trending discussions
Some of the top questions asked at the Barclays Shared Services interview -
The duration of Barclays Shared Services interview process can vary, but typically it takes about less than 2 weeks to complete.
based on 18 interview experiences
Difficulty level
Duration
based on 1.1k reviews
Rating in categories
Process Advisor
651
salaries
| ₹1 L/yr - ₹7.1 L/yr |
Assistant Manager
449
salaries
| ₹7 L/yr - ₹21 L/yr |
Assistant Vice President
406
salaries
| ₹14 L/yr - ₹40.1 L/yr |
Senior Analyst
270
salaries
| ₹3.8 L/yr - ₹10 L/yr |
Process Associate
137
salaries
| ₹1 L/yr - ₹7.1 L/yr |
DXC Technology
Sutherland Global Services
Optum Global Solutions
Virtusa Consulting Services