Mobikwik
40+ Interview Questions and Answers
There are 10 stacks of 10 coins each. Each coin weighs 10 grams. However, one stack of coins is the lightest, and each coin in that stack weighs only 9 grams. What is the minimum number of weights you nee...read more
Ninja is given an array of integers that contain numbers in random order. He needs to write a program to find and return the number which occurs the maximum times in the given input. He ...read more
You have been given an integer array/list(ARR) of size N that contains only integers, 0 and 1. Write a function to sort this array/list. Think of a solution which scans the array/list only once and don'...read more
Given an array of numbers, find the maximum sum of any contiguous subarray of the array.
For example, given the array [34, -50, 42, 14, -5, 86], the maximum sum would be 137, since we would ...read more
You are Harshad Mehta’s friend. He told you the price of a particular stock for the next ‘N’ days. You can either buy or sell a stock. Also, you can only complete at most 2-transactions. Find ...read more
Given a singly linked list of integers. Your task is to return the head of the reversed linked list.
For example:
The given linked list is 1 -> 2 -> 3 -> 4-> NULL. Then the reverse linked lis...read more
You are given an array of integers 'ARR' of size 'N' and another integer 'K'. Your task is to find and return 'K'th smallest value present in the array.
Note: All the elements in the array a...read more
You have been given a long type array/list 'ARR' of size 'N'. It represents an elevation map wherein 'ARR[i]' denotes the elevation of the 'ith' bar. Print the total amount of rainwater that...read more
You have been given an integer ‘N’. You are supposed to find if the given integer ‘N’ is a perfect square or not. A perfect square is an integer that is the square of an integer.
Input Forma...read more
You have been given a binary matrix of size 'N' * 'M' where each element is either 0 or 1. You are also given a source and a destination cell, both of them lie within the matrix....read more
You are given string S of length N, and an integer K. Your task is to find the length of the longest substring that contains at most K distinct characters.
I...read more
Given a binary tree, print its bottom view from left to right. Assume, the left and the right child make a 45-degree angle with the parent.
A binary tree is a tree in which each parent...read more
You are given an array/list 'ARR' consisting of N integers, which contains elements only in the range 0 to N - 1. Some of the elements may be repeated in 'ARR'. Your task is to find all ...read more
Given a sequence of numbers ‘ARR’. Your task is to return a sorted sequence of ‘ARR’ in non-descending order with help of the merge sort algorithm.
Example :
Merge Sort Algorithm - Merge sort is a Div...read more
Ninja wants to travel from his house to his best friend’s house. The houses are located on a 2D coordinate plane, with Ninja’s house being situated at the origin. Ninja’s friend’s house is locate...read more
You are given an array ‘arr’ of size ‘N’ and an integer ‘K’. Your task is to find the maximum subset-sum of the array that is not greater than ‘K’.
For Example:
Your are given ‘arr’ = [1, 3, 5, 9], ...read more
You are given an array 'ARR' of 'N' integers and you have to calculate 3 things for the given array:-
1. Mean - function mean(): This function should calculate the mean of the array.
2. Median -...read more
You are given an array/list ARR consisting of N integers. Your task is to find all the distinct triplets present in the array which adds up to a given number K.
An array is said to have a...read more
You have to print a regular grid pattern of 'R' rows and 'C' columns with a diamond-like shape of size 'S' in each cell of the grid. The diamond shape will contain ‘/’ and ‘\’ characters to repr...read more
It was an android specific question on how to implement multiple recycler views on a magnified screen.
Q21. How can you collect NPA payment in case costumer contact has been missing
To collect NPA payment when customer contact is missing, utilize various methods such as skip tracing, contacting references, using social media, and legal actions if necessary.
Perform skip tracing to locate the customer's current contact information.
Contact references provided by the customer to gather any updated contact details.
Utilize social media platforms to search for the customer and attempt to establish contact.
Send written communication to the customer's last known ...read more
Q22. Design a system that can handle 10 lacs transactions per second
Design a system to handle 10 lacs transactions per second.
Use distributed systems and load balancing to handle the high volume of transactions.
Implement caching mechanisms to reduce database load.
Use high-performance hardware and optimize code for speed.
Consider using a NoSQL database for faster read/write operations.
Implement fault-tolerant mechanisms to ensure system reliability.
Use asynchronous processing to handle requests quickly.
Consider using a message queue to handle ...read more
Q23. How to exploit/test for the same
To exploit/test for vulnerabilities, use penetration testing tools and techniques to simulate attacks and identify weaknesses.
Use vulnerability scanners to identify potential vulnerabilities
Conduct penetration testing to simulate attacks and identify weaknesses
Perform social engineering tests to assess human vulnerabilities
Use fuzzing techniques to identify software vulnerabilities
Conduct code reviews to identify potential vulnerabilities
Test for security misconfigurations
Use...read more
Q24. Create an custom hashmap with all the function with oops concept
Create a custom hashmap with OOPs concepts
Create a class for the hashmap with private variables for key and value
Implement methods for adding, removing and retrieving elements
Use inheritance to create a separate class for each type of data to be stored
Use encapsulation to protect the data and ensure proper access
Use polymorphism to allow for different types of data to be stored in the same hashmap
Q25. what is the bridge between swiftui and uikit
The bridge between SwiftUI and UIKit is represented by the UIViewRepresentable and UIViewControllerRepresentable protocols.
UIViewRepresentable and UIViewControllerRepresentable protocols allow SwiftUI views to interact with UIKit views and controllers respectively.
UIViewRepresentable is used to wrap a UIKit view and make it available to SwiftUI.
UIViewControllerRepresentable is used to wrap a UIKit view controller and make it available to SwiftUI.
These protocols enable develop...read more
Implement various activities with a cart activity in an e-commerce app.
Order of execution of SQL.
No. Of entries in cross join.
Q28. What are the strategies you are using to enhance your callers productivity and make them fruitful.
I implement training programs, provide resources, set clear goals, and offer regular feedback to enhance caller productivity.
Implementing training programs to improve skills and knowledge
Providing resources such as tools and technology to streamline processes
Setting clear goals and expectations for callers to work towards
Offering regular feedback and coaching to help callers improve performance
Q29. What you tell when customer said I don't pay this amount? ?
Explain the importance of paying the amount and address any concerns the customer may have.
Explain the reasons for the amount owed (e.g. services provided, products purchased)
Discuss the consequences of not paying the amount (e.g. late fees, credit score impact)
Offer solutions or payment plans to help the customer meet their financial obligations
Listen to the customer's concerns and try to find a mutually beneficial resolution
Q30. How do you increase the productivity of your callers.
Increasing caller productivity through training, motivation, and efficient tools.
Provide comprehensive training on product knowledge and communication skills
Implement performance incentives to motivate callers to meet and exceed targets
Utilize efficient call center software and tools to streamline processes and improve efficiency
Design Google Search Engine.
Q33. types of init and their behavior
There are designated initializers in Swift that have specific behaviors, such as convenience init and required init.
Designated initializers are primary initializers for a class and must call a designated initializer from its superclass.
Convenience initializers are secondary initializers that must call another initializer in the same class.
Required initializers must be implemented by all subclasses of a class.
Q34. Difference between SSRF & CSRF
SSRF is an attack that allows an attacker to send a crafted request from a vulnerable web application. CSRF is an attack that tricks a victim into performing an action on a website without their knowledge or consent.
SSRF stands for Server-Side Request Forgery while CSRF stands for Cross-Site Request Forgery.
SSRF allows an attacker to send a request from a vulnerable server to a third-party server while CSRF tricks a victim into performing an action on a website.
SSRF can be us...read more
Q35. How do you reduce idle percentage.
To reduce idle percentage, focus on optimizing workflow, improving communication, setting clear goals, and monitoring performance.
Optimize workflow by identifying and eliminating bottlenecks or inefficiencies.
Improve communication among team members to ensure tasks are being completed efficiently.
Set clear goals and expectations for employees to keep them focused and motivated.
Monitor performance regularly to identify areas for improvement and provide feedback.
Implement time ...read more
Q36. Name Qualifications Experience How convenience a merchant
I am a highly qualified and experienced professional who can provide convenience to merchants through my expertise and skills.
Qualifications: MBA in Marketing, Certified Fintech Professional
Experience: 10+ years in sales and marketing, 5+ years in fintech industry
Convenience to merchant: By offering personalized solutions, optimizing processes, and providing excellent customer service
Example: Implementing a new POS system to streamline transactions and improve efficiency
Q37. Are you ready to loot customers?
Q38. 1. Process for projections 2. Team leading experience
Q39. implement Delegate pattern
Delegate pattern is a design pattern in which an object delegates some of its responsibilities to another object.
Create a protocol defining the methods that the delegate should implement
Declare a delegate property in the delegating class
Set the delegate property to the object that will act as the delegate
Call the delegate methods from the delegating class
Q40. Are you ready to lie 100%?
Q41. Are you ready to steal money?
Q42. Low level design of rate limiter
Rate limiter is a system that controls the rate of traffic sent or received by a network interface.
Implement a token bucket algorithm to track and limit the rate of requests
Use a sliding window algorithm to track the number of requests within a specific time frame
Consider using a distributed rate limiter for scalability and fault tolerance
Q43. LRU Cache Design framework for exception handling
Design a framework for exception handling in a LRU Cache system
Implement try-catch blocks to handle exceptions
Use specific exception classes for different types of errors
Consider using logging mechanisms to track and debug exceptions
Implement a global exception handler to catch unhandled exceptions
Q44. Buidling products from 0 to 1 experience
Experience in developing products from ideation to launch
Identifying market needs and opportunities
Creating a product roadmap and strategy
Leading cross-functional teams in product development
Iterating on prototypes based on user feedback
Launching and scaling the product successfully
Q45. 1.Messaging queue working like Kafka
Messaging queue system similar to Kafka for real-time data processing and streaming
Kafka is a distributed streaming platform capable of handling high volumes of data in real-time
It uses topics to organize data streams and partitions for scalability
Producers publish messages to topics and consumers subscribe to topics to receive messages
Kafka provides fault tolerance, scalability, and high throughput for data processing
Example: Apache Kafka, Amazon Kinesis, Google Cloud Pub/Su...read more
Q46. How to improve chrome browser
Improve Chrome browser by optimizing performance, enhancing security, and adding new features.
Optimize memory usage to improve performance
Enhance security by regularly updating security protocols
Add new features like built-in ad blocker or improved tab management
Improve compatibility with web standards and technologies
Q47. 1. Design notification system
Design a notification system for timely alerts and updates.
Identify the target audience and their preferred communication channels (email, SMS, push notifications, etc.)
Define the types of notifications to be sent (urgent alerts, reminders, updates, etc.)
Implement a user-friendly interface for users to manage their notification preferences
Include features like scheduling notifications, customizing notification settings, and tracking delivery status
Ensure the system is scalabl...read more
Top HR Questions asked in null
Interview Process at null
Top Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month