Volante Software Engineer Hiring Test With Answers
Volante Software Engineer Hiring Test With Answers
MySQL Easy
Selects everything in the “users” table, then adds columns from the “clients” table.
If the “users” table exists, selects everything from there. Otherwise, queries the “clients” table as a fallback.
Selects everything in the “users” table, then assigns the “clients” alias.
Selects everything in the “users” table, then adds rows from the “clients” table.
MySQL Medium
MySQL Medium
SELECT customer_id, COUNT( * ) FROM transactions GROUP BY customer_id HAVING COUNT( * ) > 10
1/55
SELECT customer_id, COUNT( * ) AS transactions FROM transactions GROUP BY customer_id HAVING transactions > 10
SELECT customer_id, COUNT( * ) AS transactions FROM transactions WHERE transactions > 10 GROUP BY customer_id
SELECT customer_id, COUNT( * ) AS transactions FROM transactions GROUP BY 1 HAVING transactions > 10
MySQL Medium
SELECT customer_id, SUBSTRING_INDEX(GROUP_CONCAT(amount ORDER BY RAND()), ',', 1) FROM transactions GROUP BY customer_id
MySQL Medium
SELECT customer_id, COUNT( * ) FROM transactions GROUP BY customer_id HAVING COUNT( * ) > 10
SELECT customer_id, COUNT( * ) AS transactions FROM transactions GROUP BY customer_id HAVING transactions > 10
SELECT customer_id, COUNT( * ) FROM transactions GROUP BY customer_id HAVING COUNT( customer_id ) > 10
An iOS project is being extended to include various resource files, such as audio and video assets. To ensure a smooth runtime experience, a script must be
implemented within Xcode's build phases to verify the presence of all these resources before the build process finalizes.
Which of the following code snippets in the "Run Script" phase validates that all resources are copied into the app bundle correctly?
2/55
for file in "${SRCROOT}/Resources"/*; do
if [ ! -e "${BUILT_PRODUCTS_DIR}/${UNLOCALIZED_RESOURCES_FOLDER_PATH}/$(basename "$file")" ]; then
echo "warning: Missing resource: $(basename "$file")"
exit 1
fi
done
In the context of web application security, the OWASP Top 10 list includes "XML External Entities (XXE)" as a notable vulnerability.
Which of the following best describes an effective mitigation strategy for preventing XXE attacks?
Disable XML external entity processing in XML parsers and implement least privilege permissions on XML processing.
Apply regular expression matching to sanitize user-supplied input and prevent malicious payloads.
Enforce strong session management and authentication controls to restrict access to XML processing features and mitigate the risk of XXE attacks.
3/55
Utilize Content Security Policy (CSP) headers to prevent the loading of unauthorized external resources.
During incident response, it was observed that the adversary infiltrated a company's network by illicitly acquiring vendor credentials via phishing.
Subsequently, within the network environment, the adversary employed Living Off the Land Binaries And Scripts(LOLBAS) to camouflage their activities
within legitimate traffic, thereby obfuscating detection efforts. Following this, the adversary deployed malware to establish persistence within the network,
all the while communicating and orchestrating activities from their own server.
Lateral Movement
A SwiftUI app must persist user preference to enable biometric authentication within the app. The settings view should reflect the current preference state,
and any changes should be saved immediately.
Which implementation correctly creates a data binding that will persist the user preference in UserDefaults?
4/55
init() {
_biometricEnabled = State(initialValue: UserDefaults.standard.bool(forKey: "biometricEnabled"))
}
}
Easy PL/SQL
The cursor is used for row-by-row processing of fetched records. After fetching the record in the cursor, it will be processed by its attributes. Which are the
attributes of the cursor from the given options?
ISOPEN
FETCH
NOTFOUND
CLOSE
NOTOPEN
5/55
Question - 11 SCORE: 5 points
If a run time error occurs when executing a PL/SQL procedure, what happens?
If a run time error occurs when executing a PL/SQL procedure, what happens?
an exception is raised
the values of the OUT parameters are copied to their corresponding actual parameters
the values of the IN OUT parameters are copied to their corresponding actual parameters
the values of the IN parameters are copied to their corresponding actual parameters
GET
ACCEPT
READ
CIN
MySQL Hard
SQL_SMALL_RESULT
SQL_BIG_RESULT
SQL_BUFFER_RESULT
6/55
Hard MySQL
Consider a hash table of size 10 where only positive numbers are inserted.
h(x) = x4n mod 10 is a unifrom hash function. h(x) represents the hash function.
h(x) = x4n + 1 mod 10 is a unifrom hash function. h(x) represents the hash function.
h(x) = x4n + 2 mod 10 is a unifrom hash function. h(x) represents the hash function.
h(x) = x4n + 3 mod 10 is a unifrom hash function. h(x) represents the hash function.
Given a hash table of length 10, only positive numbers are inserted. Which option is true regarding these two statements?
Statement I: h(x) = xodd natural number mod 10 is a uniform hash function. h(x) represents the hash function.
Statement II: h(x) = x even natural number mod 10 is a uniform hash function. h(x) represents the hash function.
7/55
Data Structures Graphs Algorithms Depth First Search Hard
Which of the following is/are a valid DFS traversal starting from node 9 of the given graph? There may be more than 1.
A hash table of length 11 uses open addressing with h(x)=x mod 11, and linear probing.
After inserting 6 values into an empty hash table, the table looks like this.
Key Value
0 66
1 44
4 92
8/55
7
8 8
9 64
10 20
Which of the following are possible sequences of insertion? Select all that apply.
A hash table of length 12 uses open addressing with h(x)=x mod 12, and linear probing.
After inserting 6 values into an empty hash table, the table looks like this.
Key Value
0 24
1 49
2 48
3 71
5 65
10
11 59
Which of the following are possible sequences of insertion? Select all that apply.
9/55
24, 49, 48, 65, 59, 71
How many inversions are in A = [1, 2, 9, 8, 100, 20, 3, 7, 59, 900, 1]?
If (i < j) and (A[i] > A[j]), then pair (i, j) is an inversion of array A.
19
20
21
22
An articulation point, also known as a "separating vertex", is one whose removal increases the number of connected components in a graph. How many
articulation points are in the graph shown?
10/55
Question - 22 SCORE: 5 points
Diameter From Tree Traversals
Given the inorder and postorder traversal of a binary tree, find the diameter of the tree.
Inorder: [10, 3, 7, 1, 8, 4, 5, 9, 2, 6]
Postorder: [10, 7, 1, 3, 9, 5, 4, 8, 6, 2]
Which of the following is the postorder successor of node -100 in the given BST?
-20 20
-15 -5
-3
100
-15
-3
-20
11/55
Question - 24 SCORE: 5 points
Bridges - 3
An edge in an undirected connected graph is a bridge if removing it disconnects the graph. How many bridges are in the following graph?
Easy Graphs
Which of these sorting algorithms cannot guarantee the correct ordering of the shortest path in a non-directed acyclic graph?
Topological Sort
Quick Sort
Selection Sort
Heap Sort
12/55
Trees Data Structures Easy Core CS
A binary tree has L leaves and K internal nodes, each with two children. What is the relation of L and K?
L=K+1
L = 2K + 1
L=K-1
For the purpose of compressing the string, an encoding scheme is generated for each of these characters, using the Huffman encoding algorithm (based on
their individual frequencies of occurrence). Which of these may be a legitimate encoding scheme for the string?
A=0,B=100,C=101,D=110,E=111
A=1,B=100,C=101,D=110,E=111
A=1,B=100,C=101,D=110,E=1101
A=1,B=100,C=1001,D=110,E=1101
Consider an undirected graph G with n vertices and e edges. What is the time taken by Depth First Search (DFS) if the graph is represented by (i)adjacency
matrix and (ii) adjacency list?
O(n2), O(n*e)
O(n2),O(e+n)
O(e), O(n2)
O(e+n), O(e)
Heaps Easy
13/55
The array [15, 1, 13, 2, 6, 3, 19] is being sorted using heapsort. The maxheapify operation has just completed. What does the array look like now?
Which sorting algorithm does this code implement? What is its time complexity?
In the following postfix expression what are the values of the top and bottom of the stack before the second '*' operation is performed?
632*/321*-+
1,1
6,1
14/55
1,2
3,1
int a = 1;
while (a < n) {
a = a * 2;
}
O(n)
O(1)
O(log2(n))
O(2n)
To test whether a value lies in the range 2 to 4 ,or 5 to 7 the best statement used should be:
switch
while
for
printing
What is the average time complexity of finding an element in a binary search tree with n elements?
0(1)
15/55
0(log2 n)
0(n)
0(n log2 n)
0(log2n)
0(n)
0(1)
0(n2)
Fetch API is a web api used to fetch resources, commonly across the network. Which of the following are true about the fetch api? Choose one or more.
The promise returned by fetch() rejects on HTTP error codes, for example, 404 or 500.
The promise returned by fetch() resolves on any successful response, including those with error codes.
To extract JSON data from the response, we access its json parameter.
To extract JSON data from the response, we call its json() method.
Medium API
Modern Web APIs provide many possibilities to developers. Which of the following are true?
Local storage can be used to store data across browser sessions without expiration.
FileReader allows reading files stored on the user's machine in a synchronous manner.
Both the Fullscreen API and the Geolocation API require explicit user permission.
16/55
Question - 38 SCORE: 5 points
Good URI Design
Authentication
Caching
Versioning of API
An API uses ETag headers for caching. Which of the following statements is true about ETag headers?
When the client makes a request, the API calculates a hash value for the requested resource and sends it to the client in the ETag header.
When the client makes a request, the API sends the current timestamp in the ETag header.
When the client makes a subsequent request, it includes the received ETag value in the If-Modified-Since header. The API compares the received ETag value
with the current hash value of the resource.
17/55
When the client makes a subsequent request, it includes the received ETag value in the If-None-Match header. The API compares the received ETag value with
the current hash value of the resource.
An API utilizes the endpoint GET /digest-auth as a means of authentication for client requests. What does the "Connect" option do in this scenario?
The Connect option is used to establish a secure connection to the server for transmitting authentication credentials.
The Connect option is used to send the authentication credentials to the server for verification.
The Connect option is used to refresh expired authentication tokens for continued access to the API.
The Connect option is used to initiate a request for an authentication challenge from the server before proceeding with the request.
A systems architect is building a distributed caching system to store user-session information. Initially, the architect decides to use three cache servers.
Consistent hashing is chosen to distribute the sessions among the servers. The hash function uniformly distributes session IDs across a ring with a range of 0
to 999 (inclusive).
On a particular day, the following hashed session ID values are observed: 25, 333, 567, and 897. After some time, noticing the increasing load, a decision is
made to add a fourth cache server.
Assuming the three initial cache servers are placed at positions 100, 400, and 700 on the hash ring, which one of the sessions would likely be relocated if a
fourth cache server is introduced at position 600?
A growing e-commerce platform is currently deployed on a single server. The platform witnessed a rapid growth in its user base over the past year, which led
to the server frequently reaching its CPU and memory limits. To handle the increasing traffic, the CTO of the company is considering scaling options.
18/55
Which of the above statements relates to vertical scaling and which one relates to horizontal scaling?
Reliability of a system is a measure of how resistant it is to failures of various types, for example attacks, disk or network failures. Which of the following are
true?
Some companies disable parts of their system on purpose even on production. It is an extreme strategy. The idea to make the system experience failures often and so have proof it can handle them
well.
Indexing is one of the fundamental approaches to making a system resistant to node failures.
Some of the failures can be classified as either network failures, crash failures or Byzantine failures. The most difficult of these are Byzantine failures.
In a CI/CD environment where multiple projects are concurrently developed, what is a significant requirement to manage Checkmarx licenses effectively?
During a security assessment, a web application login form is tested using Burp Suite Repeater to attempt an exploit.
19/55
To effectively exploit the vulnerability, where should the SQL payload be placed within the HTTP login request?
Accept-Language: en-US,en;q=0.9
uid=test&passw=test&btnSubmit=Login
Consider a CE(CRM) setup where an online shop needs to talk to Dataverse through different plugins to check orders in real time (right away) and also
process them in the background. Simultaneously, an Azure Logic App should maintain inventory alignment with an external system through APIs. Power
Automate must send prompt notifications about data changes using Azure services. The solution must minimize delays in real-time checks, ensure
background processing consistency, and have robust error management, including a backup plan for contingencies.
Use a Chain pattern in immediate plugins. Use Azure Queue for separating background tasks. Use Stateful Logic Apps for matching inventory. Use Power
Automate and Azure Event Grid for sending alerts. Use Dead-letter queues for managing errors.
Use an Observer pattern in immediate plugins. Use Azure Service Bus for background communication. Use Logic Apps for inventory. Use Power Automate
and Azure Functions with Azure Event Hubs for alerts. Use Azure Durable Functions for managing errors and backup plans.
Use a Proxy pattern in immediate plugins. Use Azure Blob Storage for background data. Use Logic Apps with Polling for inventory. Use Power Automate and
Azure Webhooks for alerts. Use a Circuit Breaker pattern for managing errors.
Use a Strategy pattern in immediate plugins. Use Azure Event Hubs for background messages. Use Stateless Logic Apps for inventory. Use Power Automate
and Azure SignalR for alerts. Use Try-Catch blocks for managing errors.
20/55
Question - 48 SCORE: 5 points
Comprehensive Configuration
A CE(CRM) application aims to manage a large bookstore’s sales and inventory by instantantly validating prices (synchronous) and handling bulk updates of
user rewards (asynchronously). Concurrently, an Azure Logic App is tasked with matching inventory data between Dataverse and a third-party supplier using
APIs. Moreover, Power Automate must instantly trigger alerts for any discrepancies caused by data changes through Azure Services. This implementation
should prioritize minimal delay in immediate operations, meticulous consistency in background processing, and an error mechanism that is both robust and
comprehensive.
Execute Chain pattern in synchronous plugins. Use Azure Blob Storage for asynchronous bulk updates. Deploy Stateful Logic Apps using Polling for inventory
matching.Integrate Power Automate with Azure SignalR Service for alerts. Apply Dead-letter queues for error strategy.
Implement Observer pattern for synchronous plugins. Utilize Azure Queue Storage for asynchronous tasks. Implement Stateless Logic Apps with Webhooks
for inventory synchronization. Combine Power Automate and Azure Functions for alerting. Use Circuit Breaker pattern for errors.
Utilize Composite pattern in synchronous plugins. Use Azure Table Storage for asynchronous rewards updates. Use Stateful Logic Apps with Polling for
inventory synchronization. Combine Power Automate and Azure Event Hubs for alerts. Utilize Azure Durable Functions for errors and backup.
Apply Strategy pattern for synchronous plugins. Use Azure Service Bus for asynchronous processing. Use Stateless Logic Apps for inventory synchronization.
Combine Power Automate and Azure Event Grid for alerts. Apply Try-Catch blocks for error management.
In a CRM solution with deeply intertwined relations across Dataverse, business units, environments, and logic layers, a server-side logic mechanism is needed.
It should ensure optimal transaction speed and data integrity, comply with various business processes and regulations, and manage bidirectional data
synchronization between Dataverse and an external reservoir using Power Automate. Additionally, it should have a fallback mechanism.
Which of the following strategies should be used to achieve atomicity, synchronized data flow, regional compliance, low latency, and a failover plan in this
server-side logic?
Utilize Azure Cosmos DB's multi-master replication and change feed for synchronization.
Embed saga pattern within each plugin for atomicity.
Leverage Power Platform's administration connectors for regulatory compliance
21/55
Adopt Azure Percept for edge data processing to reduce latency.
Use Azure Managed Instance for bi-directional data synchronization.
Implement Azure Bicep for defining and managing permissions, business process flows, and regulations.
In a logistics company, the shipping department is grappling with a data quality issue related to country information in address records. The problem involves
inconsistent country codes, diverse country names, and varying postal code formats. Some addresses use two-letter country codes (e.g., "US" for the United
States), while others use three-letter codes (e.g., "USA"). Country names also have spelling differences (e.g., "U.S.A." vs. "United States of America"), and
postal codes come in different formats (e.g., "12345" vs. "12345-6789").
Which of the following data quality processes should be given the highest priority to effectively address this challenge?
Utilize advanced data profiling and cleansing techniques to standardize country names and postal codes.
Develope a machine learning model to predict the correct country code and postal code format based on address context.
Implement blockchain technology to ensure data consistency and security in address records.
Employ geospatial analysis to validate and correct country and postal code discrepancies.
Implement a data governance framework to establish guidelines for address data and enhanced data quality.
Which of the following are correct ways to apply a filter to display the data of those employees whose salary is greater than 5000 using FilteredRowSet?
22/55
int id = filteredRowSet.getInt("id");
String name = filteredRowSet.getString("name");
int salary = filteredRowSet.getInt("salary");
System.out.println("ID: " + id + ", Name: " + name + ", Salary: " + salary);
}
A dataset contains information about people on board the Titanic when it sank. The data has variables that indicate whether passengers survived the sinking
or not, how old they were (Age), their gender (Gender), and what price they paid for their ticket (Fare).
0 male 22 7.2500
1 female 38 71.2833
1 female 26 7.9250
1 female 35 53.1000
23/55
Which of the code fragments achieves this result?
MySQL Hard
MySQL Hard
24/55
MySQL: Comment Types
MySQL Easy
MySQL Easy
Which of these MySQL join types return all records from the left table and the matched records from the right table?
Select all that apply.
LEFT JOIN
@RestController
@RequestMapping("/api/product/categories")
public class ProductCategoryController{
@Autowired
private CategorySerice categoryService;
@GetMapping("/{id}/{locale}")
public ResponseEntity<CategoryDto> getByIdAndLocale(@PathVariable("id") Long id,
@PathVariable("locale") String locale {
CategoryDto dto = categoryService.getByIdAndLocale(id, locale);
return new ResponseEntity<>(dto, HttpStatus.OK);
}
}
Which of the following options are true about the given controller method?
25/55
getByIdAndLocale endpoint does not accept GET request
SpringQuestionApplication.java
package com.hackerrank.spring;
import org.springframework.boot.SpringApplication;
import org.springframework.boot.autoconfigure.SpringBootApplication;
@SpringBootApplication
public class SpringQuestionsApplication {
public static void main(String[] args) {
SpringApplication.run(SpringQuestionsApplication.class, args);
}
}
Lie.java
package com.hackerrank;
import org.springframework.boot.CommandLineRunner;
import org.springframework.stereotype.Component;
@Component
public class Lie implements CommandLineRunner {
@Override
public void run(String... args) throws Exception {
System.out.println("Truth is behind the lies");
System.out.println("This is working perfectly");
throw new Exception("Does this work?");
}
}
Truth.java
package com.hackerrank.spring.reality;
import org.springframework.boot.CommandLineRunner;
import org.springframework.stereotype.Component;
@Component
public class Truth implements CommandLineRunner {
@Override
public void run(String... args) throws Exception {
System.out.println("Truth is in your eyes");
}
}
What will be printed on the console when the "SpringBootApplication" class is executed?
Truth is in your eyes Truth is behind the lies This is working perfectly And exception occurs and application stops
Truth is behind the lies This is working perfectly And exception occurs and application stops
Truth is behind the lies This is working perfectly And exception occurs containing “Does this work?” Truth is in your eyes
26/55
Question - 59 SCORE: 5 points
Prefix - 2
Note that the integers are all less than 10. For example, 5 3 1 is three separate integers.
10
12
Which of the following factors determine the order of evaluation of a prefix expression?
Precedence of operators
Associativity of operator
58
59
60
61
27/55
RDBMS Medium SQL
Given the following function dependencies, find the candidate key(s). Multiple answers may be correct.
R(A, B, C, D, E, F, G, H)
Functional Dependencies:
1. AC -> EFG
2. FG -> BCD
3. BE -> G
4. D -> F
ACH
AH
ABCH
ABCDH
Which of the following is/are a valid normal form in DBMS? Multiple answers can be correct.
3NF
NNF
BCNF
MCNF
SQL Easy
28/55
Target Value
Medium Algorithms
Given an initial value of x and a target value, determine the minimum number of operations needed to make x equal to the target.
In each operation, the value of i is added to or subtracted from x so either x = x + i or x = x - i. The value of i starts at 1, and after each operation, i is
incremented by 1.
Example
x=4
target = 2
x - i = 4 - 1 = 3, i + 1 = 2
x + 2 = 5, i = 3
x-3=2
PL/SQL Medium
The cursor is used for row-by-row processing in a PL/SQL program. When writing a cursor for DML operations, which type of cursor needs to be declared?
Implicit
Explicit
Internal
External
Definite
PL/SQL Hard
29/55
There is a regions table in HR schema. A function is created to return Region_Name when it is called.
REGION_ID REGION_NAME
1 Europe
2 America
3 Asia
End Get_region_name;
Europe
Medium Aptitude
There are five people: Chris, Sam, Robin, Alex, and Carol.
Each plays one sport, either football, cricket, volleyball, badminton, or squash.
They are from South Korea, the UK, India, China, and Russia, though not necessarily in that order.
Their favorite colors are brown, green, red, black, and yellow, again not necessarily in that order.
India
30/55
UK
Russia
China
Medium Aptitude
There are five people - Peter, Tyson, Richard, Steve and Quinn - standing in a row. Given the following statements, who is on the rightmost position?
1. Peter is next to Quinn and Steve is next to Richard.
2. Steve is not next to Tyson.
3. Tyson is on leftmost position.
4. Richard is on the second position from the right.
5. Peter stands somewhere to the right of both Quinn and Tyson.
6. Peter and Richard are next to each other.
Quin
Peter
Richard
Steve
Three integers are chosen at random from the first thirty terms of the sequence an=n. the probability that their product is even is?
(30C3-15C3)/30C3
(30C3+15C3)/30C3
(30P3+15P3)/30P3
Medium
The graph shows the pollution index of 7 cities- A, B, C, D, E, F and G from 2006 to 2010.
31/55
Pollution Index Table from 2006-2010
If for each year, the cities are ranked in terms of ascending order of pollution index (the city with the least pollution index stands first), how many cities did
not change their rank more than once from 2006 to 2008.
Medium Probability
If on an average, out of 118 elements, 38 are radioactive, then what is the probability that out of 59 elements, at least 58 are not radioactive?
32/55
(80⁵⁹/11859) *1161
(8058/11858) *3483
(8058/11859) *2322
(80⁵⁹/11859)
Easy Algebra
If the ratio of height(in cm) of M and N is 2:3. What is the minimum possible height of M, if it is given that the height of N is divisible 171?
114 cm
57 cm
143 cm
171 cm
Easy Aptitude
AEEUDNRTV
ADEENRTUV
AEUEDNTVR
AEUEDVNTR
The graph shows the prices of five different stocks- Warren Hays, Jackmail, Warren Bros, Brotherly Mail, Buffet Hastings, over a span of 5 years from 1998 to
2002.
33/55
Stock Prices for 1998-2002
How many stocks experienced a price decline for two or more consecutive years?
The graph shows the prices of five different stocks- Warren Hays, Jackmail, Warren Bros, Brotherly Mail, Buffet Hastings, over a span of 5 years from 1998 to
2002.
34/55
Stock Prices from 1998-2002
For the years 1998-2002, how many stocks had a net overall increase in share price?
"The graph given below gives per unit production cost, producer's selling price and retailer's selling prices of 5 articles- A, B, C, D and E.
35/55
Prices of Products in Rupees
A B C D E
Production Cost 20 50 12 25 15
The retailer sells products A, B, C, and D at a 10% discount to the reported "Retailer's Selling Price". Which of the 4 products are sold at a loss?
The graph given below gives per unit production cost, producer's selling price and retailer's selling prices of 5 articles- A, B, C, D and E.
36/55
Prices of Products in Rupees
A B C D E
Production Cost 20 50 12 25 15
The following graph shows the number of people (in millions) using Hington and Euphore brands of phones in France from August to October 2012. Only
these two brands of phones are in the market.
37/55
Customers in Millions Using Each
Phone
Hington Euphore
The following chart shows the addition of customers (in millions) of Hington and Euphore in each of the three months. There are two versions of Euphore
phones, Version-1, and Version-2.
Which of the following has the highest percentage increase in the number of users in September 2012 versus August?
38/55
Version-1
Version-2
Hington
Cannot be determined
The following graph shows the number of people (in millions) using Hington and Euphore brand phones in France from August to October 2012. Only these
two brands of phones exist in the market.
Hington Euphore
The following chart shows the addition of customers (in millions) of Hington and Euphore in each of the three months. There are two versions of the Euphore
brand phones, Version-1, and Version-2.
39/55
Addition of Customers in millions
What was the total number of people using either of the two brands in July 2012?
91.21 million
6.87 million
98.23 million`
None of these
Hard Aptitude
Ten people with names anonymized to A through I - ranked nine TV shows from 1 - 10 as shown below. No two people gave the same show the same rank.
The blank cells are purposefully hidden. What is the sum of all ranks across all shows?
Black Making a Narco Master of Mind Ozar Stranger House of The Haunting of Hill
Mirror Murderer s None Hunter k Things Cards House
2 4 5 6 7 8 10 1
4 7 5 9 10 1 2 3 6
1 10 9 8 4 2 3 6 7
6 2 7 4 5 8
7 8 2 1 5 4 6 9 3
3 5 6 4 9 8 7 1 10
5 4 3 6 9 7 2
10 2 7 1 3 9 4 5
40/55
8 1 7 10 3 6 5 2 9
9 10 3 2 5 1 8 4
90
100
495
550
Hard Aptitude
Ten people - with anonymized names A through I - ranked nine TV shows from 1 - 10 as shown below. No two people gave the same show the same rank. The
blank cells are purposefully hidden. What rank did D give to Narcos?
Vote tabulation
Black Making a Narco Master of Mind Ozar Stranger House of The Haunting of Hill
Mirror Murderer s None Hunter k Things Cards House
A 2 4 5 6 7 8 10 1
B 4 7 5 9 10 1 2 3 6
C 1 10 9 8 4 2 3 6 7
D 6 2 7 4 5 8
E 7 8 2 1 5 4 6 9 3
F 3 5 6 4 9 8 7 1 10
G 5 4 3 6 9 7 2
H 10 2 7 1 3 9 4 5
I 8 1 7 10 3 6 5 2 9
J 9 10 3 2 5 1 8 4
10
41/55
Hard Aptitude
Louis College London offers six subjects: math, chemistry, physics, botany, zoology and anatomy. Each subject has its own teacher, and each teacher teaches
a different number of sections from 1 - 6. Given the following information, how many sections does Dr. George teach?
cannot be determined
Medium Aptitude
A walker heads east for one kilometer and turns right. After walking another kilometer, the walker turns left, walks a kilometer, turns left, and walks
another kilometer. What direction is the walker facing?
South
East
West
North
FSTWPMG
DQRWPMG
FSTWNKE
DQSWNKE
42/55
Question - 86 SCORE: 5 points
Reading Comprehension 10
Hard Aptitude
Sometimes, watching elections in other countries is like being at a sports match when your team is not involved. At other times, you care about the results
as desperately as you would back in India. These recent U.K. snap elections shape-shifted from beginning to end. At first, staying with the sports analogy, it
was as if a walkover was declared — the incompetent in-Corbynites were a shambles about to be boiled in further shambolifying oil by Turgid Theresa of
The Terrible Tories; the Labour Party was dead and Britain was about to become a one-party state. Then May stumbled and kept stumbling, while Corbyn,
with a charming, easy, 'nothing to lose but our chains' attitude began to make inroads. When May was asked about the naughtiest thing she had ever done,
she Enid Blytonified herself and smarmed cutely that she had once run through a field of wheat and the farmer had not been pleased. When Corbyn was
asked the same question, he winked and said it was too naughty to talk about, throwing up visions of perhaps a quite different, D.H. Lawrencian, use of a
field of wheat.
When May refused to join the all-party debate on TV, Corbyn replied that he wouldn't participate either if May wasn't coming, but then (naughty boy) he
wrong-footed everyone by finding time at the last minute to appear with the other party leaders, making May look cowardly and arrogant. The debate was
a turning point when all the Opposition leaders ganged up on the hapless Amber Rudd who was standing in for May, accusing the Prime Minister of being a)
too scared, and b) too lordly to come to a debate with them.
When things go wrong in a game, they can cascade, a shot that would normally go for four or six gets skied into a dolly catch, you miss a goal from two yards
while breaking your leg, and so on. Thus, the two horrible terror attacks in Manchester and London, which should normally have shored up May as the
strongest-on-security candidate, instead opened the can of worms on police cuts that she had made as Home Minister. And, finally, the nation's youngsters
actually woke up and got out of bed on voting day. In any case, the Tories won but lost, and Labour lost but won. The outcome was almost, nay completely,
perfect for Jezza Corbyn: he had gained hugely while avoiding taking over the country at the time of great chaos; the Tories were badly damaged but still in
charge of the mess they had created; their goose could now be cooked slowly and properly with the edibility potentially lasting over a longer period.
An analogy between sports and election campaigns is maintained throughout the passage. The expression 'wrong-foot', when applied to sports would
mean which of the following?
play skillfully
play defensively
Hard Aptitude
Sometimes, watching elections in other countries is like being at a sports match when your team is not involved. At other times, you care about the results
as desperately as you would back in India. These recent U.K. snap elections shape-shifted from beginning to end. At first, staying with the sports analogy, it
was as if a walkover was declared — the incompetent in-Corbynites were a shambles about to be boiled in further shambolifying oil by Turgid Theresa of
The Terrible Tories; the Labour Party was dead and Britain was about to become a one-party state. Then May stumbled and kept stumbling, while Corbyn,
with a charming, easy, 'nothing to lose but our chains' attitude began to make inroads. When May was asked about the naughtiest thing she had ever done,
she Enid Blytonified herself and smarmed cutely that she had once run through a field of wheat and the farmer had not been pleased. When Corbyn was
asked the same question, he winked and said it was too naughty to talk about, throwing up visions of perhaps a quite different, D.H. Lawrencian, use of a
field of wheat.
When May refused to join the all-party debate on TV, Corbyn replied that he wouldn't participate either if May wasn't coming, but then (naughty boy) he
wrong-footed everyone by finding time at the last minute to appear with the other party leaders, making May look cowardly and arrogant. The debate was
a turning point when all the Opposition leaders ganged up on the hapless Amber Rudd who was standing in for May, accusing the Prime Minister of being a)
too scared, and b) too lordly to come to a debate with them.
43/55
When things go wrong in a game, they can cascade, a shot that would normally go for four or six gets skied into a dolly catch, you miss a goal from two yards
while breaking your leg, and so on. Thus, the two horrible terror attacks in Manchester and London, which should normally have shored up May as the
strongest-on-security candidate, instead opened the can of worms on police cuts that she had made as Home Minister. And, finally, the nation's youngsters
actually woke up and got out of bed on voting day. In any case, the Tories won but lost, and Labour lost but won. The outcome was almost, nay completely,
perfect for Jezza Corbyn: he had gained hugely while avoiding taking over the country at the time of great chaos; the Tories were badly damaged but still in
charge of the mess they had created; their goose could now be cooked slowly and properly with the edibility potentially lasting over a longer period.
'Eric Blytonified' and 'D.H.Lawremcian' are examples of
oxymoron
neologism
syllogism
paleologism
Hard Aptitude
Sometimes, watching elections in other countries is like being at a sports match when your team is not involved. At other times, you care about the results
as desperately as you would back in India. These recent U.K. snap elections shape-shifted from beginning to end. At first, staying with the sports analogy, it
was as if a walkover was declared — the incompetent in-Corbynites were a shambles about to be boiled in further shambolifying oil by Turgid Theresa of
The Terrible Tories; the Labour Party was dead and Britain was about to become a one-party state. Then May stumbled and kept stumbling, while Corbyn,
with a charming, easy, 'nothing to lose but our chains' attitude began to make inroads. When May was asked about the naughtiest thing she had ever done,
she Enid Blytonified herself and smarmed cutely that she had once run through a field of wheat and the farmer had not been pleased. When Corbyn was
asked the same question, he winked and said it was too naughty to talk about, throwing up visions of perhaps a quite different, D.H. Lawrencian, use of a
field of wheat.
When May refused to join the all-party debate on TV, Corbyn replied that he wouldn't participate either if May wasn't coming, but then (naughty boy) he
wrong-footed everyone by finding time at the last minute to appear with the other party leaders, making May look cowardly and arrogant. The debate was
a turning point when all the Opposition leaders ganged up on the hapless Amber Rudd who was standing in for May, accusing the Prime Minister of being a)
too scared, and b) too lordly to come to a debate with them.
When things go wrong in a game, they can cascade, a shot that would normally go for four or six gets skied into a dolly catch, you miss a goal from two yards
while breaking your leg, and so on. Thus, the two horrible terror attacks in Manchester and London, which should normally have shored up May as the
strongest-on-security candidate, instead opened the can of worms on police cuts that she had made as Home Minister. And, finally, the nation's youngsters
actually woke up and got out of bed on voting day. In any case, the Tories won but lost, and Labour lost but won. The outcome was almost, nay completely,
perfect for Jezza Corbyn: he had gained hugely while avoiding taking over the country at the time of great chaos; the Tories were badly damaged but still in
charge of the mess they had created; their goose could now be cooked slowly and properly with the edibility potentially lasting over a longer period.
The passage ends on a note of ____ about the futures of the conservatives
pessimism
optimism
caution
assertion
44/55
Hard Aptitude
Sometimes, watching elections in other countries is like being at a sports match when your team is not involved. At other times, you care about the results
as desperately as you would back in India. These recent U.K. snap elections shape-shifted from beginning to end. At first, staying with the sports analogy, it
was as if a walkover was declared — the incompetent in-Corbynites were a shambles about to be boiled in further shambolifying oil by Turgid Theresa of
The Terrible Tories; the Labour Party was dead and Britain was about to become a one-party state. Then May stumbled and kept stumbling, while Corbyn,
with a charming, easy, 'nothing to lose but our chains' attitude began to make inroads. When May was asked about the naughtiest thing she had ever done,
she Enid Blytonified herself and smarmed cutely that she had once run through a field of wheat and the farmer had not been pleased. When Corbyn was
asked the same question, he winked and said it was too naughty to talk about, throwing up visions of perhaps a quite different, D.H. Lawrencian, use of a
field of wheat.
When May refused to join the all-party debate on TV, Corbyn replied that he wouldn't participate either if May wasn't coming, but then (naughty boy) he
wrong-footed everyone by finding time at the last minute to appear with the other party leaders, making May look cowardly and arrogant. The debate was
a turning point when all the Opposition leaders ganged up on the hapless Amber Rudd who was standing in for May, accusing the Prime Minister of being a)
too scared, and b) too lordly to come to a debate with them.
When things go wrong in a game, they can cascade, a shot that would normally go for four or six gets skied into a dolly catch, you miss a goal from two yards
while breaking your leg, and so on. Thus, the two horrible terror attacks in Manchester and London, which should normally have shored up May as the
strongest-on-security candidate, instead opened the can of worms on police cuts that she had made as Home Minister. And, finally, the nation's youngsters
actually woke up and got out of bed on voting day. In any case, the Tories won but lost, and Labour lost but won. The outcome was almost, nay completely,
perfect for Jezza Corbyn: he had gained hugely while avoiding taking over the country at the time of great chaos; the Tories were badly damaged but still in
charge of the mess they had created; their goose could now be cooked slowly and properly with the edibility potentially lasting over a longer period.
All the following were factors responsible for the fate of the recent elections in the UK, except
Medium
In a group of 400 children, they all like exactly two hobbies out of the set singing, dancing, ice skating, and sewing. 100 children like singing and dancing. 70
like singing and ice skating, and 50 like dancing and ice skating. For the remainder, an equal number like all other possible pairs of hobbies.
In a group of 400 kids, every kid has exactly two hobbies among singing, dancing, ice-skating and sewing. It is known that 100 kids like singing and dancing, 70
kids like singing and ice-skating , while 50 kids like dancing and ice-skating. Among the remaining kids, an equal number like each of the other possible dual
hobbies.
In a group of 400 kids, every kid has exactly two hobbies among singing, dancing, ice-skating and sewing. It is known that 100 kids like singing and dancing, 70
kids like singing and ice-skating , while 50 kids like dancing and ice-skating. Among the remaining kids, an equal number like each of the other possible dual
hobbies.
How many kids like either Dancing or ice-skating?
340
390
290
45/55
320
Medium
In a group of 400 children, they all like exactly two hobbies out of the set singing, dancing, ice skating, and sewing. 100 children like singing and dancing. 70
like singing and ice skating, and 50 like dancing and ice skating. For the remainder, an equal number like all other possible pairs of hobbies.
In a group of 400 kids, every kid has exactly two hobbies among singing, dancing, ice-skating and sewing. It is known that 100 kids like singing and dancing, 70
kids like singing and ice-skating , while 50 kids like dancing and ice-skating. Among the remaining kids, an equal number like each of the other possible dual
hobbies.
210
200
170
230
Medium
For all integers from 1 to 100, how many match at least one of the following?
17
18
16
15
Medium
46/55
(2) The green face is opposite the white face.
(3) The red face is adjacent to the black face.
The yellow and orange faces are not opposite to each other.
The green and red faces are not opposite each other.
The yellow face and the green face are adjacent to each other.
The green face and the white face are adjacent to each other.
Medium
In a certain code language, 'tink mink crink' means 'I am fine', 'leepo tink teepo' means 'weather is fine', 'seepo teepo' means 'good weather' and 'teepo crink
seir mink' means 'I am enjoying weather'. Which of the following means 'I am' in that code language?
teepo seepo
mink crink
tink mink
tink seepo
Medium
There are five people: A, B, C, D and E. There are chairs placed in a line and numbered from 11 to 18 from left to right. Three chairs are empty. The following
conditions apply:
C sits on the chair whose number is divisible only by 1 and the number itself.
If it is given that there are exactly two chairs empty between B and E and D does not sit between A and E, then which of the following chairs is occupied by C?
13
15
18
11
47/55
Question - 96 SCORE: 5 points
Logic Puzzles 12
A hiker walks 15 km towards the north then 16 km towards the east then 15 km towards the north. How far away and in which direction is the hiker with
reference to the starting point?
34 km northeast
34 km southeast
14 km northeast
14 km southeast
100/p
10000/p
cannot be determined
What will happen if 'D' is changed to "Add numbers in box1 and box10 then store the result in box9"?
48/55
There is an infinite flow.
49/55
There is an infinite flow.
50/55
Question - 101 SCORE: 5 points
Abstract Reasoning 11
23 10 54
[ ]
42 13 64
31 5 72
54 8 89
150 36 ?
279
280
282
284
51/55
Easy Series Aptitude Core CS
1362
1361
1360
1390
52/55
Question - 104 SCORE: 5 points
Abstract Reasoning 2
There are several data representations that are related to JSON. Which of the following are true? Choose one or more.
cJSON is a JSON format that allows for comments in the document that are not part of the data.
53/55
Question - 106 SCORE: 5 points
Which command?
There are multiple records in a table and some are duplicates. Which command will fetch only one copy of the duplicate records?
SELECT DISTINCT
SELECT UNIQUE
SELECT DIFFERENT
By making all the methods abstract using the keyword 'abstract' in a class.
10
14
54/55
Date math Easy Algebra Aptitude
December 8, 2007 was a Saturday. What day of the week was December 8, 2006?
Sunday
Thursday
Tuesday
Friday
A train, 270 meters long, moving at 120 km/hour passes another train moving in the opposite direction at 80 km/hour in 9 seconds. What is the length of the
train moving at 80 km/hour?
230 m
240 m
260 m
320 m
None of these
55/55