Add office photos
Employer?
Claim Account for FREE

Accenture

3.9
based on 52.4k Reviews
Proud winner of ABECA 2024 - AmbitionBox Employee Choice Awards
Filter interviews by

200+ Interview Questions and Answers

Updated 16 Dec 2024
Popular Designations

Q101. Difference between @Controller & @RestController.

Ans.

The @Controller annotation is used to create a controller in Spring MVC, while @RestController is used to create RESTful web services.

  • Controller is used to create web pages, RestController is used to create RESTful web services

  • @Controller returns the view, @RestController returns the object and data directly

  • @RestController is a specialization of @Controller

Add your answer

Q102. What are Microservices?

Ans.

Microservices are a software development technique where applications are broken down into smaller, independent services that work together.

  • Microservices are small, independent services that focus on specific business functions.

  • Each microservice can be developed, deployed, and scaled independently.

  • Microservices communicate with each other through APIs.

  • They promote flexibility, scalability, and faster development cycles.

  • Examples of companies using microservices include Netflix...read more

Add your answer

Q103. What are Azure Functions?

Ans.

Azure Functions are serverless compute services that allow you to run event-triggered code without managing infrastructure.

  • Azure Functions are event-driven, meaning they execute in response to events like HTTP requests, timers, or messages from other Azure services.

  • They are serverless, meaning you only pay for the time your code runs and Azure automatically scales to meet demand.

  • Azure Functions support multiple programming languages like C#, JavaScript, Python, and more.

  • They ...read more

Add your answer

Q104. What are Storage Queues?

Ans.

Storage Queues are a type of service provided by cloud platforms to store and process messages in a queue.

  • Storage Queues help in decoupling components of a cloud application by allowing them to communicate asynchronously.

  • They are commonly used for tasks like processing messages, creating workflows, and handling background jobs.

  • Examples of cloud platforms offering Storage Queues include Azure Queue Storage and Amazon Simple Queue Service (SQS).

Add your answer
Discover null interview dos and don'ts from real experiences

Q105. What is Decorators and Directives

Ans.

Decorators and directives are features in programming languages that allow for the modification or extension of code behavior.

  • Decorators are used in languages like Python to modify the behavior of functions or classes.

  • Directives are used in AngularJS to add behavior to HTML elements.

  • Decorators in Python are denoted by the @ symbol, like @staticmethod.

  • Directives in AngularJS are denoted by attributes in HTML tags, like ng-model.

Add your answer

Q106. What ways to improve performance

Ans.

Optimizing code, database queries, and server performance can improve overall application performance.

  • Optimize code by reducing unnecessary loops and improving algorithm efficiency

  • Optimize database queries by using indexes, avoiding unnecessary joins, and caching query results

  • Optimize server performance by using load balancing, caching static content, and optimizing server configurations

Add your answer
Are these interview questions helpful?

Q107. Write stream function along with predicate

Ans.

A stream function with a predicate is used to filter elements from a stream based on a condition.

  • Use the filter() method to apply the predicate to each element in the stream.

  • The predicate should return true for elements that should be included in the filtered stream.

  • Example: stream.filter(element -> element > 5) will filter out elements less than or equal to 5.

Add your answer

Q108. difference between Routing and Rate routing

Ans.

Routing determines the path a request takes to reach its destination, while rate routing involves determining the best path based on cost or other factors.

  • Routing is the process of selecting a path for data packets to travel from the source to the destination.

  • Rate routing involves selecting the best path based on factors like cost, quality of service, or other criteria.

  • Routing is typically used in networking to direct traffic, while rate routing is often used in telecommunica...read more

Add your answer
Share interview questions and help millions of jobseekers 🌟

Q109. What do you know about cloud

Ans.

Cloud computing is the delivery of computing services over the internet, including storage, servers, databases, networking, software, and more.

  • Cloud computing allows users to access resources on-demand without the need for physical infrastructure.

  • Examples of cloud services include Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform.

  • Cloud computing offers scalability, flexibility, cost-effectiveness, and increased collaboration.

  • Types of cloud computing includ...read more

Add your answer

Q110. what are container and artifacts

Ans.

Containers are lightweight, portable, and self-sufficient packages that contain everything needed to run a piece of software. Artifacts are the output of a build process.

  • Containers are isolated environments that package an application and its dependencies together.

  • Artifacts are the result of a build process, such as compiled code, libraries, or configuration files.

  • Containers can be run on any system that supports the containerization technology used, such as Docker or Kuberne...read more

Add your answer

Q111. How to develop the application

Ans.

Developing an application involves planning, designing, coding, testing, and deploying the software.

  • Understand the requirements and objectives of the application

  • Design the user interface and user experience

  • Write code using programming languages like Java, Python, or Swift

  • Test the application for bugs and errors

  • Deploy the application to app stores or servers

View 1 answer

Q112. How to analyse the code?

Ans.

Code analysis involves reviewing and understanding the code to identify issues and improve its quality.

  • Start by reviewing the code structure and organization

  • Check for syntax errors and logical issues

  • Use tools like debuggers and profilers to identify performance issues

  • Review the code for security vulnerabilities

  • Collaborate with other developers to get feedback and improve the code

Add your answer

Q113. Tell me about P2P cycle

Ans.

P2P cycle refers to procure-to-pay cycle, which involves the process of obtaining goods or services from a supplier and paying for them.

  • The cycle starts with the need for goods or services, followed by identifying suppliers and negotiating terms.

  • Purchase orders are created, goods are received, and invoices are processed for payment.

  • The final step involves reconciling payments and closing out the transaction.

  • Example: A company needs to purchase office supplies, so they identif...read more

Add your answer

Q114. Explain the lifecycle of a thread.

Ans.

Thread lifecycle includes new, runnable, running, blocked, and terminated states.

  • Thread is created in 'new' state

  • Thread becomes 'runnable' when start() method is called

  • Thread enters 'running' state when CPU starts executing its run() method

  • Thread can be 'blocked' when waiting for a resource or I/O operation

  • Thread reaches 'terminated' state when run() method completes or stop() method is called

Add your answer

Q115. Can you debug a CDS views

Ans.

Yes, I can debug CDS views by using tools like SQL Trace and ABAP Debugger.

  • Use SQL Trace to analyze the SQL statements executed by the CDS view

  • Use ABAP Debugger to step through the code and analyze variables

  • Check for any syntax errors or logical errors in the CDS view definition

Add your answer

Q116. How do you optimize SQL code

Ans.

Optimizing SQL code involves using indexes, minimizing data retrieval, avoiding unnecessary joins, and optimizing queries.

  • Use indexes on columns frequently used in WHERE clauses

  • Minimize data retrieval by selecting only necessary columns

  • Avoid unnecessary joins by using EXISTS or IN clauses instead

  • Optimize queries by using appropriate functions and operators

Add your answer

Q117. how you will create a branch

Ans.

To create a branch, use version control system commands like git branch.

  • Use 'git branch' command to create a new branch in Git.

  • Specify the branch name after the command, e.g. 'git branch new-feature'.

  • To switch to the newly created branch, use 'git checkout new-feature'.

Add your answer

Q118. How prioritize tasks?

Ans.

I prioritize tasks based on deadlines, importance, and impact on overall project goals.

  • Identify deadlines for each task and prioritize based on urgency

  • Consider the importance of each task in relation to project goals

  • Assess the impact of completing each task on the overall project timeline

  • Use tools like task management software or to-do lists to organize and prioritize tasks

Add your answer

Q119. Why redux saga over Thunk?

Ans.

Redux Saga offers more flexibility and control over asynchronous actions compared to Thunk.

  • Redux Saga allows for more complex asynchronous flows with generators.

  • Redux Saga provides better error handling capabilities.

  • Redux Saga enables easier testing of asynchronous logic.

  • Redux Thunk is simpler and easier to grasp for smaller projects.

Add your answer

Q120. What is agile framework

Ans.

Agile framework is a project management approach that emphasizes flexibility, collaboration, and iterative development.

  • Agile framework involves breaking down projects into smaller tasks and completing them in short iterations called sprints.

  • It prioritizes customer feedback and collaboration among team members.

  • Common agile methodologies include Scrum, Kanban, and Extreme Programming (XP).

Add your answer

Q121. Behaviour of final keyword in java

Ans.

The final keyword in Java is used to restrict the user from changing the value of a variable, making it constant.

  • Final variables cannot be reassigned once initialized

  • Final methods cannot be overridden in subclasses

  • Final classes cannot be extended

Add your answer

Q122. What is c programming

Ans.

C programming is a high-level programming language used for developing system software and applications.

  • C programming is a procedural language with a rich set of built-in functions.

  • It is widely used for developing operating systems, compilers, and embedded systems.

  • C programs are written in text files with .c extension and compiled using a compiler like GCC.

  • Example: printf("Hello, World!");

Add your answer

Q123. Write a code to fetch the data from api

Ans.

Code to fetch data from an API

  • Use a library like Axios or Fetch to make HTTP requests

  • Parse the response data in JSON format

  • Handle any errors or exceptions that may occur

Add your answer

Q124. What are closures in JS?

Ans.

Closures in JS are functions that have access to their own scope, as well as the outer function's scope.

  • Closures allow for maintaining state in an asynchronous environment.

  • They can be used to create private variables and functions.

  • Example: function outerFunction() { let outerVar = 'I am outer'; return function innerFunction() { console.log(outerVar); }; }

Add your answer

Q125. What are primitive data types?

Ans.

Primitive data types are basic data types provided by a programming language to represent simple values.

  • Primitive data types include integers, floating point numbers, characters, booleans, etc.

  • Examples: int x = 5; float y = 3.14; char c = 'a'; boolean flag = true;

Add your answer

Q126. How you deployee Angular

Ans.

I deploy Angular applications using the Angular CLI and various hosting services.

  • Use Angular CLI to build the application

  • Choose a hosting service like Firebase, Netlify, or AWS for deployment

  • Configure deployment settings in the hosting service

  • Deploy the application using the hosting service's tools

View 1 answer

Q127. What is RLS in power bi

Ans.

RLS in Power BI stands for Row-Level Security, which allows you to restrict access to certain data based on user roles.

  • RLS helps control access to data at the row level

  • It allows you to define rules to restrict data based on user roles

  • RLS is commonly used in Power BI to ensure data security and privacy

  • Example: You can use RLS to only allow managers to see sales data for their region

Add your answer

Q128. What you learn about javascript

Ans.

I have learned about JavaScript's syntax, functions, DOM manipulation, event handling, AJAX, and ES6 features.

  • Syntax and basic concepts like variables, data types, operators

  • Functions and scope, including arrow functions and callbacks

  • DOM manipulation to interact with HTML elements

  • Event handling for user interactions

  • AJAX for asynchronous data retrieval

  • ES6 features like classes, modules, and promises

Add your answer

Q129. Code to demonstrate multiple inheritance

Ans.

Multiple inheritance in programming allows a class to inherit attributes and methods from more than one parent class.

  • Create a class that inherits from two or more parent classes

  • Use super() to call the constructors of the parent classes

  • Avoid diamond problem by using interfaces or mixins

Add your answer

Q130. Costs flow in SAP PM maintenance order.

Ans.

Costs flow in SAP PM maintenance order involves various elements such as labor, materials, external services, and overhead costs.

  • Labor costs are associated with the work performed by internal employees on the maintenance order.

  • Materials costs include the cost of parts and supplies used in the maintenance work.

  • External services costs are incurred when external vendors are used for specific tasks within the maintenance order.

  • Overhead costs cover indirect expenses such as utilit...read more

Add your answer

Q131. How to implement OAuth 2.0

Ans.

OAuth 2.0 is implemented by registering your application with the OAuth provider, obtaining client credentials, and using authorization codes to access resources.

  • Register your application with the OAuth provider to obtain client credentials

  • Use authorization codes to request access tokens for accessing protected resources

  • Implement the OAuth 2.0 flow in your application to handle authentication and authorization

Add your answer

Q132. How to implement Junit

Ans.

JUnit is a popular Java testing framework used for unit testing.

  • Create a test class with test methods annotated with @Test

  • Use assertions to verify expected results

  • Run tests using a test runner like JUnitCore or IDE integration

Add your answer

Q133. How to implement Swagger

Ans.

Swagger can be implemented by adding annotations to API code and generating documentation using Swagger tools.

  • Add Swagger annotations to API code to describe endpoints, parameters, responses, etc.

  • Use Swagger tools like Swagger UI or Swagger Editor to generate interactive API documentation.

  • Integrate Swagger into the development workflow to ensure API documentation stays up to date.

Add your answer

Q134. Hierarchy in Talend.

Ans.

Hierarchy in Talend refers to the organization of data flow components in a job.

  • Hierarchy is important for understanding the flow of data in a job.

  • Components can be organized into subjobs and routines for better organization.

  • Hierarchy can be viewed and edited in the Talend Studio interface.

  • Example: A job may have a parent job with multiple child subjobs for different tasks.

Add your answer

Q135. Explain @SprintBootApplication annotation.

Ans.

Annotation used in Spring Boot to enable the application to be run from a main method.

  • Used to mark a class as the main entry point for a Spring Boot application

  • Eliminates the need for a traditional main method

  • Can be used in combination with @SpringBootApplication annotation

Add your answer

Q136. What is closure?

Ans.

Closure is a function that has access to its own scope, as well as the scope in which it was defined.

  • Closure allows a function to access variables from its outer scope even after the outer function has finished executing.

  • It is created whenever a function is defined within another function.

  • Closure is commonly used in event handlers, callbacks, and asynchronous code.

Add your answer

Q137. What is Deadlock?

Ans.

Deadlock is a situation in which two or more processes are unable to proceed because each is waiting for the other to release a resource.

  • Occurs in multitasking environments

  • Caused by a circular wait for resources

  • Can be resolved by prevention or detection algorithms

  • Example: Process A holds Resource 1 and waits for Resource 2, while Process B holds Resource 2 and waits for Resource 1

Add your answer

Q138. What is linked list?

Ans.

A linked list is a data structure where each element points to the next element in the sequence.

  • Consists of nodes where each node contains data and a reference to the next node

  • Can be singly linked (each node points to the next node) or doubly linked (each node points to the next and previous nodes)

  • Allows for dynamic size and efficient insertion/deletion operations

Add your answer

Q139. What is immutablity?

Ans.

Immutability refers to the state of an object or data structure that cannot be modified after it is created.

  • Immutable objects cannot be changed once they are created

  • Immutability ensures data integrity and thread safety

  • Examples include strings in Java, tuples in Python

Add your answer

Q140. What are hooks?

Ans.

Hooks are functions that allow developers to use state and other React features in functional components.

  • Hooks were introduced in React 16.8 to allow developers to use state and other React features in functional components.

  • Some commonly used hooks include useState, useEffect, useContext, and useReducer.

  • Hooks are used to add functionality to functional components without the need for class components.

View 1 answer

Q141. What is parallel cursor method

Ans.

Parallel cursor method is a technique used in database programming to improve performance by processing multiple rows simultaneously.

  • Parallel cursor method allows multiple rows to be fetched and processed concurrently, reducing overall processing time.

  • It is commonly used in scenarios where large datasets need to be processed efficiently.

  • By leveraging parallel cursor method, developers can optimize database operations and improve application performance.

Add your answer

Q142. Difference between ECC and S4 HANA

Ans.

ECC is the older version of SAP's ERP system, while S4 HANA is the newer, more advanced version with in-memory computing capabilities.

  • ECC is based on traditional disk-based databases, while S4 HANA utilizes in-memory computing for faster data processing.

  • S4 HANA offers real-time analytics and predictive capabilities, while ECC does not.

  • S4 HANA simplifies data models and processes, making it more efficient than ECC.

  • S4 HANA is designed to run on SAP's HANA database platform, whi...read more

Add your answer

Q143. How to improve Spring Security

Ans.

Improving Spring Security involves regular updates, strong password policies, implementing multi-factor authentication, and monitoring for suspicious activity.

  • Regularly update Spring Security to the latest version to patch any vulnerabilities

  • Implement strong password policies, such as requiring complex passwords and regular password changes

  • Enable multi-factor authentication to add an extra layer of security for user logins

  • Monitor logs and set up alerts for suspicious activity...read more

Add your answer

Q144. write code a reverse a sentence in js

Ans.

Reverse a sentence in JavaScript

  • Split the sentence into an array of words

  • Use the reverse() method to reverse the array

  • Join the reversed array back into a string

Add your answer

Q145. Different types of index and its usecase

Ans.

Different types of indexes include clustered, non-clustered, unique, and composite indexes.

  • Clustered index: Physically reorders the data in the table based on the index key. Only one per table.

  • Non-clustered index: Creates a separate structure for the index, allowing for multiple indexes per table.

  • Unique index: Ensures that the indexed columns do not contain duplicate values.

  • Composite index: Index that consists of multiple columns to improve query performance for specific quer...read more

Add your answer

Q146. How to create pipeline

Ans.

Creating a pipeline involves defining a series of tasks or steps to automate the process of moving data or code through various stages.

  • Define the stages of the pipeline, such as data extraction, transformation, and loading (ETL)

  • Select appropriate tools or platforms for each stage, such as Jenkins, GitLab CI/CD, or Azure DevOps

  • Configure the pipeline to trigger automatically based on events, such as code commits or scheduled intervals

  • Monitor and optimize the pipeline for perfor...read more

Add your answer

Q147. difficulties faced during project completion

Ans.

Some difficulties faced during project completion include scope changes, resource constraints, and technical challenges.

  • Scope changes: Clients may request additional features or changes mid-project, leading to delays and rework.

  • Resource constraints: Limited budget or manpower can hinder progress and result in longer timelines.

  • Technical challenges: Complex coding requirements or integration issues can cause setbacks and require additional time for troubleshooting.

Add your answer

Q148. Write a code for decorators in python

Ans.

Decorators in Python are functions that modify the behavior of other functions.

  • Decorators are defined using the @decorator_name syntax before the function definition.

  • They can be used to add functionality to existing functions without modifying their code.

  • Decorators can be used for logging, timing, authentication, etc.

  • Example: def my_decorator(func): def wrapper(): print('Something is happening before the function is called.') func() print('Something is happening after the fun...read more

Add your answer

Q149. Data manipulations using pyspark

Ans.

Data manipulations using pyspark involve processing and transforming large datasets using the PySpark framework.

  • Use PySpark functions like select, filter, groupBy, and join to manipulate data

  • Utilize RDDs (Resilient Distributed Datasets) and DataFrames for data processing

  • Perform common data manipulations like aggregation, sorting, and cleaning using PySpark

  • Example: df.select('column1', 'column2').filter(df['column3'] > 10).groupBy('column1').count()

Add your answer

Q150. What are functional classes

Ans.

Functional classes are classes in object-oriented programming that contain only static methods and do not have any instance variables.

  • Functional classes are used to group related utility methods together.

  • They do not require an instance to be created in order to use their methods.

  • Functional classes are commonly used for organizing helper functions or constants.

  • Examples include Math class in Java or StringUtils class in Apache Commons library.

Add your answer

Q151. What is qualification

Ans.

Qualification refers to the skills, knowledge, and experience required for a specific job or task.

  • Qualifications can include education, certifications, work experience, and specific skills related to the job.

  • For example, a qualification for an Application Developer may include a degree in computer science, experience with programming languages, and knowledge of software development.

  • Employers use qualifications to determine if a candidate is suitable for a particular role.

  • Qual...read more

Add your answer

Q152. what are oops in java

Ans.

OOPs in Java stands for Object-Oriented Programming concepts which include inheritance, encapsulation, polymorphism, and abstraction.

  • OOPs in Java stands for Object-Oriented Programming concepts

  • Includes inheritance, encapsulation, polymorphism, and abstraction

  • Encourages modular and reusable code

  • Example: Class Animal with subclasses Dog and Cat showcasing inheritance

Add your answer

Q153. what are data structure

Ans.

Data structures are ways of organizing and storing data in a computer so that it can be accessed and used efficiently.

  • Data structures define the way data is stored, accessed, and manipulated in a computer program.

  • Examples of data structures include arrays, linked lists, stacks, queues, trees, and graphs.

  • Choosing the right data structure is important for optimizing the performance of a program.

Add your answer

Q154. How to manage large datasets

Ans.

Large datasets can be managed by using efficient data storage techniques, data indexing, data partitioning, and utilizing parallel processing.

  • Utilize efficient data storage techniques such as using databases optimized for large datasets like Hadoop, MongoDB, or Cassandra

  • Implement data indexing to quickly retrieve specific data points without scanning the entire dataset

  • Partition large datasets into smaller chunks to distribute the workload and improve query performance

  • Utilize ...read more

Add your answer

Q155. What is hoisting

Ans.

Hoisting is a JavaScript mechanism where variable and function declarations are moved to the top of their containing scope during compilation.

  • Variable and function declarations are hoisted to the top of their scope.

  • Only declarations are hoisted, not initializations.

  • Function declarations take precedence over variable declarations.

Add your answer

Q156. What is Lazy loading

Ans.

Lazy loading is a design pattern where resources are loaded only when needed, improving performance and reducing initial load time.

  • Resources are loaded on demand rather than all at once

  • Helps improve performance by reducing initial load time

  • Commonly used in web development for images or content that is below the fold

Add your answer

Q157. difference between spring and springboot

Ans.

Spring is a framework for building Java applications, while Spring Boot is a tool that simplifies the setup and configuration of Spring applications.

  • Spring is a comprehensive framework that provides support for various functionalities like dependency injection, aspect-oriented programming, and more.

  • Spring Boot is an opinionated tool that simplifies the setup and configuration of Spring applications by providing defaults and auto-configuration.

  • Spring Boot reduces the need for ...read more

Add your answer

Q158. Explain framework you worked on

Ans.

I have worked on the Angular framework for developing web applications.

  • Used Angular CLI for project setup and generation

  • Implemented components, services, and modules to build the application

  • Utilized Angular Material for UI components

  • Integrated with RESTful APIs using HttpClient module

Add your answer

Q159. Difference between props and refs

Ans.

Props are used to pass data from parent to child components, while refs are used to reference a DOM element or a class component instance.

  • Props are read-only and cannot be modified by the child component.

  • Refs are used to access the DOM nodes or class component instances in React.

  • Props are passed down through the component tree, while refs are typically used within a single component.

  • Example: for props, and for refs.

Add your answer

Q160. What is currying ?

Ans.

Currying is a technique in functional programming where a function with multiple arguments is transformed into a sequence of nested functions, each taking a single argument.

  • Currying helps in partial application of functions.

  • It allows for creating specialized versions of general functions.

  • Example: const add = (a) => (b) => a + b; add(2)(3) returns 5.

Add your answer

Q161. What is abstract class

Ans.

An abstract class is a class that cannot be instantiated and is used as a blueprint for other classes to inherit from.

  • Cannot be instantiated on its own

  • May contain abstract methods that must be implemented by subclasses

  • Can have both abstract and non-abstract methods

  • Used to define common behavior for subclasses

Add your answer

Q162. Dependency inversion principle

Ans.

Dependency inversion principle is a software design principle that states high-level modules should not depend on low-level modules, but both should depend on abstractions.

  • High-level modules should not depend on low-level modules, both should depend on abstractions

  • Abstractions should not depend on details, details should depend on abstractions

  • Helps in achieving decoupling and flexibility in software design

Add your answer

Q163. Difference between PUT and POST

Ans.

PUT is used to update or replace an existing resource, while POST is used to create a new resource.

  • PUT is idempotent, meaning multiple identical requests will have the same effect as a single request.

  • POST is not idempotent, meaning multiple identical requests may have different effects.

  • PUT is used when the client knows the URI of the resource it wants to update.

  • POST is used when the server assigns a URI for the newly created resource.

Add your answer

Q164. What are directive

Ans.

Directives are markers on a DOM element that tell AngularJS to attach a specified behavior to that DOM element or even transform the DOM element and its children.

  • Directives are used to create custom HTML tags that serve as new, reusable components.

  • They can be used to manipulate the DOM, add event listeners, or create animations.

  • Examples of directives in AngularJS include ng-model, ng-repeat, and ng-show.

Add your answer

Q165. What are Interceptor

Ans.

Interceptors are functions that can be used to intercept incoming and outgoing HTTP requests in Angular applications.

  • Interceptors can be used to modify or log outgoing requests before they are sent.

  • They can also be used to modify or log incoming responses before they are passed to the application.

  • Interceptors are commonly used for adding authentication tokens to requests, error handling, or logging.

  • An example of using interceptors in Angular is adding a JWT token to the Autho...read more

Add your answer

Q166. Optimization is spark ?

Ans.

Optimization in Spark refers to improving the performance of Spark jobs by tuning configurations and utilizing best practices.

  • Optimization in Spark involves tuning configurations such as memory allocation, parallelism, and caching.

  • Utilizing best practices like partitioning data properly and using efficient transformations can improve performance.

  • Examples of optimization techniques include using broadcast variables, avoiding shuffling, and leveraging data locality.

Add your answer

Q167. Tell me about NLP

Ans.

NLP stands for Natural Language Processing, a field of artificial intelligence that focuses on the interaction between computers and humans using natural language.

  • NLP involves tasks such as text classification, sentiment analysis, named entity recognition, and machine translation.

  • It uses algorithms and models to analyze and understand human language, enabling computers to process, interpret, and generate human language.

  • Examples of NLP applications include chatbots, virtual as...read more

Add your answer

Q168. Entity framework code first approach

Ans.

Entity Framework Code First approach allows developers to define the model using C# classes and create the database based on the model.

  • Developers define the model using C# classes with properties that represent database tables and relationships.

  • Database is created based on the model defined in code, without needing to create the database schema first.

  • Migrations can be used to update the database schema as the model changes over time.

  • Data annotations or Fluent API can be used ...read more

Add your answer

Q169. Checklists for PR review

Ans.

Checklists are essential for ensuring thorough PR reviews

  • Include specific criteria for code quality, such as formatting, naming conventions, and performance

  • Ensure all tests have been run and pass successfully

  • Check for any potential security vulnerabilities or bugs

  • Verify that the code aligns with project requirements and goals

Add your answer

Q170. How you call api

Ans.

To call an API, you need to make a request to the API endpoint using a specific HTTP method.

  • Use a tool like Postman or cURL to make API calls

  • Include necessary headers and parameters in the request

  • Handle the response from the API in your application

Add your answer

Q171. what is agent pool

Ans.

An agent pool is a group of agents or workers that are available to perform tasks or jobs in a system.

  • Agent pools are commonly used in job scheduling systems to distribute workloads.

  • Each agent in the pool can be assigned tasks based on availability and skill set.

  • Agent pools can help improve efficiency and scalability in a system.

  • Examples: Azure DevOps agent pools, Kubernetes node pools.

Add your answer

Q172. Explain project in detail

Ans.

Developed a mobile application for tracking daily water intake and setting hydration goals.

  • Designed user interface for easy input of water consumption

  • Implemented database to store user data and hydration goals

  • Integrated notifications to remind users to drink water throughout the day

Add your answer

Q173. Sql query to find duplicates

Ans.

Use a SQL query with GROUP BY and HAVING clause to find duplicates in a table.

  • Use GROUP BY to group rows with the same values together

  • Use HAVING COUNT(*) > 1 to filter out non-duplicate rows

  • Example: SELECT column_name, COUNT(*) FROM table_name GROUP BY column_name HAVING COUNT(*) > 1;

Add your answer

Q174. Difference between RDD and DF

Ans.

RDD stands for Resilient Distributed Dataset and is the fundamental data structure of Spark. DF stands for DataFrame and is a distributed collection of data organized into named columns.

  • RDD is an immutable distributed collection of objects, while DF is a distributed collection of data organized into named columns.

  • RDD is more low-level and requires the developer to manage the schema and data types, while DF provides a higher-level abstraction with schema inference and optimiza...read more

Add your answer

Q175. What is strategy 40

Ans.

Strategy 40 is a term used in the software development industry to refer to a specific approach or plan for achieving a goal.

  • Strategy 40 typically involves setting clear objectives and milestones for a project.

  • It may also involve identifying potential risks and developing contingency plans.

  • Examples of Strategy 40 in action include creating a detailed project plan, assigning tasks to team members, and regularly monitoring progress towards goals.

Add your answer

Q176. Reverse a string in javascript

Ans.

Use the built-in split, reverse, and join methods to reverse a string in JavaScript.

  • Split the string into an array of characters using split('')

  • Reverse the array using reverse()

  • Join the array back into a string using join('')

Add your answer

Q177. Diff btw SAP HANA and ECC

Ans.

SAP HANA is an in-memory database platform for real-time analytics and applications, while ECC (Enterprise Central Component) is a traditional ERP system.

  • SAP HANA is an in-memory database platform, providing real-time data processing and analytics.

  • ECC is a traditional ERP system that relies on disk-based storage for data processing.

  • SAP HANA allows for faster data access and processing compared to ECC.

  • SAP HANA is designed for real-time analytics and applications, while ECC is ...read more

Add your answer

Q178. Annotations of spring boot

Ans.

Annotations in Spring Boot are used to simplify the configuration and development of Spring applications.

  • Annotations are used to define the behavior of Spring components, such as controllers, services, and repositories.

  • Annotations like @RestController, @Service, and @Repository are commonly used in Spring Boot applications.

  • Annotations can also be used for mapping requests to controller methods, handling exceptions, and defining transaction boundaries.

  • Annotations like @Autowir...read more

Add your answer

Q179. what are closures

Ans.

Closures are functions that have access to their own scope, as well as the scope in which they were defined.

  • Closures can access variables from their outer function even after the outer function has finished executing.

  • Closures can be used to create private variables in JavaScript.

  • Example: function outerFunction() { let outerVar = 'I am outer'; return function innerFunction() { console.log(outerVar); }; }

Add your answer

Q180. What is oops concept

Ans.

Object-oriented programming paradigm that focuses on objects and classes for code organization and reusability.

  • Encapsulation: Bundling data and methods that operate on the data into a single unit (class)

  • Inheritance: Ability of a class to inherit properties and behavior from another class

  • Polymorphism: Ability to present the same interface for different data types

Add your answer

Q181. Java 8 features ?

Ans.

Java 8 introduced several new features including lambda expressions, functional interfaces, streams, and default methods.

  • Lambda expressions allow you to write code in a more concise and readable way.

  • Functional interfaces are interfaces with a single abstract method, which can be implemented using lambda expressions.

  • Streams provide a way to work with sequences of elements and perform operations like filter, map, reduce, etc.

  • Default methods allow interfaces to have method imple...read more

Add your answer

Q182. Types of selecors used

Ans.

Selectors used in application development include class, ID, attribute, and pseudo-class selectors.

  • Class selectors start with a period (.) and target elements with a specific class name.

  • ID selectors start with a hash (#) and target elements with a specific ID.

  • Attribute selectors target elements based on their attributes, such as [type='text'] targeting input elements with type 'text'.

  • Pseudo-class selectors target elements based on their state or position, such as :hover targe...read more

Add your answer

Q183. explain java 8 features

Ans.

Java 8 introduced several new features including lambda expressions, functional interfaces, streams, and default methods.

  • Lambda expressions allow you to write code in a more concise way.

  • Functional interfaces are interfaces with a single abstract method, which can be implemented using lambda expressions.

  • Streams provide a way to work with sequences of elements and perform operations like filter, map, reduce, etc.

  • Default methods allow interfaces to have method implementations.

  • Ex...read more

Add your answer

Q184. Abstract class vs interface

Ans.

Abstract class is a class that can have abstract methods and concrete methods, while interface is a blueprint for a class with only abstract methods.

  • Abstract class can have both abstract and concrete methods, while interface can only have abstract methods.

  • A class can implement multiple interfaces but can only inherit from one abstract class.

  • Abstract classes can have constructors, while interfaces cannot.

  • Interfaces are used to achieve multiple inheritance in Java.

  • Example: Abst...read more

Add your answer

Q185. Master data in detail

Ans.

Master data refers to the core data that is essential to the operations of a business or organization.

  • Master data is the foundational data that is essential for business operations.

  • It includes data such as customer information, product details, employee records, etc.

  • Master data is typically static and does not change frequently.

  • It is used as a reference point for other data within the organization.

  • Having accurate and up-to-date master data is crucial for the smooth functionin...read more

Add your answer

Q186. tell me abt urself

Ans.

I am a passionate Applications Developer with 5 years of experience in developing web and mobile applications.

  • 5 years of experience in developing web and mobile applications

  • Proficient in programming languages such as Java, JavaScript, and Swift

  • Strong problem-solving skills and ability to work in a team

  • Experience with Agile development methodologies

  • Passionate about staying updated with the latest technologies

Add your answer

Q187. What is delegate

Ans.

A delegate is a type that represents references to methods with a specific parameter list and return type.

  • Delegates allow methods to be passed as parameters.

  • Delegates can be used to define callback methods.

  • Delegates are similar to function pointers in C++.

  • Delegates are used in event handling in C#.

Add your answer

Q188. Spring vs spring boot

Ans.

Spring is a framework for building Java applications, while Spring Boot is an extension that simplifies the setup and development process.

  • Spring is a comprehensive framework that provides support for various Java technologies like JDBC, JPA, and REST.

  • Spring Boot is an opinionated framework that simplifies the setup and configuration of Spring applications by providing defaults and auto-configuration.

  • Spring Boot includes embedded servers like Tomcat, Jetty, and Undertow, makin...read more

Add your answer

Q189. 5 exceptions of Spring Boot

Ans.

Some exceptions in Spring Boot include NoSuchBeanDefinitionException, BeanCreationException, and InvalidPropertyException.

  • NoSuchBeanDefinitionException: Thrown when trying to access a bean that does not exist in the application context.

  • BeanCreationException: Thrown when a bean cannot be created due to issues like constructor arguments or dependencies.

  • InvalidPropertyException: Thrown when trying to set an invalid property value on a bean.

  • IllegalStateException: Thrown when an o...read more

Add your answer

Q190. Recursion in Trigger

Ans.

Recursion in triggers refers to a trigger calling itself repeatedly until a certain condition is met.

  • Recursion in triggers can be used to perform repetitive tasks on related records.

  • Care must be taken to avoid infinite loops by setting a base case or limit.

  • Example: A trigger that updates all child records when a parent record is updated.

Add your answer

Q191. What is mapping load

Ans.

Mapping load is a technique used in QlikView to load data from multiple tables and map them together.

  • Mapping load is used to combine data from different tables based on a common field.

  • It helps in creating a mapping table that can be used to associate values from different tables.

  • Mapping load is useful for data transformation and data modeling in QlikView.

  • Example: Load table1, table2 using mapping load on common field to create a mapping table.

Add your answer

Q192. What is binary load

Ans.

Binary load is a feature in QlikView that allows loading data from one QlikView document into another.

  • Binary load is used to load data and script logic from one QlikView document (QVW file) into another.

  • It helps in reusing data models, script logic, and data transformations from one QlikView document in another.

  • Binary load is achieved using the 'Binary' keyword followed by the path of the QlikView document to be loaded.

  • For example, 'Binary [lib://SourceQVW.qvw];' is used to l...read more

Add your answer

Q193. What is BDC in abap

Ans.

BDC in ABAP stands for Batch Data Communication. It is a method used to transfer data from external systems into SAP.

  • BDC is used for automating data transfer processes in SAP systems.

  • It involves recording the manual steps of a transaction and then playing back the recorded data to automate the process.

  • There are two methods of BDC - Call Transaction and Session Method.

  • BDC is commonly used for mass data uploads or updates in SAP systems.

Add your answer

Q194. Microservice design pattern?

Ans.

Microservice design pattern is an architectural style that structures an application as a collection of loosely coupled services.

  • Each service is responsible for a specific business function and can be developed, deployed, and scaled independently.

  • Communication between services is typically done through APIs, allowing for flexibility and resilience.

  • Microservices promote agility, scalability, and maintainability in large and complex applications.

  • Examples of companies using micr...read more

Add your answer

Q195. What is exception

Ans.

An exception is an event that disrupts the normal flow of a program's execution.

  • Exceptions are used to handle errors and other exceptional events in a program.

  • They allow the program to continue running even if an error occurs.

  • Examples of exceptions include NullPointerException, ArrayIndexOutOfBoundsException, and IOException.

Add your answer

Q196. Types of inheritance

Ans.

Types of inheritance include single, multiple, multilevel, hierarchical, hybrid, and so on.

  • Single inheritance: a class inherits from only one base class.

  • Multiple inheritance: a class inherits from more than one base class.

  • Multilevel inheritance: a class inherits from a class which in turn inherits from another class.

  • Hierarchical inheritance: multiple classes inherit from a single base class.

  • Hybrid inheritance: a combination of multiple and multilevel inheritance.

  • Example: clas...read more

Add your answer

Q197. Oops concepts in detail

Ans.

Oops concepts refer to Object-Oriented Programming principles like Inheritance, Encapsulation, Polymorphism, and Abstraction.

  • Inheritance: Allows a class to inherit properties and behavior from another class.

  • Encapsulation: Bundling data and methods that operate on the data into a single unit.

  • Polymorphism: Ability to present the same interface for different data types.

  • Abstraction: Hiding the complex implementation details and showing only the necessary features.

Add your answer

Q198. Test plan vs Test Strategy

Ans.

Test plan outlines the scope, approach, resources, and schedule for testing, while test strategy defines the overall testing approach for the project.

  • Test plan is a detailed document that specifies the testing scope, objectives, resources, schedule, and approach.

  • Test strategy is a high-level document that outlines the overall testing approach for the project.

  • Test plan is more detailed and specific to a particular testing phase or level.

  • Test strategy is more generic and applie...read more

Add your answer

Q199. Working of Annotations

Ans.

Annotations in Java are metadata that provide data about a program but do not affect the program itself.

  • Annotations start with the @ symbol in Java.

  • Annotations can be used to provide information to the compiler or runtime environment.

  • Annotations can be used for documentation purposes or to control the behavior of the program.

  • Examples of annotations in Java include @Override, @Deprecated, and @SuppressWarnings.

Add your answer

Q200. Life Cycles in react

Ans.

React has three main life cycles: Mounting, Updating, and Unmounting.

  • Mounting: When an instance of a component is being created and inserted into the DOM.

  • Updating: When a component is being re-rendered as a result of changes to its props or state.

  • Unmounting: When a component is being removed from the DOM.

Add your answer
1
2
3

More about working at Accenture

Top Rated Mega Company - 2024
Top Rated Company for Women - 2024
Top Rated IT/ITES Company - 2024
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos

Interview Process at null

based on 218 interviews in the last 1 year
3 Interview rounds
Technical Round
Coding Test Round
HR Round
View more
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Application Developer Interview Questions from Similar Companies

3.7
 • 92 Interview Questions
4.1
 • 43 Interview Questions
3.7
 • 28 Interview Questions
3.8
 • 27 Interview Questions
3.9
 • 14 Interview Questions
View all
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
70 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions
Get AmbitionBox app

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter