Add office photos
Employer?
Claim Account for FREE

Accenture

3.8
based on 55.6k Reviews
Video summary
Proud winner of ABECA 2024 - AmbitionBox Employee Choice Awards
Filter interviews by

100+ SrinSoft Technologies Interview Questions and Answers

Updated 15 Feb 2025
Popular Designations

Q1. Maximum Subarray Sum Problem Statement

Given an array ARR consisting of N integers, your goal is to determine the maximum possible sum of a non-empty contiguous subarray within this array.

Example of Subarrays:...read more

Add your answer

Q2. Print Permutations - String Problem Statement

Given an input string 'S', you are tasked with finding and returning all possible permutations of the input string.

Input:

The first and only line of input contains...read more
Add your answer

Q3. Ninja and Candies Problem

Ninja, a boy from Ninjaland, receives 1 coin every morning from his mother. He wants to purchase exactly 'N' candies. Each candy usually costs 2 coins, but it is available for 1 coin i...read more

Add your answer

Q4. Replace Character Problem Statement

Given an input string S and two characters 'c1' and 'c2', your task is to replace every occurrence of the character 'c1' with the character 'c2' in the given string.

Input:

L...read more
Add your answer
Discover SrinSoft Technologies interview dos and don'ts from real experiences

Q5. Reverse Number Problem Statement

Ninja is exploring new challenges and desires to reverse a given number. Your task is to assist Ninja in reversing the number provided.

Note:

If a number has trailing zeros, the...read more

Add your answer

Q6. Arithmetic Expression Evaluation Problem Statement

You are provided with a string expression consisting of characters '+', '-', '*', '/', '(', ')' and digits '0' to '9', representing an arithmetic expression in...read more

Add your answer
Are these interview questions helpful?

Q7. Valid Parentheses Problem Statement

Given a string 'STR' consisting solely of the characters “{”, “}”, “(”, “)”, “[” and “]”, determine if the parentheses are balanced.

Input:

The first line contains an integer...read more
Add your answer

Q8. Next Smallest Palindrome Problem Statement

Find the next smallest palindrome strictly greater than a given number 'N' represented as a string 'S'.

Explanation:

You are given a number in string format, and your ...read more

Add your answer
Share interview questions and help millions of jobseekers 🌟
Q9. What is the contract between the equals() and hashCode() methods in Java?
Add your answer

Q10. A link layer switch is involved in_____layers of the TCP/IP protocol suite. a.2 b.3 c.4 d.5

Ans.

A link layer switch is involved in which layers of the TCP/IP protocol suite?

  • A link layer switch operates at the data link layer (layer 2) of the TCP/IP protocol suite.

  • It is responsible for forwarding data packets between devices on the same network segment.

  • It does not operate at the network, transport, or application layers.

View 1 answer
Q11. What are the features of Java 8?
Add your answer
Q12. How is the index calculated using hashCode() in a HashMap?
Add your answer

Q13. Program to check if string is palindrome or not.

Ans.

A program to check if a given string is a palindrome or not.

  • Remove all non-alphanumeric characters from the string

  • Convert the string to lowercase

  • Reverse the string and compare it with the original string

  • If they are the same, the string is a palindrome

View 1 answer

Q14. What is the difference between padding and margin?

Ans.

Padding is the space inside an element, while margin is the space outside an element.

  • Padding is used to create space between an element's content and its border.

  • Margin is used to create space between an element's border and the adjacent elements.

  • Padding is affected by the background color of the element, while margin is not.

  • Padding can be set individually for each side of an element (top, right, bottom, left), while margin can be set as a shorthand for all sides or individual...read more

View 1 answer

Q15. How would you measure the stack space without using the task manager, when an application is running on a computer? Write an algorithm if possible!!!

Ans.

To measure stack space without task manager, monitor memory usage and track stack pointer changes.

  • Monitor memory usage of the application using system calls or profiling tools.

  • Track changes in the stack pointer register to estimate stack space usage.

  • Calculate the difference between initial and final stack pointer values to determine stack space used.

  • Use tools like Valgrind, GDB, or custom memory profiling libraries for detailed analysis.

Add your answer

Q16. What are different types of directives in Angular?

Ans.

Directives in Angular are markers on DOM elements that tell Angular to attach a specified behavior to that element.

  • There are three types of directives in Angular: Component, Structural, and Attribute.

  • Component directives are used to create reusable UI components.

  • Structural directives are used to change the structure of the DOM.

  • Attribute directives are used to change the appearance or behavior of an element.

  • Examples of built-in directives include ngIf, ngFor, and ngStyle.

Add your answer

Q17. What is CLR , dependancy injection ,appsettings , table ,view , difference between stored procedure & functions , configureservices , Filters

Ans.

CLR is Common Language Runtime, dependency injection is a design pattern, appsettings is a configuration file, tables and views are database objects, stored procedures and functions are database routines, configureservices is a method in ASP.NET Core, filters are used for request/response filtering.

  • CLR is the runtime environment that executes .NET applications

  • Dependency injection is a design pattern where dependencies are injected into a class rather than created within it

  • App...read more

Add your answer
Q18. Can you explain the internal workings of HashMap in Java?
Add your answer

Q19. What are different types of function module in SAP?

Ans.

There are three types of function modules in SAP: 1) Function modules with interface 2) Function modules without interface 3) Function modules as methods of a class.

  • Function modules with interface are used for external communication

  • Function modules without interface are used for internal communication

  • Function modules as methods of a class are used for object-oriented programming

  • Examples of function modules with interface are RFC_READ_TABLE and RFC_GET_SYSTEM_INFO

  • Examples of f...read more

Add your answer

Q20. What is git? Difference between git stash and commit.

Ans.

Git is a version control system used for tracking changes in code. Git stash and commit are used for different purposes.

  • Git commit is used to save changes to the repository permanently.

  • Git stash is used to temporarily save changes that are not ready to be committed.

  • Stashed changes can be reapplied later using git stash apply or git stash pop.

  • Commits create a new version of the code that can be accessed by other team members.

  • Stashes are private to the user and not visible to o...read more

Add your answer

Q21. Can you explain difference between == and euqals()?

Ans.

The == operator checks for equality of values, while the equals() method checks for equality of objects.

  • The == operator compares the values of two objects, while the equals() method compares the objects themselves.

  • The == operator is used for primitive data types, while the equals() method is used for objects.

  • Example: int a = 5; int b = 5; a == b will return true, but a.equals(b) will not work as int is a primitive data type.

Add your answer

Q22. Which is the oldest programming language?

Ans.

Fortran is the oldest programming language.

  • Fortran was developed in the 1950s by IBM.

  • It stands for Formula Translation.

  • It was primarily used for scientific and engineering calculations.

  • Other old programming languages include COBOL and Lisp.

Add your answer

Q23. Difference between NPM, NPX. NPM, Yarn. What is monolithic architecture. How does state update happens in React.

Ans.

NPM is a package manager for JavaScript, NPX is a package runner. Yarn is an alternative to NPM. Monolithic architecture is a design pattern where all components are tightly coupled. State update in React is managed through setState() method.

  • NPM is a package manager for JavaScript that allows developers to install, share, and manage dependencies for their projects.

  • NPX is a package runner that comes with NPM and allows you to execute packages without installing them globally.

  • Y...read more

Add your answer

Q24. How to remove dulicate array without using streams or another array

Ans.

Use a HashSet to remove duplicates from an array of strings without using streams or another array.

  • Create a HashSet to store unique elements.

  • Iterate through the array and add each element to the HashSet.

  • Convert the HashSet back to an array of strings.

Add your answer

Q25. What is the difference between delete and trunk in SQL? Tell me about your Projects.

Ans.

DELETE is used to remove rows from a table, while TRUNCATE is used to remove all rows from a table.

  • DELETE is a DML command, while TRUNCATE is a DDL command.

  • DELETE can be rolled back, while TRUNCATE cannot be rolled back.

  • DELETE triggers row level triggers, while TRUNCATE triggers table level triggers.

  • DELETE is slower as it maintains logs, while TRUNCATE is faster as it does not maintain logs.

Add your answer

Q26. What programming languages are you familiar with?

Ans.

I am familiar with programming languages such as Java, Python, C++, and JavaScript.

  • Java

  • Python

  • C++

  • JavaScript

Add your answer

Q27. What product management system do you like using?

Ans.

I prefer using Jira for product management.

  • Jira is a popular product management system used by many companies

  • It offers features like task tracking, agile boards, and customizable workflows

  • Integrates well with other tools like Confluence for documentation

Add your answer

Q28. What is post mapping explain with example

Ans.

Post mapping is a method used in RESTful APIs to create a new resource.

  • Post mapping is used to create a new resource in the server.

  • It is typically used in combination with HTTP POST method.

  • Post mapping is commonly used in Spring Boot applications to handle incoming POST requests.

Add your answer

Q29. Basic structure of an HTML page

Ans.

Basic structure of an HTML page includes doctype declaration, html, head, and body tags.

  • DOCTYPE declaration specifies the HTML version

  • HTML tag wraps the entire content of the page

  • Head tag contains meta information, title, and links to external resources

  • Body tag contains the visible content of the page

View 1 answer

Q30. What is are new no code tools and differences

Ans.

No code tools are platforms that allow users to create applications without needing to write any code.

  • No code tools are becoming increasingly popular for their ease of use and accessibility.

  • They typically involve drag-and-drop interfaces, visual programming, and pre-built templates.

  • Examples of no code tools include Bubble, Webflow, and Zapier.

Add your answer

Q31. What is Devops? How it is useful for developers?

Ans.

DevOps is a software development approach that combines development and operations teams to improve collaboration and efficiency.

  • DevOps emphasizes automation, continuous integration and delivery, and monitoring.

  • It helps developers to quickly and reliably deploy code changes.

  • DevOps also promotes a culture of collaboration and communication between development and operations teams.

  • Examples of DevOps tools include Jenkins, Docker, and Kubernetes.

Add your answer

Q32. Absence Management (Usecase) Absence Type Definition and Use Absence Plan Definition and Use

Ans.

Absence Management involves defining and using Absence Types and Plans.

  • Absence Type Definition: Identifying different types of absences such as sick leave, vacation, personal leave, etc.

  • Absence Type Use: Assigning the appropriate absence type to an employee's absence record.

  • Absence Plan Definition: Creating plans for managing employee absences, such as policies for requesting time off, approval processes, etc.

  • Absence Plan Use: Implementing the absence plan when an employee re...read more

Add your answer

Q33. What design software do you know?

Ans.

I am proficient in using Adobe Photoshop, Sketch, and Figma for designing software interfaces.

  • Adobe Photoshop

  • Sketch

  • Figma

Add your answer

Q34. What scripting language do you know?

Ans.

I am proficient in Python, JavaScript, and Bash scripting languages.

  • Python: Used for automation, web development, data analysis.

  • JavaScript: Used for web development, server-side scripting.

  • Bash: Used for system administration, automation tasks.

Add your answer

Q35. What's the best way to get the code?

Ans.

The best way to get the code is through version control systems like Git.

  • Use version control systems like Git to track changes and collaborate with others.

  • Ensure proper documentation and commit messages for easy understanding.

  • Use branching and merging to manage multiple versions of the code.

  • Consider using code review tools like GitHub pull requests for better collaboration.

Add your answer

Q36. What is the complexity of binary sort?

Ans.

Binary sort has a time complexity of O(log n).

  • Binary sort is a divide and conquer algorithm that repeatedly divides the array in half until the target value is found.

  • It has a time complexity of O(log n) because with each division, the search space is reduced by half.

  • For example, in an array of 8 elements, binary sort will take at most 3 comparisons to find the target value.

Add your answer

Q37. Find all employees, with the help of given list of employeeIds

Ans.

Use employeeIds to find all employees

  • Create a function that takes a list of employeeIds and returns a list of employees

  • Use a database query or API call to retrieve employee information based on employeeIds

  • Handle cases where employeeIds do not match any employees

Add your answer

Q38. What is stream api explain with example

Ans.

Stream API in Java provides a way to process collections of objects in a functional style.

  • Stream API allows for easy manipulation of collections using functional programming concepts like map, filter, and reduce.

  • Example: List names = Arrays.asList("Alice", "Bob", "Charlie"); Stream stream = names.stream();

  • Example: List numbers = Arrays.asList(1, 2, 3, 4, 5); int sum = numbers.stream().reduce(0, Integer::sum);

Add your answer

Q39. What is static and non static variable

Ans.

Static variables are shared among all instances of a class, while non-static variables are unique to each instance.

  • Static variables are declared using the 'static' keyword and retain their value throughout the program's execution.

  • Non-static variables are declared without the 'static' keyword and have separate values for each instance of a class.

  • Static variables are accessed using the class name, while non-static variables are accessed using object instances.

  • Example: static in...read more

Add your answer

Q40. Difference between JIT compiler and AOT?

Ans.

JIT compiles code at runtime while AOT compiles code before runtime.

  • JIT stands for Just-In-Time compilation and compiles code at runtime.

  • AOT stands for Ahead-Of-Time compilation and compiles code before runtime.

  • JIT is used in Java Virtual Machine (JVM) while AOT is used in languages like C and C++.

  • JIT can result in slower startup time but faster execution while AOT can result in faster startup time but slower execution.

  • Examples of JIT compilers include HotSpot for Java and V8...read more

Add your answer

Q41. How to write an immutable class

Ans.

Immutable class in Java cannot be modified after creation

  • Use the final keyword to make class immutable

  • Make all fields private and final

  • Do not provide setter methods, only getter methods

  • If class contains mutable objects, make sure to return a deep copy in getter methods

Add your answer

Q42. What is Box Model?

Ans.

Box Model is a concept in CSS where every element is treated as a box with content, padding, border, and margin.

  • Box Model consists of content, padding, border, and margin.

  • Content is the actual content of the box.

  • Padding is the space between the content and the border.

  • Border is the line that goes around the padding and content.

  • Margin is the space outside the border.

Add your answer

Q43. WAP to find the middle element in a linked list?

Ans.

Use two pointers to find the middle element in a linked list.

  • Initialize two pointers, slow and fast, both pointing to the head of the linked list.

  • Move slow pointer by one step and fast pointer by two steps until fast reaches the end of the list.

  • The element pointed to by slow pointer at this point is the middle element.

Add your answer

Q44. What is ci cd pipeline?

Ans.

CI/CD pipeline is a process of automating software delivery and deployment.

  • CI/CD stands for Continuous Integration/Continuous Deployment

  • It involves automating the building, testing, and deployment of software

  • It helps in detecting and fixing bugs early in the development cycle

  • It ensures faster and more reliable software delivery

  • Popular tools for CI/CD pipeline include Jenkins, Travis CI, and CircleCI

Add your answer

Q45. what is arrray, clouser hoisting?

Ans.

An array is a data structure that stores a collection of elements, while closure hoisting refers to the behavior of moving variable declarations to the top of their scope.

  • An array is a collection of elements stored in a contiguous memory location.

  • Closure hoisting is the behavior in JavaScript where variable declarations are moved to the top of their scope during compilation.

  • Example: var x = 10; function test() { console.log(x); var x = 20; } test(); // Output: undefined

Add your answer

Q46. What is static and dynamic What is dml query

Ans.

Static and dynamic refer to types of programming languages. DML query is a Data Manipulation Language query used in databases.

  • Static programming languages are compiled before runtime, while dynamic languages are interpreted during runtime.

  • Static languages include C, C++, Java, while dynamic languages include Python, JavaScript.

  • DML query is used to manipulate data in a database, such as INSERT, UPDATE, DELETE statements.

  • Examples of DML queries: INSERT INTO table_name (column1,...read more

Add your answer

Q47. What is a polymorphism?

Ans.

Polymorphism is the ability of a single function or method to operate on different data types.

  • Allows objects of different classes to be treated as objects of a common superclass.

  • Can be achieved through method overloading or method overriding.

  • Example: Animal class with methods eat() and sleep(), and subclasses like Dog and Cat that override these methods.

Add your answer

Q48. What is dependency inversion?

Ans.

Dependency inversion is a design principle where high-level modules should not depend on low-level modules, but both should depend on abstractions.

  • High-level modules should not depend on low-level modules, both should depend on abstractions

  • Abstractions should not depend on details, details should depend on abstractions

  • Inversion of control containers like Spring Framework in Java implement dependency inversion

Add your answer

Q49. Can you explain ACID?

Ans.

ACID is a set of properties that guarantee database transactions are processed reliably.

  • ACID stands for Atomicity, Consistency, Isolation, Durability

  • Atomicity ensures that all operations in a transaction are completed successfully or none at all

  • Consistency ensures that the database remains in a valid state before and after the transaction

  • Isolation ensures that multiple transactions can occur concurrently without affecting each other

  • Durability ensures that once a transaction i...read more

Add your answer

Q50. Why java is platform independent

Ans.

Java is platform independent due to its bytecode and JVM implementation.

  • Java code is compiled into bytecode, which can run on any platform with a Java Virtual Machine (JVM)

  • JVM acts as an interpreter, translating bytecode into machine code specific to the underlying platform

  • This allows Java programs to be written once and run anywhere, without the need for recompilation

Add your answer

Q51. Please tell me about isolation levels

Ans.

Isolation levels in databases determine how transactions interact with each other.

  • Isolation levels define the degree to which one transaction must be isolated from the effects of other transactions.

  • Common isolation levels include READ UNCOMMITTED, READ COMMITTED, REPEATABLE READ, and SERIALIZABLE.

  • Higher isolation levels provide more data consistency but may impact performance.

  • For example, in READ COMMITTED isolation level, a transaction can only see committed data from other ...read more

Add your answer

Q52. Difference between view and materilized view

Ans.

A view is a virtual table based on a SQL query, while a materialized view is a physical copy of the data from the query.

  • Views are dynamic and show the latest data, while materialized views store data physically and need to be refreshed to show updates.

  • Materialized views are useful for improving query performance by pre-computing and storing results.

  • Views are commonly used for simplifying complex queries or providing security restrictions, while materialized views are used for...read more

Add your answer

Q53. Define the tree data structure?

Ans.

A tree data structure is a hierarchical data structure consisting of nodes connected by edges.

  • Consists of nodes connected by edges

  • Has a root node at the top

  • Each node can have zero or more child nodes

  • Used in organizing data hierarchically, like file systems or organization charts

Add your answer

Q54. Write a program to sort the numbers

Ans.

A program to sort numbers in an array

  • Use a sorting algorithm like bubble sort, selection sort, or quicksort

  • Iterate through the array and compare each element with the next one

  • Swap elements if they are in the wrong order

  • Repeat the process until the array is sorted

  • Example: [3, 1, 4, 1, 5, 9, 2] -> [1, 1, 2, 3, 4, 5, 9]

Add your answer

Q55. What is dependency Injection

Ans.

Dependency Injection is a design pattern where the dependencies of an object are provided externally rather than created within the object itself.

  • Allows for easier testing by providing mock dependencies

  • Promotes loose coupling between components

  • Improves code reusability and maintainability

  • Commonly used in frameworks like Spring in Java

Add your answer

Q56. How to make a class singleton

Ans.

To make a class singleton, restrict the instantiation of a class to only one object.

  • Create a private static instance variable of the class.

  • Create a private constructor to prevent external instantiation.

  • Provide a public static method to access the singleton instance.

  • Ensure thread safety if needed by using synchronized keyword or double-checked locking.

Add your answer

Q57. tell me about operating systems

Ans.

Operating systems are software that manage computer hardware resources and provide services for computer programs.

  • Operating systems control hardware resources like memory, CPU, and storage

  • They provide a user interface for interacting with the computer

  • Examples include Windows, macOS, Linux, and Android

Add your answer

Q58. How many types of Accenture

Ans.

Accenture is a global professional services company specializing in strategy, consulting, digital, technology, and operations.

  • Accenture offers various services including strategy consulting, technology consulting, and digital transformation.

  • They have expertise in industries such as banking, healthcare, retail, and telecommunications.

  • Accenture operates in more than 120 countries and serves clients across various sectors.

  • They have a strong focus on innovation and use advanced t...read more

Add your answer

Q59. How many design are working

Ans.

The question is unclear and lacks context.

  • Ask for clarification on what 'design' refers to.

  • Inquire about the specific context or industry.

  • Request additional information to provide an accurate answer.

Add your answer

Q60. How it works web design

Ans.

Web design is the process of creating and arranging visual elements on a website to ensure usability and aesthetic appeal.

  • Web design involves planning and conceptualizing the layout and structure of a website.

  • It includes selecting color schemes, typography, and graphics to create a visually appealing design.

  • Web design also focuses on creating a user-friendly interface and ensuring responsive design for different devices.

  • HTML, CSS, and JavaScript are commonly used in web desig...read more

Add your answer

Q61. What is garbage collection?

Ans.

Garbage collection is an automatic memory management process.

  • It frees up memory that is no longer being used by the program.

  • It helps prevent memory leaks and crashes caused by running out of memory.

  • Examples of languages that use garbage collection are Java, Python, and Ruby.

Add your answer

Q62. Create a dictionary using two lists

Ans.

Create a dictionary using two lists

  • Use zip() function to combine two lists into key-value pairs

  • Use dict() function to convert the key-value pairs into a dictionary

Add your answer

Q63. What are threads?

Ans.

Threads are lightweight processes within a program that can run concurrently, allowing for multitasking and improved performance.

  • Threads share the same memory space within a process

  • Threads can communicate with each other more easily than separate processes

  • Examples include a web server handling multiple requests concurrently or a video game rendering graphics while processing user input

Add your answer

Q64. What is encapsulation?

Ans.

Encapsulation is the concept of bundling data and methods that operate on the data into a single unit, known as a class.

  • Encapsulation helps in hiding the internal state of an object and restricting access to it.

  • It allows for data hiding, which prevents outside code from directly accessing an object's internal state.

  • Encapsulation also helps in achieving data abstraction, where the internal details of an object are hidden and only the necessary details are exposed.

  • Example: In a...read more

Add your answer

Q65. difference between comparable and comparator

Ans.

Comparable is an interface used for natural ordering, while Comparator is an interface used for custom ordering in Java.

  • Comparable interface is used to define the natural ordering of objects. It is implemented by the class whose objects are to be compared.

  • Comparator interface is used to define custom ordering of objects. It is implemented by a separate class.

  • Example: String class implements Comparable interface for natural ordering based on alphabetical order. A custom Compar...read more

Add your answer

Q66. What is multi thteading??

Ans.

Multi threading is the ability of a CPU to execute multiple threads concurrently.

  • Allows multiple tasks to be executed simultaneously

  • Improves performance by utilizing CPU resources efficiently

  • Commonly used in applications like web servers and video games

Add your answer

Q67. What is polymorphism??

Ans.

Polymorphism is the ability of a function or method to behave differently based on the object it is acting upon.

  • Polymorphism allows objects of different classes to be treated as objects of a common superclass.

  • It enables a single interface to be used for different data types.

  • Examples include method overloading and method overriding in object-oriented programming.

Add your answer

Q68. What is inheritance??

Ans.

Inheritance is a concept in object-oriented programming where a class inherits attributes and methods from another class.

  • Allows a class to inherit properties and behaviors from another class

  • Promotes code reusability and reduces redundancy

  • Derived class can add its own unique attributes and methods

  • Example: Class 'Car' can inherit from class 'Vehicle' and gain attributes like 'color' and methods like 'drive()'

Add your answer

Q69. REST vs Soap, Best http practice

Ans.

REST is lightweight, flexible, and widely used. SOAP is more rigid and has more features.

  • REST uses standard HTTP methods like GET, POST, PUT, DELETE for communication.

  • SOAP uses XML for message format and WSDL for describing services.

  • REST is stateless and cacheable, making it faster and more scalable.

  • SOAP has built-in security and transaction support, but can be slower and more complex.

  • Best practice is to use REST for simple, lightweight applications and SOAP for complex, ente...read more

Add your answer

Q70. springboot annotations and their usecases

Ans.

SpringBoot annotations are used to simplify the development process by providing shortcuts for common tasks.

  • Annotations like @RestController, @RequestMapping, @GetMapping, @PostMapping are used to define RESTful web services.

  • Annotations like @Service, @Repository, @Component are used for defining beans.

  • Annotations like @Autowired, @Qualifier are used for dependency injection.

  • Annotations like @Transactional are used for managing transactions.

  • Annotations like @Value, @Configura...read more

Add your answer

Q71. What is Call by reference

Ans.

Call by reference is a method of passing arguments to a function where the actual memory address of the variable is passed.

  • In call by reference, the function receives a reference to the original variable, allowing it to modify the value of the variable directly.

  • Changes made to the parameter inside the function will affect the original variable outside the function.

  • Example: void swap(int &a, int &b) { int temp = a; a = b; b = temp; }

Add your answer

Q72. What is custom filters

Ans.

Custom filters are user-defined rules or criteria used to sort, search, or manipulate data in software applications.

  • Custom filters allow users to define specific conditions for sorting or searching data.

  • Examples include filtering emails by sender, sorting tasks by priority level, or searching for specific keywords in a document.

Add your answer

Q73. What are sid's?

Ans.

SID stands for Security Identifier. It is a unique identifier assigned to a user, group, or computer account in Windows.

  • SID is used to control access to resources in Windows

  • It is a string of alphanumeric characters

  • SID is generated by the Windows operating system during the creation of an account

  • It is used to identify users, groups, and computers in a network

  • Example: S-1-5-21-3623811015-3361044348-30300820-1013

Add your answer

Q74. What is c++, binary search

Ans.

C++ is a programming language and binary search is an efficient algorithm for finding a target value within a sorted array.

  • C++ is a popular programming language used for developing software applications.

  • Binary search is a divide and conquer algorithm that efficiently finds the target value in a sorted array.

  • In C++, binary search can be implemented using the standard library function std::binary_search.

  • Example: int arr[] = {1, 2, 3, 4, 5}; bool found = std::binary_search(arr, ...read more

Add your answer

Q75. tell about CICD process

Ans.

CICD process automates the building, testing, and deployment of software.

  • Continuous Integration (CI) involves automatically building and testing code changes frequently.

  • Continuous Deployment (CD) automates the deployment of code changes to production.

  • Tools like Jenkins, GitLab CI/CD, and CircleCI are commonly used in CICD pipelines.

  • CICD helps in improving software quality, reducing manual errors, and increasing development speed.

Add your answer

Q76. Explain security model in salesforce

Ans.

Salesforce security model ensures data protection through various layers of security features.

  • Salesforce uses a role hierarchy to control access to data based on user roles.

  • Permissions and sharing settings can be customized to restrict access to certain data.

  • Field-level security allows administrators to control which fields are visible or editable for different users.

  • Salesforce also offers encryption options to protect sensitive data at rest and in transit.

Add your answer

Q77. What is transformer

Ans.

A transformer is a device that transfers electrical energy between two or more circuits through electromagnetic induction.

  • Transformers are commonly used to increase or decrease voltage levels in electrical circuits.

  • They consist of two coils of wire, known as the primary and secondary coils, wrapped around a core.

  • The primary coil is connected to a power source, while the secondary coil is connected to the load.

  • Examples of transformers include power transformers used in electri...read more

Add your answer

Q78. How many web design

Ans.

The question is incomplete and lacks clarity.

  • The question is missing important details such as 'How many web design what?'

  • Without more context, it is impossible to provide a meaningful answer.

  • It is recommended to ask for clarification or provide more information to answer the question accurately.

Add your answer

Q79. what is a multithreading

Ans.

Multithreading is the ability of a CPU to execute multiple threads concurrently.

  • Multithreading allows multiple threads to run within the same process.

  • Each thread can perform different tasks simultaneously.

  • Examples include running a background task while the main application continues to run.

  • Multithreading can improve performance by utilizing multiple CPU cores efficiently.

Add your answer

Q80. Explain life cycles in react.js

Ans.

React.js has three main life cycles: Mounting, Updating, and Unmounting.

  • Mounting: Component is created and inserted into the DOM.

  • Updating: Component is updated and re-rendered when props or state change.

  • Unmounting: Component is removed from the DOM.

Add your answer

Q81. Difference betweenTCP and UPD

Ans.

TCP is connection-oriented, reliable protocol while UDP is connectionless, unreliable protocol.

  • TCP ensures data delivery by establishing a connection before sending data.

  • UDP does not establish a connection before sending data, making it faster but less reliable.

  • TCP uses sequencing and acknowledgment of data packets for reliable delivery.

  • UDP is used for real-time applications like video streaming or online gaming where speed is more important than reliability.

Add your answer

Q82. oops concept explanation

Ans.

Oops concept is a programming paradigm that focuses on objects and their interactions.

  • Oops stands for Object-Oriented Programming System

  • It emphasizes on encapsulation, inheritance, and polymorphism

  • Encapsulation is the process of hiding implementation details from the user

  • Inheritance allows a class to inherit properties and methods from another class

  • Polymorphism allows objects to take on multiple forms or behaviors

  • Example: Java, C++, Python are object-oriented programming lang...read more

Add your answer

Q83. Explain HashMap's internal working.

Ans.

HashMap is a data structure that stores key-value pairs and uses hashing to efficiently retrieve values.

  • HashMap uses an array of buckets to store key-value pairs.

  • When a key-value pair is added, the key is hashed to determine the index in the array where it will be stored.

  • If multiple keys hash to the same index (collision), a linked list or tree is used to store multiple entries at that index.

  • To retrieve a value, the key is hashed again to find the corresponding index and then...read more

Add your answer

Q84. Lamda expression used

Ans.

Lambda expressions are used in Java to create anonymous functions.

  • Lambda expressions are used to provide a concise way to represent a method that can be passed around.

  • They are commonly used in functional interfaces, such as Java's streams API.

  • Syntax: (parameters) -> expression or (parameters) -> { statements; }

  • Example: (int a, int b) -> a + b

Add your answer

Q85. What is interface?

Ans.

An interface in software development defines a contract for classes to implement, specifying methods and properties.

  • Interfaces in programming languages like Java and C# allow for multiple inheritance by defining a set of methods that a class must implement.

  • Interfaces are used to enforce a specific behavior in classes that implement them.

  • Interfaces help in achieving loose coupling between classes by allowing them to interact through defined contracts.

Add your answer

Q86. Different types coding test mcq

Ans.

The question is about different types of coding test MCQs.

  • MCQs are multiple-choice questions that test coding knowledge.

  • Different types of coding test MCQs can include questions on algorithms, data structures, programming languages, and problem-solving.

  • Examples of coding test MCQs include: 'What is the time complexity of a binary search?', 'Which data structure is best suited for implementing a queue?', 'What is the output of a specific code snippet?'

Add your answer

Q87. Difference between get and post

Ans.

GET and POST are HTTP methods used to send data to a server, but they differ in how the data is sent.

  • GET requests data from a server using a URL query string

  • POST sends data in the request body

  • GET is used for retrieving data, while POST is used for submitting data

  • GET requests are cached, while POST requests are not

  • GET requests have length restrictions, while POST requests do not

Add your answer

Q88. Many types of web design

Ans.

There are many types of web design, each with its own purpose and style.

  • Responsive web design: designing websites that adapt to different screen sizes

  • Minimalist web design: using clean and simple design elements

  • Flat design: using two-dimensional elements and bright colors

  • Material design: using realistic shadows and depth effects

  • Typography-focused design: emphasizing typography as a design element

  • Parallax scrolling design: creating an illusion of depth by moving background and...read more

Add your answer

Q89. What is list tuple

Ans.

A list is a collection of items that can be changed, while a tuple is a collection of items that cannot be changed.

  • List is mutable, tuple is immutable

  • List uses square brackets [], tuple uses parentheses ()

  • Example of list: [1, 2, 3]

  • Example of tuple: (1, 2, 3)

Add your answer

Q90. Governor Limit in Salesforce

Ans.

Governor Limit in Salesforce is a limit set by Salesforce to prevent code from consuming excessive resources.

  • Governor Limits are a set of limits that Salesforce enforces to ensure efficient use of resources.

  • Examples of Governor Limits include limits on the number of SOQL queries, the number of DML statements, and the amount of CPU time a transaction can consume.

  • Exceeding Governor Limits can result in exceptions being thrown and code execution being halted.

Add your answer

Q91. what is Rest api

Ans.

REST API is a set of rules and conventions for building and interacting with web services.

  • REST stands for Representational State Transfer

  • Uses standard HTTP methods like GET, POST, PUT, DELETE

  • Data is transferred in JSON or XML format

  • Stateless communication between client and server

  • Example: GET request to retrieve user data from a server

Add your answer

Q92. any programming language

Ans.

I am proficient in Java programming language.

  • Strong understanding of object-oriented programming concepts

  • Experience with Java frameworks like Spring and Hibernate

  • Knowledge of Java libraries and tools like Maven and JUnit

Add your answer

Q93. What's is proxy

Ans.

A proxy is an intermediary server that acts as a gateway between a user and the internet, providing anonymity and security.

  • Proxy servers can be used to access restricted content by masking the user's IP address.

  • They can also improve performance by caching frequently accessed resources.

  • Examples of proxies include VPNs, reverse proxies, and forward proxies.

Add your answer

Q94. What is idoc

Ans.

IDoc is a data container used in SAP systems to exchange information between different systems.

  • IDoc stands for Intermediate Document.

  • It is used for exchanging data between SAP systems and between SAP and non-SAP systems.

  • IDocs can be used for both synchronous and asynchronous communication.

  • They are structured in a hierarchical format and can contain various types of data such as master data, transaction data, and status information.

Add your answer

Q95. Explain Asp.net life cycle

Ans.

ASP.NET life cycle is a series of events that occur when a request is made to an ASP.NET application.

  • Initialization: Application_Start event is triggered.

  • Execution: Page is loaded, controls are initialized, and events are handled.

  • Rendering: Page is rendered as HTML and sent to the client.

  • Dispose: Page and controls are cleaned up and memory is released.

Add your answer

Q96. Explain page life cycle

Ans.

Page life cycle refers to the series of events that occur from the time a page is requested to the time the page is fully rendered and sent to the client.

  • Page request is made by the client

  • Page is initialized, controls are created and properties are set

  • Page is loaded and controls are populated with data

  • Page is rendered and sent to the client

Add your answer

Q97. Security Measures in Mendix

Ans.

Mendix provides various security measures to protect applications and data.

  • Mendix offers role-based access control to restrict user permissions.

  • Data encryption at rest and in transit ensures data security.

  • Built-in protection against common security threats like SQL injection and cross-site scripting.

  • Regular security updates and patches to address vulnerabilities.

  • Integration with third-party security tools for additional protection.

Add your answer

Q98. Java stream working internally

Ans.

Java streams provide a way to process collections of objects in a functional style.

  • Java streams are based on the concept of functional programming, allowing operations to be performed on collections in a declarative way.

  • Streams are composed of a source, intermediate operations, and a terminal operation.

  • Intermediate operations include filter, map, and reduce, while terminal operations include forEach, collect, and reduce.

  • Streams are lazy, meaning they only perform operations w...read more

Add your answer

Q99. Write and Array using

Ans.

Creating an array of strings in JavaScript

  • Declare an array variable using square brackets []

  • Assign string values inside the square brackets separated by commas

  • Example: let fruits = ['apple', 'banana', 'orange']

Add your answer

Q100. Explain about multi threading

Ans.

Multi threading is a programming concept where multiple threads within a process execute independently to improve performance.

  • Allows for concurrent execution of tasks

  • Improves performance by utilizing multiple CPU cores

  • Can lead to synchronization issues if not handled properly

Add your answer
1
2

More about working at Accenture

Top Rated Mega Company - 2024
Top Rated Company for Women - 2024
Top Rated IT/ITES Company - 2024
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos

Interview Process at SrinSoft Technologies

based on 252 interviews
5 Interview rounds
Aptitude Test Round
Coding Test Round
HR Round - 1
HR Round - 2
HR Round - 3
View more
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Software Developer Interview Questions from Similar Companies

4.0
 • 39 Interview Questions
4.0
 • 35 Interview Questions
3.7
 • 22 Interview Questions
3.8
 • 12 Interview Questions
3.4
 • 10 Interview Questions
3.4
 • 10 Interview Questions
View all
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
70 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter