Filter interviews by
I applied via Campus Placement and was interviewed in Apr 2018. There were 5 interview rounds.
A trigger is a PL/SQL block that is automatically executed in response to a specific event. A procedure is a named PL/SQL block that performs a specific task. A cursor is a database object used to retrieve data from a result set.
A trigger is used to automatically execute a set of SQL statements when a specific event occurs, such as inserting, updating, or deleting data from a table.
A procedure is a reusable block of co...
To recover data in Oracle, you can use the flashback feature or export tables using the Data Pump utility.
To recover data using flashback, you can use the FLASHBACK TABLE statement to restore a table to a previous state.
To export tables, you can use the Data Pump utility with the EXPDP command to export tables to a file.
You can also use the SQL Developer tool to export tables as SQL insert statements or CSV files.
Joins are used to combine rows from two or more tables based on related columns. There are different types of joins.
Types of joins: inner join, left join, right join, full outer join, cross join
Joins are used to retrieve data from multiple tables based on a related column
Natural join is a type of join that automatically matches columns with the same name in both tables
Example: SELECT * FROM employees NATURAL JOIN depar
Foreign key, primary key, and unique key are all constraints used in database tables to enforce data integrity.
Primary key is a column or a set of columns that uniquely identifies each row in a table.
Foreign key is a column or a set of columns in one table that refers to the primary key in another table.
Unique key ensures that the values in a column or a set of columns are unique across all the rows in a table.
Delete, drop, and truncate are SQL commands used to remove data from a table, but they differ in their functionality.
DELETE is used to remove specific rows from a table based on a condition.
DROP is used to remove an entire table from the database.
TRUNCATE is used to remove all rows from a table, but keeps the structure intact.
DELETE and TRUNCATE can be rolled back, but DROP cannot.
DELETE triggers the delete trigger, wh
Use a subquery to find the 5th highest salary in the Employee table.
Use the ORDER BY clause to sort the salaries in descending order.
Use the ROWNUM keyword to limit the results to the 5th highest salary.
Use a subquery to achieve the desired result.
The query to display the top 5 salaries in PL/SQL.
Use the SELECT statement to retrieve the salaries from the table.
Order the salaries in descending order using the ORDER BY clause.
Limit the result to the top 5 rows using the FETCH FIRST clause.
To copy the structure of a table without copying the data, you can use the CREATE TABLE AS SELECT statement.
Use the CREATE TABLE AS SELECT statement to create a new table with the same structure as the original table.
Specify the columns and their data types in the SELECT statement, but exclude the actual data from the original table.
Example: CREATE TABLE new_table AS SELECT * FROM original_table WHERE 1=0;
A view is a virtual table created from one or more tables. It can be used to simplify complex queries and provide a customized view of data.
A view is a stored query that can be treated as a table
Types of views include simple views, complex views, and materialized views
A complex view is a view that involves multiple tables or subqueries
Complex views can be used to combine data from different tables or apply complex calc...
Indexing is a technique used in databases to improve the performance of queries by creating a data structure that allows for faster data retrieval.
Indexing creates a separate data structure that contains a subset of the data in the database, organized in a way that allows for efficient searching and retrieval.
Indexes are created on one or more columns of a table and can be used to quickly locate data based on the value...
Procedures and functions are both PL/SQL program units, but they have some differences.
Procedures do not return a value, while functions do.
Procedures can have OUT parameters to pass values back to the caller, while functions cannot.
Functions can be used in SQL queries, while procedures cannot.
Functions must return a value, while procedures do not have to.
Functions can be called directly in PL/SQL code, while procedure
The query displays employee records with the same salary.
Use the GROUP BY clause to group the records by salary.
Use the HAVING clause to filter the groups with more than one employee.
Select the necessary columns to display the employee records.
To eliminate duplicates without using the distinct command in PL/SQL, we can use the GROUP BY clause.
Use the GROUP BY clause to group the data by the columns that you want to eliminate duplicates from.
Select the columns you want to display in the result set.
Aggregate functions like COUNT, SUM, AVG, etc. can be used to perform calculations on the grouped data.
The GROUP BY clause ensures that only unique combinations of
The PLSQL code snippet to replace only the third character with * in a given string.
Use the SUBSTR function to extract the first two characters of the string.
Concatenate the extracted characters with '*' and the remaining characters starting from the fourth position using the SUBSTR function.
Assign the modified string back to the original variable.
I applied via Naukri.com and was interviewed in Apr 2024. There was 1 interview round.
Using PL/SQL to create a procedure with a ref cursor to find the average and factorial of a given number.
Create a procedure that takes in a number as input and returns the average of that number using a ref cursor.
Use the EXISTS function to check if a factorial exists for a given number.
Write a block of code to calculate the factorial of a number using a loop.
Use a case statement to handle duplicate records in PL/SQL.
Use a case statement to check for duplicate records based on specific criteria.
Implement logic within the case statement to handle the duplicates appropriately.
Consider using a unique identifier or combination of columns to identify duplicates.
I am a software developer with experience in multiple programming languages and a passion for problem-solving.
Experienced in Java, C++, and Python
Strong knowledge of data structures and algorithms
Proficient in web development using HTML, CSS, and JavaScript
Familiar with agile development methodologies
Excellent problem-solving and analytical skills
Automation framework is a set of guidelines, standards, and coding practices used to create automated test scripts.
It provides a structured way to develop and maintain automated tests
It includes tools, libraries, and reusable components
It helps in reducing the time and effort required for testing
Examples include Selenium, Appium, and Robot Framework
High severity refers to critical defects that impact the core functionality of the software, while low severity refers to minor issues that have minimal impact on functionality.
High severity issues can cause the software to crash or result in data loss.
Low severity issues are cosmetic or minor usability problems.
From a QA point of view, high severity issues are more critical as they can significantly impact the user ex...
Class is a blueprint for creating objects while interface defines a contract for classes to implement.
A class can have attributes and methods while an interface only has method signatures.
A class can be instantiated while an interface cannot.
A class can only inherit from one class while it can implement multiple interfaces.
Example: Class - Animal, Interface - Flyable
Animal can have attributes like name, age, etc. and m...
Static keyword is used to declare a variable or method that belongs to the class rather than an instance of the class.
Static variables are shared among all instances of a class
Static methods can be called without creating an instance of the class
Static blocks are used to initialize static variables
Static keyword can also be used to create nested classes
Example: public static int count;
Access modifiers control the visibility and accessibility of class members.
Public: accessible from anywhere
Private: accessible only within the class
Protected: accessible within the class and its subclasses
Default: accessible within the same package
Used to enforce encapsulation and prevent unauthorized access
Interface defines only method signatures while abstract class can have both method signatures and implementations.
An interface can be implemented by multiple classes while an abstract class can only be extended by one class.
An abstract class can have constructors while an interface cannot.
An abstract class can have instance variables while an interface cannot.
An abstract class can provide default implementations for so...
A program for login scenario using defined automation architecture.
Identify the elements on the login page such as username, password, and login button
Use automation tools like Selenium to interact with the elements and input data
Verify successful login by checking for expected elements on the landing page
Implement error handling for incorrect login credentials
Use a modular and scalable architecture for maintainability
To store and print numbers from an array using arrayList.
Create an arrayList object
Loop through the array and add each element to the arrayList using add() method
Print the arrayList using toString() method
Example: int[] arr = {1, 2, 3}; ArrayList
Test scenario for download functionality of a songs website
Verify that the download button is visible and clickable
Check that the downloaded file is in the correct format
Ensure that the downloaded file is not corrupted
Test the download speed for different file sizes
Verify that the download progress is displayed to the user
Cache stores data temporarily to reduce server load while cookies store user information for website personalization.
Cache stores frequently accessed data to reduce server load and improve website performance.
Cookies store user information such as login credentials, preferences, and shopping cart items.
Cache is temporary and can be cleared at any time, while cookies can have an expiration date.
Cache is stored on the us...
The question asks to input an array and print the repeating characters.
Iterate through the array and store each element in a hash table or dictionary.
If an element already exists in the hash table, it is a repeating character.
Print all the repeating characters found.
Program to find the second minimum in an array.
Sort the array and return the second element.
Initialize two variables to store minimum and second minimum values.
Loop through the array and update the variables accordingly.
To find the longest palindrome in a given string.
Iterate through the string and check for palindromes of odd and even lengths.
Keep track of the longest palindrome found so far.
Use two pointers to check if the substring is a palindrome.
If the substring is a palindrome and its length is greater than the current longest palindrome, update the longest palindrome.
Find the next higher number with equal number of ones in binary representation.
Convert input number to binary
Count number of ones in binary representation
Increment input number until binary representation has equal number of ones
Convert incremented number to decimal
Find the duplicate number in an array of 10 numbers with only 2 steps.
Use a hash set to keep track of visited numbers.
Iterate through the array and check if the number is already in the set.
If it is, then it is the duplicate number.
If not, add it to the set.
At the end, the duplicate number will be found.
Program to print elements of a linked list in reverse order using same single linked list
Traverse the linked list and push each element onto a stack
Pop elements from the stack and print them in reverse order
To check the occurrence and correctness of HTML tags, we can use various tools and techniques.
One way is to use a browser's developer tools to inspect the HTML code and see the tags and their frequency.
Another way is to use an online HTML validator tool that checks for correct syntax and tag usage.
We can also use programming languages like Python to parse HTML and count the occurrence of each tag.
Regular expressions ca...
Reverse a linked list using iterative and recursive methods.
Iterative method involves traversing the list and changing the pointers to reverse the order.
Recursive method involves calling the function recursively on the next node and changing the pointers.
Both methods have O(n) time complexity and O(1) space complexity.
Example: 1->2->3->4->5 becomes 5->4->3->2->1.
Clone a linked list with a random pointer.
Create a new node for each node in the original list.
Use a hash table to map the original nodes to their clones.
Iterate through the original list again and update the random pointers of the clone nodes.
I appeared for an interview before May 2016.
Some of the top questions asked at the Agile Softech Plsql Developer interview -
Software Developer
6
salaries
| ₹0.9 L/yr - ₹4 L/yr |
Softwaretest Engineer
5
salaries
| ₹3 L/yr - ₹3.5 L/yr |
Software Engineer
4
salaries
| ₹1.2 L/yr - ₹20 L/yr |
Java Developer
4
salaries
| ₹1.1 L/yr - ₹4 L/yr |
Software Engineer Trainee
4
salaries
| ₹0.9 L/yr - ₹8.7 L/yr |
Teleperformance
Optum Global Solutions
FIS
Nagarro