Brillo Technologies
10+ Uniquest Infra Ventures Interview Questions and Answers
Q1. - Spark architecture. - Types of transformations in spark. - Why spark transformation is lazy in nature. - Diff between narrow and wide transformations. - How to read a csv file and write it in parquet file for...
read moreQ2. How CRUD operations are made in Node.js
CRUD operations in Node.js involve creating, reading, updating, and deleting data from a database.
Use libraries like Express and Mongoose to handle CRUD operations in Node.js
Create: Use HTTP POST method to add new data to the database
Read: Use HTTP GET method to retrieve data from the database
Update: Use HTTP PUT or PATCH method to modify existing data in the database
Delete: Use HTTP DELETE method to remove data from the database
Q3. - Write a python program to print prime numbers. - Write a program to reverse the integer number. - Write a program to print factorial - Write a sql query to find nth salary.
Q4. Oops concepts through explanation
Oops concepts are fundamental principles of object-oriented programming that help in organizing and designing code.
Encapsulation: Bundling data and methods that operate on the data into a single unit (class).
Inheritance: Allowing a class to inherit properties and behavior from another class.
Polymorphism: Ability of objects to take on multiple forms or have multiple behaviors.
Abstraction: Hiding the complex implementation details and showing only the necessary features of an o...read more
Q5. What is inherited sharing
Inherited sharing is a feature in Salesforce that allows sharing settings to be inherited from parent records to child records.
Inherited sharing ensures that child records have the same sharing settings as their parent records.
It simplifies the management of sharing settings by automatically propagating them to related records.
Inherited sharing can be enabled for custom objects and standard objects in Salesforce.
It helps maintain data visibility and access control across rela...read more
Q6. What is sharing rules
Sharing rules are used to extend access to records in Salesforce beyond the organization-wide defaults.
Sharing rules are used to grant access to records based on criteria or ownership
They can be used to give access to specific groups or roles
Sharing rules are evaluated after the organization-wide defaults and manual sharing
They can be used to grant read-only or read/write access to records
Q7. How to create ER Diagram
ER Diagram is created by identifying entities, attributes, and relationships in a database.
Identify entities in the database (e.g. Customer, Product, Order)
Identify attributes for each entity (e.g. Customer has attributes like Name, Address)
Identify relationships between entities (e.g. Customer places Order)
Q8. What is record lock in salesforce?
Record lock in Salesforce prevents multiple users from editing the same record simultaneously.
Record lock ensures data integrity by preventing conflicts when multiple users try to edit the same record at the same time.
When a record is locked, other users can view it but cannot make changes until the lock is released.
Locks can be set at different levels such as record level, field level, or even at the database level.
Record locks can be manual or automatic, depending on the co...read more
Q9. What is API testing and all , load test
API testing is a type of software testing that involves testing APIs to ensure they meet functional and performance requirements.
API testing involves testing the functionality, reliability, performance, and security of APIs
Load testing is a type of performance testing that involves testing the system's ability to handle a large number of users or requests
Load testing can be used to identify bottlenecks and performance issues in the system
Examples of API testing tools include ...read more
Q10. 1.whole end to end Appium working ,
Appium is an open-source tool for automating mobile applications.
Appium is used for end-to-end testing of mobile applications.
It supports both Android and iOS platforms.
It uses Selenium WebDriver API to interact with mobile apps.
Appium can automate native, hybrid, and mobile web apps.
It supports multiple programming languages like Java, Python, Ruby, etc.
Appium can be integrated with CI/CD tools like Jenkins for continuous testing.
It can also be used for parallel testing on m...read more
Q11. What is setup method
The setup method is used in Salesforce development to initialize test data and environment before running test methods.
The setup method is defined in a test class and is executed before each test method.
It is used to create test data, set up test environment, and perform any necessary setup actions.
The setup method helps in ensuring that each test method starts with a clean and consistent state.
It can be used to insert records, create test users, set up permissions, enable fe...read more
Q12. How to create Tables
Tables can be created in databases using SQL commands like CREATE TABLE.
Use CREATE TABLE statement in SQL to create a new table
Specify the table name and column names along with their data types
Add constraints like primary key, foreign key, etc. if needed
Q13. Explain MVC architecture
MVC architecture is a design pattern used in software development to separate the application into three main components: Model, View, and Controller.
Model represents the data and business logic of the application.
View is responsible for displaying the data to the user.
Controller acts as an intermediary between Model and View, handling user input and updating the Model accordingly.
Example: In a web application, the Model could be a database, the View could be the HTML/CSS for...read more
Q14. Types of transformations
Types of transformations include expression, filter, aggregator, join, lookup, and more.
Expression transformation: Perform calculations or manipulate data
Filter transformation: Filter rows based on specified conditions
Aggregator transformation: Perform aggregate calculations like sum, average, etc.
Join transformation: Combine data from multiple sources based on a common key
Lookup transformation: Retrieve data from a relational table based on a lookup condition
Q15. weakhashmap vs hashmap
WeakHashMap is a subclass of HashMap with weaker references to keys, allowing them to be garbage collected.
WeakHashMap is suitable for scenarios where keys are not strongly referenced and can be garbage collected.
HashMap is suitable for scenarios where strong references to keys are needed and should not be garbage collected.
WeakHashMap is less memory efficient compared to HashMap due to the use of weaker references.
Q16. Write Apex Trigger
Apex Trigger to update related records
Create a trigger on the object you want to update related records for
Use SOQL queries to retrieve related records
Update the related records based on certain criteria
Top HR Questions asked in Uniquest Infra Ventures
Interview Process at Uniquest Infra Ventures
Top Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month