Add office photos
Employer?
Claim Account for FREE

Capgemini Engineering

3.5
based on 2.1k Reviews
Filter interviews by

300+ IDFC FIRST Bharat Interview Questions and Answers

Updated 22 Feb 2025
Popular Designations

Q1. Remove All Occurrences of a Character from a String

Given a string str and a character 'X', write a function to remove all occurrences of 'X' from the given string.

If the character 'X' doesn't exist in the inp...read more

Ans.

Create a function to remove all occurrences of a given character from a string.

  • Iterate through the string character by character and build a new string excluding the specified character.

  • Use a StringBuilder or similar data structure for efficient string manipulation.

  • Handle the case where the specified character does not exist in the input string.

  • Return the updated string after removing all occurrences of the specified character.

Add your answer

Q2. Detect Cycle in a Linked List

Given a singly linked list of integers, determine whether it contains a cycle. A cycle exists if any node in the list can be traversed more than once, forming a loop.

Input:

The fi...read more
Ans.

Detect cycle in a singly linked list by using Floyd's Tortoise and Hare algorithm.

  • Use two pointers, slow and fast, to traverse the linked list.

  • If there is a cycle, the fast pointer will eventually meet the slow pointer.

  • Time complexity: O(N), Space complexity: O(1).

Add your answer

Q3. Sort an Array of 0's, 1's, and 2's Problem Statement

Given an integer array ARR of size 'N' containing only the values 0, 1, and 2, the task is to sort this array.

The goal is to achieve the sorting in a single...read more

Ans.

Sort an array of 0's, 1's, and 2's in a single pass.

  • Use three pointers to keep track of 0's, 1's, and 2's positions while iterating through the array.

  • Swap elements based on the current element's value and the pointers.

  • Achieve sorting in a single pass by moving the pointers accordingly.

Add your answer

Q4. Reverse a Linked List Problem Statement

You are given a Singly Linked List of integers. Your task is to reverse the Linked List by changing the links between nodes.

Input:

The first line of input contains a sin...read more
Ans.

Reverse a given singly linked list by changing the links between nodes.

  • Iterate through the linked list and reverse the links between nodes.

  • Keep track of the previous, current, and next nodes while reversing the links.

  • Update the head of the linked list to point to the last node after reversal.

Add your answer
Discover IDFC FIRST Bharat interview dos and don'ts from real experiences

Q5. Factorial Calculation Problem Statement

Develop a program to compute the factorial of a given integer 'n'.

The factorial of a non-negative integer 'n', denoted as n!, is the product of all positive integers les...read more

Ans.

Program to compute factorial of a given integer 'n', with error handling for negative values.

  • Create a function to calculate factorial using a loop or recursion

  • Check if input is negative and return 'Error'

  • Handle edge cases like 0 and 1 separately

  • Use long data type to handle large factorials

  • Example: For input 5, output should be 120

Add your answer

Q6. Level Order Traversal of Binary Tree

Given a binary tree of integers, return its level order traversal.

Input:

The first line contains an integer 'T' which represents the number of test cases. For each test cas...read more
Ans.

Perform level order traversal on a binary tree and return the nodes in the order they are visited.

  • Use a queue to keep track of nodes at each level while traversing the tree.

  • Start with the root node, enqueue it, then dequeue and print its value, enqueue its children, and continue until the queue is empty.

  • Repeat the process for each level of the tree until all nodes are visited.

  • Example: For the input 1 2 3 4 -1 5 6 -1 7 -1 -1 -1 -1 -1 -1, the output should be 1 2 3 4 5 6 7.

Add your answer
Are these interview questions helpful?

Q7. String to Pascal Case Conversion

Given a string STR, the goal is to remove all spaces from the string and convert it to Pascal case. In Pascal case, there are no spaces between words, and each word begins with ...read more

Ans.

Convert a string to Pascal case by removing spaces and capitalizing each word.

  • Remove spaces from the input string

  • Capitalize the first letter of each word

  • Combine the words to form the Pascal case string

Add your answer

Q8. Linked List Cycle Detection

Determine if a given singly linked list of integers forms a cycle.

Explanation:

A cycle in a linked list occurs when a node's next reference points back to a previous node in the lis...read more

Ans.

Detect if a singly linked list forms a cycle by checking if a node's next reference points back to a previous node.

  • Use two pointers, one moving at double the speed of the other, to detect a cycle in the linked list.

  • If the fast pointer catches up to the slow pointer, there is a cycle.

  • Keep track of visited nodes to detect a cycle efficiently.

Add your answer
Share interview questions and help millions of jobseekers 🌟

Q9. Delete Nth Node from End in a Linked List

Given a singly linked list with integer data and an integer K, write a function to remove the Kth node from the end of the linked list.

Example:

Input:
The linked list ...read more
Ans.

Remove the Kth node from the end of a singly linked list.

  • Use two pointers to find the Kth node from the end

  • Adjust pointers to remove the Kth node

  • Handle edge cases like deleting the head node or if K is out of bounds

Add your answer

Q10. Merge Sort Problem Statement

You are given a sequence of numbers, ARR. Your task is to return a sorted sequence of ARR in non-descending order using the Merge Sort algorithm.

Explanation:

The Merge Sort algorit...read more

Ans.

Implement Merge Sort algorithm to sort a sequence of numbers in non-descending order.

  • Understand the Merge Sort algorithm which involves dividing the array into two halves, sorting each half, and then merging them back together.

  • Recursively apply the Merge Sort algorithm until the base case of having single elements in the array is reached.

  • Merge the sorted halves to produce the final sorted array in non-descending order.

  • Ensure to handle the input constraints such as the number ...read more

Add your answer

Q11. What are Hooks in React? Name the ones you have used in your project.

Ans.

Hooks are a feature introduced in React 16.8 that allow developers to use state and other React features in functional components.

  • useState() - for managing state in functional components

  • useEffect() - for performing side effects in functional components

  • useContext() - for accessing context in functional components

  • useReducer() - for managing complex state and actions in functional components

  • useCallback() - for memoizing functions in functional components

  • useMemo() - for memoizing...read more

View 1 answer

Q12. Quick Sort Problem Statement

You are provided with an array of integers. The task is to sort the array in ascending order using the quick sort algorithm.

Quick sort is a divide-and-conquer algorithm. It involve...read more

Ans.

Yes, the quick sort algorithm can be enhanced to achieve NlogN complexity in the worst case by using a randomized pivot selection strategy.

  • Use a randomized pivot selection strategy to reduce the chances of worst-case scenarios.

  • Implement a hybrid sorting algorithm that switches to a different sorting algorithm like merge sort for small subarrays to improve performance.

  • Optimize the partitioning process to reduce the number of comparisons and swaps.

  • Consider using three-way parti...read more

Add your answer

Q13. What are Higher Order Functions and Higher Order Components. Give examples.

Ans.

Higher Order Functions are functions that take other functions as arguments or return functions as their results.

  • Higher Order Functions can be used to create reusable code by abstracting common functionality into a separate function.

  • They can also be used to implement functional programming concepts like currying and composition.

  • Example: Array.prototype.map() is a higher order function that takes a callback function as an argument and applies it to each element of an array, re...read more

View 1 answer

Q14. How does Event Loop works? What are Event Queue and Event Stack?

Ans.

Event Loop is a mechanism that allows JavaScript to handle asynchronous operations.

  • Event Loop is a continuous process that checks the Event Queue and moves events to the Event Stack.

  • Event Queue holds all the events that are waiting to be processed.

  • Event Stack holds the events that are currently being processed.

  • When the Event Stack is empty, the Event Loop checks the Event Queue for new events.

  • JavaScript uses Event Loop to handle asynchronous operations like setTimeout(), setI...read more

Add your answer

Q15. What have you done on real implementation on linux OS?

Ans.

I have implemented various software applications on Linux OS.

  • Developed a web application using Python Flask framework on Linux server

  • Created a custom Linux kernel module for a hardware device driver

  • Implemented a distributed system using Apache Kafka on Linux machines

  • Optimized performance of a database server running on Linux by tuning kernel parameters

Add your answer

Q16. What is microprocessor and explain register names?

Ans.

A microprocessor is a computer processor that incorporates the functions of a central processing unit on a single integrated circuit.

  • Microprocessors are used in various electronic devices such as computers, smartphones, and gaming consoles.

  • Register names include program counter (PC), accumulator (ACC), general-purpose registers (GPR), and memory address register (MAR).

  • Registers are used to store data and instructions temporarily for processing.

  • The number of registers and thei...read more

Add your answer

Q17. What is difference between C and C++?

Ans.

C++ is an extension of C with object-oriented programming features.

  • C++ supports object-oriented programming while C does not.

  • C++ has classes and templates while C does not.

  • C++ has better support for exception handling than C.

  • C++ has a standard library while C does not.

  • C++ allows function overloading while C does not.

Add your answer

Q18. What is difference between array and linked list?

Ans.

Arrays are contiguous blocks of memory while linked lists are made up of nodes that point to the next node.

  • Arrays have fixed size while linked lists can grow dynamically.

  • Insertion and deletion are faster in linked lists than in arrays.

  • Arrays have better cache locality while linked lists have better memory utilization.

  • Arrays are accessed using indices while linked lists are accessed using pointers.

  • Examples of arrays include int[] and char[] while examples of linked lists inclu...read more

Add your answer

Q19. Reverse a String Problem Statement

Given a string STR containing characters from [a-z], [A-Z], [0-9], and special characters, determine the reverse of the string.

Input:

The input starts with a single integer '...read more
Ans.

Reverse a given string containing characters from [a-z], [A-Z], [0-9], and special characters.

  • Iterate through the characters of the string from end to start and append each character to a new string to get the reversed string.

  • Use built-in functions like reverse() in some programming languages to reverse the string directly.

  • Ensure to handle special characters and numbers while reversing the string.

  • Return the reversed string for each test case as the output.

Add your answer

Q20. Explain whole process for Example.c file to Example.exe conversion

Ans.

The process of converting Example.c file to Example.exe involves several steps.

  • Preprocessing: includes header file inclusion, macro expansion, and conditional compilation

  • Compilation: converts source code to object code

  • Linking: combines object code with libraries to create executable file

  • Debugging: identifying and fixing errors in code

  • Optimization: improving performance of executable file

Add your answer

Q21. Say your house is at Position X and You’re currently at position Y which is 3 kms away from your home and you have a car and a cycle for you to take home. You have to take both of them anyhow as the place is no...

read more
Add your answer
Q22. What are some real-life examples of non-deterministic automata?
Ans.

Non-deterministic automata are theoretical models of computation where the next state is not uniquely determined by the current state and input.

  • Examples include non-deterministic finite automata (NFA) and non-deterministic pushdown automata (NPDA).

  • NFA can have multiple possible transitions for a given input symbol and state.

  • NPDA can have multiple possible transitions based on the current state, input symbol, and stack symbol.

Add your answer

Q23. What is data abstraction and explain with code?

Ans.

Data abstraction is the process of hiding implementation details and showing only necessary information.

  • Abstraction is achieved through abstract classes and interfaces.

  • It helps in reducing complexity and increasing efficiency.

  • Example: abstract class Shape with abstract method draw() implemented by its subclasses like Circle and Rectangle.

Add your answer
Q24. What is the difference between definition and declaration in C++?
Ans.

Declaration refers to introducing a variable or function to the compiler, while definition provides the actual implementation.

  • Declaration tells the compiler about the type and name of a variable or function, without allocating memory or defining its implementation.

  • Definition allocates memory for a variable or function, and provides the actual implementation.

  • Example: int x; // Declaration, int x = 5; // Definition

Add your answer

Q25. I am working on multiple language so how you are comfortable to work on multiple language

Ans.

I am comfortable working with multiple languages and have experience in doing so.

  • I have experience working with languages such as Java, Python, C++, and JavaScript.

  • I am able to quickly adapt to new languages and learn them efficiently.

  • I understand the importance of proper documentation and commenting in code to ensure readability for others.

  • I have worked on projects that required integration of multiple languages, such as a web application with a backend in Python and a front...read more

Add your answer
Q26. What is the difference between a page and a frame in operating systems?
Ans.

A page is a fixed-size block of memory managed by the operating system, while a frame is a fixed-size block of memory managed by the hardware.

  • Pages are managed by the operating system, while frames are managed by the hardware.

  • Pages are virtual memory blocks used by the operating system to manage memory, while frames are physical memory blocks used by the hardware.

  • Pages are typically smaller in size compared to frames, which are usually larger.

  • Example: In a system with 4KB pag...read more

Add your answer
Q27. What are the differences between a serial port and a parallel port?
Ans.

Serial port transmits data one bit at a time, while parallel port transmits multiple bits simultaneously.

  • Serial port sends data sequentially, while parallel port sends data in parallel

  • Serial port uses fewer wires compared to parallel port

  • Examples of serial ports include RS-232, USB, and Ethernet ports, while examples of parallel ports include printer ports

Add your answer
Q28. What is the difference between a mutex and a semaphore?
Ans.

Mutex is used for exclusive access to a resource, while semaphore is used for controlling access to a resource by multiple threads.

  • Mutex is binary and allows only one thread to access the resource at a time.

  • Semaphore can have a count greater than one, allowing multiple threads to access the resource simultaneously.

  • Mutex is used for protecting critical sections of code, while semaphore is used for synchronization between multiple threads.

  • Example: Mutex is like a key to a room ...read more

Add your answer
Q29. What are the types of polymorphism in Object-Oriented Programming?
Ans.

Types of polymorphism in OOP include compile-time polymorphism (method overloading) and runtime polymorphism (method overriding).

  • Compile-time polymorphism is achieved through method overloading, where multiple methods have the same name but different parameters.

  • Runtime polymorphism is achieved through method overriding, where a subclass provides a specific implementation of a method that is already defined in its superclass.

  • Polymorphism allows objects of different classes to ...read more

Add your answer
Q30. What are the time complexities for each sorting algorithm?
Ans.

Time complexities for sorting algorithms vary from O(n^2) to O(n log n).

  • Bubble Sort - O(n^2)

  • Selection Sort - O(n^2)

  • Insertion Sort - O(n^2)

  • Merge Sort - O(n log n)

  • Quick Sort - O(n log n)

  • Heap Sort - O(n log n)

Add your answer

Q31. Difference between Let, Const and Var. Write code and explain.

Ans.

Let, Const, and Var are used to declare variables in JavaScript with different scoping and reassignment abilities.

  • Var has function scope and can be redeclared and reassigned.

  • Let has block scope and can be reassigned but not redeclared.

  • Const has block scope and cannot be reassigned or redeclared.

View 1 answer

Q32. How can you optimize a React App?

Ans.

Optimizing a React app involves reducing bundle size, using lazy loading, and optimizing rendering performance.

  • Reduce bundle size by code splitting and using dynamic imports

  • Use lazy loading to load components only when needed

  • Optimize rendering performance by using shouldComponentUpdate and PureComponent

  • Use React.memo to memoize functional components

  • Avoid unnecessary re-renders by using useMemo and useCallback

  • Use performance profiling tools like React DevTools and Chrome DevTo...read more

Add your answer

Q33. 1. What is the difference between ipV4 and IPv6? 2. What is TCP/IP? 3. What is TCP/IP 3 way handshake? 4. Questions related to minor projects which I have done in B.Tech.

Add your answer

Q34. Write a code by which you can find the no. of same train no. Occurrence in a snapshot from a database in railway ticketing system?

Ans.

Use a code to count the occurrence of the same train number in a snapshot from a railway ticketing database.

  • Iterate through the snapshot data and store the train numbers in a hashmap with their counts

  • Return the hashmap with train numbers as keys and their occurrence counts as values

Add your answer

Q35. What is array ? What is constructor ? What is difference between class and object ?

Ans.

Array is a collection of similar data types. Constructor is a special method used to initialize objects. Class is a blueprint while object is an instance of a class.

  • Array is used to store multiple values in a single variable.

  • Constructor is called when an object of a class is created.

  • Class defines the properties and methods of an object while object is an instance of a class.

  • Example of array: int[] numbers = {1, 2, 3};

  • Example of constructor: public class Car { public Car() { /...read more

Add your answer

Q36. What is prelayout signal integrity? How will you do that

Ans.

Prelayout signal integrity is the analysis of signal quality before the layout of a printed circuit board.

  • It involves simulating the behavior of signals on a PCB before the actual layout is done.

  • The goal is to identify potential signal integrity issues and correct them before the layout is finalized.

  • Tools such as SPICE simulators and electromagnetic field solvers are used for prelayout signal integrity analysis.

  • Factors such as trace length, impedance, and crosstalk are consid...read more

Add your answer

Q37. Write a SQL query to join two tables?

Ans.

SQL query to join two tables

  • Use JOIN keyword to combine two tables based on a common column

  • Specify the columns to be selected using SELECT keyword

  • Use ON keyword to specify the common column between two tables

Add your answer

Q38. If I remove the pointer from main argument like In case of main(int argc, char *argv[]) it will main(int argc, char argv[]) then what is the effect?

Ans.

Removing the pointer from main argument changes the way the program accesses command line arguments.

  • Without the pointer, the program will need to access each character individually in the argv array.

  • This can lead to errors and make the code more complex to handle.

  • For example, instead of argv[0], you would need to access argv[0][0], argv[0][1], etc.

Add your answer

Q39. How can you access any function from main function which is written in a header file without including the header file in C?

Ans.

You can access functions from a header file in C without including it by declaring the functions as extern in the main file.

  • Declare the function prototypes as extern in the main file.

  • Link the object file generated from the header file with the main file during compilation.

  • Access the functions from the header file in the main file without including the header file.

Add your answer

Q40. WAP for recursion and explain its working?

Ans.

Recursion is a technique where a function calls itself to solve a problem. WAP for recursion is to write a program using recursion.

  • Recursion is used to solve problems that can be broken down into smaller sub-problems.

  • The base case is the condition where the function stops calling itself.

  • The recursive case is where the function calls itself with a smaller input.

  • Example: Factorial of a number can be calculated using recursion.

  • Example: Fibonacci series can be generated using rec...read more

Add your answer
Q41. Can you explain the different OSI layers?
Ans.

The OSI (Open Systems Interconnection) model is a conceptual framework that standardizes the functions of a telecommunication or computing system into seven distinct layers.

  • Physical Layer: Deals with physical connections and transmission of raw data. Example: Ethernet cables.

  • Data Link Layer: Manages data transfer between devices on the same network. Example: MAC addresses.

  • Network Layer: Handles routing and forwarding of data packets. Example: IP addresses.

  • Transport Layer: Ens...read more

Add your answer
Q42. What are the types of access modifiers in Java?
Ans.

There are four types of access modifiers in Java: public, private, protected, and default.

  • Public: accessible from any other class.

  • Private: accessible only within the same class.

  • Protected: accessible within the same package and subclasses.

  • Default: accessible only within the same package.

Add your answer

Q43. how many ways we can find the element on page in selenium

Ans.

There are multiple ways to find elements on a page in Selenium, including by ID, name, class name, tag name, link text, partial link text, XPath, and CSS selector.

  • By ID: driver.findElement(By.id("elementId"))

  • By name: driver.findElement(By.name("elementName"))

  • By class name: driver.findElement(By.className("className"))

  • By tag name: driver.findElement(By.tagName("tagName"))

  • By link text: driver.findElement(By.linkText("linkText"))

  • By partial link text: driver.findElement(By.partia...read more

Add your answer

Q44. Which service needs to run to connect to other unified communication applications.

Ans.

The service that needs to run to connect to other unified communication applications is the Session Initiation Protocol (SIP).

  • Session Initiation Protocol (SIP) is a signaling protocol used for initiating, maintaining, modifying, and terminating real-time sessions involving video, voice, messaging, and other communications applications.

  • SIP is commonly used in Voice over IP (VoIP) systems and allows for the establishment and control of multimedia communication sessions.

  • By runni...read more

Add your answer
Q45. What is the difference between an array of pointers and a pointer to an array?
Ans.

Array of pointers stores memory addresses of individual elements, while pointer to an array stores the memory address of the entire array.

  • Array of pointers: char *arr[3] = {"hello", "world", "example"};

  • Pointer to an array: char (*ptr)[3] = arr;

Add your answer

Q46. Where to take logs when one iphone not able to call other.

Ans.

Logs should be taken from the network devices involved in the call flow.

  • Check logs on the caller's iPhone

  • Check logs on the recipient's iPhone

  • Check logs on the network devices (routers, switches) involved in the call flow

  • Look for any error messages or anomalies in the logs

  • Analyze the logs to identify any network issues or misconfigurations

Add your answer

Q47. How do you check/verify the IBIS models?

Ans.

IBIS models can be verified by comparing simulation results with actual measurements.

  • Compare simulation results with actual measurements

  • Use a variety of test cases to ensure accuracy

  • Verify the model's compliance with IBIS standards

  • Check for consistency with other models and datasheets

Add your answer
Q48. What is the difference between an array name and a pointer variable?
Ans.

Array name is a constant pointer to the first element, while a pointer variable can be reassigned to point to different memory locations.

  • Array name is a constant pointer to the first element

  • Pointer variable can be reassigned to point to different memory locations

  • Example: int arr[5]; int *ptr = arr; arr[0] = 10; ptr++; *ptr = 20;

Add your answer
Q49. What is the difference between a switch and a hub in computer networking?
Ans.

Switches operate at the data link layer and forward data based on MAC addresses, while hubs operate at the physical layer and broadcast data to all connected devices.

  • Switches operate at the data link layer and make forwarding decisions based on MAC addresses.

  • Switches create separate collision domains for each port, improving network performance.

  • Hubs operate at the physical layer and simply broadcast data to all connected devices.

  • Hubs create a single collision domain for all c...read more

Add your answer

Q50. What is the difference between C, C++ and Java ?

Ans.

C is a procedural language, C++ is an object-oriented language, and Java is a class-based object-oriented language.

  • C is a low-level language with limited abstraction and no built-in support for object-oriented programming.

  • C++ is an extension of C with added support for object-oriented programming, templates, and exception handling.

  • Java is a high-level language with automatic memory management, platform independence, and a large standard library.

  • C and C++ are compiled language...read more

Add your answer

Q51. What is the difference between JVM, JDK and JRE?

Ans.

JVM is a virtual machine that executes Java bytecode. JDK is a development kit that includes JRE and tools for developing Java applications. JRE is a runtime environment that executes Java bytecode.

  • JVM stands for Java Virtual Machine and is responsible for executing Java bytecode.

  • JDK stands for Java Development Kit and includes JRE along with tools for developing Java applications.

  • JRE stands for Java Runtime Environment and provides a runtime environment for executing Java by...read more

Add your answer

Q52. What is software engineering. Tell all the steps involved in it?

Add your answer

Q53. What are state and props. Difference.

Ans.

State and props are two important concepts in React. State represents the internal data of a component, while props are used to pass data from a parent component to a child component.

  • State is mutable and can be changed within a component.

  • Props are read-only and cannot be modified within a component.

  • State is used to manage component-specific data, while props are used for inter-component communication.

  • State is initialized and managed within a component, while props are passed ...read more

View 1 answer

Q54. What is testing, what are different types of testing?

Add your answer
Q55. What is the difference between an Array and a Linked List?
Ans.

Array is a fixed-size data structure while Linked List is a dynamic data structure with nodes connected by pointers.

  • Array stores elements in contiguous memory locations, while Linked List stores elements in nodes with pointers to the next node.

  • Array has constant time access to elements using index, while Linked List requires traversal from the head to access elements.

  • Insertions and deletions are faster in Linked List as compared to Array, especially in the middle of the list....read more

Add your answer

Q56. What is connection less and connection oriented protocol and their implementation

Add your answer

Q57. What is TCP/IP,OSI model?

Ans.

TCP/IP is a protocol used for communication between devices on the internet. OSI model is a conceptual framework for network communication.

  • TCP/IP is a suite of protocols that governs communication between devices on the internet.

  • OSI model is a conceptual framework that divides network communication into seven layers.

  • TCP/IP is based on a four-layer model, which includes the application, transport, internet, and network access layers.

  • The OSI model includes the physical, data li...read more

Add your answer

Q58. What is program counter?

Ans.

Program counter is a register that stores the memory address of the next instruction to be executed by the processor.

  • Program counter is also known as instruction pointer.

  • It is a part of the processor's control unit.

  • The value of program counter is incremented after each instruction is executed.

  • If a program counter is corrupted, the processor may execute incorrect instructions.

  • Example: If the program counter is pointing to memory address 100, the next instruction to be executed...read more

Add your answer
Q59. Can you explain the sizeof operator?
Ans.

The sizeof operator in C/C++ is used to determine the size of a data type or variable in bytes.

  • sizeof operator returns the size of a data type or variable in bytes.

  • It can be used with any data type, including primitive types, user-defined types, and arrays.

  • Example: sizeof(int) returns the size of an integer in bytes.

Add your answer
Q60. What is paging in operating systems?
Ans.

Paging in operating systems is a memory management scheme that allows the operating system to store and retrieve data from secondary storage when the physical memory (RAM) is full.

  • Paging divides the physical memory into fixed-size blocks called pages.

  • When a process is loaded into memory, it is divided into equal-sized blocks called pages as well.

  • The operating system keeps track of the pages in memory using a page table.

  • If a process requires more memory than is available in ph...read more

Add your answer
Q61. How are Java objects stored in memory?
Ans.

Java objects are stored in memory as references to memory locations where the actual object data is stored.

  • Java objects are stored in the heap memory.

  • Each object is allocated memory on the heap using the 'new' keyword.

  • Object references are stored on the stack.

  • Objects can be garbage collected when no longer referenced.

Add your answer

Q62. What is switching. Explain and draw the packet switching and circuit switching

Ans.

Switching is the process of connecting devices in a network.

  • Packet switching breaks data into packets and sends them individually through the network.

  • Circuit switching establishes a dedicated communication path between two devices.

  • Packet switching is more efficient and flexible than circuit switching.

  • Examples of packet-switched networks include the Internet and Ethernet.

  • Examples of circuit-switched networks include traditional telephone networks.

Add your answer

Q63. How to get unique elements from list

Ans.

To get unique elements from a list, use set() function.

  • Convert the list to a set using set() function

  • Convert the set back to list using list() function

  • Example: list(set(['apple', 'banana', 'apple', 'orange'])) will return ['apple', 'banana', 'orange']

Add your answer

Q64. Difference between Local and Session Storage

Ans.

Local Storage is persistent storage that remains even after the browser is closed, while Session Storage is temporary and is cleared when the browser is closed.

  • Local Storage has no expiration date, while Session Storage is cleared when the session ends

  • Local Storage can store larger amounts of data compared to Session Storage

  • Local Storage is accessible across different browser tabs and windows, while Session Storage is limited to the current tab or window

  • Local Storage can be a...read more

View 1 answer

Q65. What is Scheduling. Explain different types of scheduling

Add your answer

Q66. Do you know what is the near, far, and huge pointer?

Add your answer

Q67. What are the disadvantages of Frame 9FA Gas turbine.

Ans.

Disadvantages of Frame 9FA gas turbine include high maintenance costs, lower efficiency compared to newer models, and environmental concerns.

  • High maintenance costs due to complex design and aging components

  • Lower efficiency compared to newer gas turbine models, resulting in higher fuel consumption

  • Environmental concerns such as emissions of greenhouse gases and pollutants

  • Limited flexibility in terms of load following capabilities

  • Noise and vibration issues during operation

Add your answer

Q68. Write a code for launching 100 windows and select a particular window from opened tabs

Ans.

Launch 100 windows and select a particular window from opened tabs

  • Use a loop to launch 100 windows

  • Keep track of each window's handle or identifier

  • Use the handle or identifier to select the desired window

Add your answer

Q69. write a code for sorting the elements in array and result should be without duplicates

Ans.

Code to sort array elements without duplicates

  • Use a Set to store unique elements while iterating through the array

  • Convert the Set back to an array for the final result

  • Use Array.sort() method to sort the elements in the array

Add your answer

Q70. Single linked list operations ( adding and deleting a node)

Ans.

Single linked list operations involve adding and deleting nodes in a linear data structure.

  • To add a node, create a new node and set its next pointer to the current head, then set the head to the new node.

  • To delete a node, traverse the list until the node to be deleted is found, then set the previous node's next pointer to the node after the one being deleted.

  • Be careful to handle edge cases such as adding to an empty list or deleting the head node.

Add your answer

Q71. What is Ethical Hacking because it is given as my interest?

Add your answer
Q72. What are the differences between structures and arrays?
Ans.

Arrays are a collection of similar data types stored in contiguous memory locations, while structures are a collection of different data types stored in non-contiguous memory locations.

  • Arrays store elements of the same data type, while structures can store elements of different data types.

  • Arrays are accessed using indices, while structures are accessed using member variables.

  • Arrays have a fixed size, while structures can have a variable size.

  • Example: int array[5] vs struct {i...read more

Add your answer
Q73. What does the fork command do in operating systems?
Ans.

The fork command creates a new process by duplicating the existing process.

  • Fork command is used in operating systems to create a new process that is a copy of the existing process.

  • The new process created by fork has its own memory space but shares the same code, data, and file descriptors with the parent process.

  • Fork system call returns different values in the parent and child processes to distinguish between them.

  • Example: In Unix-based systems, the fork command is used to cr...read more

Add your answer
Q74. What are the steps involved in a software engineering process?
Ans.

Software engineering process involves multiple steps to develop high-quality software.

  • Requirement analysis: Gather and analyze requirements from stakeholders.

  • Design: Create a detailed design of the software based on requirements.

  • Implementation: Write code based on the design.

  • Testing: Test the software to ensure it meets requirements and is bug-free.

  • Deployment: Deploy the software for users to use.

  • Maintenance: Regularly update and maintain the software to keep it running smoot...read more

Add your answer

Q75. Do you use console to locate elements in a web page?

Ans.

Yes, I use console to locate elements in a web page for debugging and testing purposes.

  • Yes, I use console commands like document.querySelector() or document.getElementById() to locate elements on a web page.

  • Console is helpful for quickly testing and verifying element selectors before implementing them in automated tests.

  • Using console to locate elements can help in identifying issues with element selection and improve test script efficiency.

Add your answer

Q76. Do you use the console to locate elements in web page?

Ans.

Yes, I use the console to locate elements in web pages for debugging and testing purposes.

  • I use the console to inspect elements and identify unique attributes like IDs, classes, or XPath.

  • I can use commands like document.getElementById(), document.querySelector(), or $() to locate elements.

  • I also use the console to test CSS selectors and verify if elements are being correctly identified.

Add your answer

Q77. Why is Linux preferred over Wi dows for Server

Ans.

Linux is preferred over Windows for servers due to its stability, security, flexibility, and cost-effectiveness.

  • Linux is open-source, allowing for customization and flexibility in server configurations.

  • Linux is known for its stability and reliability, making it a popular choice for servers that require constant uptime.

  • Linux has a strong focus on security, with regular updates and a large community of developers actively working to address vulnerabilities.

  • Linux is cost-effecti...read more

Add your answer

Q78. What are all the tools you worked on?

Ans.

I have worked on various hardware tools including oscilloscopes, logic analyzers, multimeters, and soldering irons.

  • Oscilloscopes

  • Logic analyzers

  • Multimeters

  • Soldering irons

Add your answer

Q79. How to delete CTL and ITL files from phone.

Ans.

To delete CTL and ITL files from a phone, access the phone's settings, navigate to the security or device administration section, and delete the files.

  • Access the phone's settings

  • Navigate to the security or device administration section

  • Locate the CTL and ITL files

  • Delete the files

Add your answer

Q80. Difference between Promise and Async-Await?

Ans.

Promise is a callback function that returns a value in the future. Async-Await is a syntax that simplifies working with Promises.

  • Promises are used to handle asynchronous operations and avoid callback hell.

  • Async-Await is a syntax that allows writing asynchronous code that looks like synchronous code.

  • Async-Await is built on top of Promises and uses the same underlying mechanism.

  • Async-Await can only be used within an async function.

  • Async-Await can handle errors using try-catch b...read more

Add your answer

Q81. What is Hoisting in JS?

Ans.

Hoisting is a JavaScript behavior where variable and function declarations are moved to the top of their scope.

  • Hoisting applies to both variable and function declarations.

  • Variable declarations are hoisted but not their initializations.

  • Function declarations are fully hoisted, including their definitions.

  • Hoisting can lead to unexpected behavior if not understood properly.

View 1 answer

Q82. JCL code to execute cobol-db2 program? What if dynamic called program is completed with nodynam option? Situation based questions on sort?

Ans.

To execute a COBOL-DB2 program using JCL code, include the necessary job control statements and specify the program name and input/output files.

  • Include job control statements like JOB, EXEC, and DD statements in the JCL code.

  • Specify the program name in the EXEC statement, along with any necessary parameters.

  • Define input and output files using DD statements.

  • If the dynamic called program is completed with the 'nodynam' option, it means that the program will not be dynamically c...read more

Add your answer

Q83. Explain about the different layers in OSI model.

Ans.

The OSI model has 7 layers that define how data is transmitted over a network.

  • Layer 1: Physical layer - deals with the physical aspects of transmitting data

  • Layer 2: Data link layer - responsible for error-free transfer of data between nodes

  • Layer 3: Network layer - manages the routing of data between nodes

  • Layer 4: Transport layer - ensures reliable delivery of data between applications

  • Layer 5: Session layer - establishes and manages connections between applications

  • Layer 6: Pre...read more

Add your answer

Q84. What are k values ? What is neighborship criteria in eigrp ? How to inject default route ? What is acl, prefix list, routemap ?

Ans.

Answers to questions related to network engineering concepts.

  • k values are used in EIGRP to calculate the metric of a route

  • Neighborship criteria in EIGRP is the set of conditions that must be met for two routers to become neighbors

  • Default route can be injected into EIGRP using the 'ip default-network' command

  • ACL (Access Control List) is used to filter network traffic based on source/destination IP address, port number, etc.

  • Prefix list is used to filter routes based on their pr...read more

Add your answer

Q85. Write a code to allocate a memory for multidimential array on heap

Ans.

Code to allocate memory for multidimensional array on heap

  • Use malloc() function to allocate memory on heap

  • Calculate the total size of the array using the dimensions

  • Use a pointer to access the array elements

Add your answer

Q86. Write a program for banking management system and Railway management System?

Add your answer

Q87. Why we postman and what is the between api testing and GUI testing

Ans.

Postman is used for API testing. GUI testing involves testing the user interface while API testing involves testing the backend functionality.

  • Postman is a tool used for testing APIs by sending requests and receiving responses.

  • GUI testing involves testing the user interface, such as buttons, forms, and menus.

  • API testing involves testing the backend functionality, such as data validation and response time.

  • Postman can be used to test APIs by sending requests and receiving respon...read more

Add your answer

Q88. Write a program to remove the character from given input For eg. If input is C:>myprog Irshad s Output should be: Irhad

Add your answer
Q89. What is the difference between HTTP and HTTPS?
Ans.

HTTP is unsecured protocol while HTTPS is secured protocol using SSL/TLS encryption.

  • HTTP stands for Hypertext Transfer Protocol, while HTTPS stands for Hypertext Transfer Protocol Secure.

  • HTTP operates on port 80, while HTTPS operates on port 443.

  • HTTPS uses SSL/TLS encryption to secure the communication between the client and server, while HTTP does not.

  • HTTPS provides data integrity, authentication, and encryption, making it more secure for transmitting sensitive information s...read more

Add your answer
Q90. Are the expressions *ptr++ and ++*ptr the same?
Ans.

No, *ptr++ and ++*ptr are not the same. *ptr++ increments the pointer after accessing the value, while ++*ptr increments the value pointed to by the pointer.

  • ptr = &arr[0]; *ptr++ accesses the value at arr[0] and then increments the pointer

  • ptr = &arr[0]; ++*ptr increments the value at arr[0]

Add your answer
Q91. What is segmentation in operating systems?
Ans.

Segmentation in operating systems is a memory management technique where memory is divided into segments of variable sizes.

  • Segments are logical units of a program, such as code, data, stack, etc.

  • Each segment has its own base address and length.

  • Segmentation allows for protection and sharing of memory among processes.

  • Examples include Intel x86 architecture with segment registers like CS, DS, SS, ES.

Add your answer
Q92. Can you explain the leaky bucket algorithm?
Ans.

Leaky bucket algorithm is a method for controlling traffic rates in network communication.

  • The leaky bucket algorithm is a traffic shaping algorithm used in network communication to control the rate at which data is transmitted.

  • It works by storing incoming data in a 'bucket' with a fixed capacity. If the bucket overflows, excess data is discarded.

  • The bucket has a leak rate, which means that it can only hold a certain amount of data at a time. If data arrives faster than it can...read more

Add your answer
Q93. What is the difference between TCP and UDP?
Ans.

TCP is a connection-oriented protocol that guarantees delivery of data packets in order, while UDP is a connectionless protocol that does not guarantee delivery or order of packets.

  • TCP is reliable and ensures data integrity, while UDP is faster but less reliable.

  • TCP requires a connection to be established between sender and receiver before data transfer, while UDP does not require a connection.

  • TCP uses flow control and congestion control mechanisms, while UDP does not.

  • Example...read more

Add your answer
Q94. How many bits make up IPv4 and IPv6 addresses?
Ans.

IPv4 addresses are 32 bits long, while IPv6 addresses are 128 bits long.

  • IPv4 addresses consist of 32 bits, divided into four octets separated by periods (e.g. 192.168.1.1).

  • IPv6 addresses consist of 128 bits, represented in hexadecimal format with colons separating each group of 4 hexadecimal digits (e.g. 2001:0db8:85a3:0000:0000:8a2e:0370:7334).

Add your answer

Q95. Strip line vs micro strip linetransmission line?

Ans.

Strip line and microstrip line are two types of transmission lines used in high-frequency applications.

  • Strip line is a type of transmission line where the conductor is sandwiched between two ground planes.

  • Microstrip line is a type of transmission line where the conductor is placed on top of a ground plane with a dielectric material in between.

  • Strip line has better shielding and lower radiation losses compared to microstrip line.

  • Microstrip line is easier to fabricate and has l...read more

Add your answer

Q96. What are the KPI of Gas and Steam Turbines.

Ans.

Key Performance Indicators (KPI) for Gas and Steam Turbines are crucial metrics used to measure efficiency and performance.

  • Efficiency: Measure of how well the turbine converts fuel into electricity or mechanical power.

  • Availability: Percentage of time the turbine is operational and ready to generate power.

  • Reliability: Ability of the turbine to consistently perform without breakdowns or failures.

  • Maintenance Costs: Expenses incurred for upkeep and repairs of the turbine.

  • Output: ...read more

Add your answer

Q97. What is static memory allocation in C?

Ans.

Static memory allocation is a way of allocating memory at compile-time.

  • Memory is allocated before the program starts executing

  • The size of memory is fixed and cannot be changed during runtime

  • Variables declared with static keyword are stored in static memory

  • Example: int x; //allocated in static memory

  • Example: static int y; //allocated in static memory

Add your answer

Q98. What is virtual class and when it becomes necessary?

Add your answer

Q99. Explain SQL commands?

Ans.

SQL commands are used to interact with databases and manipulate data.

  • SELECT: retrieve data from a database

  • INSERT: add new data to a database

  • UPDATE: modify existing data in a database

  • DELETE: remove data from a database

  • CREATE: create a new database or table

  • ALTER: modify the structure of a database or table

  • DROP: delete a database or table

  • JOIN: combine data from multiple tables

  • GROUP BY: group data based on a specific column

  • ORDER BY: sort data based on a specific column

Add your answer
Q100. What is a virtual function?
Ans.

A virtual function is a function in a base class that is declared using the keyword 'virtual' and can be overridden by a function in a derived class.

  • Virtual functions allow for dynamic polymorphism in C++

  • They are used in inheritance to achieve runtime polymorphism

  • Example: virtual void display() = 0; // pure virtual function

Add your answer
1
2
3
4
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos

Interview Process at IDFC FIRST Bharat

based on 255 interviews
Interview experience
4.1
Good
View more
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Interview Questions from Similar Companies

3.6
 • 4.5k Interview Questions
3.3
 • 457 Interview Questions
3.9
 • 364 Interview Questions
3.6
 • 340 Interview Questions
3.7
 • 276 Interview Questions
3.8
 • 271 Interview Questions
View all
Top Capgemini Engineering Interview Questions And Answers
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
70 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter