Add office photos
Employer?
Claim Account for FREE

Capgemini Engineering

3.5
based on 2.1k Reviews
Filter interviews by

200+ Hero MotoCorp Interview Questions and Answers

Updated 14 Dec 2024
Popular Designations
Q101. Data Structures Question

Difference between Array and Linked List

Add your answer
Q102. System Design Question

Design banking management system and Railway management System.

Add your answer
Q103. Software Engineering Question

Steps involved in a software engineering process.

Add your answer

Q104. Explain about the different layers in OSI model.

Ans.

The OSI model has 7 layers that define how data is transmitted over a network.

  • Layer 1: Physical layer - deals with the physical aspects of transmitting data

  • Layer 2: Data link layer - responsible for error-free transfer of data between nodes

  • Layer 3: Network layer - manages the routing of data between nodes

  • Layer 4: Transport layer - ensures reliable delivery of data between applications

  • Layer 5: Session layer - establishes and manages connections between applications

  • Layer 6: Pre...read more

Add your answer
Discover Hero MotoCorp interview dos and don'ts from real experiences

Q105. What are k values ? What is neighborship criteria in eigrp ? How to inject default route ? What is acl, prefix list, routemap ?

Ans.

Answers to questions related to network engineering concepts.

  • k values are used in EIGRP to calculate the metric of a route

  • Neighborship criteria in EIGRP is the set of conditions that must be met for two routers to become neighbors

  • Default route can be injected into EIGRP using the 'ip default-network' command

  • ACL (Access Control List) is used to filter network traffic based on source/destination IP address, port number, etc.

  • Prefix list is used to filter routes based on their pr...read more

Add your answer

Q106. Write a code to allocate a memory for multidimential array on heap

Ans.

Code to allocate memory for multidimensional array on heap

  • Use malloc() function to allocate memory on heap

  • Calculate the total size of the array using the dimensions

  • Use a pointer to access the array elements

Add your answer
Are these interview questions helpful?

Q107. Write a program for banking management system and Railway management System?

Add your answer

Q108. Write a program to remove the character from given input For eg. If input is C:>myprog Irshad s Output should be: Irhad

Add your answer
Share interview questions and help millions of jobseekers 🌟

Q109. Why we postman and what is the between api testing and GUI testing

Ans.

Postman is used for API testing. GUI testing involves testing the user interface while API testing involves testing the backend functionality.

  • Postman is a tool used for testing APIs by sending requests and receiving responses.

  • GUI testing involves testing the user interface, such as buttons, forms, and menus.

  • API testing involves testing the backend functionality, such as data validation and response time.

  • Postman can be used to test APIs by sending requests and receiving respon...read more

Add your answer

Q110. Strip line vs micro strip linetransmission line?

Ans.

Strip line and microstrip line are two types of transmission lines used in high-frequency applications.

  • Strip line is a type of transmission line where the conductor is sandwiched between two ground planes.

  • Microstrip line is a type of transmission line where the conductor is placed on top of a ground plane with a dielectric material in between.

  • Strip line has better shielding and lower radiation losses compared to microstrip line.

  • Microstrip line is easier to fabricate and has l...read more

Add your answer

Q111. What are the KPI of Gas and Steam Turbines.

Ans.

Key Performance Indicators (KPI) for Gas and Steam Turbines are crucial metrics used to measure efficiency and performance.

  • Efficiency: Measure of how well the turbine converts fuel into electricity or mechanical power.

  • Availability: Percentage of time the turbine is operational and ready to generate power.

  • Reliability: Ability of the turbine to consistently perform without breakdowns or failures.

  • Maintenance Costs: Expenses incurred for upkeep and repairs of the turbine.

  • Output: ...read more

Add your answer

Q112. What is static memory allocation in C?

Ans.

Static memory allocation is a way of allocating memory at compile-time.

  • Memory is allocated before the program starts executing

  • The size of memory is fixed and cannot be changed during runtime

  • Variables declared with static keyword are stored in static memory

  • Example: int x; //allocated in static memory

  • Example: static int y; //allocated in static memory

Add your answer

Q113. What is virtual class and when it becomes necessary?

Add your answer

Q114. Explain SQL commands?

Ans.

SQL commands are used to interact with databases and manipulate data.

  • SELECT: retrieve data from a database

  • INSERT: add new data to a database

  • UPDATE: modify existing data in a database

  • DELETE: remove data from a database

  • CREATE: create a new database or table

  • ALTER: modify the structure of a database or table

  • DROP: delete a database or table

  • JOIN: combine data from multiple tables

  • GROUP BY: group data based on a specific column

  • ORDER BY: sort data based on a specific column

Add your answer

Q115. What is virtual memory and why it is needed?

Add your answer

Q116. How memory allocated to object

Ans.

Memory is allocated to objects dynamically during runtime based on their size and type.

  • Memory allocation is done using the 'new' keyword in languages like Java and C++.

  • In languages like Python, memory allocation is handled automatically by the interpreter.

  • Memory allocation can also be done using functions like malloc() and calloc() in C.

  • Memory is released using the 'delete' keyword in languages like Java and C++.

  • Memory management is important to prevent memory leaks and optim...read more

Add your answer

Q117. what would happen if malloc() function fails

Add your answer

Q118. What are the pre considerations to check to advice the LC

Ans.

Pre considerations before advising the LC

  • Check the creditworthiness of the buyer

  • Verify the authenticity of the documents

  • Ensure compliance with legal regulations

  • Assess the risk involved in the transaction

  • Confirm the terms and conditions of the LC

Add your answer

Q119. How to optimize decoupling capacitors?

Ans.

Optimizing decoupling capacitors involves selecting the right capacitance value, placement, and layout.

  • Choose the appropriate capacitance value based on the frequency range of the circuit

  • Place the capacitors as close as possible to the power pins of the IC

  • Use multiple capacitors in parallel to cover a wider frequency range

  • Ensure proper layout to minimize inductance and resistance

  • Simulate the circuit to verify the effectiveness of the decoupling capacitors

Add your answer
Q120. Computer Network Question

Explain the leaky bucket algorithm.

Add your answer
Q121. Computer Network Question

Difference between Switch and Hub

Add your answer
Q122. Computer Network Question

Difference between TCP and UDP

Add your answer

Q123. Pcie interface Gen3 RL and IL specification?

Ans.

PCIe Gen3 RL and IL specifications define the electrical and protocol requirements for high-speed data transfer.

  • RL stands for Receiver Loss and IL stands for Insertion Loss.

  • RL specification defines the maximum amount of signal loss that can be tolerated by the receiver.

  • IL specification defines the maximum amount of signal loss that can be tolerated by the channel.

  • PCIe Gen3 RL and IL specifications ensure reliable and high-speed data transfer between devices.

  • For example, a PCI...read more

Add your answer

Q124. In a given string , find the number of pallindromes

Ans.

Count the number of palindromes in a given string.

  • Iterate through the string and check for palindromes of length 1, 2, 3, ... n

  • Use two pointers to check if a substring is a palindrome

  • Consider both even and odd length palindromes

  • Store the count of palindromes found

Add your answer

Q125. Write difference between switch and hub, tell about their characteristic?

Add your answer

Q126. WAP to reverse string?

Ans.

A program to reverse a given string.

  • Create an empty string to store the reversed string.

  • Iterate through the original string from end to start.

  • Append each character to the empty string.

  • Return the reversed string.

Add your answer

Q127. Explain pointers and heap ?

Ans.

Pointers are variables that store memory addresses. Heap is a region of memory used for dynamic memory allocation.

  • Pointers are used to access memory directly

  • Heap is used for dynamic memory allocation

  • Pointers can be used to create data structures like linked lists

  • Heap memory must be manually managed to avoid memory leaks

Add your answer

Q128. What is join and how many types.

Ans.

Join is a SQL operation that combines rows from two or more tables based on a related column between them.

  • Join is used to retrieve data from multiple tables in a single query.

  • There are four types of joins: Inner Join, Left Join, Right Join, and Full Outer Join.

  • Inner Join returns only the matching rows from both tables.

  • Left Join returns all the rows from the left table and matching rows from the right table.

  • Right Join returns all the rows from the right table and matching rows...read more

Add your answer

Q129. SQL query to fetch the 3rd max salary alone, and group the data by country and return the count of employees in each country

Ans.

SQL query to fetch 3rd max salary, group by country, and return count of employees in each country

  • Use a subquery to select the 3rd max salary

  • Join the employee table with the country table

  • Group by country and use COUNT() to get the number of employees

Add your answer

Q130. What are Closures in JS?

Ans.

Closures are functions that have access to variables in their outer scope, even after the outer function has returned.

  • Closures are created when a function is defined inside another function.

  • The inner function has access to the outer function's variables and parameters.

  • Closures can be used to create private variables and methods.

  • Closures can also be used to create functions with pre-set arguments.

Add your answer

Q131. Smoke testing,sanity testing retesting regression testing difference

Ans.

Smoke testing, sanity testing, retesting, and regression testing are all types of software testing.

  • Smoke testing is a quick and shallow test to check if the basic functionalities of the software are working.

  • Sanity testing is a narrow and deep test to check if the major functionalities of the software are working after a change.

  • Retesting is a type of testing that is done to ensure that a defect that was found and fixed has been resolved.

  • Regression testing is a type of testing ...read more

View 2 more answers

Q132. How to extract s-parameter models

Ans.

S-parameter models can be extracted using network analyzers or simulation software.

  • Use a network analyzer to measure the S-parameters of the device under test (DUT)

  • Use simulation software to create a model of the DUT and extract the S-parameters from the simulation results

  • Ensure that the measurement or simulation setup is properly calibrated to obtain accurate S-parameter models

Add your answer
Q133. Computer Network Question

Difference between HTTP and HTTPS

Add your answer
Q134. C Question

What is near pointer?

Add your answer

Q135. find non repeating character in an array

Ans.

Find the first non-repeating character in an array.

  • Use a hash table to store the frequency of each character.

  • Iterate through the array and check the frequency of each character.

  • Return the first character with a frequency of 1.

Add your answer

Q136. Can we interchange service and controller annotations?

Ans.

No, service and controller annotations cannot be interchanged.

  • Service annotations are used to define a class as a service component, while controller annotations are used to define a class as a controller component.

  • Service annotations are typically used for business logic and data manipulation, while controller annotations are used for handling HTTP requests and responses.

  • Interchanging these annotations can lead to unexpected behavior and errors in the application.

Add your answer

Q137. How many bits are required for IPv4 and IPv6

Add your answer

Q138. What is Context API?

Ans.

Context API is a feature in React that allows data to be passed down the component tree without manually passing props at each level.

  • Context API provides a way to share data between components without the need for prop drilling.

  • It consists of two main components: Provider and Consumer.

  • The Provider component allows data to be provided and accessed by any component within its subtree.

  • The Consumer component allows components to consume the data provided by the Provider.

  • Context A...read more

View 1 answer

Q139. what is the significance of MD with your name?

Add your answer

Q140. Can you implement the data hiding concept in C?

Add your answer

Q141. Understand how the data centre setup should develop

Ans.

Data centre setup should evolve with advancements in technology and increasing demands for storage and processing power.

  • Regularly assess and upgrade hardware to ensure optimal performance

  • Implement virtualization to maximize resource utilization

  • Utilize cloud services for scalability and flexibility

  • Enhance security measures to protect sensitive data

  • Consider energy efficiency and sustainability in design

Add your answer

Q142. Explain Dns packet flow? How loop is determined in wired network & how it is avoided.

Add your answer

Q143. Difference between explicit wait and implicit wait

Ans.

Explicit wait is used to wait for a specific condition to occur before proceeding, while implicit wait waits for a certain amount of time before proceeding.

  • Explicit wait is defined by the user in the code, while implicit wait is defined globally for the entire script.

  • Explicit wait is more flexible as it can wait for specific conditions like element visibility, while implicit wait waits for a fixed amount of time.

  • Example: Explicit wait can be used to wait for a button to be cl...read more

Add your answer

Q144. How can i send bluck msg to students for event

Ans.

You can send bulk messages to students for events through a mass text messaging service or email platform.

  • Use a mass text messaging service like Remind or GroupMe to send bulk messages to students

  • Utilize an email platform like Mailchimp or Constant Contact to reach students who prefer email communication

  • Include important event details such as date, time, location, and any necessary RSVP instructions

  • Personalize messages when possible to increase student engagement and interest...read more

View 1 answer

Q145. How to create 1gb file in python?

Ans.

To create a 1GB file in Python, use the 'os' module and write random data to the file.

  • Import the 'os' module

  • Use the 'os.urandom()' function to generate random data

  • Open a file using the 'open()' function and write the data to it

  • Repeat until the file size reaches 1GB

Add your answer
Q146. C/C++ Question

Difference between C and C++?

Add your answer

Q147. How do you compare two databases and two files?

Ans.

Comparing two databases and two files involves analyzing their structure, content, and integrity.

  • Compare the schema of the databases to ensure they have the same tables, columns, and relationships.

  • Check the data in the databases and files to identify any discrepancies or missing information.

  • Use checksums or hash functions to compare the contents of the files for differences.

  • Consider using tools like SQL queries, file comparison software, or scripting languages for efficient c...read more

Add your answer

Q148. How do you exit recursion in programming?

Ans.

To exit recursion in programming, a base case is defined to stop the recursive calls.

  • Define a base case that will stop the recursive calls.

  • Ensure that the base case is reached during the recursion.

  • Return a value or perform an action when the base case is met.

Add your answer

Q149. How do you automate email and one time passcode?

Ans.

Automating email and one time passcode involves using automation tools and scripting to send emails and generate passcodes.

  • Use automation tools like Selenium or Puppeteer to automate the process of logging into email accounts and sending emails.

  • Utilize scripting languages like Python or JavaScript to generate one time passcodes and send them via email.

  • Implement API calls to interact with email servers and send emails programmatically.

  • Consider using third-party services like T...read more

Add your answer

Q150. What IBIS is consisting?

Ans.

IBIS stands for Input/Output Buffer Information Specification and is a standard for modeling the behavior of digital buffers.

  • IBIS is used to model the behavior of digital buffers in a system.

  • It includes information about the input and output characteristics of the buffer.

  • IBIS models are used to simulate the behavior of a system before it is built.

  • IBIS models can be used to optimize the design of a system.

  • IBIS models are often used in the semiconductor industry.

  • Examples of IBI...read more

Add your answer

Q151. What is the difference between page and frame

Add your answer

Q152. Difference between fork-join, fork - join any

Ans.

fork-join is a parallel programming model where a task is divided into subtasks that run concurrently and join at a synchronization point.

  • fork-join is used in parallel programming to improve performance by dividing a task into smaller subtasks that can be executed concurrently

  • In fork-join, the main task is divided into subtasks using the 'fork' operation, and these subtasks are executed independently

  • The 'join' operation is used to synchronize the subtasks and wait for their c...read more

Add your answer

Q153. How to do the PDN analysis

Ans.

PDN analysis involves analyzing the power distribution network of a circuit to ensure proper power delivery.

  • Identify the power sources and loads in the circuit

  • Create a schematic of the power distribution network

  • Simulate the circuit using a tool like SPICE

  • Analyze the voltage drops and current flows in the network

  • Optimize the network to ensure proper power delivery

  • Repeat the analysis for different operating conditions and scenarios

Add your answer

Q154. What is Quick Sort? Can you write the program?

Add your answer

Q155. Explain Redux workflow.

Ans.

Redux is a state management library for JavaScript applications, providing a predictable and centralized workflow.

  • Redux follows a unidirectional data flow pattern.

  • The application state is stored in a single JavaScript object called the store.

  • Actions are dispatched to describe state changes.

  • Reducers are pure functions that specify how the state should change based on the dispatched actions.

  • Selectors are used to extract specific data from the store.

  • Middleware can be used to add...read more

View 1 answer

Q156. What is padding and why it is necessary

Add your answer

Q157. What are the types of exception in PLSQL

Ans.

There are three types of exceptions in PL/SQL: predefined exceptions, user-defined exceptions, and system-defined exceptions.

  • Predefined exceptions are errors that are raised by the PL/SQL runtime system.

  • User-defined exceptions are created by the developer to handle specific errors.

  • System-defined exceptions are raised by the Oracle database system.

  • Examples of predefined exceptions include NO_DATA_FOUND and TOO_MANY_ROWS.

  • Examples of user-defined exceptions include INVALID_INPUT...read more

Add your answer

Q158. Explain TDD and give a scenario to write TDD test cases

Ans.

TDD stands for Test-Driven Development, a software development process where tests are written before the actual code.

  • Write a failing test case based on requirements

  • Write the minimum amount of code to pass the test

  • Refactor the code to improve design and remove duplication

Add your answer

Q159. How to reverse a single linked list

Ans.

To reverse a single linked list, iterate through the list and change the direction of the pointers.

  • Create three pointers: previous, current, and next

  • Set current to the head of the linked list

  • Iterate through the list, setting next to the next node, then setting current's next to previous

  • Move previous and current pointers one node forward

  • Return the new head of the linked list

Add your answer

Q160. What is your opinion on Additive Manufacturing?

Ans.

Additive Manufacturing is a revolutionary technology that enables the creation of complex and customized objects through layer-by-layer construction.

  • Additive Manufacturing, also known as 3D printing, has the potential to disrupt traditional manufacturing processes.

  • It allows for the production of intricate designs that are difficult or impossible to create using traditional methods.

  • Additive Manufacturing offers cost and time savings by eliminating the need for tooling and redu...read more

Add your answer

Q161. What is semapore, mutex and memory sharing

Add your answer

Q162. Packet flow in a network with switch & Router

Ans.

Packet flow in a network with switch & router

  • Packet is sent from source device to switch

  • Switch forwards the packet to the destination device connected to it

  • If the destination device is not connected to the switch, switch forwards the packet to the router

  • Router checks the destination IP address and forwards the packet to the appropriate network

  • If the destination device is not in the same network, router forwards the packet to the next hop router

  • Packet reaches the destination d...read more

Add your answer

Q163. What is passivity, causality?

Ans.

Passivity refers to a system's inability to generate energy, while causality refers to the relationship between cause and effect in a system.

  • Passivity: A passive system cannot generate energy, but can only store or dissipate it.

  • Causality: The output of a system depends only on its current and past inputs, not future inputs.

  • Passive systems are often used in filters and attenuators, while causal systems are important in signal processing and control systems.

  • An example of a pass...read more

Add your answer
Q164. SQL Question

SQL command to join two tables

Add your answer

Q165. What is token ring. Explain about it

Add your answer

Q166. What is the difference b/w clock & normal gating?

Ans.

Clock gating is used to disable the clock signal to certain parts of a circuit to save power, while normal gating is used to control the flow of data within the circuit.

  • Clock gating is used for power optimization by disabling the clock signal to unused parts of the circuit.

  • Normal gating is used to control the flow of data within the circuit by enabling or disabling certain paths.

  • Clock gating helps in reducing power consumption by stopping the clock signal to specific parts of...read more

Add your answer

Q167. Which one sorting method is better?

Add your answer

Q168. What are linked list, stack and queue?

Add your answer

Q169. Difference between TCP and UDP. Give some examples

Ans.

TCP is a connection-oriented protocol while UDP is connectionless. TCP provides reliable data transfer while UDP is faster.

  • TCP establishes a connection before data transfer while UDP does not

  • TCP provides error checking and retransmission of lost packets while UDP does not

  • TCP is used for applications that require reliable data transfer such as email, file transfer, and web browsing while UDP is used for applications that require speed such as online gaming and video streaming

  • E...read more

Add your answer

Q170. What is Robot Framework architecture and explain?

Ans.

Robot Framework architecture is a keyword-driven automation framework with a modular and extensible design.

  • Robot Framework follows a keyword-driven approach where test cases are written using keywords.

  • It has a modular architecture with core components like test libraries, test data, and test execution engine.

  • Test libraries provide keywords for interacting with different systems and technologies.

  • Test data is stored in tabular format using plain text or HTML tables.

  • The test exe...read more

Add your answer

Q171. have you worked on Higher order components?

Ans.

Yes, I have experience working with Higher Order Components in React.

  • Used HOCs to share common functionality between components

  • Implemented HOCs for authentication, logging, and data fetching

  • Enhanced code reusability and maintainability using HOCs

Add your answer

Q172. What is the difference between agent and waterfall

Ans.

Agile is an iterative approach to project management, while waterfall is a linear approach.

  • Agile is iterative and allows for flexibility and changes throughout the project.

  • Waterfall is a linear approach where each phase must be completed before moving on to the next.

  • Agile focuses on delivering working software in short iterations, while waterfall follows a sequential process from requirements to testing and deployment.

Add your answer

Q173. How you handle the agile waterfall project

Ans.

I handle agile waterfall projects by blending the flexibility of agile with the structure of waterfall.

  • I create a hybrid approach that combines the iterative nature of agile with the sequential phases of waterfall.

  • I prioritize requirements and plan sprints while also defining clear milestones and deliverables.

  • I ensure constant communication and collaboration among team members to adapt to changes while staying on track.

  • I conduct regular retrospectives to evaluate progress and...read more

Add your answer

Q174. What is the framework used in our project

Ans.

We are using the Agile framework in our project.

  • Agile framework focuses on iterative development and collaboration.

  • It involves breaking down the project into smaller tasks called sprints.

  • Regular feedback and adaptation are key components of Agile.

  • Examples of Agile methodologies include Scrum, Kanban, and XP.

Add your answer

Q175. Different between TCP, UDP give some examples

Add your answer

Q176. what is the difference between imperative and declarative programming

Ans.

Imperative programming focuses on how to perform tasks, while declarative programming focuses on what the desired outcome is.

  • Imperative programming involves explicitly specifying the steps to achieve a result, while declarative programming involves defining the desired result without specifying the steps.

  • In imperative programming, the programmer has to manage the state of the program, while in declarative programming, the state is managed by the system.

  • Examples of imperative ...read more

Add your answer

Q177. What is HIL testing ? Explain ur experience

Ans.

HIL testing stands for Hardware-in-the-Loop testing, a type of testing used in the development of complex systems.

  • HIL testing involves testing a system or component in a simulated environment that includes real hardware components.

  • It is used to test complex systems such as automotive systems, aerospace systems, and industrial control systems.

  • HIL testing can help identify issues early in the development process, reducing the risk of costly errors later on.

  • My experience with HI...read more

Add your answer

Q178. Comparable vs comparator

Ans.

Comparable is an interface used for natural ordering while Comparator is an interface used for custom ordering.

  • Comparable is implemented by the class whose objects need to be sorted

  • Comparator is implemented by a separate class to define custom sorting logic

  • Comparable uses compareTo() method to compare objects

  • Comparator uses compare() method to compare objects

  • Example: String class implements Comparable interface for natural ordering

  • Example: Employee class implements Comparator...read more

Add your answer

Q179. Hash table implementation

Ans.

Hash table is a data structure that maps keys to values using a hash function.

  • Hash function maps keys to indices in an array

  • Collisions can occur, which can be resolved using techniques like chaining or open addressing

  • Lookup, insertion, and deletion operations have an average time complexity of O(1)

Add your answer

Q180. How do you authenticate and API?

Ans.

API authentication can be done using various methods like API keys, OAuth tokens, and JWT tokens.

  • Use API keys to authenticate requests by including the key in the request header.

  • Implement OAuth for secure authorization and authentication.

  • Utilize JWT tokens for stateless authentication by generating tokens upon successful login.

Add your answer

Q181. How to pass data in testng tags?

Ans.

TestNG tags can pass data using parameters in testng.xml file or through DataProviders.

  • Use parameters in testng.xml file to pass data to test methods

  • Use DataProviders to pass data dynamically to test methods

  • Example:

Add your answer

Q182. Implementation of contact centre products and unified communication aura

Ans.

Implementation of contact centre products and unified communication aura

  • Contact centre products are software solutions that enable businesses to manage customer interactions across multiple channels

  • Unified communication aura is a suite of communication and collaboration tools that integrate voice, video, messaging, and other communication channels

  • Implementation of these products involves assessing business needs, selecting appropriate solutions, configuring and customizing th...read more

Add your answer

Q183. what is RBAC and how to control users?

Ans.

RBAC stands for Role-Based Access Control, a method of restricting network access based on roles assigned to individual users.

  • RBAC assigns roles to users based on their job responsibilities

  • Access control is managed through policies that define what actions each role can perform

  • RBAC simplifies user management by grouping users with similar access needs

Add your answer

Q184. What are my teaching methods to teach

Ans.

I utilize a combination of lectures, discussions, group activities, and multimedia resources to engage students and cater to different learning styles.

  • Incorporate interactive activities to promote student engagement

  • Use multimedia resources to enhance understanding of complex topics

  • Encourage discussions to foster critical thinking and communication skills

  • Provide real-world examples to make concepts more relatable

Add your answer

Q185. HSS deployment procedure with required documents

Ans.

HSS deployment requires several documents. Here are some pointers.

  • Prepare a detailed project plan

  • Obtain necessary licenses and permits

  • Create a network diagram

  • Develop a test plan

  • Prepare a user manual

  • Conduct training sessions for users

  • Obtain sign-off from stakeholders

  • Maintain documentation for future reference

Add your answer

Q186. What's ur strength and weakness

Ans.

My strength is my analytical skills and attention to detail. My weakness is that I can be overly critical of my own work.

  • Strength: Analytical skills

  • Strength: Attention to detail

  • Weakness: Being overly critical of my own work

View 2 more answers

Q187. How mechanical degree will help in IT job

Ans.

A mechanical degree can help in an IT job by providing problem-solving skills, analytical thinking, and a strong foundation in technical knowledge.

  • Mechanical engineering teaches problem-solving skills which are essential in IT roles.

  • Analytical thinking developed in a mechanical degree can be applied to troubleshooting IT issues.

  • Technical knowledge gained in mechanical engineering can be useful in understanding complex IT systems.

  • Experience with design and optimization in mech...read more

Add your answer

Q188. What is an array and structures?

Ans.

An array is a collection of similar data types while a structure is a collection of different data types.

  • Arrays are used to store multiple values in a single variable. Example: int numbers[5] = {1, 2, 3, 4, 5};

  • Structures are used to group different data types together. Example: struct person { char name[20]; int age; float salary; };

  • Arrays can be accessed using index numbers while structures can be accessed using dot notation.

  • Arrays and structures are commonly used in embedde...read more

Add your answer

Q189. All Testing concepts and Projects done in previous companies

Ans.

I have experience in various testing concepts and projects in my previous companies.

  • Tested web applications using Selenium WebDriver and JMeter

  • Performed API testing using Postman and SoapUI

  • Conducted performance testing using LoadRunner

  • Tested mobile applications on Android and iOS platforms

  • Worked on automation frameworks using Java and Python

  • Conducted security testing using OWASP ZAP

  • Tested ETL processes using Informatica PowerCenter

  • Conducted database testing using SQL queries

Add your answer

Q190. Write a program for Quick sort?

Add your answer

Q191. q1. library & netlist mismatch q2. size pmos will differ

Ans.

This question is likely related to a discrepancy between a library and netlist causing a difference in the size of PMOS transistors.

  • Mismatch between the library and netlist can lead to incorrect sizing of transistors

  • Ensure consistency between the library files and netlist to avoid discrepancies

  • Check for any errors or warnings related to library and netlist mismatch in the design tool logs

  • Verify the sizing of PMOS transistors to identify and correct any differences

Add your answer

Q192. Programs on string operations

Ans.

String operations programs manipulate and modify strings.

  • Use built-in string functions like substring, replace, and split.

  • Implement algorithms like string reversal, palindrome check, and string compression.

  • Regular expressions can also be used for advanced string operations.

  • Examples: reversing a string, counting occurrences of a substring, converting a string to title case.

Add your answer

Q193. What is Java, oops concepts, why Capgemini

Ans.

Java is a popular programming language, OOPs concepts are fundamental principles of object-oriented programming, Capgemini is a leading consulting company.

  • Java is a high-level programming language known for its portability and versatility.

  • OOPs concepts include inheritance, encapsulation, polymorphism, and abstraction.

  • Capgemini is a global consulting firm known for its expertise in technology and business solutions.

Add your answer

Q194. Different between TCP and UDP. Give some examples

Add your answer

Q195. How to convert decimal to binary numbers

Ans.

Decimal to binary conversion involves dividing the decimal number by 2 and noting the remainder until the quotient becomes 0.

  • Divide the decimal number by 2

  • Note the remainder

  • Repeat the process with the quotient until it becomes 0

  • Write the remainders in reverse order to get the binary equivalent

Add your answer

Q196. sSL vs Ipsec which one is preferable

Ans.

Both SSL and IPsec have their own advantages and disadvantages, and the choice depends on the specific use case.

  • SSL is easier to set up and use, making it a good choice for web applications.

  • IPsec provides better security and is more suitable for enterprise-level applications.

  • SSL is better for remote access, while IPsec is better for site-to-site connections.

  • SSL is more widely supported, while IPsec is more complex and requires more configuration.

  • Ultimately, the choice between...read more

Add your answer

Q197. what is destructing in JS

Ans.

Destructuring is a way to extract values from objects and arrays into distinct variables.

  • Destructuring can be used with arrays and objects

  • It allows you to extract values from nested objects and arrays

  • You can also set default values for variables that may not exist in the object or array

  • Example: const {name, age} = {name: 'John', age: 30};

  • Example: const [first, second] = ['one', 'two'];

Add your answer

Q198. Columnstore indexing requirement and implementation in project

Ans.

Columnstore indexing is used to improve query performance by storing data in columns instead of rows.

  • Columnstore indexes are ideal for data warehousing and analytics workloads

  • They are implemented in SQL Server, Oracle, and other databases

  • They can significantly improve query performance by reducing I/O and increasing parallelism

Add your answer

Q199. What is Byte stuffing

Add your answer

Q200. 1. Introduction 2. What is Cloud 3. Applications of Cloud

Ans.

Cloud is a technology that allows users to access and store data and applications over the internet.

  • Cloud computing provides on-demand access to a shared pool of resources, such as servers, storage, and applications.

  • Applications of cloud include data storage, backup and recovery, software development and testing, and web hosting.

  • Examples of cloud services include Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform.

Add your answer
1
2
3
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos

Interview Process at Hero MotoCorp

based on 157 interviews in the last 1 year
Interview experience
4.1
Good
View more
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Interview Questions from Similar Companies

3.4
 • 391 Interview Questions
4.0
 • 375 Interview Questions
4.1
 • 201 Interview Questions
3.6
 • 178 Interview Questions
3.4
 • 164 Interview Questions
4.3
 • 156 Interview Questions
View all
Top Capgemini Engineering Interview Questions And Answers
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
70 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions
Get AmbitionBox app

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter