Capgemini Engineering
200+ Hero MotoCorp Interview Questions and Answers
Difference between Array and Linked List
Design banking management system and Railway management System.
Steps involved in a software engineering process.
Q104. Explain about the different layers in OSI model.
The OSI model has 7 layers that define how data is transmitted over a network.
Layer 1: Physical layer - deals with the physical aspects of transmitting data
Layer 2: Data link layer - responsible for error-free transfer of data between nodes
Layer 3: Network layer - manages the routing of data between nodes
Layer 4: Transport layer - ensures reliable delivery of data between applications
Layer 5: Session layer - establishes and manages connections between applications
Layer 6: Pre...read more
Q105. What are k values ? What is neighborship criteria in eigrp ? How to inject default route ? What is acl, prefix list, routemap ?
Answers to questions related to network engineering concepts.
k values are used in EIGRP to calculate the metric of a route
Neighborship criteria in EIGRP is the set of conditions that must be met for two routers to become neighbors
Default route can be injected into EIGRP using the 'ip default-network' command
ACL (Access Control List) is used to filter network traffic based on source/destination IP address, port number, etc.
Prefix list is used to filter routes based on their pr...read more
Q106. Write a code to allocate a memory for multidimential array on heap
Code to allocate memory for multidimensional array on heap
Use malloc() function to allocate memory on heap
Calculate the total size of the array using the dimensions
Use a pointer to access the array elements
Q107. Write a program for banking management system and Railway management System?
Q108. Write a program to remove the character from given input For eg. If input is C:>myprog Irshad s Output should be: Irhad
Q109. Why we postman and what is the between api testing and GUI testing
Postman is used for API testing. GUI testing involves testing the user interface while API testing involves testing the backend functionality.
Postman is a tool used for testing APIs by sending requests and receiving responses.
GUI testing involves testing the user interface, such as buttons, forms, and menus.
API testing involves testing the backend functionality, such as data validation and response time.
Postman can be used to test APIs by sending requests and receiving respon...read more
Q110. Strip line vs micro strip linetransmission line?
Strip line and microstrip line are two types of transmission lines used in high-frequency applications.
Strip line is a type of transmission line where the conductor is sandwiched between two ground planes.
Microstrip line is a type of transmission line where the conductor is placed on top of a ground plane with a dielectric material in between.
Strip line has better shielding and lower radiation losses compared to microstrip line.
Microstrip line is easier to fabricate and has l...read more
Q111. What are the KPI of Gas and Steam Turbines.
Key Performance Indicators (KPI) for Gas and Steam Turbines are crucial metrics used to measure efficiency and performance.
Efficiency: Measure of how well the turbine converts fuel into electricity or mechanical power.
Availability: Percentage of time the turbine is operational and ready to generate power.
Reliability: Ability of the turbine to consistently perform without breakdowns or failures.
Maintenance Costs: Expenses incurred for upkeep and repairs of the turbine.
Output: ...read more
Q112. What is static memory allocation in C?
Static memory allocation is a way of allocating memory at compile-time.
Memory is allocated before the program starts executing
The size of memory is fixed and cannot be changed during runtime
Variables declared with static keyword are stored in static memory
Example: int x; //allocated in static memory
Example: static int y; //allocated in static memory
Q113. What is virtual class and when it becomes necessary?
Q114. Explain SQL commands?
SQL commands are used to interact with databases and manipulate data.
SELECT: retrieve data from a database
INSERT: add new data to a database
UPDATE: modify existing data in a database
DELETE: remove data from a database
CREATE: create a new database or table
ALTER: modify the structure of a database or table
DROP: delete a database or table
JOIN: combine data from multiple tables
GROUP BY: group data based on a specific column
ORDER BY: sort data based on a specific column
Q115. What is virtual memory and why it is needed?
Q116. How memory allocated to object
Memory is allocated to objects dynamically during runtime based on their size and type.
Memory allocation is done using the 'new' keyword in languages like Java and C++.
In languages like Python, memory allocation is handled automatically by the interpreter.
Memory allocation can also be done using functions like malloc() and calloc() in C.
Memory is released using the 'delete' keyword in languages like Java and C++.
Memory management is important to prevent memory leaks and optim...read more
Q117. what would happen if malloc() function fails
Q118. What are the pre considerations to check to advice the LC
Pre considerations before advising the LC
Check the creditworthiness of the buyer
Verify the authenticity of the documents
Ensure compliance with legal regulations
Assess the risk involved in the transaction
Confirm the terms and conditions of the LC
Q119. How to optimize decoupling capacitors?
Optimizing decoupling capacitors involves selecting the right capacitance value, placement, and layout.
Choose the appropriate capacitance value based on the frequency range of the circuit
Place the capacitors as close as possible to the power pins of the IC
Use multiple capacitors in parallel to cover a wider frequency range
Ensure proper layout to minimize inductance and resistance
Simulate the circuit to verify the effectiveness of the decoupling capacitors
Explain the leaky bucket algorithm.
Difference between Switch and Hub
Difference between TCP and UDP
Q123. Pcie interface Gen3 RL and IL specification?
PCIe Gen3 RL and IL specifications define the electrical and protocol requirements for high-speed data transfer.
RL stands for Receiver Loss and IL stands for Insertion Loss.
RL specification defines the maximum amount of signal loss that can be tolerated by the receiver.
IL specification defines the maximum amount of signal loss that can be tolerated by the channel.
PCIe Gen3 RL and IL specifications ensure reliable and high-speed data transfer between devices.
For example, a PCI...read more
Q124. In a given string , find the number of pallindromes
Count the number of palindromes in a given string.
Iterate through the string and check for palindromes of length 1, 2, 3, ... n
Use two pointers to check if a substring is a palindrome
Consider both even and odd length palindromes
Store the count of palindromes found
Q125. Write difference between switch and hub, tell about their characteristic?
Q126. WAP to reverse string?
A program to reverse a given string.
Create an empty string to store the reversed string.
Iterate through the original string from end to start.
Append each character to the empty string.
Return the reversed string.
Q127. Explain pointers and heap ?
Pointers are variables that store memory addresses. Heap is a region of memory used for dynamic memory allocation.
Pointers are used to access memory directly
Heap is used for dynamic memory allocation
Pointers can be used to create data structures like linked lists
Heap memory must be manually managed to avoid memory leaks
Q128. What is join and how many types.
Join is a SQL operation that combines rows from two or more tables based on a related column between them.
Join is used to retrieve data from multiple tables in a single query.
There are four types of joins: Inner Join, Left Join, Right Join, and Full Outer Join.
Inner Join returns only the matching rows from both tables.
Left Join returns all the rows from the left table and matching rows from the right table.
Right Join returns all the rows from the right table and matching rows...read more
Q129. SQL query to fetch the 3rd max salary alone, and group the data by country and return the count of employees in each country
SQL query to fetch 3rd max salary, group by country, and return count of employees in each country
Use a subquery to select the 3rd max salary
Join the employee table with the country table
Group by country and use COUNT() to get the number of employees
Q130. What are Closures in JS?
Closures are functions that have access to variables in their outer scope, even after the outer function has returned.
Closures are created when a function is defined inside another function.
The inner function has access to the outer function's variables and parameters.
Closures can be used to create private variables and methods.
Closures can also be used to create functions with pre-set arguments.
Q131. Smoke testing,sanity testing retesting regression testing difference
Smoke testing, sanity testing, retesting, and regression testing are all types of software testing.
Smoke testing is a quick and shallow test to check if the basic functionalities of the software are working.
Sanity testing is a narrow and deep test to check if the major functionalities of the software are working after a change.
Retesting is a type of testing that is done to ensure that a defect that was found and fixed has been resolved.
Regression testing is a type of testing ...read more
Q132. How to extract s-parameter models
S-parameter models can be extracted using network analyzers or simulation software.
Use a network analyzer to measure the S-parameters of the device under test (DUT)
Use simulation software to create a model of the DUT and extract the S-parameters from the simulation results
Ensure that the measurement or simulation setup is properly calibrated to obtain accurate S-parameter models
Difference between HTTP and HTTPS
Q135. find non repeating character in an array
Find the first non-repeating character in an array.
Use a hash table to store the frequency of each character.
Iterate through the array and check the frequency of each character.
Return the first character with a frequency of 1.
Q136. Can we interchange service and controller annotations?
No, service and controller annotations cannot be interchanged.
Service annotations are used to define a class as a service component, while controller annotations are used to define a class as a controller component.
Service annotations are typically used for business logic and data manipulation, while controller annotations are used for handling HTTP requests and responses.
Interchanging these annotations can lead to unexpected behavior and errors in the application.
Q137. How many bits are required for IPv4 and IPv6
Q138. What is Context API?
Context API is a feature in React that allows data to be passed down the component tree without manually passing props at each level.
Context API provides a way to share data between components without the need for prop drilling.
It consists of two main components: Provider and Consumer.
The Provider component allows data to be provided and accessed by any component within its subtree.
The Consumer component allows components to consume the data provided by the Provider.
Context A...read more
Q139. what is the significance of MD with your name?
Q140. Can you implement the data hiding concept in C?
Q141. Understand how the data centre setup should develop
Data centre setup should evolve with advancements in technology and increasing demands for storage and processing power.
Regularly assess and upgrade hardware to ensure optimal performance
Implement virtualization to maximize resource utilization
Utilize cloud services for scalability and flexibility
Enhance security measures to protect sensitive data
Consider energy efficiency and sustainability in design
Q142. Explain Dns packet flow? How loop is determined in wired network & how it is avoided.
Q143. Difference between explicit wait and implicit wait
Explicit wait is used to wait for a specific condition to occur before proceeding, while implicit wait waits for a certain amount of time before proceeding.
Explicit wait is defined by the user in the code, while implicit wait is defined globally for the entire script.
Explicit wait is more flexible as it can wait for specific conditions like element visibility, while implicit wait waits for a fixed amount of time.
Example: Explicit wait can be used to wait for a button to be cl...read more
Q144. How can i send bluck msg to students for event
You can send bulk messages to students for events through a mass text messaging service or email platform.
Use a mass text messaging service like Remind or GroupMe to send bulk messages to students
Utilize an email platform like Mailchimp or Constant Contact to reach students who prefer email communication
Include important event details such as date, time, location, and any necessary RSVP instructions
Personalize messages when possible to increase student engagement and interest...read more
Q145. How to create 1gb file in python?
To create a 1GB file in Python, use the 'os' module and write random data to the file.
Import the 'os' module
Use the 'os.urandom()' function to generate random data
Open a file using the 'open()' function and write the data to it
Repeat until the file size reaches 1GB
Difference between C and C++?
Q147. How do you compare two databases and two files?
Comparing two databases and two files involves analyzing their structure, content, and integrity.
Compare the schema of the databases to ensure they have the same tables, columns, and relationships.
Check the data in the databases and files to identify any discrepancies or missing information.
Use checksums or hash functions to compare the contents of the files for differences.
Consider using tools like SQL queries, file comparison software, or scripting languages for efficient c...read more
Q148. How do you exit recursion in programming?
To exit recursion in programming, a base case is defined to stop the recursive calls.
Define a base case that will stop the recursive calls.
Ensure that the base case is reached during the recursion.
Return a value or perform an action when the base case is met.
Q149. How do you automate email and one time passcode?
Automating email and one time passcode involves using automation tools and scripting to send emails and generate passcodes.
Use automation tools like Selenium or Puppeteer to automate the process of logging into email accounts and sending emails.
Utilize scripting languages like Python or JavaScript to generate one time passcodes and send them via email.
Implement API calls to interact with email servers and send emails programmatically.
Consider using third-party services like T...read more
Q150. What IBIS is consisting?
IBIS stands for Input/Output Buffer Information Specification and is a standard for modeling the behavior of digital buffers.
IBIS is used to model the behavior of digital buffers in a system.
It includes information about the input and output characteristics of the buffer.
IBIS models are used to simulate the behavior of a system before it is built.
IBIS models can be used to optimize the design of a system.
IBIS models are often used in the semiconductor industry.
Examples of IBI...read more
Q151. What is the difference between page and frame
Q152. Difference between fork-join, fork - join any
fork-join is a parallel programming model where a task is divided into subtasks that run concurrently and join at a synchronization point.
fork-join is used in parallel programming to improve performance by dividing a task into smaller subtasks that can be executed concurrently
In fork-join, the main task is divided into subtasks using the 'fork' operation, and these subtasks are executed independently
The 'join' operation is used to synchronize the subtasks and wait for their c...read more
Q153. How to do the PDN analysis
PDN analysis involves analyzing the power distribution network of a circuit to ensure proper power delivery.
Identify the power sources and loads in the circuit
Create a schematic of the power distribution network
Simulate the circuit using a tool like SPICE
Analyze the voltage drops and current flows in the network
Optimize the network to ensure proper power delivery
Repeat the analysis for different operating conditions and scenarios
Q154. What is Quick Sort? Can you write the program?
Q155. Explain Redux workflow.
Redux is a state management library for JavaScript applications, providing a predictable and centralized workflow.
Redux follows a unidirectional data flow pattern.
The application state is stored in a single JavaScript object called the store.
Actions are dispatched to describe state changes.
Reducers are pure functions that specify how the state should change based on the dispatched actions.
Selectors are used to extract specific data from the store.
Middleware can be used to add...read more
Q156. What is padding and why it is necessary
Q157. What are the types of exception in PLSQL
There are three types of exceptions in PL/SQL: predefined exceptions, user-defined exceptions, and system-defined exceptions.
Predefined exceptions are errors that are raised by the PL/SQL runtime system.
User-defined exceptions are created by the developer to handle specific errors.
System-defined exceptions are raised by the Oracle database system.
Examples of predefined exceptions include NO_DATA_FOUND and TOO_MANY_ROWS.
Examples of user-defined exceptions include INVALID_INPUT...read more
Q158. Explain TDD and give a scenario to write TDD test cases
TDD stands for Test-Driven Development, a software development process where tests are written before the actual code.
Write a failing test case based on requirements
Write the minimum amount of code to pass the test
Refactor the code to improve design and remove duplication
Q159. How to reverse a single linked list
To reverse a single linked list, iterate through the list and change the direction of the pointers.
Create three pointers: previous, current, and next
Set current to the head of the linked list
Iterate through the list, setting next to the next node, then setting current's next to previous
Move previous and current pointers one node forward
Return the new head of the linked list
Q160. What is your opinion on Additive Manufacturing?
Additive Manufacturing is a revolutionary technology that enables the creation of complex and customized objects through layer-by-layer construction.
Additive Manufacturing, also known as 3D printing, has the potential to disrupt traditional manufacturing processes.
It allows for the production of intricate designs that are difficult or impossible to create using traditional methods.
Additive Manufacturing offers cost and time savings by eliminating the need for tooling and redu...read more
Q161. What is semapore, mutex and memory sharing
Q162. Packet flow in a network with switch & Router
Packet flow in a network with switch & router
Packet is sent from source device to switch
Switch forwards the packet to the destination device connected to it
If the destination device is not connected to the switch, switch forwards the packet to the router
Router checks the destination IP address and forwards the packet to the appropriate network
If the destination device is not in the same network, router forwards the packet to the next hop router
Packet reaches the destination d...read more
Q163. What is passivity, causality?
Passivity refers to a system's inability to generate energy, while causality refers to the relationship between cause and effect in a system.
Passivity: A passive system cannot generate energy, but can only store or dissipate it.
Causality: The output of a system depends only on its current and past inputs, not future inputs.
Passive systems are often used in filters and attenuators, while causal systems are important in signal processing and control systems.
An example of a pass...read more
SQL command to join two tables
Q165. What is token ring. Explain about it
Q166. What is the difference b/w clock & normal gating?
Clock gating is used to disable the clock signal to certain parts of a circuit to save power, while normal gating is used to control the flow of data within the circuit.
Clock gating is used for power optimization by disabling the clock signal to unused parts of the circuit.
Normal gating is used to control the flow of data within the circuit by enabling or disabling certain paths.
Clock gating helps in reducing power consumption by stopping the clock signal to specific parts of...read more
Q167. Which one sorting method is better?
Q168. What are linked list, stack and queue?
Q169. Difference between TCP and UDP. Give some examples
TCP is a connection-oriented protocol while UDP is connectionless. TCP provides reliable data transfer while UDP is faster.
TCP establishes a connection before data transfer while UDP does not
TCP provides error checking and retransmission of lost packets while UDP does not
TCP is used for applications that require reliable data transfer such as email, file transfer, and web browsing while UDP is used for applications that require speed such as online gaming and video streaming
E...read more
Q170. What is Robot Framework architecture and explain?
Robot Framework architecture is a keyword-driven automation framework with a modular and extensible design.
Robot Framework follows a keyword-driven approach where test cases are written using keywords.
It has a modular architecture with core components like test libraries, test data, and test execution engine.
Test libraries provide keywords for interacting with different systems and technologies.
Test data is stored in tabular format using plain text or HTML tables.
The test exe...read more
Q171. have you worked on Higher order components?
Yes, I have experience working with Higher Order Components in React.
Used HOCs to share common functionality between components
Implemented HOCs for authentication, logging, and data fetching
Enhanced code reusability and maintainability using HOCs
Q172. What is the difference between agent and waterfall
Agile is an iterative approach to project management, while waterfall is a linear approach.
Agile is iterative and allows for flexibility and changes throughout the project.
Waterfall is a linear approach where each phase must be completed before moving on to the next.
Agile focuses on delivering working software in short iterations, while waterfall follows a sequential process from requirements to testing and deployment.
Q173. How you handle the agile waterfall project
I handle agile waterfall projects by blending the flexibility of agile with the structure of waterfall.
I create a hybrid approach that combines the iterative nature of agile with the sequential phases of waterfall.
I prioritize requirements and plan sprints while also defining clear milestones and deliverables.
I ensure constant communication and collaboration among team members to adapt to changes while staying on track.
I conduct regular retrospectives to evaluate progress and...read more
Q174. What is the framework used in our project
We are using the Agile framework in our project.
Agile framework focuses on iterative development and collaboration.
It involves breaking down the project into smaller tasks called sprints.
Regular feedback and adaptation are key components of Agile.
Examples of Agile methodologies include Scrum, Kanban, and XP.
Q175. Different between TCP, UDP give some examples
Q176. what is the difference between imperative and declarative programming
Imperative programming focuses on how to perform tasks, while declarative programming focuses on what the desired outcome is.
Imperative programming involves explicitly specifying the steps to achieve a result, while declarative programming involves defining the desired result without specifying the steps.
In imperative programming, the programmer has to manage the state of the program, while in declarative programming, the state is managed by the system.
Examples of imperative ...read more
Q177. What is HIL testing ? Explain ur experience
HIL testing stands for Hardware-in-the-Loop testing, a type of testing used in the development of complex systems.
HIL testing involves testing a system or component in a simulated environment that includes real hardware components.
It is used to test complex systems such as automotive systems, aerospace systems, and industrial control systems.
HIL testing can help identify issues early in the development process, reducing the risk of costly errors later on.
My experience with HI...read more
Q178. Comparable vs comparator
Comparable is an interface used for natural ordering while Comparator is an interface used for custom ordering.
Comparable is implemented by the class whose objects need to be sorted
Comparator is implemented by a separate class to define custom sorting logic
Comparable uses compareTo() method to compare objects
Comparator uses compare() method to compare objects
Example: String class implements Comparable interface for natural ordering
Example: Employee class implements Comparator...read more
Q179. Hash table implementation
Hash table is a data structure that maps keys to values using a hash function.
Hash function maps keys to indices in an array
Collisions can occur, which can be resolved using techniques like chaining or open addressing
Lookup, insertion, and deletion operations have an average time complexity of O(1)
Q180. How do you authenticate and API?
API authentication can be done using various methods like API keys, OAuth tokens, and JWT tokens.
Use API keys to authenticate requests by including the key in the request header.
Implement OAuth for secure authorization and authentication.
Utilize JWT tokens for stateless authentication by generating tokens upon successful login.
Q181. How to pass data in testng tags?
TestNG tags can pass data using parameters in testng.xml file or through DataProviders.
Use parameters in testng.xml file to pass data to test methods
Use DataProviders to pass data dynamically to test methods
Example:
Q182. Implementation of contact centre products and unified communication aura
Implementation of contact centre products and unified communication aura
Contact centre products are software solutions that enable businesses to manage customer interactions across multiple channels
Unified communication aura is a suite of communication and collaboration tools that integrate voice, video, messaging, and other communication channels
Implementation of these products involves assessing business needs, selecting appropriate solutions, configuring and customizing th...read more
Q183. what is RBAC and how to control users?
RBAC stands for Role-Based Access Control, a method of restricting network access based on roles assigned to individual users.
RBAC assigns roles to users based on their job responsibilities
Access control is managed through policies that define what actions each role can perform
RBAC simplifies user management by grouping users with similar access needs
Q184. What are my teaching methods to teach
I utilize a combination of lectures, discussions, group activities, and multimedia resources to engage students and cater to different learning styles.
Incorporate interactive activities to promote student engagement
Use multimedia resources to enhance understanding of complex topics
Encourage discussions to foster critical thinking and communication skills
Provide real-world examples to make concepts more relatable
Q185. HSS deployment procedure with required documents
HSS deployment requires several documents. Here are some pointers.
Prepare a detailed project plan
Obtain necessary licenses and permits
Create a network diagram
Develop a test plan
Prepare a user manual
Conduct training sessions for users
Obtain sign-off from stakeholders
Maintain documentation for future reference
Q186. What's ur strength and weakness
My strength is my analytical skills and attention to detail. My weakness is that I can be overly critical of my own work.
Strength: Analytical skills
Strength: Attention to detail
Weakness: Being overly critical of my own work
Q187. How mechanical degree will help in IT job
A mechanical degree can help in an IT job by providing problem-solving skills, analytical thinking, and a strong foundation in technical knowledge.
Mechanical engineering teaches problem-solving skills which are essential in IT roles.
Analytical thinking developed in a mechanical degree can be applied to troubleshooting IT issues.
Technical knowledge gained in mechanical engineering can be useful in understanding complex IT systems.
Experience with design and optimization in mech...read more
Q188. What is an array and structures?
An array is a collection of similar data types while a structure is a collection of different data types.
Arrays are used to store multiple values in a single variable. Example: int numbers[5] = {1, 2, 3, 4, 5};
Structures are used to group different data types together. Example: struct person { char name[20]; int age; float salary; };
Arrays can be accessed using index numbers while structures can be accessed using dot notation.
Arrays and structures are commonly used in embedde...read more
Q189. All Testing concepts and Projects done in previous companies
I have experience in various testing concepts and projects in my previous companies.
Tested web applications using Selenium WebDriver and JMeter
Performed API testing using Postman and SoapUI
Conducted performance testing using LoadRunner
Tested mobile applications on Android and iOS platforms
Worked on automation frameworks using Java and Python
Conducted security testing using OWASP ZAP
Tested ETL processes using Informatica PowerCenter
Conducted database testing using SQL queries
Q190. Write a program for Quick sort?
Q191. q1. library & netlist mismatch q2. size pmos will differ
This question is likely related to a discrepancy between a library and netlist causing a difference in the size of PMOS transistors.
Mismatch between the library and netlist can lead to incorrect sizing of transistors
Ensure consistency between the library files and netlist to avoid discrepancies
Check for any errors or warnings related to library and netlist mismatch in the design tool logs
Verify the sizing of PMOS transistors to identify and correct any differences
Q192. Programs on string operations
String operations programs manipulate and modify strings.
Use built-in string functions like substring, replace, and split.
Implement algorithms like string reversal, palindrome check, and string compression.
Regular expressions can also be used for advanced string operations.
Examples: reversing a string, counting occurrences of a substring, converting a string to title case.
Q193. What is Java, oops concepts, why Capgemini
Java is a popular programming language, OOPs concepts are fundamental principles of object-oriented programming, Capgemini is a leading consulting company.
Java is a high-level programming language known for its portability and versatility.
OOPs concepts include inheritance, encapsulation, polymorphism, and abstraction.
Capgemini is a global consulting firm known for its expertise in technology and business solutions.
Q194. Different between TCP and UDP. Give some examples
Q195. How to convert decimal to binary numbers
Decimal to binary conversion involves dividing the decimal number by 2 and noting the remainder until the quotient becomes 0.
Divide the decimal number by 2
Note the remainder
Repeat the process with the quotient until it becomes 0
Write the remainders in reverse order to get the binary equivalent
Q196. sSL vs Ipsec which one is preferable
Both SSL and IPsec have their own advantages and disadvantages, and the choice depends on the specific use case.
SSL is easier to set up and use, making it a good choice for web applications.
IPsec provides better security and is more suitable for enterprise-level applications.
SSL is better for remote access, while IPsec is better for site-to-site connections.
SSL is more widely supported, while IPsec is more complex and requires more configuration.
Ultimately, the choice between...read more
Q197. what is destructing in JS
Destructuring is a way to extract values from objects and arrays into distinct variables.
Destructuring can be used with arrays and objects
It allows you to extract values from nested objects and arrays
You can also set default values for variables that may not exist in the object or array
Example: const {name, age} = {name: 'John', age: 30};
Example: const [first, second] = ['one', 'two'];
Q198. Columnstore indexing requirement and implementation in project
Columnstore indexing is used to improve query performance by storing data in columns instead of rows.
Columnstore indexes are ideal for data warehousing and analytics workloads
They are implemented in SQL Server, Oracle, and other databases
They can significantly improve query performance by reducing I/O and increasing parallelism
Q199. What is Byte stuffing
Q200. 1. Introduction 2. What is Cloud 3. Applications of Cloud
Cloud is a technology that allows users to access and store data and applications over the internet.
Cloud computing provides on-demand access to a shared pool of resources, such as servers, storage, and applications.
Applications of cloud include data storage, backup and recovery, software development and testing, and web hosting.
Examples of cloud services include Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform.
Top HR Questions asked in Hero MotoCorp
Interview Process at Hero MotoCorp
Top Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month