Capgemini Engineering
200+ Teleperformance Interview Questions and Answers
Q201. Write a code reverse a string
Code to reverse a string using array manipulation
Create an array of characters from the input string
Iterate through the array in reverse order and append each character to a new string
Return the reversed string
Q202. Tell me about routers?
Q203. What is Segmentation?
Q204. How does international roaming works
International roaming allows a mobile device to connect to a foreign network and use its services.
The user's home network must have a roaming agreement with the foreign network.
The user's device must be compatible with the foreign network's technology.
The user may incur additional charges for using the foreign network's services.
International roaming can be enabled or disabled on the user's device settings.
Q205. Binary search with an example
Binary search is a search algorithm that finds the position of a target value within a sorted array.
Divide the array into two halves
Compare the target value with the middle element
If the target value matches the middle element, return its position
If the target value is less than the middle element, search the left half
If the target value is greater than the middle element, search the right half
Q206. What is vpn and how it works
VPN stands for Virtual Private Network. It is a secure and private connection between two devices over the internet.
VPN creates a secure and encrypted connection between two devices over the internet
It allows users to access the internet securely and privately
VPN masks the user's IP address and location, making it difficult for third parties to track their online activities
It is commonly used by businesses to allow remote employees to access company resources securely
Examples...read more
Q207. Termination techniques?
Termination techniques are methods used to prevent signal reflections and ensure signal integrity.
Matching impedance of the source and load
Using termination resistors
Using termination capacitors
Using termination inductors
Using termination transformers
Using termination diodes
Using termination networks
Using termination software
Q208. Which tag will be used for image
The tag is used for images in HTML.
Use the tag to display an image on a webpage
Include the image source using the src attribute
Add alternative text for accessibility using the alt attribute
Q209. What is the output of arr++
Q210. How DNA works.
DNA is a molecule that contains the genetic instructions for the development and functioning of all living organisms.
DNA stands for deoxyribonucleic acid.
It is a double-stranded helix structure made up of nucleotides.
The four nucleotides in DNA are adenine (A), thymine (T), cytosine (C), and guanine (G).
The sequence of these nucleotides forms the genetic code.
DNA replication occurs before cell division, ensuring each new cell receives a complete set of genetic information.
DNA...read more
Q211. What is http and https
HTTP and HTTPS are protocols used for communication between web servers and clients.
HTTP stands for Hypertext Transfer Protocol and is used for transmitting data over the internet.
HTTPS stands for Hypertext Transfer Protocol Secure and is a secure version of HTTP that uses SSL/TLS encryption.
HTTP uses port 80 while HTTPS uses port 443.
HTTPS is used for secure transactions such as online banking, e-commerce, etc.
HTTP is vulnerable to attacks such as man-in-the-middle attacks w...read more
Q212. The current covid-19 situation awareness.
The current covid-19 situation awareness.
The covid-19 situation is constantly evolving and being monitored by health organizations worldwide.
There are various measures being taken to control the spread of the virus, such as social distancing and wearing masks.
Vaccines are being developed and distributed globally to combat the virus.
It is important to stay informed and follow guidelines provided by health authorities to stay safe and prevent the spread of the virus.
Q213. What is the need to manual testing
Manual testing is necessary to ensure the quality of the software by simulating real user interactions and scenarios.
Manual testing allows for human intuition and creativity to uncover unexpected issues.
Certain tests, such as usability testing, cannot be automated and require manual execution.
Exploratory testing is best performed manually to discover new defects and areas of improvement.
Manual testing is crucial for validating visual elements, such as layout and design.
In som...read more
Q214. 1-throw 2-throws 3- find elements 4-init elements
The question is asking about different actions related to automation engineering.
1-throw: This action refers to throwing an exception or error in the code.
2-throws: This action refers to handling or catching exceptions or errors in the code.
3-find elements: This action refers to locating and identifying elements on a webpage or application.
4-init elements: This action refers to initializing or setting up elements for automation testing.
Q215. Different between find elements vs find element
find elements returns a list of web elements matching the locator, while find element returns the first web element matching the locator.
find elements returns a list of web elements, find element returns the first web element
find elements is used when multiple elements need to be located, find element is used when only one element is needed
find elements is more efficient when dealing with multiple elements, find element is faster for single element retrieval
Q216. What is Normalization pointer?
Q217. what is oops concept in python
OOPs (Object-Oriented Programming) is a programming paradigm that uses objects to represent and manipulate data.
Python supports OOPs concepts such as encapsulation, inheritance, and polymorphism.
Classes and objects are the fundamental building blocks of OOPs in Python.
Encapsulation allows data hiding and abstraction, ensuring data security and modularity.
Inheritance enables code reuse and the creation of hierarchical relationships between classes.
Polymorphism allows objects o...read more
Q218. How to use endeavour?
Endeavour is a project management tool used to plan, track, and manage projects.
Endeavour allows users to create project plans, assign tasks, and track progress.
Users can set milestones, deadlines, and dependencies to ensure project completion.
The tool also provides reporting and analytics features to monitor project performance.
Endeavour can be used by teams of all sizes to collaborate and streamline project management processes.
Q219. What are the selenium advantages
Selenium advantages include cross-browser compatibility testing, support for multiple programming languages, and integration with various testing frameworks.
Cross-browser compatibility testing: Selenium allows for testing on different browsers to ensure consistent functionality.
Support for multiple programming languages: Selenium supports languages like Java, Python, and C#, making it versatile for different teams.
Integration with various testing frameworks: Selenium can be i...read more
Q220. Etl tester test cases in various stages
ETL tester tests in various stages to ensure data accuracy and completeness.
Test extraction process to ensure correct data is pulled from source systems
Test transformation process to ensure data is correctly transformed and formatted
Test loading process to ensure data is loaded into target systems without errors
Test data reconciliation to ensure data is complete and accurate in target systems
Test error handling and logging to ensure errors are properly handled and logged
Q221. What is paging?
Q222. Difference between UDP and TCP/IP
Q223. What is dSPECE? Whats ur speciality
dSPECE is not a known term or acronym in the software engineering field.
Q224. What are storage classes in c
Q225. Difference between kubernetes and docker
Kubernetes is an orchestration tool while Docker is a containerization platform.
Docker is used to create and manage containers while Kubernetes is used to manage containerized applications.
Kubernetes provides features like load balancing, scaling, and self-healing while Docker does not.
Docker is used to package an application and its dependencies into a container while Kubernetes is used to manage and deploy those containers.
Kubernetes can manage multiple Docker containers ac...read more
Q226. What is Oops concept?
Q227. What is polymorphism?
Q228. What is data abstraction?
Q229. Types of collections in PLSQL
PL/SQL supports three types of collections: associative arrays, nested tables, and VARRAYs.
Associative arrays are also known as index-by tables and use a key-value pair to store data.
Nested tables are similar to arrays and can store multiple values in a single column.
VARRAYs are also similar to arrays but have a fixed size and can store a maximum number of elements.
Collections can be used to pass data between PL/SQL and SQL statements.
Collections can also be used to simplify ...read more
Q230. Resources type vs traits in raml
Resources type defines the structure of the data while traits define reusable properties and behaviors.
Resources type specifies the structure of the data that can be accessed through the API endpoints.
Traits define reusable properties and behaviors that can be applied to multiple resources or methods.
Resources type is used to define the data model, while traits are used to define common functionalities like authentication, logging, etc.
Q231. Stock diagrams for inverter and logic gates
Stock diagrams for inverter and logic gates are commonly used in analog layout design to represent the circuit schematics.
Stock diagrams typically show the connections and components of an inverter or logic gate in a simplified manner.
Inverter diagrams usually consist of a PMOS and NMOS transistor connected in series.
Logic gate diagrams show the input and output connections of the gate, such as AND, OR, or XOR gates.
These diagrams help layout engineers understand the circuit ...read more
Q232. Difference between bit & logic
Bit represents the smallest unit of data in a computer system, while logic refers to the operations and rules that govern the manipulation of data.
A bit is a binary digit that can have a value of either 0 or 1.
Logic refers to the principles and rules that determine how data is processed and manipulated.
Bits are used to represent and store data, while logic is used to perform operations on that data.
Bit-level operations involve manipulating individual bits, while logic-level o...read more
Q233. what is docker network?
Docker network is a virtual network that allows containers to communicate with each other and with external networks.
Docker network enables communication between containers running on the same host or across different hosts.
It provides isolation and security for containers by creating separate network namespaces.
Users can create custom networks with specific configurations such as bridge, overlay, and macvlan.
Docker networks can be managed using the 'docker network' command.
E...read more
Q234. Explain how rest api authenticated
REST API authentication is the process of verifying the identity of clients accessing the API.
Authentication can be achieved using various methods such as API keys, tokens, or OAuth.
API keys are unique identifiers issued to clients and are included in the request headers for authentication.
Tokens are generated upon successful login and are used to authenticate subsequent requests.
OAuth is a protocol that allows clients to obtain access tokens from an authorization server.
Auth...read more
Q235. Difference between let, var and const
let is block scoped, var is function scoped, const is immutable
let: block scoped, can be reassigned
var: function scoped, can be reassigned
const: block scoped, cannot be reassigned, but properties can be modified
Q236. explain something about vlan and its working
VLAN stands for Virtual Local Area Network and is used to segment a network into multiple virtual networks.
VLANs help in improving network performance, security, and management.
Each VLAN is a separate broadcast domain, reducing unnecessary traffic.
VLANs are configured at the switch level by assigning ports to specific VLANs.
VLAN tagging (802.1Q) adds a VLAN identifier to Ethernet frames to distinguish between different VLANs.
Example: VLAN 10 for finance department, VLAN 20 fo...read more
Q237. Different between arraylist vs vectorlist
ArrayList and Vector are both dynamic arrays, but Vector is synchronized and ArrayList is not.
ArrayList is not synchronized, while Vector is synchronized.
ArrayList is faster than Vector for most operations.
Vector is thread-safe, while ArrayList is not.
ArrayList increases its size by 50% when full, while Vector doubles its size.
Q238. What is bound checking
Q239. What is jet pack compose
Jetpack Compose is a modern Android UI toolkit for building native UI components in a declarative way.
Jetpack Compose is part of the Jetpack libraries provided by Google for Android development.
It allows developers to create UI components using a Kotlin-based declarative syntax.
Jetpack Compose simplifies UI development by providing a more intuitive and efficient way to build UI.
It is designed to work seamlessly with existing Android code and can be gradually adopted in projec...read more
Q240. What is leaky bucket
Q241. Sort a single linked list
To sort a single linked list, we can use merge sort or quick sort algorithm.
Merge sort: divide the list into two halves, sort each half recursively, and merge the sorted halves.
Quick sort: partition the list into two sub-lists, one with elements smaller than a pivot and the other with elements larger than the pivot, and recursively sort each sub-list.
Selection sort: repeatedly find the minimum element in the unsorted part of the list and swap it with the first element of the ...read more
Q242. what is unresolved reference?
Unresolved reference is an error in programming where a variable or function is used without being defined or declared.
Occurs when a variable or function is used before it is declared or defined
Can also happen when a variable or function is misspelled
Common in programming languages like Python, Java, and C++
Q243. spring mvc, how it works
Spring MVC is a framework for building web applications in Java.
Spring MVC stands for Model-View-Controller, where the model represents the data, the view represents the UI, and the controller handles the requests and responses.
It uses DispatcherServlet to route incoming requests to the appropriate controller.
Controllers are annotated with @Controller and handle requests by methods annotated with @RequestMapping.
Spring MVC supports RESTful web services through @RestController...read more
Q244. Vehicle tracking system in microcontroller
A vehicle tracking system in a microcontroller involves using GPS technology to track the location of a vehicle in real-time.
Utilize GPS module to receive location data
Store and process location data in microcontroller
Transmit location data to a central server for monitoring
Implement power management techniques to optimize battery usage
Q245. write Jenkins declarative scripting?
Jenkins declarative scripting is a way to define pipelines using a simplified syntax.
Use 'pipeline' block to define the entire pipeline
Use 'stages' block to define different stages of the pipeline
Use 'steps' block within stages to define individual steps
Use 'agent' block to specify where the pipeline will run
Use 'post' block to define actions to be taken after the pipeline has completed
Q246. Implement packet in C
Implementing packet in C involves creating a data structure to hold packet information and functions to manipulate it.
Create a struct to hold packet information such as source and destination addresses, payload, and checksum
Write functions to initialize, read, and write packet data
Use network byte order for multi-byte fields to ensure compatibility across different architectures
Q247. How you are handling bugs?
I handle bugs by thoroughly investigating, documenting, prioritizing, and resolving them in collaboration with the team.
Thoroughly investigate the bug to understand its root cause
Document the bug details including steps to reproduce and expected vs actual results
Prioritize bugs based on severity and impact on users
Collaborate with the team to resolve the bug efficiently
Test the bug fix to ensure it resolves the issue without introducing new problems
Q248. What is TLS
TLS stands for Transport Layer Security, a protocol used to secure communication over the internet.
TLS is the successor to SSL (Secure Sockets Layer) protocol.
It provides encryption, authentication, and integrity for data in transit.
TLS uses a combination of symmetric and asymmetric encryption.
It is commonly used in HTTPS, SMTPS, and FTPS protocols.
TLS versions include TLS 1.0, 1.1, 1.2, and 1.3.
Q249. 3. Explain Oops Concepts?
Oops Concepts are fundamental principles of Object-Oriented Programming.
Encapsulation - binding data and functions together
Inheritance - acquiring properties and behavior of parent class
Polymorphism - ability of objects to take multiple forms
Abstraction - hiding implementation details and showing only necessary information
Q250. .Abstraction and interface difference
Abstraction focuses on hiding implementation details, while interface defines a contract for classes to implement.
Abstraction is about hiding complexity and showing only relevant details.
Interface defines a set of methods that a class must implement.
Abstraction can be achieved through abstract classes or interfaces.
Abstraction allows for flexibility and reusability in code.
Interfaces can be used to achieve multiple inheritance in languages like Java.
Q251. OSPF LSA types & states
OSPF LSA types & states
OSPF uses different types of LSAs to exchange information about the network topology
LSA types include Router LSA, Network LSA, Summary LSA, and AS-External LSA
LSAs go through different states such as Init, Loading, Full, and Exstart
LSA flooding is used to ensure that all routers in the network have the same information
Example: Router LSA describes the state of the router's interfaces and the networks connected to them
Q252. Authentication vs authorization
Authentication verifies the identity of a user, while authorization determines what actions the user is allowed to perform.
Authentication confirms the identity of a user through credentials like passwords or biometrics.
Authorization controls access to resources based on the authenticated user's permissions.
Example: Logging into a system with a username and password is authentication, while being able to view certain files based on user roles is authorization.
Q253. How many articles in UCP
There are 35 articles in the Uniform Customs and Practice for Documentary Credits (UCP).
UCP has a total of 39 articles.
Articles 1 to 28 cover general provisions and definitions.
Articles 29 to 39 cover specific provisions related to documentary credits.
UCP 600 is the latest version of the UCP, with 35 articles.
The articles in UCP provide guidelines for international trade transactions.
Q254. Explain mvvm architecture in android
MVVM architecture in Android separates the UI, business logic, and data layers for better organization and testability.
Model - Represents the data and business logic
View - Represents the UI components
ViewModel - Acts as a mediator between the Model and View, handling UI-related logic
Q255. Existing project deployment process-AWS
Our existing project deployment process on AWS involves using CI/CD pipelines for automated deployment.
We use AWS CodePipeline for orchestrating the deployment process
CodeBuild is used for building the application code
We leverage CloudFormation for infrastructure as code
Deployment is triggered automatically upon code commit to the repository
Q256. Explain some AWS Security services
AWS Security services help protect data, workloads, and applications in the cloud.
AWS Identity and Access Management (IAM) for managing user access
AWS Key Management Service (KMS) for encryption of data
AWS Web Application Firewall (WAF) for protection against web exploits
AWS Shield for DDoS protection
AWS Security Hub for centralized security monitoring
Q257. What four pillar of oops
The four pillars of OOP are encapsulation, inheritance, polymorphism, and abstraction.
Encapsulation: Bundling data and methods that operate on the data into a single unit.
Inheritance: Allowing a class to inherit properties and behavior from another class.
Polymorphism: The ability for objects of different classes to respond to the same message.
Abstraction: Hiding the complex implementation details and showing only the necessary features.
Q258. explain about Kubernetes architecture
Kubernetes is an open-source container orchestration platform that automates the deployment, scaling, and management of containerized applications.
Kubernetes follows a master-slave architecture with a master node and multiple worker nodes.
Master node components include API server, scheduler, controller manager, and etcd.
Worker node components include kubelet, kube-proxy, and container runtime (e.g. Docker).
Kubernetes uses Pods as the smallest deployable units, which can conta...read more
Q259. What is sizeof(arr)
Q260. Explain about oops
Object-oriented programming paradigm that focuses on objects and classes for code organization and reusability.
Encapsulation: Bundling data and methods that operate on the data into a single unit (object)
Inheritance: Ability for a class to inherit properties and behavior from another class
Polymorphism: Ability for objects of different classes to respond to the same method call in different ways
Q261. Realtime examples
Realtime examples of software engineering concepts
Implementing a chat application with real-time messaging using WebSockets
Developing a stock trading platform with live updates on stock prices
Creating a multiplayer online game with real-time player interactions
Q262. Sort the array in asc order
Sort array of strings in ascending order
Use built-in sort function in programming language
Specify comparison function to sort strings alphabetically
Example: ['apple', 'banana', 'cherry'] -> ['apple', 'banana', 'cherry']
Q263. How will you find xpath
XPath can be found using browser developer tools, inspecting elements, and using various XPath functions.
Use browser developer tools to inspect elements and generate XPath
Manually construct XPath using element attributes and hierarchy
Utilize XPath functions like contains(), starts-with(), and text() to create dynamic XPath
Consider using XPath axes like ancestor, following, and preceding to navigate the DOM
Q264. What is cloudhub 2.0
CloudHub 2.0 is a cloud-based integration platform that allows organizations to connect applications, data, and devices across multiple environments.
CloudHub 2.0 offers enhanced scalability and performance compared to its predecessor.
It provides a centralized platform for managing integrations, APIs, and data flows.
Organizations can use CloudHub 2.0 to streamline their business processes and improve efficiency.
Examples of features include real-time monitoring, automated workf...read more
Q265. How to break root's password
Breaking root's password is unethical and illegal. It is important to prioritize security and follow proper protocols.
It is unethical and illegal to break root's password without proper authorization.
Always follow security protocols and guidelines set by the organization.
If you suspect a security breach or unauthorized access, report it to the appropriate authorities.
Focus on implementing strong security measures to prevent unauthorized access.
Educate users on the importance ...read more
Q266. Functions in SQL Linear Regression
Functions in SQL are used to perform specific tasks on the data stored in a database.
SQL functions can be used to manipulate data, perform calculations, and retrieve specific information from a database.
Common SQL functions include aggregate functions (e.g., SUM, AVG), string functions (e.g., CONCAT, SUBSTRING), and date functions (e.g., DATEPART, GETDATE).
Functions can be used in SELECT statements, WHERE clauses, and other parts of SQL queries to modify or filter data.
For ex...read more
Q267. write Kubernetes service?
A Kubernetes service is an abstraction that defines a logical set of Pods and a policy by which to access them.
Services allow communication between different parts of an application or between different applications.
Services can be exposed internally within the cluster or externally to the internet.
Types of services include ClusterIP, NodePort, LoadBalancer, and ExternalName.
Services can be created using YAML manifests or through the Kubernetes API.
Q268. what is virtual Dom?
Virtual DOM is a lightweight copy of the actual DOM in memory, used for efficient updating of the real DOM.
Virtual DOM is a concept used in frameworks like React to improve performance by minimizing actual DOM manipulations.
Changes made to the virtual DOM are compared with the real DOM, and only the necessary updates are applied to the actual DOM.
This approach reduces the number of direct manipulations to the real DOM, resulting in faster rendering and better user experience.
Q269. What is Active Directory
Active Directory is a directory service developed by Microsoft for Windows domain networks.
Centralized database for managing network resources
Stores information about users, computers, and other network objects
Allows for authentication, authorization, and policy enforcement
Supports single sign-on for users across multiple applications
Example: Used in corporate environments to manage user accounts and permissions
Q270. Tools used for sourcing profiles
Various tools like LinkedIn, job boards, social media, and employee referrals are used for sourcing profiles.
LinkedIn
Job boards (e.g. Indeed, Glassdoor)
Social media platforms (e.g. Facebook, Twitter)
Employee referrals
Recruitment agencies
Q271. Your development in particular field
I have continuously improved my skills and knowledge in accounting through ongoing education and practical experience.
Completed advanced accounting courses to deepen understanding of complex financial concepts
Attended seminars and workshops to stay updated on industry trends and regulations
Gained hands-on experience by working on various accounting projects for different clients
Obtained professional certifications such as CPA to enhance credibility and expertise
Q272. Explain Oops pillars in short
OOP pillars include encapsulation, inheritance, and polymorphism for organizing code into reusable and maintainable components.
Encapsulation: Bundling data and methods that operate on the data into a single unit (class).
Inheritance: Creating new classes based on existing classes, allowing for code reuse and hierarchy.
Polymorphism: Objects of different classes can be treated as objects of a common superclass, enabling flexibility and extensibility.
Q273. what is BDD?
BDD stands for Behavior Driven Development, a software development approach that focuses on defining behavior through examples in plain language.
BDD is a collaborative approach that involves developers, testers, and business stakeholders.
It uses examples written in plain language to describe the behavior of the system.
BDD scenarios are typically written in a Given-When-Then format to define the preconditions, actions, and expected outcomes.
Tools like Cucumber and SpecFlow are...read more
Q274. Etl tester in test cases
Test cases for ETL testing involve validating data extraction, transformation, and loading processes.
Test cases should cover all possible scenarios for data extraction, transformation, and loading
Test cases should verify data accuracy, completeness, and consistency
Test cases should include negative scenarios such as invalid data or unexpected errors
Test cases should cover performance testing to ensure ETL processes meet SLAs
Test cases should be documented and repeatable
Exampl...read more
Q275. Explain a Network of Networks
A network of networks is a collection of interconnected networks that are connected together to form a larger network.
A network of networks is also known as an internet.
It allows for communication and data exchange between different networks.
Examples include the internet, which is a collection of interconnected networks around the world.
Another example is a corporate network that connects multiple branch offices together.
Networks of networks can be connected using various tec...read more
Q276. Expected CTC and Preferred Location
Expected CTC and preferred location are important factors to consider in a job interview.
Expected CTC refers to the salary or compensation package the candidate is expecting from the job.
Preferred location indicates the geographical area where the candidate would like to work.
These factors help the employer assess if the candidate's expectations align with the company's budget and location requirements.
Candidates should research industry standards and consider their experienc...read more
Q277. Microservices implementation
Microservices implementation involves breaking down a monolithic application into smaller, independent services.
Decompose the application into smaller services based on business capabilities
Use lightweight communication protocols like HTTP/REST or messaging queues for inter-service communication
Implement service discovery and load balancing for dynamic scaling
Containerize each service using tools like Docker and orchestrate them with Kubernetes
Monitor and manage services usin...read more
Q278. Reverse the array in place
Reverse the array of strings in place without using extra space
Iterate through the array using two pointers, one starting from the beginning and the other from the end
Swap the elements at the two pointers and move them towards the center until they meet or cross each other
Q279. what is frequency
Frequency is the number of occurrences of a repeating event per unit of time.
Frequency is measured in Hertz (Hz)
It is commonly used in signal processing, physics, and engineering
For example, the frequency of a sound wave determines its pitch
Q280. why semiconductor
Semiconductors are at the heart of modern technology, enabling the creation of electronic devices and systems.
Semiconductors are essential components in electronic devices such as computers, smartphones, and televisions.
They allow for the control and manipulation of electrical signals, enabling the functionality of these devices.
Advancements in semiconductor technology drive innovation in various industries, from automotive to telecommunications.
Working in the semiconductor f...read more
Q281. 1- largest number of array
The largest number in an array of strings.
Convert the array of strings to an array of numbers using parseInt() or parseFloat().
Use the Math.max() function to find the largest number in the array.
Handle cases where the array is empty or contains non-numeric strings.
Q282. Transformations in Informatica
Transformations in Informatica are used to manipulate and modify data during the ETL process.
Transformations are used to filter, aggregate, join, and sort data.
Examples of transformations include Filter, Aggregator, Joiner, and Sorter.
Transformations can be used to perform calculations, data cleansing, and data validation.
They can also be used to create new columns, merge data from multiple sources, and split data into multiple outputs.
Q283. Experiencein reach regulations
Experience in reach regulations is essential for ensuring compliance with environmental laws and regulations.
Familiarity with REACH (Registration, Evaluation, Authorization, and Restriction of Chemicals) regulations
Understanding of how REACH impacts software development processes
Ability to ensure software products comply with REACH requirements
Experience in managing data related to chemical substances in software applications
Q284. Order to cash process
Order to cash process involves the entire cycle from receiving an order to receiving payment.
Order creation
Order confirmation
Picking and packing
Delivery
Invoicing
Payment collection
Q285. List of Incoterms 2020
Incoterms 2020 are a set of international rules defining the responsibilities of buyers and sellers in international trade.
EXW - Ex Works
FCA - Free Carrier
CPT - Carriage Paid To
DAP - Delivered at Place
DDP - Delivered Duty Paid
Q286. What is AMM and ipc
AMM stands for Aircraft Maintenance Manual and IPC stands for Illustrated Parts Catalog.
AMM provides instructions for maintenance and repair of an aircraft.
IPC provides detailed illustrations and part numbers for all components of an aircraft.
AMM and IPC are essential documents for aircraft maintenance technicians.
AMM and IPC are often used in conjunction to troubleshoot and repair aircraft systems.
Q287. program for doubly linkedlist
A program for implementing a doubly linked list in a programming language.
Create a Node class with data and references to the previous and next nodes
Implement methods for adding, removing, and traversing the list
Handle edge cases like adding to an empty list or removing the last node
Q288. Explain Oops concepts
Object-oriented programming concepts that help in organizing and structuring code.
Encapsulation: Bundling data and methods together in a class.
Inheritance: Creating new classes from existing ones, inheriting their properties and behaviors.
Polymorphism: Objects of different classes can be treated as objects of a common superclass.
Abstraction: Hiding complex implementation details and providing simplified interfaces.
Encapsulation example: A car class with properties like color ...read more
Q289. What is DHCP, DNS,
DHCP and DNS are essential networking protocols used to assign IP addresses and translate domain names to IP addresses, respectively.
DHCP stands for Dynamic Host Configuration Protocol and is used to automatically assign IP addresses to devices on a network.
DNS stands for Domain Name System and is used to translate domain names (e.g. www.google.com) to IP addresses (e.g. 172.217.3.206).
DHCP helps in simplifying network administration by dynamically assigning IP addresses to d...read more
Q290. Identify Prime number or not
A prime number is a number greater than 1 that can only be divided by 1 and itself.
Check if the number is greater than 1
Iterate from 2 to the square root of the number and check if it divides the number evenly
If no divisor is found, the number is prime
Q291. Code for palindrom number
A palindrome number is a number that remains the same when its digits are reversed.
Convert the number to a string
Reverse the string
Compare the original string with the reversed string
Q292. Current project Framework
Our current project framework is based on Selenium WebDriver with TestNG for test automation.
Selenium WebDriver is used for automating web application testing
TestNG is used for test execution and reporting
Framework includes page object model design pattern for better code organization
Q294. Ready to relocate
Yes
I am ready and willing to relocate for the Senior Consultant position.
I have experience relocating for previous job opportunities.
I understand the importance of being flexible and adaptable in a consulting role.
I am open to exploring new cities and cultures as part of my professional growth.
Q295. Sort an single linked list
Q296. Please explain oops concepts
OOPs concepts refer to Object-Oriented Programming principles like Inheritance, Encapsulation, Polymorphism, and Abstraction.
Inheritance: Allows a class to inherit properties and behavior from another class.
Encapsulation: Bundling data and methods that operate on the data into a single unit.
Polymorphism: Ability to present the same interface for different data types.
Abstraction: Hiding the complex implementation details and showing only the necessary features.
Q297. Pricing procedure
Pricing procedure in SAP SD determines how prices are calculated for sales documents.
Pricing procedure is a set of condition types and access sequences that determine the pricing in sales documents.
It is assigned to a combination of sales area, document pricing procedure, and customer pricing procedure.
Example: Standard pricing procedure RVAA01 is commonly used in SAP SD.
Condition types in pricing procedure can be used for discounts, surcharges, taxes, etc.
Q298. Bifuel in CNG
Bifuel refers to vehicles that can run on two different types of fuel, such as CNG (Compressed Natural Gas) and gasoline.
Bifuel vehicles offer flexibility in fuel choice, allowing drivers to switch between CNG and gasoline based on availability and cost.
CNG is a cleaner alternative to gasoline, producing fewer emissions and reducing environmental impact.
Examples of bifuel vehicles include the Honda Civic GX, which runs on both CNG and gasoline.
Bifuel systems typically involve...read more
Q299. Draw CMOS inverter
A CMOS inverter is a basic building block in digital integrated circuits, consisting of a PMOS and NMOS transistor connected in series.
CMOS inverter consists of a PMOS transistor connected in series with an NMOS transistor.
The input is connected to the gates of both transistors, while the output is taken from the common node of the transistors.
When the input is high, the PMOS transistor is on and the NMOS transistor is off, resulting in a low output.
When the input is low, the...read more
Top HR Questions asked in Teleperformance
Interview Process at Teleperformance
Top Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month