Capgemini
100+ Rahee Infratech Interview Questions and Answers
Q1. Could you tell me, which tools do you have used in test management and defect tracking?
I have experience using JIRA and HP ALM for test management and defect tracking.
I have used JIRA extensively for managing test cases, test plans, and tracking defects.
I have also worked with HP ALM for test management and defect tracking.
Both tools have robust reporting capabilities that allow for easy tracking of project progress and defect resolution.
In addition, I have experience integrating these tools with other software development tools such as Jenkins and Git for cont...read more
Q2. 1). How pricing procedure is determine in SAP SD. 2). ASAP Methodology steps and your role as a SD Consultant. 3). GAPS during Implementation Project. 4). Condition technique for determining pricing procedure....
read moreQuestions related to SAP SD implementation and processes.
Pricing procedure is determined based on condition technique and can be customized as per business requirements.
ASAP methodology involves various phases like project preparation, business blueprint, realization, final preparation, and go-live and support.
GAPS during implementation project can arise due to differences between business requirements and system capabilities.
Condition technique involves defining access seque...read more
Q3. What type of testing you have done in your career and how many test cases written of the day?
I have experience in functional, regression, integration, and acceptance testing. On average, I write 20-30 test cases per day.
Functional testing to ensure the software meets the requirements
Regression testing to ensure new changes do not break existing functionality
Integration testing to ensure different components work together
Acceptance testing to ensure the software meets the user's needs
On average, I write 20-30 test cases per day
Examples include testing a new feature on...read more
Q4. What is agile fundamentals and theirs importance and waterfall model?
Agile fundamentals are a set of principles and values that prioritize flexibility, collaboration, and continuous improvement in software development. Waterfall model is a traditional linear approach to software development.
Agile emphasizes iterative development and customer collaboration
Agile values individuals and interactions over processes and tools
Agile promotes responding to change over following a plan
Waterfall model follows a sequential approach to software development...read more
Q5. What firewalls are you worked on? What are UTM firewalls? What is stateless and stateful inspection?
Firewalls are network security devices that monitor and control incoming and outgoing network traffic. UTM firewalls provide additional security features such as antivirus, intrusion prevention, and content filtering. Stateless inspection examines each packet individually, while stateful inspection tracks the state of connections between packets.
Firewalls monitor and control network traffic
UTM firewalls provide additional security features
Stateless inspection examines each pa...read more
Q6. How to manipulate traffic in OSPF? How to link indirectly connected areas to backbone area? What are OSPF LSAs?
OSPF traffic manipulation and linking indirectly connected areas to backbone area using LSAs.
OSPF traffic can be manipulated using various methods such as adjusting the cost metric or using route redistribution.
To link indirectly connected areas to the backbone area, a virtual link can be created through a transit area.
OSPF LSAs (Link State Advertisements) are packets that contain information about the network topology and are used by OSPF routers to build a complete map of t...read more
Q7. How much you give the star out of 5?
I cannot give a star rating without knowing the specific context or criteria being evaluated.
I would need more information about what is being rated to give an accurate star rating.
It would be helpful to know the specific criteria or standards being used to evaluate the subject.
Without context, a star rating would be arbitrary and meaningless.
For example, if we are discussing a restaurant, I would need to know about the quality of the food, service, atmosphere, etc. before gi...read more
Q8. Have you worked on BGP? What are the attributes? How to manipulate traffic using attributes?
BGP is a routing protocol used in large networks. It has attributes that can be manipulated to control traffic flow.
BGP attributes include AS path, next hop, local preference, and MED.
AS path is used to prevent loops and determine the shortest path.
Next hop is used to determine the next router to send traffic to.
Local preference is used to determine the preferred path for outbound traffic.
MED is used to influence the path for inbound traffic.
Traffic can be manipulated by chan...read more
Q9. Have you worked upon static routing? How do you increase AD in static routing?
Yes, I have worked on static routing. AD can be increased by changing the administrative distance value.
Static routing is a type of routing where the routes are manually configured by the network administrator.
Administrative distance (AD) is a value assigned to a routing protocol or static route to indicate its trustworthiness.
To increase AD in static routing, we can change the administrative distance value to a higher number.
For example, if the current AD value is 1, we can ...read more
Q10. How can two systems communicate in different vlan over a switch?
Two systems in different VLANs can communicate through a router or layer 3 switch.
A router or layer 3 switch is required to route traffic between VLANs
Each system must have a unique IP address within their respective VLANs
The router or layer 3 switch must have interfaces configured for each VLAN
The router or layer 3 switch must have a routing table that includes both VLANs
Firewall rules may need to be configured to allow traffic between VLANs
Q11. How to configure HSRP and VRRP? What are their differences? Have you worked on GLBP?
HSRP and VRRP are protocols used to provide redundancy for IP addresses. GLBP is another protocol that provides load balancing.
HSRP and VRRP are used to provide redundancy for default gateways in a network.
HSRP is Cisco proprietary while VRRP is an open standard.
HSRP uses a virtual IP address while VRRP uses a virtual router ID.
GLBP is a Cisco proprietary protocol that provides load balancing between multiple gateways.
GLBP uses a virtual IP address and virtual MAC address to ...read more
Q12. How spanning tree will work in given topology? Have you worked on spanning tree manipulation?
Spanning tree protocol prevents loops in a network by disabling redundant links.
Spanning tree protocol selects a root bridge and disables all other paths to prevent loops.
It uses a cost metric to determine the shortest path to the root bridge.
STP manipulation involves changing the cost metric to influence the path selection.
Examples of STP manipulation include changing port priorities or enabling portfast.
STP can be visualized using tools like Wireshark or Cisco's Packet Trac...read more
Q13. SDLC vs STLC? write test cases? explain ur project and framework? so many questions on framework regarding? how to report bug? what is agile scrum?
Questions on SDLC, STLC, test cases, project framework, bug reporting, and Agile Scrum.
SDLC (Software Development Life Cycle) is the process of developing software from planning to deployment.
STLC (Software Testing Life Cycle) is the process of testing software from planning to deployment.
Test cases are written to ensure that software meets the requirements and functions as expected.
Project framework refers to the structure and organization of a project, including tools and p...read more
Q14. What is severity and priority?
Severity and priority are terms used in issue management to indicate the impact and urgency of an issue.
Severity refers to the degree of impact an issue has on the system or business.
Priority refers to the urgency with which an issue needs to be addressed.
Issues with high severity and high priority should be addressed immediately.
Examples of high severity issues include system crashes or data loss.
Examples of high priority issues include critical business processes being affe...read more
Q15. What types of load balancing have you configured?
I have configured various types of load balancing including round-robin, least connections, and IP hash.
Round-robin distributes traffic evenly among servers
Least connections sends traffic to the server with the fewest active connections
IP hash uses the client's IP address to determine which server to send traffic to
Q16. If customer make payments then can we manually adjust through any screen
Yes, we can manually adjust payments through the appropriate screen.
Adjustments can be made through the payment screen
Manual adjustments require appropriate permissions
Examples of adjustments include applying discounts or correcting errors
Q17. Why is Palo Alto called as Next Generation Firewall?
Palo Alto is called Next Generation Firewall due to its advanced security features and capabilities.
Palo Alto offers application awareness and control, which allows it to identify and block threats that traditional firewalls cannot.
It uses machine learning and artificial intelligence to detect and prevent advanced threats.
Palo Alto provides visibility into network traffic and can enforce security policies based on user and device identity.
It offers integrated threat intellige...read more
Q18. What UTM features have you used in Palo Alto?
I have used various UTM features in Palo Alto including antivirus, URL filtering, and file blocking.
Antivirus: Scans traffic for viruses and malware
URL filtering: Blocks access to malicious or inappropriate websites
File blocking: Prevents the transfer of specific file types
WildFire: Provides advanced threat detection and prevention
GlobalProtect: Secure remote access to corporate resources
Threat Prevention: Protects against known and unknown threats
Q19. What is cicd? Explain cicd pipeline in jenkins?
CI/CD stands for Continuous Integration/Continuous Deployment. It is a software development practice that aims to automate the building, testing, and deployment of code changes.
CI/CD pipeline in Jenkins is a series of steps that automate the software delivery process.
It starts with the code being checked into a version control system like Git.
Jenkins then pulls the code and builds it, running automated tests to ensure it is working correctly.
If the tests pass, Jenkins deploys...read more
Q20. In FAS flow what are the data elements used in Simulator for Chip, Ecommerce and Magstripe
The data elements used in FAS flow Simulator for Chip, Ecommerce and Magstripe are...
For Chip: Cardholder Verification Method (CVM), Terminal Verification Results (TVR), and Application Interchange Profile (AIP)
For Ecommerce: Card Verification Value (CVV), Address Verification Service (AVS), and Payment Card Industry Data Security Standard (PCI DSS)
For Magstripe: Track 1 and Track 2 data, Card Verification Value (CVV), and Magnetic Stripe Data (MSD)
Q21. Have you worked on load balancer?
Yes, I have worked on load balancer.
I have experience in configuring and managing load balancers such as F5 and HAProxy.
I have worked on load balancing algorithms such as round-robin, least connections, and IP hash.
I have also implemented SSL offloading and health checks on load balancers.
One example of my work is setting up a load balancer for a web application to distribute traffic across multiple servers for high availability and scalability.
Q22. Which framework is used for automation testing? What is pytest framework? What is 200 response status?
pytest is a Python testing framework used for automation testing. 200 response status indicates a successful HTTP request.
pytest is a popular Python testing framework used for automation testing
It allows for easy test creation and execution
pytest can be integrated with other testing tools such as Selenium
200 response status is a HTTP status code indicating a successful request
It is commonly used in API testing to ensure that the request was successful
Q23. What are app-ids in Palo Alto Firewall?
App-IDs are application identifiers used by Palo Alto Firewall to identify and control network traffic based on the application.
App-IDs are used to identify and control network traffic based on the application.
They are a set of unique identifiers assigned to each application recognized by the firewall.
Palo Alto Firewall uses App-IDs to enforce security policies and prevent unauthorized access to applications.
Examples of App-IDs include Facebook, Skype, and Dropbox.
Q24. How to configure SSL offloading in LB?
SSL offloading in LB can be configured by terminating SSL at the LB and forwarding unencrypted traffic to backend servers.
Install SSL certificate on LB
Configure LB to terminate SSL
Forward unencrypted traffic to backend servers
Ensure backend servers are configured to accept unencrypted traffic
Use HTTP instead of HTTPS between LB and backend servers
Consider security implications of SSL offloading
Q25. Have you worked on any ticketing tools?
Yes, I have worked on ticketing tools.
I have experience using JIRA for issue tracking and project management.
I have also used Zendesk for customer support ticketing.
In addition, I have worked with ServiceNow for IT service management.
I am familiar with creating and managing tickets, assigning tasks, and tracking progress.
I understand the importance of clear communication and timely resolution of issues.
Q26. What is VPN, Basic networking commands and troubleshooting steps
VPN is a secure way to connect to a network remotely. Basic networking commands include ping, ipconfig, and tracert. Troubleshooting steps involve checking network settings and connectivity.
VPN stands for Virtual Private Network and is used to securely connect to a network remotely
Basic networking commands include ping to test connectivity, ipconfig to view network settings, and tracert to trace the route of network packets
Troubleshooting steps involve checking network settin...read more
Q27. How do you upgrade OS of Palo Alto?
To upgrade OS of Palo Alto, download the new version from the support portal and install it via the web interface or CLI.
Download the new version from the support portal
Check the release notes and upgrade guide for any prerequisites or compatibility issues
Backup the configuration before upgrading
Upgrade via the web interface or CLI
Reboot the device after the upgrade
Verify the upgrade was successful
Q28. Explain defect life cycle?
Defect life cycle is the process of identifying, reporting, prioritizing, fixing, and verifying defects in software development.
Defect is identified by testers or users
Defect is reported to development team
Defect is prioritized based on its severity and impact
Defect is fixed by developers
Defect fix is verified by testers
Defect is closed if it passes verification or reopened if it fails
Defect data is analyzed to improve future development
Example: Defect found in login function...read more
Q29. Tell about Credit card life cycle
Credit card life cycle involves application, approval, usage, payment, and closure.
Application: Customer applies for a credit card.
Approval: Bank approves or rejects the application based on credit score and other factors.
Usage: Customer uses the credit card to make purchases and payments.
Payment: Customer pays the credit card bill on time to avoid interest and penalties.
Closure: Customer can close the credit card account if no longer needed or switch to a different card.
Exam...read more
Q30. Multifile system and their partition. 2 way to 4 way and vice versa
Multifile system partition can be changed from 2 way to 4 way and vice versa.
Multifile system allows for partitioning of data across multiple files.
Partition can be changed from 2 way to 4 way and vice versa.
Partitioning can improve performance and organization of data.
Q31. How to deploy the SSIS Packages?
SSIS Packages can be deployed using SQL Server Management Studio or the dtutil utility.
Deploy using SQL Server Management Studio by connecting to Integration Services and importing the package.
Deploy using dtutil utility by running a command like dtutil /FILE package.dtsx /COPY SQL;"FolderName" /QUIET.
Q32. Why periodic review done in GXP and for software?
Periodic review is necessary in GXP and software to ensure compliance and identify potential risks.
Periodic review helps to ensure that GXP processes and software remain compliant with regulations and standards.
It also helps to identify potential risks and areas for improvement.
For example, periodic review of a software system may reveal a bug or vulnerability that needs to be addressed.
Similarly, periodic review of GXP processes may identify areas where additional training o...read more
Q33. What are the types of meta argument in terraform
Meta arguments in Terraform are used to control the behavior of resources and modules.
Meta arguments are used to set values that affect the behavior of resources and modules.
Some common meta arguments include 'depends_on', 'count', and 'lifecycle'.
Meta arguments can be set at the resource or module level.
For example, 'depends_on' can be used to specify dependencies between resources.
Another example is 'count', which can be used to create multiple instances of a resource.
The '...read more
Q34. Java program for pyramid structure numbers Arrays , micro services, threads
Java program to print pyramid structure of numbers
Use nested loops to print the pyramid structure
The outer loop will iterate through the rows
The inner loop will iterate through the columns
Use a counter variable to keep track of the numbers to be printed
Print the numbers in the desired format using printf or println
Q35. What type of integration using in SF ONB to EC
SF ONB uses Dell Boomi for integration with EC
SF ONB uses Dell Boomi middleware for integration with EC
Dell Boomi provides pre-built connectors for SF ONB and EC
Integration can be configured for data flow between SF ONB and EC
Data can be synced in real-time or scheduled batches
Q36. What is blue screen of death and how to fix it
Blue Screen of Death (BSOD) is an error screen displayed on Windows operating systems when a system error occurs.
BSOD is caused by hardware or software issues
To fix it, try restarting the computer or running a system diagnostic
Update drivers and software, check for malware, and replace faulty hardware if necessary
Q37. Reformat and fbe similarity and difference
Reformat and compare similarity and difference.
Reformatting involves changing the structure or layout of data.
Similarity refers to how alike two things are, while difference refers to how they are not alike.
Comparing similarity and difference can help identify patterns or relationships in data.
For example, comparing the similarity and difference between two sets of customer data can help identify common traits or preferences.
Reformatting the data to make it easier to compare ...read more
Q38. Lookup vs lookup local function and various lookup function
Lookup functions are used to search for values in a table or range. Lookup local function is used to search within a specific range.
Lookup functions include VLOOKUP, HLOOKUP, INDEX/MATCH, and XLOOKUP.
VLOOKUP searches for a value in the first column of a table and returns a corresponding value in the same row from a specified column.
HLOOKUP searches for a value in the first row of a table and returns a corresponding value in the same column from a specified row.
INDEX/MATCH use...read more
Q39. Would you be open to relocating PAN India as per requirement
Yes, I am open to relocating PAN India as per requirement.
I am flexible and willing to relocate to different parts of India as needed for the job.
I understand the importance of being adaptable and open to new opportunities.
I have previous experience relocating for work and have found it to be a positive experience.
Q40. How much cost would we require if we want to paint the offices and res buildings in your city
The cost of painting offices and residential buildings in my city varies depending on factors such as size, location, and quality of paint.
Cost will depend on the size of the area to be painted - larger areas will cost more
Location of the buildings can also impact the cost - urban areas may have higher costs than rural areas
Quality of paint chosen will affect the overall cost - higher quality paints are more expensive
Labor costs for painters should also be considered in the t...read more
Q41. Name of the layouts in clearing for both Mastercard and Visa
The layouts in clearing for Mastercard and Visa are Standard and World.
Mastercard has two layouts in clearing: Standard and World.
Visa also has two layouts in clearing: Standard and World.
The Standard layout is used for regular transactions, while the World layout is used for premium cards with additional benefits.
The World layout includes additional data fields such as cardholder name, address, and phone number.
The World layout also includes a unique identifier for the card ...read more
Q42. What is the use of AWS S3 and how can it be deployed using terraform script
AWS S3 is a scalable object storage service used to store and retrieve data. It can be deployed using Terraform script.
AWS S3 is used for storing and retrieving any amount of data from anywhere on the web.
It provides high durability, availability, and scalability.
S3 can be used for backup and restore, data archiving, content distribution, and data lakes.
Terraform is an infrastructure as code tool that allows you to define and provision AWS resources.
Using Terraform script, yo...read more
Q43. Write the SQL Queries, Stored Procedures?
SQL queries and stored procedures
Use SELECT, INSERT, UPDATE, DELETE for SQL queries
Use CREATE PROCEDURE, BEGIN, END for stored procedures
Parameterize queries to prevent SQL injection
Use transactions for atomicity and consistency
Optimize queries for performance
Q44. Write that complex Queries in SQL Server?
Writing complex SQL queries in SQL Server
Use subqueries to retrieve data from multiple tables
Utilize joins to combine data from different tables
Use aggregate functions like SUM, COUNT, AVG for calculations
Implement nested queries for more advanced filtering
Utilize common table expressions (CTEs) for better readability and performance
Q45. Can we edit terraform state file manually
No, editing terraform state file manually is not recommended.
Terraform state file should only be modified through Terraform commands.
Manual editing can cause inconsistencies and lead to unexpected behavior.
If necessary, use Terraform import to bring existing resources under Terraform management.
Always backup the state file before making any changes.
Q46. Difference. Bw sort and sort within groups.
Sort arranges data in ascending or descending order. Sort within groups sorts data within groups based on a specified column.
Sort orders data based on a single column, while sort within groups orders data within groups based on a specified column.
Sort can be used to sort data in a table or array, while sort within groups is typically used in data analysis to sort data within groups.
For example, sorting a list of names alphabetically is a simple sort, while sorting a list of n...read more
Q47. tell about ratings in DC Technology and their functionalities
DC Technology ratings are used to evaluate performance and functionality of devices.
DC Technology ratings are used to assess the quality and performance of devices in the data center environment.
These ratings help in comparing different devices based on their efficiency, reliability, and overall functionality.
Examples of DC Technology ratings include Power Usage Effectiveness (PUE), Data Center Infrastructure Efficiency (DCiE), and IT Equipment Efficiency (ITEE).
Q48. What are the standard transaction commands and what are they
Standard transaction commands are used in databases to manipulate data.
INSERT: Used to add new records to a table
SELECT: Used to retrieve data from a table
UPDATE: Used to modify existing records in a table
DELETE: Used to remove records from a table
Q49. Terraform code to create one ec2 region in each region
Create one EC2 region in each region using Terraform code.
Use Terraform's AWS provider to create EC2 instances in each region.
Use a for loop to iterate over all regions and create an EC2 instance in each.
Use variables to specify the instance type, AMI, and other configuration options.
Use Terraform's output variables to display the instance IDs and other information.
Use Terraform's state file to manage the infrastructure and track changes over time.
Q50. What's the difference between IPV4 and IPV6
IPv4 uses 32-bit addresses while IPv6 uses 128-bit addresses.
IPv4 has a maximum of 4.3 billion unique addresses while IPv6 can support 340 undecillion unique addresses.
IPv6 has built-in security features while IPv4 does not.
IPv6 uses a different format for addressing and routing compared to IPv4.
IPv6 allows for better quality of service (QoS) compared to IPv4.
IPv6 is gradually replacing IPv4 due to the exhaustion of IPv4 addresses.
Q51. Authorization flow while triggering though simulator
Authorization flow for triggering through simulator
Simulator should authenticate with the authorization server using client credentials
Simulator should request an access token from the authorization server
Simulator should include the access token in the API request to the resource server
Resource server should validate the access token before granting access to the requested resource
Q52. what is inheritance in java and explain it with example
Inheritance is a mechanism in Java where a class acquires the properties and methods of another class.
Inheritance allows for code reuse and promotes a hierarchical organization of classes.
The class that is being inherited from is called the superclass or parent class.
The class that inherits from the superclass is called the subclass or child class.
The subclass can access the public and protected members of the superclass.
Example: class Dog extends Animal { // Dog is a subclas...read more
Q53. What is python? Difference b/w python and java? Explain oops concepts Some coding python
Python is a high-level programming language known for its simplicity and readability.
Python is an interpreted language, while Java is a compiled language.
Python has a simpler syntax and requires fewer lines of code compared to Java.
Python is dynamically typed, whereas Java is statically typed.
Python has a strong focus on code readability and ease of use.
Python has a large standard library with built-in modules for various tasks.
Python supports both procedural and object-orien...read more
Q54. What is terraform state file?
Terraform state file is a JSON file that stores the current state of infrastructure managed by Terraform.
It contains information about resources created by Terraform, their current state, and metadata.
It is used to plan and apply changes to infrastructure.
It can be stored locally or remotely in a backend like S3 or Consul.
It should be treated as sensitive data and stored securely.
It can be manually edited, but this is not recommended.
It can be shared among team members to col...read more
Q55. What is data resources in terraform
Data resources in Terraform are used to import existing data into the Terraform state.
Data resources allow Terraform to reference data that is not managed by Terraform itself.
They can be used to import data from external sources like APIs, databases, or files.
Data resources are defined using the 'data' block in a Terraform configuration file.
Examples of data resources include AWS S3 bucket objects, AWS RDS database instances, and local files.
Data resources are read-only and c...read more
Q56. Could you please tell difference between promise and observables
Promises and Observables are both used for handling asynchronous operations in JavaScript, but they have some differences.
Promises are used for handling a single asynchronous operation and return a single value or error.
Observables are used for handling multiple asynchronous operations and can return multiple values over time.
Promises are eager and start executing as soon as they are created, while Observables are lazy and only start executing when subscribed to.
Promises can ...read more
Q57. What do you know about Data Analytics
Data Analytics is the process of examining data sets to draw conclusions about the information they contain.
It involves collecting, cleaning, and transforming data
It uses statistical and computational methods to analyze data
It helps in making data-driven decisions and predictions
Examples include customer segmentation, fraud detection, and predictive maintenance
Q58. What are different file system in linux
Different file systems in Linux include ext4, XFS, Btrfs, and ZFS.
ext4 is the default file system for most Linux distributions
XFS is known for its scalability and performance
Btrfs supports features like snapshots and checksums
ZFS is a powerful file system with advanced data management capabilities
Q59. What is promise in javascript, when to use it
Promise is a way to handle asynchronous operations in JavaScript.
Promises represent a value that may not be available yet, but will be resolved at some point in the future.
They are used to handle asynchronous operations such as fetching data from a server or reading a file.
Promises have three states: pending, fulfilled, or rejected.
They can be chained together using .then() and .catch() methods.
Promises help avoid callback hell and make code more readable and maintainable.
Q60. What are semantic elements and when to use them
Semantic elements are HTML tags that provide meaning to the content they enclose.
Semantic elements help improve SEO by providing search engines with better understanding of the content.
They also improve accessibility for users with disabilities by providing clearer structure.
Examples of semantic elements include <header>, <footer>, <nav>, <article>, <section>, <aside>, <main>.
Q61. What are oops concepts?describe them.
Oops concepts are the fundamental principles of object-oriented programming.
Abstraction: Hiding implementation details and showing only necessary information.
Encapsulation: Binding data and functions together in a single unit.
Inheritance: Acquiring properties and behavior of a parent class by a child class.
Polymorphism: Ability of an object to take many forms or have multiple behaviors.
Example: A car is an object that has properties like color, model, and behavior like starti...read more
Q62. Explain master slave architecture in jenkins
Master-slave architecture in Jenkins allows for distributed builds and scalability.
Master node manages the build system and delegates tasks to slave nodes
Slave nodes execute build tasks and report back to the master node
Multiple slave nodes can be added to a single master node for increased capacity
Slave nodes can be configured to run on different operating systems or hardware
Master node can also act as a slave node if needed
Q63. What is load balancer in aws?
Load balancer in AWS distributes incoming traffic across multiple targets.
Load balancer helps improve availability and fault tolerance of applications.
It can automatically route traffic to healthy targets and avoid unhealthy ones.
AWS offers three types of load balancers: Application Load Balancer, Network Load Balancer, and Classic Load Balancer.
Example: An Application Load Balancer can distribute traffic to different EC2 instances based on URL path or host header.
Example: A ...read more
Q64. Could you please share Components communication?
Components communication refers to the way different parts of a system interact with each other.
Components can communicate through direct method calls or events.
In a client-server architecture, the client sends requests to the server and receives responses.
In a publish-subscribe architecture, components can subscribe to events and receive notifications when those events occur.
Communication can also happen through shared data structures or message passing.
Effective communicati...read more
Q65. What is OOPS Concepts? What is Kotlin Coroutines? Explain MVVM architecture.
OOPS Concepts are fundamental principles of Object-Oriented Programming. Kotlin Coroutines are used for asynchronous programming. MVVM architecture separates UI from business logic.
OOPS Concepts include Inheritance, Encapsulation, Polymorphism, and Abstraction.
Kotlin Coroutines are used in Kotlin for asynchronous programming to simplify code that executes asynchronously.
MVVM architecture stands for Model-View-ViewModel, where the ViewModel acts as a link between the Model and...read more
Q66. What is the difference between SQL and PLSQL
SQL is a standard language for managing relational databases, while PLSQL is Oracle's proprietary extension for SQL with procedural capabilities.
SQL is a standard language used to manage and manipulate data in relational databases.
PLSQL is Oracle's proprietary extension to SQL, adding procedural capabilities like loops and conditional statements.
SQL is used for querying and updating data, while PLSQL is used for writing stored procedures, functions, and triggers.
SQL is a decl...read more
Q67. Could you please tell angular life cycle?
Angular life cycle refers to the series of events that occur from the creation of a component to its destruction.
ngOnChanges - called when an input property changes
ngOnInit - called once after the first ngOnChanges
ngDoCheck - called during every change detection cycle
ngAfterContentInit - called after content is projected into component
ngAfterContentChecked - called after every check of projected content
ngAfterViewInit - called after component's view has been initialized
ngAfte...read more
Q68. Write the code read json as spark data frame
Code to read JSON as Spark DataFrame
Use SparkSession to create a DataFrameReader
Specify the JSON file path and schema
Use the reader to load the JSON file as a DataFrame
Q69. Could you please tell API integration with example
API integration is the process of connecting different software applications through APIs.
API integration allows different applications to communicate and share data seamlessly.
For example, a social media platform may integrate with a third-party analytics tool to track user engagement.
API integration can also be used to automate tasks, such as syncing data between different systems.
APIs can be integrated using various methods, such as REST, SOAP, and GraphQL.
API integration ...read more
Q70. What is curl? How we can used it.
Curl is a command-line tool for transferring data with URL syntax.
Curl is used to transfer data to or from a server using various protocols like HTTP, HTTPS, FTP, etc.
It can be used to download files, upload files, test APIs, and perform other network-related tasks.
Example: curl https://www.example.com -o output.txt
Q71. What is a collection framework??
A collection framework is a set of classes and interfaces that provide a way to store and manipulate groups of objects.
It provides implementations of commonly used data structures like lists, sets, maps, etc.
It allows for easy manipulation of data stored in these structures.
Examples include Java's Collection and Map interfaces and their implementations like ArrayList, HashSet, and HashMap.
Q72. How to create Base 2 file
A Base 2 file can be created by converting data into binary format.
Convert the data into binary format using a programming language or tool
Save the binary data into a file with a .bin extension
Ensure that the file can be read and interpreted as binary data
Q73. Tell me about database flow for copy prod to test
Database flow for copying production data to test environment
Create a backup of the production database
Restore the backup to the test environment
Anonymize sensitive data in the test environment
Update connection strings and configurations in the test environment
Test the data integrity and functionality in the test environment
Q74. When ONB2.0 will come on live.
The release date for ONB2.0 has not been announced yet.
There has been no official announcement regarding the release date of ONB2.0.
It is best to keep an eye on the company's website or social media pages for updates.
The release date may also depend on various factors such as testing and development progress.
It is important to note that rushing the release of a product can lead to potential issues and bugs.
Q75. Write sql query for this scenarios?
SQL query for scenario
Identify the tables involved
Determine the columns needed
Specify the conditions for filtering data
Use appropriate joins to combine tables
Q76. What are linked lists?
Linked lists are a data structure consisting of nodes that point to the next node in the list.
Each node contains a value and a pointer to the next node.
Linked lists can be singly or doubly linked.
Insertion and deletion are efficient, but random access is not.
Examples include a queue, stack, and adjacency list.
Q77. what are the basic Accounting rules
Basic Accounting rules are principles and guidelines that govern the preparation of financial statements.
Accrual principle - revenue and expenses are recorded when they are earned or incurred, not when cash is exchanged.
Conservatism principle - assets and revenues should not be overstated, while liabilities and expenses should not be understated.
Consistency principle - accounting methods and practices should be consistent from one period to another.
Matching principle - expens...read more
Q78. What is OOP and python basic concept
OOP stands for Object-Oriented Programming, a programming paradigm based on the concept of objects.
OOP focuses on creating objects that contain data and methods to manipulate that data.
Python is a high-level programming language that supports OOP principles.
In Python, classes are used to create objects, and inheritance allows classes to inherit attributes and methods from other classes.
Q79. What is SQL and it's basic function
SQL is a programming language used for managing and manipulating databases.
SQL stands for Structured Query Language
It is used to communicate with databases to perform tasks such as querying data, updating data, and creating databases
Examples of SQL commands include SELECT, INSERT, UPDATE, DELETE
Q80. What is the diff between JRE and JDK
JRE is for running Java applications, while JDK is for developing and running Java applications.
JRE stands for Java Runtime Environment and is used for running Java applications.
JDK stands for Java Development Kit and is used for developing and running Java applications.
JDK includes JRE, as well as development tools such as compilers and debuggers.
JRE is necessary to run Java applications, while JDK is necessary to develop and run Java applications.
Q81. Tell me how we can get the product from
We can get the product from the manufacturer directly or through distributors.
Contacting the manufacturer for direct purchase
Finding local or online distributors
Checking retail stores or online marketplaces for availability
Q82. Lookup caches when we use dynamic cache
Lookup caches are used in dynamic cache to improve performance by storing frequently accessed data.
Lookup caches store frequently accessed data in memory to reduce the number of database queries.
They can be configured to expire after a certain amount of time or when the data is updated.
Lookup caches can be used to improve performance in scenarios such as user authentication or product pricing.
Examples of lookup cache frameworks include Ehcache and Hazelcast.
Q83. What is abstact class?
An abstract class is a class that cannot be instantiated and is used as a base class for other classes.
An abstract class can have abstract methods that must be implemented by its derived classes.
An abstract class can have non-abstract methods and fields.
An abstract class can be used to define a common interface for a group of related classes.
Example: The Shape class can be an abstract class with abstract methods like getArea() and getPerimeter() that must be implemented by it...read more
Q84. Explain user management in jenkins
User management in Jenkins involves creating and managing user accounts with different levels of access.
Jenkins allows creating user accounts with different levels of access such as administrator, developer, and read-only access.
Users can be added, edited, and deleted from the Jenkins dashboard.
Jenkins also supports authentication and authorization mechanisms such as LDAP, Active Directory, and OAuth.
Plugins can be installed to enhance user management capabilities.
User manage...read more
Q85. What are the phases of implementation
The phases of implementation include planning, design, development, testing, deployment, and maintenance.
Planning phase involves defining project scope, goals, and timeline.
Design phase focuses on creating a detailed blueprint of the project.
Development phase involves building the actual product or solution.
Testing phase is where the product is tested for bugs and errors.
Deployment phase involves releasing the product to users.
Maintenance phase includes ongoing support, updat...read more
Q86. Difference between resident and presiding load
Resident load is the weight of the structure itself, while presiding load is the weight of the objects placed on the structure.
Resident load is the constant weight that a structure must support, such as the weight of the walls, floors, and roof.
Presiding load is the weight of the objects placed on the structure, such as furniture, equipment, and people.
Presiding load is temporary and can vary, while resident load is constant.
The design of a structure must take into account bo...read more
Q87. What is regression and retesting
Regression is the process of retesting software to ensure that new code changes have not adversely affected existing functionality.
Regression testing involves running tests on previously tested software to make sure that new changes have not introduced any new bugs or issues.
Retesting is the process of running tests on specific areas of the software that have been modified to ensure that the changes have been implemented correctly.
Regression testing is typically automated to ...read more
Q88. What are scope of Spring Bean?
Scope of Spring Bean refers to the lifecycle of a bean and its visibility within the application context.
There are several scopes of Spring Bean such as Singleton, Prototype, Request, Session, and Global Session.
Singleton scope creates only one instance of a bean and is the default scope.
Prototype scope creates a new instance of a bean every time it is requested.
Request scope creates a new instance of a bean for each HTTP request.
Session scope creates a new instance of a bean...read more
Q89. What is java and how can write code
Java is a popular programming language used for developing applications, websites, and software.
Java is an object-oriented language, meaning it focuses on objects and classes.
To write code in Java, you need to have a text editor or an IDE (Integrated Development Environment) installed on your computer.
You write Java code in files with a .java extension, and then compile it using a Java compiler to generate bytecode that can be executed by the Java Virtual Machine (JVM).
Here i...read more
Q90. Explain css position property with examples
CSS position property determines the positioning method of an element.
There are four values for position property: static, relative, absolute, and fixed.
Static is the default value and elements are positioned according to the normal flow of the document.
Relative is positioned relative to its normal position.
Absolute is positioned relative to the nearest positioned ancestor.
Fixed is positioned relative to the viewport.
Top, bottom, left, and right properties are used to positio...read more
Q91. What is firewall? Firewall types?VPN?
A firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules. There are several types of firewalls including packet filtering, proxy, stateful inspection, and next-generation firewalls. VPN (Virtual Private Network) is a technology that creates a secure connection over a public network such as the internet.
Firewall is a network security system that monitors and controls network traffic.
Types of ...read more
Q92. How do we map the paths
Mapping paths involves identifying and visualizing the routes or connections between different points or elements.
Identify the starting point and ending point of the path
Determine the possible routes or connections between the points
Use mapping tools or software to visualize the paths
Consider factors such as distance, time, and obstacles when mapping paths
Q93. what is Budgeting & Forecasting
Budgeting & Forecasting involves creating financial plans for the future based on past data and current trends.
Budgeting involves setting financial goals and allocating resources accordingly
Forecasting involves predicting future financial outcomes based on historical data and market trends
Both processes are essential for effective financial management and decision-making
Examples include creating an annual budget for a company, forecasting sales for the upcoming quarter
Q94. What is mean by hash map
A hash map is a data structure that stores key-value pairs and allows for fast retrieval of values based on their keys.
Hash maps use a hash function to map keys to indices in an array.
Collisions can occur when multiple keys map to the same index, which can be resolved using techniques like chaining or open addressing.
Examples of hash maps include Python's dict, Java's HashMap, and JavaScript's Map.
Q95. Write a code to find palindrome number?
Code to find palindrome number
Convert the number to a string
Reverse the string
Compare the original string with the reversed string to check for palindrome
Q96. Why string is immutable?
String is immutable because it cannot be modified once created.
Immutable objects are safer to use in multi-threaded environments.
String pool in Java is possible because of immutability.
StringBuffer and StringBuilder classes are used for mutable strings.
Q97. HPC cluster description
HPC cluster is a group of interconnected computers that work together to solve complex problems.
HPC stands for High Performance Computing
Clusters can be made up of hundreds or thousands of individual computers
They are used for tasks such as scientific simulations, data analysis, and machine learning
Examples of HPC clusters include IBM Blue Gene, Cray XC, and NVIDIA DGX
They require specialized software and hardware to function properly
Q98. Types of loads and data modeling
Types of loads include static, dynamic, and thermal. Data modeling involves creating a representation of data and its relationships.
Static loads are constant and do not change over time, such as the weight of a building.
Dynamic loads are variable and can change over time, such as wind or seismic activity.
Thermal loads are caused by temperature changes, such as expansion or contraction of materials.
Data modeling involves creating a conceptual representation of data and its rel...read more
Q99. What is SQL joins?
SQL joins are used to combine data from two or more tables based on a related column.
Joins are used to retrieve data from multiple tables in a single query
Common types of joins include inner join, left join, right join, and full outer join
Joins are performed based on a related column between the tables
Example: SELECT * FROM table1 INNER JOIN table2 ON table1.column = table2.column
Q100. write a query for fetching the data
Write a query for fetching the data.
Specify the table(s) from which the data needs to be fetched
Define the columns to be selected
Add any necessary conditions using WHERE clause
Use JOIN clause if data needs to be fetched from multiple tables
Specify any required sorting using ORDER BY clause
Limit the number of rows returned using LIMIT clause
More about working at Capgemini
Top HR Questions asked in Rahee Infratech
Interview Process at Rahee Infratech
Top Associate Consultant Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month