Add office photos
Engaged Employer

Capgemini

3.7
based on 41.5k Reviews
Video summary
Proud winner of ABECA 2024 - AmbitionBox Employee Choice Awards
Filter interviews by

100+ Rahee Infratech Interview Questions and Answers

Updated 6 Jan 2025
Popular Designations

Q1. Could you tell me, which tools do you have used in test management and defect tracking?

Ans.

I have experience using JIRA and HP ALM for test management and defect tracking.

  • I have used JIRA extensively for managing test cases, test plans, and tracking defects.

  • I have also worked with HP ALM for test management and defect tracking.

  • Both tools have robust reporting capabilities that allow for easy tracking of project progress and defect resolution.

  • In addition, I have experience integrating these tools with other software development tools such as Jenkins and Git for cont...read more

View 8 more answers

Q2. 1). How pricing procedure is determine in SAP SD. 2). ASAP Methodology steps and your role as a SD Consultant. 3). GAPS during Implementation Project. 4). Condition technique for determining pricing procedure....

read more
Ans.

Questions related to SAP SD implementation and processes.

  • Pricing procedure is determined based on condition technique and can be customized as per business requirements.

  • ASAP methodology involves various phases like project preparation, business blueprint, realization, final preparation, and go-live and support.

  • GAPS during implementation project can arise due to differences between business requirements and system capabilities.

  • Condition technique involves defining access seque...read more

Add your answer

Q3. What type of testing you have done in your career and how many test cases written of the day?

Ans.

I have experience in functional, regression, integration, and acceptance testing. On average, I write 20-30 test cases per day.

  • Functional testing to ensure the software meets the requirements

  • Regression testing to ensure new changes do not break existing functionality

  • Integration testing to ensure different components work together

  • Acceptance testing to ensure the software meets the user's needs

  • On average, I write 20-30 test cases per day

  • Examples include testing a new feature on...read more

View 1 answer

Q4. What is agile fundamentals and theirs importance and waterfall model?

Ans.

Agile fundamentals are a set of principles and values that prioritize flexibility, collaboration, and continuous improvement in software development. Waterfall model is a traditional linear approach to software development.

  • Agile emphasizes iterative development and customer collaboration

  • Agile values individuals and interactions over processes and tools

  • Agile promotes responding to change over following a plan

  • Waterfall model follows a sequential approach to software development...read more

View 1 answer
Discover Rahee Infratech interview dos and don'ts from real experiences

Q5. What firewalls are you worked on? What are UTM firewalls? What is stateless and stateful inspection?

Ans.

Firewalls are network security devices that monitor and control incoming and outgoing network traffic. UTM firewalls provide additional security features such as antivirus, intrusion prevention, and content filtering. Stateless inspection examines each packet individually, while stateful inspection tracks the state of connections between packets.

  • Firewalls monitor and control network traffic

  • UTM firewalls provide additional security features

  • Stateless inspection examines each pa...read more

Add your answer

Q6. How to manipulate traffic in OSPF? How to link indirectly connected areas to backbone area? What are OSPF LSAs?

Ans.

OSPF traffic manipulation and linking indirectly connected areas to backbone area using LSAs.

  • OSPF traffic can be manipulated using various methods such as adjusting the cost metric or using route redistribution.

  • To link indirectly connected areas to the backbone area, a virtual link can be created through a transit area.

  • OSPF LSAs (Link State Advertisements) are packets that contain information about the network topology and are used by OSPF routers to build a complete map of t...read more

Add your answer
Are these interview questions helpful?

Q7. How much you give the star out of 5?

Ans.

I cannot give a star rating without knowing the specific context or criteria being evaluated.

  • I would need more information about what is being rated to give an accurate star rating.

  • It would be helpful to know the specific criteria or standards being used to evaluate the subject.

  • Without context, a star rating would be arbitrary and meaningless.

  • For example, if we are discussing a restaurant, I would need to know about the quality of the food, service, atmosphere, etc. before gi...read more

View 1 answer

Q8. Have you worked on BGP? What are the attributes? How to manipulate traffic using attributes?

Ans.

BGP is a routing protocol used in large networks. It has attributes that can be manipulated to control traffic flow.

  • BGP attributes include AS path, next hop, local preference, and MED.

  • AS path is used to prevent loops and determine the shortest path.

  • Next hop is used to determine the next router to send traffic to.

  • Local preference is used to determine the preferred path for outbound traffic.

  • MED is used to influence the path for inbound traffic.

  • Traffic can be manipulated by chan...read more

Add your answer
Share interview questions and help millions of jobseekers 🌟

Q9. Have you worked upon static routing? How do you increase AD in static routing?

Ans.

Yes, I have worked on static routing. AD can be increased by changing the administrative distance value.

  • Static routing is a type of routing where the routes are manually configured by the network administrator.

  • Administrative distance (AD) is a value assigned to a routing protocol or static route to indicate its trustworthiness.

  • To increase AD in static routing, we can change the administrative distance value to a higher number.

  • For example, if the current AD value is 1, we can ...read more

Add your answer

Q10. How can two systems communicate in different vlan over a switch?

Ans.

Two systems in different VLANs can communicate through a router or layer 3 switch.

  • A router or layer 3 switch is required to route traffic between VLANs

  • Each system must have a unique IP address within their respective VLANs

  • The router or layer 3 switch must have interfaces configured for each VLAN

  • The router or layer 3 switch must have a routing table that includes both VLANs

  • Firewall rules may need to be configured to allow traffic between VLANs

Add your answer

Q11. How to configure HSRP and VRRP? What are their differences? Have you worked on GLBP?

Ans.

HSRP and VRRP are protocols used to provide redundancy for IP addresses. GLBP is another protocol that provides load balancing.

  • HSRP and VRRP are used to provide redundancy for default gateways in a network.

  • HSRP is Cisco proprietary while VRRP is an open standard.

  • HSRP uses a virtual IP address while VRRP uses a virtual router ID.

  • GLBP is a Cisco proprietary protocol that provides load balancing between multiple gateways.

  • GLBP uses a virtual IP address and virtual MAC address to ...read more

Add your answer

Q12. How spanning tree will work in given topology? Have you worked on spanning tree manipulation?

Ans.

Spanning tree protocol prevents loops in a network by disabling redundant links.

  • Spanning tree protocol selects a root bridge and disables all other paths to prevent loops.

  • It uses a cost metric to determine the shortest path to the root bridge.

  • STP manipulation involves changing the cost metric to influence the path selection.

  • Examples of STP manipulation include changing port priorities or enabling portfast.

  • STP can be visualized using tools like Wireshark or Cisco's Packet Trac...read more

Add your answer

Q13. SDLC vs STLC? write test cases? explain ur project and framework? so many questions on framework regarding? how to report bug? what is agile scrum?

Ans.

Questions on SDLC, STLC, test cases, project framework, bug reporting, and Agile Scrum.

  • SDLC (Software Development Life Cycle) is the process of developing software from planning to deployment.

  • STLC (Software Testing Life Cycle) is the process of testing software from planning to deployment.

  • Test cases are written to ensure that software meets the requirements and functions as expected.

  • Project framework refers to the structure and organization of a project, including tools and p...read more

Add your answer

Q14. What is severity and priority?

Ans.

Severity and priority are terms used in issue management to indicate the impact and urgency of an issue.

  • Severity refers to the degree of impact an issue has on the system or business.

  • Priority refers to the urgency with which an issue needs to be addressed.

  • Issues with high severity and high priority should be addressed immediately.

  • Examples of high severity issues include system crashes or data loss.

  • Examples of high priority issues include critical business processes being affe...read more

View 1 answer

Q15. What types of load balancing have you configured?

Ans.

I have configured various types of load balancing including round-robin, least connections, and IP hash.

  • Round-robin distributes traffic evenly among servers

  • Least connections sends traffic to the server with the fewest active connections

  • IP hash uses the client's IP address to determine which server to send traffic to

Add your answer

Q16. If customer make payments then can we manually adjust through any screen

Ans.

Yes, we can manually adjust payments through the appropriate screen.

  • Adjustments can be made through the payment screen

  • Manual adjustments require appropriate permissions

  • Examples of adjustments include applying discounts or correcting errors

Add your answer

Q17. Why is Palo Alto called as Next Generation Firewall?

Ans.

Palo Alto is called Next Generation Firewall due to its advanced security features and capabilities.

  • Palo Alto offers application awareness and control, which allows it to identify and block threats that traditional firewalls cannot.

  • It uses machine learning and artificial intelligence to detect and prevent advanced threats.

  • Palo Alto provides visibility into network traffic and can enforce security policies based on user and device identity.

  • It offers integrated threat intellige...read more

Add your answer

Q18. What UTM features have you used in Palo Alto?

Ans.

I have used various UTM features in Palo Alto including antivirus, URL filtering, and file blocking.

  • Antivirus: Scans traffic for viruses and malware

  • URL filtering: Blocks access to malicious or inappropriate websites

  • File blocking: Prevents the transfer of specific file types

  • WildFire: Provides advanced threat detection and prevention

  • GlobalProtect: Secure remote access to corporate resources

  • Threat Prevention: Protects against known and unknown threats

Add your answer

Q19. What is cicd? Explain cicd pipeline in jenkins?

Ans.

CI/CD stands for Continuous Integration/Continuous Deployment. It is a software development practice that aims to automate the building, testing, and deployment of code changes.

  • CI/CD pipeline in Jenkins is a series of steps that automate the software delivery process.

  • It starts with the code being checked into a version control system like Git.

  • Jenkins then pulls the code and builds it, running automated tests to ensure it is working correctly.

  • If the tests pass, Jenkins deploys...read more

Add your answer

Q20. In FAS flow what are the data elements used in Simulator for Chip, Ecommerce and Magstripe

Ans.

The data elements used in FAS flow Simulator for Chip, Ecommerce and Magstripe are...

  • For Chip: Cardholder Verification Method (CVM), Terminal Verification Results (TVR), and Application Interchange Profile (AIP)

  • For Ecommerce: Card Verification Value (CVV), Address Verification Service (AVS), and Payment Card Industry Data Security Standard (PCI DSS)

  • For Magstripe: Track 1 and Track 2 data, Card Verification Value (CVV), and Magnetic Stripe Data (MSD)

Add your answer

Q21. Have you worked on load balancer?

Ans.

Yes, I have worked on load balancer.

  • I have experience in configuring and managing load balancers such as F5 and HAProxy.

  • I have worked on load balancing algorithms such as round-robin, least connections, and IP hash.

  • I have also implemented SSL offloading and health checks on load balancers.

  • One example of my work is setting up a load balancer for a web application to distribute traffic across multiple servers for high availability and scalability.

Add your answer

Q22. Which framework is used for automation testing? What is pytest framework? What is 200 response status?

Ans.

pytest is a Python testing framework used for automation testing. 200 response status indicates a successful HTTP request.

  • pytest is a popular Python testing framework used for automation testing

  • It allows for easy test creation and execution

  • pytest can be integrated with other testing tools such as Selenium

  • 200 response status is a HTTP status code indicating a successful request

  • It is commonly used in API testing to ensure that the request was successful

Add your answer

Q23. What are app-ids in Palo Alto Firewall?

Ans.

App-IDs are application identifiers used by Palo Alto Firewall to identify and control network traffic based on the application.

  • App-IDs are used to identify and control network traffic based on the application.

  • They are a set of unique identifiers assigned to each application recognized by the firewall.

  • Palo Alto Firewall uses App-IDs to enforce security policies and prevent unauthorized access to applications.

  • Examples of App-IDs include Facebook, Skype, and Dropbox.

Add your answer

Q24. How to configure SSL offloading in LB?

Ans.

SSL offloading in LB can be configured by terminating SSL at the LB and forwarding unencrypted traffic to backend servers.

  • Install SSL certificate on LB

  • Configure LB to terminate SSL

  • Forward unencrypted traffic to backend servers

  • Ensure backend servers are configured to accept unencrypted traffic

  • Use HTTP instead of HTTPS between LB and backend servers

  • Consider security implications of SSL offloading

Add your answer

Q25. Have you worked on any ticketing tools?

Ans.

Yes, I have worked on ticketing tools.

  • I have experience using JIRA for issue tracking and project management.

  • I have also used Zendesk for customer support ticketing.

  • In addition, I have worked with ServiceNow for IT service management.

  • I am familiar with creating and managing tickets, assigning tasks, and tracking progress.

  • I understand the importance of clear communication and timely resolution of issues.

Add your answer

Q26. What is VPN, Basic networking commands and troubleshooting steps

Ans.

VPN is a secure way to connect to a network remotely. Basic networking commands include ping, ipconfig, and tracert. Troubleshooting steps involve checking network settings and connectivity.

  • VPN stands for Virtual Private Network and is used to securely connect to a network remotely

  • Basic networking commands include ping to test connectivity, ipconfig to view network settings, and tracert to trace the route of network packets

  • Troubleshooting steps involve checking network settin...read more

Add your answer

Q27. How do you upgrade OS of Palo Alto?

Ans.

To upgrade OS of Palo Alto, download the new version from the support portal and install it via the web interface or CLI.

  • Download the new version from the support portal

  • Check the release notes and upgrade guide for any prerequisites or compatibility issues

  • Backup the configuration before upgrading

  • Upgrade via the web interface or CLI

  • Reboot the device after the upgrade

  • Verify the upgrade was successful

Add your answer

Q28. Explain defect life cycle?

Ans.

Defect life cycle is the process of identifying, reporting, prioritizing, fixing, and verifying defects in software development.

  • Defect is identified by testers or users

  • Defect is reported to development team

  • Defect is prioritized based on its severity and impact

  • Defect is fixed by developers

  • Defect fix is verified by testers

  • Defect is closed if it passes verification or reopened if it fails

  • Defect data is analyzed to improve future development

  • Example: Defect found in login function...read more

Add your answer

Q29. Tell about Credit card life cycle

Ans.

Credit card life cycle involves application, approval, usage, payment, and closure.

  • Application: Customer applies for a credit card.

  • Approval: Bank approves or rejects the application based on credit score and other factors.

  • Usage: Customer uses the credit card to make purchases and payments.

  • Payment: Customer pays the credit card bill on time to avoid interest and penalties.

  • Closure: Customer can close the credit card account if no longer needed or switch to a different card.

  • Exam...read more

Add your answer

Q30. Multifile system and their partition. 2 way to 4 way and vice versa

Ans.

Multifile system partition can be changed from 2 way to 4 way and vice versa.

  • Multifile system allows for partitioning of data across multiple files.

  • Partition can be changed from 2 way to 4 way and vice versa.

  • Partitioning can improve performance and organization of data.

Add your answer

Q31. How to deploy the SSIS Packages?

Ans.

SSIS Packages can be deployed using SQL Server Management Studio or the dtutil utility.

  • Deploy using SQL Server Management Studio by connecting to Integration Services and importing the package.

  • Deploy using dtutil utility by running a command like dtutil /FILE package.dtsx /COPY SQL;"FolderName" /QUIET.

Add your answer

Q32. Why periodic review done in GXP and for software?

Ans.

Periodic review is necessary in GXP and software to ensure compliance and identify potential risks.

  • Periodic review helps to ensure that GXP processes and software remain compliant with regulations and standards.

  • It also helps to identify potential risks and areas for improvement.

  • For example, periodic review of a software system may reveal a bug or vulnerability that needs to be addressed.

  • Similarly, periodic review of GXP processes may identify areas where additional training o...read more

Add your answer

Q33. What are the types of meta argument in terraform

Ans.

Meta arguments in Terraform are used to control the behavior of resources and modules.

  • Meta arguments are used to set values that affect the behavior of resources and modules.

  • Some common meta arguments include 'depends_on', 'count', and 'lifecycle'.

  • Meta arguments can be set at the resource or module level.

  • For example, 'depends_on' can be used to specify dependencies between resources.

  • Another example is 'count', which can be used to create multiple instances of a resource.

  • The '...read more

Add your answer

Q34. Java program for pyramid structure numbers Arrays , micro services, threads

Ans.

Java program to print pyramid structure of numbers

  • Use nested loops to print the pyramid structure

  • The outer loop will iterate through the rows

  • The inner loop will iterate through the columns

  • Use a counter variable to keep track of the numbers to be printed

  • Print the numbers in the desired format using printf or println

Add your answer

Q35. What type of integration using in SF ONB to EC

Ans.

SF ONB uses Dell Boomi for integration with EC

  • SF ONB uses Dell Boomi middleware for integration with EC

  • Dell Boomi provides pre-built connectors for SF ONB and EC

  • Integration can be configured for data flow between SF ONB and EC

  • Data can be synced in real-time or scheduled batches

Add your answer

Q36. What is blue screen of death and how to fix it

Ans.

Blue Screen of Death (BSOD) is an error screen displayed on Windows operating systems when a system error occurs.

  • BSOD is caused by hardware or software issues

  • To fix it, try restarting the computer or running a system diagnostic

  • Update drivers and software, check for malware, and replace faulty hardware if necessary

Add your answer

Q37. Reformat and fbe similarity and difference

Ans.

Reformat and compare similarity and difference.

  • Reformatting involves changing the structure or layout of data.

  • Similarity refers to how alike two things are, while difference refers to how they are not alike.

  • Comparing similarity and difference can help identify patterns or relationships in data.

  • For example, comparing the similarity and difference between two sets of customer data can help identify common traits or preferences.

  • Reformatting the data to make it easier to compare ...read more

Add your answer

Q38. Lookup vs lookup local function and various lookup function

Ans.

Lookup functions are used to search for values in a table or range. Lookup local function is used to search within a specific range.

  • Lookup functions include VLOOKUP, HLOOKUP, INDEX/MATCH, and XLOOKUP.

  • VLOOKUP searches for a value in the first column of a table and returns a corresponding value in the same row from a specified column.

  • HLOOKUP searches for a value in the first row of a table and returns a corresponding value in the same column from a specified row.

  • INDEX/MATCH use...read more

Add your answer

Q39. Would you be open to relocating PAN India as per requirement

Ans.

Yes, I am open to relocating PAN India as per requirement.

  • I am flexible and willing to relocate to different parts of India as needed for the job.

  • I understand the importance of being adaptable and open to new opportunities.

  • I have previous experience relocating for work and have found it to be a positive experience.

Add your answer

Q40. How much cost would we require if we want to paint the offices and res buildings in your city

Ans.

The cost of painting offices and residential buildings in my city varies depending on factors such as size, location, and quality of paint.

  • Cost will depend on the size of the area to be painted - larger areas will cost more

  • Location of the buildings can also impact the cost - urban areas may have higher costs than rural areas

  • Quality of paint chosen will affect the overall cost - higher quality paints are more expensive

  • Labor costs for painters should also be considered in the t...read more

Add your answer

Q41. Name of the layouts in clearing for both Mastercard and Visa

Ans.

The layouts in clearing for Mastercard and Visa are Standard and World.

  • Mastercard has two layouts in clearing: Standard and World.

  • Visa also has two layouts in clearing: Standard and World.

  • The Standard layout is used for regular transactions, while the World layout is used for premium cards with additional benefits.

  • The World layout includes additional data fields such as cardholder name, address, and phone number.

  • The World layout also includes a unique identifier for the card ...read more

Add your answer

Q42. What is the use of AWS S3 and how can it be deployed using terraform script

Ans.

AWS S3 is a scalable object storage service used to store and retrieve data. It can be deployed using Terraform script.

  • AWS S3 is used for storing and retrieving any amount of data from anywhere on the web.

  • It provides high durability, availability, and scalability.

  • S3 can be used for backup and restore, data archiving, content distribution, and data lakes.

  • Terraform is an infrastructure as code tool that allows you to define and provision AWS resources.

  • Using Terraform script, yo...read more

Add your answer

Q43. Write the SQL Queries, Stored Procedures?

Ans.

SQL queries and stored procedures

  • Use SELECT, INSERT, UPDATE, DELETE for SQL queries

  • Use CREATE PROCEDURE, BEGIN, END for stored procedures

  • Parameterize queries to prevent SQL injection

  • Use transactions for atomicity and consistency

  • Optimize queries for performance

Add your answer

Q44. Write that complex Queries in SQL Server?

Ans.

Writing complex SQL queries in SQL Server

  • Use subqueries to retrieve data from multiple tables

  • Utilize joins to combine data from different tables

  • Use aggregate functions like SUM, COUNT, AVG for calculations

  • Implement nested queries for more advanced filtering

  • Utilize common table expressions (CTEs) for better readability and performance

Add your answer

Q45. Can we edit terraform state file manually

Ans.

No, editing terraform state file manually is not recommended.

  • Terraform state file should only be modified through Terraform commands.

  • Manual editing can cause inconsistencies and lead to unexpected behavior.

  • If necessary, use Terraform import to bring existing resources under Terraform management.

  • Always backup the state file before making any changes.

Add your answer

Q46. Difference. Bw sort and sort within groups.

Ans.

Sort arranges data in ascending or descending order. Sort within groups sorts data within groups based on a specified column.

  • Sort orders data based on a single column, while sort within groups orders data within groups based on a specified column.

  • Sort can be used to sort data in a table or array, while sort within groups is typically used in data analysis to sort data within groups.

  • For example, sorting a list of names alphabetically is a simple sort, while sorting a list of n...read more

Add your answer

Q47. tell about ratings in DC Technology and their functionalities

Ans.

DC Technology ratings are used to evaluate performance and functionality of devices.

  • DC Technology ratings are used to assess the quality and performance of devices in the data center environment.

  • These ratings help in comparing different devices based on their efficiency, reliability, and overall functionality.

  • Examples of DC Technology ratings include Power Usage Effectiveness (PUE), Data Center Infrastructure Efficiency (DCiE), and IT Equipment Efficiency (ITEE).

Add your answer

Q48. What are the standard transaction commands and what are they

Ans.

Standard transaction commands are used in databases to manipulate data.

  • INSERT: Used to add new records to a table

  • SELECT: Used to retrieve data from a table

  • UPDATE: Used to modify existing records in a table

  • DELETE: Used to remove records from a table

Add your answer

Q49. Terraform code to create one ec2 region in each region

Ans.

Create one EC2 region in each region using Terraform code.

  • Use Terraform's AWS provider to create EC2 instances in each region.

  • Use a for loop to iterate over all regions and create an EC2 instance in each.

  • Use variables to specify the instance type, AMI, and other configuration options.

  • Use Terraform's output variables to display the instance IDs and other information.

  • Use Terraform's state file to manage the infrastructure and track changes over time.

Add your answer

Q50. What's the difference between IPV4 and IPV6

Ans.

IPv4 uses 32-bit addresses while IPv6 uses 128-bit addresses.

  • IPv4 has a maximum of 4.3 billion unique addresses while IPv6 can support 340 undecillion unique addresses.

  • IPv6 has built-in security features while IPv4 does not.

  • IPv6 uses a different format for addressing and routing compared to IPv4.

  • IPv6 allows for better quality of service (QoS) compared to IPv4.

  • IPv6 is gradually replacing IPv4 due to the exhaustion of IPv4 addresses.

Add your answer

Q51. Authorization flow while triggering though simulator

Ans.

Authorization flow for triggering through simulator

  • Simulator should authenticate with the authorization server using client credentials

  • Simulator should request an access token from the authorization server

  • Simulator should include the access token in the API request to the resource server

  • Resource server should validate the access token before granting access to the requested resource

Add your answer

Q52. what is inheritance in java and explain it with example

Ans.

Inheritance is a mechanism in Java where a class acquires the properties and methods of another class.

  • Inheritance allows for code reuse and promotes a hierarchical organization of classes.

  • The class that is being inherited from is called the superclass or parent class.

  • The class that inherits from the superclass is called the subclass or child class.

  • The subclass can access the public and protected members of the superclass.

  • Example: class Dog extends Animal { // Dog is a subclas...read more

Add your answer

Q53. What is python? Difference b/w python and java? Explain oops concepts Some coding python

Ans.

Python is a high-level programming language known for its simplicity and readability.

  • Python is an interpreted language, while Java is a compiled language.

  • Python has a simpler syntax and requires fewer lines of code compared to Java.

  • Python is dynamically typed, whereas Java is statically typed.

  • Python has a strong focus on code readability and ease of use.

  • Python has a large standard library with built-in modules for various tasks.

  • Python supports both procedural and object-orien...read more

Add your answer

Q54. What is terraform state file?

Ans.

Terraform state file is a JSON file that stores the current state of infrastructure managed by Terraform.

  • It contains information about resources created by Terraform, their current state, and metadata.

  • It is used to plan and apply changes to infrastructure.

  • It can be stored locally or remotely in a backend like S3 or Consul.

  • It should be treated as sensitive data and stored securely.

  • It can be manually edited, but this is not recommended.

  • It can be shared among team members to col...read more

Add your answer

Q55. What is data resources in terraform

Ans.

Data resources in Terraform are used to import existing data into the Terraform state.

  • Data resources allow Terraform to reference data that is not managed by Terraform itself.

  • They can be used to import data from external sources like APIs, databases, or files.

  • Data resources are defined using the 'data' block in a Terraform configuration file.

  • Examples of data resources include AWS S3 bucket objects, AWS RDS database instances, and local files.

  • Data resources are read-only and c...read more

Add your answer

Q56. Could you please tell difference between promise and observables

Ans.

Promises and Observables are both used for handling asynchronous operations in JavaScript, but they have some differences.

  • Promises are used for handling a single asynchronous operation and return a single value or error.

  • Observables are used for handling multiple asynchronous operations and can return multiple values over time.

  • Promises are eager and start executing as soon as they are created, while Observables are lazy and only start executing when subscribed to.

  • Promises can ...read more

Add your answer

Q57. What do you know about Data Analytics

Ans.

Data Analytics is the process of examining data sets to draw conclusions about the information they contain.

  • It involves collecting, cleaning, and transforming data

  • It uses statistical and computational methods to analyze data

  • It helps in making data-driven decisions and predictions

  • Examples include customer segmentation, fraud detection, and predictive maintenance

Add your answer

Q58. What are different file system in linux

Ans.

Different file systems in Linux include ext4, XFS, Btrfs, and ZFS.

  • ext4 is the default file system for most Linux distributions

  • XFS is known for its scalability and performance

  • Btrfs supports features like snapshots and checksums

  • ZFS is a powerful file system with advanced data management capabilities

Add your answer

Q59. What is promise in javascript, when to use it

Ans.

Promise is a way to handle asynchronous operations in JavaScript.

  • Promises represent a value that may not be available yet, but will be resolved at some point in the future.

  • They are used to handle asynchronous operations such as fetching data from a server or reading a file.

  • Promises have three states: pending, fulfilled, or rejected.

  • They can be chained together using .then() and .catch() methods.

  • Promises help avoid callback hell and make code more readable and maintainable.

Add your answer

Q60. What are semantic elements and when to use them

Ans.

Semantic elements are HTML tags that provide meaning to the content they enclose.

  • Semantic elements help improve SEO by providing search engines with better understanding of the content.

  • They also improve accessibility for users with disabilities by providing clearer structure.

  • Examples of semantic elements include <header>, <footer>, <nav>, <article>, <section>, <aside>, <main>.

Add your answer

Q61. What are oops concepts?describe them.

Ans.

Oops concepts are the fundamental principles of object-oriented programming.

  • Abstraction: Hiding implementation details and showing only necessary information.

  • Encapsulation: Binding data and functions together in a single unit.

  • Inheritance: Acquiring properties and behavior of a parent class by a child class.

  • Polymorphism: Ability of an object to take many forms or have multiple behaviors.

  • Example: A car is an object that has properties like color, model, and behavior like starti...read more

Add your answer

Q62. Explain master slave architecture in jenkins

Ans.

Master-slave architecture in Jenkins allows for distributed builds and scalability.

  • Master node manages the build system and delegates tasks to slave nodes

  • Slave nodes execute build tasks and report back to the master node

  • Multiple slave nodes can be added to a single master node for increased capacity

  • Slave nodes can be configured to run on different operating systems or hardware

  • Master node can also act as a slave node if needed

Add your answer

Q63. What is load balancer in aws?

Ans.

Load balancer in AWS distributes incoming traffic across multiple targets.

  • Load balancer helps improve availability and fault tolerance of applications.

  • It can automatically route traffic to healthy targets and avoid unhealthy ones.

  • AWS offers three types of load balancers: Application Load Balancer, Network Load Balancer, and Classic Load Balancer.

  • Example: An Application Load Balancer can distribute traffic to different EC2 instances based on URL path or host header.

  • Example: A ...read more

Add your answer

Q64. Could you please share Components communication?

Ans.

Components communication refers to the way different parts of a system interact with each other.

  • Components can communicate through direct method calls or events.

  • In a client-server architecture, the client sends requests to the server and receives responses.

  • In a publish-subscribe architecture, components can subscribe to events and receive notifications when those events occur.

  • Communication can also happen through shared data structures or message passing.

  • Effective communicati...read more

Add your answer

Q65. What is OOPS Concepts? What is Kotlin Coroutines? Explain MVVM architecture.

Ans.

OOPS Concepts are fundamental principles of Object-Oriented Programming. Kotlin Coroutines are used for asynchronous programming. MVVM architecture separates UI from business logic.

  • OOPS Concepts include Inheritance, Encapsulation, Polymorphism, and Abstraction.

  • Kotlin Coroutines are used in Kotlin for asynchronous programming to simplify code that executes asynchronously.

  • MVVM architecture stands for Model-View-ViewModel, where the ViewModel acts as a link between the Model and...read more

Add your answer

Q66. What is the difference between SQL and PLSQL

Ans.

SQL is a standard language for managing relational databases, while PLSQL is Oracle's proprietary extension for SQL with procedural capabilities.

  • SQL is a standard language used to manage and manipulate data in relational databases.

  • PLSQL is Oracle's proprietary extension to SQL, adding procedural capabilities like loops and conditional statements.

  • SQL is used for querying and updating data, while PLSQL is used for writing stored procedures, functions, and triggers.

  • SQL is a decl...read more

Add your answer

Q67. Could you please tell angular life cycle?

Ans.

Angular life cycle refers to the series of events that occur from the creation of a component to its destruction.

  • ngOnChanges - called when an input property changes

  • ngOnInit - called once after the first ngOnChanges

  • ngDoCheck - called during every change detection cycle

  • ngAfterContentInit - called after content is projected into component

  • ngAfterContentChecked - called after every check of projected content

  • ngAfterViewInit - called after component's view has been initialized

  • ngAfte...read more

Add your answer

Q68. Write the code read json as spark data frame

Ans.

Code to read JSON as Spark DataFrame

  • Use SparkSession to create a DataFrameReader

  • Specify the JSON file path and schema

  • Use the reader to load the JSON file as a DataFrame

Add your answer

Q69. Could you please tell API integration with example

Ans.

API integration is the process of connecting different software applications through APIs.

  • API integration allows different applications to communicate and share data seamlessly.

  • For example, a social media platform may integrate with a third-party analytics tool to track user engagement.

  • API integration can also be used to automate tasks, such as syncing data between different systems.

  • APIs can be integrated using various methods, such as REST, SOAP, and GraphQL.

  • API integration ...read more

Add your answer

Q70. What is curl? How we can used it.

Ans.

Curl is a command-line tool for transferring data with URL syntax.

  • Curl is used to transfer data to or from a server using various protocols like HTTP, HTTPS, FTP, etc.

  • It can be used to download files, upload files, test APIs, and perform other network-related tasks.

  • Example: curl https://www.example.com -o output.txt

Add your answer

Q71. What is a collection framework??

Ans.

A collection framework is a set of classes and interfaces that provide a way to store and manipulate groups of objects.

  • It provides implementations of commonly used data structures like lists, sets, maps, etc.

  • It allows for easy manipulation of data stored in these structures.

  • Examples include Java's Collection and Map interfaces and their implementations like ArrayList, HashSet, and HashMap.

Add your answer

Q72. How to create Base 2 file

Ans.

A Base 2 file can be created by converting data into binary format.

  • Convert the data into binary format using a programming language or tool

  • Save the binary data into a file with a .bin extension

  • Ensure that the file can be read and interpreted as binary data

Add your answer

Q73. Tell me about database flow for copy prod to test

Ans.

Database flow for copying production data to test environment

  • Create a backup of the production database

  • Restore the backup to the test environment

  • Anonymize sensitive data in the test environment

  • Update connection strings and configurations in the test environment

  • Test the data integrity and functionality in the test environment

Add your answer

Q74. When ONB2.0 will come on live.

Ans.

The release date for ONB2.0 has not been announced yet.

  • There has been no official announcement regarding the release date of ONB2.0.

  • It is best to keep an eye on the company's website or social media pages for updates.

  • The release date may also depend on various factors such as testing and development progress.

  • It is important to note that rushing the release of a product can lead to potential issues and bugs.

Add your answer

Q75. Write sql query for this scenarios?

Ans.

SQL query for scenario

  • Identify the tables involved

  • Determine the columns needed

  • Specify the conditions for filtering data

  • Use appropriate joins to combine tables

Add your answer

Q76. What are linked lists?

Ans.

Linked lists are a data structure consisting of nodes that point to the next node in the list.

  • Each node contains a value and a pointer to the next node.

  • Linked lists can be singly or doubly linked.

  • Insertion and deletion are efficient, but random access is not.

  • Examples include a queue, stack, and adjacency list.

Add your answer

Q77. what are the basic Accounting rules

Ans.

Basic Accounting rules are principles and guidelines that govern the preparation of financial statements.

  • Accrual principle - revenue and expenses are recorded when they are earned or incurred, not when cash is exchanged.

  • Conservatism principle - assets and revenues should not be overstated, while liabilities and expenses should not be understated.

  • Consistency principle - accounting methods and practices should be consistent from one period to another.

  • Matching principle - expens...read more

Add your answer

Q78. What is OOP and python basic concept

Ans.

OOP stands for Object-Oriented Programming, a programming paradigm based on the concept of objects.

  • OOP focuses on creating objects that contain data and methods to manipulate that data.

  • Python is a high-level programming language that supports OOP principles.

  • In Python, classes are used to create objects, and inheritance allows classes to inherit attributes and methods from other classes.

Add your answer

Q79. What is SQL and it's basic function

Ans.

SQL is a programming language used for managing and manipulating databases.

  • SQL stands for Structured Query Language

  • It is used to communicate with databases to perform tasks such as querying data, updating data, and creating databases

  • Examples of SQL commands include SELECT, INSERT, UPDATE, DELETE

Add your answer

Q80. What is the diff between JRE and JDK

Ans.

JRE is for running Java applications, while JDK is for developing and running Java applications.

  • JRE stands for Java Runtime Environment and is used for running Java applications.

  • JDK stands for Java Development Kit and is used for developing and running Java applications.

  • JDK includes JRE, as well as development tools such as compilers and debuggers.

  • JRE is necessary to run Java applications, while JDK is necessary to develop and run Java applications.

Add your answer

Q81. Tell me how we can get the product from

Ans.

We can get the product from the manufacturer directly or through distributors.

  • Contacting the manufacturer for direct purchase

  • Finding local or online distributors

  • Checking retail stores or online marketplaces for availability

Add your answer

Q82. Lookup caches when we use dynamic cache

Ans.

Lookup caches are used in dynamic cache to improve performance by storing frequently accessed data.

  • Lookup caches store frequently accessed data in memory to reduce the number of database queries.

  • They can be configured to expire after a certain amount of time or when the data is updated.

  • Lookup caches can be used to improve performance in scenarios such as user authentication or product pricing.

  • Examples of lookup cache frameworks include Ehcache and Hazelcast.

Add your answer

Q83. What is abstact class?

Ans.

An abstract class is a class that cannot be instantiated and is used as a base class for other classes.

  • An abstract class can have abstract methods that must be implemented by its derived classes.

  • An abstract class can have non-abstract methods and fields.

  • An abstract class can be used to define a common interface for a group of related classes.

  • Example: The Shape class can be an abstract class with abstract methods like getArea() and getPerimeter() that must be implemented by it...read more

Add your answer

Q84. Explain user management in jenkins

Ans.

User management in Jenkins involves creating and managing user accounts with different levels of access.

  • Jenkins allows creating user accounts with different levels of access such as administrator, developer, and read-only access.

  • Users can be added, edited, and deleted from the Jenkins dashboard.

  • Jenkins also supports authentication and authorization mechanisms such as LDAP, Active Directory, and OAuth.

  • Plugins can be installed to enhance user management capabilities.

  • User manage...read more

Add your answer

Q85. What are the phases of implementation

Ans.

The phases of implementation include planning, design, development, testing, deployment, and maintenance.

  • Planning phase involves defining project scope, goals, and timeline.

  • Design phase focuses on creating a detailed blueprint of the project.

  • Development phase involves building the actual product or solution.

  • Testing phase is where the product is tested for bugs and errors.

  • Deployment phase involves releasing the product to users.

  • Maintenance phase includes ongoing support, updat...read more

Add your answer

Q86. Difference between resident and presiding load

Ans.

Resident load is the weight of the structure itself, while presiding load is the weight of the objects placed on the structure.

  • Resident load is the constant weight that a structure must support, such as the weight of the walls, floors, and roof.

  • Presiding load is the weight of the objects placed on the structure, such as furniture, equipment, and people.

  • Presiding load is temporary and can vary, while resident load is constant.

  • The design of a structure must take into account bo...read more

Add your answer

Q87. What is regression and retesting

Ans.

Regression is the process of retesting software to ensure that new code changes have not adversely affected existing functionality.

  • Regression testing involves running tests on previously tested software to make sure that new changes have not introduced any new bugs or issues.

  • Retesting is the process of running tests on specific areas of the software that have been modified to ensure that the changes have been implemented correctly.

  • Regression testing is typically automated to ...read more

Add your answer

Q88. What are scope of Spring Bean?

Ans.

Scope of Spring Bean refers to the lifecycle of a bean and its visibility within the application context.

  • There are several scopes of Spring Bean such as Singleton, Prototype, Request, Session, and Global Session.

  • Singleton scope creates only one instance of a bean and is the default scope.

  • Prototype scope creates a new instance of a bean every time it is requested.

  • Request scope creates a new instance of a bean for each HTTP request.

  • Session scope creates a new instance of a bean...read more

Add your answer

Q89. What is java and how can write code

Ans.

Java is a popular programming language used for developing applications, websites, and software.

  • Java is an object-oriented language, meaning it focuses on objects and classes.

  • To write code in Java, you need to have a text editor or an IDE (Integrated Development Environment) installed on your computer.

  • You write Java code in files with a .java extension, and then compile it using a Java compiler to generate bytecode that can be executed by the Java Virtual Machine (JVM).

  • Here i...read more

Add your answer

Q90. Explain css position property with examples

Ans.

CSS position property determines the positioning method of an element.

  • There are four values for position property: static, relative, absolute, and fixed.

  • Static is the default value and elements are positioned according to the normal flow of the document.

  • Relative is positioned relative to its normal position.

  • Absolute is positioned relative to the nearest positioned ancestor.

  • Fixed is positioned relative to the viewport.

  • Top, bottom, left, and right properties are used to positio...read more

Add your answer

Q91. What is firewall? Firewall types?VPN?

Ans.

A firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules. There are several types of firewalls including packet filtering, proxy, stateful inspection, and next-generation firewalls. VPN (Virtual Private Network) is a technology that creates a secure connection over a public network such as the internet.

  • Firewall is a network security system that monitors and controls network traffic.

  • Types of ...read more

Add your answer

Q92. How do we map the paths

Ans.

Mapping paths involves identifying and visualizing the routes or connections between different points or elements.

  • Identify the starting point and ending point of the path

  • Determine the possible routes or connections between the points

  • Use mapping tools or software to visualize the paths

  • Consider factors such as distance, time, and obstacles when mapping paths

Add your answer

Q93. what is Budgeting &amp; Forecasting

Ans.

Budgeting & Forecasting involves creating financial plans for the future based on past data and current trends.

  • Budgeting involves setting financial goals and allocating resources accordingly

  • Forecasting involves predicting future financial outcomes based on historical data and market trends

  • Both processes are essential for effective financial management and decision-making

  • Examples include creating an annual budget for a company, forecasting sales for the upcoming quarter

Add your answer

Q94. What is mean by hash map

Ans.

A hash map is a data structure that stores key-value pairs and allows for fast retrieval of values based on their keys.

  • Hash maps use a hash function to map keys to indices in an array.

  • Collisions can occur when multiple keys map to the same index, which can be resolved using techniques like chaining or open addressing.

  • Examples of hash maps include Python's dict, Java's HashMap, and JavaScript's Map.

Add your answer

Q95. Write a code to find palindrome number?

Ans.

Code to find palindrome number

  • Convert the number to a string

  • Reverse the string

  • Compare the original string with the reversed string to check for palindrome

Add your answer

Q96. Why string is immutable?

Ans.

String is immutable because it cannot be modified once created.

  • Immutable objects are safer to use in multi-threaded environments.

  • String pool in Java is possible because of immutability.

  • StringBuffer and StringBuilder classes are used for mutable strings.

Add your answer

Q97. HPC cluster description

Ans.

HPC cluster is a group of interconnected computers that work together to solve complex problems.

  • HPC stands for High Performance Computing

  • Clusters can be made up of hundreds or thousands of individual computers

  • They are used for tasks such as scientific simulations, data analysis, and machine learning

  • Examples of HPC clusters include IBM Blue Gene, Cray XC, and NVIDIA DGX

  • They require specialized software and hardware to function properly

Add your answer

Q98. Types of loads and data modeling

Ans.

Types of loads include static, dynamic, and thermal. Data modeling involves creating a representation of data and its relationships.

  • Static loads are constant and do not change over time, such as the weight of a building.

  • Dynamic loads are variable and can change over time, such as wind or seismic activity.

  • Thermal loads are caused by temperature changes, such as expansion or contraction of materials.

  • Data modeling involves creating a conceptual representation of data and its rel...read more

Add your answer

Q99. What is SQL joins?

Ans.

SQL joins are used to combine data from two or more tables based on a related column.

  • Joins are used to retrieve data from multiple tables in a single query

  • Common types of joins include inner join, left join, right join, and full outer join

  • Joins are performed based on a related column between the tables

  • Example: SELECT * FROM table1 INNER JOIN table2 ON table1.column = table2.column

Add your answer

Q100. write a query for fetching the data

Ans.

Write a query for fetching the data.

  • Specify the table(s) from which the data needs to be fetched

  • Define the columns to be selected

  • Add any necessary conditions using WHERE clause

  • Use JOIN clause if data needs to be fetched from multiple tables

  • Specify any required sorting using ORDER BY clause

  • Limit the number of rows returned using LIMIT clause

Add your answer
1
2
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos

Interview Process at Rahee Infratech

based on 187 interviews
5 Interview rounds
Technical Round
HR Round - 1
HR Round - 2
HR Round - 3
HR Round - 4
View more
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Associate Consultant Interview Questions from Similar Companies

3.7
 • 35 Interview Questions
3.7
 • 22 Interview Questions
3.5
 • 13 Interview Questions
3.9
 • 12 Interview Questions
3.9
 • 11 Interview Questions
View all
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
70 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter