Capgemini
100+ Micro Turners Interview Questions and Answers
Q1. What are the different file replication strategies in Azure blob storage ?
Azure blob storage supports three file replication strategies: LRS, ZRS, and GRS.
LRS (Locally Redundant Storage) replicates data within a single data center.
ZRS (Zone Redundant Storage) replicates data across multiple data centers within a single region.
GRS (Geo-Redundant Storage) replicates data across multiple data centers in two separate regions for added redundancy.
Read-access geo-redundant storage (RA-GRS) provides read access to the data in the secondary region in case ...read more
Q2. What is workflow,trigger, different types of reports, roles, profiles, permission set, sharing rules etc?
Workflow, trigger, reports, roles, profiles, permission set, and sharing rules are all important features in Salesforce.
Workflow is a series of automated steps that can be used to streamline business processes.
Triggers are used to execute code before or after a record is inserted, updated, or deleted.
Reports are used to display data in a visual format, such as a table or chart.
Roles are used to define the hierarchy of users in an organization.
Profiles are used to define the p...read more
Q3. How to handle addition of new module to service program ?
Adding a new module to a service program requires careful planning and testing.
Identify the purpose and requirements of the new module
Determine the impact on existing modules and services
Create a detailed plan for implementation and testing
Perform thorough testing to ensure compatibility and functionality
Document the changes and update relevant documentation
Communicate the changes to stakeholders and users
Q4. Selenium 1. Locators 2. How to handle multiple windows 3 . Frame concept 4. Selenium grid Java: 1. Oops concepts 2. Java collection. 3. Difference b/w array arraylist, map hashmap 4 . Program to reverse string
Interview questions on Selenium and Java concepts.
Selenium: 1. Locators - identify web elements using ID, name, class, etc. 2. Handling multiple windows - switchTo() method. 3. Frame concept - switchTo().frame(). 4. Selenium grid - distribute tests across multiple machines.
Java: 1. Oops concepts - inheritance, polymorphism, encapsulation, abstraction. 2. Java collection - List, Set, Map. 3. Difference between array, ArrayList, Map, HashMap. 4. Program to reverse string - use ...read more
Q5. what are the different Azure PaaS components i had worked with?
I have worked with various Azure PaaS components including Azure Functions, Azure App Service, Azure Logic Apps, and Azure Event Grid.
Azure Functions - serverless compute service for building event-driven applications
Azure App Service - platform for building and deploying web and mobile apps
Azure Logic Apps - workflow automation service for integrating apps, data, and services
Azure Event Grid - event routing service for subscribing to and processing events
Q6. Can you tell how to trigger Authorizations in any simulator and explain them
Authorizations can be triggered in simulators by following specific steps and commands.
In simulators, authorizations can be triggered by sending specific commands or requests to simulate the authorization process.
These commands typically involve providing necessary credentials, permissions, and access rights to trigger the authorization flow.
For example, in a network simulator, triggering authorizations may involve sending authentication requests with valid credentials to sim...read more
Q7. How would u use business intelligence to implement up sell and cross sell?
Business intelligence can be used to identify patterns and trends in customer behavior, allowing for targeted up sell and cross sell strategies.
Analyze customer data to identify common purchasing patterns and preferences
Use predictive analytics to anticipate customer needs and offer relevant products or services
Implement personalized marketing campaigns based on customer data
Track the success of up sell and cross sell strategies and adjust as needed
Provide sales teams with re...read more
Q8. Project & skills in which u worked,what is spi testing,what all tools you know,rest api,apart from spi sny other skills in which u hv gd experience
SPI testing is a type of software testing that focuses on measuring the performance of a system or application.
SPI testing involves measuring the performance of a system or application against predefined metrics.
Tools commonly used for SPI testing include JMeter, LoadRunner, and Gatling.
REST API testing involves testing the functionality and performance of RESTful web services.
Other skills I have experience in include test automation, agile methodologies, and defect tracking ...read more
Q9. From start to end how you perform web application penetration testing on a website with firewall is enabled on it?
Performing web application penetration testing on a website with firewall enabled.
Identify the type of firewall and its configuration
Perform reconnaissance to gather information about the target
Identify vulnerabilities and exploit them
Use tools like Burp Suite, Nmap, and Metasploit
Test for common web application vulnerabilities like SQL injection and cross-site scripting
Document findings and provide recommendations for remediation
Q10. How to implement monitoring with open source monitoring tools. How to expose and visualise metrics.
Open source monitoring tools can be used to implement monitoring and visualize metrics.
Choose a suitable open source monitoring tool such as Nagios, Zabbix, or Prometheus.
Install and configure the monitoring tool to collect data from the desired sources.
Define the metrics to be monitored and set up alerts for critical events.
Use a visualization tool such as Grafana to create dashboards and display the collected metrics.
Ensure that the monitoring system is scalable and can han...read more
Q11. How did i identify the problem statement?
I identified the problem statement by analyzing the client's needs and pain points.
Conducted interviews with stakeholders
Reviewed data and reports
Identified patterns and trends
Considered industry best practices
Developed a clear problem statement
Example: Client needs to increase sales revenue by 20% within the next quarter
Q12. What are the Challenges that you face while migrating reports from one environment to another.
Challenges faced while migrating reports from one environment to another
Compatibility issues between the old and new environments
Data source connections may need to be updated
Formatting and layout may need to be adjusted
Security settings may need to be reconfigured
Testing and validation of migrated reports is crucial
User training may be required for any changes in functionality
Q13. How do you design the architecture for a Many to one backend for an employee database Web application end to end
Designing architecture for Many to One backend for an employee database Web application
Identify the different entities in the employee database (e.g. employees, departments, roles)
Create a centralized database that stores all the information for the entities
Establish relationships between the entities (e.g. many employees belong to one department)
Implement APIs to allow the frontend to interact with the backend database
Ensure data security and access control measures are in p...read more
Q14. In case of avoiding deadlocks, which collection should we use and why?
Use ConcurrentHashMap to avoid deadlocks due to its thread-safe nature and efficient locking mechanism.
ConcurrentHashMap allows multiple threads to read and write concurrently without blocking each other.
It uses fine-grained locking mechanism which reduces the chances of deadlocks.
Example: ConcurrentHashMap in Java is commonly used in multi-threaded applications to prevent deadlocks.
Q15. What is Transaction/sec, hits/sec, 90 Percentile etc?
Transaction/sec, hits/sec, and 90th percentile are performance metrics used to measure the efficiency of a system.
Transaction/sec measures the number of transactions processed per second.
Hits/sec measures the number of requests received by a server per second.
90th percentile is a measure of the response time of a system, indicating the time taken for 90% of requests to be completed.
These metrics are important in evaluating the performance of a system and identifying areas for...read more
Q16. What are the different types of Fact and Dimension tables?
Fact tables store quantitative data while dimension tables store descriptive data.
Types of fact tables: transactional, periodic snapshot, accumulating snapshot
Types of dimension tables: conformed, junk, degenerate, slowly changing
Examples: sales fact table, time dimension table, product dimension table
Fact tables are linked to dimension tables through foreign keys
Q17. how many ways to insert bulk record in sql
There are multiple ways to insert bulk records in SQL, such as using INSERT INTO, BULK INSERT, or SQL Server Integration Services (SSIS).
Use INSERT INTO statement with multiple value sets in a single query
Use BULK INSERT statement to insert data from a file into a table
Use SQL Server Integration Services (SSIS) for more complex data import and transformation tasks
Q18. how to upload large volume of file in application
Use a file transfer protocol like FTP or a cloud storage service to upload large volumes of files.
Consider using a file transfer protocol like FTP for faster and more reliable uploads.
Utilize a cloud storage service like Google Drive or Dropbox for easy access and sharing of large files.
Break down large files into smaller chunks to upload them more efficiently.
Optimize file formats and compression techniques to reduce file size before uploading.
Q19. Explain Constructor and explain with code where and how you have used it in your framework?
Constructor is a special type of method used to initialize objects in a class.
Constructors have the same name as the class and do not have a return type.
They are called automatically when an object is created.
Used to initialize object properties or perform any necessary setup.
Example: public class Car { public Car() { // constructor code here } }
Q20. Difference between findElement and findElements What is singleton class How to handle multiple windows How to handle staleElementReference exception Implicit wait and explicit wait How oops concept is used in y...
read morefindElement is used to locate a single element on a web page, while findElements is used to locate multiple elements.
findElement returns a single WebElement, while findElements returns a list of WebElements
Example: WebElement element = driver.findElement(By.id("exampleId"));
Example: List
elements = driver.findElements(By.className("exampleClass"));
Q21. How to assess a web application?
Assessing a web application involves evaluating its functionality, security, performance, and user experience.
Conduct functional testing to ensure all features work as intended
Perform security testing to identify vulnerabilities and protect against attacks
Test performance to ensure the application can handle expected traffic
Evaluate user experience through usability testing and feedback
Consider accessibility for users with disabilities
Examples of tools for assessment include ...read more
Q22. How to correlate using JMeter and LoadRunner?
Correlating in JMeter and LoadRunner
Identify the dynamic parameters in the script
Use correlation functions to extract and replace dynamic values
Verify the correlation using debuggers and log files
JMeter uses Regular Expression Extractor and LoadRunner uses web_reg_save_param
Correlation can improve script accuracy and reduce errors
Q23. How to declare membered file in rpgle program ?
To declare membered file in rpgle program, use the DCL-F statement followed by the file name and member name separated by a slash.
Use the DCL-F statement to declare the file
Separate the file name and member name with a slash (/)
Example: DCL-F MYFILE/MYMEMBER
The membered file must be created beforehand using CRTSRCPF command
Q24. What is the benefit of Partitioning and bucketing ?
Partitioning and bucketing improves query performance by reducing data scanned and optimizing data distribution.
Partitioning divides data into smaller, manageable chunks based on a specific column. This reduces the amount of data scanned during queries.
Bucketing further optimizes data distribution by dividing partitions into smaller, equally sized buckets based on another column. This improves query performance by reducing data shuffling.
For example, partitioning by date can ...read more
Q25. What is more important – cost, time or quality?
Quality is the most important factor, followed by time and cost.
Quality should never be compromised as it affects the end product or service.
Time is also crucial as delays can lead to missed opportunities or loss of revenue.
Cost is important but should not be the sole focus as it can lead to cutting corners and sacrificing quality.
For example, in software development, a bug-free and user-friendly product is more important than meeting a tight deadline or reducing costs.
In hea...read more
Q26. How does Big Data problems are solved in retails?
Big Data problems in retail are solved through data analysis, predictive modeling, and optimization techniques.
Data analysis is used to identify patterns and trends in customer behavior, sales, and inventory.
Predictive modeling helps retailers forecast demand, optimize pricing, and personalize marketing campaigns.
Optimization techniques are applied to improve supply chain management, inventory management, and store layout.
Examples include using machine learning algorithms to ...read more
Q27. 1. Introduce yourself 2. Difference between List and Tuple 3. What is Dictionary 4. What is GET, POST, PUT and DELETE methods 5. What is Django ORM 6. Anagram coding question
Interview questions for Consultant designation covering Python basics and web development concepts.
Introduce yourself briefly and highlight your relevant experience.
List and Tuple are both used to store collections of data, but List is mutable while Tuple is immutable.
Dictionary is a collection of key-value pairs, where each key is unique and used to access its corresponding value.
GET, POST, PUT, and DELETE are HTTP methods used to interact with web resources. GET is used to ...read more
Q28. What do you do if you are asked to do testing on process you are yet to know
Research the process, ask for guidance, and learn as much as possible before conducting testing.
Research the process thoroughly to understand its purpose and requirements
Ask for guidance from colleagues or supervisors who are familiar with the process
Learn as much as possible about the process through documentation or training materials
Start with basic testing to familiarize yourself with the process before conducting more in-depth testing
Q29. What model your following in testing like agile or waterfall?? Explain in detail??
We follow the Agile model in testing.
We prioritize customer satisfaction through continuous delivery and feedback.
We work in short sprints, delivering working software at the end of each sprint.
We collaborate closely with developers and stakeholders throughout the process.
We embrace change and adapt to evolving requirements.
We use tools like JIRA and Confluence to manage our Agile process.
Q30. why react is faster, default parameters, can you call async function in useEffect
React is faster due to virtual DOM, default parameters provide fallback values, async functions can be called in useEffect
React is faster than traditional DOM manipulation because it uses a virtual DOM to minimize actual DOM updates
Default parameters in JavaScript allow you to specify default values for function parameters if no value is provided
Async functions can be called in useEffect hook in React to perform asynchronous operations within a functional component
Q31. What Materialized view and where it can be implemented?
Materialized view is a database object that contains the results of a query.
Materialized view is implemented in databases like Oracle, PostgreSQL, MySQL, etc.
It can be used to improve query performance by precomputing expensive joins and aggregations.
Materialized view can be refreshed manually or automatically based on a schedule or trigger.
Example: A materialized view can be created to store the total sales of a product by region.
Example: Materialized view can be used to spe...read more
Q32. How do you access SharePoint from third party apps?
SharePoint can be accessed from third party apps using REST APIs or Microsoft Graph APIs.
Third party apps can use SharePoint REST APIs to access data and perform operations.
Microsoft Graph APIs can also be used to access SharePoint data.
OAuth 2.0 authentication is required to access SharePoint from third party apps.
Examples of third party apps that can access SharePoint include Salesforce, PowerApps, and Zapier.
Q33. How do you manage access of an Azure SQL db ?
Access to Azure SQL db is managed through various methods.
Azure Active Directory authentication
SQL authentication
Firewall rules
Virtual network service endpoints
Role-based access control
Auditing and monitoring
Encryption
Regular review of access permissions
Q34. How can we find out a character string in a file using sort
You can use the sort command with the grep utility to find a character string in a file.
Use the sort command to sort the lines of the file alphabetically or numerically.
Pipe the output of the sort command to the grep utility with the desired character string as the search pattern.
For example, to find the string 'hello' in a file named 'example.txt', you can use the command 'sort example.txt | grep hello'.
Q35. 1.What is Jenkins and Bitbucket ? what is maker and checker ? 2.What is difference between delete and Truncate ?
Jenkins is an open-source automation server, and Bitbucket is a web-based version control repository. Maker and checker are roles in a review process.
Jenkins is used for continuous integration and delivery of software projects.
Bitbucket is a platform for hosting and managing Git repositories.
Maker and checker are roles in a review process where the maker creates a document or change, and the checker verifies and approves it.
The maker is responsible for creating or initiating ...read more
Q36. What is trigger and the events of trigger. Write a trigger.
A trigger is a special type of stored procedure that is automatically executed when certain events occur in a database.
Triggers are used to enforce business rules, maintain data integrity, and automate tasks.
Events that can trigger a trigger include INSERT, UPDATE, and DELETE operations on a table.
Here is an example of a trigger that automatically updates a 'last_updated' column in a table whenever a row is updated:
Q37. What integrations are done in project and how the connections are done explain step by step
Various integrations are done in projects using APIs, webhooks, middleware, and custom code to connect different systems and applications.
Identify the systems and applications that need to be integrated
Determine the data flow and communication requirements between the systems
Choose the appropriate integration method such as APIs, webhooks, middleware, or custom code
Develop and configure the integrations based on the requirements
Test the integrations to ensure proper functiona...read more
Q38. What are the basic concepts of Object-Oriented Programming (OOP)?
OOP is a programming paradigm based on the concept of objects, which can contain data in the form of fields and code in the form of procedures.
Objects: Instances of classes that encapsulate data and behavior.
Classes: Blueprint for creating objects, defining their attributes and methods.
Inheritance: Ability of a class to inherit properties and behavior from another class.
Polymorphism: Objects of different classes can be treated as objects of a common superclass.
Encapsulation: ...read more
Q39. Explain the OOPS concept where you used in your framework
OOPS concept used in framework design
Encapsulation: Used to hide the internal implementation details of classes and provide access through methods
Inheritance: Used to create a hierarchy of classes to promote code reusability
Polymorphism: Used to allow objects of different classes to be treated as objects of a common superclass
Abstraction: Used to focus on the essential properties and behavior of an object while hiding unnecessary details
Q40. why react js, functional comp vs class comp refs hoc redux fetch API lazy load Javascript Array output questions
React JS is a popular JavaScript library for building user interfaces.
Functional components are simpler and more lightweight than class components.
Refs are used to access DOM nodes or React elements created in the render method.
Higher Order Components (HOC) are functions that take a component and return a new component with additional functionality.
Redux is a state management library for React applications.
Fetch API is used to make network requests in JavaScript.
Lazy loading ...read more
Q41. how you integrated your angular code with in the project which is related to asp.net core
I integrated Angular code with ASP.NET Core using Angular CLI to generate components and services, and then integrating them into ASP.NET Core project.
Used Angular CLI to generate components and services
Integrated Angular code into ASP.NET Core project by adding necessary configurations and dependencies
Utilized Angular HTTP client to communicate with ASP.NET Core backend APIs
Q42. What are different types of cloud?
There are three types of cloud: public, private, and hybrid.
Public cloud: services offered to anyone on the internet, e.g. AWS, Azure
Private cloud: services offered within a private network, e.g. OpenStack
Hybrid cloud: combination of public and private cloud, e.g. Google Cloud Platform
Q43. Angular multiple ways to communicate with component
Angular components can communicate with each other using @Input, @Output, EventEmitter, services, and RxJS observables.
Using @Input decorator to pass data from parent to child component
Using @Output decorator and EventEmitter to emit events from child to parent component
Using services to share data between components
Using RxJS observables to create a data stream that can be subscribed to by multiple components
Q44. reverse a string,write code to find prime number
Reverse a string and find prime numbers in code.
To reverse a string, iterate through the characters and append them in reverse order.
To find prime numbers, iterate from 2 to the square root of the number and check for divisibility.
Q45. What is sub flow in mule?
Sub flow in Mule is a reusable flow that can be called from other flows.
Sub flow is a separate flow that can be called from other flows
It helps in reusing the same logic in multiple flows
Sub flow can have its own set of input and output parameters
It can be used to encapsulate complex logic and make the main flow more readable
Example: A sub flow for database connection that can be called from multiple flows
Q46. Workflow in teamcenter, rule handler , action handler, quorum, access manager, change management questions
Workflow in Teamcenter involves rule handler, action handler, quorum, access manager, and change management.
Rule handler defines the conditions and actions for workflow transitions.
Action handler executes specific actions based on workflow events.
Quorum determines the number of approvals required for a workflow task.
Access manager controls user permissions within the workflow.
Change management ensures proper tracking and documentation of changes.
Example: Rule handler can be s...read more
Q47. How exactly does api auto-discovery work?
API auto-discovery is a process where APIs are automatically identified and registered within a system.
API auto-discovery involves scanning a network or system to identify APIs without manual intervention.
Tools like Swagger, Postman, and API Gateway can be used for API auto-discovery.
Once APIs are discovered, they can be registered in a central repository for easy access and management.
Q48. What are the Design patterns have you used?
I have used design patterns such as Singleton, Factory, and Observer in my projects.
Singleton pattern ensures a class has only one instance and provides a global point of access to it.
Factory pattern creates objects without specifying the exact class of object that will be created.
Observer pattern defines a one-to-many dependency between objects so that when one object changes state, all its dependents are notified and updated automatically.
Q49. What is the full lifecycle Major Incident Management(MIM)?
The full lifecycle of Major Incident Management involves identification, categorization, prioritization, diagnosis, resolution, and closure of major incidents.
Identification of major incidents
Categorization and prioritization based on impact and urgency
Diagnosis to determine root cause
Resolution through appropriate actions
Closure with post-incident review and documentation
Q50. How to differentiate between resource and endpoint in url
Resources represent the data entities, while endpoints represent the specific actions that can be performed on those resources in a URL.
Resources are the data entities that are being accessed or manipulated, such as users, products, or orders.
Endpoints are the specific actions that can be performed on those resources, such as GET, POST, PUT, DELETE.
In a URL, the resource is typically represented in the base URL path, while the endpoint is represented in the path after the res...read more
Q51. What are different types of depency injection? What are exceptions Java 8 stream api
Different types of dependency injection, exceptions, and Java 8 stream API.
Types of dependency injection: constructor injection, setter injection, and interface injection.
Exceptions are errors that occur during program execution and can be handled using try-catch blocks.
Java 8 stream API provides a functional approach to processing collections and supports operations like filter, map, reduce, etc.
Q52. Using right click operation how to open new tab?
To open a new tab using right click operation, simply right click on a link or tab and select 'Open in new tab'.
Right click on a link or tab
Select 'Open in new tab'
Alternatively, use the keyboard shortcut 'Ctrl + Click' on a link to open it in a new tab
Q53. Collections- Difference between hashmap and hashset.
Hashmap is key-value pair collection while Hashset is a unique value collection.
Hashmap allows duplicate values but not duplicate keys while Hashset only allows unique values.
Hashmap uses key to access values while Hashset uses object reference.
Hashmap is faster for accessing values while Hashset is faster for checking if a value exists.
Example: Hashmap - {1: 'apple', 2: 'banana', 3: 'apple'}, Hashset - {'apple', 'banana'}
Q54. Azure migration steps from onprem to cloud, Hyper V migration, VMWARE tool we used for migration
Steps for Azure migration from onprem to cloud and Hyper V migration using VMWARE tool.
Assess on-premises environment
Choose appropriate migration method
Prepare Azure environment
Migrate data and applications
Optimize and secure migrated resources
VMware tool used for migration: VMware vCenter Converter
Hyper-V migration can be done using Azure Site Recovery
Q55. What is PowerApps
PowerApps is a low-code platform that allows users to create custom business applications without coding.
PowerApps is a part of the Microsoft Power Platform.
It allows users to create custom apps for web and mobile devices.
Users can connect to various data sources like SharePoint, Excel, Dynamics 365, etc.
PowerApps provides a drag-and-drop interface for building apps.
Users can also use pre-built templates and components to speed up app development.
PowerApps can be integrated w...read more
Q56. Hash map internal working Singleton pattern how to overcome it Exception handling
Hash map is a data structure that stores key-value pairs, Singleton pattern restricts instantiation of a class to one object, Exception handling is used to handle runtime errors.
Hash map internally uses an array of linked lists to store key-value pairs, with a hash function to determine the index of each pair.
Singleton pattern can be overcome by using dependency injection or by lazy initialization to create a new instance when needed.
Exception handling involves try-catch bloc...read more
Q57. What will You do when you will get flaky tests
I will investigate the root cause of the flaky tests, update the test scripts, and rerun them to ensure reliability.
Investigate the reason for flakiness such as environmental issues, timing issues, or race conditions
Update the test scripts to make them more stable and reliable
Rerun the tests to ensure they are no longer flaky
Q58. What is dictionary comprehension in python
Dictionary comprehension is a concise way to create dictionaries in Python using a single line of code.
Syntax: {key: value for key, value in iterable}
Can be used to filter items or manipulate values while creating the dictionary
Example: {num: num**2 for num in range(1, 6)} will create a dictionary with squares of numbers 1 to 5
Q59. What are the different types of constraints?
Different types of constraints include primary key, foreign key, unique, check, and default constraints.
Primary key constraint ensures each record in a table is unique.
Foreign key constraint enforces referential integrity between two tables.
Unique constraint ensures that all values in a column are distinct.
Check constraint restricts the values that can be inserted into a column.
Default constraint provides a default value for a column if no value is specified.
Q60. What are the framework you did work.
I have worked with several frameworks including Angular, React, and Vue.
Worked with Angular framework to develop a web application for a client
Used React framework to build a mobile app for a startup
Implemented Vue framework for a personal project
Also familiar with frameworks like Django, Flask, and Laravel for backend development
Q61. Do you know about the financial services? No
Yes, I have knowledge about financial services.
I have experience in working with financial institutions and have a good understanding of financial products and services.
I am familiar with financial regulations and compliance requirements.
I have worked on projects related to financial analysis, risk management, and investment strategies.
For example, I have helped a bank in developing a new loan product and conducted market research to identify potential customers.
I have also a...read more
Q62. Delegation and how to overcome the same
Delegation can be overcome by effective communication, trust building, and proper training.
Clearly communicate expectations and goals
Build trust by giving employees autonomy and recognizing their achievements
Provide proper training and resources
Regularly check in and provide feedback
Delegate tasks based on employee strengths and interests
Be open to feedback and adjust delegation as needed
Q63. Java - coding , Counting number of occurrences of character in a string
Counting number of occurrences of character in a string using Java coding.
Use a loop to iterate through each character in the string
Use a HashMap to store the count of each character
If the character is already in the HashMap, increment its count
If the character is not in the HashMap, add it with a count of 1
Q64. How to overcome underfitting and overfitting?
To overcome underfitting and overfitting, one can use techniques like cross-validation, regularization, and increasing data size.
Use cross-validation to evaluate the model's performance on unseen data
Regularize the model by adding penalties to the loss function to prevent overfitting
Increase the size of the training data to reduce underfitting
Use ensemble methods like bagging and boosting to reduce overfitting
Reduce the complexity of the model by removing unnecessary features...read more
Q65. Explain exceptional handling and it's types with an example
Exception handling is the process of handling errors that occur during program execution.
There are two types of exception handling: checked and unchecked.
Checked exceptions are checked at compile time and must be handled or declared.
Unchecked exceptions are not checked at compile time and do not need to be handled or declared.
For example, a NullPointerException is an unchecked exception that occurs when trying to access a null object.
On the other hand, a FileNotFoundException...read more
Q66. How to optimized the table in hive
Optimizing tables in Hive involves partitioning, bucketing, and using appropriate file formats.
Partition tables based on frequently queried columns
Bucket tables to evenly distribute data and improve query performance
Use appropriate file formats like ORC or Parquet for efficient storage and query processing
Compress data to reduce storage space and improve query performance
Avoid using SELECT * and instead specify required columns for faster query execution
Q67. What are role playing dimensions?
Role playing dimensions refer to the various aspects or characteristics that can be portrayed in a role playing scenario.
Role playing dimensions can include personality traits, emotions, communication styles, and decision-making processes.
For example, in a customer service role play, the dimensions could include empathy, active listening, problem-solving, and conflict resolution.
Understanding and utilizing role playing dimensions can help individuals develop their skills and ...read more
Q68. How do you write custom exception?
Custom exceptions can be written by creating a new class that extends the Exception class.
Create a new class that extends the Exception class
Add a constructor to the custom exception class
Throw the custom exception using 'throw new CustomException(message)'
Q69. What is sql and describe the architecture
SQL is a programming language used for managing and manipulating relational databases.
SQL stands for Structured Query Language
It is used to communicate with databases to perform tasks such as querying data, updating data, and creating databases
SQL follows a client-server architecture where the client sends SQL queries to the server which processes them and returns results
Common SQL implementations include MySQL, PostgreSQL, and Oracle Database
Q70. Explain your previous project's automation framework.
Our automation framework was based on Selenium WebDriver and TestNG.
We used Page Object Model design pattern for better maintainability.
We integrated the framework with Jenkins for continuous integration.
We used Maven for dependency management and build automation.
We implemented data-driven testing using Excel sheets.
We also used log4j for logging and reporting.
We followed best practices for exception handling and error reporting.
Q71. What is incremental deployment ?
Incremental deployment is a software development approach where new features are added gradually instead of all at once.
New features are added in small increments
Each increment is tested and deployed separately
Allows for faster feedback and easier bug fixing
Reduces risk of major failures
Examples include Agile and DevOps methodologies
Q72. What are the different LLM models u have used
I have used various LLM models including logistic regression, decision trees, random forests, support vector machines, and neural networks.
Logistic regression
Decision trees
Random forests
Support vector machines
Neural networks
Q73. behavioural scenario of automation, CI/CD, Frameworks
Automation, CI/CD, and frameworks are essential components in modern software development.
Automation helps in reducing manual effort and increasing efficiency in the software development process.
CI/CD (Continuous Integration/Continuous Deployment) ensures that code changes are automatically tested and deployed in a timely manner.
Frameworks provide a structured way to build and maintain software applications, saving time and effort.
Examples: Selenium for automation testing, Je...read more
Q74. all types of data structures (if its python : list, dict, set, tuple, str)
Python has several built-in data structures including list, dict, set, tuple, and str.
Lists are mutable and can contain any type of data
Dictionaries are key-value pairs and are also mutable
Sets are unordered and contain only unique elements
Tuples are immutable and can contain any type of data
Strings are immutable sequences of characters
All of these data structures have their own methods and functions for manipulation
Q75. how my hair is on a male head ?
Hair on a male head can vary in color, texture, length, and style.
Hair color can range from black, brown, blonde, red, gray, etc.
Hair texture can be straight, curly, wavy, or kinky.
Hair length can be short, medium, or long.
Hair style can be buzz cut, crew cut, pompadour, undercut, etc.
Q76. program for array based methods roles responsibilities webpacks
Array based methods are used to manipulate arrays in programming, such as sorting, filtering, and mapping elements.
Roles and responsibilities include designing and implementing efficient algorithms for array manipulation.
Programs for array based methods may involve functions like sorting, searching, and inserting elements in an array.
Webpacks can be used to bundle and optimize the code for array based methods.
Examples of array based methods include sorting an array of numbers...read more
Q77. What is bias variance trade offs?
Bias-variance tradeoff is the balance between overfitting and underfitting in machine learning models.
Bias is the error due to assumptions made in the learning algorithm, while variance is the error due to sensitivity to small fluctuations in the training set.
High bias leads to underfitting, while high variance leads to overfitting.
The goal is to find the sweet spot between bias and variance that minimizes the overall error of the model.
Regularization techniques like Lasso an...read more
Q78. How do you track/ monitor it?
We track/monitor it through various tools and software.
We use project management tools like Trello and Asana to track progress.
We use analytics tools like Google Analytics to monitor website traffic.
We use social media monitoring tools like Hootsuite to track brand mentions.
We use customer relationship management (CRM) software to track sales and customer interactions.
We conduct regular performance reviews and feedback sessions to monitor employee progress.
We use automated te...read more
Q79. Difference between throw , throws and throwable ?
throw is a keyword used to throw an exception, throws is used in method signature to declare exceptions thrown, and Throwable is a superclass for all exceptions and errors.
throw is used to throw an exception in a try-catch block
throws is used in method signature to declare exceptions that the method can throw
Throwable is a superclass for all exceptions and errors in Java
Q80. optimization of store procedure
Optimizing store procedures involves identifying and implementing improvements to increase efficiency and performance.
Identify bottlenecks in the current store procedures
Analyze and optimize query performance
Use indexing and caching techniques to improve speed
Consider partitioning large tables for better performance
Q81. What CI/CD methods used for deployment
We use Jenkins for CI/CD and deploy to AWS using CloudFormation.
Jenkins is used for continuous integration and continuous deployment
AWS CloudFormation is used for infrastructure as code
We have automated tests that run during the CI/CD process
We use Git for version control
Q82. What is list comprehension in python
List comprehension is a concise way to create lists in Python using a single line of code.
List comprehension provides a more concise and readable way to create lists compared to traditional methods.
It allows you to create a new list by applying an expression to each item in an existing iterable.
Example: squares = [x**2 for x in range(10)] will create a list of squares of numbers from 0 to 9.
Q83. spark memory tuning, finding number of executor
Tips for spark memory tuning and determining number of executors.
Allocate enough memory to avoid frequent garbage collection
Use broadcast variables to reduce memory usage
Determine number of executors based on available resources and workload
Consider data skew when determining number of partitions
Use dynamic allocation to optimize resource usage
Q84. How to handle browser notification?
Browser notifications can be handled using the Notification API in JavaScript.
Request permission from the user before showing notifications.
Use the Notification API to create and show notifications.
Include an event listener to handle user interaction with the notification.
Notifications can be customized with icons, titles, and body text.
Notifications can also include actions for the user to take.
Notifications can be closed programmatically using the close() method.
Q85. JMeter integration with 3rd Party tools?
JMeter can integrate with various 3rd party tools for better performance testing.
JMeter can integrate with Jenkins for continuous integration
Integrating with Grafana can provide better visualization of test results
Integration with Selenium can help in load testing web applications
JMeter can integrate with various databases for load testing database servers
Q86. Any 3 - 4 Owasp top 10 vulnerabilities?
OWASP top 10 vulnerabilities are common security risks in web applications.
Injection attacks (SQL, OS, LDAP) - malicious code injection through user input
Broken authentication and session management - weak passwords, session hijacking
Cross-site scripting (XSS) - injecting malicious scripts into web pages
Broken access control - unauthorized access to sensitive data or functionality
Sensitive data exposure - exposing sensitive data through insecure storage or transmission
Securit...read more
Q87. Explain famous ones with examples..
Famous ones refer to well-known people, places, or things that have gained popularity or recognition.
Famous people: Albert Einstein, Oprah Winfrey, Michael Jordan
Famous places: Eiffel Tower, Taj Mahal, Great Wall of China
Famous things: Coca-Cola, iPhone, Harry Potter book series
Q88. how was source controlled ?
Source was controlled using Git.
Git was used as the version control system.
All code changes were committed to Git branches.
Pull requests were used for code review and merging.
Git tags were used to mark important releases.
Q89. No of occurance of a charcter in a string.
Count the number of occurrences of a character in a string.
Iterate through the string and keep track of the count of the desired character.
Use a hashmap to store the count of each character for efficient lookup.
Consider both uppercase and lowercase characters as separate entities.
Q90. Explain site reliability engineering process.
Site reliability engineering process ensures reliable and efficient operation of websites and applications.
Identify potential issues and implement proactive measures
Monitor system performance and respond to incidents
Automate processes to reduce manual intervention
Continuously improve system reliability through testing and analysis
Collaborate with development teams to ensure reliability is built into the application
Examples: Google's Site Reliability Engineering (SRE) model, N...read more
Q91. Sort an array using o(n) complexity algorithm
Use counting sort algorithm to sort array of strings in O(n) complexity.
Count the frequency of each string in the array.
Create a new array based on the frequency counts.
Reconstruct the sorted array based on the new array.
Q92. what is loop? what is inheritance?
A loop is a programming construct that repeats a set of instructions until a specific condition is met. Inheritance is a mechanism in object-oriented programming where a new class inherits properties and behaviors from an existing class.
A loop allows a set of instructions to be executed repeatedly based on a condition. Examples include for loops, while loops, and do-while loops.
Inheritance allows a new class (subclass) to inherit properties and behaviors from an existing clas...read more
Q93. How to ensure that client is satisfied?
Ensuring client satisfaction involves clear communication, setting realistic expectations, delivering high-quality work, and seeking feedback.
Maintain open and clear communication with the client throughout the project.
Set realistic expectations from the beginning to avoid misunderstandings.
Deliver high-quality work that meets or exceeds the client's expectations.
Seek feedback from the client regularly to ensure their needs are being met.
Address any issues or concerns promptl...read more
Q94. Are u okay with hybrid model of working
Yes, I am comfortable with the hybrid model of working.
I believe that a hybrid model of working can offer the best of both worlds - the flexibility of remote work and the collaboration of in-person work.
I am adaptable and can work effectively in both environments.
I understand the importance of clear communication and staying connected with team members regardless of the work model.
I have experience working in a hybrid model and have found it to be successful.
Q95. What is cursor and explain wd eg
A cursor is a database object used to retrieve data from a result set one row at a time.
Cursor is used in SQL to fetch and manipulate data row by row
Examples of cursor include FETCH, OPEN, CLOSE, and DECLARE
Cursor is often used in stored procedures and triggers
Q96. How do you handle errors in plsql
Errors in PL/SQL are handled using exception handling blocks.
Use EXCEPTION keyword to define exception handling blocks
Use RAISE statement to raise an exception
Use WHEN clause to specify the condition for handling the exception
Use EXCEPTION_INIT pragma to associate an exception with an error code
Use SQLCODE and SQLERRM functions to retrieve error information
Example: BEGIN ... EXCEPTION WHEN NO_DATA_FOUND THEN ... END;
Example: RAISE_APPLICATION_ERROR(-20001, 'Custom error messa...read more
Q97. What is global index in dynamodb
Global secondary indexes in DynamoDB allow querying on non-primary key attributes
Global indexes are separate from the main table and can have different partition and sort keys
They enable efficient querying on non-primary key attributes
Useful for querying data in different ways without impacting the main table's performance
Q98. What is coding and what is Java
Coding is the process of creating instructions for a computer to execute. Java is a popular programming language used for developing software applications.
Coding involves writing instructions in a specific programming language to perform tasks on a computer.
Java is a high-level, object-oriented programming language known for its platform independence and versatility.
Java is used for developing a wide range of applications, from mobile apps to enterprise systems.
Java code is c...read more
Q99. Are you aware of client object model?
Yes, client object model is a programming interface that allows client-side code to interact with SharePoint objects.
Client object model is available in SharePoint 2010, 2013, and 2016.
It allows developers to access SharePoint data from client-side code.
There are three types of client object models: .NET managed, Silverlight, and JavaScript.
Examples of using client object model include retrieving list data, creating new list items, and updating user profiles.
Q100. different solutions to similar problems?
There can be multiple solutions to similar problems depending on various factors.
Different solutions can be based on the context of the problem.
Solutions can vary based on the available resources.
Different solutions can be more suitable for different users or stakeholders.
Solutions can be influenced by cultural or societal factors.
Examples include different treatment options for a medical condition, different marketing strategies for a product, or different approaches to solv...read more
More about working at Capgemini
Top HR Questions asked in Micro Turners
Interview Process at Micro Turners
Top Consultant Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month