Capgemini
300+ Axis Finance Interview Questions and Answers
Q101. Minimum Operations to Make Strings Equal
Given two strings A
and B
consisting of lowercase English letters, determine the minimum number of pre-processing moves required on string A
to make it equal to string B...read more
The minimum number of pre-processing moves required on string A to make it equal to string B using specified operations.
Iterate through both strings simultaneously and check for differences.
Count the number of differences that can be fixed using the specified operations.
Return the count as the minimum number of pre-processing moves required.
Q102. Ways To Make Coin Change
Given an infinite supply of coins of varying denominations, determine the total number of ways to make change for a specified value using these coins. If it's not possible to make the c...read more
The task is to find the total number of ways to make change for a specified value using given denominations.
Use dynamic programming to solve this problem efficiently.
Create a 2D array to store the number of ways to make change for each value using different denominations.
Iterate through the denominations and update the array based on the current denomination.
The final answer will be in the last cell of the 2D array.
Q103. What is Linked List and its type?
A Linked List is a linear data structure where elements are stored in nodes with each node pointing to the next node in the sequence.
Types of Linked Lists include Singly Linked List, Doubly Linked List, and Circular Linked List.
In a Singly Linked List, each node points to the next node in the sequence.
In a Doubly Linked List, each node points to both the next and previous nodes in the sequence.
In a Circular Linked List, the last node points back to the first node, forming a c...read more
Q104. What is jvm ,jre,jdk
JVM is a virtual machine that executes Java bytecode. JRE is a runtime environment that includes JVM and libraries. JDK is a development kit that includes JRE and tools for developing Java applications.
JVM stands for Java Virtual Machine
JRE stands for Java Runtime Environment
JDK stands for Java Development Kit
JVM executes Java bytecode
JRE includes JVM and libraries
JDK includes JRE and tools for developing Java applications
Q105. What are opp concepts
OOP concepts refer to the principles of Object-Oriented Programming that help in designing and implementing software systems.
Encapsulation - bundling of data and methods that operate on that data
Inheritance - creating new classes from existing ones
Polymorphism - ability of objects to take on many forms
Abstraction - hiding implementation details and showing only functionality
Examples: Java, C++, Python
Q106. Anagram Pairs Verification Problem
Your task is to determine if two given strings are anagrams of each other. Two strings are considered anagrams if you can rearrange the letters of one string to form the other...read more
Determine if two strings are anagrams of each other by checking if they have the same characters in different order.
Create a frequency map of characters for both strings and compare them.
Sort both strings and check if they are equal.
Use a hash table to store character counts and compare the counts for both strings.
Q107. Next Greater Number Problem Statement
Given a string S
which represents a number, determine the smallest number strictly greater than the original number composed of the same digits. Each digit's frequency from...read more
Given a number represented as a string, find the smallest number greater than the original with the same set of digits.
Iterate from right to left to find the first digit that can be swapped with a larger digit to make the number greater.
Swap this digit with the smallest digit to its right that is larger than it.
Sort the digits to the right of the swapped digit in ascending order to get the smallest number greater than the original.
If no such number exists, return -1.
Example: ...read more
Q108. What is coroutine?
Coroutines are a type of concurrency design pattern that allows for cooperative multitasking.
Coroutines are similar to threads but are cooperatively multitasked by the programmer.
They can pause and resume execution at specific points, allowing for efficient multitasking.
Coroutines are commonly used in asynchronous programming to handle tasks like network requests or file I/O.
Examples of languages that support coroutines include Python, Kotlin, and Lua.
Q109. What is heap memory?
Heap memory is a region of a computer's memory that is used for dynamic memory allocation.
Heap memory is allocated at runtime and can be accessed randomly.
It is used for storing objects and data structures that need to be dynamically allocated.
Heap memory needs to be managed manually to prevent memory leaks.
Examples include dynamic arrays, linked lists, and objects created with 'new' keyword.
Q110. What is thread pool?
Thread pool is a collection of worker threads that are managed by the system to efficiently execute tasks.
Thread pool helps in reusing threads instead of creating new ones for each task, which improves performance and reduces overhead.
It limits the number of concurrent threads to prevent resource exhaustion.
Thread pool can be used in applications like web servers, database connections, and parallel processing.
Example: Java's Executor framework provides a way to create and man...read more
Q111. What is python? Difference b/w python and java? Explain oops concepts Some coding python
Python is a high-level programming language known for its simplicity and readability.
Python is an interpreted language, while Java is a compiled language.
Python has a simpler syntax and requires fewer lines of code compared to Java.
Python is dynamically typed, whereas Java is statically typed.
Python has a strong focus on code readability and ease of use.
Python has a large standard library with built-in modules for various tasks.
Python supports both procedural and object-orien...read more
Q112. What are oops concepts?describe them.
Oops concepts are the fundamental principles of object-oriented programming.
Abstraction: Hiding implementation details and showing only necessary information.
Encapsulation: Binding data and functions together in a single unit.
Inheritance: Acquiring properties and behavior of a parent class by a child class.
Polymorphism: Ability of an object to take many forms or have multiple behaviors.
Example: A car is an object that has properties like color, model, and behavior like starti...read more
Q113. difference between for and while loop
For loop is used for iterating over a sequence while while loop is used for iterating until a condition is met.
For loop is used when the number of iterations is known beforehand
While loop is used when the number of iterations is not known beforehand
For loop is faster than while loop for iterating over a sequence
While loop is useful for infinite loops or until a specific condition is met
Q114. Circular Move Problem Statement
You have a robot currently positioned at the origin (0, 0) on a two-dimensional grid, facing the north direction. You are given a sequence of moves in the form of a string of len...read more
Determine if a robot's movement path is circular on a 2D grid given a sequence of moves.
Create a set of directions to keep track of the robot's current direction (north, east, south, west).
Simulate the robot's movement based on the given sequence of moves (L - turn left, R - turn right, G - move forward).
Check if the robot returns to the starting position after completing the sequence of moves.
Example: For 'GLGLGLG', the robot moves in a circular path and returns to the start...read more
Q115. Write pseudocode of Basic DSA question
Pseudocode for a basic DSA question
Start by defining the problem statement and input/output requirements
Identify the key data structures and algorithms needed to solve the problem
Write step-by-step instructions in pseudocode to solve the problem
Test the pseudocode with sample inputs to ensure correctness
Q116. Frontend technologies explain
Frontend technologies refer to the tools and languages used to create the user interface of a website or application.
Frontend technologies include HTML, CSS, and JavaScript.
Frameworks like React, Angular, and Vue.js are commonly used for frontend development.
Responsive design, accessibility, and performance optimization are key considerations in frontend development.
Frontend developers work closely with designers and backend developers to create a seamless user experience.
Q117. What is Abap in sap
ABAP (Advanced Business Application Programming) is a high-level programming language created by SAP for developing business applications.
ABAP is the primary programming language used in SAP for customizing and developing reports, interfaces, forms, and workflows.
It is a 4th generation programming language that runs in the SAP ABAP runtime environment.
ABAP programs are stored in the SAP database and are executed on the application server.
ABAP code can be used to enhance stand...read more
Q118. Why is it suggested to utilise a database management system (DBMS)? List some of its primary advantages to explain.
A DBMS is suggested for efficient data management. It offers advantages like data security, scalability, and data integrity.
DBMS ensures data security by providing access control and authentication mechanisms.
It allows for efficient data retrieval and manipulation through indexing and query optimization.
DBMS offers scalability by allowing for easy addition of new data and users.
It ensures data integrity by enforcing constraints and providing backup and recovery mechanisms.
Exa...read more
Q119. What is a collection framework??
A collection framework is a set of classes and interfaces that provide a way to store and manipulate groups of objects.
It provides implementations of commonly used data structures like lists, sets, maps, etc.
It allows for easy manipulation of data stored in these structures.
Examples include Java's Collection and Map interfaces and their implementations like ArrayList, HashSet, and HashMap.
Q120. In Search, in an almost sorted array problem, we have to find the index of an element in the array, The problem can be solved by using the binary search technique,
Binary search technique can be used to find the index of an element in an almost sorted array.
Binary search is efficient for large arrays.
The array must be sorted in ascending or descending order.
If the element is not found, return -1.
Example: [1, 3, 5, 7, 9], target = 5, output = 2
Q121. What are linked lists?
Linked lists are a data structure consisting of nodes that point to the next node in the list.
Each node contains a value and a pointer to the next node.
Linked lists can be singly or doubly linked.
Insertion and deletion are efficient, but random access is not.
Examples include a queue, stack, and adjacency list.
Q122. Tell me how we can get the product from
We can get the product from the manufacturer directly or through distributors.
Contacting the manufacturer for direct purchase
Finding local or online distributors
Checking retail stores or online marketplaces for availability
Q123. OOPs programming concept.
OOPs programming concept is a paradigm that focuses on objects and their interactions to solve problems.
OOPs stands for Object-Oriented Programming
It emphasizes on encapsulation, inheritance, and polymorphism
Objects are instances of classes that have attributes and methods
Encapsulation hides the implementation details of an object
Inheritance allows a class to inherit properties and methods from another class
Polymorphism allows objects to take on multiple forms and behave diff...read more
Q124. final year project explain
My final year project was a web application for online shopping.
Developed using HTML, CSS, JavaScript, and PHP
Implemented user authentication and authorization
Integrated payment gateway for secure transactions
Used MySQL database for storing product and user information
Q125. Give me a user defined code
A user defined code is a custom piece of code created by a programmer to perform a specific task.
User defined code can be created in various programming languages such as Python, Java, C++, etc.
Examples of user defined code include functions, classes, and custom algorithms.
User defined code allows programmers to create reusable and modular components for their software projects.
Q126. java inheritance with real-world example
Java inheritance allows a subclass to inherit attributes and methods from a superclass.
Subclass can access superclass methods and variables
Subclass can override superclass methods
Subclass can add new methods and variables
Q127. What is abstact class?
An abstract class is a class that cannot be instantiated and is used as a base class for other classes.
An abstract class can have abstract methods that must be implemented by its derived classes.
An abstract class can have non-abstract methods and fields.
An abstract class can be used to define a common interface for a group of related classes.
Example: The Shape class can be an abstract class with abstract methods like getArea() and getPerimeter() that must be implemented by it...read more
Q128. Trending technology and implementations
Artificial Intelligence, Machine Learning, Blockchain, Internet of Things (IoT)
Artificial Intelligence (AI) is being used in various fields such as healthcare, finance, and transportation.
Machine Learning (ML) is being used for predictive analytics, fraud detection, and recommendation systems.
Blockchain technology is being used for secure and transparent transactions in industries such as finance and supply chain management.
Internet of Things (IoT) is being used for smart hom...read more
Q129. What is regression and retesting
Regression is the process of retesting software to ensure that new code changes have not adversely affected existing functionality.
Regression testing involves running tests on previously tested software to make sure that new changes have not introduced any new bugs or issues.
Retesting is the process of running tests on specific areas of the software that have been modified to ensure that the changes have been implemented correctly.
Regression testing is typically automated to ...read more
Q130. describe object oriented programming
Object oriented programming is a programming paradigm based on the concept of objects, which can contain data and code.
Encapsulation: Objects can encapsulate data and behavior within a single unit.
Inheritance: Objects can inherit attributes and methods from other objects.
Polymorphism: Objects can take on different forms or have different behaviors based on their context.
Q131. What is the drawback of scanf() and how can it be avoided (if any)?
The drawback of scanf() is that it does not handle input validation well, leading to buffer overflow and security vulnerabilities.
scanf() does not limit the amount of input it reads, leading to buffer overflow if the input is larger than the buffer size.
scanf() does not handle invalid input well, leading to unexpected behavior or crashes.
To avoid these issues, input validation should be performed before using scanf(). Alternatively, fgets() and sscanf() can be used for safer ...read more
Q132. Ninja and His Secret Information Encoding Problem
Ninja, a new member of the FBI, has acquired some 'SECRET_INFORMATION' that he needs to share with his team. To ensure security against hackers, Ninja decides t...read more
The task is to encode and decode 'SECRET_INFORMATION' for security purposes and determine if the transmission was successful.
Read the number of test cases 'T'
For each test case, encode the 'SECRET_INFORMATION' and then decode it
Compare the decoded string with the original 'SECRET_INFORMATION'
Print 'Transmission successful' if they match, else print 'Transmission failed'
Q133. Write a code of array
Code snippet for an array of strings
Declare an array variable with string data type
Initialize the array with string values
Access and manipulate elements in the array
Q134. What is SQL joins?
SQL joins are used to combine data from two or more tables based on a related column.
Joins are used to retrieve data from multiple tables in a single query
Common types of joins include inner join, left join, right join, and full outer join
Joins are performed based on a related column between the tables
Example: SELECT * FROM table1 INNER JOIN table2 ON table1.column = table2.column
Q135. C++ program for palindrome
A C++ program to check if a given string is a palindrome or not.
Create a character array to store the input string
Use two pointers, one at the beginning and one at the end of the array
Compare the characters at both pointers and move them towards each other until they meet
If all characters match, the string is a palindrome
If any character doesn't match, the string is not a palindrome
Q136. Write Linked list code
Implementation of a linked list in code
Define a Node class with data and next pointer
Implement methods to insert, delete, and search nodes
Update pointers accordingly when adding or removing nodes
Q137. difference between stack and heap memory
Stack memory is used for static memory allocation and is limited in size, while heap memory is used for dynamic memory allocation and is larger.
Stack memory is allocated at compile time and is used for static memory allocation, such as local variables and function call stack.
Heap memory is allocated at runtime and is used for dynamic memory allocation, such as objects created using 'new' keyword in C++.
Stack memory is limited in size and is typically smaller than heap memory....read more
Q138. types of operating system
Operating systems are software that manage computer hardware resources and provide services for computer programs.
Types include Windows, macOS, Linux, Unix, Android, iOS
Each type has its own features and capabilities
Some are designed for specific devices like smartphones or servers
Q139. In Binomial Coefficient as the name suggests we are required to find out the binomial coefficient, i.eC(n,r).
Binomial coefficient is used to find the number of ways to choose r items from n items.
Binomial coefficient formula is C(n,r) = n! / (r! * (n-r)!)
It is used in probability and combinatorics
Example: C(5,2) = 10, which means there are 10 ways to choose 2 items from 5 items
Q140. Why we do Kernal upgrade?
Kernel upgrades are done to improve security, performance, and add new features to the operating system.
Enhances security by fixing vulnerabilities
Improves performance by optimizing code
Adds new features and functionalities
Ensures compatibility with new hardware and software
Q141. how to create mutable class
To create a mutable class in Java, use the 'public' access modifier and provide setter methods for instance variables.
Use the 'public' access modifier for the class
Provide setter methods to modify instance variables
Avoid using 'final' keyword for instance variables
Q142. Equilibrium Index Problem Statement
Given an array Arr
consisting of N integers, your task is to find the equilibrium index of the array.
An index is considered as an equilibrium index if the sum of elements of...read more
Find the equilibrium index of an array where sum of elements on left equals sum on right.
Iterate through the array and calculate prefix sum and suffix sum at each index.
Compare prefix sum and suffix sum to find equilibrium index.
Return the left-most equilibrium index or -1 if none found.
Q143. Why are Java Strings immutable in nature?
Java Strings are immutable to ensure security, thread safety, and efficient memory usage.
Immutable Strings prevent malicious code from modifying the data.
Immutable Strings can be safely shared across multiple threads.
Immutable Strings allow for efficient memory usage by reusing existing objects.
Example: String s1 = "Hello"; s1.concat(" World"); // s1 remains "Hello"
Example: String s2 = "Java"; String s3 = s2.concat(" is awesome"); // s2 remains "Java", s3 is "Java is awesome"
Q144. What is budgeting
Budgeting is the process of creating a plan to manage income and expenses within a set timeframe.
Involves estimating income and expenses
Setting financial goals
Monitoring and adjusting the budget as needed
Examples: creating a monthly budget to track spending, saving for a vacation
Q145. 1)What is oops? 2)difference between method overloading and method overriding? 3)what is static?
Answers to common questions asked in a software developer interview.
OOPs stands for Object-Oriented Programming which is a programming paradigm based on the concept of objects.
Method overloading is when multiple methods have the same name but different parameters, while method overriding is when a subclass provides its own implementation of a method that is already present in its parent class.
Static is a keyword used to create variables and methods that belong to a class rath...read more
Q146. The tools you worked in
I have experience working with a variety of tools including Salesforce, Tableau, and SQL.
Salesforce
Tableau
SQL
Q147. What is the difference between getch() and getche()?
getch() reads a character from the console without echoing it, while getche() echoes the character.
getch() is used for password input where the characters should not be displayed on the screen.
getche() is used for input where the user needs to see the character they are typing.
Both functions are part of the conio.h header file in C.
getch() returns the ASCII value of the character read, while getche() returns the character itself.
Q148. What are the advantages of NumPy arrays over Python lists?
NumPy arrays are faster and more efficient than Python lists.
NumPy arrays are homogeneous and can only contain elements of the same data type.
NumPy arrays support vectorized operations, making them faster for mathematical operations.
NumPy arrays use less memory than Python lists.
NumPy arrays can be easily reshaped and transposed.
Example: calculating the dot product of two arrays is faster with NumPy than with Python lists.
Example: reshaping an array to a different size is eas...read more
Q149. Illustrate public static void main(String args[]) in Java.
Illustrating public static void main(String args[]) in Java
public: access modifier indicating that the method can be accessed from anywhere
static: keyword indicating that the method belongs to the class and not to an instance of the class
void: return type indicating that the method does not return any value
main: name of the method that is the entry point of the program
String args[]: parameter of the method that is an array of strings representing the command line arguments pa...read more
Q150. What are the causes of user not able to login application
Possible causes of user not able to login to an application
Incorrect username or password
Account locked or disabled
Expired password
Network connectivity issues
Application server down
Incorrect permissions or access rights
Firewall blocking access
Authentication server issues
Application configuration errors
Q151. What is the difference between roll-up and scan component?
Roll-up and scan components are both used in data processing, but they have different functions and purposes.
Roll-up is a data aggregation technique that summarizes data at a higher level of granularity.
Scan component, on the other hand, is used to read and process data sequentially.
Roll-up is commonly used in data warehousing to generate summary reports or perform calculations on aggregated data.
Scan component is often used in data processing pipelines to iterate through lar...read more
Q152. What are the important categaries of software?
The important categories of software are system software, application software, and programming software.
System software: manages computer hardware and provides common services for other software. Examples: operating systems, device drivers, firmware.
Application software: performs specific tasks for end-users. Examples: word processors, web browsers, video games.
Programming software: provides tools for software developers to create, debug, and maintain software. Examples: com...read more
Q153. What’s the difference between item and inventory.
Items are individual products while inventory is the total stock of items.
An item is a single product that can be sold or purchased.
Inventory is the total stock of items that a business has on hand.
Items are tracked individually while inventory is tracked as a whole.
For example, a clothing store may have 100 items of clothing in inventory, but each item is tracked separately by size and color.
Q154. Why do you use two mobile numbers
To separate personal and professional calls, and to ensure availability and accessibility.
Separate personal and professional calls
Ensure availability and accessibility
Maintain work-life balance
Avoid mixing personal and work-related contacts
Q155. 1. Introduce yourself 2. How to fetch 50% record from table using SQL query
To fetch 50% records from a table using SQL query
Use the LIMIT clause to specify the number of records to return
Calculate 50% of the total records in the table to determine the limit value
Order the records in a specific way if needed before applying the LIMIT clause
Q156. How many teams involved in spiral model?
The number of teams involved in spiral model varies based on the project requirements.
Spiral model is a flexible model that allows for multiple teams to work on different phases simultaneously.
The number of teams involved can range from one to many depending on the size and complexity of the project.
Each team is responsible for a specific phase of the project, such as planning, design, implementation, and testing.
For example, a large software development project may involve m...read more
Q157. Tell about Data Structures in C++
Data structures in C++ are used to organize and store data efficiently.
C++ provides various built-in data structures like arrays, linked lists, stacks, queues, trees, and graphs.
These data structures can be used to store and manipulate data in an efficient manner.
C++ also allows for the creation of user-defined data structures using classes and structures.
The choice of data structure depends on the type of data and the operations that need to be performed on it.
Q158. Rat in a Maze Problem Statement
You need to determine all possible paths for a rat starting at position (0, 0) in a square maze to reach its destination at (N-1, N-1). The maze is represented as an N*N matrix w...read more
The task is to find all possible paths for a rat to navigate through a maze from start to finish.
Use backtracking to explore all possible paths in the maze.
Keep track of the current path and explore all possible directions at each step.
When reaching the destination, add the path to the list of valid paths.
Sort the list of paths in alphabetical order before returning.
Q159. what is eigrp , ospf, encapsulation, osi layer
EIGRP and OSPF are routing protocols used in computer networks. Encapsulation is a process of adding headers and trailers to data. OSI layer is a model for network communication.
EIGRP (Enhanced Interior Gateway Routing Protocol) and OSPF (Open Shortest Path First) are protocols used for routing data in computer networks.
Encapsulation is a process of adding headers and trailers to data as it moves through the network.
OSI (Open Systems Interconnection) layer is a model for netw...read more
Q160. What is linked list and what are its types
A linked list is a data structure where each element points to the next element in the sequence.
Types: Singly linked list, Doubly linked list, Circular linked list
In a singly linked list, each element points to the next element.
In a doubly linked list, each element points to both the next and previous elements.
In a circular linked list, the last element points back to the first element.
Q161. What is SDLC in software engineering
SDLC stands for Software Development Life Cycle, a process used by software engineers to design, develop, and test software applications.
SDLC is a structured process that consists of several phases including planning, analysis, design, implementation, testing, and maintenance.
Each phase of SDLC has its own set of activities and deliverables to ensure the successful completion of the software project.
Examples of SDLC models include Waterfall, Agile, and DevOps, each with its o...read more
Q162. Family member Gst How kind of GST? Why Accounts is important?
GST is a tax system implemented in many countries to replace multiple indirect taxes.
GST stands for Goods and Services Tax.
It is a tax system implemented in many countries to replace multiple indirect taxes.
GST aims to simplify the tax structure, promote transparency, and reduce tax evasion.
It is a value-added tax levied on the supply of goods and services.
GST is categorized into different rates such as 0%, 5%, 12%, 18%, and 28% depending on the nature of the goods or service...read more
Q163. Yogesh And Primes Problem Statement
Yogesh, a bright student interested in Machine Learning research, must pass a test set by Professor Peter. To do so, Yogesh must correctly answer Q questions where each quest...read more
Yogesh needs to find the minimum possible integer P such that there are at least K prime numbers in the range [A, P].
Iterate from A to B and check if each number is prime
Keep track of the count of prime numbers found in the range [A, P]
Return the minimum P that satisfies the condition or -1 if no such integer exists
Q164. You are alone in a room. You are given multiple number of candles. You have no measuring aids with you. You have a match box with you. You have to accurately measure 45 minutes. The total time a candle takes to...
read moreUse two candles, light one at both ends and the other at one end. When the first candle burns out, 30 minutes have passed. Then light the other end of the second candle to measure 15 more minutes.
Light one candle at both ends and the other at one end
When the first candle burns out, 30 minutes have passed
Light the other end of the second candle to measure 15 more minutes
Q165. How create a user in single line commands
A user can be created in a single line command using the 'useradd' command in Linux.
Use the 'useradd' command followed by the username to create a user.
Specify additional options like home directory, shell, etc. if required.
Example: useradd john -m -s /bin/bash
Q166. Talk for 3 min in any topic of your interest
Discussing the impact of artificial intelligence on society
Introduction to artificial intelligence and its applications
Benefits of AI in various industries such as healthcare, finance, and transportation
Ethical considerations and concerns surrounding AI technology
Future implications of AI on the job market and economy
Q167. What are your preffered location?
I prefer locations with a good work-life balance, access to outdoor activities, and a vibrant tech community.
Good work-life balance is important to me
Access to outdoor activities like hiking and biking
Vibrant tech community for networking and growth opportunities
Q168. 4)what is java& feature of java?
Java is a popular programming language known for its portability and security features.
Java is an object-oriented language
It is platform-independent and can run on any device with a JVM
Java has automatic memory management through garbage collection
It has strong security features such as sandboxing and encryption
Java has a vast library of pre-built classes and APIs
Examples of Java-based applications include Android apps, enterprise software, and web applications
Q169. What do you know about Capg?
Capgemini is a global leader in consulting, technology services and digital transformation.
Capgemini is a multinational corporation headquartered in France.
It provides consulting, technology services, and digital transformation.
Capgemini operates in over 40 countries and has around 200,000 employees worldwide.
Q170. Difference between Union and Union All in Sql
Union combines and removes duplicates, Union All combines without removing duplicates.
Union merges the result sets of two or more SELECT statements and removes duplicates
Union All merges the result sets of two or more SELECT statements without removing duplicates
Union is slower than Union All as it involves removing duplicates
Example: SELECT column1 FROM table1 UNION SELECT column1 FROM table2;
Example: SELECT column1 FROM table1 UNION ALL SELECT column1 FROM table2;
Q171. Difference between list and tuple in python
List is mutable, tuple is immutable in Python.
List can be modified after creation, tuple cannot.
List uses square brackets [], tuple uses parentheses ().
List is used for collections of items that may change, tuple for fixed collections.
Example: list_example = [1, 2, 3], tuple_example = (4, 5, 6)
Q172. How to monitor infrastructure and generate alert for crises
Infrastructure monitoring and alert generation for crises
Implement a monitoring system that tracks key metrics such as CPU usage, memory usage, network traffic, and disk space
Set up alerts for when these metrics exceed certain thresholds or when there are anomalies in the data
Use a centralized dashboard to view the status of all infrastructure components and quickly identify any issues
Ensure that the alert system is reliable and can send notifications via multiple channels su...read more
Q173. ip address configuration , types of switching
IP address configuration and types of switching are important networking concepts.
IP address configuration involves assigning unique addresses to devices on a network.
Types of switching include circuit switching, packet switching, and message switching.
Circuit switching establishes a dedicated communication path between two devices.
Packet switching breaks data into packets and sends them individually across the network.
Message switching stores entire messages in nodes along t...read more
Q174. What do you known about oops
OOPs stands for Object-Oriented Programming. It is a programming paradigm based on the concept of objects, which can contain data and code.
OOPs focuses on creating objects that interact with each other to solve a problem
It involves concepts like encapsulation, inheritance, polymorphism, and abstraction
Encapsulation refers to bundling data and methods that operate on the data into a single unit
Inheritance allows a class to inherit properties and behavior from another class
Poly...read more
Q175. what is filter in java 8
Filter in Java 8 is a method used to iterate through a collection and filter out elements based on a specified condition.
Filter is a method in the Stream interface in Java 8.
It takes a Predicate as an argument to specify the condition for filtering.
Example: List
names = Arrays.asList("Alice", "Bob", "Charlie"); List filteredNames = names.stream().filter(name -> name.startsWith("A")).collect(Collectors.toList());
Q176. Tell about the Binary Search
Binary search is a search algorithm that finds the position of a target value within a sorted array.
It works by repeatedly dividing in half the portion of the array that could contain the target value.
It has a time complexity of O(log n).
It can be implemented recursively or iteratively.
Example: Searching for the number 7 in the sorted array [1, 3, 5, 7, 9] would return index 3.
Q177. What is spiral model?
Spiral model is a software development model where the process is divided into smaller cycles.
It is a combination of waterfall and iterative model
Each cycle involves planning, risk analysis, development, and testing
It is suitable for large and complex projects
Example: Microsoft Office was developed using the spiral model
Q178. How to troubleshoot Jenkins pipeline if aborted
To troubleshoot a Jenkins pipeline if aborted, check logs, identify the cause, and fix the issue.
Check the Jenkins console output for error messages
Identify the stage or step where the pipeline was aborted
Check the logs for any relevant information
Fix the issue and rerun the pipeline
Q179. What are all the accounting principles?
Accounting principles are the guidelines and rules that companies must follow when preparing financial statements.
The principles include: accrual principle, consistency principle, going concern principle, matching principle, materiality principle, monetary unit principle, objectivity principle, prudence principle, and relevance principle.
Accrual principle states that revenue and expenses should be recognized when earned or incurred, not when cash is received or paid.
Consisten...read more
Q180. WHAT is SDLC in testing
SDLC in testing refers to the Software Development Life Cycle followed specifically for testing purposes.
SDLC in testing involves planning, designing, executing, and evaluating the testing activities within the overall software development process.
It includes phases such as requirement analysis, test planning, test design, test execution, and test closure.
SDLC in testing ensures that the software meets the specified requirements and is of high quality before release.
Examples ...read more
Q181. What is method overloading?
Method overloading is when a class has multiple methods with the same name but different parameters.
Method overloading allows for more flexibility in method calls
The methods must have different parameters, either in number or type
Example: public void print(int num) and public void print(String str)
Overloading constructors is also common in Java
Q182. How many steps spiral model?
The spiral model has four steps.
The four steps are: Planning, Risk Analysis, Engineering, and Evaluation.
Each step involves iterative development and feedback from stakeholders.
The model is used in software development to manage risk and ensure quality.
Example: A software development team may use the spiral model to create a new product.
The team would start with planning, then move on to risk analysis, engineering, and evaluation.
Q183. Java opps concept and implementation
Java OOPs concepts refer to the principles of Object-Oriented Programming and their implementation in Java.
Java OOPs concepts include inheritance, encapsulation, polymorphism, and abstraction.
Inheritance allows a class to inherit properties and behavior from another class.
Encapsulation involves bundling data and methods that operate on the data into a single unit.
Polymorphism allows objects to be treated as instances of their parent class.
Abstraction involves hiding the imple...read more
Q184. How suppliers are set up
Suppliers are set up through a process of evaluation and selection based on factors such as quality, reliability, and cost.
Suppliers are evaluated based on their ability to meet the company's needs and requirements.
Factors such as quality, reliability, cost, and delivery time are taken into consideration.
The company may also consider the supplier's reputation, financial stability, and environmental practices.
Once a supplier is selected, a contract is typically negotiated and ...read more
Q185. What do you mean by reconciliation and how it is performed
Reconciliation is the process of comparing two sets of records to ensure they are in agreement.
Reconciliation involves identifying discrepancies between the two sets of records.
It is often performed in accounting to ensure financial transactions are accurately recorded.
Reconciliation can be done manually or using software tools.
Examples include bank reconciliation, where a company compares its internal financial records with those of the bank.
Another example is inventory reco...read more
Q186. How to set passwd newly created user
To set the password for a newly created user in Linux, use the 'passwd' command followed by the username.
Open the terminal or SSH into the Linux system
Run the 'passwd' command followed by the username of the new user
Enter and confirm the new password when prompted
Q187. functional vs non-functional programming
Functional programming focuses on functions as first-class citizens, while non-functional programming focuses on procedures and commands.
Functional programming emphasizes immutability and pure functions.
Non-functional programming allows for mutable state and side effects.
Examples of functional programming languages include Haskell and Lisp.
Examples of non-functional programming languages include C and Python.
Q188. What is java?
Java is a high-level, object-oriented programming language used to develop applications for various platforms.
Java is platform-independent and can run on any device with a Java Virtual Machine (JVM)
It is known for its security features and is commonly used for developing web and mobile applications
Java is also used for developing enterprise-level applications and software tools
Examples of popular Java-based applications include Minecraft, Android OS, and Apache Hadoop
Q189. What is method overriding?
Method overriding is when a subclass provides its own implementation of a method that is already defined in its superclass.
The method in the subclass must have the same name, return type, and parameters as the method in the superclass.
The access level of the overriding method cannot be more restrictive than the overridden method.
Example: class Dog extends Animal { public void makeSound() { System.out.println("Bark"); } }
Example: Animal myAnimal = new Dog(); myAnimal.makeSound...read more
Q190. Write a Program In Python
Program to find the sum of two numbers
Take input from user for two numbers
Add the two numbers using the '+' operator
Print the sum of the two numbers
Q191. What is cron job how to write
A cron job is a scheduled task that runs automatically at specific intervals on a Linux system.
Cron jobs are managed by the cron daemon, which reads a configuration file called crontab.
To write a cron job, you need to edit the crontab file using the 'crontab' command.
Each line in the crontab file represents a separate cron job and follows a specific format.
The format consists of five fields: minute, hour, day of month, month, and day of week.
You can use various symbols and op...read more
Q192. I heard that you are good at MS Excel, which formulas you might use in daily work?
I use various formulas in MS Excel for data analysis and management.
SUM, AVERAGE, MAX, MIN for basic calculations
VLOOKUP, HLOOKUP for data retrieval
IF, COUNTIF, SUMIF for conditional calculations
Pivot tables for data summarization
Data validation for data entry control
Q193. Spark interview questions 1. Re-partition vs coalesce 2. DataSet vs Dataframe 3. Optimization of spark jobs 4. CI/CD Process 5. Spark jobs debugging Spark SQL One question on ranking department, employee tables
The question is about Spark interview questions, specifically on topics like re-partition vs coalesce, DataSet vs Dataframe, optimization of Spark jobs, CI/CD process, and Spark jobs debugging.
Re-partition is used to increase or decrease the number of partitions in a RDD/DataFrame, while coalesce is used to decrease the number of partitions.
DataSet is a distributed collection of data organized into named columns, while DataFrame is a distributed collection of data organized i...read more
Q194. What is data?
Data is information that is stored and can be processed by a computer.
Data can be in various forms such as text, numbers, images, audio, video, etc.
Data can be structured or unstructured.
Examples of data include customer information, financial records, sensor readings, social media posts, etc.
Q195. What is method?
A method is a block of code that performs a specific task and can be called by other parts of the program.
Methods are used to break down a program into smaller, more manageable pieces.
They can take input parameters and return values.
Examples of methods include print(), sort(), and calculateArea().
Q196. Tell me about trigger Governor limit Soql sosl Relationship in Salesforce
Triggers are code that execute before or after specific events occur in Salesforce. Governor limits are limits on resources that a single transaction can consume. SOQL and SOSL are query languages used to search for data in Salesforce. Relationships define how objects are related to each other in Salesforce.
Triggers are used to automate processes in Salesforce
Governor limits prevent a single transaction from consuming too many resources
SOQL is used to search for data in a sin...read more
Q197. What is SAP BTP ?
SAP BTP stands for SAP Business Technology Platform, a platform that combines database and data management, analytics, application development, and integration services.
Combines database and data management services
Includes analytics capabilities
Provides application development tools
Offers integration services
Enables businesses to build, extend, and integrate applications in the cloud
To put the ball in the hole with minimum movement of tiles, plan the path strategically.
Plan the path of the ball in advance to minimize tile movements
Use the fewest number of tiles possible to reach the hole
Avoid unnecessary movements by analyzing the layout of the tiles
Consider different angles and trajectories to optimize the path
Q199. What is journal entry? Give some examples.
Journal entry is a record of financial transactions in a company's accounting system.
Journal entry is used to record transactions in the general ledger.
It includes the date, accounts affected, and the amount of the transaction.
Examples include recording a sale, paying a bill, or adjusting an account balance.
Journal entries are used to create financial statements and track the financial health of a company.
Q200. What is dns? & What will u do secure a website?
DNS stands for Domain Name System. It is a system that translates domain names into IP addresses.
DNS is used to resolve domain names to IP addresses
It works by querying DNS servers to find the IP address associated with a domain name
To secure a website, one can use SSL/TLS certificates to encrypt data transmitted between the website and the user
Other security measures include implementing firewalls, using strong passwords, and keeping software up to date
More about working at Capgemini
Top HR Questions asked in Axis Finance
Interview Process at Axis Finance
Top Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month