Capgemini
70+ Dinu Electricals , Cochin, Kerala Interview Questions and Answers
Q1. If a computer speed is slow, how will you increase its speed?
To increase computer speed, optimize startup programs, remove malware, upgrade hardware, and clear disk space.
Optimize startup programs to reduce the number of programs running at startup
Remove malware using antivirus software
Upgrade hardware such as RAM or SSD
Clear disk space by deleting unnecessary files and programs
Disable visual effects to improve performance
Q2. Why is it suggested to utilise a database management system (DBMS)? List some of its primary advantages to explain.
A DBMS is suggested for efficient data management. It offers advantages like data security, scalability, and data integrity.
DBMS ensures data security by providing access control and authentication mechanisms.
It allows for efficient data retrieval and manipulation through indexing and query optimization.
DBMS offers scalability by allowing for easy addition of new data and users.
It ensures data integrity by enforcing constraints and providing backup and recovery mechanisms.
Exa...read more
Q3. In Search, in an almost sorted array problem, we have to find the index of an element in the array, The problem can be solved by using the binary search technique,
Binary search technique can be used to find the index of an element in an almost sorted array.
Binary search is efficient for large arrays.
The array must be sorted in ascending or descending order.
If the element is not found, return -1.
Example: [1, 3, 5, 7, 9], target = 5, output = 2
Q4. What is the drawback of scanf() and how can it be avoided (if any)?
The drawback of scanf() is that it does not handle input validation well, leading to buffer overflow and security vulnerabilities.
scanf() does not limit the amount of input it reads, leading to buffer overflow if the input is larger than the buffer size.
scanf() does not handle invalid input well, leading to unexpected behavior or crashes.
To avoid these issues, input validation should be performed before using scanf(). Alternatively, fgets() and sscanf() can be used for safer ...read more
Q5. How computer connects to internet and how to solve if not getting connected?
A computer connects to the internet through a modem or router. Troubleshoot by checking connections and resetting devices.
A computer can connect to the internet through a wired or wireless connection
A modem or router is required to connect to the internet
Check if the modem or router is properly connected and turned on
Reset the modem or router if necessary
Check network settings on the computer
Try restarting the computer or device
Contact internet service provider for further as...read more
Q6. If a monitor is blank, what troubleshooting will you do to make it operational?
To troubleshoot a blank monitor, check power, cables, and settings.
Check if the monitor is receiving power and turned on
Check if the cables are properly connected and not damaged
Check the display settings on the computer
Try connecting the monitor to a different computer or device
Check for any error messages or codes on the monitor
If all else fails, try resetting the monitor to factory settings
Q7. In Binomial Coefficient as the name suggests we are required to find out the binomial coefficient, i.eC(n,r).
Binomial coefficient is used to find the number of ways to choose r items from n items.
Binomial coefficient formula is C(n,r) = n! / (r! * (n-r)!)
It is used in probability and combinatorics
Example: C(5,2) = 10, which means there are 10 ways to choose 2 items from 5 items
Q8. Why are Java Strings immutable in nature?
Java Strings are immutable to ensure security, thread safety, and efficient memory usage.
Immutable Strings prevent malicious code from modifying the data.
Immutable Strings can be safely shared across multiple threads.
Immutable Strings allow for efficient memory usage by reusing existing objects.
Example: String s1 = "Hello"; s1.concat(" World"); // s1 remains "Hello"
Example: String s2 = "Java"; String s3 = s2.concat(" is awesome"); // s2 remains "Java", s3 is "Java is awesome"
Q9. What are pointers and OOPS and describe it's pillars.
Pointers and OOPS are fundamental concepts in programming. OOPS has four pillars: Abstraction, Encapsulation, Inheritance, and Polymorphism.
Pointers are variables that store the memory address of another variable.
OOPS stands for Object-Oriented Programming System.
Abstraction is the process of hiding complex implementation details and showing only the necessary information.
Encapsulation is the process of binding data and functions that manipulate that data together in a single...read more
Q10. Why did you use Python in your project and not any other language?
Python was chosen for its readability, versatility, and extensive libraries.
Python's readability makes it easier for team collaboration and code maintenance.
Python's versatility allows for both simple scripting and complex application development.
Python's extensive libraries provide ready-made solutions for various tasks, saving time and effort.
For example, in our project, we needed to work with data analysis and visualization, for which Python's libraries like Pandas and Mat...read more
Q11. What is the phone and laptop you have? State it's classification
I have an iPhone 12 and a MacBook Pro, both classified as premium devices.
My iPhone 12 is a premium smartphone from Apple with a 6.1-inch Super Retina XDR display and A14 Bionic chip.
My MacBook Pro is a premium laptop from Apple with a 13-inch Retina display and M1 chip.
Both devices are classified as premium due to their high-end specifications and premium build quality.
Q12. What is the difference between getch() and getche()?
getch() reads a character from the console without echoing it, while getche() echoes the character.
getch() is used for password input where the characters should not be displayed on the screen.
getche() is used for input where the user needs to see the character they are typing.
Both functions are part of the conio.h header file in C.
getch() returns the ASCII value of the character read, while getche() returns the character itself.
Q13. What are the advantages of NumPy arrays over Python lists?
NumPy arrays are faster and more efficient than Python lists.
NumPy arrays are homogeneous and can only contain elements of the same data type.
NumPy arrays support vectorized operations, making them faster for mathematical operations.
NumPy arrays use less memory than Python lists.
NumPy arrays can be easily reshaped and transposed.
Example: calculating the dot product of two arrays is faster with NumPy than with Python lists.
Example: reshaping an array to a different size is eas...read more
Q14. Illustrate public static void main(String args[]) in Java.
Illustrating public static void main(String args[]) in Java
public: access modifier indicating that the method can be accessed from anywhere
static: keyword indicating that the method belongs to the class and not to an instance of the class
void: return type indicating that the method does not return any value
main: name of the method that is the entry point of the program
String args[]: parameter of the method that is an array of strings representing the command line arguments pa...read more
Q15. What is ip address and what it does?
An IP address is a unique numerical identifier assigned to devices connected to a network, allowing them to communicate with each other.
IP stands for Internet Protocol
It consists of a series of numbers separated by dots
There are two types of IP addresses: IPv4 and IPv6
IPv4 addresses are 32-bit numbers and IPv6 addresses are 128-bit numbers
Examples of IP addresses are 192.168.1.1 and 2001:0db8:85a3:0000:0000:8a2e:0370:7334
Q16. What’s the difference between item and inventory.
Items are individual products while inventory is the total stock of items.
An item is a single product that can be sold or purchased.
Inventory is the total stock of items that a business has on hand.
Items are tracked individually while inventory is tracked as a whole.
For example, a clothing store may have 100 items of clothing in inventory, but each item is tracked separately by size and color.
Q17. What is networkiing? What is DHCP? What is Proxy server?What is VPN?
Networking is the practice of connecting devices to share resources. DHCP assigns IP addresses. Proxy server acts as an intermediary. VPN creates a secure connection over the internet.
Networking is the process of connecting devices to share resources such as files, printers, and internet access.
DHCP (Dynamic Host Configuration Protocol) is a network protocol that assigns IP addresses to devices on a network automatically.
A proxy server acts as an intermediary between a client...read more
Q18. What SAP. Company code,chart of account etc
SAP is an enterprise resource planning software used for managing business operations. Company code is a unique identifier for a company in SAP. Chart of accounts is a list of all the accounts used by a company.
SAP is used for managing business operations
Company code is a unique identifier for a company in SAP
Chart of accounts is a list of all the accounts used by a company
Q19. What is SharePoint have you work on that
SharePoint is a web-based collaborative platform used for document management and team collaboration.
SharePoint is developed by Microsoft.
It allows users to store, organize, and share information.
It offers features such as document libraries, lists, workflows, and web parts.
I have worked on creating custom workflows and designing SharePoint sites for clients.
Q20. What is the difference between call by value and call by reference
Call by value passes a copy of the value while call by reference passes the address of the value.
Call by value creates a new copy of the value and any changes made to the copy do not affect the original value.
Call by reference passes the address of the value and any changes made to the value affect the original value.
Call by value is used for simple data types like int, float, etc. while call by reference is used for complex data types like arrays, structures, etc.
In call by ...read more
Q21. Difference between Data and information
Data is raw facts and figures, while information is processed data that has meaning and context.
Data is unorganized and meaningless without context.
Information is organized and has context, making it useful for decision-making.
Data can be numbers, words, images, etc.
Information is the result of analyzing and interpreting data.
Example: A list of numbers is data, but a graph showing trends is information.
Q22. What is https and how did you hack into network.
HTTPS stands for Hypertext Transfer Protocol Secure, it is a secure version of HTTP used for secure communication over a computer network.
HTTPS encrypts data to ensure secure communication between a web browser and a server.
To hack into a network, one would need to exploit vulnerabilities in the network's security protocols or gain unauthorized access to sensitive information.
Examples of hacking methods include phishing attacks, malware injections, and brute force attacks.
Q23. What is Gross Profit? What is Net Profit? What do you understand by Forecasting and Budgeting?
Gross Profit is the difference between revenue and the cost of goods sold. Net Profit is the remaining profit after deducting all expenses from the Gross Profit. Forecasting involves predicting future financial outcomes, while Budgeting involves setting financial goals and allocating resources accordingly.
Gross Profit = Revenue - Cost of Goods Sold
Net Profit = Gross Profit - Expenses
Forecasting involves predicting future financial outcomes based on historical data and market ...read more
Q24. What is event value assigned for each event
Event value is assigned based on the importance of the event and its impact on the business.
Event value is a subjective measure assigned by the business.
It can vary based on the type of event and its impact on the business.
For example, a major system outage may have a higher event value than a minor bug.
Event value is used to prioritize and allocate resources for incident management.
Q25. What is dns server? What is DC?
DNS server is a computer server that contains a database of public IP addresses and their associated hostnames.
DNS stands for Domain Name System
It translates domain names into IP addresses
DNS servers can be authoritative or recursive
DC stands for Domain Controller
It is a server that authenticates users and computers in a Windows domain network
It manages security policies and distributes software updates
Q26. what is eigrp , ospf, encapsulation, osi layer
EIGRP and OSPF are routing protocols used in computer networks. Encapsulation is a process of adding headers and trailers to data. OSI layer is a model for network communication.
EIGRP (Enhanced Interior Gateway Routing Protocol) and OSPF (Open Shortest Path First) are protocols used for routing data in computer networks.
Encapsulation is a process of adding headers and trailers to data as it moves through the network.
OSI (Open Systems Interconnection) layer is a model for netw...read more
Q27. What is linked list and what are its types
A linked list is a data structure where each element points to the next element in the sequence.
Types: Singly linked list, Doubly linked list, Circular linked list
In a singly linked list, each element points to the next element.
In a doubly linked list, each element points to both the next and previous elements.
In a circular linked list, the last element points back to the first element.
Q28. What you know about Profit and loss
Profit and loss refers to the financial statement that shows a company's revenues, expenses, and net income or loss over a specific period.
Profit is the amount of money a company earns after deducting all expenses.
Loss is the amount of money a company loses when expenses exceed revenue.
Profit and loss statement is also known as income statement or statement of operations.
It helps in analyzing a company's financial performance and making informed business decisions.
Example: If...read more
Q29. How to select everything in a query?
Use the * wildcard to select everything in a query.
Use SELECT * FROM table_name to select all columns in a table.
Use SELECT * to select all columns from all tables in a database.
Use SELECT * WHERE condition to select all rows that meet a specific condition.
Q30. What is activites of on page seo
On-page SEO refers to optimizing individual web pages to rank higher and earn more relevant traffic in search engines.
Keyword research and optimization
Title tags and meta descriptions
Header tags (H1, H2, etc.)
Content optimization (including internal linking)
Image optimization
URL structure
Page speed optimization
Mobile responsiveness
Schema markup
User experience (UX) design
Q31. Difference between inheritance and abstract class
Inheritance is a way to create a new class based on an existing class, while an abstract class cannot be instantiated and serves as a blueprint for other classes.
Inheritance allows a subclass to inherit properties and methods from a superclass.
An abstract class cannot be instantiated and must be extended by a subclass.
An abstract class can have abstract methods, which must be implemented by any subclass that extends it.
Inheritance can lead to tight coupling between classes, w...read more
Q32. Name some python libraries you have used in python.
I have used libraries like Pandas, NumPy, Matplotlib, and Scikit-learn in Python for data analysis and machine learning tasks.
Pandas - for data manipulation and analysis
NumPy - for numerical computing
Matplotlib - for data visualization
Scikit-learn - for machine learning tasks
Q33. Explain Principal Component Analysis and its importance in data optimization.
Principal Component Analysis (PCA) is a statistical technique used to reduce the dimensionality of data while preserving as much variance as possible.
PCA is used to identify patterns in data and highlight the most important aspects of the data.
It helps in reducing the number of variables in a dataset by transforming them into a smaller set of uncorrelated variables called principal components.
PCA is important in data optimization as it can help in visualizing high-dimensional...read more
Q34. Functions and stored procedure difference
Functions return a value while stored procedures do not.
Functions are used to perform a specific task and return a value to the caller.
Stored procedures are used to execute a set of SQL statements and do not return a value.
Functions can be used in SELECT, WHERE, and HAVING clauses while stored procedures cannot.
Functions can be called from within stored procedures.
Q35. How to test in different browsers
Testing in different browsers involves using cross-browser testing tools and techniques.
Use cross-browser testing tools like BrowserStack or Sauce Labs to test in multiple browsers simultaneously
Manually test in different browsers by installing them on your local machine or using virtual machines
Utilize browser developer tools to debug and troubleshoot issues specific to certain browsers
Q36. What is abstraction/ polymorphism
Abstraction is the concept of hiding complex implementation details and showing only the necessary information. Polymorphism allows objects of different classes to be treated as objects of a common superclass.
Abstraction involves creating a simplified view of an object by hiding unnecessary details.
Polymorphism allows a single interface to be used for different data types or classes.
Example of abstraction: A car dashboard hides the internal workings of the car and only displa...read more
Q37. What is conversation Goal?
Conversation goal is the desired outcome of a conversation between two or more parties.
It can be to exchange information, persuade someone, or build a relationship.
The goal should be clear and communicated to all parties involved.
Examples include closing a sale, resolving a conflict, or reaching a decision.
Effective communication skills are necessary to achieve the conversation goal.
Q38. Difference between union and union all?
Union combines and removes duplicates, while Union All combines all rows including duplicates.
Union removes duplicates, Union All includes duplicates
Union is slower as it has to remove duplicates, Union All is faster
Union is used when you want to combine and remove duplicates, Union All is used when you want to combine all rows
Q39. ip address configuration , types of switching
IP address configuration and types of switching are important networking concepts.
IP address configuration involves assigning unique addresses to devices on a network.
Types of switching include circuit switching, packet switching, and message switching.
Circuit switching establishes a dedicated communication path between two devices.
Packet switching breaks data into packets and sends them individually across the network.
Message switching stores entire messages in nodes along t...read more
Q40. What do you known about oops
OOPs stands for Object-Oriented Programming. It is a programming paradigm based on the concept of objects, which can contain data and code.
OOPs focuses on creating objects that interact with each other to solve a problem
It involves concepts like encapsulation, inheritance, polymorphism, and abstraction
Encapsulation refers to bundling data and methods that operate on the data into a single unit
Inheritance allows a class to inherit properties and behavior from another class
Poly...read more
Q41. What is Normalisation?
Normalisation is the process of organizing data in a database to reduce redundancy and improve data integrity.
Normalisation involves breaking down data into smaller, more manageable tables
It helps in reducing data redundancy by storing data in a structured way
It ensures data integrity by avoiding update anomalies
Normalization is usually done up to third normal form (3NF)
Example: A customer table and an orders table linked by a customer ID to avoid repeating customer informati...read more
Q42. Three golden rules of accounting
The three golden rules of accounting are the rules of debit and credit, which are used to record financial transactions accurately.
Debit what comes in, credit what goes out
Debit the receiver, credit the giver
Debit expenses and losses, credit income and gains
Q43. What are layers of OSI?
OSI (Open Systems Interconnection) has 7 layers that define how devices communicate over a network.
The layers are: Physical, Data Link, Network, Transport, Session, Presentation, and Application.
Each layer has a specific function and communicates with the layers above and below it.
For example, the Physical layer deals with the physical connection between devices, while the Application layer deals with user interfaces and applications.
The layers help ensure that devices from d...read more
Q44. What is CIA? Explain each
CIA stands for Central Intelligence Agency, a civilian foreign intelligence service of the US government.
CIA is responsible for gathering and analyzing intelligence information from around the world.
It operates under the direction of the Director of National Intelligence and reports to the President.
CIA's activities include covert operations, counterintelligence, and analysis of foreign intelligence.
Examples of CIA operations include the capture of Osama bin Laden and the ove...read more
Q45. Sql server functions and concepts
SQL Server functions and concepts
SQL Server functions are pre-built functions that perform specific tasks
Common functions include string manipulation, date/time functions, and mathematical functions
Concepts include normalization, indexing, and stored procedures
Functions can be used in queries, views, and stored procedures
Examples of functions include CONCAT, DATEADD, and AVG
Normalization is the process of organizing data to reduce redundancy
Indexing improves query performance...read more
Q46. What is event catagory
Event category refers to the classification of an event based on its nature and purpose.
Events can be categorized as social, cultural, educational, sports, political, etc.
Event category helps in identifying the target audience and planning the event accordingly.
It also helps in marketing and promoting the event to the right audience.
Examples: music festival (cultural), charity run (sports), conference (educational), etc.
Q47. What is an event tracking
Event tracking is the process of monitoring and analyzing user interactions with a website or application.
It involves tracking user actions such as clicks, page views, and form submissions.
This data is used to optimize user experience and improve website or application performance.
Examples of event tracking tools include Google Analytics, Mixpanel, and Adobe Analytics.
Q48. what are Oops concepts ?
Oops concepts refer to Object-Oriented Programming principles such as Inheritance, Encapsulation, Polymorphism, and Abstraction.
Inheritance allows a class to inherit properties and behavior from another class.
Encapsulation involves bundling data and methods that operate on the data into a single unit.
Polymorphism allows objects to be treated as instances of their parent class.
Abstraction involves hiding the complex implementation details and showing only the necessary feature...read more
Q49. Different types of joins in SQL
Different types of joins in SQL
Inner Join: returns only the matching rows from both tables
Left Join: returns all the rows from the left table and matching rows from the right table
Right Join: returns all the rows from the right table and matching rows from the left table
Full Outer Join: returns all the rows from both tables, with NULL values in place of non-matching rows
Cross Join: returns the Cartesian product of both tables
Q50. What is dhcp server?
DHCP server assigns IP addresses to devices on a network.
DHCP stands for Dynamic Host Configuration Protocol.
It automatically assigns IP addresses to devices on a network.
It also provides other network configuration information like subnet mask, default gateway, DNS server, etc.
DHCP server reduces the manual work of network administrators.
Example: When you connect your laptop to a Wi-Fi network, DHCP server assigns an IP address to your laptop.
Q51. Explain collection framework
Collection framework is a set of classes and interfaces that provide a way to store and manipulate groups of objects.
It provides interfaces like List, Set, and Map for storing and manipulating data.
It includes classes like ArrayList, HashSet, and HashMap that implement these interfaces.
It provides algorithms like sorting and searching for manipulating data.
It is a part of the Java API and is widely used in Java programming.
Example: ArrayList
names = new ArrayList<>(); names.a...read more
Q52. What is Oops in java?
Oops in Java refers to Object-Oriented Programming concepts like inheritance, polymorphism, encapsulation, and abstraction.
Oops stands for Object-Oriented Programming.
It includes concepts like inheritance, polymorphism, encapsulation, and abstraction.
Inheritance allows a class to inherit properties and behavior from another class.
Polymorphism allows objects to be treated as instances of their parent class.
Encapsulation hides the internal state of an object and only exposes ne...read more
Q53. How suppliers are set up
Suppliers are set up through a process of evaluation and selection based on factors such as quality, reliability, and cost.
Suppliers are evaluated based on their ability to meet the company's needs and requirements.
Factors such as quality, reliability, cost, and delivery time are taken into consideration.
The company may also consider the supplier's reputation, financial stability, and environmental practices.
Once a supplier is selected, a contract is typically negotiated and ...read more
Q54. What is SDLC Life cycel
SDLC Life cycle is a process used by software development teams to design, develop, and test high-quality software.
SDLC stands for Software Development Life Cycle
It includes phases like planning, analysis, design, implementation, testing, and maintenance
Each phase has specific goals and deliverables to ensure the software meets requirements
Examples of SDLC models include Waterfall, Agile, and DevOps
Q55. functional vs non-functional programming
Functional programming focuses on functions as first-class citizens, while non-functional programming focuses on procedures and commands.
Functional programming emphasizes immutability and pure functions.
Non-functional programming allows for mutable state and side effects.
Examples of functional programming languages include Haskell and Lisp.
Examples of non-functional programming languages include C and Python.
Q56. COUNT in SQL
COUNT is a SQL function used to count the number of rows in a table or a result set.
COUNT can be used with the SELECT statement to count the number of rows that match a certain condition
COUNT(*) counts all rows in a table
COUNT(column_name) counts the number of non-null values in a specific column
Q57. What is Credit note
A credit note is a document issued by a seller to a buyer, reducing the amount owed by the buyer to the seller.
It is used to correct errors in invoices or to provide refunds to customers.
It typically includes details such as the reason for issuing the credit note, the amount being credited, and the original invoice number.
Credit notes are important for maintaining accurate financial records and ensuring customer satisfaction.
Q58. Difference between GA and GA-4
GA-4 is the latest version of Google Analytics, with improved features and data collection capabilities.
GA-4 uses an event-driven data model, while GA uses a session-based model.
GA-4 allows for more flexible data collection and analysis, including cross-device tracking and enhanced user identification.
GA-4 also includes machine learning capabilities for predictive analytics and automated insights.
GA-4 is still in beta and may not be suitable for all businesses or use cases.
GA...read more
Q59. How many types of triggers
There are two types of triggers: DML and DDL triggers.
DML triggers fire when a DML statement is executed on a table or view.
DDL triggers fire in response to DDL events like CREATE, ALTER, DROP, etc.
Examples of DML triggers include AFTER INSERT, UPDATE, and DELETE triggers.
Examples of DDL triggers include AFTER CREATE, ALTER, and DROP triggers.
Q60. What is autonomous transaction
Autonomous transaction is a transaction that is independent of the main transaction and can commit or rollback independently.
Autonomous transactions are used to perform a separate transaction within a larger transaction.
They are useful for logging, auditing, and error handling.
Autonomous transactions can commit or rollback independently of the main transaction.
They are commonly used in PL/SQL programming.
Example: A trigger that logs changes to a table using an autonomous tran...read more
Q61. What is SAP BTP ?
SAP BTP stands for SAP Business Technology Platform, a platform that combines database and data management, analytics, application development, and integration services.
Combines database and data management services
Includes analytics capabilities
Provides application development tools
Offers integration services
Enables businesses to build, extend, and integrate applications in the cloud
Q62. What is adlc?
ADLC stands for Asynchronous Distance Learning Courses.
ADLC refers to online courses that students can take at their own pace and schedule.
These courses typically do not require students to attend classes in person.
ADLC is commonly used in the education sector for remote learning.
Q63. What is Debit note
A debit note is a document used by a buyer to inform a seller of a return or deduction in the amount owed.
It is issued by the buyer to the seller to request a credit note or refund for goods returned or for an overpayment.
Contains details such as the reason for the return, quantity, and value of the goods being returned.
Helps in maintaining accurate records of transactions between the buyer and seller.
Used in accounting to adjust accounts payable or accounts receivable balanc...read more
Q64. Difference between DNS and DHCP
DNS resolves domain names to IP addresses, while DHCP assigns IP addresses to devices on a network.
DNS translates domain names to IP addresses
DHCP assigns IP addresses to devices on a network
DNS is used for name resolution, while DHCP is used for IP address assignment
Q65. Grouping in SQL
Grouping in SQL is used to group data based on one or more columns.
GROUP BY clause is used to group data in SQL
Aggregate functions like SUM, COUNT, AVG can be used with GROUP BY
GROUP BY can be used with HAVING clause to filter grouped data
Q66. select statement in SQL
SELECT statement is used in SQL to retrieve data from a database table.
Use SELECT followed by column names to retrieve specific data
Use * to retrieve all columns
Use WHERE clause to filter results based on conditions
Use ORDER BY to sort results
Use LIMIT to limit the number of rows returned
Q67. Available for Remote Location?
Yes, I am available for remote location.
Experienced in working remotely with previous employers
Have a dedicated home office setup for remote work
Comfortable with using virtual communication tools like Zoom and Slack
Q68. Difference between DDL and DML
DDL is used to define database schema while DML is used to manipulate data within the schema.
DDL stands for Data Definition Language and is used to create, modify, and delete database objects such as tables, indexes, and constraints.
DML stands for Data Manipulation Language and is used to insert, update, and delete data within the database objects created using DDL.
DDL statements are executed using CREATE, ALTER, and DROP commands while DML statements are executed using INSER...read more
Q69. What is a function
A function is a block of code that performs a specific task and can be called upon multiple times.
Functions can take in parameters and return values
Functions can be defined in different programming languages
Functions can be used to modularize code and make it more readable
Examples of functions include mathematical operations, string manipulation, and file I/O
Q70. Fibonacci series program
A program to generate Fibonacci series.
Fibonacci series is a sequence of numbers where each number is the sum of the previous two numbers.
The first two numbers of the series are always 0 and 1.
The program can be implemented using recursion or iteration.
Example: 0, 1, 1, 2, 3, 5, 8, 13, 21, 34, 55, 89, 144, 233, 377, 610, 987, 1597, 2584, 4181, 6765, 10946, 17711, 28657, 46368, 75025, 121393, 196418, 317811
Q71. OOPs concepts with example
OOPs concepts refer to the principles of Object-Oriented Programming, including encapsulation, inheritance, polymorphism, and abstraction.
Encapsulation: Bundling data and methods that operate on the data into a single unit (class). Example: a Car class with properties like make, model, and methods like start(), stop().
Inheritance: Allowing a new class (subclass) to inherit properties and behavior from an existing class (superclass). Example: a Vehicle class with Car and Truck...read more
Q72. sql joins queries with example
SQL joins are used to combine rows from two or more tables based on a related column between them.
Types of SQL joins include INNER JOIN, LEFT JOIN, RIGHT JOIN, and FULL JOIN.
Example: SELECT * FROM table1 INNER JOIN table2 ON table1.column = table2.column;
Example: SELECT * FROM table1 LEFT JOIN table2 ON table1.column = table2.column;
Q73. OOP concepts in C++
OOP concepts in C++ include encapsulation, inheritance, polymorphism, and abstraction.
Encapsulation: bundling data and methods that operate on the data into a single unit (class). Example: class Car { private: int speed; public: void accelerate() { speed++; } };
Inheritance: creating new classes based on existing classes, inheriting their attributes and methods. Example: class ElectricCar : public Car { };
Polymorphism: ability to present the same interface for different data t...read more
Q74. explain Database .
A database is a structured collection of data that is stored and accessed electronically.
A database organizes data into tables, which consist of rows and columns.
It allows for efficient storage, retrieval, and manipulation of data.
Examples of databases include MySQL, Oracle, and MongoDB.
Q75. Ready to sign bond
I am ready to sign a bond if required for the position.
I am willing to commit to the terms of the bond for the specified duration.
I understand the importance of fulfilling obligations and responsibilities.
I am confident in my ability to perform well in the role and contribute positively to the team.
I am prepared to discuss the details of the bond and seek clarification if needed.
Q76. Ready to relocate
Yes, I am open to relocating for the right opportunity.
I am willing to relocate for the right job opportunity
I have experience moving for previous roles
I am open to exploring new locations and cultures
Q77. rules of accounting
Rules of accounting are principles and guidelines that companies must follow when preparing financial statements.
Accounting principles provide a framework for recording and reporting financial information accurately.
Examples of accounting rules include the matching principle, revenue recognition principle, and historical cost principle.
GAAP (Generally Accepted Accounting Principles) and IFRS (International Financial Reporting Standards) are common sets of rules followed by co...read more
More about working at Capgemini
Top HR Questions asked in Dinu Electricals , Cochin, Kerala
Interview Process at Dinu Electricals , Cochin, Kerala
Top Senior Analyst Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month