Capgemini
100+ ELV Projects Pvt Ltd Interview Questions and Answers
Q1. 1. What's the use of update sets and how do you move update set from one instance to another? Once you imported the update set, what will you do? To check the customisations, You need to do open the update set ...
read moreInterview questions for Senior Consultant role
Update sets are used to move customizations from one instance to another
To move multiple update sets at once, use the Update Set Migration plugin
Custom applications can be developed using ServiceNow's App Creator
Turnstile activity in workflow is used to loop back to a previous activity
Activities in workflows include approvals, notifications, and subflows
To copy fields from incident table to task record, use a UI action with script...read more
Q2. 1. If MAM is there then why do we need MDM? 2. What are the different type of Android device enrollment methods? 3. What do you know about Apple Push Notification Services? 4. What will happen if APNS is not re...
read moreInterview questions for Senior Consultant role related to MAM, MDM, Android and Windows device enrollment, APNS, and Intune app deployment.
MDM is needed for complete device management and control, while MAM is focused on securing and managing specific applications and data.
Different Android device enrollment methods include QR code, Near Field Communication (NFC), and Zero-touch enrollment.
Apple Push Notification Services (APNS) is a service used to send push notifications to...read more
Q3. JCL 1. Ways in which the you can paas on data from.jcl to cobol.: Dsn file, sysin, parm 2.How do u accept the data which is paased from Parm parameter.: Using linkage section. 3. How will u make any step run in...
read moreInterview questions for Senior Consultant position on JCL and DB2
JCL: passing data using DSN file, SYSIN, and PARM parameters
JCL: accepting data passed from PARM parameter using linkage section
JCL: making a step run in case of job failure using COND=ONLY
JCL: explaining DISP position
JCL: writing logic to copy matching data from two input files based on a common key
DB2: explaining cursor not defined for selecting more than one row from table
DB2: life cycle of cursor - declare, ...read more
Q4. Explain the Microservices architecture of your project? How services internally communicates? How to manage transactions and failure scenario in distributed Microservices system? List some spring boot Microserv...
read moreExplaining Microservices architecture, communication, transactions, annotations, authentication, and API validation.
Our project follows a Microservices architecture where each service is independently deployable and scalable.
Services communicate with each other using RESTful APIs and message brokers like Kafka.
We use distributed transactions and compensating transactions to manage transactions and handle failure scenarios.
Some of the Spring Boot Microservices annotations we u...read more
Q5. What do you know about APNS? What will happen if APNS is not renewed on time?
APNS is Apple Push Notification Service used to send push notifications to iOS devices.
APNS is used by iOS apps to send push notifications to users.
If APNS is not renewed on time, push notifications will not be delivered to users.
This can result in a poor user experience and loss of engagement.
Renewing APNS requires a valid Apple Developer account and proper configuration of the app's push notification settings.
Q6. What do you know about group tags and windows autopilot?
Group tags and Windows Autopilot are tools used for managing and deploying devices in an organization.
Group tags are used to organize devices into logical groups for easier management.
Windows Autopilot is a cloud-based tool for deploying and configuring Windows devices.
Autopilot uses group tags to assign devices to specific profiles and configurations.
This allows for faster and more efficient deployment of devices in an organization.
For example, a company could use group tags...read more
Q7. How do we deploy an application using Microsoft Intune?
Deploying an application using Microsoft Intune
Create an app in Intune
Upload the app package
Assign the app to a group of users or devices
Configure deployment settings
Monitor deployment status
Q8. 1. As per your experience you look more into Operations so would that be fine if we have you as our Front line of support?
Yes, my experience in operations will help me provide effective front line support.
My experience in operations has given me a strong understanding of how different processes work and how to troubleshoot issues.
This knowledge will be useful in providing front line support as I can quickly identify the root cause of problems and provide effective solutions.
I am also skilled in communication and can effectively convey technical information to non-technical stakeholders.
For examp...read more
Q9. What are different type of Android device enrollment methods 1. What is your day to day activity? 2. Have you worked on change requests?
Different types of Android device enrollment methods
QR code enrollment
NFC enrollment
Zero-touch enrollment
Samsung Knox Mobile Enrollment
Manual enrollment
Q10. Difference between storage queue, Service bus queue, event hub, IOT hub and event grid, when to use which one explain with scenario?
Storage Queue, Service Bus Queue, Event Hub, IoT Hub, and Event Grid are different messaging services in Azure.
Storage Queue is a simple message queue for reliable messaging between components within an application.
Service Bus Queue is a fully-featured messaging service for decoupling applications and enabling reliable communication.
Event Hub is a big data streaming platform for ingesting and processing large volumes of events in real-time.
IoT Hub is a managed service for bid...read more
Q11. angular Components Directives Interceptor How do u show spinner from interceptor Reactive forms Use of authguards Hostlistener Component communication Dependency injection Optional chaining Responsive web desig...
read moreQuestions on Angular, JavaScript, and CSS
Angular components, directives, and interceptors
Showing spinner from interceptor
Reactive forms and authguards
Hostlistener and component communication
Dependency injection and optional chaining
JavaScript async, defer, cloning objects, hoisting, spread operator, comparing objects, event bubbling, and prototype
CSS box model
Q12. Explain how to design azure architecture using VM, VNet and Load Balancers?
Designing Azure architecture using VM, VNet, and Load Balancers involves creating virtual machines, virtual networks, and load balancers to ensure scalability, availability, and performance.
Start by creating a virtual network (VNet) to establish a private network in Azure.
Create virtual machines (VMs) within the VNet to host your applications and services.
Configure load balancers to distribute incoming traffic across multiple VMs for high availability and scalability.
Use Azur...read more
Q13. What is Dispatch? How to enable voice for Chatbot, Integration of Bot with web application, How are the insights captured for the chatbot
Dispatch is a process of assigning tasks to appropriate resources. Voice for chatbot can be enabled using text-to-speech technology. Chatbot can be integrated with web application using APIs. Insights for chatbot can be captured using analytics tools.
Dispatch is a process of assigning tasks to appropriate resources
Voice for chatbot can be enabled using text-to-speech technology
Chatbot can be integrated with web application using APIs
Insights for chatbot can be captured using ...read more
Q14. Explain Load balancing in details / types / routing methods / Ports etc Docker commands and questions from the sample docker file K8 master node components and its usages Pods troubleshooting Diff types of comp...
read moreLoad balancing distributes incoming network traffic across multiple servers to ensure no single server is overwhelmed.
Types of load balancing: round robin, least connections, IP hash, weighted round robin, etc.
Routing methods: DNS-based, hardware-based, software-based, etc.
Ports: Load balancers can operate at Layer 4 (TCP/UDP) or Layer 7 (HTTP/HTTPS).
Docker commands: docker run, docker build, docker exec, etc.
K8 master node components: API server, scheduler, controller manage...read more
Q15. What is heap memory and tell me about memory management
Heap memory is a region of memory used for dynamic memory allocation.
Heap memory is allocated at runtime and can be resized as needed.
Memory management involves allocating and deallocating memory to prevent memory leaks and optimize performance.
Common memory management techniques include garbage collection and manual memory management.
Examples of languages that use heap memory include C++, Java, and Python.
Q16. What is diffrrnce between arraylist and linked list
ArrayList is resizable and uses contiguous memory while LinkedList uses non-contiguous memory and is not resizable.
ArrayList is faster for accessing elements while LinkedList is faster for adding or removing elements.
ArrayList is implemented as an array while LinkedList is implemented as a doubly linked list.
ArrayList is better for random access while LinkedList is better for sequential access.
Example: ArrayList can be used for storing a list of names while LinkedList can be ...read more
Q17. What are the different types of events in lightning
Different types of events in lightning include component events, application events, and system events.
Component events are fired by components and can be handled by the component itself or its parent components.
Application events are fired by one component and can be handled by any other component in the application.
System events are fired by the framework itself, such as when a component is rendered or destroyed.
Q18. What are azure PaaS Services, explain with examples?
Azure PaaS services are cloud-based services that allow developers to build, deploy, and manage applications without having to manage the underlying infrastructure.
Examples include Azure App Service, Azure Functions, Azure SQL Database, Azure Cosmos DB, and Azure Event Grid.
Azure App Service allows developers to build and deploy web and mobile apps.
Azure Functions is a serverless compute service that allows developers to run code on-demand without having to manage servers.
Azu...read more
Q19. a. Liquidity risk definition, concept b. Derivatives (in detail) c. Liquidity risk reporting (LCR , NSFR) d. User story vs Use-case e. Scrum Meeting types
Questions on liquidity risk, derivatives, user stories, and Scrum meetings for Senior Consultant role.
Liquidity risk refers to the risk of not being able to meet financial obligations due to lack of cash or liquid assets.
Derivatives are financial instruments whose value is derived from an underlying asset or security.
Liquidity risk reporting includes the Liquidity Coverage Ratio (LCR) and Net Stable Funding Ratio (NSFR).
User stories are short, simple descriptions of a feature...read more
Q20. How we can select Class used in nth place in JavaScript?
To select the class used in nth place in JavaScript, we can use the nth-child selector.
Use the nth-child selector with the class name to select the nth occurrence of the class.
For example, to select the third occurrence of the class 'example', use '.example:nth-child(3)'.
This can be used in conjunction with other selectors to target specific elements.
Q21. what is budgeting, Forecasting, Difference between budget and forecast, pre-payments, accruals. Basic excel questions.
Budgeting and forecasting are financial planning tools used to estimate future revenues and expenses. Pre-payments and accruals are accounting concepts used to record expenses in the appropriate period.
Budgeting involves creating a detailed plan for future revenues and expenses, typically for a specific period of time.
Forecasting involves predicting future financial outcomes based on historical data and trends.
The main difference between budgeting and forecasting is that budg...read more
Q22. How will you rate yourself on the tools like Power BI, Python, Tableau
I rate myself highly on Power BI and Tableau, but have limited experience with Python.
I have extensive experience using Power BI and Tableau to create interactive dashboards and reports.
I have limited experience with Python, but am eager to learn and expand my skillset.
I am comfortable working with data and have a strong understanding of data visualization best practices.
Q23. Where you have used collection in your framework
Collections are extensively used in my framework for storing and manipulating data.
I have used ArrayList to store test data and iterate over it.
I have used HashMap to store key-value pairs for data-driven testing.
I have used HashSet to store unique values and perform set operations.
I have used LinkedList to implement queue and stack data structures.
I have used TreeSet to store sorted data and perform set operations.
I have used Collections class to sort and shuffle lists.
I hav...read more
Q24. How will you run only failed test cases in testng
To run only failed test cases in TestNG, use the 'rerun-failed' option in the testng.xml file.
Add the 'preserve-order' attribute to the 'testng' element in the testng.xml file.
Add the 'suite' element with the 'name' attribute and 'test' element with the 'name' attribute and 'preserve-order' attribute.
Add the 'classes' element with the 'name' attribute and 'class' element with the 'name' attribute and 'methods' element with the 'name' attribute and 'include' attribute with the...read more
Q25. Write a java program where input is 'demo' and output should be 'deemmmoooo'
Java program to repeat each character in the input string a certain number of times
Create a StringBuilder to store the output
Iterate through each character in the input string
Append the character to the StringBuilder followed by repeating it a certain number of times
Convert the StringBuilder to a string and return it as the output
Q26. How to achive abstarction and encapsulation
Abstraction and encapsulation can be achieved through proper class design and access modifiers.
Abstraction can be achieved by hiding implementation details and exposing only necessary information.
Encapsulation can be achieved by using access modifiers to restrict access to certain class members.
Proper class design can help achieve both abstraction and encapsulation.
For example, creating a class for a bank account that only exposes methods for depositing and withdrawing money,...read more
Q27. What is method overload and method overide
Method overload and method override are two concepts in object-oriented programming.
Method overload is when a class has multiple methods with the same name but different parameters.
Method override is when a subclass provides its own implementation of a method that is already defined in its superclass.
Method overload is resolved at compile-time based on the number and types of arguments passed to the method.
Method override is resolved at runtime based on the actual type of the...read more
Q28. What happens in the background when the spring application starts?
During Spring application startup, several processes occur in the background.
Spring container is initialized
Bean definitions are loaded and instantiated
Dependency injection is performed
Application context is created
Auto-configuration classes are processed
Application events are published
Web server is started (if applicable)
Q29. What are different Scrum ceremonies?
Scrum ceremonies are meetings that help the team to plan, review, and improve their work.
Sprint Planning
Daily Scrum
Sprint Review
Sprint Retrospective
Q30. Can you explain the difference with HashMap and HashSet?
HashMap is a key-value pair collection while HashSet is a collection of unique elements.
HashMap allows duplicate values but keys must be unique.
HashSet does not allow duplicate elements.
HashMap uses key-value pairs for storing data, while HashSet only stores individual elements.
Example: HashMap
map = new HashMap<>(); HashSet set = new HashSet<>();
Q31. What is the type of null and undefined in JavaScript?
null and undefined are primitive data types in JavaScript.
null represents the intentional absence of any object value.
undefined represents the absence of a value or an uninitialized variable.
typeof null returns 'object' which is a mistake in the language.
typeof undefined returns 'undefined'.
Q32. What are different metrics used in Scrum
Different metrics used in Scrum include velocity, burn-down charts, and cycle time.
Velocity measures the amount of work a team can complete in a sprint
Burn-down charts track the remaining work in a sprint and help the team stay on track
Cycle time measures the time it takes for a task to move from start to finish
Other metrics include sprint burndown, team velocity, and lead time
Q33. What is lead time and cycle time
Lead time is the time taken from order to delivery. Cycle time is the time taken to complete one unit of work.
Lead time includes all the time taken from order to delivery, including processing, manufacturing, and shipping.
Cycle time is the time taken to complete one unit of work, from start to finish.
Lead time is usually longer than cycle time.
For example, the lead time for a custom-made car could be several months, while the cycle time for assembling one car could be a few h...read more
Q34. How to make slider in ReactJs. Write the logic for the same.
A slider in ReactJs can be made using the 'useState' hook and 'onChange' event.
Create a state variable to hold the value of the slider
Use the 'onChange' event to update the state variable
Render the slider component with the value and onChange props
Example:
const [sliderValue, setSliderValue] = useState(0);
setSliderValue(e.target.value)} />
Q35. How to create exceptions in a spring boot annotation
Exceptions in Spring Boot annotations can be created using @ExceptionHandler annotation
Use @ExceptionHandler annotation in a controller class to handle exceptions
Specify the exception type in the annotation parameter
Define a method in the controller class with the @ExceptionHandler annotation to handle the exception
Q36. How will you handel merge conflict
Merge conflicts can be handled by communication, understanding the changes made, and using version control tools.
Communicate with the team to understand the changes made
Use version control tools like Git to resolve conflicts
Prioritize changes based on importance and impact
Test the merged code thoroughly to ensure it works as expected
Q37. how to control incoming traffic via bgp, and troubleshoot routing issues
To control incoming traffic via BGP, use route maps and prefix lists. Troubleshoot routing issues by checking BGP neighbor relationships and route advertisements.
Create a prefix list to filter incoming routes based on their network address
Create a route map to apply the prefix list and set policies for accepted routes
Check BGP neighbor relationships to ensure they are established and functioning properly
Check route advertisements to ensure they are being sent and received cor...read more
Q38. What Xpath? what is / and // slash refers to ?
The / and // slashes in XPath refer to different types of path expressions.
The / slash is used to select the immediate child nodes of the current node.
The // slash is used to select nodes in the document from the current node that match the selection no matter where they are.
For example, /bookstore/book selects all book elements that are children of the bookstore element, while //book selects all book elements in the document.
Q39. How will you design rest api for a job portal?
Designing a REST API for a job portal
Identify the resources and their endpoints
Use HTTP methods to perform CRUD operations
Implement authentication and authorization
Use pagination for large datasets
Provide filtering, sorting, and searching options
Use appropriate status codes and error messages
Consider versioning for future updates
Q40. How do you perform estimations?
I perform estimations by breaking down the project into smaller tasks and using historical data and expert judgment.
Break down the project into smaller tasks
Use historical data and expert judgment
Consider the complexity and uncertainty of the project
Adjust the estimation based on any changes in scope or requirements
Communicate the estimation to stakeholders
Q41. How to advise Business to go with Order or Delivery based planning
Consider factors like customer preferences, product type, delivery logistics, and inventory management when advising on order or delivery based planning for businesses.
Assess customer preferences and demand patterns to determine if order or delivery based planning is more suitable.
Consider the nature of the products being sold - perishable items may require delivery based planning while customizable items may work better with order based planning.
Evaluate the logistics involv...read more
Q42. 1.java program to fimd duplicate character
Java program to find duplicate characters in a string.
Create a HashMap to store each character and its frequency
Iterate through the string and add each character to the HashMap
If the character already exists in the HashMap, increment its frequency
Print out the characters with frequency greater than 1
Q43. How will you handel multiple window
I will use window management techniques like tabbing, cascading, and tiling to handle multiple windows efficiently.
I will prioritize the windows based on their importance and urgency.
I will use keyboard shortcuts to switch between windows quickly.
I will use the taskbar or dock to keep track of open windows.
I will use window snapping to organize windows side by side.
I will close unnecessary windows to reduce clutter.
I will use virtual desktops to separate different tasks or pr...read more
Q44. Can You tell me about ReactJs and it’s advantages?
ReactJs is a JavaScript library for building user interfaces.
ReactJs allows for reusable components, making development faster and more efficient.
It uses a virtual DOM, which improves performance by reducing the need for direct manipulation of the actual DOM.
ReactJs is highly scalable and can be used for both small and large applications.
It has a large and active community, providing support and resources for developers.
ReactJs can be used for both web and mobile app developm...read more
Q45. How Event Action subscription works FileNet
Event Action subscription in FileNet allows users to subscribe to specific events and trigger actions based on those events.
Event Action subscriptions can be set up in FileNet to monitor specific events such as document creation, deletion, or modification.
Users can define actions to be triggered when the subscribed event occurs, such as sending notifications, updating metadata, or executing custom scripts.
Event Action subscriptions help automate processes and improve efficien...read more
Q46. Spring vs spring boot and how to use h2 db. Micro services vs monolithic
Spring Boot is an extension of the Spring framework that simplifies the development of Java applications. H2 is an in-memory database often used for testing.
Spring Boot is a more opinionated and streamlined version of the Spring framework, providing easier setup and configuration.
H2 is an in-memory database that can be easily integrated with Spring Boot applications for testing purposes.
Microservices architecture involves breaking down a large application into smaller, indepe...read more
Q47. How is code quality tested in your application?
Code quality is tested through code reviews, automated testing, static code analysis, and performance testing.
Code reviews are conducted by peers to ensure best practices and standards are followed.
Automated testing using tools like JUnit for unit testing and Selenium for UI testing.
Static code analysis tools like SonarQube are used to identify code smells and potential bugs.
Performance testing tools like JMeter are used to ensure the application meets performance requirement...read more
Q48. What is hardassert and soft assert
Hard assert and soft assert are methods used in software testing to validate expected results.
Hard assert stops the test execution immediately if the assertion fails.
Soft assert continues the test execution even if the assertion fails and reports all the failures at the end of the test.
Hard assert is used when the failure of the assertion indicates a critical issue that needs to be fixed immediately.
Soft assert is used when the failure of the assertion indicates a non-critica...read more
Q49. What is agile process? What ceremonies you follow?
Agile process is a flexible approach to project management that emphasizes collaboration, customer feedback, and iterative development.
Agile process involves breaking down projects into small increments called sprints
Key ceremonies include daily stand-up meetings, sprint planning, sprint review, and retrospective
Examples of agile frameworks include Scrum, Kanban, and Extreme Programming
Q50. Difference between citrix and WVD from end user perspective and Administrator perspective
Citrix and WVD differ in end user and admin perspective.
Citrix offers more customization options for end users while WVD is more streamlined.
Citrix requires more administrative effort while WVD is easier to manage.
Citrix has a longer history and more mature feature set while WVD is newer and evolving.
Citrix can support a wider range of devices while WVD is limited to Windows devices.
Citrix has a higher cost while WVD is more cost-effective.
Q51. 1. how to optimize angular app performance
Optimizing Angular app performance involves reducing file size, lazy loading, and optimizing change detection.
Reduce file size by minifying and compressing code
Lazy load modules and components to improve initial load time
Optimize change detection by using OnPush strategy and avoiding unnecessary DOM updates
Use AOT compilation to improve performance
Implement server-side rendering for faster initial rendering
Use performance profiling tools to identify bottlenecks and optimize a...read more
Q52. What is your preffered location
I prefer to work in a bustling city with a diverse culture and plenty of opportunities for growth.
Prefer urban areas with diverse cultural offerings
Seek opportunities for professional growth and development
Open to relocation for the right opportunity
Q53. What are triggers best practices
Triggers best practices ensure efficient and effective use of triggers in databases.
Limit the use of triggers to only necessary cases to avoid performance issues
Keep triggers simple and easy to understand for maintenance purposes
Avoid nesting triggers to prevent complexity and potential errors
Document triggers thoroughly to explain their purpose and functionality
Q54. What is difference between IaaS, PaaS and Saas?
IaaS, PaaS and SaaS are cloud computing models that differ in the level of control and responsibility of the user.
IaaS (Infrastructure as a Service) provides virtualized computing resources like servers, storage, and networking. Examples include Amazon Web Services (AWS) and Microsoft Azure.
PaaS (Platform as a Service) provides a platform for developing, testing, and deploying applications. Examples include Google App Engine and Heroku.
SaaS (Software as a Service) provides so...read more
Q55. How we can prevent components from re-rendereing?
To prevent components from re-rendering, use React.memo() or shouldComponentUpdate() lifecycle method.
Use React.memo() to memoize functional components and prevent re-rendering if props haven't changed.
Use shouldComponentUpdate() lifecycle method to prevent class components from re-rendering unnecessarily.
Avoid using inline functions in props as they cause re-rendering on every render.
Use PureComponent instead of Component for class components to automatically implement shoul...read more
Q56. what is difference between .net core and .net framework
The main difference is that .NET Core is cross-platform and open-source, while .NET Framework is Windows-only and closed-source.
.NET Core is cross-platform, meaning it can run on Windows, macOS, and Linux, while .NET Framework is limited to Windows.
.NET Core is open-source, allowing for community contributions and faster updates, while .NET Framework is closed-source.
.NET Core is modular, allowing developers to include only the necessary components in their applications, whil...read more
Q57. What is Scrum of scrum?
Scrum of scrum is a scaled agile framework for coordinating multiple scrum teams working on the same project.
It is used to manage dependencies and ensure alignment between teams
Each team sends a representative to participate in the scrum of scrum meeting
The meeting is usually held daily or weekly depending on the project needs
The representative provides updates on their team's progress and any impediments they are facing
The scrum of scrum master facilitates the meeting and he...read more
Q58. What are challenges faced during installation of SAP BO
Challenges faced during installation of SAP BO
Compatibility issues with the operating system and database
Lack of proper hardware resources
Complexity of the installation process
Configuration errors
Lack of technical expertise
Integration issues with other systems
Security concerns
Licensing and cost-related challenges
Q59. How do you make lightning card
To make a lightning card, you need paper, scissors, glue, and markers.
Start by cutting a piece of paper into a rectangle shape.
Fold the paper in half to create the card shape.
Draw a lightning bolt shape on the front of the card using a marker.
Cut out the lightning bolt shape carefully.
Glue the cut-out lightning bolt onto the front of the card.
Write a message or decorate the card as desired.
Q60. What is little Indian? Understanding of array and memory allocation?
Little Indian is not a commonly used term in the context of array and memory allocation.
Little Indian is not a technical term related to array and memory allocation.
It might refer to the Indian subcontinent or a small Indian person, but it is not relevant to the question.
To understand array and memory allocation, one needs to have knowledge of data structures and programming languages.
Memory allocation refers to the process of assigning memory to a program during runtime.
Arra...read more
Q61. Diffrence between string buffer amd string builder
StringBuffer and StringBuilder are both used to manipulate strings, but StringBuffer is thread-safe while StringBuilder is not.
StringBuffer is synchronized, making it thread-safe, while StringBuilder is not
StringBuilder is faster than StringBuffer in single-threaded environments
Both classes have similar methods for appending, inserting, and deleting characters in a string
Example: StringBuffer sb = new StringBuffer("Hello"); StringBuilder sb = new StringBuilder("World");
Use St...read more
Q62. Interface and abstract used in you fremework
Interface and abstract are used in our framework for creating reusable and extensible code.
Interfaces define a contract that classes must implement.
Abstract classes provide a base implementation that can be extended by subclasses.
Both allow for polymorphism and abstraction.
Example: An interface for a database connection with methods like connect() and disconnect().
Example: An abstract class for a vehicle with a method like startEngine() that can be extended by car, truck, etc...read more
Q63. To find average of a number from given List using streams
Using streams to find the average of a number from a given list
Use the stream() method to convert the list to a stream
Use the mapToInt() method to convert the stream elements to integers
Use the average() method to calculate the average of the numbers
Q64. Diffrence between constructor and method
Constructor is used to initialize an object while method is used to perform an action on an object.
Constructor is called when an object is created while method is called on an existing object.
Constructor has the same name as the class while method has a unique name.
Constructor does not have a return type while method can have a return type.
Example: public class Car { public Car() { } public void start() { } }
Example: Car myCar = new Car(); myCar.start();
Q65. Process to send the mail of specific data after extraction
Use an ETL tool to extract specific data and send it via email
Use an ETL tool like Talend or Informatica to extract the specific data
Set up a job in the ETL tool to extract the data on a scheduled basis
Use the ETL tool's email functionality to send the extracted data to the specified recipients
Q66. Doffrent type of exception
Different types of exceptions are checked, unchecked, error and runtime.
Checked exceptions are checked at compile time
Unchecked exceptions are not checked at compile time
Error exceptions are caused by the environment in which the application is running
Runtime exceptions are caused by the application logic
Q67. When to use interceptor in angular?
Interceptors are used to intercept HTTP requests and responses.
To add headers, modify requests, or handle errors globally
Can be used for authentication, logging, caching, etc.
Example: Adding an authorization token to every request
Q68. Diffrence between interface and abastarct
Interfaces define contracts for behavior while abstract classes provide partial implementation.
Interfaces only define method signatures while abstract classes can have both abstract and non-abstract methods.
A class can implement multiple interfaces but can only inherit from one abstract class.
Interfaces are used for loose coupling while abstract classes are used for code reuse.
Example of interface: Runnable interface in Java.
Example of abstract class: Animal class with abstra...read more
Q69. How to change request in retrofit?
To change a request in retrofit, you can modify the request parameters or body before making the API call.
Create a new instance of the request interface with the desired changes
Update the request parameters or body using setter methods
Make the API call with the modified request instance
Q70. What is security group how you manage that
A security group is a collection of users, computers, or other devices that have been granted access to specific resources or services.
Security groups are used to manage access control in a network environment
They can be created and managed in Active Directory, AWS, Azure, etc.
Security groups can be assigned permissions to files, folders, databases, etc.
They help in ensuring that only authorized users have access to sensitive information
Q71. What distinguishes a collection and stream
A collection is a group of objects, while a stream is a sequence of objects that can be processed in a pipeline.
A collection is a data structure that stores multiple elements, such as an array or a list.
A stream is a sequence of elements that can be processed in a pipeline of operations.
Collections are typically mutable, meaning elements can be added, removed, or modified.
Streams are typically immutable, meaning they do not change the original sequence of elements.
Collections...read more
Q72. Oops concept used in your framework
Oops concepts like inheritance, polymorphism, encapsulation, and abstraction are used in our framework.
Inheritance is used to create a hierarchy of classes with shared attributes and methods.
Polymorphism is used to allow objects of different classes to be treated as if they are of the same class.
Encapsulation is used to hide the implementation details of a class from other classes.
Abstraction is used to create simplified interfaces for complex systems.
For example, we use inhe...read more
Q73. What is architecture of AEM
AEM architecture is based on OSGi framework and follows a modular approach.
AEM uses Apache Sling framework for request processing and resource resolution.
It has a content repository based on Apache Jackrabbit Oak.
AEM also has a dispatcher module for caching and load balancing.
It follows a component-based architecture where each component is a self-contained module.
AEM also supports customization through templates, workflows, and APIs.
Q74. Difference between Scrum and Kanban
Scrum is an iterative approach with fixed timeboxes while Kanban is a continuous flow approach.
Scrum has predefined sprints while Kanban has no fixed timeboxes
Scrum focuses on delivering a potentially shippable product increment at the end of each sprint while Kanban focuses on continuous delivery
Scrum has defined roles and ceremonies while Kanban has none
Scrum limits work in progress while Kanban has a pull-based system
Scrum is best suited for complex projects while Kanban i...read more
Q75. How do you start initial troubleshooting
I start initial troubleshooting by gathering information, identifying the issue, and creating a plan of action.
Gather information from the user about the problem or error
Identify the root cause of the issue by asking questions and analyzing the situation
Create a plan of action to address the problem, including potential solutions and steps to take
Implement the plan and test to see if the issue has been resolved
Document the troubleshooting process and outcome for future refere...read more
Q76. Private and static methods over loading and overriding
Private and static methods have different purposes - private methods are used for internal logic within a class, while static methods are used for utility functions.
Private methods are not visible outside the class and are used for encapsulation.
Static methods belong to the class itself and can be called without creating an instance of the class.
Overloading refers to having multiple methods with the same name but different parameters.
Overriding involves creating a new impleme...read more
Q77. Explain role of privacy and consent in CDP implementation
Privacy and consent are crucial in CDP implementation to ensure compliance with data protection regulations and build trust with customers.
Privacy ensures that personal data is protected and not misused in CDP implementation
Consent is necessary to collect and process personal data in compliance with regulations such as GDPR
Implementing privacy by design principles in CDP helps in building trust with customers
Consent management tools can be used to obtain and manage user conse...read more
Q78. Have you built a SharePoint site?
Yes, I have built multiple SharePoint sites.
I have experience in creating custom lists, libraries, workflows, and web parts.
I have also worked on branding and customization of SharePoint sites.
One of the notable projects was building a SharePoint site for a client to manage their HR processes.
I have also provided training to end-users on how to use SharePoint effectively.
Q79. Java program to find duplicate integer
Java program to find duplicate integer
Create a HashSet to store unique integers
Loop through the array and add each integer to the HashSet
If the integer already exists in the HashSet, it is a duplicate
Print out the duplicate integer(s)
Q80. Java program to find pelindrom or not
Java program to check if a given string is a palindrome or not.
Convert the string to lowercase to ignore case sensitivity.
Use two pointers, one at the beginning and one at the end of the string.
Compare the characters at both pointers and move them towards each other until they meet.
If all characters match, the string is a palindrome.
If any character doesn't match, the string is not a palindrome.
Q81. Requestparam vs pathvariable and syntax of both
Requestparam vs pathvariable and syntax
RequestParam is used to extract query parameters from the URL, while PathVariable is used to extract values from the URI template
RequestParam syntax: @RequestParam("paramName") String paramValue
PathVariable syntax: @PathVariable("varName") String varValue
Example: @RequestParam("id") String id
Example: @PathVariable("name") String name
Q82. Annotation execution order in testng
TestNG executes annotations in a specific order.
TestNG executes @BeforeSuite, @BeforeTest, @BeforeClass, @BeforeMethod, @Test, @AfterMethod, @AfterClass, @AfterTest, and @AfterSuite annotations in that order.
If there are multiple annotations of the same type, they are executed in the order they are defined in the code.
Annotations can also be grouped using @BeforeGroups and @AfterGroups annotations.
Annotations can be used to set up and tear down test environments, data, and re...read more
Q83. Push notifications with every single details
Push notifications should include all relevant details.
Push notifications should provide clear and concise information.
Include relevant details such as the reason for the notification and any necessary actions.
Avoid overwhelming the user with too much information.
Examples: A push notification from a banking app should include the transaction amount and date, while a weather app should include the current temperature and forecast.
Q84. What are closures in javascript?
Closures in JavaScript are functions that have access to their own scope, as well as the outer function's scope.
Closures allow for maintaining state in an asynchronous environment.
They are created whenever a function is defined within another function.
Closures can access variables from their outer function even after the outer function has finished executing.
Q85. What is dependency injecion and design petterns.
Dependency injection is a design pattern used to remove hard-coded dependencies and increase flexibility.
Dependency injection allows for easier testing and maintenance of code.
It involves injecting dependencies into a class rather than having the class create them itself.
Design patterns are reusable solutions to common software design problems.
Examples of design patterns include Singleton, Factory, and Observer patterns.
Q86. How you estimate story in Agile
Estimating story in Agile involves breaking down the story into smaller tasks and assigning story points based on complexity and effort.
Break down the story into smaller tasks
Assign story points based on complexity and effort
Use a reference story to establish a baseline for estimation
Involve the entire team in the estimation process
Re-estimate stories as more information becomes available
Q87. 2. how to call multiple apis at once
To call multiple APIs at once, use asynchronous programming and libraries like Axios or Fetch.
Use Promise.all() to make multiple API calls simultaneously
Use async/await to handle the responses
Use libraries like Axios or Fetch to simplify the process
Consider using a library like GraphQL to aggregate multiple API responses into a single response
Be mindful of API rate limits and adjust accordingly
Q88. Diffrence between hashmap and hashset
Hashmap is a key-value pair collection while Hashset is a unique value collection.
Hashmap allows duplicate values but not duplicate keys.
Hashset does not allow duplicate values.
Hashmap is faster for searching and retrieving values by key.
Hashset is faster for checking if a value exists in the collection.
Example: Hashmap can be used to store student names and their corresponding grades.
Example: Hashset can be used to store a list of unique email addresses.
Q89. Diffrence between throw and throws
throw is used to throw an exception while throws is used in method signature to declare the exceptions that can be thrown by the method.
throw is used to explicitly throw an exception in a code block
throws is used in method signature to declare the exceptions that can be thrown by the method
throw is followed by an instance of the Exception class
throws is followed by the name of the exception class
throw is used to handle exceptional situations in the code
throws is used to indic...read more
Q90. How to communicate between components
Components can communicate through various methods such as props, events, and state management.
Props: pass data from parent to child components
Events: emit and listen to events using event bus or Vuex store
State management: use Vuex or Redux to manage shared state between components
Q91. What are the tables used in EDI
The tables used in EDI are used to store and organize data related to electronic data interchange.
EDI tables are used to store information about trading partners, transactions, and data mappings.
Some common tables used in EDI include partner tables, transaction tables, and mapping tables.
Partner tables store information about trading partners such as their names, addresses, and contact details.
Transaction tables store details about specific EDI transactions, including transac...read more
Q92. Write a programme to check if no is prime or not
Program to check if a number is prime or not
A prime number is only divisible by 1 and itself
Loop through all numbers from 2 to n-1 and check if n is divisible by any of them
If n is divisible by any number, it is not prime
If n is not divisible by any number, it is prime
Q93. Diffrence between list and set
List is an ordered collection of elements while set is an unordered collection of unique elements.
Lists allow duplicates while sets do not.
Lists maintain the order of elements while sets do not.
Lists are accessed by index while sets are accessed by value.
Examples of lists: [1, 2, 3] or ['apple', 'banana', 'orange']
Examples of sets: {1, 2, 3} or {'apple', 'banana', 'orange'}
Q94. what are the different types of tables
Different types of tables include relational tables, non-relational tables, temporary tables, and virtual tables.
Relational tables: Organized into rows and columns with a unique key identifying each row. Examples include MySQL, Oracle, SQL Server tables.
Non-relational tables: Also known as NoSQL tables, they do not require a fixed schema and can store unstructured data. Examples include MongoDB, Cassandra tables.
Temporary tables: Used for storing intermediate results during a...read more
Q95. Difference between . Net framework and .Net Core
The main difference is that .Net Core is open-source and cross-platform, while .Net Framework is Windows-only.
Net Core is open-source and cross-platform, while .Net Framework is Windows-only
.Net Core is modular and lightweight, allowing for more flexibility in development
.Net Core supports microservices architecture and containerization
.Net Core has better performance and scalability compared to .Net Framework
.Net Core is the future of .Net development, with Microsoft focusin...read more
Q96. what are your daily deliverables
As a Senior Consultant, my daily deliverables include project management, client communication, team coordination, and report generation.
Managing projects and ensuring timely delivery
Communicating with clients to understand their requirements and providing solutions
Coordinating with team members to ensure smooth workflow
Generating reports to track progress and identify areas for improvement
Q97. Diffrence between testNg and cucumber
TestNG is a testing framework for Java while Cucumber is a BDD tool for behavior-driven development.
TestNG is used for unit, functional, and integration testing while Cucumber is used for acceptance testing.
TestNG uses annotations to define test cases while Cucumber uses Gherkin syntax.
TestNG provides features like parallel testing, data-driven testing, and reporting while Cucumber focuses on collaboration between stakeholders.
TestNG is more suitable for developers while Cucu...read more
Q98. Difference between procedure and function
A procedure is a set of instructions that performs a specific task, while a function is a subprogram that returns a value.
Procedure does not return a value, while function does
Functions can be called within expressions, procedures cannot
Functions are used to perform calculations and return results, procedures are used to perform actions
Q99. how will you avoid deadlock situation
Avoid deadlock by implementing proper locking mechanisms and ensuring consistent order of acquiring locks.
Use a timeout mechanism to prevent indefinite waiting for locks.
Avoid nested locks to prevent potential deadlock situations.
Implement a consistent order of acquiring locks to prevent circular dependencies.
Use deadlock detection algorithms to identify and resolve deadlock situations.
Consider using higher-level concurrency control mechanisms like transactions in databases.
Q100. What is Automated payment program
Automated payment program is a system that automatically processes payments to vendors based on predefined criteria.
Automated payment programs streamline the payment process by eliminating manual intervention.
Criteria for payment can include invoice amount, due date, vendor details, etc.
Common examples of automated payment programs include SAP's Automatic Payment Program (APP) and Oracle's Payment Manager.
More about working at Capgemini
Top HR Questions asked in ELV Projects Pvt Ltd
Interview Process at ELV Projects Pvt Ltd
Top Senior Consultant Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month