Add office photos
Engaged Employer

Capgemini

3.7
based on 42.1k Reviews
Video summary
Proud winner of ABECA 2024 - AmbitionBox Employee Choice Awards
Filter interviews by

20+ Redserv Global Solutions Interview Questions and Answers

Updated 29 Aug 2024
Popular Designations

Q1. Split Array with Equal Sums Problem Statement

Given an array 'ARR' of size 'N', determine if there exists a triplet (i, j, k) satisfying the conditions: 0 < i , i + 1 < j , j + 1 < k and k < N - 1, such that th...read more

Ans.

The problem involves determining if there exists a triplet in an array such that the sums of specific subarrays are equal.

  • Iterate through all possible triplets (i, j, k) satisfying the given conditions.

  • Calculate the sum of subarrays [0, i - 1], [i + 1, j - 1], [j + 1, k - 1], [k + 1, N - 1] for each triplet.

  • Check if any triplet has equal sums for the subarrays, return True if found, else False.

Add your answer

Q2. What is the advantage of generic collection, when and why we should approach for that?

Ans.

Generic collections provide type safety and reusability in software development.

  • Generic collections allow us to store and manipulate objects of any type in a type-safe manner.

  • They provide compile-time type checking, reducing the chances of runtime errors.

  • They promote code reusability by allowing the same collection to be used with different types.

  • Generic collections improve performance by eliminating the need for boxing and unboxing operations.

  • They enable us to write cleaner ...read more

Add your answer

Q3. What is the difference between one way SSL and two way SSL?

Ans.

One way SSL is unidirectional while two way SSL is bidirectional.

  • One way SSL only authenticates the server to the client while two way SSL authenticates both the server and the client to each other.

  • One way SSL uses only server certificate while two way SSL uses both server and client certificates.

  • One way SSL is commonly used in websites while two way SSL is used in applications that require higher security such as online banking.

  • One way SSL is vulnerable to man-in-the-middle ...read more

Add your answer

Q4. What is the difference between Soap and Rest?

Ans.

SOAP is a protocol while REST is an architectural style for web services.

  • SOAP uses XML for messaging while REST uses JSON or XML.

  • SOAP requires more bandwidth and processing power than REST.

  • SOAP has built-in error handling while REST relies on HTTP error codes.

  • SOAP supports both stateful and stateless communication while REST is stateless.

  • SOAP is commonly used in enterprise applications while REST is used for web-based applications.

  • Example of SOAP: Web Services Description Lan...read more

Add your answer
Discover Redserv Global Solutions interview dos and don'ts from real experiences

Q5. How is public key different than private key?

Ans.

Public key is used for encryption and private key is used for decryption.

  • Public key is shared with others to encrypt messages.

  • Private key is kept secret and used to decrypt messages.

  • Public key is used in digital signatures to verify authenticity.

  • Examples include RSA, DSA, and Elliptic Curve Cryptography.

  • Public key is longer than private key for added security.

Add your answer

Q6. How is public cloud different than private cloud?

Ans.

Public cloud is accessible to everyone while private cloud is restricted to a specific organization.

  • Public cloud is owned and operated by third-party providers while private cloud is owned and operated by the organization itself.

  • Public cloud is accessible over the internet while private cloud is accessible only within the organization's network.

  • Public cloud is more cost-effective for small businesses while private cloud is more secure for large enterprises.

  • Examples of public ...read more

Add your answer
Are these interview questions helpful?

Q7. How do we configure SSL at HTTP layer?

Ans.

SSL can be configured at HTTP layer by enabling HTTPS protocol and configuring SSL certificates.

  • Enable HTTPS protocol in web server configuration

  • Generate or obtain SSL certificates

  • Configure SSL certificates in web server

  • Ensure secure communication between client and server

  • Test SSL configuration for any vulnerabilities

View 1 answer

Q8. What are the methods supported by REST?

Ans.

REST supports methods like GET, POST, PUT, DELETE, PATCH, OPTIONS, HEAD.

  • GET - retrieves a resource

  • POST - creates a new resource

  • PUT - updates an existing resource

  • DELETE - deletes a resource

  • PATCH - partially updates a resource

  • OPTIONS - returns the supported methods for a resource

  • HEAD - returns metadata about a resource

Add your answer
Share interview questions and help millions of jobseekers 🌟

Q9. What do you understand by Cloud?

Ans.

Cloud refers to the delivery of computing services over the internet.

  • Cloud computing allows users to access data and applications from anywhere with an internet connection.

  • It offers scalability, flexibility, and cost-effectiveness compared to traditional on-premises computing.

  • Examples of cloud services include Amazon Web Services, Microsoft Azure, and Google Cloud Platform.

Add your answer

Q10. How to use multiple dispatch in redux?

Ans.

Multiple dispatch is not a feature of Redux. It can be achieved using middleware or custom logic.

  • Middleware like redux-thunk or redux-saga can be used to dispatch multiple actions based on a single action.

  • Custom logic can be implemented in the reducer to handle multiple actions based on a single action type.

  • For example, a single 'ADD_ITEM' action can trigger multiple actions like 'UPDATE_TOTAL', 'UPDATE_HISTORY', etc.

  • Multiple dispatch can also be achieved using the 'redux-bat...read more

Add your answer

Q11. Give me an example of OAuth 2.0 in practical life?

Ans.

OAuth 2.0 is used for secure authorization and authentication in various applications.

  • OAuth 2.0 is used by Google to allow third-party applications to access user data without sharing passwords.

  • It is used by Facebook to allow users to log in to other websites using their Facebook credentials.

  • It is used by Microsoft to allow users to grant access to their Office 365 data to third-party applications.

  • OAuth 2.0 is also used in mobile applications to authenticate users and access ...read more

Add your answer

Q12. Finding the Missing number in the program

Ans.

Use XOR operation to find the missing number in an array of integers.

  • Iterate through the array and XOR all the elements with their indices.

  • Then XOR the result with the indices from 0 to n.

  • The final result will be the missing number.

Add your answer

Q13. What exception will occur in pl/,sql

Ans.

Various exceptions can occur in PL/SQL, such as NO_DATA_FOUND, TOO_MANY_ROWS, and INVALID_CURSOR.

  • NO_DATA_FOUND exception is raised when a SELECT INTO statement returns no rows.

  • TOO_MANY_ROWS exception is raised when a SELECT INTO statement returns multiple rows.

  • INVALID_CURSOR exception is raised when an invalid cursor operation is performed.

Add your answer

Q14. For designing what tool you are using

Ans.

I use various design tools such as Adobe XD, Sketch, Figma, and InVision for designing user interfaces.

  • Adobe XD

  • Sketch

  • Figma

  • InVision

Add your answer

Q15. Explain Oops Concept?

Ans.

OOPs is a programming paradigm based on the concept of objects, which can contain data and code.

  • OOPs stands for Object-Oriented Programming.

  • It focuses on creating objects that interact with each other to solve a problem.

  • It has four main concepts: Encapsulation, Inheritance, Polymorphism, and Abstraction.

  • Encapsulation is the process of hiding data and methods within a class.

  • Inheritance allows a class to inherit properties and methods from another class.

  • Polymorphism allows obje...read more

View 1 answer

Q16. How to design database structure

Ans.

Database structure design involves identifying entities, relationships, attributes, and normalization.

  • Identify entities and their relationships

  • Define attributes for each entity

  • Normalize the database to reduce redundancy

  • Consider indexing for efficient querying

  • Use primary and foreign keys to establish relationships

  • Choose appropriate data types for each attribute

Add your answer

Q17. String buffer and string boot difference

Ans.

String buffer is mutable while string builder is not. String builder is faster but not thread-safe.

  • String buffer is synchronized and thread-safe, while string builder is not.

  • String builder is faster than string buffer because it is not synchronized.

  • String buffer is mutable, meaning it can be changed after creation, while string builder is immutable.

  • Example: StringBuffer sb = new StringBuffer(); StringBuilder sb = new StringBuilder();

Add your answer

Q18. What is OAuth 2.0?

Ans.

OAuth 2.0 is an authorization framework that allows third-party applications to access user data without sharing passwords.

  • OAuth 2.0 is used for authentication and authorization.

  • It allows users to grant access to their resources stored on one site to another site.

  • It uses access tokens to grant access to resources.

  • Examples of OAuth 2.0 providers include Google, Facebook, and Twitter.

Add your answer

Q19. Postgres query for, group by operation.

Ans.

Postgres query for grouping data based on a specific column.

  • Use the GROUP BY clause in your query

  • Specify the column you want to group by in the GROUP BY clause

  • Aggregate functions like COUNT, SUM, AVG can be used with GROUP BY

  • Example: SELECT column_name, COUNT(*) FROM table_name GROUP BY column_name

Add your answer

Q20. Can deactivate in Angular

Ans.

Yes, you can deactivate in Angular using the ngIf directive.

  • Use ngIf directive to conditionally show or hide elements in Angular templates.

  • Set the condition to false to deactivate the element.

  • Example:

    Content

Add your answer

Q21. explain Polymorphism with examples

Ans.

Polymorphism is the ability of an object to take on many forms. It allows objects of different classes to be treated as the same type.

  • Polymorphism allows a single interface to be used for different types of objects.

  • It helps in achieving code reusability and flexibility.

  • Polymorphism can be achieved through method overriding and method overloading.

  • Example: A 'Shape' class can have different subclasses like 'Circle', 'Rectangle', and 'Triangle', all implementing a 'draw' method.

Add your answer

Q22. write code using Streams API

Ans.

Using Streams API to write code for software development tasks.

  • Use Stream.of() to create a stream from a list of elements

  • Use filter() to apply a predicate to filter elements

  • Use map() to transform elements in the stream

  • Use collect() to convert the stream into a collection

Add your answer
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos

Interview Process at Redserv Global Solutions

based on 25 interviews
3 Interview rounds
Resume Shortlist Round
Technical Round
HR Round
View more
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Software Developer Interview Questions from Similar Companies

3.7
 • 245 Interview Questions
4.1
 • 50 Interview Questions
3.9
 • 35 Interview Questions
4.0
 • 13 Interview Questions
3.5
 • 13 Interview Questions
3.8
 • 10 Interview Questions
View all
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
75 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter