Capgemini
20+ Redserv Global Solutions Interview Questions and Answers
Q1. Split Array with Equal Sums Problem Statement
Given an array 'ARR' of size 'N', determine if there exists a triplet (i, j, k) satisfying the conditions: 0 < i , i + 1 < j , j + 1 < k and k < N - 1, such that th...read more
The problem involves determining if there exists a triplet in an array such that the sums of specific subarrays are equal.
Iterate through all possible triplets (i, j, k) satisfying the given conditions.
Calculate the sum of subarrays [0, i - 1], [i + 1, j - 1], [j + 1, k - 1], [k + 1, N - 1] for each triplet.
Check if any triplet has equal sums for the subarrays, return True if found, else False.
Q2. What is the advantage of generic collection, when and why we should approach for that?
Generic collections provide type safety and reusability in software development.
Generic collections allow us to store and manipulate objects of any type in a type-safe manner.
They provide compile-time type checking, reducing the chances of runtime errors.
They promote code reusability by allowing the same collection to be used with different types.
Generic collections improve performance by eliminating the need for boxing and unboxing operations.
They enable us to write cleaner ...read more
Q3. What is the difference between one way SSL and two way SSL?
One way SSL is unidirectional while two way SSL is bidirectional.
One way SSL only authenticates the server to the client while two way SSL authenticates both the server and the client to each other.
One way SSL uses only server certificate while two way SSL uses both server and client certificates.
One way SSL is commonly used in websites while two way SSL is used in applications that require higher security such as online banking.
One way SSL is vulnerable to man-in-the-middle ...read more
Q4. What is the difference between Soap and Rest?
SOAP is a protocol while REST is an architectural style for web services.
SOAP uses XML for messaging while REST uses JSON or XML.
SOAP requires more bandwidth and processing power than REST.
SOAP has built-in error handling while REST relies on HTTP error codes.
SOAP supports both stateful and stateless communication while REST is stateless.
SOAP is commonly used in enterprise applications while REST is used for web-based applications.
Example of SOAP: Web Services Description Lan...read more
Q5. How is public key different than private key?
Public key is used for encryption and private key is used for decryption.
Public key is shared with others to encrypt messages.
Private key is kept secret and used to decrypt messages.
Public key is used in digital signatures to verify authenticity.
Examples include RSA, DSA, and Elliptic Curve Cryptography.
Public key is longer than private key for added security.
Q6. How is public cloud different than private cloud?
Public cloud is accessible to everyone while private cloud is restricted to a specific organization.
Public cloud is owned and operated by third-party providers while private cloud is owned and operated by the organization itself.
Public cloud is accessible over the internet while private cloud is accessible only within the organization's network.
Public cloud is more cost-effective for small businesses while private cloud is more secure for large enterprises.
Examples of public ...read more
Q7. How do we configure SSL at HTTP layer?
SSL can be configured at HTTP layer by enabling HTTPS protocol and configuring SSL certificates.
Enable HTTPS protocol in web server configuration
Generate or obtain SSL certificates
Configure SSL certificates in web server
Ensure secure communication between client and server
Test SSL configuration for any vulnerabilities
Q8. What are the methods supported by REST?
REST supports methods like GET, POST, PUT, DELETE, PATCH, OPTIONS, HEAD.
GET - retrieves a resource
POST - creates a new resource
PUT - updates an existing resource
DELETE - deletes a resource
PATCH - partially updates a resource
OPTIONS - returns the supported methods for a resource
HEAD - returns metadata about a resource
Q9. What do you understand by Cloud?
Cloud refers to the delivery of computing services over the internet.
Cloud computing allows users to access data and applications from anywhere with an internet connection.
It offers scalability, flexibility, and cost-effectiveness compared to traditional on-premises computing.
Examples of cloud services include Amazon Web Services, Microsoft Azure, and Google Cloud Platform.
Q10. How to use multiple dispatch in redux?
Multiple dispatch is not a feature of Redux. It can be achieved using middleware or custom logic.
Middleware like redux-thunk or redux-saga can be used to dispatch multiple actions based on a single action.
Custom logic can be implemented in the reducer to handle multiple actions based on a single action type.
For example, a single 'ADD_ITEM' action can trigger multiple actions like 'UPDATE_TOTAL', 'UPDATE_HISTORY', etc.
Multiple dispatch can also be achieved using the 'redux-bat...read more
Q11. Give me an example of OAuth 2.0 in practical life?
OAuth 2.0 is used for secure authorization and authentication in various applications.
OAuth 2.0 is used by Google to allow third-party applications to access user data without sharing passwords.
It is used by Facebook to allow users to log in to other websites using their Facebook credentials.
It is used by Microsoft to allow users to grant access to their Office 365 data to third-party applications.
OAuth 2.0 is also used in mobile applications to authenticate users and access ...read more
Q12. Finding the Missing number in the program
Use XOR operation to find the missing number in an array of integers.
Iterate through the array and XOR all the elements with their indices.
Then XOR the result with the indices from 0 to n.
The final result will be the missing number.
Q13. What exception will occur in pl/,sql
Various exceptions can occur in PL/SQL, such as NO_DATA_FOUND, TOO_MANY_ROWS, and INVALID_CURSOR.
NO_DATA_FOUND exception is raised when a SELECT INTO statement returns no rows.
TOO_MANY_ROWS exception is raised when a SELECT INTO statement returns multiple rows.
INVALID_CURSOR exception is raised when an invalid cursor operation is performed.
Q14. For designing what tool you are using
I use various design tools such as Adobe XD, Sketch, Figma, and InVision for designing user interfaces.
Adobe XD
Sketch
Figma
InVision
Q15. Explain Oops Concept?
OOPs is a programming paradigm based on the concept of objects, which can contain data and code.
OOPs stands for Object-Oriented Programming.
It focuses on creating objects that interact with each other to solve a problem.
It has four main concepts: Encapsulation, Inheritance, Polymorphism, and Abstraction.
Encapsulation is the process of hiding data and methods within a class.
Inheritance allows a class to inherit properties and methods from another class.
Polymorphism allows obje...read more
Q16. How to design database structure
Database structure design involves identifying entities, relationships, attributes, and normalization.
Identify entities and their relationships
Define attributes for each entity
Normalize the database to reduce redundancy
Consider indexing for efficient querying
Use primary and foreign keys to establish relationships
Choose appropriate data types for each attribute
Q17. String buffer and string boot difference
String buffer is mutable while string builder is not. String builder is faster but not thread-safe.
String buffer is synchronized and thread-safe, while string builder is not.
String builder is faster than string buffer because it is not synchronized.
String buffer is mutable, meaning it can be changed after creation, while string builder is immutable.
Example: StringBuffer sb = new StringBuffer(); StringBuilder sb = new StringBuilder();
Q18. What is OAuth 2.0?
OAuth 2.0 is an authorization framework that allows third-party applications to access user data without sharing passwords.
OAuth 2.0 is used for authentication and authorization.
It allows users to grant access to their resources stored on one site to another site.
It uses access tokens to grant access to resources.
Examples of OAuth 2.0 providers include Google, Facebook, and Twitter.
Q19. Postgres query for, group by operation.
Postgres query for grouping data based on a specific column.
Use the GROUP BY clause in your query
Specify the column you want to group by in the GROUP BY clause
Aggregate functions like COUNT, SUM, AVG can be used with GROUP BY
Example: SELECT column_name, COUNT(*) FROM table_name GROUP BY column_name
Q20. Can deactivate in Angular
Yes, you can deactivate in Angular using the ngIf directive.
Use ngIf directive to conditionally show or hide elements in Angular templates.
Set the condition to false to deactivate the element.
Example:
Content
Q21. explain Polymorphism with examples
Polymorphism is the ability of an object to take on many forms. It allows objects of different classes to be treated as the same type.
Polymorphism allows a single interface to be used for different types of objects.
It helps in achieving code reusability and flexibility.
Polymorphism can be achieved through method overriding and method overloading.
Example: A 'Shape' class can have different subclasses like 'Circle', 'Rectangle', and 'Triangle', all implementing a 'draw' method.
Q22. write code using Streams API
Using Streams API to write code for software development tasks.
Use Stream.of() to create a stream from a list of elements
Use filter() to apply a predicate to filter elements
Use map() to transform elements in the stream
Use collect() to convert the stream into a collection
More about working at Capgemini
Top HR Questions asked in Redserv Global Solutions
Interview Process at Redserv Global Solutions
Top Software Developer Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month