Add office photos
Capgemini logo
Engaged Employer

Capgemini

Verified
3.7
based on 41.7k Reviews
Video summary
Proud winner of ABECA 2024 - AmbitionBox Employee Choice Awards
Filter interviews by

3000+ Capgemini Interview Questions and Answers

Updated 28 Feb 2025
Popular Designations

Q1. In a dark room,there is a box of 18 white and 5 black gloves. You are allowed to pick one and then you are allowed to keep it and check it outside. How many turns do you need to take in order for you to find a...

read more
Ans.

You need to take 36 turns to find a perfect pair.

  • You need to pick 19 gloves to ensure a perfect pair.

  • The worst case scenario is picking 18 white gloves and then the 19th glove is black.

  • In that case, you need to pick 17 more gloves to find a black one and complete the pair.

View 524 more answers
right arrow

Q2. N-th Fibonacci Number Problem Statement

Given an integer ‘N’, your task is to find and return the N’th Fibonacci number using matrix exponentiation.

Since the answer can be very large, return the answer modulo ...read more

Ans.

Find N-th Fibonacci number using matrix exponentiation and return modulo 10^9+7.

  • Implement a function to find N-th Fibonacci number using matrix exponentiation.

  • Return the answer modulo 10^9+7.

  • Use the formula F(n) = F(n-1) + F(n-2) with F(1) = F(2) = 1.

  • The time complexity should be better than O(N).

  • The constraints are 1 <= T <= 10 and 1 <= N <= 10^5.

Add your answer
right arrow
Capgemini Interview Questions and Answers for Freshers
illustration image

Q3. How can you cut a rectangular cake in 8 symmetric pieces in three cuts?

Ans.

Cut the cake in half horizontally, then vertically, and finally cut each half diagonally.

  • Cut the cake horizontally through the middle.

  • Cut the cake vertically through the middle.

  • Cut each half diagonally from corner to corner.

  • Ensure each cut is made symmetrically to get 8 equal pieces.

  • Example: https://www.youtube.com/watch?v=ZdGmuCJzQFo

View 177 more answers
right arrow

Q4. 1. What's the use of update sets and how do you move update set from one instance to another? Once you imported the update set, what will you do? To check the customisations, You need to do open the update set...

read more
Ans.

Interview questions for Senior Consultant role

  • Update sets are used to move customizations from one instance to another

  • To move multiple update sets at once, use the Update Set Migration plugin

  • Custom applications can be developed using ServiceNow's App Creator

  • Turnstile activity in workflow is used to loop back to a previous activity

  • Activities in workflows include approvals, notifications, and subflows

  • To copy fields from incident table to task record, use a UI action with script...read more

View 2 more answers
right arrow
Discover Capgemini interview dos and don'ts from real experiences

Q5. One question of sorting for a list of people belonging to different cities and states.

Ans.

Sort a list of people by their cities and states.

  • Use a sorting algorithm like quicksort or mergesort.

  • Create a custom comparator function that compares the city and state of each person.

  • If two people belong to the same city and state, sort them by their names.

  • Example: [{name: 'John', city: 'New York', state: 'NY'}, {name: 'Jane', city: 'Boston', state: 'MA'}]

  • Example output: [{name: 'Jane', city: 'Boston', state: 'MA'}, {name: 'John', city: 'New York', state: 'NY'}]

View 56 more answers
right arrow

Q6. Could you tell me, which tools do you have used in test management and defect tracking?

Ans.

I have experience using JIRA and HP ALM for test management and defect tracking.

  • I have used JIRA extensively for managing test cases, test plans, and tracking defects.

  • I have also worked with HP ALM for test management and defect tracking.

  • Both tools have robust reporting capabilities that allow for easy tracking of project progress and defect resolution.

  • In addition, I have experience integrating these tools with other software development tools such as Jenkins and Git for cont...read more

View 8 more answers
right arrow
Are these interview questions helpful?

Q7. What are seven layers of networking?

Ans.

The seven layers of networking refer to the OSI model which defines how data is transmitted over a network.

  • The seven layers are: Physical, Data Link, Network, Transport, Session, Presentation, and Application.

  • Each layer has a specific function and communicates with the layers above and below it.

  • For example, the Physical layer deals with the physical transmission of data, while the Application layer deals with user interfaces and applications.

  • Understanding the OSI model is imp...read more

View 106 more answers
right arrow

Q8. Pascal's Triangle Construction

You are provided with an integer 'N'. Your task is to generate a 2-D list representing Pascal’s triangle up to the 'N'th row.

Pascal's triangle is a triangular array where each el...read more

Ans.

Generate Pascal's triangle up to the Nth row using a 2-D list.

  • Iterate through each row up to N, starting with [1] as the first row.

  • Calculate each element in a row by summing the two elements directly above from the previous row.

  • Append each row to the 2-D list until reaching the Nth row.

  • Example: For N = 4, the output would be [ [1], [1, 1], [1, 2, 1], [1, 3, 3, 1] ]

View 1 answer
right arrow
Share interview questions and help millions of jobseekers 🌟
man with laptop

Q9. Maximum Difference Problem Statement

Given an array ARR of N elements, your task is to determine the maximum difference between any two elements in ARR.

If the maximum difference is even, print EVEN. If the max...read more

Ans.

Find the maximum difference between any two elements in an array and determine if it is even or odd.

  • Iterate through the array to find the maximum and minimum elements.

  • Calculate the difference between the maximum and minimum elements.

  • Check if the difference is even or odd and return the result.

Add your answer
right arrow

Q10. 1) What are the types of master data in SAP MM? 2) What is T-code for creation of material master? 3) What are the types of document in SAP MM? 4) What is T- code for creation of vendor master? 5) What is STO?...

read more
Ans.

1) Material, Vendor, Customer, and Service master data are types of master data in SAP MM.

  • Material master data contains information about materials used in production or procurement.

  • Vendor master data contains information about the vendors or suppliers.

  • Customer master data contains information about the customers.

  • Service master data contains information about the services provided.

View 2 more answers
right arrow

Q11. Split Array with Equal Sums Problem Statement

Given an array 'ARR' of size 'N', determine if there exists a triplet (i, j, k) satisfying the conditions: 0 < i , i + 1 < j , j + 1 < k and k < N - 1, such that th...read more

Ans.

The problem involves determining if there exists a triplet in an array such that the sums of specific subarrays are equal.

  • Iterate through all possible triplets (i, j, k) satisfying the given conditions.

  • Calculate the sum of subarrays [0, i - 1], [i + 1, j - 1], [j + 1, k - 1], [k + 1, N - 1] for each triplet.

  • Check if any triplet has equal sums for the subarrays, return True if found, else False.

Add your answer
right arrow

Q12. If a developer who was working on a critical user story suddenly goes on emergency medical leave. how will you deal with the situation?

Ans.

As a Scrum Master, I would handle the situation by following these steps:

  • Assess the impact of the developer's absence on the critical user story

  • Communicate with the team and stakeholders about the situation

  • Identify if there are any other team members who can take over the work

  • If no immediate replacement is available, prioritize the critical user story and adjust the sprint plan accordingly

  • Work with the Product Owner to manage expectations and potentially reprioritize other us...read more

View 3 more answers
right arrow

Q13. 1. If MAM is there then why do we need MDM? 2. What are the different type of Android device enrollment methods? 3. What do you know about Apple Push Notification Services? 4. What will happen if APNS is not re...

read more
Ans.

Interview questions for Senior Consultant role related to MAM, MDM, Android and Windows device enrollment, APNS, and Intune app deployment.

  • MDM is needed for complete device management and control, while MAM is focused on securing and managing specific applications and data.

  • Different Android device enrollment methods include QR code, Near Field Communication (NFC), and Zero-touch enrollment.

  • Apple Push Notification Services (APNS) is a service used to send push notifications to...read more

Add your answer
right arrow

Q14. Missing Number Problem Statement

You are provided with an array named BINARYNUMS consisting of N unique strings. Each string represents an integer in binary, covering every integer from 0 to N except for one. Y...read more

Ans.

Identify the missing integer in an array of binary strings and return its binary representation without leading zeros.

  • Iterate through the binary strings to convert them to integers and find the missing number using the formula for sum of integers from 0 to N.

  • Calculate the sum of all integers from 0 to N using the formula (N*(N+1))/2 and subtract the sum of the integers in the array to find the missing number.

  • Convert the missing integer to binary representation and return it a...read more

View 1 answer
right arrow

Q15. Ninja and His Secret Information Encoding Problem

Ninja, a new member of the FBI, has acquired some 'SECRET_INFORMATION' that he needs to share with his team. To ensure security against hackers, Ninja decides t...read more

Ans.

The task is to encode and decode 'SECRET_INFORMATION' for security purposes and determine if the transmission was successful.

  • Read the number of test cases 'T'

  • For each test case, encode the 'SECRET_INFORMATION' and then decode it

  • Compare the decoded string with the original 'SECRET_INFORMATION'

  • Print 'Transmission successful' if they match, else print 'Transmission failed'

View 1 answer
right arrow

Q16. Factorial Calculation Problem Statement

Develop a program to compute the factorial of a given integer 'n'.

The factorial of a non-negative integer 'n', denoted as n!, is the product of all positive integers les...read more

Ans.

Program to compute factorial of a given integer 'n'.

  • Create a function to calculate factorial using a loop or recursion

  • Handle edge cases such as negative input or input exceeding constraints

  • Return 'Error' if factorial is undefined

Add your answer
right arrow

Q17. Prime Numbers within a Range

Given an integer N, determine and print all the prime numbers between 2 and N, inclusive.

Input:

Integer N

Output:

Prime numbers printed on separate lines

Example:

Input:
N = 10
Out...read more
Ans.

Find and print all prime numbers between 2 and N, inclusive.

  • Iterate from 2 to N and check if each number is prime

  • A prime number is only divisible by 1 and itself

  • Print each prime number on a new line

Add your answer
right arrow

Q18. JCL 1. Ways in which the you can paas on data from.jcl to cobol.: Dsn file, sysin, parm 2.How do u accept the data which is paased from Parm parameter.: Using linkage section. 3. How will u make any step run in...

read more
Ans.

Interview questions for Senior Consultant position on JCL and DB2

  • JCL: passing data using DSN file, SYSIN, and PARM parameters

  • JCL: accepting data passed from PARM parameter using linkage section

  • JCL: making a step run in case of job failure using COND=ONLY

  • JCL: explaining DISP position

  • JCL: writing logic to copy matching data from two input files based on a common key

  • DB2: explaining cursor not defined for selecting more than one row from table

  • DB2: life cycle of cursor - declare, ...read more

Add your answer
right arrow

Q19. How to achieve to different pricing procedure for sales order and billing document , which controls will enable thia

Ans.

To achieve different pricing procedures for sales order and billing document in SAP SD, you can use condition technique and pricing procedure determination.

  • Create separate pricing procedures for sales order and billing document

  • Assign the pricing procedures to respective document types

  • Configure condition technique to determine the pricing procedure based on document type

  • Use condition records and access sequences to define pricing conditions

  • Maintain condition records for each p...read more

View 5 more answers
right arrow

Q20. Cycle Detection in a Singly Linked List

Determine if a given singly linked list of integers forms a cycle or not.

A cycle in a linked list occurs when a node's next points back to a previous node in the list. T...read more

Ans.

Detect if a singly linked list forms a cycle by checking if a node's next points back to a previous node.

  • Traverse the linked list using two pointers, one moving one step at a time and the other moving two steps at a time.

  • If the two pointers meet at any point, it indicates the presence of a cycle in the linked list.

  • Use Floyd's Cycle Detection Algorithm to efficiently detect cycles in the linked list.

Add your answer
right arrow

Q21. What are the causes of user not able to login application

Ans.

Possible causes of user not able to login to an application

  • Incorrect username or password

  • Account locked or disabled

  • Expired password

  • Network connectivity issues

  • Application server down

  • Incorrect permissions or access rights

  • Firewall blocking access

  • Authentication server issues

  • Application configuration errors

View 8 more answers
right arrow

Q22. 3. Do you know about OOP concepts? Explain.

Ans.

Yes

  • OOP stands for Object-Oriented Programming

  • It is a programming paradigm that organizes code into objects

  • OOP concepts include encapsulation, inheritance, and polymorphism

  • Encapsulation allows bundling of data and methods into a single unit

  • Inheritance enables the creation of new classes based on existing ones

  • Polymorphism allows objects of different classes to be treated as the same type

  • Example: A car class can have properties like color and speed, and methods like start and st...read more

View 1 answer
right arrow

Q23. Majority Element III Problem Statement

You are given an array ARR and an integer K. Your task is to find all the elements in ARR that occur more than or equal to N/K times, where N is the length of the array AR...read more

Ans.

The task is to find elements in an array that occur more than or equal to N/K times.

  • Iterate through the array and count the frequency of each element.

  • Check if the frequency of an element is greater than or equal to N/K, then add it to the result.

  • Return the result containing elements that occur more than or equal to N/K times.

Add your answer
right arrow

Q24. 1). How pricing procedure is determine in SAP SD. 2). ASAP Methodology steps and your role as a SD Consultant. 3). GAPS during Implementation Project. 4). Condition technique for determining pricing procedure....

read more
Ans.

Questions related to SAP SD implementation and processes.

  • Pricing procedure is determined based on condition technique and can be customized as per business requirements.

  • ASAP methodology involves various phases like project preparation, business blueprint, realization, final preparation, and go-live and support.

  • GAPS during implementation project can arise due to differences between business requirements and system capabilities.

  • Condition technique involves defining access seque...read more

Add your answer
right arrow

Q25. Find the Duplicate Number Problem Statement

Given an integer array 'ARR' of size 'N' containing numbers from 0 to (N - 2). Each number appears at least once, and there is one number that appears twice. Your tas...read more

Ans.

Find the duplicate number in an array of integers from 0 to (N - 2).

  • Iterate through the array and keep track of the frequency of each number using a hashmap.

  • Return the number that has a frequency greater than 1 as it is the duplicate number.

View 1 answer
right arrow

Q26. What type of testing you have done in your career and how many test cases written of the day?

Ans.

I have experience in functional, regression, integration, and acceptance testing. On average, I write 20-30 test cases per day.

  • Functional testing to ensure the software meets the requirements

  • Regression testing to ensure new changes do not break existing functionality

  • Integration testing to ensure different components work together

  • Acceptance testing to ensure the software meets the user's needs

  • On average, I write 20-30 test cases per day

  • Examples include testing a new feature on...read more

View 1 answer
right arrow

Q27. What is agile fundamentals and theirs importance and waterfall model?

Ans.

Agile fundamentals are a set of principles and values that prioritize flexibility, collaboration, and continuous improvement in software development. Waterfall model is a traditional linear approach to software development.

  • Agile emphasizes iterative development and customer collaboration

  • Agile values individuals and interactions over processes and tools

  • Agile promotes responding to change over following a plan

  • Waterfall model follows a sequential approach to software development...read more

View 1 answer
right arrow

Q28. Trailing Zeros in Factorial Problem

Find the number of trailing zeroes in the factorial of a given number N.

Input:

The first line contains an integer T representing the number of test cases.
Each of the followi...read more
Ans.

Count the number of trailing zeros in the factorial of a given number.

  • Calculate the number of 5's in the prime factorization of N to find the number of trailing zeros.

  • Divide N by 5, then by 25, then by 125, and so on, and sum up the quotients to get the answer.

  • Example: For N=10, 10/5=2, so there are 2 trailing zeros in 10!.

Add your answer
right arrow

Q29. what are the different types of datatypes in python?

Ans.

Python has several built-in datatypes including numeric, sequence, and mapping types.

  • Numeric types include integers, floating-point numbers, and complex numbers.

  • Sequence types include lists, tuples, and range objects.

  • Mapping types include dictionaries.

  • Other datatypes include boolean, bytes, and sets.

View 1 answer
right arrow

Q30. Non-Decreasing Array Problem Statement

Given an integer array ARR of size N, determine if it can be transformed into a non-decreasing array by modifying at most one element.

An array is defined as non-decreasin...read more

Ans.

Determine if an array can be transformed into a non-decreasing array by modifying at most one element.

  • Iterate through the array and count the number of elements that violate the non-decreasing condition.

  • If there is more than one violation, return false. If there is one violation, check if it can be fixed by modifying one element.

  • Compare the violating element with its neighbors to determine if it can be made non-decreasing by modifying it.

  • Return true if the array can be made n...read more

Add your answer
right arrow

Q31. Equilibrium Index Problem Statement

Given an array Arr consisting of N integers, your task is to find the equilibrium index of the array.

An index is considered as an equilibrium index if the sum of elements of...read more

Ans.

Find the equilibrium index of an array where sum of elements on left equals sum on right.

  • Iterate through the array and calculate prefix sum and suffix sum at each index.

  • Compare prefix sum and suffix sum to find equilibrium index.

  • Return the left-most equilibrium index or -1 if none found.

Add your answer
right arrow

Q32. Why are these three called as pillars of scrum ? How are they related to each other

Ans.

The three pillars of Scrum are transparency, inspection, and adaptation. They are interrelated and support the Scrum framework.

  • Transparency ensures that all information is visible and accessible to the team, stakeholders, and customers.

  • Inspection involves regularly reviewing the progress, artifacts, and processes to identify any deviations or issues.

  • Adaptation refers to making necessary changes based on the inspection results to improve the product and the process.

  • These pilla...read more

View 3 more answers
right arrow

Q33. Kth Largest Number Problem Statement

You are given a continuous stream of numbers, and the task is to determine the kth largest number at any moment during the stream.

Explanation:

A specialized data structure ...read more

Ans.

Design a data structure to find the kth largest number in a continuous stream of integers.

  • Design a specialized data structure to handle an indefinite number of integers from the stream.

  • Implement 'add(DATA)' to incorporate integers into the stream's pool.

  • Implement 'getKthLargest()' to retrieve the kth largest number from the pool.

  • Maintain the pool of numbers and return the kth largest number for each query.

  • Ensure efficient implementation to handle large input sizes.

Add your answer
right arrow

Q34. Where do you transfer the profit you get in P&amp;L a/c?

Ans.

The profit in the P&L a/c is transferred to the retained earnings account.

  • Profit is transferred to the retained earnings account to reflect the accumulated profits of the company.

  • Retained earnings account is a part of the equity section on the balance sheet.

  • The transfer is done at the end of the accounting period.

  • Retained earnings can be used for reinvestment, dividends, or other purposes.

  • Example: If a company has a profit of $100,000 in the P&L a/c, it will be transferred to...read more

View 4 more answers
right arrow

Q35. Reverse Linked List Problem Statement

Given a singly linked list of integers, return the head of the reversed linked list.

Example:

Initial linked list: 1 -> 2 -> 3 -> 4 -> NULL
Reversed linked list: 4 -> 3 -> 2...read more
Ans.

Reverse a singly linked list of integers and return the head of the reversed linked list.

  • Iterate through the linked list and reverse the pointers to point to the previous node.

  • Use three pointers to keep track of the current, previous, and next nodes.

  • Update the head of the reversed linked list as the last node encountered.

  • Time complexity: O(N), Space complexity: O(1).

Add your answer
right arrow

Q36. Reverse the String Problem Statement

You are given a string STR which contains alphabets, numbers, and special characters. Your task is to reverse the string.

Example:

Input:
STR = "abcde"
Output:
"edcba"

Input...read more

Ans.

Reverse a given string containing alphabets, numbers, and special characters.

  • Create a function that takes a string as input

  • Use built-in functions to reverse the string

  • Return the reversed string

Add your answer
right arrow

Q37. Is Java platform-independent, if yes why?

Ans.

Yes, Java is platform-independent because of its 'write once, run anywhere' principle.

  • Java programs are compiled into bytecode, which can be executed on any platform with a Java Virtual Machine (JVM).

  • The JVM acts as an interpreter, translating the bytecode into machine code specific to the underlying platform.

  • This allows Java programs to run on different operating systems and hardware architectures without modification.

  • For example, a Java program developed on a Windows machin...read more

View 5 more answers
right arrow

Q38. Explain the Microservices architecture of your project? How services internally communicates? How to manage transactions and failure scenario in distributed Microservices system? List some spring boot Microserv...

read more
Ans.

Explaining Microservices architecture, communication, transactions, annotations, authentication, and API validation.

  • Our project follows a Microservices architecture where each service is independently deployable and scalable.

  • Services communicate with each other using RESTful APIs and message brokers like Kafka.

  • We use distributed transactions and compensating transactions to manage transactions and handle failure scenarios.

  • Some of the Spring Boot Microservices annotations we u...read more

Add your answer
right arrow

Q39. Minimum Operations to Make Strings Equal

Given two strings A and B consisting of lowercase English letters, determine the minimum number of pre-processing moves required on string A to make it equal to string B...read more

Ans.

The minimum number of pre-processing moves required on string A to make it equal to string B using specified operations.

  • Iterate through both strings simultaneously and check for differences.

  • Count the number of differences that can be fixed using the specified operations.

  • Return the count as the minimum number of pre-processing moves required.

Add your answer
right arrow

Q40. Ways To Make Coin Change

Given an infinite supply of coins of varying denominations, determine the total number of ways to make change for a specified value using these coins. If it's not possible to make the c...read more

Ans.

The task is to find the total number of ways to make change for a specified value using given denominations.

  • Use dynamic programming to solve this problem efficiently.

  • Create a 2D array to store the number of ways to make change for each value using different denominations.

  • Iterate through the denominations and update the array based on the current denomination.

  • The final answer will be in the last cell of the 2D array.

Add your answer
right arrow

Q41. The Skyline Problem

Compute the skyline of given rectangular buildings in a 2D city, eliminating hidden lines and forming the outer contour of the silhouette when viewed from a distance. Each building is descri...read more

Ans.

Compute the skyline of given rectangular buildings in a 2D city, eliminating hidden lines and forming the outer contour of the silhouette when viewed from a distance.

  • Iterate through the buildings and create a list of critical points (x, y) where the height changes.

  • Sort the critical points based on x-coordinate and process them to form the skyline.

  • Merge consecutive horizontal segments of equal height into one to ensure no duplicates in the output.

Add your answer
right arrow

Q42. Wildcard Pattern Matching Problem Statement

Implement a wildcard pattern matching algorithm to determine if a given wildcard pattern matches a text string completely.

The wildcard pattern may include the charac...read more

Ans.

Implement a wildcard pattern matching algorithm to determine if a given wildcard pattern matches a text string completely.

  • Create a recursive function to match the pattern with the text character by character.

  • Handle the cases for '?' and '*' characters in the pattern.

  • Keep track of the current positions in the pattern and text while matching.

  • Return 'True' if the pattern matches the text completely, otherwise return 'False'.

Add your answer
right arrow

Q43. Time to Burn Tree Problem

You are given a binary tree consisting of 'N' unique nodes and a start node where the burning will commence. The task is to calculate the time in minutes required to completely burn th...read more

Ans.

Calculate the time in minutes required to completely burn a binary tree starting from a given node.

  • Perform a depth-first search (DFS) to calculate the time taken to burn the entire tree.

  • Keep track of the time taken to burn each node and return the maximum time as the result.

  • Consider the edge cases where the tree is empty or only consists of the start node.

Add your answer
right arrow
Q44. What is meant by an interface in Object-Oriented Programming?
Ans.

An interface in OOP defines a contract for classes to implement, specifying methods that must be included.

  • An interface contains method signatures but no implementation details.

  • Classes can implement multiple interfaces in Java.

  • Interfaces allow for polymorphism and loose coupling in software design.

Add your answer
right arrow

Q45. Count Inversions Problem Statement

Given an integer array ARR of size N, your task is to find the total number of inversions that exist in the array.

An inversion is defined for a pair of integers in the array ...read more

Ans.

Count the total number of inversions in an integer array.

  • Iterate through the array and for each pair of elements, check if the inversion condition is met.

  • Use a nested loop to compare each pair of elements efficiently.

  • Keep a count of the inversions found and return the total count at the end.

Add your answer
right arrow

Q46. how do you concatenate a string and integer? is it possible ?

Ans.

Yes, it is possible to concatenate a string and integer using type conversion.

  • Convert the integer to a string using str() function and then concatenate with the string.

  • Use format() method to insert the integer value into the string.

  • Use f-strings to directly insert the integer value into the string.

Add your answer
right arrow

Q47. what is xpath ? How do you find an element ? what is the difference between absolute xpath and relative xpath?

Ans.

XPath is a language used to locate elements in an XML or HTML document. Absolute and relative XPaths differ in their starting point.

  • XPath is used to navigate through elements and attributes in an XML or HTML document

  • Elements can be located using absolute or relative XPaths

  • Absolute XPaths start from the root node and are more specific but less flexible

  • Relative XPaths start from the current node and are more flexible but less specific

Add your answer
right arrow

Q48. Count Good Subsets Problem Statement

Given an array ARR of size N consisting of distinct elements, your task is to determine the total number of good subsets. A subset is considered a good subset if the element...read more

Ans.

Count the total number of good subsets in an array where elements can be rearranged to divide the next element.

  • Iterate through all possible subsets of the array.

  • Check if each subset is a good subset by rearranging elements to divide the next element.

  • Count the number of good subsets and return the total count.

Add your answer
right arrow

Q49. Anagram Pairs Verification Problem

Your task is to determine if two given strings are anagrams of each other. Two strings are considered anagrams if you can rearrange the letters of one string to form the other...read more

Ans.

Determine if two strings are anagrams of each other by checking if they have the same characters in different order.

  • Create a frequency map of characters for both strings and compare them.

  • Sort both strings and check if they are equal.

  • Use a hash table to store character counts and compare the counts for both strings.

Add your answer
right arrow

Q50. Next Greater Number Problem Statement

Given a string S which represents a number, determine the smallest number strictly greater than the original number composed of the same digits. Each digit's frequency from...read more

Ans.

Given a number represented as a string, find the smallest number greater than the original with the same set of digits.

  • Iterate from right to left to find the first digit that can be swapped with a larger digit to make the number greater.

  • Swap this digit with the smallest digit to its right that is larger than it.

  • Sort the digits to the right of the swapped digit in ascending order to get the smallest number greater than the original.

  • If no such number exists, return -1.

  • Example: ...read more

Add your answer
right arrow

Q51. if some data is not found on the page, do page refresh and how do you validate a data after page refresh in selenium?

Ans.

To validate data after page refresh in Selenium, we can refresh the page and then use explicit wait to validate the data.

  • Refresh the page using driver.navigate().refresh() method

  • Use explicit wait to wait for the element to be visible on the page

  • Validate the data using getText() or getAttribute() method

  • Example: driver.navigate().refresh(); WebDriverWait wait = new WebDriverWait(driver, 10); wait.until(ExpectedConditions.visibilityOfElementLocated(By.xpath("xpath_of_element")))...read more

Add your answer
right arrow

Q52. What are the fields in EXTC that are related to IT ?

Ans.

Fields in EXTC related to IT

  • Digital Signal Processing

  • Microprocessors and Microcontrollers

  • Computer Networks

  • Data Communication

  • Wireless Communication

  • Mobile Communication

  • Internet of Things

  • Cloud Computing

  • Artificial Intelligence

  • Machine Learning

View 1 answer
right arrow

Q53. Next Greater Element Problem Statement

Given a list of integers of size N, your task is to determine the Next Greater Element (NGE) for every element. The Next Greater Element for an element X is the first elem...read more

Ans.

The task is to find the Next Greater Element for each element in a list of integers.

  • Iterate through the list of integers from right to left

  • Use a stack to keep track of elements for which the Next Greater Element is not yet found

  • Pop elements from the stack until a greater element is found or the stack is empty

Add your answer
right arrow

Q54. Kth Largest Element Problem Statement

Ninja enjoys working with numbers, and Alice challenges him to find the Kth largest value from a given list of numbers.

Input:

The first line contains an integer 'T', repre...read more
Ans.

The task is to find the Kth largest element in a given list of numbers for each test case.

  • Read the number of test cases 'T'

  • For each test case, read the number of elements 'N' and the value of 'K'

  • Sort the array in descending order and output the Kth element

Add your answer
right arrow

Q55. Find All Pairs Adding Up to Target

Given an array of integers ARR of length N and an integer Target, your task is to return all pairs of elements such that they add up to the Target.

Input:

The first line conta...read more
Ans.

The task is to find all pairs of elements in an array that add up to a given target.

  • Iterate through the array and for each element, check if the target minus the element exists in a hashmap.

  • If it exists, print the pair (current element, target - current element).

  • If no pair is found, print (-1, -1).

Add your answer
right arrow

Q56. What are the different file replication strategies in Azure blob storage ?

Ans.

Azure blob storage supports three file replication strategies: LRS, ZRS, and GRS.

  • LRS (Locally Redundant Storage) replicates data within a single data center.

  • ZRS (Zone Redundant Storage) replicates data across multiple data centers within a single region.

  • GRS (Geo-Redundant Storage) replicates data across multiple data centers in two separate regions for added redundancy.

  • Read-access geo-redundant storage (RA-GRS) provides read access to the data in the secondary region in case ...read more

Add your answer
right arrow

Q57. Output of the following code: integer a, b, c; set a = 11, b = 12, c = 10; if (b &gt; 0) b++ else a++ end if for (each b from 0 to 5) a = a + 1 end for print (a + c)

Ans.

The code sets values for three integers and performs conditional and loop operations to print the sum of two integers.

  • The value of 'a' is set to 11, 'b' to 12, and 'c' to 10.

  • The 'if' condition checks if 'b' is greater than 0 and increments 'b' if true, else increments 'a'.

  • The 'for' loop runs for each value of 'b' from 0 to 5 and increments 'a' by 1.

  • The final output is the sum of 'a' and 'c', which is 18.

View 3 more answers
right arrow

Q58. Find Terms of Series Problem

Ayush is tasked with determining the first 'X' terms of the series defined by 3 * N + 2, ensuring that no term is a multiple of 4.

Input:

The first line contains a single integer 'T...read more
Ans.

Generate the first 'X' terms of a series 3 * N + 2, excluding multiples of 4.

  • Iterate through numbers starting from 1 and check if 3 * N + 2 is not a multiple of 4.

  • Keep track of the count of terms generated and stop when 'X' terms are found.

  • Return the list of terms that meet the criteria for each test case.

Add your answer
right arrow

Q59. If a computer speed is slow, how will you increase its speed?

Ans.

To increase computer speed, optimize startup programs, remove malware, upgrade hardware, and clear disk space.

  • Optimize startup programs to reduce the number of programs running at startup

  • Remove malware using antivirus software

  • Upgrade hardware such as RAM or SSD

  • Clear disk space by deleting unnecessary files and programs

  • Disable visual effects to improve performance

View 2 more answers
right arrow

Q60. What is the difference between velocity and capacity?

Ans.

Velocity is the amount of work completed in a sprint, while capacity is the amount of work a team can handle in a sprint.

  • Velocity is a measure of the team's productivity in completing user stories or tasks in a sprint.

  • Capacity is the amount of work a team can handle in a sprint, taking into account factors such as team size, availability, and skill level.

  • Velocity is calculated by dividing the total number of story points completed in a sprint by the length of the sprint in da...read more

View 3 more answers
right arrow

Q61. Find Duplicates in an Array

You are given an array/list ARR consisting of N integers, where each element is in the range 0 to N - 1. Your task is to identify all duplicate elements present in ARR.

Input:

The fi...read more
Ans.

Find duplicates in an array of integers within a specified range.

  • Iterate through the array and keep track of seen elements using a hash set.

  • For each element, check if it has been seen before and add it to the result if it has.

  • Return the list of duplicate elements found in the array.

Add your answer
right arrow

Q62. Kernel files are existing in which location &amp; what are they

Ans.

Kernel files are located in /usr/sap//SYS/exe//

  • Kernel files are the core components of the SAP system

  • They are responsible for managing system resources and executing processes

  • Kernel files are platform-specific and are stored in the /usr/sap//SYS/exe// directory

  • Examples of kernel files include disp+work, icman, and msg_server

View 2 more answers
right arrow

Q63. Subarray With Given Sum Problem Statement

Given an array ARR of N integers and an integer S, determine if there exists a contiguous subarray within the array with a sum equal to S. If such a subarray exists, re...read more

Ans.

Given an array of integers, find a subarray with a given sum S.

  • Iterate through the array while keeping track of the sum of elements encountered so far.

  • Use a hashmap to store the cumulative sum and its corresponding index.

  • If the current sum minus the target sum is found in the hashmap, a subarray with the target sum exists.

  • Return the start and end indices of the subarray if found, otherwise return [-1, -1].

Add your answer
right arrow

Q64. What do you know about APNS? What will happen if APNS is not renewed on time?

Ans.

APNS is Apple Push Notification Service used to send push notifications to iOS devices.

  • APNS is used by iOS apps to send push notifications to users.

  • If APNS is not renewed on time, push notifications will not be delivered to users.

  • This can result in a poor user experience and loss of engagement.

  • Renewing APNS requires a valid Apple Developer account and proper configuration of the app's push notification settings.

Add your answer
right arrow

Q65. 1] Introduction 2] Sanity Vs Smoke testing 3] Waits in selenium and code for it 4] Scenario based questions 5] types of frameworks 6] how to read data from excel 7] Coding questions based on- handling dropdown...

read more
Ans.

Interview questions for Automation Test Engineer

  • Sanity testing is a subset of regression testing while smoke testing is a subset of acceptance testing

  • Waits in Selenium are used to synchronize the test execution with the application's response

  • Types of frameworks include data-driven, keyword-driven, and hybrid frameworks

  • Reading data from Excel can be done using Apache POI library

  • Handling dropdown in Selenium can be done using Select class

  • Database automation can be done using JD...read more

Add your answer
right arrow

Q66. what is poker ? and why do you use fibonacci series to give story points ?

Ans.

Poker is an estimation technique used in Agile project management. Fibonacci series is used for story points to reflect uncertainty.

  • Poker is a collaborative estimation technique where team members assign story points to user stories.

  • It helps in determining the effort required to complete a user story.

  • Fibonacci series (0, 1, 2, 3, 5, 8, 13, etc.) is used to reflect the uncertainty and complexity of the work.

  • Larger numbers in the Fibonacci series indicate higher uncertainty and...read more

View 2 more answers
right arrow
Q67. What is the difference between an abstract class and an interface in OOP?
Ans.

Abstract class can have both abstract and non-abstract methods, while interface can only have abstract methods.

  • Abstract class can have constructor, fields, and methods, while interface cannot have any of these.

  • A class can implement multiple interfaces but can only inherit from one abstract class.

  • Abstract classes are used to provide a common base for related classes, while interfaces define a contract for classes to implement.

  • Example: Abstract class 'Shape' with abstract metho...read more

Add your answer
right arrow

Q68. What is parameterized mapping ? How did you implement ?

Ans.

Parameterized mapping is a feature in SAP PI that allows dynamic mapping based on input parameters.

  • Parameterized mapping enables the mapping of different source and target structures based on input parameters

  • It allows for flexible and reusable mappings by using parameters to determine the mapping logic

  • Parameters can be defined and passed at runtime to dynamically determine the mapping behavior

  • Implementation involves defining parameters in the mapping program and using them in...read more

View 1 answer
right arrow

Q69. What do you know about group tags and windows autopilot?

Ans.

Group tags and Windows Autopilot are tools used for managing and deploying devices in an organization.

  • Group tags are used to organize devices into logical groups for easier management.

  • Windows Autopilot is a cloud-based tool for deploying and configuring Windows devices.

  • Autopilot uses group tags to assign devices to specific profiles and configurations.

  • This allows for faster and more efficient deployment of devices in an organization.

  • For example, a company could use group tags...read more

View 1 answer
right arrow

Q70. How do we deploy an application using Microsoft Intune?

Ans.

Deploying an application using Microsoft Intune

  • Create an app in Intune

  • Upload the app package

  • Assign the app to a group of users or devices

  • Configure deployment settings

  • Monitor deployment status

View 1 answer
right arrow

Q71. 1. As per your experience you look more into Operations so would that be fine if we have you as our Front line of support?

Ans.

Yes, my experience in operations will help me provide effective front line support.

  • My experience in operations has given me a strong understanding of how different processes work and how to troubleshoot issues.

  • This knowledge will be useful in providing front line support as I can quickly identify the root cause of problems and provide effective solutions.

  • I am also skilled in communication and can effectively convey technical information to non-technical stakeholders.

  • For examp...read more

View 1 answer
right arrow

Q72. What are the pillars of Scrum ?

Ans.

The pillars of Scrum are transparency, inspection, and adaptation.

  • Transparency: All information about the project must be visible and understandable to everyone involved.

  • Inspection: Regularly inspect the progress and the product to identify any deviations or issues.

  • Adaptation: Based on the inspection, make necessary changes and adjustments to improve the product and the process.

View 7 more answers
right arrow

Q73. Rat in a Maze Problem Statement

You need to determine all possible paths for a rat starting at position (0, 0) in a square maze to reach its destination at (N-1, N-1). The maze is represented as an N*N matrix w...read more

Ans.

The task is to find all possible paths for a rat to navigate through a maze from start to finish.

  • Use backtracking to explore all possible paths in the maze.

  • Keep track of the current path and explore all possible directions at each step.

  • When reaching the destination, add the path to the list of valid paths.

  • Sort the list of paths in alphabetical order before returning.

Add your answer
right arrow

Q74. What is multithreading? ( I used it in my project )

Ans.

Multithreading is the ability of a CPU to execute multiple threads concurrently, improving performance and responsiveness.

  • Multithreading allows for parallel execution of tasks, utilizing multiple CPU cores.

  • It enables concurrent processing, where multiple threads can execute simultaneously.

  • Thread synchronization mechanisms like locks and semaphores are used to prevent data inconsistencies.

  • Multithreading can be used to improve user interface responsiveness and handle background...read more

View 1 answer
right arrow

Q75. What firewalls are you worked on? What are UTM firewalls? What is stateless and stateful inspection?

Ans.

Firewalls are network security devices that monitor and control incoming and outgoing network traffic. UTM firewalls provide additional security features such as antivirus, intrusion prevention, and content filtering. Stateless inspection examines each packet individually, while stateful inspection tracks the state of connections between packets.

  • Firewalls monitor and control network traffic

  • UTM firewalls provide additional security features

  • Stateless inspection examines each pa...read more

Add your answer
right arrow

Q76. Why is it suggested to utilise a database management system (DBMS)? List some of its primary advantages to explain.

Ans.

A DBMS is suggested for efficient data management. It offers advantages like data security, scalability, and data integrity.

  • DBMS ensures data security by providing access control and authentication mechanisms.

  • It allows for efficient data retrieval and manipulation through indexing and query optimization.

  • DBMS offers scalability by allowing for easy addition of new data and users.

  • It ensures data integrity by enforcing constraints and providing backup and recovery mechanisms.

  • Exa...read more

Add your answer
right arrow

Q77. how do you generate random emails in python? gmail.com is constant

Ans.

Generating random emails in Python with constant domain

  • Use the random module to generate random strings for the username part of the email

  • Combine the random username with the constant domain name

  • Ensure the generated email is unique if required

View 1 answer
right arrow

Q78. What ia the difference between plant and plant out side the countey

Ans.

Plant outside the country refers to a plant location that is situated outside the country where the company is headquartered.

  • Plant refers to a physical location where materials are produced or stored.

  • Plant outside the country is a plant location situated outside the country where the company is headquartered.

  • Plant outside the country may have different legal requirements and regulations compared to the plants within the country.

  • Plant outside the country may have different cur...read more

Add your answer
right arrow

Q79. How to manipulate traffic in OSPF? How to link indirectly connected areas to backbone area? What are OSPF LSAs?

Ans.

OSPF traffic manipulation and linking indirectly connected areas to backbone area using LSAs.

  • OSPF traffic can be manipulated using various methods such as adjusting the cost metric or using route redistribution.

  • To link indirectly connected areas to the backbone area, a virtual link can be created through a transit area.

  • OSPF LSAs (Link State Advertisements) are packets that contain information about the network topology and are used by OSPF routers to build a complete map of t...read more

Add your answer
right arrow
Q80. What is the difference between a Clustered Index and a Non-Clustered Index?
Ans.

Clustered Index physically reorders the data in the table, while Non-Clustered Index creates a separate structure.

  • Clustered Index determines the physical order of data rows in a table.

  • Non-Clustered Index creates a separate structure that points back to the original table.

  • Clustered Index is faster for retrieval of data, while Non-Clustered Index is faster for retrieval of specific rows.

  • Example: Primary key in a table is usually implemented as a Clustered Index, while secondary...read more

Add your answer
right arrow

Q81. In Search, in an almost sorted array problem, we have to find the index of an element in the array, The problem can be solved by using the binary search technique,

Ans.

Binary search technique can be used to find the index of an element in an almost sorted array.

  • Binary search is efficient for large arrays.

  • The array must be sorted in ascending or descending order.

  • If the element is not found, return -1.

  • Example: [1, 3, 5, 7, 9], target = 5, output = 2

View 1 answer
right arrow

Q82. What is workflow,trigger, different types of reports, roles, profiles, permission set, sharing rules etc?

Ans.

Workflow, trigger, reports, roles, profiles, permission set, and sharing rules are all important features in Salesforce.

  • Workflow is a series of automated steps that can be used to streamline business processes.

  • Triggers are used to execute code before or after a record is inserted, updated, or deleted.

  • Reports are used to display data in a visual format, such as a table or chart.

  • Roles are used to define the hierarchy of users in an organization.

  • Profiles are used to define the p...read more

Add your answer
right arrow

Q83. how do you achieve synchronization? what are the differences between the synchronization ways?

Ans.

Synchronization is the process of coordinating the execution of multiple threads to ensure proper order of execution.

  • Synchronization can be achieved using techniques like locks, semaphores, and monitors.

  • Locks are used to ensure that only one thread can access a shared resource at a time.

  • Semaphores are used to control access to a shared resource by limiting the number of threads that can access it at once.

  • Monitors are used to ensure that only one thread can execute a critical ...read more

Add your answer
right arrow

Q84. How do you plan the capacity for a particular sprint?

Ans.

To plan the capacity for a sprint, consider team velocity, individual availability, and any external factors.

  • Calculate the team's velocity by reviewing past sprints and measuring the average number of story points completed.

  • Consider individual team member availability, taking into account vacations, holidays, and other commitments.

  • Factor in any external dependencies or constraints that may impact the team's capacity, such as shared resources or dependencies on other teams.

  • Adj...read more

View 1 answer
right arrow

Q85. Yogesh And Primes Problem Statement

Yogesh, a bright student interested in Machine Learning research, must pass a test set by Professor Peter. To do so, Yogesh must correctly answer Q questions where each quest...read more

Ans.

Yogesh needs to find the minimum possible integer P such that there are at least K prime numbers in the range [A, P].

  • Iterate from A to B and check if each number is prime

  • Keep track of the count of prime numbers found in the range [A, P]

  • Return the minimum P that satisfies the condition or -1 if no such integer exists

Add your answer
right arrow

Q86. Circular Move Problem Statement

You have a robot currently positioned at the origin (0, 0) on a two-dimensional grid, facing the north direction. You are given a sequence of moves in the form of a string of len...read more

Ans.

Determine if a robot's movement path is circular on a 2D grid given a sequence of moves.

  • Create a set of directions to keep track of the robot's current direction (north, east, south, west).

  • Simulate the robot's movement based on the given sequence of moves (L - turn left, R - turn right, G - move forward).

  • Check if the robot returns to the starting position after completing the sequence of moves.

  • Example: For 'GLGLGLG', the robot moves in a circular path and returns to the start...read more

Add your answer
right arrow

Q87. Q1. You don't have experience on kubernetes. Tell me 2 reason that would convince me to select on the basis of your knowledge. Q2. Steps to deploy kubernetes. Q3. Suddenly master node fails, what will be your a...

read more
Ans.

Answering questions related to Technical Lead interview

  • I have experience in containerization and orchestration tools like Docker and Swarm, which will help me quickly learn and adapt to Kubernetes

  • I have a strong understanding of distributed systems and cloud infrastructure, which are key components of Kubernetes architecture

  • Steps to deploy Kubernetes involve setting up a cluster, configuring nodes, installing Kubernetes components, and deploying applications using YAML files

  • I...read more

Add your answer
right arrow

Q88. What are different type of Android device enrollment methods 1. What is your day to day activity? 2. Have you worked on change requests?

Ans.

Different types of Android device enrollment methods

  • QR code enrollment

  • NFC enrollment

  • Zero-touch enrollment

  • Samsung Knox Mobile Enrollment

  • Manual enrollment

Add your answer
right arrow

Q89. What's the difference between final and finally keywords in java?

Ans.

final keyword is used to declare a constant value while finally is used to define a block of code that will be executed after a try-catch block.

  • final keyword is used to declare a variable whose value cannot be changed

  • finally keyword is used to define a block of code that will be executed after a try-catch block

  • final can be used with classes, methods, and variables

  • finally is always used with try-catch block

  • Example: final int x = 10; try { //some code } catch(Exception e) { //s...read more

View 2 more answers
right arrow

Q90. What is tha difference between object and object reference and object reference variable

Ans.

Object is an instance of a class while object reference is a variable that holds the memory address of the object.

  • Object is a real-world entity while object reference is a pointer to the memory location of the object.

  • Object reference variable is a variable that holds the reference of an object.

  • Object reference can be null while object cannot be null.

  • Multiple object references can refer to the same object.

  • Object reference can be reassigned to another object while object cannot...read more

Add your answer
right arrow

Q91. How much you give the star out of 5?

Ans.

I cannot give a star rating without knowing the specific context or criteria being evaluated.

  • I would need more information about what is being rated to give an accurate star rating.

  • It would be helpful to know the specific criteria or standards being used to evaluate the subject.

  • Without context, a star rating would be arbitrary and meaningless.

  • For example, if we are discussing a restaurant, I would need to know about the quality of the food, service, atmosphere, etc. before gi...read more

View 1 answer
right arrow

Q92. What is object-oriented language and give real-time examples?

Ans.

Object-oriented language is a programming paradigm that uses objects to represent data and methods.

  • Objects contain data and methods that operate on that data.

  • Encapsulation, inheritance, and polymorphism are key concepts in object-oriented programming.

  • Examples of object-oriented languages include Java, C++, and Python.

Add your answer
right arrow

Q93. You are alone in a room. You are given multiple number of candles. You have no measuring aids with you. You have a match box with you. You have to accurately measure 45 minutes. The total time a candle takes to...

read more
Ans.

Use two candles, light one at both ends and the other at one end. When the first candle burns out, 30 minutes have passed. Then light the other end of the second candle to measure 15 more minutes.

  • Light one candle at both ends and the other at one end

  • When the first candle burns out, 30 minutes have passed

  • Light the other end of the second candle to measure 15 more minutes

Add your answer
right arrow

Q94. //design patterns //markers interface // example of functional interface . can you override Default method. Can you directly or do you need object. give some examples of functional interface //one try catch fin...

read more
Ans.

The interview questions cover a wide range of topics including design patterns, exception handling, Hibernate, MongoDB, Java collections, Spring framework, and microservices.

  • Design patterns like markers interface, functional interface, and Singleton pattern are important in Java development.

  • Understanding exception handling with try-catch-finally blocks is crucial for handling errors in Java applications.

  • Knowing the differences between load and get in Hibernate, as well as the...read more

Add your answer
right arrow

Q95. How to handle addition of new module to service program ?

Ans.

Adding a new module to a service program requires careful planning and testing.

  • Identify the purpose and requirements of the new module

  • Determine the impact on existing modules and services

  • Create a detailed plan for implementation and testing

  • Perform thorough testing to ensure compatibility and functionality

  • Document the changes and update relevant documentation

  • Communicate the changes to stakeholders and users

Add your answer
right arrow
Q96. What is the difference between the DELETE and TRUNCATE commands in a DBMS?
Ans.

DELETE removes specific rows from a table, while TRUNCATE removes all rows and resets auto-increment values.

  • DELETE is a DML command, while TRUNCATE is a DDL command.

  • DELETE can be rolled back, while TRUNCATE cannot be rolled back.

  • DELETE triggers ON DELETE triggers, while TRUNCATE does not trigger any triggers.

  • DELETE is slower as it logs individual row deletions, while TRUNCATE is faster as it logs the deallocation of data pages.

  • Example: DELETE FROM table_name WHERE condition; ...read more

Add your answer
right arrow

Q97. What is assertion? What is soft assertion? What is hard assertion?

Ans.

Assertion is a validation point to check if the expected result matches the actual result. Soft assertion doesn't stop the test execution on failure, while hard assertion does.

  • Assertion is a way to validate if the expected result matches the actual result

  • Soft assertion doesn't stop the test execution on failure, but logs the failure and continues with the test

  • Hard assertion stops the test execution on failure and marks the test as failed

  • Example of soft assertion: verifying mu...read more

Add your answer
right arrow

Q98. how do you open a file and read repeating words from a file ?

Ans.

To open a file and read repeating words, use file handling and string manipulation techniques.

  • Open the file using file handling techniques in the programming language of your choice.

  • Read the contents of the file and store it in a string variable.

  • Split the string into an array of words using a delimiter such as space or comma.

  • Loop through the array and use a dictionary or hash table to count the frequency of each word.

  • Print out the repeating words along with their frequency.

  • Cl...read more

Add your answer
right arrow

Q99. How create a user in single line commands

Ans.

A user can be created in a single line command using the 'useradd' command in Linux.

  • Use the 'useradd' command followed by the username to create a user.

  • Specify additional options like home directory, shell, etc. if required.

  • Example: useradd john -m -s /bin/bash

View 8 more answers
right arrow

Q100. How do you calculate the capacity and velocity of a team ?

Ans.

Capacity is the amount of work a team can handle in a sprint. Velocity is the amount of work a team can complete in a sprint.

  • Capacity is calculated by estimating the number of hours each team member can work in a sprint and multiplying it by the number of team members.

  • Velocity is calculated by adding up the number of story points completed in a sprint.

  • Capacity and velocity can be adjusted based on factors such as team member availability, skill level, and external dependencie...read more

View 1 answer
right arrow
1
2
3
4
5
6
7
Next
Contribute & help others!
Write a review
Write a review
Share interview
Share interview
Contribute salary
Contribute salary
Add office photos
Add office photos
Recently Viewed
INTERVIEWS
HDFC Bank
700 top interview questions
INTERVIEWS
HDFC Bank
No Interviews
REVIEWS
Cognizant
No Reviews
LIST OF COMPANIES
HDFC Bank
Locations
REVIEWS
Infosys
No Reviews
REVIEWS
Cognizant
No Reviews
INTERVIEWS
Capgemini
No Interviews
LIST OF COMPANIES
Infosys
Locations
INTERVIEWS
EdgeVerve Systems
No Interviews
INTERVIEWS
Infosys Consulting
No Interviews
Top Capgemini Interview Questions And Answers
Share an Interview
Stay ahead in your career. Get AmbitionBox app
play-icon
play-icon
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
70 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter