Capgemini
2500+ Dutest Industries Interview Questions and Answers
Q1. In a dark room,there is a box of 18 white and 5 black gloves. You are allowed to pick one and then you are allowed to keep it and check it outside. How many turns do you need to take in order for you to find a ...
read moreYou need to take 36 turns to find a perfect pair.
You need to pick 19 gloves to ensure a perfect pair.
The worst case scenario is picking 18 white gloves and then the 19th glove is black.
In that case, you need to pick 17 more gloves to find a black one and complete the pair.
You are given an integer ‘N’, your task is to find and return the N’th Fibonacci number using matrix exponentiation.
Since the answer can be very large, return the answer modulo 10^9 +7.
Fi...read more
Find N-th Fibonacci number using matrix exponentiation and return modulo 10^9+7.
Implement a function to find N-th Fibonacci number using matrix exponentiation.
Return the answer modulo 10^9+7.
Use the formula F(n) = F(n-1) + F(n-2) with F(1) = F(2) = 1.
The time complexity should be better than O(N).
The constraints are 1 <= T <= 10 and 1 <= N <= 10^5.
Q3. How can you cut a rectangular cake in 8 symmetric pieces in three cuts?
Cut the cake in half horizontally, then vertically, and finally cut each half diagonally.
Cut the cake horizontally through the middle.
Cut the cake vertically through the middle.
Cut each half diagonally from corner to corner.
Ensure each cut is made symmetrically to get 8 equal pieces.
Example: https://www.youtube.com/watch?v=ZdGmuCJzQFo
Q4. 1. What's the use of update sets and how do you move update set from one instance to another? Once you imported the update set, what will you do? To check the customisations, You need to do open the update set ...
read moreInterview questions for Senior Consultant role
Update sets are used to move customizations from one instance to another
To move multiple update sets at once, use the Update Set Migration plugin
Custom applications can be developed using ServiceNow's App Creator
Turnstile activity in workflow is used to loop back to a previous activity
Activities in workflows include approvals, notifications, and subflows
To copy fields from incident table to task record, use a UI action with script...read more
You are given an integer N. Your task is to return a 2-D ArrayList containing the pascal’s triangle till the row N.
A Pascal's triangle is a triangular array constructed by summing adjacent ele...read more
Q6. One question of sorting for a list of people belonging to different cities and states.
Sort a list of people by their cities and states.
Use a sorting algorithm like quicksort or mergesort.
Create a custom comparator function that compares the city and state of each person.
If two people belong to the same city and state, sort them by their names.
Example: [{name: 'John', city: 'New York', state: 'NY'}, {name: 'Jane', city: 'Boston', state: 'MA'}]
Example output: [{name: 'Jane', city: 'Boston', state: 'MA'}, {name: 'John', city: 'New York', state: 'NY'}]
Q7. Could you tell me, which tools do you have used in test management and defect tracking?
I have experience using JIRA and HP ALM for test management and defect tracking.
I have used JIRA extensively for managing test cases, test plans, and tracking defects.
I have also worked with HP ALM for test management and defect tracking.
Both tools have robust reporting capabilities that allow for easy tracking of project progress and defect resolution.
In addition, I have experience integrating these tools with other software development tools such as Jenkins and Git for cont...read more
Q8. What are seven layers of networking?
The seven layers of networking refer to the OSI model which defines how data is transmitted over a network.
The seven layers are: Physical, Data Link, Network, Transport, Session, Presentation, and Application.
Each layer has a specific function and communicates with the layers above and below it.
For example, the Physical layer deals with the physical transmission of data, while the Application layer deals with user interfaces and applications.
Understanding the OSI model is imp...read more
You are given an array/list ‘BINARYNUMS’ that consists of ‘N’ distinct strings which represent all integers from 0 to N in binary representation except one integer. This integer between 0 to ‘N’ w...read more
You are given an array/list 'ARR' of size 'N'. You task is to find if there exists a triplet (i, j, k) such that 0 < i , i + 1 < j , j + 1 < k and k < 'N' - 1 and the sum of the subar...read more
You are given an array 'ARR' of the 'N' element. Your task is to find the maximum difference between any of the two elements from 'ARR'.
If the maximum difference is even print “EVEN” without...read more
Q12. 1) What are the types of master data in SAP MM? 2) What is T-code for creation of material master? 3) What are the types of document in SAP MM? 4) What is T- code for creation of vendor master? 5) What is STO? ...
read more1) Material, Vendor, Customer, and Service master data are types of master data in SAP MM.
Material master data contains information about materials used in production or procurement.
Vendor master data contains information about the vendors or suppliers.
Customer master data contains information about the customers.
Service master data contains information about the services provided.
Q13. If a developer who was working on a critical user story suddenly goes on emergency medical leave. how will you deal with the situation?
As a Scrum Master, I would handle the situation by following these steps:
Assess the impact of the developer's absence on the critical user story
Communicate with the team and stakeholders about the situation
Identify if there are any other team members who can take over the work
If no immediate replacement is available, prioritize the critical user story and adjust the sprint plan accordingly
Work with the Product Owner to manage expectations and potentially reprioritize other us...read more
Ninja has recently joined the FBI. Ninja got some secret information ‘SECRET_INFORMATION’ which he wants to share with his team. But he can not send this information directly bec...read more
You have given a Singly Linked List of integers, determine if it forms a cycle or not.
A cycle occurs when a node's next points back to a previous node in the list. The li...read more
Q16. 1. If MAM is there then why do we need MDM? 2. What are the different type of Android device enrollment methods? 3. What do you know about Apple Push Notification Services? 4. What will happen if APNS is not re...
read moreInterview questions for Senior Consultant role related to MAM, MDM, Android and Windows device enrollment, APNS, and Intune app deployment.
MDM is needed for complete device management and control, while MAM is focused on securing and managing specific applications and data.
Different Android device enrollment methods include QR code, Near Field Communication (NFC), and Zero-touch enrollment.
Apple Push Notification Services (APNS) is a service used to send push notifications to...read more
Given a singly linked list of integers. Your task is to return the head of the reversed linked list.
For example:
The given linked list is 1 -> 2 -> 3 -> 4-> NULL. Then the reverse linked lis...read more
Write a program to find the factorial of a number.
Factorial of n is:
n! = n * (n-1) * (n-2) * (n-3)....* 1
Output the factorial of 'n'. If it does not exist, output 'Error'.
Input format :...read more
Given an integer N, print all the prime numbers that lie in the range 2 to N (both inclusive).
Print the prime numbers in different lines.
Input Format :
Integer N
Output Format :
Prime number...read more
You have been given an integer array/list(ARR) of size N which contains numbers from 0 to (N - 2). Each number is present at least once. That is, if N = 5, the array/list constitutes values rangin...read more
Q21. JCL 1. Ways in which the you can paas on data from.jcl to cobol.: Dsn file, sysin, parm 2.How do u accept the data which is paased from Parm parameter.: Using linkage section. 3. How will u make any step run in...
read moreInterview questions for Senior Consultant position on JCL and DB2
JCL: passing data using DSN file, SYSIN, and PARM parameters
JCL: accepting data passed from PARM parameter using linkage section
JCL: making a step run in case of job failure using COND=ONLY
JCL: explaining DISP position
JCL: writing logic to copy matching data from two input files based on a common key
DB2: explaining cursor not defined for selecting more than one row from table
DB2: life cycle of cursor - declare, ...read more
Q22. How to achieve to different pricing procedure for sales order and billing document , which controls will enable thia
To achieve different pricing procedures for sales order and billing document in SAP SD, you can use condition technique and pricing procedure determination.
Create separate pricing procedures for sales order and billing document
Assign the pricing procedures to respective document types
Configure condition technique to determine the pricing procedure based on document type
Use condition records and access sequences to define pricing conditions
Maintain condition records for each p...read more
You are given an integer N, you need to find the number of trailing zeroes in N! (N factorial).
Note:
1. Trailing zeros in a number can be defined as the number of continuous suffix z...read more
You have been given an integer array/list 'ARR' of size 'N'. Write a solution to check if it could become non-decreasing by modifying at most 1 element.
We define an array as non-decreasing,...read more
You are given an array ‘ARR’ and another integer number ‘K’. Your task is to find the all elements of ‘ARR’ which occur more than or equals to ‘N/K’ times in ‘ARR’ and ‘N’ is the length of a...read more
You are given an array Arr consisting of N integers. You need to find the equilibrium index of the array.
An index is considered as an equilibrium index if the sum of elements of the array to t...read more
You will be given a stream of numbers, and you need to find the kth largest number in the stream at any given time.
As the stream of numbers can not be given during compile time, so you need t...read more
Q28. What are the causes of user not able to login application
Possible causes of user not able to login to an application
Incorrect username or password
Account locked or disabled
Expired password
Network connectivity issues
Application server down
Incorrect permissions or access rights
Firewall blocking access
Authentication server issues
Application configuration errors
Q29. 3. Do you know about OOP concepts? Explain.
Yes
OOP stands for Object-Oriented Programming
It is a programming paradigm that organizes code into objects
OOP concepts include encapsulation, inheritance, and polymorphism
Encapsulation allows bundling of data and methods into a single unit
Inheritance enables the creation of new classes based on existing ones
Polymorphism allows objects of different classes to be treated as the same type
Example: A car class can have properties like color and speed, and methods like start and st...read more
You are given an infinite supply of coins of each of denominations D = {D0, D1, D2, D3, ...... Dn-1}. You need to figure out the total number of ways W, in which you can make a change fo...read more
Q31. 1). How pricing procedure is determine in SAP SD. 2). ASAP Methodology steps and your role as a SD Consultant. 3). GAPS during Implementation Project. 4). Condition technique for determining pricing procedure. ...
read moreQuestions related to SAP SD implementation and processes.
Pricing procedure is determined based on condition technique and can be customized as per business requirements.
ASAP methodology involves various phases like project preparation, business blueprint, realization, final preparation, and go-live and support.
GAPS during implementation project can arise due to differences between business requirements and system capabilities.
Condition technique involves defining access seque...read more
Q32. What type of testing you have done in your career and how many test cases written of the day?
I have experience in functional, regression, integration, and acceptance testing. On average, I write 20-30 test cases per day.
Functional testing to ensure the software meets the requirements
Regression testing to ensure new changes do not break existing functionality
Integration testing to ensure different components work together
Acceptance testing to ensure the software meets the user's needs
On average, I write 20-30 test cases per day
Examples include testing a new feature on...read more
Q33. What is agile fundamentals and theirs importance and waterfall model?
Agile fundamentals are a set of principles and values that prioritize flexibility, collaboration, and continuous improvement in software development. Waterfall model is a traditional linear approach to software development.
Agile emphasizes iterative development and customer collaboration
Agile values individuals and interactions over processes and tools
Agile promotes responding to change over following a plan
Waterfall model follows a sequential approach to software development...read more
Given a text and a wildcard pattern of size N and M respectively, implement a wildcard pattern matching algorithm that finds if the wildcard pattern is matched with the text. The matchi...read more
For a given integer array/list 'ARR' of size 'N', find the total number of 'Inversions' that may exist.
An inversion is defined for a pair of integers in the array/list when the following two co...read more
Find the box which contains Box of 11 gm Cigarettes:
Suppose you have 10 boxes and each box contains 10 Cigarettes.
9 out of 10 boxes have each Cigarette of 10 gm.
Remaining 1 box has each Cigarette...read more
Q37. what are the different types of datatypes in python?
Python has several built-in datatypes including numeric, sequence, and mapping types.
Numeric types include integers, floating-point numbers, and complex numbers.
Sequence types include lists, tuples, and range objects.
Mapping types include dictionaries.
Other datatypes include boolean, bytes, and sets.
Given an array ARR of N integers and an integer S. The task is to find whether there exists a subarray(positive length) of the given array such that the sum of elements of the subarray eq...read more
Q39. Why are these three called as pillars of scrum ? How are they related to each other
The three pillars of Scrum are transparency, inspection, and adaptation. They are interrelated and support the Scrum framework.
Transparency ensures that all information is visible and accessible to the team, stakeholders, and customers.
Inspection involves regularly reviewing the progress, artifacts, and processes to identify any deviations or issues.
Adaptation refers to making necessary changes based on the inspection results to improve the product and the process.
These pilla...read more
What are the different types of languages that are available in the DBMS?
Explain the concepts of a Primary key and Foreign Key.
What is the concept of sub-query in terms of SQL?
What is a checkpoint...read more
You are given an array ‘ARR’ of size ‘N’ consisting of distinct elements. Your task is to find the total number of good subsets. A subset is called a good subset when you can rearrange the ele...read more
You are given 'N' rectangular buildings in a 2-dimensional city. Your task is to compute the skyline of these buildings, eliminating hidden lines return the skyline formed by these buildings ...read more
You have been given a binary tree of 'N' unique nodes and a Start node from where the tree will start to burn. Given that the Start node will always exist in the tree, your task is to print the...read more
You are given a string 'STR'. The string contains [a-z] [A-Z] [0-9] [special characters]. You have to find the reverse of the string.
For example:
If the given string is: STR = "abcde". You h...read more
You have been given two strings A and B consisting of lower case English letters. The task is to count the minimum number of pre-processing moves on the string A required...read more
You have a robot currently standing at the origin (0, 0) of a two-dimensional grid and facing north direction. You are given a sequence of moves for the robot in the form of a string of size 'N'. Y...read more
Q47. Explain the Microservices architecture of your project? How services internally communicates? How to manage transactions and failure scenario in distributed Microservices system? List some spring boot Microserv...
read moreExplaining Microservices architecture, communication, transactions, annotations, authentication, and API validation.
Our project follows a Microservices architecture where each service is independently deployable and scalable.
Services communicate with each other using RESTful APIs and message brokers like Kafka.
We use distributed transactions and compensating transactions to manage transactions and handle failure scenarios.
Some of the Spring Boot Microservices annotations we u...read more
You will be given a stream of numbers, and you need to find the kth largest number in the stream at any given time.
As the stream of numbers can not be given during compile time, so you need to...read more
Pre-requisites: Anagrams are defined as words or names that can be formed by rearranging letters of another word. Such as "spar" can be formed by rearranging letters of "rasp". Hence, "spar" and "r...read more
For a given array/list of integers of size N, print the Next Greater Element(NGE) for every element. The Next Greater Element for an element X is the first element on the right side of X in ...read more
Ninja loves playing with numbers. One day Alice gives him some numbers and asks him to find the Kth largest value among them.
Input Format:
The first line of input contains an integer ‘T,’ de...read more
You are given an array/list 'ARR' consisting of N integers, which contains elements only in the range 0 to N - 1. Some of the elements may be repeated in 'ARR'. Your task is to find ...read more
Q53. Where do you transfer the profit you get in P&L a/c?
The profit in the P&L a/c is transferred to the retained earnings account.
Profit is transferred to the retained earnings account to reflect the accumulated profits of the company.
Retained earnings account is a part of the equity section on the balance sheet.
The transfer is done at the end of the accounting period.
Retained earnings can be used for reinvestment, dividends, or other purposes.
Example: If a company has a profit of $100,000 in the P&L a/c, it will be transferred to...read more
Ayush is given a number ‘X’. He has been told that he has to find the first ‘X’ terms of the series 3 * ‘N’ + 2, which are not multiples of 4. Help Ayush to find it as he has not been able to answer....read more
Q55. how do you concatenate a string and integer? is it possible ?
Yes, it is possible to concatenate a string and integer using type conversion.
Convert the integer to a string using str() function and then concatenate with the string.
Use format() method to insert the integer value into the string.
Use f-strings to directly insert the integer value into the string.
Q56. what is xpath ? How do you find an element ? what is the difference between absolute xpath and relative xpath?
XPath is a language used to locate elements in an XML or HTML document. Absolute and relative XPaths differ in their starting point.
XPath is used to navigate through elements and attributes in an XML or HTML document
Elements can be located using absolute or relative XPaths
Absolute XPaths start from the root node and are more specific but less flexible
Relative XPaths start from the current node and are more flexible but less specific
Q57. Is Java platform-independent, if yes why?
Yes, Java is platform-independent because of its 'write once, run anywhere' principle.
Java programs are compiled into bytecode, which can be executed on any platform with a Java Virtual Machine (JVM).
The JVM acts as an interpreter, translating the bytecode into machine code specific to the underlying platform.
This allows Java programs to run on different operating systems and hardware architectures without modification.
For example, a Java program developed on a Windows machin...read more
You are given a string S which represents a number. You have to find the smallest number strictly greater than the given number which contains the same set of digits as of the original number...read more
Q59. if some data is not found on the page, do page refresh and how do you validate a data after page refresh in selenium?
To validate data after page refresh in Selenium, we can refresh the page and then use explicit wait to validate the data.
Refresh the page using driver.navigate().refresh() method
Use explicit wait to wait for the element to be visible on the page
Validate the data using getText() or getAttribute() method
Example: driver.navigate().refresh(); WebDriverWait wait = new WebDriverWait(driver, 10); wait.until(ExpectedConditions.visibilityOfElementLocated(By.xpath("xpath_of_element")))...read more
Q60. What are the fields in EXTC that are related to IT ?
Fields in EXTC related to IT
Digital Signal Processing
Microprocessors and Microcontrollers
Computer Networks
Data Communication
Wireless Communication
Mobile Communication
Internet of Things
Cloud Computing
Artificial Intelligence
Machine Learning
. What will be the output of the following pseudocode?
Integer i
Set i = 3
do
print i + 3
i = i - 1
while(i not equals 0)
end while
You are given an array of integers 'ARR' of length 'N' and an integer Target. Your task is to return all pairs of elements such that they add up to Target.
Note:
We cannot use the element at a given inde...read more
Q63. What are the different file replication strategies in Azure blob storage ?
Azure blob storage supports three file replication strategies: LRS, ZRS, and GRS.
LRS (Locally Redundant Storage) replicates data within a single data center.
ZRS (Zone Redundant Storage) replicates data across multiple data centers within a single region.
GRS (Geo-Redundant Storage) replicates data across multiple data centers in two separate regions for added redundancy.
Read-access geo-redundant storage (RA-GRS) provides read access to the data in the secondary region in case ...read more
Q64. Output of the following code: integer a, b, c; set a = 11, b = 12, c = 10; if (b > 0) b++ else a++ end if for (each b from 0 to 5) a = a + 1 end for print (a + c)
The code sets values for three integers and performs conditional and loop operations to print the sum of two integers.
The value of 'a' is set to 11, 'b' to 12, and 'c' to 10.
The 'if' condition checks if 'b' is greater than 0 and increments 'b' if true, else increments 'a'.
The 'for' loop runs for each value of 'b' from 0 to 5 and increments 'a' by 1.
The final output is the sum of 'a' and 'c', which is 18.
Yogesh is a very intelligent student and is interested in research in Machine Learning domain. His college has only one professor, Mr. Peter working in that field. He approaches the professor f...read more
Q66. If a computer speed is slow, how will you increase its speed?
To increase computer speed, optimize startup programs, remove malware, upgrade hardware, and clear disk space.
Optimize startup programs to reduce the number of programs running at startup
Remove malware using antivirus software
Upgrade hardware such as RAM or SSD
Clear disk space by deleting unnecessary files and programs
Disable visual effects to improve performance
You are given a starting position for a rat which is stuck in a maze at an initial point (0, 0) (the maze can be thought of as a 2-dimensional plane). The maze would be given in the form of a squar...read more
Q68. What is the difference between velocity and capacity?
Velocity is the amount of work completed in a sprint, while capacity is the amount of work a team can handle in a sprint.
Velocity is a measure of the team's productivity in completing user stories or tasks in a sprint.
Capacity is the amount of work a team can handle in a sprint, taking into account factors such as team size, availability, and skill level.
Velocity is calculated by dividing the total number of story points completed in a sprint by the length of the sprint in da...read more
Q69. Kernel files are existing in which location & what are they
Kernel files are located in /usr/sap/
Kernel files are the core components of the SAP system
They are responsible for managing system resources and executing processes
Kernel files are platform-specific and are stored in the /usr/sap/
/SYS/exe/ / directory Examples of kernel files include disp+work, icman, and msg_server
Q70. What do you know about APNS? What will happen if APNS is not renewed on time?
APNS is Apple Push Notification Service used to send push notifications to iOS devices.
APNS is used by iOS apps to send push notifications to users.
If APNS is not renewed on time, push notifications will not be delivered to users.
This can result in a poor user experience and loss of engagement.
Renewing APNS requires a valid Apple Developer account and proper configuration of the app's push notification settings.
Q71. 1] Introduction 2] Sanity Vs Smoke testing 3] Waits in selenium and code for it 4] Scenario based questions 5] types of frameworks 6] how to read data from excel 7] Coding questions based on- handling dropdown ...
read moreInterview questions for Automation Test Engineer
Sanity testing is a subset of regression testing while smoke testing is a subset of acceptance testing
Waits in Selenium are used to synchronize the test execution with the application's response
Types of frameworks include data-driven, keyword-driven, and hybrid frameworks
Reading data from Excel can be done using Apache POI library
Handling dropdown in Selenium can be done using Select class
Database automation can be done using JD...read more
Q72. what is poker ? and why do you use fibonacci series to give story points ?
Poker is an estimation technique used in Agile project management. Fibonacci series is used for story points to reflect uncertainty.
Poker is a collaborative estimation technique where team members assign story points to user stories.
It helps in determining the effort required to complete a user story.
Fibonacci series (0, 1, 2, 3, 5, 8, 13, etc.) is used to reflect the uncertainty and complexity of the work.
Larger numbers in the Fibonacci series indicate higher uncertainty and...read more
What is meant by Interface?
Q74. What is parameterized mapping ? How did you implement ?
Parameterized mapping is a feature in SAP PI that allows dynamic mapping based on input parameters.
Parameterized mapping enables the mapping of different source and target structures based on input parameters
It allows for flexible and reusable mappings by using parameters to determine the mapping logic
Parameters can be defined and passed at runtime to dynamically determine the mapping behavior
Implementation involves defining parameters in the mapping program and using them in...read more
Q75. What are the pillars of Scrum ?
The pillars of Scrum are transparency, inspection, and adaptation.
Transparency: All information about the project must be visible and understandable to everyone involved.
Inspection: Regularly inspect the progress and the product to identify any deviations or issues.
Adaptation: Based on the inspection, make necessary changes and adjustments to improve the product and the process.
Q76. What do you know about group tags and windows autopilot?
Group tags and Windows Autopilot are tools used for managing and deploying devices in an organization.
Group tags are used to organize devices into logical groups for easier management.
Windows Autopilot is a cloud-based tool for deploying and configuring Windows devices.
Autopilot uses group tags to assign devices to specific profiles and configurations.
This allows for faster and more efficient deployment of devices in an organization.
For example, a company could use group tags...read more
Q77. How do we deploy an application using Microsoft Intune?
Deploying an application using Microsoft Intune
Create an app in Intune
Upload the app package
Assign the app to a group of users or devices
Configure deployment settings
Monitor deployment status
Q78. 1. As per your experience you look more into Operations so would that be fine if we have you as our Front line of support?
Yes, my experience in operations will help me provide effective front line support.
My experience in operations has given me a strong understanding of how different processes work and how to troubleshoot issues.
This knowledge will be useful in providing front line support as I can quickly identify the root cause of problems and provide effective solutions.
I am also skilled in communication and can effectively convey technical information to non-technical stakeholders.
For examp...read more
Q79. What is multithreading? ( I used it in my project )
Multithreading is the ability of a CPU to execute multiple threads concurrently, improving performance and responsiveness.
Multithreading allows for parallel execution of tasks, utilizing multiple CPU cores.
It enables concurrent processing, where multiple threads can execute simultaneously.
Thread synchronization mechanisms like locks and semaphores are used to prevent data inconsistencies.
Multithreading can be used to improve user interface responsiveness and handle background...read more
Q80. What firewalls are you worked on? What are UTM firewalls? What is stateless and stateful inspection?
Firewalls are network security devices that monitor and control incoming and outgoing network traffic. UTM firewalls provide additional security features such as antivirus, intrusion prevention, and content filtering. Stateless inspection examines each packet individually, while stateful inspection tracks the state of connections between packets.
Firewalls monitor and control network traffic
UTM firewalls provide additional security features
Stateless inspection examines each pa...read more
1) Explain indexing in a database.
2) Explain the difference between primary and secondary index.
3) Difference between static and dynamic MLI.
4) Advantages of B tree index vs B+ tree inde...read more
Q82. Why is it suggested to utilise a database management system (DBMS)? List some of its primary advantages to explain.
A DBMS is suggested for efficient data management. It offers advantages like data security, scalability, and data integrity.
DBMS ensures data security by providing access control and authentication mechanisms.
It allows for efficient data retrieval and manipulation through indexing and query optimization.
DBMS offers scalability by allowing for easy addition of new data and users.
It ensures data integrity by enforcing constraints and providing backup and recovery mechanisms.
Exa...read more
Q83. how do you generate random emails in python? gmail.com is constant
Generating random emails in Python with constant domain
Use the random module to generate random strings for the username part of the email
Combine the random username with the constant domain name
Ensure the generated email is unique if required
Q84. What ia the difference between plant and plant out side the countey
Plant outside the country refers to a plant location that is situated outside the country where the company is headquartered.
Plant refers to a physical location where materials are produced or stored.
Plant outside the country is a plant location situated outside the country where the company is headquartered.
Plant outside the country may have different legal requirements and regulations compared to the plants within the country.
Plant outside the country may have different cur...read more
Q85. How to manipulate traffic in OSPF? How to link indirectly connected areas to backbone area? What are OSPF LSAs?
OSPF traffic manipulation and linking indirectly connected areas to backbone area using LSAs.
OSPF traffic can be manipulated using various methods such as adjusting the cost metric or using route redistribution.
To link indirectly connected areas to the backbone area, a virtual link can be created through a transit area.
OSPF LSAs (Link State Advertisements) are packets that contain information about the network topology and are used by OSPF routers to build a complete map of t...read more
What is the starter dependency of the Spring boot module?
Q87. What is workflow,trigger, different types of reports, roles, profiles, permission set, sharing rules etc?
Workflow, trigger, reports, roles, profiles, permission set, and sharing rules are all important features in Salesforce.
Workflow is a series of automated steps that can be used to streamline business processes.
Triggers are used to execute code before or after a record is inserted, updated, or deleted.
Reports are used to display data in a visual format, such as a table or chart.
Roles are used to define the hierarchy of users in an organization.
Profiles are used to define the p...read more
Q88. In Search, in an almost sorted array problem, we have to find the index of an element in the array, The problem can be solved by using the binary search technique,
Binary search technique can be used to find the index of an element in an almost sorted array.
Binary search is efficient for large arrays.
The array must be sorted in ascending or descending order.
If the element is not found, return -1.
Example: [1, 3, 5, 7, 9], target = 5, output = 2
Q89. how do you achieve synchronization? what are the differences between the synchronization ways?
Synchronization is the process of coordinating the execution of multiple threads to ensure proper order of execution.
Synchronization can be achieved using techniques like locks, semaphores, and monitors.
Locks are used to ensure that only one thread can access a shared resource at a time.
Semaphores are used to control access to a shared resource by limiting the number of threads that can access it at once.
Monitors are used to ensure that only one thread can execute a critical ...read more
Q90. How do you plan the capacity for a particular sprint?
To plan the capacity for a sprint, consider team velocity, individual availability, and any external factors.
Calculate the team's velocity by reviewing past sprints and measuring the average number of story points completed.
Consider individual team member availability, taking into account vacations, holidays, and other commitments.
Factor in any external dependencies or constraints that may impact the team's capacity, such as shared resources or dependencies on other teams.
Adj...read more
Q91. Q1. You don't have experience on kubernetes. Tell me 2 reason that would convince me to select on the basis of your knowledge. Q2. Steps to deploy kubernetes. Q3. Suddenly master node fails, what will be your a...
read moreAnswering questions related to Technical Lead interview
I have experience in containerization and orchestration tools like Docker and Swarm, which will help me quickly learn and adapt to Kubernetes
I have a strong understanding of distributed systems and cloud infrastructure, which are key components of Kubernetes architecture
Steps to deploy Kubernetes involve setting up a cluster, configuring nodes, installing Kubernetes components, and deploying applications using YAML files
I...read more
Q92. What are different type of Android device enrollment methods 1. What is your day to day activity? 2. Have you worked on change requests?
Different types of Android device enrollment methods
QR code enrollment
NFC enrollment
Zero-touch enrollment
Samsung Knox Mobile Enrollment
Manual enrollment
Q93. What's the difference between final and finally keywords in java?
final keyword is used to declare a constant value while finally is used to define a block of code that will be executed after a try-catch block.
final keyword is used to declare a variable whose value cannot be changed
finally keyword is used to define a block of code that will be executed after a try-catch block
final can be used with classes, methods, and variables
finally is always used with try-catch block
Example: final int x = 10; try { //some code } catch(Exception e) { //s...read more
Q94. How much you give the star out of 5?
I cannot give a star rating without knowing the specific context or criteria being evaluated.
I would need more information about what is being rated to give an accurate star rating.
It would be helpful to know the specific criteria or standards being used to evaluate the subject.
Without context, a star rating would be arbitrary and meaningless.
For example, if we are discussing a restaurant, I would need to know about the quality of the food, service, atmosphere, etc. before gi...read more
He asked me to explain my project in detail.
What are my three favorite core subjects?
Differentiate the classic waterfall model and iterative model.
What are the types of integrity constants in...read more
When does checkpoint occur in DBMS?
What are the unary operations in Relational Algebra?
What do you understand by Data Model?
Q97. What is object-oriented language and give real-time examples?
Object-oriented language is a programming paradigm that uses objects to represent data and methods.
Objects contain data and methods that operate on that data.
Encapsulation, inheritance, and polymorphism are key concepts in object-oriented programming.
Examples of object-oriented languages include Java, C++, and Python.
Q98. You are alone in a room. You are given multiple number of candles. You have no measuring aids with you. You have a match box with you. You have to accurately measure 45 minutes. The total time a candle takes to...
read moreThere are 4 sections : Pseudo coding, English communication Test , Game-based aptitude, Behavioural Competency.
Number Of MCQs - 60
Q100. How to handle addition of new module to service program ?
Adding a new module to a service program requires careful planning and testing.
Identify the purpose and requirements of the new module
Determine the impact on existing modules and services
Create a detailed plan for implementation and testing
Perform thorough testing to ensure compatibility and functionality
Document the changes and update relevant documentation
Communicate the changes to stakeholders and users
More about working at Capgemini
Top HR Questions asked in Dutest Industries
Interview Process at Dutest Industries
Top Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month