Capgemini
3000+ Minda Stoneridge Instruments Interview Questions and Answers
Q101. what do you know about new technologies? explain OSI model and layers, differences between mp and mc. define terms amplifier, transistor, capacitor, dc and ac (since i am a ECE student) c program for palindrome
The OSI model is a conceptual framework that standardizes the functions of a communication system. MP and MC are different types of memory. Amplifier, transistor, capacitor, DC, and AC are electronic components.
The OSI model consists of seven layers: Physical, Data Link, Network, Transport, Session, Presentation, and Application.
MP stands for Memory Protection and MC stands for Memory Control. MP provides protection against unauthorized access to memory, while MC controls the...read more
Q102. Have you worked on BGP? What are the attributes? How to manipulate traffic using attributes?
BGP is a routing protocol used in large networks. It has attributes that can be manipulated to control traffic flow.
BGP attributes include AS path, next hop, local preference, and MED.
AS path is used to prevent loops and determine the shortest path.
Next hop is used to determine the next router to send traffic to.
Local preference is used to determine the preferred path for outbound traffic.
MED is used to influence the path for inbound traffic.
Traffic can be manipulated by chan...read more
Q103. 4. How can we filter 1 lakh rows in excel with specific filter
To filter 1 lakh rows in Excel with specific filter, use Excel's built-in filtering feature.
Open the Excel file and select the column you want to filter.
Go to the Data tab and click on the Filter button.
A drop-down arrow will appear next to each column header.
Click on the arrow of the column you want to filter and select the specific filter criteria.
Excel will automatically filter the rows based on the selected criteria.
Java is platform independent because it compiles code into bytecode that can run on any system with JVM, which is platform dependent.
Java code is compiled into bytecode, which is platform independent
JVM interprets bytecode and translates it into machine code specific to the underlying platform
JVM acts as a layer of abstraction between Java code and the operating system
Example: A Java program compiled on Windows can run on Linux as long as the JVM is installed
Q105. How long it will take for you to pick up a new programming language or technology?
I am a quick learner and can pick up a new programming language or technology within a few weeks.
I have a strong foundation in programming concepts and principles.
I am familiar with multiple programming languages and can draw parallels to learn new ones.
I am proactive in seeking out resources and practice opportunities.
For example, I recently learned Python in about 3 weeks by taking an online course and practicing on my own.
I am confident in my ability to quickly adapt to ne...read more
Q106. What do you know about assembly language?
Assembly language is a low-level programming language that is specific to a particular computer architecture.
Assembly language is a symbolic representation of machine code instructions.
It is used to write programs that directly control the computer's hardware.
Assembly language is platform-dependent and requires knowledge of the computer's architecture.
It provides direct access to the computer's memory and registers.
Examples of assembly languages include x86, ARM, and MIPS.
Q107. how do you run a test suite using robotframework command line ?
To run a test suite using robotframework command line, use the 'robot' command followed by the path to the test suite file.
Open the command prompt or terminal
Navigate to the directory containing the test suite file
Enter the command 'robot' followed by the name of the test suite file
Add any additional options or arguments as needed
Press enter to execute the command
Example: robot my_test_suite.robot
Example with options: robot --variable ENV:prod --outputdir results my_test_suit...read more
The starter dependency of the Spring Boot module is spring-boot-starter-parent.
The starter dependency of Spring Boot provides a set of default configurations and dependencies to kickstart a Spring Boot project.
It includes commonly used dependencies like spring-boot-starter-web, spring-boot-starter-data-jpa, etc.
The spring-boot-starter-parent also manages the versions of all dependencies to ensure compatibility.
Q109. Selenium 1. Locators 2. How to handle multiple windows 3 . Frame concept 4. Selenium grid Java: 1. Oops concepts 2. Java collection. 3. Difference b/w array arraylist, map hashmap 4 . Program to reverse string
Interview questions on Selenium and Java concepts.
Selenium: 1. Locators - identify web elements using ID, name, class, etc. 2. Handling multiple windows - switchTo() method. 3. Frame concept - switchTo().frame(). 4. Selenium grid - distribute tests across multiple machines.
Java: 1. Oops concepts - inheritance, polymorphism, encapsulation, abstraction. 2. Java collection - List, Set, Map. 3. Difference between array, ArrayList, Map, HashMap. 4. Program to reverse string - use ...read more
Q110. What are the internal partitions of the java virtual machine .
Internal partitions of Java Virtual Machine
Java Virtual Machine has three internal partitions: Heap, Stack, and Method Area
Heap is used for dynamic memory allocation of objects and arrays
Stack is used for storing method frames and local variables
Method Area is used for storing class-level data such as method code and static variables
Q111. what are the different Azure PaaS components i had worked with?
I have worked with various Azure PaaS components including Azure Functions, Azure App Service, Azure Logic Apps, and Azure Event Grid.
Azure Functions - serverless compute service for building event-driven applications
Azure App Service - platform for building and deploying web and mobile apps
Azure Logic Apps - workflow automation service for integrating apps, data, and services
Azure Event Grid - event routing service for subscribing to and processing events
Use a SQL query to count the number of records in a table.
Use the COUNT() function in SQL to count the number of records in a table.
Write a query like 'SELECT COUNT(*) FROM table_name;' to get the count.
Make sure to replace 'table_name' with the actual name of the table.
Q113. Recall any question from the quantitative ability section of the test and explain how did you approach the problem
The question was about finding the average of a set of numbers.
I approached the problem by first summing all the numbers in the set.
Then, I divided the sum by the total number of elements in the set to find the average.
I used a loop to iterate through the set and keep track of the sum and count of elements.
Q114. Output of the pseudocode:- #include void main() { int a = 100; printf("%0 %x", a); }
The pseudocode will result in a compilation error due to incorrect printf format specifier.
The printf function has two format specifiers but only one argument is provided.
The first format specifier '%0' is incorrect and will result in a compilation error.
The correct format specifier for printing an integer in hexadecimal format is '%x'.
Q115. how do you select a value from dropdown in selenium?
To select a value from dropdown in Selenium, use the Select class and its methods.
Locate the dropdown element using any of the locators like ID, name, class name, etc.
Create an object of the Select class and pass the dropdown element as a parameter.
Use the Select class methods like selectByVisibleText(), selectByValue(), or selectByIndex() to select the desired option.
Finally, use the assert statement to verify if the selected option is correct.
Q116. Difference between storage queue, Service bus queue, event hub, IOT hub and event grid, when to use which one explain with scenario?
Storage Queue, Service Bus Queue, Event Hub, IoT Hub, and Event Grid are different messaging services in Azure.
Storage Queue is a simple message queue for reliable messaging between components within an application.
Service Bus Queue is a fully-featured messaging service for decoupling applications and enabling reliable communication.
Event Hub is a big data streaming platform for ingesting and processing large volumes of events in real-time.
IoT Hub is a managed service for bid...read more
Q117. Have you worked upon static routing? How do you increase AD in static routing?
Yes, I have worked on static routing. AD can be increased by changing the administrative distance value.
Static routing is a type of routing where the routes are manually configured by the network administrator.
Administrative distance (AD) is a value assigned to a routing protocol or static route to indicate its trustworthiness.
To increase AD in static routing, we can change the administrative distance value to a higher number.
For example, if the current AD value is 1, we can ...read more
Q118. Can you tell how to trigger Authorizations in any simulator and explain them
Authorizations can be triggered in simulators by following specific steps and commands.
In simulators, authorizations can be triggered by sending specific commands or requests to simulate the authorization process.
These commands typically involve providing necessary credentials, permissions, and access rights to trigger the authorization flow.
For example, in a network simulator, triggering authorizations may involve sending authentication requests with valid credentials to sim...read more
Q119. How can two systems communicate in different vlan over a switch?
Two systems in different VLANs can communicate through a router or layer 3 switch.
A router or layer 3 switch is required to route traffic between VLANs
Each system must have a unique IP address within their respective VLANs
The router or layer 3 switch must have interfaces configured for each VLAN
The router or layer 3 switch must have a routing table that includes both VLANs
Firewall rules may need to be configured to allow traffic between VLANs
Q120. Do you know C language? If yes then write a program to print numbers from 1 to 10 excluding 5
Yes, I know C language. Here's a program to print numbers from 1 to 10 excluding 5.
Use a loop to iterate from 1 to 10
Inside the loop, check if the current number is equal to 5
If it is not equal to 5, print the number
Q121. how do you generate random data / number in python ?
Python provides random module to generate random data and numbers.
Import random module
Use random.randint() to generate random integer within a range
Use random.choice() to select a random element from a list
Use random.random() to generate a random float between 0 and 1
Use random.uniform() to generate a random float within a range
Q122. Do we need to test model's performance on test data if it performs poorly on train data, even if we tune hyperparameters but still?
Yes, we can override or replace the embedded Tomcat server in Spring Boot.
Spring Boot allows for customization of embedded servers through configuration properties.
You can replace Tomcat with other embedded servers like Jetty or Undertow.
Example: To use Jetty instead of Tomcat, exclude Tomcat dependencies and include Jetty dependencies in your pom.xml file.
Q124. What is the drawback of scanf() and how can it be avoided (if any)?
The drawback of scanf() is that it does not handle input validation well, leading to buffer overflow and security vulnerabilities.
scanf() does not limit the amount of input it reads, leading to buffer overflow if the input is larger than the buffer size.
scanf() does not handle invalid input well, leading to unexpected behavior or crashes.
To avoid these issues, input validation should be performed before using scanf(). Alternatively, fgets() and sscanf() can be used for safer ...read more
Q125. Explain public static void main (String args []) in Java.
Entry point for Java programs.
public: Access modifier that allows the method to be called from anywhere.
static: Method belongs to the class and not to any instance of the class.
void: Method does not return any value.
main: Method name that is recognized by JVM as the entry point for the program.
String args[]: Command line arguments passed to the program as an array of strings.
Q126. If create 10 rest api and deploy it on server and create same 10rest api using jar package then which one is lighter and faster?
The REST API deployed on the server is lighter and faster than the one created using jar package.
REST API is designed to be lightweight and efficient.
JAR packages are typically larger and require more resources to run.
Deploying REST API on a server allows for better scalability and performance.
JAR packages may be useful for certain use cases, such as offline applications or embedded systems.
Q127. Out of 100 records from source only 50 has loaded to target what is your approach,how to debug our job, incremental load
Approach to debug Talend job with 50% data loading to target out of 100 records from source
Check the log files for any errors or warnings
Verify the source and target connections
Check if any filters or transformations are causing the issue
Check if the job is designed for incremental load and if the correct parameters are set
Check if there are any data quality issues in the source data
Check if there are any network or system issues causing the job to fail
Q128. What is the importance of C language and its real time applications?
C language is important for its efficiency and low-level programming capabilities, with real-time applications in embedded systems and operating systems.
C is a low-level language that allows for direct memory manipulation and efficient code execution.
Real-time applications include embedded systems like microcontrollers and operating systems like Unix.
C is also used in game development, system programming, and scientific computing.
C's popularity has led to the creation of many...read more
Q129. What is TestNG? Write the methods name? Importance.
TestNG is a testing framework for Java that supports various testing types and provides advanced features like parallel testing and reporting.
TestNG stands for Test Next Generation.
It supports various testing types like unit, functional, integration, and end-to-end testing.
TestNG provides annotations like @Test, @BeforeSuite, @AfterSuite, etc. to define test methods and their execution order.
It supports parallel testing, which helps in reducing the overall test execution time...read more
Q130. How to write good test cases? What is required when you creating test plan?
Good test cases require clear objectives, thorough planning, and attention to detail.
Identify the objective of the test case
Ensure the test case is specific, measurable, achievable, relevant, and time-bound (SMART)
Consider all possible scenarios and edge cases
Document the expected results
Include preconditions and post-conditions
Ensure the test case is repeatable and reproducible
Review and validate the test case with stakeholders
Q131. What is your favorite programming language?
My favorite programming language is Python.
Python is easy to learn and has a simple syntax.
It has a vast library of modules and frameworks for various purposes.
Python is widely used in data science and machine learning.
It is also great for web development, automation, and scripting.
Some popular companies that use Python include Google, Facebook, and Netflix.
Q132. what is the difference between findelement and findelements?
findelement returns the first matching element while findelements returns a list of all matching elements.
findelement is used to locate the first matching element on a web page
findelements is used to locate all matching elements on a web page
findelement throws NoSuchElementException if no matching element is found
findelements returns an empty list if no matching element is found
Q133. what is the difference between break continue and pass?
Break, continue and pass are control statements used in loops. Break terminates the loop, continue skips an iteration and pass does nothing.
Break is used to terminate a loop when a certain condition is met
Continue is used to skip an iteration of a loop when a certain condition is met
Pass is used as a placeholder when a statement is required syntactically but no action is needed
Q134. what are the types of instances and which is the lowest cost instance? ex spot, on-demand, reserved instances
Types of instances and their costs
On-demand instances: pay as you go, no upfront cost
Reserved instances: upfront payment for a discounted rate
Spot instances: bid for unused capacity, can be cheapest but not guaranteed
Lowest cost instance varies depending on usage and availability
Consider usage patterns and budget when choosing instance type
Q135. How to configure HSRP and VRRP? What are their differences? Have you worked on GLBP?
HSRP and VRRP are protocols used to provide redundancy for IP addresses. GLBP is another protocol that provides load balancing.
HSRP and VRRP are used to provide redundancy for default gateways in a network.
HSRP is Cisco proprietary while VRRP is an open standard.
HSRP uses a virtual IP address while VRRP uses a virtual router ID.
GLBP is a Cisco proprietary protocol that provides load balancing between multiple gateways.
GLBP uses a virtual IP address and virtual MAC address to ...read more
Q136. How spanning tree will work in given topology? Have you worked on spanning tree manipulation?
Spanning tree protocol prevents loops in a network by disabling redundant links.
Spanning tree protocol selects a root bridge and disables all other paths to prevent loops.
It uses a cost metric to determine the shortest path to the root bridge.
STP manipulation involves changing the cost metric to influence the path selection.
Examples of STP manipulation include changing port priorities or enabling portfast.
STP can be visualized using tools like Wireshark or Cisco's Packet Trac...read more
Q137. What are the principles of Agile ?
The principles of Agile are a set of values and beliefs that guide the Agile methodology.
Customer satisfaction is the highest priority
Welcome changing requirements, even late in development
Deliver working software frequently
Collaboration between business people and developers
Build projects around motivated individuals
Face-to-face conversation is the best form of communication
Working software is the primary measure of progress
Maintain a sustainable pace
Continuous attention to ...read more
Q138. what is the difference between methodology and framework ?
Methodology refers to a set of principles and guidelines for a specific process, while framework is a structure that provides a foundation for a process.
Methodology is a set of rules and guidelines for a specific process, while framework is a structure that provides a foundation for a process.
Methodology is more prescriptive, while framework is more flexible.
Examples of methodologies include Waterfall, Agile, and Lean, while examples of frameworks include Scrum, Kanban, and S...read more
Q139. What is a constructor?
A constructor is a special method that is used to initialize objects in a class.
Constructors have the same name as the class they are in.
They are called automatically when an object is created.
They can take parameters to set initial values for object properties.
Example: public class Car { public Car(String make, String model) { this.make = make; this.model = model; } }
Example: Car myCar = new Car("Toyota", "Corolla");
Q140. Deductive Logical Thinking - 6 minutes-Finding the missing symbol/ visual in a grid based on a rule-based logic
Finding missing symbol/visual in a grid based on rule-based logic in 6 minutes.
Analyze the given symbols and their placement in the grid
Identify the pattern or rule that governs the placement of symbols
Apply the rule to the empty space to find the missing symbol
Time management is crucial
Practice with similar puzzles to improve deductive logical thinking skills
The life cycle of a thread in Java involves creation, running, blocking, and termination.
A thread is created by instantiating a class that extends Thread or implements Runnable interface.
The thread starts running when the start() method is called, executing the run() method.
A thread can be blocked by calling sleep(), wait(), or join() methods.
A thread terminates when the run() method completes or when stop() method is called.
Q142. How would u use business intelligence to implement up sell and cross sell?
Business intelligence can be used to identify patterns and trends in customer behavior, allowing for targeted up sell and cross sell strategies.
Analyze customer data to identify common purchasing patterns and preferences
Use predictive analytics to anticipate customer needs and offer relevant products or services
Implement personalized marketing campaigns based on customer data
Track the success of up sell and cross sell strategies and adjust as needed
Provide sales teams with re...read more
Q143. How do you troubleshoot an issue?
To troubleshoot an issue, follow a systematic approach to identify the problem and find a solution.
Gather information about the issue from the user
Analyze the symptoms and try to reproduce the problem
Check for common causes and known solutions
Use diagnostic tools to identify the root cause
Implement a solution or workaround
Test the solution to ensure the issue is resolved
Document the troubleshooting steps and the solution
Q144. Why do you prefer Java over other languages?(
Java is a versatile language with a vast community and excellent libraries.
Java is platform-independent, making it easy to write code that can run on any device.
It has a vast community of developers who contribute to its libraries and frameworks.
Java is highly secure and provides excellent support for multithreading.
It is an object-oriented language, making it easy to write modular and reusable code.
Java is widely used in enterprise applications, such as banking and e-commerc...read more
Q145. What is accounts receivable or payable?
Accounts receivable is the money owed to a company by its customers, while accounts payable is the money a company owes to its suppliers.
Accounts receivable refers to the outstanding invoices or money owed to a company by its customers for goods or services provided.
Accounts payable refers to the outstanding invoices or money that a company owes to its suppliers for goods or services received.
Accounts receivable is an asset on the company's balance sheet, while accounts payab...read more
The @SpringBootApplication annotation is used to mark the main class of a Spring Boot application.
It is a combination of @Configuration, @EnableAutoConfiguration, and @ComponentScan annotations.
It tells Spring Boot to start adding beans based on classpath settings, other beans, and various property settings.
It also implicitly provides a base package for component scanning.
Example: @SpringBootApplication
Example: @SpringBootApplication(scanBasePackages = "com.example")
Q147. What is parallel testing? Write the code.
Parallel testing is running multiple tests simultaneously to save time and increase efficiency.
Parallel testing is useful for large test suites that take a long time to run.
It requires a test framework that supports parallel execution.
Code example: pytest -n 4 (runs 4 tests in parallel)
Parallel testing can be done on multiple machines or on a single machine with multiple cores.
It can help identify and isolate issues faster.
Parallel testing can also help with load testing and ...read more
Q148. angular Components Directives Interceptor How do u show spinner from interceptor Reactive forms Use of authguards Hostlistener Component communication Dependency injection Optional chaining Responsive web desig...
read moreQuestions on Angular, JavaScript, and CSS
Angular components, directives, and interceptors
Showing spinner from interceptor
Reactive forms and authguards
Hostlistener and component communication
Dependency injection and optional chaining
JavaScript async, defer, cloning objects, hoisting, spread operator, comparing objects, event bubbling, and prototype
CSS box model
Q149. Explain how to design azure architecture using VM, VNet and Load Balancers?
Designing Azure architecture using VM, VNet, and Load Balancers involves creating virtual machines, virtual networks, and load balancers to ensure scalability, availability, and performance.
Start by creating a virtual network (VNet) to establish a private network in Azure.
Create virtual machines (VMs) within the VNet to host your applications and services.
Configure load balancers to distribute incoming traffic across multiple VMs for high availability and scalability.
Use Azur...read more
Q150. How computer connects to internet and how to solve if not getting connected?
A computer connects to the internet through a modem or router. Troubleshoot by checking connections and resetting devices.
A computer can connect to the internet through a wired or wireless connection
A modem or router is required to connect to the internet
Check if the modem or router is properly connected and turned on
Reset the modem or router if necessary
Check network settings on the computer
Try restarting the computer or device
Contact internet service provider for further as...read more
Q151. 1. Regarding project roles and responsibilities 2. Manual testing for networking protocols 3. Explain ARP? 4. What is the use of VLAN? 5. Explain 802.1q tagging? 6. Difference between STP and RSTP? 7. OSPFv2 st...
read moreQ152. How many joins are there in Sql. Write the query for each joins.
There are four types of joins in SQL: Inner Join, Left Join, Right Join, and Full Outer Join.
Inner Join: returns only the matching rows from both tables
Left Join: returns all the rows from the left table and matching rows from the right table
Right Join: returns all the rows from the right table and matching rows from the left table
Full Outer Join: returns all the rows from both tables, with NULL values in the columns where there is no match
Q153. How to read parquet file, how to call notebook from adf, Azure Devops CI/CD Process, system variables in adf
Answering questions related to Azure Data Engineer interview
To read parquet file, use PyArrow or Pandas library
To call notebook from ADF, use Notebook activity in ADF pipeline
For Azure DevOps CI/CD process, use Azure Pipelines
System variables in ADF can be accessed using expressions like @pipeline().RunId
Q154. If a monitor is blank, what troubleshooting will you do to make it operational?
To troubleshoot a blank monitor, check power, cables, and settings.
Check if the monitor is receiving power and turned on
Check if the cables are properly connected and not damaged
Check the display settings on the computer
Try connecting the monitor to a different computer or device
Check for any error messages or codes on the monitor
If all else fails, try resetting the monitor to factory settings
Q155. Project & skills in which u worked,what is spi testing,what all tools you know,rest api,apart from spi sny other skills in which u hv gd experience
SPI testing is a type of software testing that focuses on measuring the performance of a system or application.
SPI testing involves measuring the performance of a system or application against predefined metrics.
Tools commonly used for SPI testing include JMeter, LoadRunner, and Gatling.
REST API testing involves testing the functionality and performance of RESTful web services.
Other skills I have experience in include test automation, agile methodologies, and defect tracking ...read more
Q156. What is Dispatch? How to enable voice for Chatbot, Integration of Bot with web application, How are the insights captured for the chatbot
Dispatch is a process of assigning tasks to appropriate resources. Voice for chatbot can be enabled using text-to-speech technology. Chatbot can be integrated with web application using APIs. Insights for chatbot can be captured using analytics tools.
Dispatch is a process of assigning tasks to appropriate resources
Voice for chatbot can be enabled using text-to-speech technology
Chatbot can be integrated with web application using APIs
Insights for chatbot can be captured using ...read more
Q157. What is the advantage of generic collection, when and why we should approach for that?
Generic collections provide type safety and reusability in software development.
Generic collections allow us to store and manipulate objects of any type in a type-safe manner.
They provide compile-time type checking, reducing the chances of runtime errors.
They promote code reusability by allowing the same collection to be used with different types.
Generic collections improve performance by eliminating the need for boxing and unboxing operations.
They enable us to write cleaner ...read more
Q158. From start to end how you perform web application penetration testing on a website with firewall is enabled on it?
Performing web application penetration testing on a website with firewall enabled.
Identify the type of firewall and its configuration
Perform reconnaissance to gather information about the target
Identify vulnerabilities and exploit them
Use tools like Burp Suite, Nmap, and Metasploit
Test for common web application vulnerabilities like SQL injection and cross-site scripting
Document findings and provide recommendations for remediation
Q159. Difference between procedure and function, delete and truncate, exit and in, cursor and bulk bind, cursor and collection, view and materialized view. How to avoid cross join. Different types of joins.
Explanation of differences between programming concepts and techniques.
Procedure vs Function: Functions return a value while procedures do not.
Delete vs Truncate: Delete removes rows one by one while truncate removes all rows at once.
Exit vs In: Exit is used to exit a loop or a program while In is used to pass values into a subprogram.
Cursor vs Bulk Bind: Cursor fetches one row at a time while Bulk Bind fetches multiple rows at once.
Cursor vs Collection: Cursor is used to fet...read more
Q160. Explain Load balancing in details / types / routing methods / Ports etc Docker commands and questions from the sample docker file K8 master node components and its usages Pods troubleshooting Diff types of comp...
read moreLoad balancing distributes incoming network traffic across multiple servers to ensure no single server is overwhelmed.
Types of load balancing: round robin, least connections, IP hash, weighted round robin, etc.
Routing methods: DNS-based, hardware-based, software-based, etc.
Ports: Load balancers can operate at Layer 4 (TCP/UDP) or Layer 7 (HTTP/HTTPS).
Docker commands: docker run, docker build, docker exec, etc.
K8 master node components: API server, scheduler, controller manage...read more
Q161. What's is Capital Market? what is Derivatives? Difference between bond and equity? They ask some basics questions like this.
Capital market is a financial market where long-term securities like stocks and bonds are bought and sold. Derivatives are financial instruments derived from an underlying asset.
Capital market is a market for long-term securities like stocks and bonds
It facilitates the buying and selling of financial instruments with long maturities
Derivatives are financial instruments derived from an underlying asset
They derive their value from an underlying asset like stocks, bonds, commodi...read more
Q162. How many objects will create when string created using New keyword ?
One object will be created when string created using New keyword.
When a string is created using the New keyword, only one object is created.
This object is stored in the heap memory.
The string object created using the New keyword is mutable.
The string object created using the New keyword can be modified.
The string object created using the New keyword is slower than the string literal.
Q163. Why Notify, wait, NotifyAll methods are part of Object class ?
Notify, wait, NotifyAll methods are part of Object class for thread synchronization.
Object class is the root of all classes in Java.
These methods are used for inter-thread communication and synchronization.
Notify wakes up a single thread waiting on the object, while NotifyAll wakes up all threads.
Wait method causes the current thread to wait until another thread notifies it.
These methods are used in multi-threaded programming to avoid race conditions and deadlocks.
Q164. find whether the number is divisible by both 5 and 7.
To check if a number is divisible by both 5 and 7, we need to check if it is divisible by 35.
Divide the number by 35 and check if the remainder is 0.
Alternatively, check if the number is divisible by 5 and 7 separately.
Example: 245 is divisible by both 5 and 7 as it is divisible by 35 (245/35 = 7 with remainder 0).
Q165. Write an SQL query to find names of employees start with ‘A’?
SQL query to find names of employees starting with 'A'
Use the SELECT statement to retrieve data from the employee table
Use the LIKE operator to match the names starting with 'A'
Use the % wildcard to match any number of characters after 'A'
Q166. what is problem ticket? How to recover shadow file ? Name of event deamon ? What is inetd ?
Answers to Linux Administrator L2 interview questions.
A problem ticket is a record of an issue or problem that needs to be resolved.
To recover shadow file, use a backup or recreate it using the passwd command.
The name of the event daemon varies depending on the Linux distribution.
inetd is a daemon that manages incoming network connections and launches the appropriate service.
Q167. 2. Query optimization techniques? 3. Types of schemas and differences between them.
Query optimization techniques and types of schemas
Query optimization techniques include indexing, query rewriting, and partitioning
Schemas include user-defined, system-defined, and temporary schemas
User-defined schemas are created by users to organize database objects
System-defined schemas are created by the database management system
Temporary schemas are used for temporary storage of data
Differences between schemas include ownership, accessibility, and visibility
Q168. What KPIs do you use to measure project health?
KPIs used to measure project health
Velocity: Measure of work completed in each sprint
Sprint Burndown Chart: Tracks progress of work remaining in a sprint
Cycle Time: Time taken to complete a user story from start to finish
Defect Density: Number of defects found per unit of work
Customer Satisfaction: Feedback from stakeholders and end-users
Q169. What is OOP? Can main method be overloaded? What is a abstraction with example? How to take properties from base class to child class using inheritance? Why Java is not purely object oriented? What is this keyw...
read moreOOP stands for Object-Oriented Programming. It is a programming paradigm based on the concept of objects, which can contain data and code.
Main method can be overloaded in Java by defining multiple methods with the same name but different parameters.
Abstraction in OOP is the concept of hiding the implementation details and showing only the necessary features of an object. Example: Car as an object with properties like color, model, and methods like start, stop.
Inheritance in J...read more
Q170. What is SAP FICO explain it
SAP FICO is a module in SAP ERP that deals with financial accounting and controlling.
SAP FICO stands for Financial Accounting and Controlling.
It helps in managing financial transactions, generating financial statements, and analyzing financial data.
It includes sub-modules like General Ledger Accounting, Accounts Payable, Accounts Receivable, Asset Accounting, and Controlling.
It integrates with other SAP modules like Sales and Distribution, Material Management, and Production ...read more
Q171. What is your favorite language other than programming language?
My favorite language other than programming language is French.
I love the sound of the language and its rich culture.
I enjoy reading French literature and watching French films.
I have traveled to France and appreciate the beauty of the country.
I also appreciate the practicality of knowing a widely spoken language.
For example, it has helped me communicate with French-speaking colleagues and clients.
Q172. Then why do we do depreciation of companies what is the need for it
Depreciation is necessary to allocate the cost of an asset over its useful life.
Depreciation helps in matching the cost of an asset with the revenue it generates.
It allows for the recognition of the wear and tear, obsolescence, and loss of value of assets over time.
Depreciation expense reduces taxable income, resulting in tax savings for companies.
It helps in determining the true profitability and financial position of a company.
Depreciation is required by accounting standard...read more
Q173. Different types of test scenarios how to create in jmeter and in LoadRunner?
Different types of test scenarios in JMeter and LoadRunner
JMeter: HTTP requests, FTP requests, JDBC requests, SOAP/XML-RPC requests, LDAP requests, etc.
LoadRunner: Web, Mobile, SAP, Database, Citrix, etc.
Both tools support load, stress, endurance, and spike testing.
JMeter supports distributed testing while LoadRunner requires additional licenses for it.
Both tools allow for parameterization and correlation of test data.
Q174. SDLC vs STLC? write test cases? explain ur project and framework? so many questions on framework regarding? how to report bug? what is agile scrum?
Questions on SDLC, STLC, test cases, project framework, bug reporting, and Agile Scrum.
SDLC (Software Development Life Cycle) is the process of developing software from planning to deployment.
STLC (Software Testing Life Cycle) is the process of testing software from planning to deployment.
Test cases are written to ensure that software meets the requirements and functions as expected.
Project framework refers to the structure and organization of a project, including tools and p...read more
Self-Join is when a table is joined with itself, while Cross-Join is when every row from one table is combined with every row from another table.
Self-Join is used to combine rows with other rows in the same table.
Cross-Join generates a Cartesian product of the two tables involved.
Self-Join is typically used to compare rows within the same table, like in hierarchical structures.
Cross-Join is used when there is no common key between the two tables.
Q176. In Binomial Coefficient as the name suggests we are required to find out the binomial coefficient, i.eC(n,r).
Binomial coefficient is used to find the number of ways to choose r items from n items.
Binomial coefficient formula is C(n,r) = n! / (r! * (n-r)!)
It is used in probability and combinatorics
Example: C(5,2) = 10, which means there are 10 ways to choose 2 items from 5 items
Q177. Why Java Strings are immutable in nature?
Java Strings are immutable to ensure data integrity and security.
Immutable strings prevent accidental modification of data.
String pooling optimizes memory usage by reusing existing strings.
Immutable strings are thread-safe, simplifying concurrent programming.
String immutability allows for efficient caching and hashing.
Immutable strings enable safe sharing of string references.
Q178. What is network, ip address and range of the ip address
A network is a group of interconnected devices that communicate with each other. An IP address is a unique identifier assigned to each device on a network.
A network is a collection of devices such as computers, printers, and servers that are connected to each other.
An IP address is a unique identifier assigned to each device on a network to enable communication between devices.
The range of an IP address is determined by the subnet mask, which specifies the number of bits used...read more
Q179. What is heap memory and tell me about memory management
Heap memory is a region of memory used for dynamic memory allocation.
Heap memory is allocated at runtime and can be resized as needed.
Memory management involves allocating and deallocating memory to prevent memory leaks and optimize performance.
Common memory management techniques include garbage collection and manual memory management.
Examples of languages that use heap memory include C++, Java, and Python.
Q180. How do you estimate when developing a new framework
Estimating the development of a new framework involves considering various factors and breaking down the tasks.
Identify the scope and requirements of the framework
Break down the tasks into smaller components
Consider the complexity and dependencies of each component
Estimate the effort required for each component
Consider the availability of resources and expertise
Account for potential risks and challenges
Review and refine the estimates as the development progresses
Q181. Insert the value in text box by using excel sheet through Selenium.
To insert value in text box using excel sheet through Selenium, we need to read data from excel and use sendKeys() method.
Read data from excel using Apache POI or JXL library
Identify the text box element using Selenium
Use sendKeys() method to insert the value from excel into the text box
Q182. How to publish and run process if orchestrator is not provided
To publish and run a process without an orchestrator, you can use the UiPath Robot Tray or the command line interface.
Open the UiPath Robot Tray and navigate to the Processes tab.
Click on the 'Publish' button to publish the process to a local folder.
Once published, you can run the process by selecting it from the list and clicking on the 'Start' button.
Alternatively, you can use the command line interface by navigating to the installation folder of UiPath Robot and running th...read more
Q183. how do you delete last 30 days logs in tomcat by using shell script
Deleting last 30 days logs in Tomcat using shell script
Use find command to locate files older than 30 days
Use xargs command to pass the file names to rm command
Use crontab to schedule the script to run periodically
Q184. Give real time scenario where have you used abstract class and interface
Abstract classes and interfaces are used to achieve abstraction and provide a blueprint for classes to implement.
Used abstract class to create a base class for different types of vehicles, with common properties and methods.
Used interface to define a contract for different payment methods, with each method implementing its own logic.
Abstract classes are used when we want to provide a default implementation for some methods, while leaving others to be implemented by the derive...read more
Q185. What are the operating systems you know and what is the difference between them ?
I know Windows, macOS, and Linux. They differ in terms of user interface, file system, and software compatibility.
Windows is the most widely used OS with a user-friendly interface and compatibility with most software.
macOS is exclusive to Apple devices and has a sleek interface with a focus on creative work.
Linux is open-source and highly customizable, with a variety of distributions tailored to different needs.
File systems differ between the OSes, with Windows using NTFS, ma...read more
Q186. How to minimize or maximize window in selenium to a desired size ?
To minimize or maximize a window in Selenium to a desired size, we can use the WebDriver's manage() method.
Use the manage() method of WebDriver to access the options for managing the browser window.
To maximize the window, use the maximize() method of the Options class.
To minimize the window, use the minimize() method of the Options class.
To set a desired window size, use the setSize() method of the Options class and pass the desired width and height as arguments.
Q187. can u recover an aws keypair if lost , what do you do if lost?
Yes, an AWS keypair can be recovered if lost.
To recover a lost AWS keypair, you can create a new keypair and associate it with the existing EC2 instances.
First, create a new keypair in the AWS Management Console or using the AWS CLI.
Then, stop the EC2 instances associated with the lost keypair.
Detach the root volume from each instance and create a new temporary instance.
Attach the root volume to the temporary instance and mount it.
Modify the authorized_keys file on the mounte...read more
Q188. What are different locators supported in selenium?
Selenium supports various locators such as ID, Name, Class Name, Tag Name, Link Text, Partial Link Text, CSS Selector and XPath.
ID locator is the most efficient and reliable locator
Name locator is used for locating elements by their name attribute
Class Name locator is used for locating elements by their class attribute
Tag Name locator is used for locating elements by their tag name
Link Text locator is used for locating elements by their link text
Partial Link Text locator is u...read more
Q189. what is the difference between array and a list ?
Arrays are fixed in size, while lists can grow or shrink dynamically.
Arrays are a collection of elements of the same data type, while lists can contain elements of different data types.
Arrays are accessed using an index, while lists are accessed using an iterator.
Arrays are faster for accessing elements, while lists are faster for inserting or deleting elements.
Examples of arrays include int[] and char[], while examples of lists include ArrayList and LinkedList.
Q190. What is Subnetting, host , configuration of network, what is Standar acl and extended acl. Rip ,eigrp ,bgp, ospf
Answering questions related to network administration including subnetting, host configuration, and routing protocols.
Subnetting involves dividing a network into smaller subnetworks for better management and security.
Host configuration refers to the setup and management of individual devices on a network.
Standard and extended ACLs are used to control access to network resources based on IP addresses.
Routing protocols like RIP, EIGRP, BGP, and OSPF are used to determine the be...read more
Q191. What is manual testing?Ur roles in earlier project explain briefly
Manual testing is the process of manually testing software applications to identify defects and ensure quality.
Manual testing involves executing test cases manually without the use of automation tools.
It requires the tester to simulate end-user behavior and validate the software against specified requirements.
Testers perform various types of testing such as functional, regression, integration, and usability testing.
They document test cases, track defects, and provide feedback...read more
Q192. How to implement monitoring with open source monitoring tools. How to expose and visualise metrics.
Open source monitoring tools can be used to implement monitoring and visualize metrics.
Choose a suitable open source monitoring tool such as Nagios, Zabbix, or Prometheus.
Install and configure the monitoring tool to collect data from the desired sources.
Define the metrics to be monitored and set up alerts for critical events.
Use a visualization tool such as Grafana to create dashboards and display the collected metrics.
Ensure that the monitoring system is scalable and can han...read more
Q193. How did i identify the problem statement?
I identified the problem statement by analyzing the client's needs and pain points.
Conducted interviews with stakeholders
Reviewed data and reports
Identified patterns and trends
Considered industry best practices
Developed a clear problem statement
Example: Client needs to increase sales revenue by 20% within the next quarter
Q194. What is SDLC? What are the different stages in SDLC?
SDLC stands for Software Development Life Cycle. It is a process used to design, develop and test software.
SDLC is a framework that defines the tasks performed at each stage of software development.
The different stages in SDLC are planning, analysis, design, development, testing, deployment, and maintenance.
Each stage has its own set of deliverables and objectives.
For example, in the planning stage, the project scope and requirements are defined.
In the design stage, the softw...read more
Q195. TI - What are CDMA and TDMA? What do you mean by a MUX?
CDMA and TDMA are wireless communication technologies. MUX stands for Multiplexer.
CDMA stands for Code Division Multiple Access and TDMA stands for Time Division Multiple Access.
CDMA allows multiple users to share the same frequency band by assigning unique codes to each user.
TDMA divides a frequency band into time slots and each user is assigned a specific time slot.
A MUX is a device that combines multiple signals into a single signal for transmission over a single channel.
M...read more
Q196. do you have in depth knowledge of other agile frameworks, like kanban, xp,lean, safe5?
Yes, I have in-depth knowledge of Kanban, XP, Lean, and SAFe 5.0.
I have experience implementing Kanban boards and optimizing workflow processes.
I am familiar with XP practices such as pair programming and continuous integration.
I have used Lean principles to identify and eliminate waste in project processes.
I have worked with SAFe 5.0 to scale agile practices across multiple teams and departments.
Q197. How to calculate if there is delay in the project timeline? Which techniques will be used to overcome the delay.
To calculate project timeline delay, use techniques like critical path analysis, Gantt charts, and Earned Value Management. Overcome delay by re-sequencing tasks, adding resources, or reducing scope.
Use critical path analysis to identify tasks critical to project completion
Create a Gantt chart to visualize project timeline and identify delays
Use Earned Value Management to track project progress and identify deviations from plan
Re-sequence tasks to optimize project timeline
Add...read more
Q198. What are the types of constructors?
There are two types of constructors in Java: Default and Parameterized.
Default constructor is provided by the compiler if no constructor is defined.
Parameterized constructor takes arguments and initializes the object's state.
Example: public class Person { public Person() {} public Person(String name, int age) { this.name = name; this.age = age; } }
Q199. had to take n input and check whether it is prime and composite or not.
To check if a number is prime or composite, take n input and perform the necessary checks.
A prime number is only divisible by 1 and itself
A composite number has more than 2 factors
Check if n is divisible by any number between 2 and n-1
If n is divisible by any number between 2 and n-1, it is composite
If n is not divisible by any number between 2 and n-1, it is prime
Q200. To check if the sum of the digits of a number is palindrome or not
To check if the sum of the digits of a number is palindrome or not
Extract the digits of the number using modulo operator and add them
Convert the sum to a string and check if it is a palindrome
If it is a palindrome, then the sum of digits is also a palindrome
Example: For number 12345, sum of digits = 15, which is not a palindrome
Example: For number 12321, sum of digits = 9, which is a palindrome
More about working at Capgemini
Top HR Questions asked in Minda Stoneridge Instruments
Interview Process at Minda Stoneridge Instruments
Top Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month