Add office photos
Employer?
Claim Account for FREE

Oracle Cerner

3.7
based on 1.3k Reviews
Video summary
Filter interviews by

80+ Nucleus Software Exports Interview Questions and Answers

Updated 6 Dec 2024
Popular Designations

Q1. Candies Distribution Problem Statement

Prateek is a kindergarten teacher with a mission to distribute candies to students based on their performance. Each student must get at least one candy, and if two student...read more

Ans.

The task is to distribute candies to students based on their performance while minimizing the total candies distributed.

  • Create an array to store the minimum candies required for each student.

  • Iterate through the students' ratings array to determine the minimum candies needed based on the given criteria.

  • Consider the ratings of adjacent students to decide the number of candies to distribute.

  • Calculate the total candies required by summing up the values in the array.

  • Implement a fu...read more

Add your answer

Q2. What is the difference between a hardworker and a smartworker?

Ans.

A hardworker puts in more effort, while a smartworker works efficiently and effectively.

  • A hardworker may spend more time on a task, while a smartworker finds ways to complete it faster.

  • A hardworker may rely on brute force, while a smartworker uses their skills and knowledge to solve problems.

  • A hardworker may struggle with prioritization, while a smartworker knows how to focus on the most important tasks.

  • A hardworker may burn out quickly, while a smartworker maintains a sustai...read more

View 2 more answers

Q3. Order of multiple catch blocks in a single try block in java. Will it compile if the general catch was before the specific one?

Ans.

Order of catch blocks in a try block in Java

  • Specific catch blocks should come before general catch blocks

  • If general catch block comes before specific catch block, it will result in a compile-time error

  • If multiple catch blocks are present, only the first matching catch block will be executed

Add your answer

Q4. What was the cost price? How much apples are needed by seller for whole day if he sells certain amount in a given time?

Ans.

The cost price of apples and the daily quantity needed by the seller.

  • The cost price refers to the price at which the seller purchases the apples.

  • The daily quantity needed by the seller depends on the amount of apples sold in a given time.

  • To calculate the daily quantity needed, we need to know the amount of apples sold and the time period.

  • The formula to calculate the daily quantity needed is: Daily Quantity Needed = (Amount of Apples Sold / Time Period)

View 1 answer
Discover Nucleus Software Exports interview dos and don'ts from real experiences
Q5. What is the difference between an abstract class and an interface in Java?
Ans.

Abstract class can have both abstract and non-abstract methods, while interface can only have abstract methods.

  • Abstract class can have constructors, member variables, and methods with implementation.

  • Interface can only have abstract methods and constants.

  • A class can implement multiple interfaces but can only extend one abstract class.

  • Example: Abstract class - Animal with abstract method 'eat', Interface - Flyable with method 'fly'.

Add your answer
Q6. Can you write 15 Linux commands along with their functions?
Ans.

List of 15 Linux commands with their functions

  • ls - list directory contents

  • pwd - print working directory

  • cd - change directory

  • mkdir - make a new directory

  • rm - remove files or directories

  • cp - copy files and directories

  • mv - move or rename files and directories

  • grep - search for patterns in files

  • chmod - change file permissions

  • ps - display information about running processes

  • top - display and update sorted information about processes

  • kill - send signals to processes

  • tar - create or ext...read more

Add your answer
Are these interview questions helpful?
Q7. What is a trigger in the context of a database management system?
Ans.

A trigger is a special type of stored procedure that automatically executes when certain events occur in a database.

  • Triggers are used to enforce business rules, maintain data integrity, and automate repetitive tasks.

  • They can be triggered by INSERT, UPDATE, or DELETE operations on a table.

  • Examples of triggers include auditing changes to a table, updating related tables when a record is modified, or enforcing referential integrity.

Add your answer
Q8. What is the difference between 'final', 'finally', and 'finalize' in Java?
Ans.

final is a keyword used to declare constants, finally is a block used in exception handling, and finalize is a method used for cleanup.

  • final is a keyword used to declare constants in Java, meaning the value cannot be changed once assigned. Example: final int x = 10;

  • finally is a block used in exception handling to ensure a piece of code is always executed, whether an exception is thrown or not. Example: try { // code } finally { // cleanup code }

  • finalize is a method in Java us...read more

Add your answer
Share interview questions and help millions of jobseekers 🌟
Q9. What is the difference between clustered and non-clustered indexes in a database management system?
Ans.

Clustered indexes physically order the data in the table, while non-clustered indexes do not.

  • Clustered indexes determine the physical order of data in the table, while non-clustered indexes do not.

  • A table can have only one clustered index, but multiple non-clustered indexes.

  • Clustered indexes are faster for retrieval of data, especially range queries, compared to non-clustered indexes.

  • Non-clustered indexes are stored separately from the actual data, leading to faster insert an...read more

Add your answer
Q10. What is the difference between UNION and UNION ALL in SQL?
Ans.

UNION combines and removes duplicates, UNION ALL combines without removing duplicates.

  • UNION merges the result sets of two or more SELECT statements and removes duplicates.

  • UNION ALL merges the result sets of two or more SELECT statements without removing duplicates.

  • UNION is slower than UNION ALL as it involves removing duplicates.

  • Example: SELECT column1 FROM table1 UNION SELECT column1 FROM table2;

  • Example: SELECT column1 FROM table1 UNION ALL SELECT column1 FROM table2;

Add your answer

Q11. How did you integrate MongoDB with Python in your earlier project

Ans.

I used PyMongo library to connect to MongoDB and perform CRUD operations in Python

  • Installed PyMongo library using pip

  • Created a MongoClient object to connect to the MongoDB server

  • Accessed the database and collection using the MongoClient object

  • Performed CRUD operations using the collection object

  • Used pymongo.cursor.Cursor to iterate over the query results

Add your answer

Q12. Write code for connecting a java application to the database

Ans.

Code for connecting a Java application to a database

  • Import the JDBC driver for the specific database

  • Create a connection object using the DriverManager class

  • Create a statement object to execute SQL queries

  • Execute the query and retrieve the results

  • Close the connection and release resources

Add your answer

Q13. Sum of N-Digit Palindromes

Determine the sum of all N-digit palindromes for a given integer 'N'. A palindrome is defined as a number that remains the same when its digits are reversed.

Example:

Input:
T = 1
N = ...read more
Ans.

Sum of all N-digit palindromes for a given integer N.

  • Generate all N-digit palindromes by iterating through digits 1 to 9 and appending the reverse of the number

  • Calculate the sum of all generated palindromes

  • Return the sum as the final result

Add your answer

Q14. Private vs final keyword in considerance with member functions in an application offered to the user

Ans.

Private keyword restricts access to member functions within the class while final keyword prevents overriding of functions.

  • Private keyword is used to hide the implementation details of a class from the user.

  • Final keyword is used to prevent the user from overriding a function in a subclass.

  • Using private and final keywords together can ensure that the implementation details of a class are not modified by the user.

Add your answer
Q15. What is the difference between the private and final access modifiers in Java?
Ans.

Private restricts access to the class itself, while final prevents inheritance and method overriding.

  • Private access modifier restricts access to the class itself, while final access modifier prevents inheritance and method overriding.

  • Private members are only accessible within the same class, while final classes cannot be extended and final methods cannot be overridden.

  • Example: private int num; - num can only be accessed within the class. final class Example {} - Example class...read more

Add your answer

Q16. What will be your first step if client reports any issue

Ans.

My first step would be to gather more information about the issue from the client.

  • Ask the client to provide specific details about the issue such as when it occurred, what actions were taken before the issue occurred, and any error messages received.

  • Try to replicate the issue on a test environment to understand the root cause.

  • Communicate with the client to keep them updated on the progress and potential solutions.

  • Prioritize the issue based on its impact on the client's operat...read more

Add your answer
Q17. What are DDL (Data Definition Language) and DML (Data Manipulation Language)?
Ans.

DDL is used to define the structure of database objects, while DML is used to manipulate data within those objects.

  • DDL includes commands like CREATE, ALTER, DROP to define database objects like tables, indexes, etc.

  • DML includes commands like INSERT, UPDATE, DELETE to manipulate data within tables.

  • Example of DDL: CREATE TABLE employees (id INT, name VARCHAR(50));

  • Example of DML: INSERT INTO employees VALUES (1, 'John Doe');

Add your answer

Q18. What do you know about Garbage collection

Ans.

Garbage collection is an automatic memory management process that frees up memory occupied by objects that are no longer in use.

  • Garbage collection is used in programming languages like Java, C#, and Python.

  • It helps prevent memory leaks and reduces the risk of crashes due to memory exhaustion.

  • Garbage collection works by identifying objects that are no longer in use and freeing up the memory they occupy.

  • There are different algorithms for garbage collection, such as mark-and-swe...read more

Add your answer

Q19. 1. coding question - count the frequency of all chars in a word. 2. ACID properties. 3. swap 2 numbers without using any extra variable.

Ans.

Count frequency of characters in a word, explain ACID properties, swap 2 numbers without extra variable.

  • To count frequency of characters in a word, create a hashmap to store character counts.

  • ACID properties in database: Atomicity, Consistency, Isolation, Durability.

  • To swap 2 numbers without extra variable, use XOR operation: a = a ^ b, b = a ^ b, a = a ^ b.

  • Example: word = 'hello', frequency = {'h': 1, 'e': 1, 'l': 2, 'o': 1}.

Add your answer

Q20. Difference between finally , finalize and final

Ans.

finally is a keyword used in try-catch block, finalize is a method in Object class, and final is a keyword used for declaring constants.

  • finally is used to execute a block of code after try-catch block

  • finalize is called by garbage collector before destroying an object

  • final is used to declare a constant variable or to make a class uninheritable

Add your answer
Q21. Write a SQL query to fetch the nth highest salary from a table.
Ans.

SQL query to fetch the nth highest salary from a table

  • Use the ORDER BY clause to sort salaries in descending order

  • Use the LIMIT clause to fetch the nth highest salary

Add your answer
Q22. What are the steps for establishing a JDBC connection?
Ans.

Establishing a JDBC connection involves loading the driver, creating a connection, creating a statement, executing queries, and handling exceptions.

  • Load the JDBC driver using Class.forName() method

  • Create a connection using DriverManager.getConnection() method

  • Create a statement using connection.createStatement() method

  • Execute queries using statement.executeQuery() method

  • Handle exceptions using try-catch blocks

Add your answer
Q23. What are the functions of a cursor in PL/SQL?
Ans.

A cursor in PL/SQL is used to retrieve and process multiple rows of data one at a time.

  • Allows iteration over a result set

  • Retrieves data row by row

  • Can be used to update or delete rows in a table

  • Must be declared, opened, fetched, and closed

Add your answer

Q24. Difference between Abstract class and Interface

Ans.

Abstract class is a class with some implementation while Interface is a contract with no implementation.

  • Abstract class can have constructors while Interface cannot

  • Abstract class can have non-abstract methods while Interface cannot

  • A class can implement multiple interfaces but can only inherit from one abstract class

  • Abstract class is used when there is a need for common functionality among related classes while Interface is used when there is a need for unrelated classes to imp...read more

Add your answer
Q25. What do you know about garbage collection in Java?
Ans.

Garbage collection in Java is the process of automatically managing memory by deallocating objects that are no longer needed.

  • Garbage collection helps in preventing memory leaks by reclaiming memory used by objects that are no longer referenced.

  • Java uses a garbage collector to automatically manage memory, unlike languages like C++ where memory management is manual.

  • Garbage collection in Java can be triggered by calling System.gc() or when the JVM determines that it is necessary...read more

Add your answer

Q26. 3) Different methods to identify an object using eggplant

Ans.

Different methods to identify an object using eggplant

  • Using text recognition

  • Using image recognition

  • Using coordinates

  • Using attributes

  • Using tags

Add your answer

Q27. 1. What is the difference between post 8.2 and pre 8.2 versions firewall 2. What is NAT Control ? 3. What is S Nat and specification ? And what is persistence in F5 4. How OSI works when one opens a Google page...

read more
Ans.

Answers to questions related to network administration including firewall, NAT control, OSI, TCP flags, VPN and encryption techniques.

  • Post 8.2 firewall versions have improved features and security compared to pre 8.2 versions

  • NAT control is a feature that allows or denies traffic based on NAT rules

  • S NAT is a type of NAT that translates the source IP address of a packet and persistence in F5 refers to maintaining a client's connection to a specific server

  • OSI works by breaking d...read more

Add your answer

Q28. Have you worked on AWS technology?

Ans.

Yes, I have experience working with AWS technology.

  • I have worked on deploying applications on AWS EC2 instances.

  • I have experience setting up and managing AWS S3 buckets for storing data.

  • I have used AWS Lambda functions for serverless computing.

  • I have configured and managed AWS RDS for database hosting.

Add your answer

Q29. Duplicates in array College Projects Hashmap implementation

Ans.

Implement a function to find duplicates in an array of strings using Hashmap.

  • Create a Hashmap to store the frequency of each string in the array

  • Iterate through the array and check if the frequency of any string is greater than 1

  • If yes, add it to the list of duplicates

  • Return the list of duplicates

Add your answer

Q30. 1)Program to read/write data using eggplant

Ans.

Eggplant can read/write data using its built-in scripting language SenseTalk.

  • Use the 'put' command to write data to a file or variable.

  • Use the 'read' command to read data from a file or variable.

  • Eggplant also supports reading/writing data to databases and spreadsheets.

  • Example: put "Hello World" into myVariable; read myVariable

  • Example: put "123" into file "myFile.txt"; read file "myFile.txt"

View 3 more answers

Q31. What is JSON?

Ans.

JSON stands for JavaScript Object Notation, a lightweight data interchange format.

  • JSON is used to transmit data between a server and a web application, as an alternative to XML.

  • It is easy to read and write for humans and easy to parse and generate for machines.

  • JSON is a text format that is completely language independent but uses conventions that are familiar to programmers of the C family of languages.

  • Example: {"name":"John", "age":30, "city":"New York"}

Add your answer
Q32. What is data integrity?
Ans.

Data integrity refers to the accuracy, consistency, and reliability of data throughout its lifecycle.

  • Data integrity ensures that data is accurate and consistent in storage and transmission.

  • It involves maintaining the quality and reliability of data over time.

  • Methods for ensuring data integrity include checksums, encryption, and error detection codes.

  • Examples of data integrity violations include data corruption, unauthorized access, and data tampering.

Add your answer

Q33. Inheritance types in Java

Ans.

Inheritance types in Java

  • Java supports single and multiple inheritance through classes and interfaces respectively

  • Single inheritance is when a class extends only one parent class

  • Multiple inheritance is when a class implements multiple interfaces

  • Java also supports hierarchical inheritance where multiple classes extend a single parent class

  • Java does not support multiple inheritance through classes to avoid the diamond problem

View 1 answer

Q34. What is meant by function overloading and function overriding?

Ans.

Function overloading is when multiple functions have the same name but different parameters. Function overriding is when a subclass provides its own implementation of a method that is already present in the parent class.

  • Function overloading is used to provide multiple ways to call a function with different parameters.

  • Function overriding is used to provide a specific implementation of a method in a subclass.

  • Function overloading is resolved at compile-time based on the number a...read more

Add your answer

Q35. What's BURN DOWN CHART AND MVP ?

Ans.

A burn down chart is a visual representation of the progress made in completing a project. MVP stands for Minimum Viable Product.

  • Burn down chart shows the remaining work and the progress made in a project.

  • MVP is the minimum version of a product that can be released to the market.

  • Both are commonly used in Agile methodology.

  • Burn down chart helps in tracking the progress and identifying any issues that may arise.

  • MVP helps in getting feedback from customers and improving the prod...read more

Add your answer

Q36. Explain inheritance

Ans.

Inheritance is a mechanism in object-oriented programming where a new class is created by inheriting properties of an existing class.

  • Inheritance allows code reuse and promotes code organization.

  • The existing class is called the parent or superclass, and the new class is called the child or subclass.

  • The child class inherits all the properties and methods of the parent class and can also add its own unique properties and methods.

  • Inheritance can be single, multiple, or multilevel...read more

Add your answer

Q37. Write an interface

Ans.

An interface defines a set of methods that a class must implement.

  • An interface is declared using the 'interface' keyword.

  • All methods in an interface are public and abstract by default.

  • A class can implement multiple interfaces.

  • Interfaces can also extend other interfaces.

  • Example: public interface MyInterface { void myMethod(); }

Add your answer

Q38. What is dns ? What is AD ? Concepts on windows and Linux.

Ans.

DNS is a system that translates domain names into IP addresses. AD is a directory service used for authentication and authorization.

  • DNS stands for Domain Name System and is used to translate domain names into IP addresses

  • AD stands for Active Directory and is a directory service used for authentication and authorization in Windows environments

  • Windows and Linux both use DNS to resolve domain names to IP addresses

  • Linux uses a file called /etc/resolv.conf to configure DNS setting...read more

Add your answer

Q39. What is threads?

Ans.

Threads are lightweight processes within a program that can run concurrently, allowing for multitasking and improved performance.

  • Threads share the same memory space within a process

  • Threads can communicate with each other more easily than separate processes

  • Examples include a web server handling multiple client requests concurrently

Add your answer

Q40. what is big data

Ans.

Big data refers to large volumes of structured and unstructured data that is too complex for traditional data processing applications.

  • Big data involves processing and analyzing large volumes of data to uncover patterns, trends, and insights.

  • It can come from various sources such as social media, sensors, devices, and business transactions.

  • Examples of big data technologies include Hadoop, Spark, and NoSQL databases.

  • Big data is used in various industries for decision-making, pre...read more

Add your answer

Q41. What is discharge flow of patient ?

Ans.

Discharge flow of a patient refers to the process of releasing a patient from a healthcare facility.

  • It involves completing necessary paperwork and ensuring the patient is stable enough to leave.

  • The patient may be given instructions for follow-up care or medication.

  • Discharge flow can vary depending on the type of healthcare facility and the patient's condition.

  • It is important to ensure a smooth discharge process to prevent readmissions or complications.

Add your answer

Q42. program to swap two numbers

Ans.

A program to swap two numbers

  • Declare two variables and assign values to them

  • Use a third variable to store the value of the first variable

  • Assign the value of the second variable to the first variable

  • Assign the value of the third variable to the second variable

Add your answer

Q43. What is the importance of manual testing when compared to automation testing

Ans.

Manual testing is important for exploratory testing, usability testing, and ad-hoc testing.

  • Manual testing allows for exploratory testing where testers can explore the application and identify unexpected issues.

  • Usability testing, which involves real users interacting with the software, is best done manually to capture user experience.

  • Ad-hoc testing, where testers randomly test the application without predefined test cases, is more effective when done manually.

  • Manual testing is...read more

Add your answer

Q44. Java find errors in code

Ans.

The Java code can be analyzed to find errors and bugs.

  • Use a Java IDE or compiler to identify syntax errors.

  • Debug the code to find logical errors and exceptions.

  • Review the code for potential performance issues or code smells.

  • Utilize code analysis tools like FindBugs or SonarQube for additional error detection.

Add your answer

Q45. What is meant by closure in javascript?

Ans.

Closure is a function that has access to its parent scope, even after the parent function has closed.

  • Closure is created when a function is defined inside another function.

  • The inner function has access to the outer function's variables and parameters.

  • The outer function returns the inner function, which can be called later with the parent scope still accessible.

  • Closures are used for data privacy, event handlers, and callbacks.

Add your answer

Q46. What is abstract class in javascript?

Ans.

There is no abstract class in JavaScript.

  • JavaScript does not have a built-in abstract class concept.

  • However, it is possible to create abstract classes using functions and prototypes.

  • Abstract classes are used as blueprints for other classes to inherit from.

  • They cannot be instantiated on their own and must be extended by a subclass.

  • Abstract methods can be defined in the abstract class and must be implemented in the subclass.

Add your answer

Q47. types of Polymorphism and its use case examples

Ans.

Polymorphism in software engineering refers to the ability of an object to take on many forms.

  • There are two types of polymorphism: compile-time polymorphism and runtime polymorphism.

  • Compile-time polymorphism is achieved through function overloading and operator overloading.

  • Runtime polymorphism is achieved through function overriding and virtual functions.

  • Polymorphism allows objects of different classes to be treated as objects of a common superclass.

  • Example of compile-time po...read more

View 1 answer

Q48. What are the tools you know?

Ans.

I know various tools for project management, data analysis, and communication.

  • Project management: Trello, Asana, Jira

  • Data analysis: Excel, Tableau, Power BI

  • Communication: Slack, Zoom, Microsoft Teams

View 1 answer

Q49. Algorithm to convert roman numeral to numbers?

Ans.

Algorithm to convert roman numeral to numbers

  • Create a dictionary to map roman numerals to their corresponding values

  • Iterate through the roman numeral string from right to left

  • If the current value is less than the previous value, subtract it from the total

  • If the current value is greater than or equal to the previous value, add it to the total

  • Return the total

Add your answer

Q50. What are Agile ceremonies?

Ans.

Agile ceremonies are regular meetings held by Agile teams to plan, review, and improve their work.

  • Sprint planning

  • Daily stand-up

  • Sprint review

  • Sprint retrospective

  • Backlog refinement

Add your answer

Q51. What is blue screen of death, shared drive, outlook issue

Ans.

Blue screen of death is a Windows error screen, shared drive is a network drive accessible to multiple users, and Outlook issue refers to problems with the Outlook email client.

  • Blue screen of death (BSOD) is a Windows error screen that appears when the system encounters a critical error and must be restarted.

  • Shared drive is a network drive that allows multiple users to access and share files and folders.

  • Outlook issue can refer to various problems with the Outlook email client...read more

Add your answer

Q52. How does that help in the L&D team?

Ans.

My experience in designing and delivering training programs will enable me to contribute to the L&D team by creating effective learning solutions.

  • I have experience in designing and delivering training programs

  • I can create effective learning solutions

  • I can contribute to the L&D team by sharing my expertise

  • I can help improve the overall training and development process

Add your answer

Q53. SQL Joins and types of sql statements

Ans.

SQL Joins are used to combine data from multiple tables. There are four types of SQL statements: SELECT, INSERT, UPDATE, and DELETE.

  • SQL Joins are used to combine data from two or more tables based on a related column between them.

  • The four types of SQL statements are SELECT, INSERT, UPDATE, and DELETE.

  • SELECT is used to retrieve data from one or more tables.

  • INSERT is used to add new data to a table.

  • UPDATE is used to modify existing data in a table.

  • DELETE is used to remove data ...read more

Add your answer

Q54. How do you manage the requirements

Ans.

I manage requirements by prioritizing, documenting, and communicating effectively with stakeholders.

  • Prioritize requirements based on business value and impact

  • Document requirements clearly using user stories, acceptance criteria, and wireframes

  • Communicate effectively with stakeholders to ensure alignment and understanding

Add your answer

Q55. what are the different joins in SQL

Ans.

Different types of joins in SQL include inner join, outer join, left join, and right join.

  • Inner join: Returns rows when there is at least one match in both tables

  • Outer join: Returns all rows when there is a match in one of the tables

  • Left join: Returns all rows from the left table and the matched rows from the right table

  • Right join: Returns all rows from the right table and the matched rows from the left table

Add your answer

Q56. Then breaking down of each component of architecture

Ans.

Breaking down each component of architecture involves analyzing and understanding the individual parts that make up the overall system.

  • Identify the main components of the architecture

  • Analyze the function and purpose of each component

  • Understand how each component interacts with the others

  • Consider the scalability and maintainability of each component

  • Examples: front-end, back-end, database, APIs

Add your answer

Q57. What is React Context?

Ans.

React Context is a feature in React that allows data to be passed down the component tree without having to pass props manually.

  • Context provides a way to share values like themes, user data, etc. across the component tree.

  • It avoids prop drilling, where props are passed down multiple levels to reach a component that needs them.

  • Context consists of two parts: a Provider component that provides the data and a Consumer component that consumes the data.

  • Context can be used with the ...read more

Add your answer

Q58. features of OOPS Concept

Ans.

OOPS (Object-Oriented Programming) is a programming paradigm that uses objects to represent and manipulate data.

  • Encapsulation: bundling data and methods together

  • Inheritance: creating new classes from existing ones

  • Polymorphism: using a single interface to represent different types

  • Abstraction: hiding complex implementation details

View 2 more answers

Q59. Write a java program to reverse string?

Ans.

Java program to reverse a string using StringBuilder class.

  • Create a StringBuilder object with the given string as parameter.

  • Use the reverse() method of StringBuilder class to reverse the string.

  • Convert the StringBuilder object back to string using toString() method.

Add your answer

Q60. Algorithms in data structures

Ans.

Algorithms in data structures are essential for efficient data manipulation and retrieval.

  • Algorithms in data structures help in organizing and managing data effectively.

  • Examples include sorting algorithms like quicksort and searching algorithms like binary search.

  • Understanding algorithms in data structures is crucial for optimizing performance in software development.

Add your answer

Q61. Real life scenario on web application testing

Ans.

Testing a web application for an online shopping platform

  • Testing the functionality of adding items to the cart and checking out

  • Testing the payment gateway integration for secure transactions

  • Testing the search functionality to ensure accurate results are displayed

  • Testing the responsiveness of the website on different devices and browsers

Add your answer

Q62. List any 5 linux commands

Ans.

List of 5 commonly used Linux commands for system engineers

  • ls - list directory contents

  • pwd - print working directory

  • cd - change directory

  • grep - search for specific text in files

  • chmod - change file permissions

Add your answer

Q63. EHR and EMR difference

Ans.

EHR and EMR are both electronic health records, but EHRs are more comprehensive and can be shared across different healthcare providers.

  • EHRs are designed to be more comprehensive and include a patient's medical history, diagnoses, medications, allergies, and test results.

  • EMRs are more limited and typically only include information from a single healthcare provider.

  • EHRs can be shared across different healthcare providers, while EMRs are typically only accessible within a singl...read more

Add your answer

Q64. Sum of largest and smallest element in an array

Ans.

Sum of largest and smallest element in an array

  • Find the minimum and maximum elements in the array

  • Add the minimum and maximum elements together to get the sum

Add your answer

Q65. What is OSPF, BGP, networking

Ans.

OSPF and BGP are routing protocols used in networking to determine the best path for data to travel.

  • OSPF (Open Shortest Path First) is an interior gateway protocol used to route IP packets within a single network.

  • BGP (Border Gateway Protocol) is an exterior gateway protocol used to route data between different networks.

  • Networking refers to the practice of connecting devices together to share resources and communicate with each other.

  • OSPF and BGP are important for ensuring eff...read more

Add your answer

Q66. Normal Linux command

Ans.

A normal Linux command is a command used in the Linux operating system to perform various tasks.

  • Commands are entered in the terminal or command line interface

  • Some common commands include ls, cd, mkdir, rm, and grep

  • Commands can be combined using pipes and redirects

  • Commands can be customized using options and arguments

Add your answer

Q67. Concepts of Statistics in brief

Ans.

Statistics is the study of collecting, analyzing, and interpreting data.

  • Descriptive statistics summarize and describe data

  • Inferential statistics make predictions and draw conclusions about a population based on a sample

  • Hypothesis testing is used to determine if there is a significant difference between groups

  • Regression analysis is used to model the relationship between variables

  • Probability theory is used to quantify uncertainty

  • Data visualization is used to communicate finding...read more

Add your answer

Q68. Implement counter in react app

Ans.

Implement a counter in a React app

  • Create a state variable to hold the count

  • Render the count in the UI

  • Add buttons to increment and decrement the count

  • Update the state variable on button click

Add your answer

Q69. find Anagram from string array

Ans.

Find anagrams from a string array

  • Iterate through each string in the array

  • Sort the characters of each string to create a key for comparison

  • Use a hashmap to group anagrams together

  • Return the grouped anagrams as arrays

Add your answer

Q70. Internal working of hashmap

Ans.

HashMap is a data structure that stores key-value pairs and uses hashing to efficiently retrieve values based on keys.

  • HashMap internally uses an array of linked lists to store key-value pairs.

  • When a key-value pair is added, the key is hashed to determine the index in the array where it will be stored.

  • If multiple keys hash to the same index, a linked list is used to handle collisions.

  • To retrieve a value, the key is hashed again to find the corresponding index and then the link...read more

Add your answer

Q71. Top view of binary Tree

Ans.

A top view of a binary tree shows the nodes visible when looking at the tree from the top.

  • The top view of a binary tree is the set of nodes visible when looking at the tree from the top.

  • Nodes at the same horizontal distance from the root are considered at the same level.

  • Use a map to store the horizontal distance of each node and only keep the first node encountered at each horizontal distance.

Add your answer

Q72. Why Oracle Cerner etc....

Ans.

Oracle and Cerner are popular choices for healthcare organizations due to their robust features, scalability, and industry-specific functionalities.

  • Oracle offers a comprehensive suite of healthcare solutions, including electronic health records (EHR) and population health management.

  • Cerner is known for its interoperability capabilities, allowing seamless data exchange between different healthcare systems.

  • Both Oracle and Cerner have a strong presence in the healthcare industry...read more

Add your answer

Q73. User stories examples

Ans.

User stories are short, simple descriptions of a feature told from the perspective of the person who desires the new capability.

  • As a user, I want to be able to log in to my account so that I can access my personalized content.

  • As a user, I want to be able to filter search results by price so that I can find products within my budget.

  • As a user, I want to receive email notifications when my order has shipped so that I can track its delivery.

  • As a user, I want to be able to save i...read more

Add your answer

Q74. Explain few, Any command for example

Ans.

Some common commands for technical support engineers include ping, ipconfig, and tracert.

  • Ping: Used to test the reachability of a host on an IP network.

  • Ipconfig: Displays all current TCP/IP network configuration values.

  • Tracert: Shows the route that packets take to reach a specified destination.

Add your answer

Q75. tables to join and fetch the data

Add your answer

Q76. Joins with DDL, DML

Ans.

Joins in SQL are used to combine rows from two or more tables based on a related column between them.

  • Joins are used in SQL to retrieve data from multiple tables based on a related column

  • DDL (Data Definition Language) is used to define the structure of database objects like tables, views, etc.

  • DML (Data Manipulation Language) is used to manipulate data in the database like inserting, updating, deleting records

Add your answer

Q77. Hight of binary tree

Ans.

Height of a binary tree is the maximum number of edges on the longest path from the root node to a leaf node.

  • Height of an empty tree is -1

  • Height of a tree with only one node is 0

  • Height of a binary tree can be calculated recursively by finding the height of left and right subtrees and adding 1 to the maximum of the two heights

Add your answer

Q78. Read back dictation on screen

Ans.

The question requires the candidate to read back a dictated text on the screen.

  • The candidate should listen carefully to the dictated text.

  • The candidate should then read back the text accurately.

  • The candidate should ensure that they have understood the text before reading it back.

  • Examples: 'Please read back the following sentence: The quick brown fox jumps over the lazy dog.'

  • Examples: 'Please read back the following paragraph: Lorem ipsum dolor sit amet, consectetur adipiscing...read more

Add your answer

Q79. Laws in us healthcare

Ans.

US healthcare laws regulate various aspects of healthcare delivery and financing.

  • The Affordable Care Act (ACA) regulates health insurance coverage and consumer protections.

  • HIPAA regulates the privacy and security of patient health information.

  • The Stark Law and Anti-Kickback Statute regulate physician self-referral and financial relationships with healthcare entities.

  • Medicare and Medicaid laws regulate government-funded healthcare programs.

  • The FDA regulates the safety and effi...read more

Add your answer

Q80. Reverse string program in java

Ans.

A program in Java to reverse a string

  • Create a char array from the input string

  • Use two pointers to swap characters from start and end of the array

  • Repeat until the pointers meet in the middle

Add your answer

Q81. explain osi model in detail.

Ans.

The OSI model is a conceptual framework that defines the functions of a network into seven distinct layers.

  • The OSI model stands for Open Systems Interconnection model.

  • It was developed by the International Organization for Standardization (ISO) in 1984.

  • The model is divided into seven layers: Physical, Data Link, Network, Transport, Session, Presentation, and Application.

  • Each layer has its own specific functions and protocols.

  • The layers work together to ensure reliable and effi...read more

Add your answer

Q82. oops concepts from java

Ans.

Object-oriented programming concepts in Java

  • Encapsulation: bundling data and methods together

  • Inheritance: creating new classes from existing ones

  • Polymorphism: using a single interface to represent different types

  • Abstraction: hiding implementation details and providing a simplified view

  • Encapsulation example: using private variables and public methods

  • Inheritance example: creating a subclass that inherits properties and methods from a superclass

  • Polymorphism example: using method...read more

Add your answer

Q83. Write workflow for a hospital

Add your answer
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos

Interview Process at Nucleus Software Exports

based on 108 interviews
Interview experience
4.3
Good
View more
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Interview Questions from Similar Companies

3.7
 • 2.8k Interview Questions
3.3
 • 457 Interview Questions
3.7
 • 401 Interview Questions
3.9
 • 303 Interview Questions
3.9
 • 215 Interview Questions
4.0
 • 158 Interview Questions
View all
Top Oracle Cerner Interview Questions And Answers
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
70 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter