Cigniti Technologies
70+ Richmond Technologies Interview Questions and Answers
Q1. Help me understand If I need to take over a higher-privilege account with an existing lower-privilege account what are the options available?
Options to take over a higher-privilege account with an existing lower-privilege account.
Use privilege escalation techniques to gain higher privileges
Exploit vulnerabilities in the system to gain access to higher-privilege accounts
Use social engineering to obtain login credentials for higher-privilege accounts
Use brute-force attacks to crack passwords for higher-privilege accounts
Q2. Can we override interface. If yes how its done and if not why not
Yes, interfaces can be overridden in Java using the 'default' keyword.
Interfaces can be overridden in Java 8 or later using the 'default' keyword.
The 'default' keyword allows us to provide a default implementation for a method in an interface.
If a class implements an interface with a default method, it can choose to override the default implementation.
Overriding a default method is done by simply providing a new implementation in the implementing class.
Overriding a default me...read more
Q3. What is Blind XSS? What is the technique to find one?
Blind XSS is a type of XSS attack where the attacker does not receive the output of the injected script.
Blind XSS is also known as non-persistent XSS.
It is difficult to detect as the attacker does not receive any feedback.
One technique to find Blind XSS is to use a tool like Burp Suite to inject a payload and monitor the server response.
Another technique is to use a third-party service like XSS Hunter to track the payload and receive notifications when it is triggered.
Prevent...read more
Q4. What will be the best way to send CSRF token in the Clint Server communication?
The best way to send CSRF token in client-server communication is through HTTP headers.
HTTP headers are the most secure way to send CSRF tokens.
The token should be sent in the 'X-CSRF-Token' header.
The header should be set to 'SameSite=Strict' to prevent cross-site request forgery attacks.
The token should be regenerated for each session to prevent replay attacks.
Q5. 3. WAP to print all the alphabets only from the below string - I/p: "selenium 123java456", o/p: "seleniumjava"
Write a program to print all the alphabets from a given string.
Loop through each character in the string
Check if the character is an alphabet using isalpha() function
If it is an alphabet, add it to a new string
Print the new string
Q6. What is manual and automation testing What type of bug occure doing project Different type of http method Sanity testing Functional testing Retesting Regression testing Just testing How to handle iframe How to ...
read moreExplaining manual and automation testing, types of bugs, HTTP methods, sanity testing, functional testing, retesting, regression testing, iframe and multiple windows handling.
Manual testing is done manually by a tester, while automation testing is done using tools and scripts.
Bugs can be functional, performance, security, usability, etc.
HTTP methods include GET, POST, PUT, DELETE, HEAD, OPTIONS, CONNECT, TRACE.
Sanity testing is done to check if the basic functionalities of th...read more
Q7. Java program in Array , highest profit on being and selling books. {1,7,4,9,5} . Buy books on monday, Tuesday...Friday for 1 rs, 7 rs, ...5rs respectfully. Sold then on any day eg Thursday you sold by buing on ...
read moreJava program to find maximum profit from buying and selling books on different days.
Create an array to store the prices of books on different days
Iterate through the array to find the maximum profit by buying on one day and selling on another
Calculate profit by subtracting buying price from selling price
Return the maximum profit obtained
Q8. Write a code to show overiding in java with real world solution
Code example of method overriding in Java
Create a parent class with a method
Create a child class that extends the parent class and overrides the method
Instantiate the child class and call the method to see the overridden behavior
Q9. How many XSS are there? what will be the mitigation?
There are numerous types of XSS attacks. Mitigation involves input validation and output encoding.
There are three main types of XSS attacks: stored, reflected, and DOM-based.
Mitigation involves input validation to ensure that user input is safe and output encoding to prevent malicious code from being executed.
Examples of input validation include limiting the length of input and restricting the types of characters that can be used.
Examples of output encoding include HTML entit...read more
Q10. How to print numbers 1-100 using two go routines sequentially
Use two go routines to print numbers 1-100 sequentially
Create two go routines, one for printing odd numbers and one for printing even numbers
Use channels to synchronize the two go routines and ensure sequential printing
Start the odd number go routine first, then start the even number go routine
Q11. How to run multiple test cases in parallel using multithreading?
To run multiple test cases in parallel using multithreading, create separate threads for each test case and manage synchronization.
Create a thread pool to manage multiple threads for running test cases in parallel.
Implement synchronization mechanisms like locks or semaphores to prevent race conditions.
Ensure that the test cases are independent of each other to avoid interference.
Use a testing framework that supports parallel execution, such as TestNG or JUnit.
Monitor the exec...read more
Q12. What is your favorite vulnerability? explain that
My favorite vulnerability is SQL injection.
SQL injection is a type of attack where an attacker injects malicious SQL code into a database query.
It can be used to steal sensitive information, modify or delete data, or even take control of the entire database.
Preventing SQL injection involves using parameterized queries, input validation, and proper error handling.
Examples of high-profile SQL injection attacks include the 2015 Ashley Madison hack and the 2011 Sony Pictures hack...read more
Q13. How to write generator functions using go language
Generator functions in Go language allow for efficient iteration over a sequence of values.
Use the 'yield' keyword to return values one at a time from the generator function.
Generator functions are defined with a 'func' keyword followed by the function name and 'chan' keyword.
Example: func myGenerator() chan int { }
Use a 'for' loop to iterate over the values returned by the generator function.
Q14. Framework explanation and Technologies usage
Frameworks are tools that provide structure and guidelines for developing software applications. Technologies are the specific tools and languages used in development.
Frameworks like Angular, React, and Spring provide pre-built components and architecture for web development.
Technologies like HTML, CSS, JavaScript, Java, and SQL are commonly used in software development.
Choosing the right framework and technologies depends on the project requirements and team expertise.
Q15. What is Invoice ? and what are the information we can see in invoice receipt copy.
An invoice is a document that lists the products or services provided by a seller and the amount due from the buyer.
An invoice includes the seller's name and contact information
It also includes the buyer's name and contact information
The date of the transaction is mentioned
The products or services provided are listed along with their prices
The total amount due is calculated and mentioned
Any taxes or discounts are also mentioned
Payment terms and methods are included
Invoice num...read more
Q16. What is Scenario Outline? What is Background and how it is different from Hooks?
Scenario Outline is used in Gherkin to run the same scenario multiple times with different inputs. Background sets up preconditions for all scenarios. Hooks are used for setup and teardown tasks.
Scenario Outline is used to run the same scenario with different inputs by using placeholders in the steps.
Background is used to set up preconditions that apply to all scenarios in a feature file.
Hooks are used for setup and teardown tasks that run before and after scenarios or featur...read more
Q17. How to extract data from CSV when there is no JSON available to input API
Use a CSV parser library to extract data from CSV files.
Use a CSV parser library like Apache Commons CSV or OpenCSV to read and extract data from CSV files.
Identify the structure of the CSV file (e.g. delimiter, headers) to properly parse the data.
Iterate through the CSV file to extract the desired data fields.
Handle any data formatting or transformations needed during extraction.
Store the extracted data in a suitable data structure for further processing.
Q18. What is singleton pattern and where did you use in your framework
Singleton pattern is a design pattern that restricts the instantiation of a class to one object.
Singleton pattern ensures that a class has only one instance and provides a global point of access to it.
It is commonly used in scenarios where only a single instance of a class is needed, such as managing database connections or configuration settings.
In a test automation framework, singleton pattern can be used to create a single instance of a driver object for browser automation...read more
Q19. What is run-time polymorphism and where did you use in your framework
Run-time polymorphism is the ability of a method to do different things based on the object it is acting upon.
Run-time polymorphism is achieved through method overriding in inheritance.
It allows a subclass to provide a specific implementation of a method that is already provided by its superclass.
An example of run-time polymorphism is when a parent class reference variable is used to refer to a child class object.
Q20. 5. How do u start designing framework?
Designing a framework involves identifying the scope, selecting the right tools, creating a structure, and implementing it.
Identify the scope of the framework
Select the right tools and technologies
Create a structure for the framework
Implement the framework and test it
Ensure the framework is scalable and maintainable
Q21. why do we use sync.Cond and sync.once
sync.Cond is used for signaling between goroutines and sync.Once is used for running initialization code only once.
sync.Cond is used for goroutines to wait for or signal each other when a certain condition is met
sync.Once is used to ensure a function is only executed once, typically used for initialization tasks
Example: Using sync.Cond to coordinate multiple goroutines accessing a shared resource
Example: Using sync.Once to initialize a singleton instance in a thread-safe mann...read more
Q22. Technologies worked on and solutions provided for load testing
I have worked on various load testing tools and technologies such as JMeter, LoadRunner, and Gatling.
Experience in creating and executing load test scenarios
Expertise in analyzing test results and identifying performance bottlenecks
Provided solutions for improving application performance
Familiarity with cloud-based load testing solutions like BlazeMeter and LoadNinja
Q23. What is the difference between let, var and const?
let, var and const are all used to declare variables in JavaScript, but they have different scopes and mutability.
let is block-scoped and can be reassigned, var is function-scoped and can be reassigned, const is block-scoped and cannot be reassigned
Using let:
let x = 10;
x = 20; // valid
Using var:
var y = 5;
y = 10; // valid
Using const:
const z = 15;
z = 25; // error, cannot reassign a const variable
Q24. Why use dimension and point class How to take screenshots in selenium What is sychronisation What is paramiterization Different between variable and string
Answering questions related to software quality analysis
Dimension and Point classes are used in software testing to represent the size and location of objects on a screen
Screenshots in Selenium can be taken using the TakesScreenshot interface and getScreenshotAs() method
Synchronization is the process of ensuring that the application waits for a certain condition to be met before proceeding with the next step
Parameterization is the process of passing values as parameters to a ...read more
Q25. 2. WAP to reverse a string using while loop.
WAP to reverse a string using while loop.
Declare a string variable and initialize it with the input string
Declare an empty string variable to store the reversed string
Use a while loop to iterate through the input string from the end to the beginning
Append each character to the empty string variable
Print the reversed string
Q26. How do you bill customer in SAP ISU and tell us about different meter reads
Billing customers in SAP ISU involves creating billing documents based on meter reads.
Billing in SAP ISU involves creating billing documents using transaction code EA16
Different meter reads include actual reads, estimated reads, and manual reads
Actual reads are readings taken directly from the meter, estimated reads are calculated based on previous consumption patterns, and manual reads are entered by the user
Q27. Features of java8 and uses in the project
Java8 features include lambda expressions, streams, and functional interfaces.
Lambda expressions provide concise syntax for functional programming.
Streams allow for efficient processing of large data sets.
Functional interfaces enable the use of lambda expressions.
Optional class helps to avoid null pointer exceptions.
Default methods allow for adding new methods to interfaces without breaking existing implementations.
Q28. From a String extract letters, digits, Special characters and display as individual strings
Extract letters, digits, and special characters from a string and display as individual strings
Use regular expressions to extract letters, digits, and special characters
Split the string based on the extracted characters
Store the individual strings in an array
Q29. What is full form of RPA How many robot types are there etc Tq
RPA stands for Robotic Process Automation. It is a technology that uses software robots to automate repetitive tasks.
RPA is a technology that uses software robots to automate repetitive tasks.
It helps in streamlining business processes and improving efficiency.
There are three types of robots in RPA: Attended robots, Unattended robots, and Hybrid robots.
Attended robots work alongside humans and assist them in completing tasks.
Unattended robots work independently without human ...read more
Q30. What is CRLF? explain that
CRLF stands for Carriage Return Line Feed. It is a sequence of characters used to represent a line break in text files.
CRLF consists of two ASCII control characters: CR (carriage return) and LF (line feed).
It is commonly used in HTTP headers to separate lines of text.
CRLF can be exploited by attackers to inject malicious code or perform attacks such as HTTP response splitting.
To prevent such attacks, input validation and output encoding should be implemented.
Examples of CRLF:...read more
Q31. Explain the process of SQLi. Mitigation?
SQLi is a type of injection attack where an attacker injects malicious SQL code into a vulnerable application to gain unauthorized access to sensitive data.
SQLi involves exploiting vulnerabilities in web applications that allow user input to be executed as SQL commands
Attackers can use SQLi to bypass authentication, access sensitive data, modify or delete data, and even take control of the entire database
Mitigation techniques include using prepared statements, input validatio...read more
Q32. Why automation is more efficient than manual testing.
Automation is more efficient than manual testing due to faster execution, repeatability, scalability, and coverage.
Automation allows for faster execution of test cases compared to manual testing.
Automated tests can be easily repeated multiple times without human error.
Automation can be scaled to run tests on multiple configurations and environments simultaneously.
Automated tests can cover a wider range of scenarios and edge cases compared to manual testing.
Automation reduces ...read more
Q33. What is the use of CTE in SQLSERVER ?
CTE stands for Common Table Expression and is used to create a temporary result set that can be referenced within a SELECT, INSERT, UPDATE, or DELETE statement.
CTE is used to simplify complex queries by breaking them down into smaller, more manageable parts.
It can be used to create recursive queries, which are queries that reference themselves.
CTE is defined using the WITH keyword followed by the name of the CTE and the SELECT statement that defines it.
The result set of a CTE...read more
Q34. What is magic table in SQLSERVER ?
Magic table is a temporary table created by SQL Server during DML operations.
It is also known as inserted and deleted tables.
Inserted table contains the new rows being added to a table.
Deleted table contains the rows being deleted from a table.
It is used in triggers to access the data being modified.
It cannot be directly queried or modified by the user.
Q35. What is the use of extension method ?
Extension methods allow adding new methods to existing types without modifying the original type.
Extension methods are defined as static methods in a static class.
They must be in the same namespace as the type being extended.
They are called like instance methods on the extended type.
They can be used to add functionality to third-party or system types.
Example: adding a method to the string type to convert a string to title case.
Q36. What are the T codes you have used in SAP ISU
I have used T codes such as FBL5N, FBL1N, FB50, FB60, FB70 in SAP ISU for various testing purposes.
FBL5N - Display Customer Line Items
FBL1N - Display Vendor Line Items
FB50 - G/L Account Posting
FB60 - Vendor Invoice Posting
FB70 - Customer Invoice Posting
Q37. What is the need for callback hell
Callback hell arises from nested callbacks in asynchronous JavaScript code, leading to unreadable and difficult-to-maintain code.
Nested callbacks in asynchronous code can lead to deeply nested code structures, making it hard to follow the flow of the program.
Error handling becomes more complex in callback hell, as errors need to be propagated through multiple levels of callbacks.
Callback hell can also result in code that is difficult to debug and maintain over time.
Using prom...read more
Q38. Explain about performance testing and engineering concepts
Performance testing involves evaluating the speed, responsiveness, and stability of a system under various conditions.
Performance testing is used to identify bottlenecks, assess system capacity, and ensure reliability.
It involves simulating real-world scenarios to measure the system's response time, throughput, and resource utilization.
Performance engineering focuses on optimizing system performance through design, development, and testing.
Common tools for performance testing...read more
Q39. 1. Explain current project framework
Our current project framework is based on Selenium WebDriver and TestNG.
We use Selenium WebDriver for automating web application testing.
TestNG is used for test management and reporting.
We follow Page Object Model design pattern for better code maintainability.
We use Maven for project build and dependency management.
We integrate with Jenkins for continuous integration and deployment.
Q40. Explain challenges and explain frameworks
Challenges in implementing frameworks and how they can be overcome
Challenges include resistance to change, lack of resources, and difficulty in implementation
Frameworks provide structure and guidance for addressing challenges
Examples of frameworks include Agile, Six Sigma, and ITIL
Q41. Framework explaination and implementations
Framework explanation and implementations
A framework is a set of tools, libraries, and best practices used to develop software applications
Frameworks provide a structure for developers to build upon, reducing the need to reinvent the wheel
Examples of frameworks include React for front-end web development and Django for back-end web development
Q42. Java oops and write a program for remove duplicates
Java program to remove duplicates from an array of strings using OOPs concepts.
Create a HashSet to store unique strings.
Iterate through the array and add each string to the HashSet.
Convert the HashSet back to an array to get the unique strings.
Q43. Write xpath for given feature in Flipkart website
Xpath for a feature in Flipkart website
Use Chrome DevTools to inspect the element and generate xpath
Start with double forward slash (//) to select any element on the page
Use attributes like class, id, text, etc. to narrow down the selection
Consider using contains() function for dynamic elements
Q44. Complex logical program (1 or 2)
The question is asking about the ability to write complex logical programs.
Demonstrate understanding of complex logical structures like loops, conditionals, and functions
Provide examples of solving complex problems using logical programming
Discuss experience with debugging and optimizing logical programs
Q45. What is Defered Execution ?
Defered Execution is a technique where the execution of a query or operation is delayed until it is actually needed.
Defered Execution is used in LINQ queries to improve performance by delaying the execution of the query until the results are actually needed.
It allows for more efficient use of resources by avoiding unnecessary computations.
Examples of Defered Execution include using the .Where() method in LINQ to filter a collection, or using the .Take() method to limit the nu...read more
Q46. 2, In C# what are Var and Ref Keywards
Var is used to declare implicitly typed local variables, while Ref is used for passing arguments by reference.
Var keyword allows the compiler to infer the type of the variable based on the assigned value.
Ref keyword is used to pass arguments by reference, allowing the called method to modify the original value.
Var example: var number = 10; // Compiler infers the type as int
Ref example: void ModifyValue(ref int value) { value = 20; } // Changes the original value passed by ref...read more
Q47. Explain the process of CSRF
CSRF is a type of attack where a malicious website tricks a user into performing an action on a different website.
The attacker creates a website with a form that submits a request to the target website
The user visits the attacker's website and submits the form, unknowingly performing an action on the target website
The target website cannot distinguish between a legitimate request and the forged request from the attacker's website
Examples include changing a user's password or ...read more
Q48. Different types of XSS
XSS or Cross-Site Scripting is a type of security vulnerability that allows attackers to inject malicious scripts into web pages viewed by other users.
Reflected XSS: The attacker injects a script that is reflected back to the user through a search query or form input.
Stored XSS: The attacker injects a script that is stored on the server and executed whenever the user visits the affected page.
DOM-based XSS: The attacker exploits a vulnerability in the client-side script to inj...read more
Q49. What is closure?
Closure is the process of finalizing or resolving something, often involving emotional healing or acceptance.
Closure is the act of coming to terms with a situation or relationship that has ended.
It involves accepting the reality of the situation and moving forward.
Closure can help individuals find peace and emotional healing after a difficult experience.
Examples of closure include talking things out with a friend after a disagreement, or attending a funeral to say goodbye to ...read more
Q50. What is event loop?
Event loop is a mechanism in programming that allows for asynchronous execution of code by continuously checking and processing events.
Event loop is commonly used in JavaScript to handle asynchronous operations.
It allows for non-blocking I/O operations by delegating tasks to the operating system.
Event loop processes events from the event queue and executes associated callback functions.
Example: setTimeout() function in JavaScript uses event loop to schedule the execution of a...read more
Q51. Explain about Agile vs SAFe agile
Agile is a flexible and iterative approach to project management, while SAFe agile is a framework for scaling Agile to larger organizations.
Agile focuses on individual teams working in short iterations, while SAFe agile extends this to multiple teams and departments working together.
Agile values individuals and interactions over processes and tools, while SAFe agile emphasizes alignment, collaboration, and delivery across multiple teams.
Agile encourages adaptability and respo...read more
Q52. what is regression testing
Regression testing is the process of retesting a software application to ensure that new code changes have not adversely affected existing functionality.
Regression testing is performed after code changes to verify that the existing features still work correctly.
It helps in identifying any defects introduced by new code changes.
Automated testing tools are often used for regression testing to save time and effort.
Examples of regression testing include running test cases that co...read more
Q53. Defect life cycle in software testing
Defect life cycle is the process of identifying, reporting, prioritizing, fixing, and verifying defects in software testing.
Defect identification: Finding and reporting defects in the software.
Defect prioritization: Determining the severity and impact of the defect.
Defect fixing: Correcting the defect in the code.
Defect verification: Testing the fixed defect to ensure it has been resolved.
Defect closure: Closing the defect after it has been verified and approved.
Examples of d...read more
Q54. What is M2 in Maven?
M2 in Maven refers to the directory where Maven stores all the downloaded dependencies for a project.
M2 is the default directory where Maven stores all the downloaded dependencies for a project.
It is located in the user's home directory under a folder named '.m2'.
This directory contains subdirectories like 'repository' where all the project dependencies are stored.
Q55. Explain static and runtime polymorphism
Static polymorphism is resolved at compile time while runtime polymorphism is resolved at runtime.
Static polymorphism is achieved through function overloading and operator overloading.
Examples of static polymorphism include compile-time polymorphism in C++.
Runtime polymorphism is achieved through virtual functions and function overriding.
Examples of runtime polymorphism include dynamic polymorphism in Java.
Q56. Write programs (1 or 2)
Write programs in Python and Java to demonstrate basic programming skills.
Write a program in Python to calculate the factorial of a number.
Write a program in Java to find the sum of all elements in an array.
Q57. tools used for data base testing
Tools commonly used for database testing include SQL Server Management Studio, MySQL Workbench, and Oracle SQL Developer.
SQL Server Management Studio
MySQL Workbench
Oracle SQL Developer
Q58. Duplicates in String
Find duplicates in a string
Iterate through the string and keep track of the frequency of each character
If the frequency of a character is greater than 1, it is a duplicate
Return the list of duplicate characters
Q59. 1, Diff b/w final, Finaly & Finalize
final, finally, and finalize are keywords in Java with different meanings.
final is a keyword used to declare a constant value that cannot be modified
finally is a block used in exception handling to ensure a piece of code is always executed
finalize is a method in the Object class used for garbage collection before an object is destroyed
Q60. what was your framework
My framework for projects typically involves a combination of Agile methodologies and traditional architectural principles.
I prioritize collaboration and adaptability in project planning and execution.
I utilize tools such as Jira and Trello to track progress and manage tasks.
I believe in iterative development and continuous feedback to ensure project success.
Q61. What is digital signature
A digital signature is a mathematical technique used to verify the authenticity and integrity of a digital document or message.
It is a type of electronic signature that uses encryption to ensure the validity of a document or message.
It provides a way to verify the identity of the signer and detect any changes made to the document or message.
Digital signatures are commonly used in e-commerce, online contracts, and other digital transactions.
Examples of digital signature standa...read more
Q62. What is Accounting Principle
Accounting principles are the guidelines and rules that companies must follow when preparing financial statements.
Accounting principles ensure consistency and accuracy in financial reporting.
There are several accounting principles, including the matching principle, revenue recognition principle, and the cost principle.
These principles are established by accounting standard-setting bodies such as the Financial Accounting Standards Board (FASB) and the International Accounting ...read more
Q63. Explain about selenium waits
Selenium waits are used to make the automation script wait for a certain condition to be met before proceeding.
Selenium provides different types of waits such as implicit wait, explicit wait, and fluent wait.
Implicit wait sets a default waiting time for the elements to be found before throwing an exception.
Explicit wait allows the automation script to wait for a specific condition to be met before proceeding.
Fluent wait is used to define maximum wait time for a certain condit...read more
Q64. define test life cycle
Test life cycle is the process of planning, designing, executing, and evaluating tests throughout the software development life cycle.
Includes test planning, test design, test execution, and test closure
Involves creating test cases, executing them, and analyzing results
Ensures that software meets quality standards and requirements
Iterative process that may involve multiple cycles of testing
Q65. Explain testing annotations
Testing annotations are used in automation testing to provide additional information about test methods.
Annotations are used to provide metadata about the test methods in automation testing frameworks.
Annotations can be used to specify the order of test execution, dependencies between tests, and other configurations.
Examples of testing annotations include @Test, @Before, @After, @DataProvider, @Parameters, etc.
Q66. what is expectation
Expectation is a belief about what will happen in the future.
Expectation is a mental state anticipating a certain outcome.
It can be based on past experiences, assumptions, or hopes.
Expectations can influence behavior and emotions.
For example, expecting a promotion at work can motivate someone to work harder.
However, unrealistic expectations can lead to disappointment.
Q67. Set and List difference
Sets do not allow duplicate elements, while lists allow duplicate elements.
Sets do not maintain insertion order, while lists maintain insertion order.
Sets are implemented using HashSet, TreeSet, or LinkedHashSet in Java, while lists are implemented using ArrayList or LinkedList.
Sets are used when you want to ensure uniqueness of elements, while lists are used when you want to allow duplicates.
Q68. What is framework
A framework is a reusable set of libraries or tools that provide a structure for developing software applications.
Framework provides a foundation for building software applications
It includes pre-written code, libraries, and tools to help developers
Frameworks can be specific to a programming language or platform
Examples: React for front-end web development, Django for back-end web development
Q69. Overall testing experience
I have 8 years of experience in QA testing, including manual and automated testing.
Experience in creating test plans, test cases, and test scripts
Proficient in using testing tools like Selenium, JIRA, and TestRail
Strong knowledge of different testing methodologies (e.g., black box, white box, regression)
Experience in testing web applications, mobile apps, and APIs
Familiarity with Agile and Scrum methodologies
Experience in leading a team of QA testers
Ability to identify and re...read more
Q70. explain about oops
Object-oriented programming paradigm that focuses on objects and classes for code organization and reusability.
Encapsulation: bundling data and methods that operate on the data into a single unit (object)
Inheritance: ability of a class to inherit properties and behavior from another class
Polymorphism: ability to present the same interface for different data types
Q71. expain about framework
A framework is a structured set of guidelines, libraries, and tools used to develop and maintain software applications.
Framework provides a foundation for building software applications
It includes pre-written code, libraries, and tools to help developers
Frameworks can be specific to a programming language or technology
Examples: Selenium for automated testing, Angular for web development
Q72. Program for output a1bb2cc3
Program to output a1bb2cc3
Create an array of strings with 'a', 'b', 'c'
Loop through the array and concatenate the index + 1 with the string element
Q73. reverse the string
Reverse a given string
Use a loop to iterate through the characters of the string and build a new string in reverse order
Alternatively, use built-in functions like reverse() or StringBuilder in some programming languages
More about working at Cigniti Technologies
Top HR Questions asked in Richmond Technologies
Interview Process at Richmond Technologies
Top Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month