Clover Infotech
70+ Creative Hands HR Consultancy Interview Questions and Answers
Q1. What is oracle application database administrator?
An Oracle Application Database Administrator is responsible for managing and maintaining the Oracle database used by Oracle Applications.
Responsible for installation, configuration, and upgrading of Oracle database
Ensures database security and performance optimization
Manages backup and recovery processes
Performs database monitoring and troubleshooting
Responsible for user management and access control
Works closely with developers and system administrators
Provides support and r...read more
Q2. If one of the application top get deleted how to restore?
To restore a deleted application top, use adadmin utility to recreate the application top.
Use adadmin utility to recreate the application top
Select option 2 (Maintain Applications Files menu)
Select option 1 (Maintain Applications Files)
Select option 2 (Copy Oracle Applications Files to the File System)
Enter the application short name and version to recreate the application top
Q3. How many types of variables there in Java?
There are three types of variables in Java: local, instance, and static.
Local variables are declared within a method or block and have limited scope.
Instance variables are declared within a class but outside of any method and are accessible to all methods of the class.
Static variables are declared with the static keyword and are shared among all instances of the class.
Examples: int x; //instance variable, static int y; //static variable, void method() { int z; //local variabl...read more
Q4. What is Hibernate and why we are going for hibernate technology?
Hibernate is an ORM tool used to map Java objects to database tables.
Hibernate simplifies database access by abstracting the JDBC API
It provides a framework for mapping an object-oriented domain model to a relational database
Hibernate supports lazy loading, caching, and transaction management
It reduces the amount of boilerplate code needed for database operations
Hibernate is widely used in enterprise Java applications
Q5. Issue faced on client side and resolution for that.
Client faced issue with concurrent request and resolved by increasing the number of processes.
Client reported slow performance while running concurrent requests.
Checked the number of processes and found it to be less than required.
Increased the number of processes and tested the concurrent request again.
Performance improved and issue resolved.
Q6. Start stop sequence of erp application and database. Impact if sequence get wrong
Start stop sequence of ERP app and DB. Impact if sequence gets wrong.
Start DB first, then ERP app
Stop ERP app first, then DB
Wrong sequence can cause data corruption or loss
May result in incomplete transactions or errors during startup
Q7. What is load balancer? Use of it!
A load balancer is a device that distributes network traffic across multiple servers to improve performance and availability.
Load balancers can improve website or application performance by distributing traffic evenly across multiple servers.
They can also improve availability by redirecting traffic to healthy servers in case of server failure.
Load balancers can be hardware or software-based and can be configured to use different algorithms for traffic distribution.
Examples of...read more
Q8. Why index rebuild is so important.
Index rebuild is important for improving database performance.
Rebuilding indexes helps to remove fragmentation and improve query performance.
It also helps to reduce disk I/O and improve overall database efficiency.
Regular index rebuilds can prevent index corruption and improve database stability.
Index rebuilds can be scheduled during off-peak hours to minimize impact on users.
Examples of tools for index rebuilds include Oracle Enterprise Manager and SQL*Plus.
Q9. How to recover control file if it is deleted in 8pm and how u recover that file after 8pm What is rac how u reate in rac ? About primary and standby And what command to used ? What is smon Library cacher.
To recover a deleted control file in Oracle Database, you can use a backup control file or create a new control file.
If a backup control file is available, you can restore it using the RMAN utility.
If a backup control file is not available, you can create a new control file using the CREATE CONTROLFILE statement.
To create a new control file, you need to provide the necessary information about the database, such as datafiles, redo log files, and tablespaces.
Once the control fi...read more
Q10. Did you know about oracle secure backup
Yes, Oracle Secure Backup is a tape backup management software for Oracle databases.
Oracle Secure Backup provides centralized management of tape backup and recovery operations for Oracle databases.
It supports various tape devices and media types.
It offers encryption and compression options for backup data.
It can be integrated with Oracle Recovery Manager (RMAN) for seamless backup and recovery.
It also provides reporting and monitoring features for backup operations.
Q11. What are 4 pillars of OOP with examples?
The 4 pillars of OOP are encapsulation, inheritance, polymorphism, and abstraction.
Encapsulation: bundling data and methods together in a class, hiding internal details.
Inheritance: creating new classes from existing ones, inheriting properties and behaviors.
Polymorphism: objects of different classes can be treated as objects of a common superclass.
Abstraction: simplifying complex systems by breaking them down into smaller, manageable parts.
Q12. Why form taking time to load.
Forms may take time to load due to various reasons.
Network latency
Heavy database queries
Large number of concurrent users
Inefficient coding
Insufficient hardware resources
Q13. If input/output error encountered.
Input/output error indicates a problem with reading or writing data to a storage device.
Check if the storage device is properly connected and functioning.
Check if the file system is corrupted.
Check if there is enough space on the storage device.
Check if there are any hardware issues with the storage device.
Check if there are any software issues with the operating system or application.
Try to recover the data from backups or use data recovery tools.
Q14. How to add DMZ node.
To add DMZ node, we need to configure the DMZ server and add it to the existing Oracle E-Business Suite environment.
Configure the DMZ server with the required software and patches.
Create a new context file for the DMZ node.
Update the DMZ context file with the required parameters.
Run the AutoConfig on the DMZ node.
Add the DMZ node to the existing Oracle E-Business Suite environment.
Configure the firewall to allow traffic between the DMZ node and the internal network.
Test the D...read more
Q15. What is Java programming language?
Java is a high-level, object-oriented programming language used for developing desktop, web, and mobile applications.
Java is platform-independent and can run on any operating system
It is known for its security features and memory management
Java code is compiled into bytecode which can be executed on any Java Virtual Machine (JVM)
Java has a vast library of pre-built classes and APIs for developers to use
Popular frameworks built on Java include Spring, Hibernate, and Struts
Q16. what is the feature of opps
OOPs feature is encapsulation, inheritance, and polymorphism.
Encapsulation: bundling of data and methods that manipulate the data within a single unit.
Inheritance: ability of a class to inherit properties and characteristics from its parent class.
Polymorphism: ability of objects to take on many forms or have multiple behaviors.
Examples: Java, C++, Python, Ruby, etc.
Q17. Why report is running slow.
Reports can run slow due to various reasons.
Inefficient SQL queries
Large data sets
Inadequate hardware resources
Poorly designed report layout
Network latency
Lack of indexing
Database contention
Insufficient memory allocation
Outdated software versions
Q18. Difference between R12.1 and R12.2
R12.2 has more features and improvements than R12.1
R12.2 has a new online patching feature
R12.2 has a new user interface
R12.2 has improved security features
R12.2 has enhanced mobile support
R12.2 has a new tool for managing concurrent programs
Q19. How to declare wearables variable
To declare wearables variable, use an array of strings.
Declare a variable named 'wearables' and assign an empty array to it: let wearables = [];
Add strings representing different wearables to the array: wearables.push('Fitbit', 'Apple Watch', 'Garmin');
Access individual wearables using their index: console.log(wearables[0]); // Output: Fitbit
Q20. Which database are mostly used in banking sector?
Q21. Oacore issue encountered?
Oacore issue refers to problems encountered in the Oracle Application Framework (OAF) layer of Oracle E-Business Suite.
Oacore issues can cause application performance problems, such as slow page load times or unresponsive pages.
Common causes of Oacore issues include memory leaks, database connectivity problems, and configuration errors.
To troubleshoot Oacore issues, DBAs can use tools like Oracle Enterprise Manager (OEM) and log files to identify the root cause of the problem...read more
Q22. what is the use of datafiles
Datafiles are used to store data in a database system.
Datafiles store actual data in a database system
They are used to organize and manage data efficiently
Datafiles can be used to store tables, indexes, and other database objects
They are essential for the functioning of a database system
Q23. what is osi and networking concepts
OSI (Open Systems Interconnection) model is a conceptual framework that standardizes the functions of a telecommunication or computing system into seven layers.
OSI model is divided into 7 layers, each responsible for specific functions in networking.
Each layer communicates with the adjacent layers to provide a seamless flow of data.
Examples of OSI layers include Physical Layer, Data Link Layer, Network Layer, Transport Layer, etc.
Q24. What is the basic fundaments of linux
Linux is an open-source operating system based on Unix that provides a stable, secure, and customizable platform for various applications.
Linux is based on Unix and is open-source
It provides a stable and secure platform for various applications
Linux is highly customizable and can be tailored to specific needs
Linux uses a command-line interface for system administration
Linux supports a wide range of programming languages and tools
Examples of Linux distributions include Ubuntu,...read more
Q25. What is Self Keyword in python?
The self keyword in Python is a reference to the current instance of a class.
Self is the first parameter in the definition of instance methods within a class.
It is used to access variables and methods within the class.
Self is not a reserved keyword in Python, but it is a convention to use self as the first parameter in instance methods.
Q26. Sql server database administrator structure
The SQL Server DBA structure includes roles such as junior DBA, senior DBA, and lead DBA.
Junior DBA: responsible for basic tasks such as backups and restores
Senior DBA: responsible for performance tuning and troubleshooting
Lead DBA: responsible for managing the team and making strategic decisions
Other roles may include database architect and database developer
The structure may vary depending on the organization's size and needs
Q27. Explain Oracle Architecture 11g & Oracle Database 12cR2 Technical Architecture.
Oracle Architecture 11g & Oracle Database 12cR2 Technical Architecture
Oracle Architecture 11g includes components like Oracle Instance, Oracle Database, and Oracle Grid Infrastructure
Oracle Database 12cR2 Technical Architecture introduces features like Multitenant Architecture, In-Memory Column Store, and Automatic Data Optimization
Both versions have similar components such as Datafiles, Control files, Redo logs, and Parameter files
Q28. How to deploy application on WAS server
Applications can be deployed on WAS server using administrative console, wsadmin script, or deployment manager.
Use administrative console to deploy applications by uploading the application file and configuring deployment settings.
Use wsadmin script to deploy applications by running scripts to install and configure the application.
Use deployment manager to deploy applications across multiple WAS servers in a network.
Applications can also be deployed using command line tools l...read more
Q29. Write sql queries on employee table?
SQL queries on employee table
SELECT * FROM employee;
SELECT name, age, salary FROM employee WHERE department='IT';
SELECT COUNT(*) FROM employee WHERE salary > 50000;
SELECT AVG(salary) FROM employee WHERE department='Sales';
Q30. case decode difference
Decode and Case are SQL functions used for manipulating data.
Decode is used to replace a value with another value based on a condition.
Case is used to perform conditional logic and return a value based on the condition.
Decode is specific to Oracle databases while Case is more widely used.
Example of Decode: SELECT DECODE(column_name, 'value1', 'replacement1', 'value2', 'replacement2', 'default')
Example of Case: SELECT CASE WHEN column_name = 'value1' THEN 'replacement1' WHEN c...read more
Q31. SQL coding on different types of examples
SQL coding involves writing queries to retrieve, manipulate, and manage data in a database.
Use SELECT statement to retrieve data from a database
Use INSERT statement to add new data to a database
Use UPDATE statement to modify existing data in a database
Use DELETE statement to remove data from a database
Use JOIN statement to combine data from multiple tables
Q32. How to set wearables
To set wearables, you need to connect them to a compatible device, download the corresponding app, and follow the instructions for setup.
Connect the wearable device to a compatible smartphone or computer via Bluetooth or USB.
Download the corresponding app for the wearable device from the app store or official website.
Follow the on-screen instructions to create an account, pair the device, and customize settings.
Ensure the wearable device is charged and properly positioned on ...read more
Q33. Difference between keystore and trust store
Keystore stores private keys and certificates, while trust store stores only certificates.
Keystore is used to store private keys and certificates used for authentication and encryption
Trust store is used to store certificates from trusted entities for verifying the authenticity of remote servers
Keystore is used for SSL/TLS client authentication, while trust store is used for SSL/TLS server authentication
Examples: keystore.jks, truststore.jks
Q34. What are the features of Java?
Q35. procedure function difference
Procedures are a set of instructions executed sequentially, while functions return a value and can be called multiple times.
Procedures are used to perform a set of instructions in a specific order.
Functions are used to return a value and can be called multiple times.
Procedures do not return a value, while functions do.
Functions can have parameters, while procedures may or may not have parameters.
Q36. Which Architecture pattern you know
I know about Model-View-Controller (MVC), Model-View-Presenter (MVP), and Model-View-ViewModel (MVVM) architecture patterns.
MVC separates the application into three components: Model, View, and Controller.
MVP separates the application into three components: Model, View, and Presenter.
MVVM separates the application into three components: Model, View, and ViewModel.
MVC, MVP, and MVVM are all commonly used in Android development.
MVP and MVVM are often preferred over MVC due to t...read more
Q37. WHAT IS MATERIAL MASTER DATA?
Material master data is a central repository that stores all information about materials used in a company's production process.
Contains information like material description, unit of measure, price, vendor details, etc.
Helps in managing inventory, procurement, production planning, and other related processes.
Used in SAP MM module to track and control materials within the organization.
Q38. What is vendor master data?
Vendor master data is information about vendors stored in the system for procurement purposes.
Contains details such as vendor name, address, contact information, payment terms, etc.
Used in procurement processes to facilitate communication and transactions with vendors.
Helps in maintaining accurate records of vendor interactions and transactions.
Can include information on vendor performance, certifications, and compliance.
Example: Vendor code, vendor name, vendor address, paym...read more
Q39. What are your negative points?
Q40. Abstract vs interface
Abstract classes can have both abstract and non-abstract methods, while interfaces can only have abstract methods.
Abstract classes can have constructors, fields, and non-abstract methods.
Interfaces can only have abstract methods and constants.
A class can implement multiple interfaces, but can only inherit from one abstract class.
Abstract classes are used to define a common behavior for subclasses, while interfaces define a contract for classes to implement.
Q41. Stored procedure vs function
Stored procedures are precompiled SQL queries stored in the database, while functions are reusable blocks of code that return a value.
Stored procedures are used for executing a set of SQL statements, while functions are used to perform specific tasks and return a value.
Stored procedures can have input and output parameters, while functions always return a value.
Stored procedures can modify data in the database, while functions are read-only.
Stored procedures are stored in the...read more
Q42. What is procedure in odi
A procedure in ODI is a set of instructions or actions that are executed in a specific order to perform a specific task.
A procedure in ODI is created using the ODI Studio interface.
It can be used to perform various tasks such as data integration, data transformation, and data loading.
Procedures can be scheduled to run at specific times or triggered by events.
They can include multiple steps or actions, such as extracting data from a source, transforming it, and loading it into...read more
Q43. What is mapping in odi
Mapping in ODI is the process of defining the relationship between source and target data structures.
Mapping involves specifying the transformation rules to be applied to the source data.
It determines how the data will be extracted, transformed, and loaded into the target structure.
Mappings can be created using ODI's graphical interface or by writing code in ODI's declarative language.
Mappings can include various transformations such as filtering, joining, aggregating, and so...read more
Q44. What is package in odi
A package in ODI is a container that holds related objects and components for organizing and managing data integration processes.
Packages are used to group together related objects such as interfaces, procedures, variables, and more.
They provide a way to organize and manage data integration processes in ODI.
Packages can be used to define the execution order of objects within a process flow.
They can be scheduled for automatic execution or manually triggered.
Packages can be exp...read more
Q45. What is array and strings
Arrays are a collection of elements of the same data type, while strings are a sequence of characters.
Arrays can store multiple values in a single variable, accessed by index.
Strings are a special type of array that store sequences of characters.
Example: Array - [1, 2, 3], String - 'hello world'
Q46. What is oracle architecture
Oracle architecture refers to the structure and components of the Oracle database system.
Oracle architecture consists of physical and logical components.
Physical components include memory, storage, and processes.
Logical components include instances, databases, and schemas.
Oracle architecture follows a client-server model.
Example: Oracle architecture includes the Oracle Database, Oracle Instance, and Oracle Memory.
Q47. What is meant garbage collector
Garbage collector is a program that automatically frees up memory by identifying and deleting unused objects in a computer's memory.
Garbage collector is a part of a programming language's runtime system.
It helps prevent memory leaks by reclaiming memory occupied by objects that are no longer in use.
Examples include Java's garbage collector which runs in the background to manage memory allocation and deallocation.
Q48. What is power bi model views?
Power BI model views are visual representations of the data model structure in Power BI.
Power BI model views help users understand the relationships between tables, columns, and measures in the data model.
There are different types of model views such as Diagram View, Data View, and Relationship View.
Users can use model views to navigate and analyze the data model efficiently.
Model views can be customized to show specific information based on user requirements.
Q49. explain about the rac
RAC stands for Real Application Clusters, a feature of Oracle Database that allows multiple instances to access a single database simultaneously.
RAC enables high availability and scalability for Oracle databases.
It allows multiple instances to run on different servers, providing load balancing and failover capabilities.
RAC requires shared storage and a cluster interconnect for communication between instances.
Examples of RAC implementations include Oracle RAC One Node and Orac...read more
Q50. explain about the datagaurd
Data Guard is a high availability and disaster recovery solution provided by Oracle for Oracle databases.
Data Guard ensures high availability, data protection, and disaster recovery for Oracle databases.
It involves creating standby databases that are synchronized with the primary database to provide failover capabilities.
Data Guard can be configured in various modes such as Maximum Availability, Maximum Performance, and Maximum Protection.
It allows for automatic failover in c...read more
Q51. explain about the glodengate
GoldenGate is a data integration software product used for real-time data integration and replication.
GoldenGate allows for real-time data movement between heterogeneous systems.
It can be used for data replication, data synchronization, and data transformation.
GoldenGate supports various databases such as Oracle, SQL Server, MySQL, etc.
It provides high availability and data consistency during data integration processes.
Q52. Sql statement processing stages
SQL statement processing involves parsing, optimization, and execution.
Parsing: Breaking down the SQL statement into components like keywords, table names, and conditions.
Optimization: Creating an efficient execution plan based on indexes, statistics, and query structure.
Execution: Retrieving data from tables, applying filters, and returning results to the user.
Q53. Explain Public , private Procedure
Public and private procedures in PL/SQL control the visibility and accessibility of procedures within a package.
Public procedures can be accessed by other packages or programs outside the package.
Private procedures can only be accessed within the package where they are defined.
Public procedures are declared in the package specification using the 'PUBLIC' keyword.
Private procedures are declared in the package body without the 'PUBLIC' keyword.
Public procedures are typically us...read more
Q54. What is html and css
HTML and CSS are markup languages used for creating and styling web pages.
HTML stands for HyperText Markup Language and is used for structuring content on a web page.
CSS stands for Cascading Style Sheets and is used for styling the appearance of a web page.
HTML uses tags to define elements like headings, paragraphs, images, and links.
CSS allows for customization of colors, fonts, layout, and other visual aspects of a web page.
Q55. How SSL certificate works
SSL certificate encrypts data transmitted between a server and a client to ensure secure communication.
SSL certificate contains public key, private key, and information about the certificate holder.
When a client connects to a server, the server sends its SSL certificate to the client.
The client verifies the certificate's authenticity and uses the public key to encrypt data sent to the server.
The server uses its private key to decrypt the data received from the client.
SSL cert...read more
Q56. Datatypes in vba
VBA has various datatypes like Integer, String, Boolean, etc. for storing different types of values.
VBA datatypes include Integer, Long, Single, Double, String, Boolean, Date, Object, Variant, etc.
Use Integer for whole numbers, String for text, Boolean for true/false values, Date for dates, etc.
Example: Dim myInteger As Integer, myString As String, myBoolean As Boolean
Q57. Write a code of prime number
Code to check if a number is prime or not
Use a loop to check if the number is divisible by any number other than 1 and itself
If the number is only divisible by 1 and itself, it is a prime number
Example: Check if 7 is prime - loop from 2 to 6, no number divides 7 evenly
Q58. What is view, Installation
A view in MySQL is a virtual table created by a query. Installation refers to the process of setting up MySQL on a system.
A view is a saved query that acts as a virtual table in MySQL
Views can simplify complex queries by storing them for easy access
Installation of MySQL involves downloading the software, setting up configuration, and creating databases
Q59. What is normalisation?
Normalisation is the process of organizing data in a database to reduce redundancy and improve data integrity.
Normalisation involves breaking down data into smaller, more manageable tables
It helps in reducing data redundancy and inconsistencies
It ensures data integrity and improves database performance
Example: Splitting a customer table into separate tables for customer details and orders
Q60. What is DEVOPS?
Q61. What is scd in odi
SCD stands for Slowly Changing Dimensions. It is a technique used in ODI to handle changes in data over time.
SCD is used to track and manage changes in dimension tables
It helps in maintaining historical data and tracking changes in attributes
There are different types of SCDs, such as Type 1, Type 2, and Type 3
Type 1 SCD overwrites the existing data with the new data
Type 2 SCD creates a new record for each change and maintains a history
Type 3 SCD adds additional columns to tra...read more
Q62. Oops concept with example
Oops concept refers to Object-Oriented Programming principles like inheritance, encapsulation, polymorphism, and abstraction.
Inheritance: Allows a class to inherit properties and behavior from another class. Example: Parent class 'Animal' and child class 'Dog'.
Encapsulation: Bundling data and methods that operate on the data into a single unit. Example: Class 'Car' with private variables and public methods.
Polymorphism: Ability to present the same interface for different data...read more
Q63. what is oops , collection
OOPs (Object-Oriented Programming) is a programming paradigm based on the concept of objects, which can contain data and code.
OOPs focuses on creating reusable code by organizing it into objects that interact with each other.
Key principles of OOPs include encapsulation, inheritance, and polymorphism.
Collections in Java are data structures that store and manipulate groups of objects.
Examples of collections in Java include ArrayList, LinkedList, HashMap, and TreeSet.
Q64. 1)what is intent.
Intent is a messaging object used to request an action from another app component.
Intents facilitate communication between components in an app or between different apps.
They can be used to start activities, services, or broadcast receivers.
Intents can also carry data using extras and can specify the type of action to be performed using action and category.
Explicit intents specify the component to be invoked while implicit intents allow the system to determine the appropriate...read more
Q65. What is services
Services are background processes that run independently of the UI and can perform long-running operations.
Services are used to perform tasks that should continue even when the app is not in the foreground.
They can be started and stopped by the app or by the system.
Examples include playing music in the background, downloading files, and syncing data.
Services can be bound to activities to allow communication between them.
They can also be started as foreground services to show ...read more
Q66. What is Power Querry?
Q67. Security Constraints for Oracle Cloud.
Security constraints for Oracle Cloud include network security, data encryption, access controls, and auditing.
Network security measures such as firewalls and VPNs are used to protect data in transit.
Data encryption is utilized to secure data at rest, ensuring that sensitive information is not exposed.
Access controls are implemented to restrict unauthorized access to databases and resources.
Auditing tools are used to monitor and track user activities, helping to detect and pr...read more
Q68. Brif details about SQL , Linux
SQL is a database language used for managing and querying data. Linux is an open-source operating system known for its stability and security.
SQL stands for Structured Query Language and is used to communicate with databases.
SQL can be used to retrieve, update, and manipulate data in databases.
Linux is an open-source operating system that is widely used in servers and embedded systems.
Linux is known for its stability, security, and flexibility.
Both SQL and Linux are commonly ...read more
Q69. What are SQL joins?
SQL joins are used to combine rows from two or more tables based on a related column between them.
SQL joins are used to retrieve data from multiple tables based on a related column between them
Types of SQL joins include INNER JOIN, LEFT JOIN, RIGHT JOIN, and FULL JOIN
Example: SELECT * FROM table1 INNER JOIN table2 ON table1.column = table2.column
Q70. Linux commands and uses
Linux commands are used to interact with the operating system, perform tasks, manage files, and more.
ls - list directory contents
cd - change directory
pwd - print working directory
cp - copy files
mv - move files
rm - remove files
grep - search for specific text in files
chmod - change file permissions
sudo - execute a command as the superuser
top - display system processes and resource usage
Q71. Rac Startup sequence
RAC (Real Application Clusters) startup sequence involves starting the Oracle database instances on multiple nodes in a cluster.
Each node in the cluster starts its own Oracle database instance
The Oracle Clusterware manages the startup sequence to ensure proper coordination
The database instances communicate with each other to synchronize data and maintain consistency
Q72. Any gap during education
Yes, I took a gap year after completing my undergraduate degree to gain practical work experience in the field.
Took a gap year to gain practical work experience
Used the gap year to explore different aspects of production engineering
Acquired valuable skills and knowledge during the gap year
The gap year helped me make an informed decision about pursuing further education
Q73. Ready for relocation
Yes, I am open to relocation for the right opportunity.
I am willing to relocate for a better career opportunity
I am open to exploring new places and cultures
I understand that relocation may be necessary for certain positions
Top HR Questions asked in Creative Hands HR Consultancy
Interview Process at Creative Hands HR Consultancy
Top Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month