Coforge
40+ Tatva Interiors Interview Questions and Answers
Q1. What factors will be considered while using AWS Glue
Q2. will a transgender GirLs your niitvTechnologies Ltd.'s buy means purchase your companies full fledged working softwares and hardwares ? i have a doubt, because the females are EUNUCHS.they will most probably re...
read moreQ3. What are the reasons for using the Border Gateway Protocol (BGP)?
BGP is used for routing and exchanging routing information between different autonomous systems.
BGP allows for dynamic routing between different autonomous systems
It provides redundancy and load balancing by choosing the best path for data traffic
BGP helps in preventing network loops and ensuring efficient data routing
It is commonly used by Internet Service Providers (ISPs) to exchange routing information
BGP is essential for maintaining a stable and scalable internet infrastr...read more
Q4. How to post multiple object value from view to the controller
Q5. What are the configurations required in wireless networking?
Configurations required in wireless networking include SSID, security settings, encryption type, and channel selection.
Set up a unique SSID to identify the network
Choose appropriate security settings such as WPA2-PSK
Select encryption type like AES for secure data transmission
Optimize channel selection to avoid interference
Q6. Explain drawbacks of using AWS Lambda service
Q7. Explain Callback and callback hell? How to prevent callback hell?
Callback is a function passed as an argument to another function to be executed later. Callback hell is the nesting of multiple callbacks resulting in unreadable code.
Callback is a function passed as an argument to another function, to be executed later.
Callback hell occurs when multiple callbacks are nested, leading to unreadable and difficult to maintain code.
To prevent callback hell, use Promises, async/await, or modularize code into smaller functions.
Q8. Explain Event driven Architecture
Q9. Why we write WebDriver driver = new ChromeDriver();
To initialize a WebDriver object for controlling the Chrome browser.
To interact with the Chrome browser using Selenium WebDriver
To perform automated testing on web applications
To access the browser's functionalities and manipulate web elements
Q10. {cat, Act} & {mary, Army} are Anagrams or not? Write a program in Javascript.
Yes, {cat, Act} & {mary, Army} are anagrams.
Convert both words to lowercase to ignore case sensitivity.
Sort the characters in both words alphabetically.
Check if the sorted characters in both words are equal.
Q11. How routing and session enable in .net core
Q12. Explain how gradient boosted trees improves upon decision trees
Gradient boosted trees improve decision trees by combining multiple weak learners to create a strong learner.
Gradient boosted trees build trees sequentially, with each tree correcting errors made by the previous one
They use gradient descent to minimize the loss function, leading to better overall performance
By combining multiple trees, gradient boosted trees reduce overfitting and improve accuracy
Example: XGBoost, LightGBM, and CatBoost are popular implementations of gradient...read more
Q13. WAP to reverse a string without reversing the numbers and symbols in the string.
Reverse a string while keeping numbers and symbols in their original positions.
Iterate through the string and store the positions of numbers and symbols.
Reverse the string using a two-pointer approach.
Place the numbers and symbols back in their original positions.
Q14. what is the limitation of user agent flow integeration
Q15. what is crm and technical architecture explain of crm
Q16. Difference between var, let, and const in Javascript?
var is function scoped, let is block scoped, and const is block scoped with read-only values.
var is function scoped, meaning it is accessible throughout the function it is declared in.
let is block scoped, meaning it is only accessible within the block it is declared in.
const is block scoped like let, but the value cannot be reassigned.
Q17. What are the different types of VPNs?
Different types of VPNs include remote access VPN, site-to-site VPN, and client-to-site VPN.
Remote access VPN allows individual users to connect to a private network remotely.
Site-to-site VPN connects multiple networks together over the internet.
Client-to-site VPN allows individual devices to connect to a private network remotely.
Other types include MPLS VPN, SSL VPN, and IPsec VPN.
Q18. What is the purpose of native VLAN?
The purpose of native VLAN is to carry untagged traffic across a trunk link.
Native VLAN is used for untagged traffic on a trunk link
It allows devices that do not support VLAN tagging to communicate over the trunk link
Native VLAN should be the same on both ends of the trunk link to avoid VLAN hopping attacks
Q19. Do you have experience in HP Aruba Switches?
Yes, I have experience in configuring and managing HP Aruba Switches.
I have worked with HP Aruba Switches for over 2 years
I have configured VLANs, port security, and QoS on these switches
I have also troubleshooted and resolved network issues on these switches
I am familiar with the CLI and GUI interfaces of HP Aruba Switches
Q20. Explain Columnar format based Databases
Q21. What is Configure service in .net core
Q22. Implement SCD2 logic using Python/Pandas
Q23. What is interface? And why we use it?
An interface in software development is a contract that defines the methods that a class must implement.
Interfaces allow for multiple inheritance in programming languages that do not support it.
Interfaces provide a way to achieve abstraction in code, making it easier to maintain and extend.
Interfaces are used to define a set of methods that a class must implement, ensuring consistency and interoperability.
Example: Java interfaces are used to define methods that classes must i...read more
Q24. Assignment for adding web services in vue application
Q25. View and Proc vs Function and type of function
Q26. Types of trigger and explain insteadof trigger
Q27. Diff between temp table and variable
Q28. SQL SERVER performance tuning for DBA profile.
SQL Server performance tuning involves optimizing database design, query optimization, and server configuration.
Identify and optimize poorly performing queries
Ensure proper indexing and partitioning
Monitor server resources and adjust configuration as needed
Regularly analyze and optimize database design
Use tools like SQL Profiler and Database Engine Tuning Advisor
Consider implementing caching and compression techniques
Regularly review and adjust security settings
Collaborate wi...read more
Q29. What is a switch stack?
A switch stack is a group of network switches that are interconnected and operate as a single unit.
Switch stack simplifies network management by allowing multiple switches to be managed as one entity.
It provides high availability and redundancy by allowing one switch to take over if another fails.
Switch stack can also increase network performance by load balancing traffic across multiple switches.
Examples of switch stack technologies include Cisco StackWise, HP Intelligent Re...read more
Q30. Difference between cost function and loss function
Cost function is used to measure the cost of a single training example, while loss function is used to measure the overall performance of the model.
Cost function is used during the training process to update the model parameters, while loss function is used to evaluate the model's performance.
Cost function is typically a mathematical formula that calculates the error between predicted and actual values for a single training example.
Loss function is a more general term that ca...read more
Q31. diff between demon set and state full set
DaemonSet ensures a pod runs on all nodes, StatefulSet ensures ordered deployment and scaling of pods.
DaemonSet ensures a pod runs on all nodes in a cluster
StatefulSet ensures ordered deployment and scaling of pods
DaemonSet is typically used for monitoring or logging agents
StatefulSet is used for stateful applications like databases
Q32. Return type of .net core webapi
Q33. What is your ITIL process?
Q34. Do you have console access?
Yes, I have console access.
I have console access and can troubleshoot any issues remotely.
I can access the console through SSH or remote desktop.
Having console access allows me to perform maintenance tasks and updates.
Q35. Explan Design Pattern
Q36. Middleware in .net core
Q37. What is Hoisting?
Q38. disk full how to manage
To manage a disk full situation, you can identify large files, delete unnecessary files, clear cache, and resize partitions.
Identify large files taking up space using tools like du or ncdu.
Delete unnecessary files or move them to another storage device.
Clear cache to free up space, such as package cache or browser cache.
Resize partitions to allocate more space to the full disk.
Q39. what is graphql
Q40. Explain SOLID
Q41. Explain Closures?
Closures are functions that have access to their own scope, as well as the scope in which they were defined.
Closures allow functions to access variables from their parent function even after the parent function has finished executing.
Closures are created whenever a function is defined within another function.
Closures are commonly used in event handlers, callbacks, and in functional programming.
Q42. ES6 Features?
ES6 (ECMAScript 2015) introduced several new features to JavaScript, making the language more powerful and expressive.
Arrow functions for concise syntax: const add = (a, b) => a + b;
Let and const for block-scoped variables: let x = 5; const y = 10;
Template literals for string interpolation: const name = 'Alice'; console.log(`Hello, ${name}!`);
Destructuring assignment for easily extracting values from arrays or objects: const { firstName, lastName } = person;
Classes for object...read more
Q43. Routing in .net core
Q44. Explain the architect of k8's
Kubernetes (k8s) architecture is designed to be highly scalable, flexible, and resilient.
Kubernetes follows a master-slave architecture, with a master node managing the cluster and worker nodes running applications.
The master node consists of components like API server, scheduler, controller manager, and etcd for storing cluster data.
Worker nodes have components like kubelet, kube-proxy, and container runtime (e.g. Docker) to run and manage containers.
Kubernetes architecture ...read more
Q45. Process of cascading
Top HR Questions asked in Tatva Interiors
Interview Process at Tatva Interiors
Top Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month