Coforge
300+ Interview Questions and Answers
You are given a string 'STR'. The string contains [a-z] [A-Z] [0-9] [special characters]. You have to find the reverse of the string.
For example:
If the given string is: STR = "abcde". You hav...read more
Q2. Write a program to get a employee list whose salary is greater than 50k and grade is above from A, Use Java 8 stream to get the list
Program to get employee list with salary > 50k and grade above A using Java 8 stream
Create a list of employees with their salary and grade
Use Java 8 stream to filter employees with salary > 50k and grade above A
Return the filtered list of employees
Q3. Q1 why and when we have to use Inheritance . Q2 difference between fail safe and fail fast iterator Q3 Real life use Application of Linklist, stack, queue. Q4 Reverse a linklist using Recursion Q5 mega prime nu...
read moreInterview questions for Software Engineer position
Inheritance is used to create a new class from an existing class, to reuse code and add new functionality
Fail-safe iterators continue iterating even if there is a concurrent modification, while fail-fast iterators throw a ConcurrentModificationException
Linked lists are used in applications like music playlists, stacks are used in undo/redo functionality, and queues are used in job scheduling
To reverse a linked list using recur...read more
Q4. Explain Security authentication implementation and what are the delegation?
Security authentication implementation and delegation explained.
Security authentication is the process of verifying the identity of a user or system.
It involves the use of passwords, biometrics, tokens, or other methods to authenticate users.
Delegation is the process of granting a user or system the authority to perform certain actions on behalf of another user or system.
Examples of delegation include granting a user access to a file or folder, or allowing a system to access ...read more
Q5. coding question of finding index of 2 nos. having total equal to target in a list, without using nested for loop? l= [2,15,5,7] t= 9 output》》[0,3]
Finding index of 2 numbers having total equal to target in a list without nested for loop.
Use dictionary to store the difference between target and each element of list.
Iterate through list and check if element is in dictionary.
Return the indices of the two elements that add up to target.
Q6. How did you implemented the microservices in your project, What are the api monitoring mechanism which you have used.
Implemented microservices using Docker and Kubernetes. Used Prometheus and Grafana for API monitoring.
Implemented microservices architecture using Docker and Kubernetes
Used Prometheus and Grafana for monitoring API performance and availability
Configured alerts and dashboards in Grafana for real-time monitoring
Implemented distributed tracing using Jaeger for end-to-end visibility
Used Istio for service mesh and traffic management
Implemented circuit breaker pattern using Hystrix...read more
Q7. How did you configure Api gateway to manage your microservices?
I configured API Gateway using AWS Console and created APIs for each microservice.
Created a REST API in API Gateway
Configured each microservice as a resource in the API
Created methods for each resource and integrated with the microservice
Configured authorization and throttling settings
Deployed the API to a stage for testing and production
Used AWS SDKs or CLI to automate the process
Q8. Why we use declare expression and example, What is sub report
Declare expression is used to define reusable expressions. Sub report is a report within a report.
Declare expression helps in reducing redundancy and improving maintainability of the code.
It allows defining expressions that can be used across multiple rules and decision tables.
For example, a declare expression can be used to calculate the age of a customer based on their date of birth.
A sub report is a report that is embedded within another report.
It is used to display relate...read more
Q9. Give you an array of words. You have to reverse the words and they should be where they were at initially?
Reverse the words in an array without changing their positions.
Iterate through each word in the array and reverse them individually
Store the reversed words in a new array while maintaining the original positions
Return the new array with reversed words
What are the types of polymorphism?
How Does Garbage Collection in Java works?
Q12. How to fix code issues post migrations, give example?
To fix code issues post migrations, identify the root cause and apply appropriate fixes.
Identify the root cause of the issue
Check for any compatibility issues with the new environment
Apply appropriate fixes such as code changes or configuration updates
Test the fixes thoroughly before deploying to production
Document the issue and the fix for future reference
Q13. in a string there is alphabets as well as numbers, you have sum of those numbers which is in between of a string?
Sum of numbers in a string with alphabets.
Iterate through the string and check if each character is a number.
If it is a number, add it to a running total.
Return the total sum of all numbers in the string.
Q14. 1)Difference between findelement and find elements 2)Type of exception, name few in java and selenium.3) oops concept
Answering questions related to Selenium and Java for Senior Test Engineer position.
findelement returns the first matching element on the page while find elements returns a list of all matching elements
Some exceptions in Java and Selenium are NullPointerException, NoSuchElementException, TimeoutException, ElementNotVisibleException
Object-Oriented Programming (OOP) concepts include inheritance, encapsulation, abstraction, and polymorphism
Q15. Where do you declare connection string when using middleware
Declaring connection string in middleware
Connection string can be declared in appsettings.json file
It can also be declared in environment variables
Connection string can be injected using dependency injection
Middleware can access connection string from IConfiguration object
Q16. Adding port number as 0 for a service in Spring boot
Setting port number as 0 in Spring Boot for a service
Setting port number as 0 allows the operating system to choose an available port
This is useful when running multiple instances of the same service on the same machine
To set port number as 0 in Spring Boot, add 'server.port=0' to application.properties or application.yml
Q17. How to swap two integer values without using a third variable.
Swapping two integer values without using a third variable.
Use XOR operator to swap two integers without using a third variable.
Addition and subtraction can also be used to swap two integers.
Bitwise operations can also be used to swap two integers.
Q18. Given array of objects [{model: apple , price: 2000}, {model : apple , price : 1000}, {model: samsung , price: 500}] Return output as {apple : 1000, samsung :500} Ie flatten the array to map if model is same re...
read moreFlatten array of objects to map with minimum price for each model
Iterate through the array and create a map with model as key and minimum price as value
If model already exists in map, update the value with minimum price
Return the map as the output
What is a bandpass filter?
Q20. in a table there is 4-5 names, change the name of third person>>?
To change the name of the third person in a table with 4-5 names.
Access the table
Identify the third person's name
Replace the name with the new name
Q21. What is difference between mocking and stubbing
Mocking is creating a fake object with predefined behavior, while stubbing is providing a predefined response to a method call.
Mocking is used for testing behavior, while stubbing is used for testing state.
Mocking is more complex and involves creating a complete fake object, while stubbing is simpler and only involves providing a predefined response.
Mocking is used to test interactions between objects, while stubbing is used to test individual methods.
Example of mocking: crea...read more
Q22. What are distributes transactions and how these can be handled in microservices
Distributed transactions involve multiple systems coordinating to ensure data consistency across different services in a microservices architecture.
Distributed transactions involve multiple services or databases working together to ensure data consistency.
In microservices, handling distributed transactions can be challenging due to the decentralized nature of the architecture.
One approach to handling distributed transactions in microservices is using compensating transactions...read more
Q23. How the sales order will cancel which was already invoiced
The sales order can be cancelled by creating a credit memo against the invoice.
Create a credit memo against the invoice for the amount of the invoice.
Ensure that the credit memo is linked to the original sales order.
Update the sales order status to reflect the cancellation.
If any goods have already been shipped, ensure that they are returned and the inventory is updated.
If any payment has been received, issue a refund to the customer.
Q24. What are performance tuning approaches you followed
I followed various approaches like code optimization, database indexing, caching, and load balancing.
Identified and optimized slow database queries
Reduced network latency by implementing caching mechanisms
Implemented load balancing to distribute traffic evenly
Reduced code complexity and optimized algorithms
Used profiling tools to identify performance bottlenecks
What is cutoff frequency?
Q26. Impact of changing annotations on spring boot classes
Changing annotations on Spring Boot classes can have significant impact on the application.
Changing annotations can affect the behavior of the application
Annotations can control the lifecycle of beans, security, caching, etc.
Removing or modifying annotations can cause runtime errors
Adding new annotations can introduce new functionality
Annotations can affect the performance of the application
Q27. What do you consider while choosing between a SQL and nosql database.
Consider data structure, scalability, consistency, and query requirements when choosing between SQL and NoSQL databases.
Consider data structure - SQL for structured data, NoSQL for unstructured or semi-structured data
Scalability - NoSQL databases are more scalable horizontally
Consistency - SQL databases offer strong consistency, while NoSQL databases may offer eventual consistency
Query requirements - SQL for complex queries, NoSQL for simple queries or real-time data processi...read more
Q28. Difference between component and Directives
Components are reusable UI elements while directives are instructions to manipulate the DOM.
Components are self-contained and can be used multiple times in an application.
Directives are used to add behavior to an existing DOM element.
Components have their own template while directives do not.
Examples of components are buttons, forms, and menus while examples of directives are ngIf, ngFor, and ngStyle.
Q29. 1. infotest INFOTEST info How to do correlation that INFOTEST should print. 2. Knowledge in AWS 3. Difference between parametrization and correlation 4. Challanges in correlation in your previous projects 5. If...
read moreCorrelation in performance testing, AWS knowledge, parametrization vs correlation, challenges in correlation, motivating new customers for performance testing, using perfmon, rampup/rampdown/steady state, concurrent vs simultaneous users, matrices in HTML report
Correlation in performance testing ensures that the response time of different components in a system are correlated to each other
AWS knowledge is important for understanding cloud-based performance testing environment...read more
Q30. What factors will be considered while using AWS Glue
Q31. What is good exists or In in SQL queries
Good exists or In are SQL operators used to filter data based on a list of values.
Good exists operator checks if a subquery returns any rows, and returns true if it does.
In operator checks if a value matches any value in a list.
Both operators are used in the WHERE clause of a SQL query to filter data based on a list of values.
Example: SELECT * FROM table WHERE column_name EXISTS (SELECT * FROM another_table WHERE condition);
Example: SELECT * FROM table WHERE column_name IN (v...read more
Q32. Write program to filter employees using java streams
Program to filter employees using Java streams
Create a list of employees
Use stream() method to convert list to stream
Use filter() method to filter employees based on condition
Use collect() method to convert stream back to list
Q33. What is webdriver driver=new chrome driver()
The code initializes a new instance of the ChromeDriver class in Selenium WebDriver.
WebDriver is an interface in Selenium that provides methods for browser automation
ChromeDriver is a class that implements the WebDriver interface for Chrome browser
The 'new' keyword creates a new instance of the ChromeDriver class
The assignment 'driver = new ChromeDriver()' initializes the driver variable with the new instance
Q34. Architecture of Microservices, how to design, how to make one transaction, write simple program for Lambda expression, for streams API, sql queries etc.
Designing microservices architecture involves breaking down a monolithic application into smaller, independent services.
Identify business capabilities and define services around them
Use API gateways for routing and load balancing
Implement service discovery and registration
Ensure fault tolerance and scalability
Use event-driven architecture for communication between services
Implement distributed transactions using Saga pattern
Use containerization and orchestration tools like Do...read more
Q35. 1. Explain encapsulation, abstraction 2. Selenium locate dropdown question 3. Appium configuration questions
Interview questions for Automation Test Engineer on encapsulation, abstraction, Selenium dropdown and Appium configuration.
Encapsulation is the process of hiding implementation details from the user.
Abstraction is the process of hiding unnecessary details from the user.
Selenium can locate dropdown using Select class and its methods.
Appium configuration questions may include setting up desired capabilities, specifying app path, device name, platform name, etc.
Difference between Checked and Unchecked Exceptions
Q37. Difference between hashtable and dictionary
Hashtable and dictionary are both key-value pair data structures, but hashtable is a general term while dictionary is specific to Python.
Hashtable is a general term for a data structure that maps keys to values, while dictionary is a specific implementation of a hashtable in Python.
Hashtable is used in many programming languages, while dictionary is specific to Python.
Hashtable allows null values and null keys, while dictionary does not allow null keys.
Hashtable is thread-saf...read more
Q38. Ready to relocate any location or not?
Yes, I am willing to relocate for the right opportunity.
I am open to exploring new locations and cultures.
I understand that relocation may be necessary for career growth.
I am willing to consider factors such as cost of living and job market in the new location.
I am excited about the prospect of new challenges and experiences.
Q39. what is Investment banking ? what are derivatives ? what are options ? what is SEDOL & CUSIP?
Investment banking involves providing financial services to corporations, governments, and other institutions. Derivatives are financial instruments that derive their value from an underlying asset. Options are a type of derivative that give the holder the right, but not the obligation, to buy or sell an underlying asset at a predetermined price. SEDOL and CUSIP are codes used to identify securities.
Investment banking involves underwriting securities, providing advisory servi...read more
Q40. will a transgender GirLs your niitvTechnologies Ltd.'s buy means purchase your companies full fledged working softwares and hardwares ? i have a doubt, because the females are EUNUCHS.they will most probably re...
read moreQ41. What is the difference between 32bit and 64bit processor ?
32-bit processors can handle 2^32 bits of data at a time, while 64-bit processors can handle 2^64 bits of data at a time.
32-bit processors can address up to 4GB of RAM, while 64-bit processors can address much more.
64-bit processors are generally faster and more efficient than 32-bit processors.
64-bit processors can run both 32-bit and 64-bit applications, while 32-bit processors can only run 32-bit applications.
64-bit processors are required to run certain software, such as ...read more
Q42. Difference between observable and promise
Observables are streams of data that can be observed over time, while Promises are a one-time operation that returns a single value.
Observables can emit multiple values over time, while Promises can only emit a single value.
Observables can be cancelled, while Promises cannot be cancelled once they are initiated.
Observables are lazy, meaning they only execute when subscribed to, while Promises are eager and execute immediately upon creation.
Observables have operators that can ...read more
Q43. What is a component. What is a service How do you communicate between components.
Components are reusable and independent parts of an application. Services are functions that can be shared across components. Communication between components can be achieved through various methods.
Components are modular and can be easily replaced or updated
Services provide functionality that can be shared across components
Communication between components can be achieved through props, events, or a state management system like Redux
Components can be functional or class-based...read more
Q44. What is method over loading? What is method over riding ? What is explicit wait ? What is implicit wait ?
Method overloading is creating multiple methods with the same name but different parameters. Method overriding is creating a new implementation of an existing method in a subclass.
Method overloading is used to provide different ways to call the same method with different parameters.
Method overriding is used to provide a new implementation of an existing method in a subclass.
Explicit wait is a type of wait in Selenium WebDriver where the code waits for a specific condition to ...read more
What is SDLC?
Q46. How are you going to manage a transaction in office when there is no one to guide you due to some reasons no can can help you .
I would rely on my training and problem-solving skills to handle the transaction independently.
Assess the situation and identify the problem
Refer to any available resources such as manuals or procedures
Use critical thinking and analytical skills to come up with a solution
If necessary, seek assistance from higher-ups or colleagues
Document the process and outcome for future reference
Q47. Abstraction and encapsulation in c#
Abstraction and encapsulation are two fundamental concepts in object-oriented programming.
Abstraction is the process of hiding complex implementation details and exposing only the necessary information to the user.
Encapsulation is the process of wrapping data and code into a single unit, preventing direct access to the data from outside the unit.
In C#, abstraction can be achieved through abstract classes and interfaces.
Encapsulation can be achieved through access modifiers li...read more
Q48. what is the difference between stream and parallel stream
Stream is sequential while parallel stream is concurrent
Stream is a sequence of elements that can be processed sequentially
Parallel stream is a sequence of elements that can be processed concurrently
Parallel stream can improve performance for large datasets
Parallel stream uses multiple threads to process elements in parallel
Stream is suitable for small datasets or when order of processing is important
Q49. Code Reverse a String in any programming language of your choice.
Reverse a string using built-in function or loop through the string.
Use built-in function like reverse() in Python or loop through the string and swap characters.
In C++, use swap() function to swap characters in the string.
In Java, use StringBuilder class to reverse the string.
In JavaScript, use split(), reverse() and join() functions to reverse the string.
Difference between 32-bit and 64-bit operating systems
Q51. Explain the String Builder and String Buffer. Reverse a string without string builder and string buffer.
Explanation of String Builder and String Buffer and how to reverse a string without them.
String Builder and String Buffer are classes in Java used for manipulating strings efficiently.
String Builder is not thread-safe while String Buffer is thread-safe.
To reverse a string without String Builder or String Buffer, we can use a loop to iterate through the string and append each character to a new string in reverse order.
Example: String str = "hello"; String reversedStr = ""; for...read more
Q52. Which java version are you using in your project and what are the features in it
We are using Java 11 in our project, which includes features like local variable type inference, HTTP client API, and improved security.
Java 11 introduced local variable type inference, allowing the compiler to infer the type of a variable based on the initializer.
The HTTP client API in Java 11 provides a more modern and flexible way to send HTTP requests and handle responses.
Java 11 also includes improved security features, such as TLS 1.3 support and stronger algorithms for...read more
Q53. How to find the 3rd highest element in an unsorted array with duplicate using java 8.
Use Java 8 streams to find the 3rd highest element in an unsorted array with duplicates.
Convert the array to a stream using Arrays.stream()
Use distinct() to remove duplicates
Sort the stream in descending order using sorted(Comparator.reverseOrder())
Skip the first two elements using skip(2)
Find and return the third element using findFirst()
Q54. WAP to replace all vowels with char x in a given string
A program to replace all vowels with 'x' in a given string.
Iterate through each character in the string
Check if the character is a vowel (a, e, i, o, u)
If it is a vowel, replace it with 'x'
Return the modified string
Q55. Which spring boot version are you using in your project and what are the features in it
We are using Spring Boot version 2.5.2 in our project, which includes features like improved startup performance, enhanced actuator endpoints, and updated dependencies.
Spring Boot 2.5.2 offers improved startup performance compared to previous versions.
Enhanced actuator endpoints provide better monitoring and management capabilities.
Updated dependencies ensure compatibility with the latest libraries and frameworks.
Q56. What happens if your team members argue for a technical specification
Address the concerns and facilitate a discussion to reach a consensus
Encourage open communication and active listening among team members
Facilitate a discussion to understand the reasoning behind each team member's perspective
Help the team explore alternative solutions and weigh the pros and cons of each option
Guide the team towards reaching a consensus that aligns with the project goals and technical requirements
Q57. what is BDD? What is framework and explain in details
BDD stands for Behavior Driven Development, a software development methodology that focuses on collaboration and communication between stakeholders.
BDD involves defining the behavior of a system in plain language
Tests are written in a way that they can be understood by non-technical stakeholders
BDD frameworks like Cucumber and SpecFlow help in automating tests based on the defined behavior
BDD helps in ensuring that the software being developed meets the requirements and expec...read more
Q58. Tasks handled other than Scrum master responsibilities.
Handled tasks include project management, team coordination, stakeholder communication, and agile coaching.
Managed project timelines, budgets, and resources
Coordinated team efforts and facilitated collaboration
Communicated with stakeholders to ensure project alignment
Coached team members on agile principles and practices
Assisted with product backlog management and sprint planning
Identified and resolved impediments to team progress
Q59. SQL find 10 max salary from employee table , can use offset and limit Postgresql function
Use SQL query with OFFSET and LIMIT to find 10 max salaries from employee table in PostgreSQL.
Use ORDER BY clause to sort salaries in descending order
Use LIMIT 10 to get only the top 10 salaries
Use OFFSET 0 to start from the beginning of the sorted list
Q60. How many years of exp you have in java
I have 8 years of experience in Java.
I have worked on various Java projects including web applications, desktop applications, and mobile applications.
I am proficient in Java programming language and its related technologies such as Spring, Hibernate, and JPA.
I have experience in designing and developing scalable and maintainable Java applications.
I have also worked on integrating Java applications with other technologies such as databases, messaging systems, and web services.
Q61. How do you ensure proper participation from all stakeholders in Sprint Planning meeting?
To ensure proper participation from all stakeholders in Sprint Planning meeting, the Scrum Master can set clear expectations, create a collaborative environment, encourage open communication, and facilitate discussions.
Set clear expectations for the meeting agenda and goals
Create a collaborative environment where all stakeholders feel comfortable sharing their input
Encourage open communication and active participation from all team members
Facilitate discussions and ensure tha...read more
Q62. What has changed in Hash Map in java 8?
Hash Map in Java 8 has introduced several new features and improvements.
Hash Map now uses a balanced tree instead of a linked list for collision resolution when the number of elements in a bucket exceeds a certain threshold.
The new method 'computeIfAbsent' has been added to Hash Map which allows for a more concise way of adding new key-value pairs.
The 'forEach' method has been added to Hash Map which allows for iterating over all key-value pairs in the map.
The 'merge' method ...read more
Q63. What is the different between findElement and findElements ? What exceptions will both throw in case of element not found .
findElement is used to find a single element on a web page, while findElements is used to find multiple elements.
findElement returns a single WebElement, while findElements returns a list of WebElements.
findElement will throw NoSuchElementException if the element is not found, while findElements will return an empty list if no elements are found.
Example: WebElement element = driver.findElement(By.id("exampleId")); List
elements = driver.findElements(By.className("exampleClass...read more
Q64. Why is scrum master position has master word in it?
The term 'master' in Scrum Master signifies the role's expertise in guiding and coaching the team in the Scrum framework.
The term 'master' implies a level of expertise and knowledge in the subject matter.
The Scrum Master is responsible for guiding and coaching the team on Scrum practices and principles.
The role involves facilitating meetings, removing obstacles, and ensuring the team follows Scrum processes effectively.
The Scrum Master acts as a servant-leader, helping the te...read more
What is Inheritance?
Q66. 1) How decision tree works 2) what are the parameters used in OpenCV?
Decision tree is a tree-like model used for classification and regression. OpenCV parameters include image processing and feature detection.
Decision tree is a supervised learning algorithm that recursively splits the data into subsets based on the most significant attribute.
It is used for both classification and regression tasks.
OpenCV parameters include image processing techniques like smoothing, thresholding, and morphological operations.
Feature detection parameters include...read more
Q67. Singleton class in Java Why string is immutable in Java ? Difference between ArrayList & LinkedList What is IOC in Spring Find 3rd largest integer in integer array using streams in java. Java 8 nee features Sor...
read moreA set of interview questions for a Senior Java Developer position.
Singleton class in Java is a class that allows only one instance of itself to be created.
String is immutable in Java because it ensures thread safety and allows for efficient memory management.
ArrayList and LinkedList are both implementations of the List interface, but differ in their underlying data structure and performance characteristics.
IOC (Inversion of Control) in Spring is a design principle that allows...read more
Q68. Given string : I am java developer return 4 non repeting character
Find 4 non-repeating characters in the given string.
Create a hashmap to store character frequencies
Iterate through the string and count the occurrences of each character
Return the first 4 characters with frequency 1 as non-repeating characters
Q69. Thread pool executer fire 3 method in parallel and wait for all 3 to complete
Use a thread pool executor to execute 3 methods in parallel and wait for all 3 to complete.
Create a thread pool executor with a fixed number of threads.
Submit the 3 methods as tasks to the executor using the `submit()` method.
Use the `invokeAll()` method to wait for all tasks to complete.
Handle any exceptions thrown by the tasks.
Example: ThreadPoolExecutor executor = new ThreadPoolExecutor(3, 3, 0L, TimeUnit.MILLISECONDS, new LinkedBlockingQueue<>());
Example: Future task1 = e...read more
Q70. what is random forest, knn?
Random forest and KNN are machine learning algorithms used for classification and regression tasks.
Random forest is an ensemble learning method that constructs multiple decision trees and combines their outputs to make a final prediction.
KNN (k-nearest neighbors) is a non-parametric algorithm that classifies new data points based on the majority class of their k-nearest neighbors in the training set.
Random forest is useful for handling high-dimensional data and avoiding overf...read more
Q71. What is authorisation and authentication? What is the use of Auth key. Types of Auth key.
Authorization is the process of determining if a user has the permission to access a resource, while authentication is the process of verifying the identity of a user.
Authorization determines what a user can do, while authentication verifies who the user is.
Authentication can be done using passwords, biometrics, tokens, etc.
Authorization can be role-based, attribute-based, or rule-based.
Auth key is a unique identifier used for authentication purposes.
Types of Auth keys includ...read more
Q72. Why we use normalisation in database? Types of joins. Difference between DBMS and RDBMS. What is trigger?
Normalization is used in databases to reduce data redundancy and improve data integrity.
Normalization helps in organizing data in a database by eliminating redundant data and ensuring data integrity.
It reduces data redundancy by breaking down large tables into smaller ones and linking them using relationships.
Types of joins include inner join, outer join, left join, and right join.
DBMS stands for Database Management System, while RDBMS stands for Relational Database Managemen...read more
Q73. Differnce between ArrayList and LinkedList
ArrayList is implemented as a resizable array while LinkedList is implemented as a doubly linked list.
ArrayList provides constant time for accessing elements while LinkedList provides constant time for adding or removing elements.
ArrayList is better for storing and accessing data while LinkedList is better for manipulating data.
ArrayList is faster for iterating through elements while LinkedList is faster for adding or removing elements in the middle of the list.
Q74. find unique keys in 2 dictionaries
To find unique keys in 2 dictionaries.
Create a set of keys for each dictionary
Use set operations to find the unique keys
Return the unique keys
Q75. Explain IntArray & array, Reflection in Java, jvmStatic and Jvmoverload, What is deeplink, Launch modes
IntArray & array
IntArray & array
are used to define arrays in Kotlin, with IntArray being a specific type of array containing integers Reflection in Java allows for inspecting and modifying c...read more
Q76. @async annotation usage how to make async api
The @async annotation is used to make an API asynchronous.
Add the @async annotation to the method declaration
Use CompletableFuture or a similar mechanism to handle the asynchronous execution
Ensure the API returns a CompletableFuture or a similar asynchronous result
Q77. Attribute directives in angular
Attribute directives in Angular are used to modify the behavior or appearance of an element.
Attribute directives are used to change the behavior or appearance of an element based on the value of an attribute.
They are denoted by square brackets [] in the HTML template.
They can be used to add, remove or modify attributes of an element.
Examples include ngClass, ngStyle, and ngModel.
Q78. 1. What is weak, strong, reference cycle 2. Memory leak 3. Core data concept 4. Swift basics(Generics & all) 5. Concurrency
Questions related to programming concepts such as memory management, data storage, and concurrency.
Weak, strong, and reference cycles are concepts related to memory management in Swift.
Memory leaks occur when memory is allocated but not released, leading to performance issues.
Core Data is a framework used for data storage and management in iOS and macOS applications.
Swift basics include concepts such as generics, which allow for flexible and reusable code.
Concurrency refers t...read more
Q79. How to reverse the string in java
To reverse a string in Java, use the StringBuilder class and its reverse() method.
Create a StringBuilder object with the given string as its argument
Call the reverse() method on the StringBuilder object
Convert the StringBuilder object back to a string using the toString() method
Alternatively, you can use a loop to iterate through the characters of the string and append them to a new string in reverse order
Q80. How to post multiple object value from view to the controller
Q81. What is durable orchestration in Azure Function?
Durable orchestration in Azure Function allows for long-running, stateful workflows to be executed efficiently.
Durable orchestration enables developers to write stateful functions that can be paused and resumed at any point.
It provides features like checkpointing, error handling, and timeouts to ensure reliability.
By using durable functions, complex workflows can be easily implemented without the need for external orchestration services.
Example: A durable function can be used...read more
Q82. What is Dbms? and diffrent ddl dml commands?
DBMS stands for Database Management System. DDL commands are used to define the structure of the database, while DML commands are used to manipulate data.
DBMS is a software system that allows users to define, create, maintain, and control access to databases.
DDL (Data Definition Language) commands are used to define the structure of the database, such as creating tables, altering table structures, and deleting tables.
Examples of DDL commands include CREATE, ALTER, and DROP.
DM...read more
Q83. What is given,when ,then in api
Given-When-Then is a testing methodology used in API testing to define the preconditions, actions, and expected outcomes of a test case.
Given: Defines the preconditions or initial state of the system
When: Defines the actions or events that occur in the system
Then: Defines the expected outcomes or results of the actions taken
Q84. What will happen if we add another esxi within a cluster?
Adding another esxi within a cluster will increase the resources available for virtual machines and improve overall performance and redundancy.
Increased resources for virtual machines
Improved performance and redundancy
Enhanced scalability and flexibility
Better load balancing and failover capabilities
Q85. Explain different types of asserts used in Selenium
Different types of asserts used in Selenium include assert, verify, and waitForAssert
Assert: Stops the execution if the verification fails
Verify: Continues the execution even if the verification fails
waitForAssert: Waits for a certain condition to be true before proceeding
Q86. How do you prioritise delivery when you recieve multiple feedbacks ?
When receiving multiple feedbacks, prioritizing delivery involves considering the impact, urgency, and alignment with project goals.
Assess the impact of each feedback on the overall project objectives
Evaluate the urgency of each feedback based on deadlines and dependencies
Consider the alignment of each feedback with the project goals and priorities
Communicate with stakeholders to understand their expectations and priorities
Create a prioritization framework or matrix to object...read more
Q87. What is oops concept in automation
OOPs concept in automation refers to the use of object-oriented programming principles in designing and implementing automated tests.
Encapsulation: grouping related data and functions into a single unit (class) to hide implementation details
Inheritance: creating new classes from existing ones to reuse code and add new functionality
Polymorphism: using a single interface to represent multiple types of objects
Abstraction: focusing on essential features and ignoring implementatio...read more
Q88. Write a program to get header values xyz from a web api
Program to get header values xyz from a web api
Use a programming language that supports making HTTP requests, such as Python or JavaScript
Make a request to the web API and retrieve the response headers
Parse the headers to extract the value of the 'xyz' header
Q89. Programming Languages u worked on?
I have worked on multiple programming languages including Java, Python, C++, and JavaScript.
Proficient in Java and Python for backend development
Experience in C++ for competitive programming and algorithm development
Familiarity with JavaScript for frontend development and web applications
Q90. For security analyst what is cyber kill chain? Describe the cyber kill chain
The cyber kill chain is a framework used to describe the stages of a cyber attack, from initial reconnaissance to data exfiltration.
The cyber kill chain consists of seven stages: reconnaissance, weaponization, delivery, exploitation, installation, command and control, and actions on objectives.
Each stage represents a different step in the attack lifecycle, with the ultimate goal of achieving the attacker's objectives.
By understanding the cyber kill chain, security analysts ca...read more
Q91. What are different types of waits in selenium? Write code and explain its uses.
Types of waits in Selenium include Implicit Wait, Explicit Wait, and Fluent Wait.
Implicit Wait: Waits for a certain amount of time before throwing a NoSuchElementException.
Explicit Wait: Waits for a certain condition to be met before proceeding further in the code.
Fluent Wait: Waits for a condition to be met with a defined polling frequency.
Example: driver.manage().timeouts().implicitlyWait(10, TimeUnit.SECONDS);
Q92. Explain controls in standard order,cash sales
Controls in standard order for cash sales involve ensuring accuracy and security of transactions.
Verify the amount of cash received matches the sale amount
Ensure the cash is deposited in a secure location
Record the transaction in the sales ledger
Reconcile the cash register at the end of the day
Perform regular audits to detect any discrepancies
Q93. Different exceptions in Spring Boot
Spring Boot has various exceptions for different scenarios.
DataAccessException - for database access errors
HttpMessageNotReadableException - for errors in HTTP message conversion
MethodArgumentNotValidException - for validation errors in request parameters
NoSuchBeanDefinitionException - for errors in bean configuration
UnauthorizedException - for authentication and authorization errors
Q94. What is the difference between spark and hadoop
Spark is a fast and general-purpose cluster computing system, while Hadoop is a distributed processing framework.
Spark is designed for in-memory processing, while Hadoop is disk-based.
Spark provides real-time processing capabilities, while Hadoop is primarily used for batch processing.
Spark has a more flexible and expressive programming model compared to Hadoop's MapReduce.
Spark can be used with various data sources like HDFS, HBase, and more, while Hadoop is typically used w...read more
Q95. how did you do batch processing. why did you choose that technique
I used batch processing by breaking down large data sets into smaller chunks for easier processing.
Implemented batch processing using tools like Apache Spark or Hadoop
Chose batch processing for its ability to handle large volumes of data efficiently
Split data into smaller batches to process sequentially for better resource management
Q96. how will you handle 100 files of 100 GB size files in pyspark. Design end to end pipleline.
I will use PySpark to handle 100 files of 100 GB size in an end-to-end pipeline.
Use PySpark to distribute processing across a cluster of machines
Read files in parallel using SparkContext and SparkSession
Apply transformations and actions to process the data efficiently
Utilize caching and persisting to optimize performance
Implement fault tolerance and recovery mechanisms
Use appropriate data storage solutions like HDFS or cloud storage
Q97. How many feature file will be there
The number of feature files will depend on the project requirements and the level of granularity in test scenarios.
Number of feature files can vary based on the size and complexity of the project
Each feature file typically represents a specific functionality or feature being tested
Feature files can be organized based on modules, user stories, or test scenarios
Q98. what id Group and set in Tableau ?
Groups and sets are two ways to combine related data in Tableau for easier analysis and visualization.
Groups allow you to combine related dimension members into higher-level categories.
Sets are custom fields that define a subset of data based on conditions you specify.
Groups are static and cannot be changed once created, while sets are dynamic and can be updated based on filters or calculations.
Examples: Grouping states into regions (East, West, South, Midwest) using Groups. ...read more
Q99. What is Arraylist ,linkedlist,map,hastable
Arraylist, linkedlist, map, and hashtable are data structures used in programming.
Arraylist is a resizable array that can store any type of data.
Linkedlist is a collection of nodes that contain data and a reference to the next node.
Map is a collection of key-value pairs where each key is unique.
Hashtable is similar to a map but is synchronized and does not allow null keys or values.
Q100. For Senior analyst, If anyRansomeware attack how to handle the situation.
Immediately isolate infected systems, contain the spread, assess impact, restore from backups, and strengthen security measures.
Isolate infected systems to prevent further spread of the ransomware.
Contain the spread by disconnecting affected devices from the network.
Assess the impact by identifying which systems are affected and the extent of the damage.
Restore from backups to recover data and systems to a pre-attack state.
Strengthen security measures by updating software, im...read more
Top HR Questions asked in null
Interview Process at null
Top Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month