Add office photos
Engaged Employer

Coforge

3.4
based on 4.4k Reviews
Filter interviews by

300+ Interview Questions and Answers

Updated 29 Nov 2024
Popular Designations
Q1. Reverse a string

You are given a string 'STR'. The string contains [a-z] [A-Z] [0-9] [special characters]. You have to find the reverse of the string.

For example:

 If the given string is: STR = "abcde". You hav...read more
View 3 more answers

Q2. Write a program to get a employee list whose salary is greater than 50k and grade is above from A, Use Java 8 stream to get the list

Ans.

Program to get employee list with salary > 50k and grade above A using Java 8 stream

  • Create a list of employees with their salary and grade

  • Use Java 8 stream to filter employees with salary > 50k and grade above A

  • Return the filtered list of employees

View 1 answer

Q3. Q1 why and when we have to use Inheritance . Q2 difference between fail safe and fail fast iterator Q3 Real life use Application of Linklist, stack, queue. Q4 Reverse a linklist using Recursion Q5 mega prime nu...

read more
Ans.

Interview questions for Software Engineer position

  • Inheritance is used to create a new class from an existing class, to reuse code and add new functionality

  • Fail-safe iterators continue iterating even if there is a concurrent modification, while fail-fast iterators throw a ConcurrentModificationException

  • Linked lists are used in applications like music playlists, stacks are used in undo/redo functionality, and queues are used in job scheduling

  • To reverse a linked list using recur...read more

View 1 answer

Q4. Explain Security authentication implementation and what are the delegation?

Ans.

Security authentication implementation and delegation explained.

  • Security authentication is the process of verifying the identity of a user or system.

  • It involves the use of passwords, biometrics, tokens, or other methods to authenticate users.

  • Delegation is the process of granting a user or system the authority to perform certain actions on behalf of another user or system.

  • Examples of delegation include granting a user access to a file or folder, or allowing a system to access ...read more

Add your answer
Discover null interview dos and don'ts from real experiences

Q5. coding question of finding index of 2 nos. having total equal to target in a list, without using nested for loop? l= [2,15,5,7] t= 9 output》》[0,3]

Ans.

Finding index of 2 numbers having total equal to target in a list without nested for loop.

  • Use dictionary to store the difference between target and each element of list.

  • Iterate through list and check if element is in dictionary.

  • Return the indices of the two elements that add up to target.

Add your answer

Q6. How did you implemented the microservices in your project, What are the api monitoring mechanism which you have used.

Ans.

Implemented microservices using Docker and Kubernetes. Used Prometheus and Grafana for API monitoring.

  • Implemented microservices architecture using Docker and Kubernetes

  • Used Prometheus and Grafana for monitoring API performance and availability

  • Configured alerts and dashboards in Grafana for real-time monitoring

  • Implemented distributed tracing using Jaeger for end-to-end visibility

  • Used Istio for service mesh and traffic management

  • Implemented circuit breaker pattern using Hystrix...read more

Add your answer
Are these interview questions helpful?

Q7. How did you configure Api gateway to manage your microservices?

Ans.

I configured API Gateway using AWS Console and created APIs for each microservice.

  • Created a REST API in API Gateway

  • Configured each microservice as a resource in the API

  • Created methods for each resource and integrated with the microservice

  • Configured authorization and throttling settings

  • Deployed the API to a stage for testing and production

  • Used AWS SDKs or CLI to automate the process

Add your answer

Q8. Why we use declare expression and example, What is sub report

Ans.

Declare expression is used to define reusable expressions. Sub report is a report within a report.

  • Declare expression helps in reducing redundancy and improving maintainability of the code.

  • It allows defining expressions that can be used across multiple rules and decision tables.

  • For example, a declare expression can be used to calculate the age of a customer based on their date of birth.

  • A sub report is a report that is embedded within another report.

  • It is used to display relate...read more

Add your answer
Share interview questions and help millions of jobseekers 🌟

Q9. Give you an array of words. You have to reverse the words and they should be where they were at initially?

Ans.

Reverse the words in an array without changing their positions.

  • Iterate through each word in the array and reverse them individually

  • Store the reversed words in a new array while maintaining the original positions

  • Return the new array with reversed words

View 1 answer
Q10. OOPS Question

What are the types of polymorphism?

Add your answer
Q11. Java Question

How Does Garbage Collection in Java works?

Add your answer

Q12. How to fix code issues post migrations, give example?

Ans.

To fix code issues post migrations, identify the root cause and apply appropriate fixes.

  • Identify the root cause of the issue

  • Check for any compatibility issues with the new environment

  • Apply appropriate fixes such as code changes or configuration updates

  • Test the fixes thoroughly before deploying to production

  • Document the issue and the fix for future reference

Add your answer

Q13. in a string there is alphabets as well as numbers, you have sum of those numbers which is in between of a string?

Ans.

Sum of numbers in a string with alphabets.

  • Iterate through the string and check if each character is a number.

  • If it is a number, add it to a running total.

  • Return the total sum of all numbers in the string.

Add your answer

Q14. 1)Difference between findelement and find elements 2)Type of exception, name few in java and selenium.3) oops concept

Ans.

Answering questions related to Selenium and Java for Senior Test Engineer position.

  • findelement returns the first matching element on the page while find elements returns a list of all matching elements

  • Some exceptions in Java and Selenium are NullPointerException, NoSuchElementException, TimeoutException, ElementNotVisibleException

  • Object-Oriented Programming (OOP) concepts include inheritance, encapsulation, abstraction, and polymorphism

Add your answer

Q15. Where do you declare connection string when using middleware

Ans.

Declaring connection string in middleware

  • Connection string can be declared in appsettings.json file

  • It can also be declared in environment variables

  • Connection string can be injected using dependency injection

  • Middleware can access connection string from IConfiguration object

Add your answer

Q16. Adding port number as 0 for a service in Spring boot

Ans.

Setting port number as 0 in Spring Boot for a service

  • Setting port number as 0 allows the operating system to choose an available port

  • This is useful when running multiple instances of the same service on the same machine

  • To set port number as 0 in Spring Boot, add 'server.port=0' to application.properties or application.yml

Add your answer

Q17. How to swap two integer values without using a third variable.

Ans.

Swapping two integer values without using a third variable.

  • Use XOR operator to swap two integers without using a third variable.

  • Addition and subtraction can also be used to swap two integers.

  • Bitwise operations can also be used to swap two integers.

View 2 more answers

Q18. Given array of objects [{model: apple , price: 2000}, {model : apple , price : 1000}, {model: samsung , price: 500}] Return output as {apple : 1000, samsung :500} Ie flatten the array to map if model is same re...

read more
Ans.

Flatten array of objects to map with minimum price for each model

  • Iterate through the array and create a map with model as key and minimum price as value

  • If model already exists in map, update the value with minimum price

  • Return the map as the output

Add your answer
Q19. Communication Systems Question

What is a bandpass filter?

View 2 more answers

Q20. in a table there is 4-5 names, change the name of third person>>?

Ans.

To change the name of the third person in a table with 4-5 names.

  • Access the table

  • Identify the third person's name

  • Replace the name with the new name

View 2 more answers

Q21. What is difference between mocking and stubbing

Ans.

Mocking is creating a fake object with predefined behavior, while stubbing is providing a predefined response to a method call.

  • Mocking is used for testing behavior, while stubbing is used for testing state.

  • Mocking is more complex and involves creating a complete fake object, while stubbing is simpler and only involves providing a predefined response.

  • Mocking is used to test interactions between objects, while stubbing is used to test individual methods.

  • Example of mocking: crea...read more

Add your answer

Q22. What are distributes transactions and how these can be handled in microservices

Ans.

Distributed transactions involve multiple systems coordinating to ensure data consistency across different services in a microservices architecture.

  • Distributed transactions involve multiple services or databases working together to ensure data consistency.

  • In microservices, handling distributed transactions can be challenging due to the decentralized nature of the architecture.

  • One approach to handling distributed transactions in microservices is using compensating transactions...read more

Add your answer

Q23. How the sales order will cancel which was already invoiced

Ans.

The sales order can be cancelled by creating a credit memo against the invoice.

  • Create a credit memo against the invoice for the amount of the invoice.

  • Ensure that the credit memo is linked to the original sales order.

  • Update the sales order status to reflect the cancellation.

  • If any goods have already been shipped, ensure that they are returned and the inventory is updated.

  • If any payment has been received, issue a refund to the customer.

Add your answer

Q24. What are performance tuning approaches you followed

Ans.

I followed various approaches like code optimization, database indexing, caching, and load balancing.

  • Identified and optimized slow database queries

  • Reduced network latency by implementing caching mechanisms

  • Implemented load balancing to distribute traffic evenly

  • Reduced code complexity and optimized algorithms

  • Used profiling tools to identify performance bottlenecks

Add your answer
Q25. Communication Systems Question

What is cutoff frequency?

Add your answer

Q26. Impact of changing annotations on spring boot classes

Ans.

Changing annotations on Spring Boot classes can have significant impact on the application.

  • Changing annotations can affect the behavior of the application

  • Annotations can control the lifecycle of beans, security, caching, etc.

  • Removing or modifying annotations can cause runtime errors

  • Adding new annotations can introduce new functionality

  • Annotations can affect the performance of the application

Add your answer

Q27. What do you consider while choosing between a SQL and nosql database.

Ans.

Consider data structure, scalability, consistency, and query requirements when choosing between SQL and NoSQL databases.

  • Consider data structure - SQL for structured data, NoSQL for unstructured or semi-structured data

  • Scalability - NoSQL databases are more scalable horizontally

  • Consistency - SQL databases offer strong consistency, while NoSQL databases may offer eventual consistency

  • Query requirements - SQL for complex queries, NoSQL for simple queries or real-time data processi...read more

Add your answer

Q28. Difference between component and Directives

Ans.

Components are reusable UI elements while directives are instructions to manipulate the DOM.

  • Components are self-contained and can be used multiple times in an application.

  • Directives are used to add behavior to an existing DOM element.

  • Components have their own template while directives do not.

  • Examples of components are buttons, forms, and menus while examples of directives are ngIf, ngFor, and ngStyle.

Add your answer

Q29. 1. infotest INFOTEST info How to do correlation that INFOTEST should print. 2. Knowledge in AWS 3. Difference between parametrization and correlation 4. Challanges in correlation in your previous projects 5. If...

read more
Ans.

Correlation in performance testing, AWS knowledge, parametrization vs correlation, challenges in correlation, motivating new customers for performance testing, using perfmon, rampup/rampdown/steady state, concurrent vs simultaneous users, matrices in HTML report

  • Correlation in performance testing ensures that the response time of different components in a system are correlated to each other

  • AWS knowledge is important for understanding cloud-based performance testing environment...read more

Add your answer

Q30. What factors will be considered while using AWS Glue

Add your answer

Q31. What is good exists or In in SQL queries

Ans.

Good exists or In are SQL operators used to filter data based on a list of values.

  • Good exists operator checks if a subquery returns any rows, and returns true if it does.

  • In operator checks if a value matches any value in a list.

  • Both operators are used in the WHERE clause of a SQL query to filter data based on a list of values.

  • Example: SELECT * FROM table WHERE column_name EXISTS (SELECT * FROM another_table WHERE condition);

  • Example: SELECT * FROM table WHERE column_name IN (v...read more

Add your answer

Q32. Write program to filter employees using java streams

Ans.

Program to filter employees using Java streams

  • Create a list of employees

  • Use stream() method to convert list to stream

  • Use filter() method to filter employees based on condition

  • Use collect() method to convert stream back to list

Add your answer

Q33. What is webdriver driver=new chrome driver()

Ans.

The code initializes a new instance of the ChromeDriver class in Selenium WebDriver.

  • WebDriver is an interface in Selenium that provides methods for browser automation

  • ChromeDriver is a class that implements the WebDriver interface for Chrome browser

  • The 'new' keyword creates a new instance of the ChromeDriver class

  • The assignment 'driver = new ChromeDriver()' initializes the driver variable with the new instance

View 1 answer

Q34. Architecture of Microservices, how to design, how to make one transaction, write simple program for Lambda expression, for streams API, sql queries etc.

Ans.

Designing microservices architecture involves breaking down a monolithic application into smaller, independent services.

  • Identify business capabilities and define services around them

  • Use API gateways for routing and load balancing

  • Implement service discovery and registration

  • Ensure fault tolerance and scalability

  • Use event-driven architecture for communication between services

  • Implement distributed transactions using Saga pattern

  • Use containerization and orchestration tools like Do...read more

Add your answer

Q35. 1. Explain encapsulation, abstraction 2. Selenium locate dropdown question 3. Appium configuration questions

Ans.

Interview questions for Automation Test Engineer on encapsulation, abstraction, Selenium dropdown and Appium configuration.

  • Encapsulation is the process of hiding implementation details from the user.

  • Abstraction is the process of hiding unnecessary details from the user.

  • Selenium can locate dropdown using Select class and its methods.

  • Appium configuration questions may include setting up desired capabilities, specifying app path, device name, platform name, etc.

Add your answer
Q36. Java Question

Difference between Checked and Unchecked Exceptions

Add your answer

Q37. Difference between hashtable and dictionary

Ans.

Hashtable and dictionary are both key-value pair data structures, but hashtable is a general term while dictionary is specific to Python.

  • Hashtable is a general term for a data structure that maps keys to values, while dictionary is a specific implementation of a hashtable in Python.

  • Hashtable is used in many programming languages, while dictionary is specific to Python.

  • Hashtable allows null values and null keys, while dictionary does not allow null keys.

  • Hashtable is thread-saf...read more

Add your answer

Q38. Ready to relocate any location or not?

Ans.

Yes, I am willing to relocate for the right opportunity.

  • I am open to exploring new locations and cultures.

  • I understand that relocation may be necessary for career growth.

  • I am willing to consider factors such as cost of living and job market in the new location.

  • I am excited about the prospect of new challenges and experiences.

View 2 more answers

Q39. what is Investment banking ? what are derivatives ? what are options ? what is SEDOL & CUSIP?

Ans.

Investment banking involves providing financial services to corporations, governments, and other institutions. Derivatives are financial instruments that derive their value from an underlying asset. Options are a type of derivative that give the holder the right, but not the obligation, to buy or sell an underlying asset at a predetermined price. SEDOL and CUSIP are codes used to identify securities.

  • Investment banking involves underwriting securities, providing advisory servi...read more

Add your answer

Q40. will a transgender GirLs your niitvTechnologies Ltd.'s buy means purchase your companies full fledged working softwares and hardwares ? i have a doubt, because the females are EUNUCHS.they will most probably re...

read more
Add your answer

Q41. What is the difference between 32bit and 64bit processor ?

Ans.

32-bit processors can handle 2^32 bits of data at a time, while 64-bit processors can handle 2^64 bits of data at a time.

  • 32-bit processors can address up to 4GB of RAM, while 64-bit processors can address much more.

  • 64-bit processors are generally faster and more efficient than 32-bit processors.

  • 64-bit processors can run both 32-bit and 64-bit applications, while 32-bit processors can only run 32-bit applications.

  • 64-bit processors are required to run certain software, such as ...read more

Add your answer

Q42. Difference between observable and promise

Ans.

Observables are streams of data that can be observed over time, while Promises are a one-time operation that returns a single value.

  • Observables can emit multiple values over time, while Promises can only emit a single value.

  • Observables can be cancelled, while Promises cannot be cancelled once they are initiated.

  • Observables are lazy, meaning they only execute when subscribed to, while Promises are eager and execute immediately upon creation.

  • Observables have operators that can ...read more

Add your answer

Q43. What is a component. What is a service How do you communicate between components.

Ans.

Components are reusable and independent parts of an application. Services are functions that can be shared across components. Communication between components can be achieved through various methods.

  • Components are modular and can be easily replaced or updated

  • Services provide functionality that can be shared across components

  • Communication between components can be achieved through props, events, or a state management system like Redux

  • Components can be functional or class-based...read more

Add your answer

Q44. What is method over loading? What is method over riding ? What is explicit wait ? What is implicit wait ?

Ans.

Method overloading is creating multiple methods with the same name but different parameters. Method overriding is creating a new implementation of an existing method in a subclass.

  • Method overloading is used to provide different ways to call the same method with different parameters.

  • Method overriding is used to provide a new implementation of an existing method in a subclass.

  • Explicit wait is a type of wait in Selenium WebDriver where the code waits for a specific condition to ...read more

Add your answer
Q45. Software Engineering Question

What is SDLC?

Add your answer

Q46. How are you going to manage a transaction in office when there is no one to guide you due to some reasons no can can help you .

Ans.

I would rely on my training and problem-solving skills to handle the transaction independently.

  • Assess the situation and identify the problem

  • Refer to any available resources such as manuals or procedures

  • Use critical thinking and analytical skills to come up with a solution

  • If necessary, seek assistance from higher-ups or colleagues

  • Document the process and outcome for future reference

Add your answer

Q47. Abstraction and encapsulation in c#

Ans.

Abstraction and encapsulation are two fundamental concepts in object-oriented programming.

  • Abstraction is the process of hiding complex implementation details and exposing only the necessary information to the user.

  • Encapsulation is the process of wrapping data and code into a single unit, preventing direct access to the data from outside the unit.

  • In C#, abstraction can be achieved through abstract classes and interfaces.

  • Encapsulation can be achieved through access modifiers li...read more

Add your answer

Q48. what is the difference between stream and parallel stream

Ans.

Stream is sequential while parallel stream is concurrent

  • Stream is a sequence of elements that can be processed sequentially

  • Parallel stream is a sequence of elements that can be processed concurrently

  • Parallel stream can improve performance for large datasets

  • Parallel stream uses multiple threads to process elements in parallel

  • Stream is suitable for small datasets or when order of processing is important

Add your answer

Q49. Code Reverse a String in any programming language of your choice.

Ans.

Reverse a string using built-in function or loop through the string.

  • Use built-in function like reverse() in Python or loop through the string and swap characters.

  • In C++, use swap() function to swap characters in the string.

  • In Java, use StringBuilder class to reverse the string.

  • In JavaScript, use split(), reverse() and join() functions to reverse the string.

Add your answer
Q50. Operating System Question

Difference between 32-bit and 64-bit operating systems

Add your answer

Q51. Explain the String Builder and String Buffer. Reverse a string without string builder and string buffer.

Ans.

Explanation of String Builder and String Buffer and how to reverse a string without them.

  • String Builder and String Buffer are classes in Java used for manipulating strings efficiently.

  • String Builder is not thread-safe while String Buffer is thread-safe.

  • To reverse a string without String Builder or String Buffer, we can use a loop to iterate through the string and append each character to a new string in reverse order.

  • Example: String str = "hello"; String reversedStr = ""; for...read more

Add your answer

Q52. Which java version are you using in your project and what are the features in it

Ans.

We are using Java 11 in our project, which includes features like local variable type inference, HTTP client API, and improved security.

  • Java 11 introduced local variable type inference, allowing the compiler to infer the type of a variable based on the initializer.

  • The HTTP client API in Java 11 provides a more modern and flexible way to send HTTP requests and handle responses.

  • Java 11 also includes improved security features, such as TLS 1.3 support and stronger algorithms for...read more

Add your answer

Q53. How to find the 3rd highest element in an unsorted array with duplicate using java 8.

Ans.

Use Java 8 streams to find the 3rd highest element in an unsorted array with duplicates.

  • Convert the array to a stream using Arrays.stream()

  • Use distinct() to remove duplicates

  • Sort the stream in descending order using sorted(Comparator.reverseOrder())

  • Skip the first two elements using skip(2)

  • Find and return the third element using findFirst()

Add your answer

Q54. WAP to replace all vowels with char x in a given string

Ans.

A program to replace all vowels with 'x' in a given string.

  • Iterate through each character in the string

  • Check if the character is a vowel (a, e, i, o, u)

  • If it is a vowel, replace it with 'x'

  • Return the modified string

Add your answer

Q55. Which spring boot version are you using in your project and what are the features in it

Ans.

We are using Spring Boot version 2.5.2 in our project, which includes features like improved startup performance, enhanced actuator endpoints, and updated dependencies.

  • Spring Boot 2.5.2 offers improved startup performance compared to previous versions.

  • Enhanced actuator endpoints provide better monitoring and management capabilities.

  • Updated dependencies ensure compatibility with the latest libraries and frameworks.

Add your answer

Q56. What happens if your team members argue for a technical specification

Ans.

Address the concerns and facilitate a discussion to reach a consensus

  • Encourage open communication and active listening among team members

  • Facilitate a discussion to understand the reasoning behind each team member's perspective

  • Help the team explore alternative solutions and weigh the pros and cons of each option

  • Guide the team towards reaching a consensus that aligns with the project goals and technical requirements

Add your answer

Q57. what is BDD? What is framework and explain in details

Ans.

BDD stands for Behavior Driven Development, a software development methodology that focuses on collaboration and communication between stakeholders.

  • BDD involves defining the behavior of a system in plain language

  • Tests are written in a way that they can be understood by non-technical stakeholders

  • BDD frameworks like Cucumber and SpecFlow help in automating tests based on the defined behavior

  • BDD helps in ensuring that the software being developed meets the requirements and expec...read more

Add your answer

Q58. Tasks handled other than Scrum master responsibilities.

Ans.

Handled tasks include project management, team coordination, stakeholder communication, and agile coaching.

  • Managed project timelines, budgets, and resources

  • Coordinated team efforts and facilitated collaboration

  • Communicated with stakeholders to ensure project alignment

  • Coached team members on agile principles and practices

  • Assisted with product backlog management and sprint planning

  • Identified and resolved impediments to team progress

Add your answer

Q59. SQL find 10 max salary from employee table , can use offset and limit Postgresql function

Ans.

Use SQL query with OFFSET and LIMIT to find 10 max salaries from employee table in PostgreSQL.

  • Use ORDER BY clause to sort salaries in descending order

  • Use LIMIT 10 to get only the top 10 salaries

  • Use OFFSET 0 to start from the beginning of the sorted list

View 1 answer

Q60. How many years of exp you have in java

Ans.

I have 8 years of experience in Java.

  • I have worked on various Java projects including web applications, desktop applications, and mobile applications.

  • I am proficient in Java programming language and its related technologies such as Spring, Hibernate, and JPA.

  • I have experience in designing and developing scalable and maintainable Java applications.

  • I have also worked on integrating Java applications with other technologies such as databases, messaging systems, and web services.

Add your answer

Q61. How do you ensure proper participation from all stakeholders in Sprint Planning meeting?

Ans.

To ensure proper participation from all stakeholders in Sprint Planning meeting, the Scrum Master can set clear expectations, create a collaborative environment, encourage open communication, and facilitate discussions.

  • Set clear expectations for the meeting agenda and goals

  • Create a collaborative environment where all stakeholders feel comfortable sharing their input

  • Encourage open communication and active participation from all team members

  • Facilitate discussions and ensure tha...read more

Add your answer

Q62. What has changed in Hash Map in java 8?

Ans.

Hash Map in Java 8 has introduced several new features and improvements.

  • Hash Map now uses a balanced tree instead of a linked list for collision resolution when the number of elements in a bucket exceeds a certain threshold.

  • The new method 'computeIfAbsent' has been added to Hash Map which allows for a more concise way of adding new key-value pairs.

  • The 'forEach' method has been added to Hash Map which allows for iterating over all key-value pairs in the map.

  • The 'merge' method ...read more

Add your answer

Q63. What is the different between findElement and findElements ? What exceptions will both throw in case of element not found .

Ans.

findElement is used to find a single element on a web page, while findElements is used to find multiple elements.

  • findElement returns a single WebElement, while findElements returns a list of WebElements.

  • findElement will throw NoSuchElementException if the element is not found, while findElements will return an empty list if no elements are found.

  • Example: WebElement element = driver.findElement(By.id("exampleId")); List elements = driver.findElements(By.className("exampleClass...read more

Add your answer

Q64. Why is scrum master position has master word in it?

Ans.

The term 'master' in Scrum Master signifies the role's expertise in guiding and coaching the team in the Scrum framework.

  • The term 'master' implies a level of expertise and knowledge in the subject matter.

  • The Scrum Master is responsible for guiding and coaching the team on Scrum practices and principles.

  • The role involves facilitating meetings, removing obstacles, and ensuring the team follows Scrum processes effectively.

  • The Scrum Master acts as a servant-leader, helping the te...read more

Add your answer
Q65. OOPS Question

What is Inheritance?

Add your answer

Q66. 1) How decision tree works 2) what are the parameters used in OpenCV?

Ans.

Decision tree is a tree-like model used for classification and regression. OpenCV parameters include image processing and feature detection.

  • Decision tree is a supervised learning algorithm that recursively splits the data into subsets based on the most significant attribute.

  • It is used for both classification and regression tasks.

  • OpenCV parameters include image processing techniques like smoothing, thresholding, and morphological operations.

  • Feature detection parameters include...read more

Add your answer

Q67. Singleton class in Java Why string is immutable in Java ? Difference between ArrayList & LinkedList What is IOC in Spring Find 3rd largest integer in integer array using streams in java. Java 8 nee features Sor...

read more
Ans.

A set of interview questions for a Senior Java Developer position.

  • Singleton class in Java is a class that allows only one instance of itself to be created.

  • String is immutable in Java because it ensures thread safety and allows for efficient memory management.

  • ArrayList and LinkedList are both implementations of the List interface, but differ in their underlying data structure and performance characteristics.

  • IOC (Inversion of Control) in Spring is a design principle that allows...read more

Add your answer

Q68. Given string : I am java developer return 4 non repeting character

Ans.

Find 4 non-repeating characters in the given string.

  • Create a hashmap to store character frequencies

  • Iterate through the string and count the occurrences of each character

  • Return the first 4 characters with frequency 1 as non-repeating characters

Add your answer

Q69. Thread pool executer fire 3 method in parallel and wait for all 3 to complete

Ans.

Use a thread pool executor to execute 3 methods in parallel and wait for all 3 to complete.

  • Create a thread pool executor with a fixed number of threads.

  • Submit the 3 methods as tasks to the executor using the `submit()` method.

  • Use the `invokeAll()` method to wait for all tasks to complete.

  • Handle any exceptions thrown by the tasks.

  • Example: ThreadPoolExecutor executor = new ThreadPoolExecutor(3, 3, 0L, TimeUnit.MILLISECONDS, new LinkedBlockingQueue<>());

  • Example: Future task1 = e...read more

Add your answer

Q70. what is random forest, knn?

Ans.

Random forest and KNN are machine learning algorithms used for classification and regression tasks.

  • Random forest is an ensemble learning method that constructs multiple decision trees and combines their outputs to make a final prediction.

  • KNN (k-nearest neighbors) is a non-parametric algorithm that classifies new data points based on the majority class of their k-nearest neighbors in the training set.

  • Random forest is useful for handling high-dimensional data and avoiding overf...read more

Add your answer

Q71. What is authorisation and authentication? What is the use of Auth key. Types of Auth key.

Ans.

Authorization is the process of determining if a user has the permission to access a resource, while authentication is the process of verifying the identity of a user.

  • Authorization determines what a user can do, while authentication verifies who the user is.

  • Authentication can be done using passwords, biometrics, tokens, etc.

  • Authorization can be role-based, attribute-based, or rule-based.

  • Auth key is a unique identifier used for authentication purposes.

  • Types of Auth keys includ...read more

View 1 answer

Q72. Why we use normalisation in database? Types of joins. Difference between DBMS and RDBMS. What is trigger?

Ans.

Normalization is used in databases to reduce data redundancy and improve data integrity.

  • Normalization helps in organizing data in a database by eliminating redundant data and ensuring data integrity.

  • It reduces data redundancy by breaking down large tables into smaller ones and linking them using relationships.

  • Types of joins include inner join, outer join, left join, and right join.

  • DBMS stands for Database Management System, while RDBMS stands for Relational Database Managemen...read more

Add your answer

Q73. Differnce between ArrayList and LinkedList

Ans.

ArrayList is implemented as a resizable array while LinkedList is implemented as a doubly linked list.

  • ArrayList provides constant time for accessing elements while LinkedList provides constant time for adding or removing elements.

  • ArrayList is better for storing and accessing data while LinkedList is better for manipulating data.

  • ArrayList is faster for iterating through elements while LinkedList is faster for adding or removing elements in the middle of the list.

Add your answer

Q74. find unique keys in 2 dictionaries

Ans.

To find unique keys in 2 dictionaries.

  • Create a set of keys for each dictionary

  • Use set operations to find the unique keys

  • Return the unique keys

Add your answer

Q75. Explain IntArray &amp; array, Reflection in Java, jvmStatic and Jvmoverload, What is deeplink, Launch modes

Ans.

IntArray & array are similar in Kotlin, Reflection is used to inspect and modify classes at runtime, jvmStatic and Jvmoverload are annotations in Kotlin, deeplink is a way to navigate to a specific page in an app, Launch modes determine how a new instance of an activity is associated with the current task

  • IntArray & array are used to define arrays in Kotlin, with IntArray being a specific type of array containing integers

  • Reflection in Java allows for inspecting and modifying c...read more

Add your answer

Q76. @async annotation usage how to make async api

Ans.

The @async annotation is used to make an API asynchronous.

  • Add the @async annotation to the method declaration

  • Use CompletableFuture or a similar mechanism to handle the asynchronous execution

  • Ensure the API returns a CompletableFuture or a similar asynchronous result

Add your answer

Q77. Attribute directives in angular

Ans.

Attribute directives in Angular are used to modify the behavior or appearance of an element.

  • Attribute directives are used to change the behavior or appearance of an element based on the value of an attribute.

  • They are denoted by square brackets [] in the HTML template.

  • They can be used to add, remove or modify attributes of an element.

  • Examples include ngClass, ngStyle, and ngModel.

Add your answer

Q78. 1. What is weak, strong, reference cycle 2. Memory leak 3. Core data concept 4. Swift basics(Generics &amp; all) 5. Concurrency

Ans.

Questions related to programming concepts such as memory management, data storage, and concurrency.

  • Weak, strong, and reference cycles are concepts related to memory management in Swift.

  • Memory leaks occur when memory is allocated but not released, leading to performance issues.

  • Core Data is a framework used for data storage and management in iOS and macOS applications.

  • Swift basics include concepts such as generics, which allow for flexible and reusable code.

  • Concurrency refers t...read more

Add your answer

Q79. How to reverse the string in java

Ans.

To reverse a string in Java, use the StringBuilder class and its reverse() method.

  • Create a StringBuilder object with the given string as its argument

  • Call the reverse() method on the StringBuilder object

  • Convert the StringBuilder object back to a string using the toString() method

  • Alternatively, you can use a loop to iterate through the characters of the string and append them to a new string in reverse order

View 1 answer

Q80. How to post multiple object value from view to the controller

Add your answer

Q81. What is durable orchestration in Azure Function?

Ans.

Durable orchestration in Azure Function allows for long-running, stateful workflows to be executed efficiently.

  • Durable orchestration enables developers to write stateful functions that can be paused and resumed at any point.

  • It provides features like checkpointing, error handling, and timeouts to ensure reliability.

  • By using durable functions, complex workflows can be easily implemented without the need for external orchestration services.

  • Example: A durable function can be used...read more

Add your answer

Q82. What is Dbms? and diffrent ddl dml commands?

Ans.

DBMS stands for Database Management System. DDL commands are used to define the structure of the database, while DML commands are used to manipulate data.

  • DBMS is a software system that allows users to define, create, maintain, and control access to databases.

  • DDL (Data Definition Language) commands are used to define the structure of the database, such as creating tables, altering table structures, and deleting tables.

  • Examples of DDL commands include CREATE, ALTER, and DROP.

  • DM...read more

Add your answer

Q83. What is given,when ,then in api

Ans.

Given-When-Then is a testing methodology used in API testing to define the preconditions, actions, and expected outcomes of a test case.

  • Given: Defines the preconditions or initial state of the system

  • When: Defines the actions or events that occur in the system

  • Then: Defines the expected outcomes or results of the actions taken

Add your answer

Q84. What will happen if we add another esxi within a cluster?

Ans.

Adding another esxi within a cluster will increase the resources available for virtual machines and improve overall performance and redundancy.

  • Increased resources for virtual machines

  • Improved performance and redundancy

  • Enhanced scalability and flexibility

  • Better load balancing and failover capabilities

Add your answer

Q85. Explain different types of asserts used in Selenium

Ans.

Different types of asserts used in Selenium include assert, verify, and waitForAssert

  • Assert: Stops the execution if the verification fails

  • Verify: Continues the execution even if the verification fails

  • waitForAssert: Waits for a certain condition to be true before proceeding

Add your answer

Q86. How do you prioritise delivery when you recieve multiple feedbacks ?

Ans.

When receiving multiple feedbacks, prioritizing delivery involves considering the impact, urgency, and alignment with project goals.

  • Assess the impact of each feedback on the overall project objectives

  • Evaluate the urgency of each feedback based on deadlines and dependencies

  • Consider the alignment of each feedback with the project goals and priorities

  • Communicate with stakeholders to understand their expectations and priorities

  • Create a prioritization framework or matrix to object...read more

View 1 answer

Q87. What is oops concept in automation

Ans.

OOPs concept in automation refers to the use of object-oriented programming principles in designing and implementing automated tests.

  • Encapsulation: grouping related data and functions into a single unit (class) to hide implementation details

  • Inheritance: creating new classes from existing ones to reuse code and add new functionality

  • Polymorphism: using a single interface to represent multiple types of objects

  • Abstraction: focusing on essential features and ignoring implementatio...read more

Add your answer

Q88. Write a program to get header values xyz from a web api

Ans.

Program to get header values xyz from a web api

  • Use a programming language that supports making HTTP requests, such as Python or JavaScript

  • Make a request to the web API and retrieve the response headers

  • Parse the headers to extract the value of the 'xyz' header

Add your answer

Q89. Programming Languages u worked on?

Ans.

I have worked on multiple programming languages including Java, Python, C++, and JavaScript.

  • Proficient in Java and Python for backend development

  • Experience in C++ for competitive programming and algorithm development

  • Familiarity with JavaScript for frontend development and web applications

Add your answer

Q90. For security analyst what is cyber kill chain? Describe the cyber kill chain

Ans.

The cyber kill chain is a framework used to describe the stages of a cyber attack, from initial reconnaissance to data exfiltration.

  • The cyber kill chain consists of seven stages: reconnaissance, weaponization, delivery, exploitation, installation, command and control, and actions on objectives.

  • Each stage represents a different step in the attack lifecycle, with the ultimate goal of achieving the attacker's objectives.

  • By understanding the cyber kill chain, security analysts ca...read more

Add your answer

Q91. What are different types of waits in selenium? Write code and explain its uses.

Ans.

Types of waits in Selenium include Implicit Wait, Explicit Wait, and Fluent Wait.

  • Implicit Wait: Waits for a certain amount of time before throwing a NoSuchElementException.

  • Explicit Wait: Waits for a certain condition to be met before proceeding further in the code.

  • Fluent Wait: Waits for a condition to be met with a defined polling frequency.

  • Example: driver.manage().timeouts().implicitlyWait(10, TimeUnit.SECONDS);

Add your answer

Q92. Explain controls in standard order,cash sales

Ans.

Controls in standard order for cash sales involve ensuring accuracy and security of transactions.

  • Verify the amount of cash received matches the sale amount

  • Ensure the cash is deposited in a secure location

  • Record the transaction in the sales ledger

  • Reconcile the cash register at the end of the day

  • Perform regular audits to detect any discrepancies

Add your answer

Q93. Different exceptions in Spring Boot

Ans.

Spring Boot has various exceptions for different scenarios.

  • DataAccessException - for database access errors

  • HttpMessageNotReadableException - for errors in HTTP message conversion

  • MethodArgumentNotValidException - for validation errors in request parameters

  • NoSuchBeanDefinitionException - for errors in bean configuration

  • UnauthorizedException - for authentication and authorization errors

Add your answer

Q94. What is the difference between spark and hadoop

Ans.

Spark is a fast and general-purpose cluster computing system, while Hadoop is a distributed processing framework.

  • Spark is designed for in-memory processing, while Hadoop is disk-based.

  • Spark provides real-time processing capabilities, while Hadoop is primarily used for batch processing.

  • Spark has a more flexible and expressive programming model compared to Hadoop's MapReduce.

  • Spark can be used with various data sources like HDFS, HBase, and more, while Hadoop is typically used w...read more

Add your answer

Q95. how did you do batch processing. why did you choose that technique

Ans.

I used batch processing by breaking down large data sets into smaller chunks for easier processing.

  • Implemented batch processing using tools like Apache Spark or Hadoop

  • Chose batch processing for its ability to handle large volumes of data efficiently

  • Split data into smaller batches to process sequentially for better resource management

Add your answer

Q96. how will you handle 100 files of 100 GB size files in pyspark. Design end to end pipleline.

Ans.

I will use PySpark to handle 100 files of 100 GB size in an end-to-end pipeline.

  • Use PySpark to distribute processing across a cluster of machines

  • Read files in parallel using SparkContext and SparkSession

  • Apply transformations and actions to process the data efficiently

  • Utilize caching and persisting to optimize performance

  • Implement fault tolerance and recovery mechanisms

  • Use appropriate data storage solutions like HDFS or cloud storage

Add your answer

Q97. How many feature file will be there

Ans.

The number of feature files will depend on the project requirements and the level of granularity in test scenarios.

  • Number of feature files can vary based on the size and complexity of the project

  • Each feature file typically represents a specific functionality or feature being tested

  • Feature files can be organized based on modules, user stories, or test scenarios

Add your answer

Q98. what id Group and set in Tableau ?

Ans.

Groups and sets are two ways to combine related data in Tableau for easier analysis and visualization.

  • Groups allow you to combine related dimension members into higher-level categories.

  • Sets are custom fields that define a subset of data based on conditions you specify.

  • Groups are static and cannot be changed once created, while sets are dynamic and can be updated based on filters or calculations.

  • Examples: Grouping states into regions (East, West, South, Midwest) using Groups. ...read more

Add your answer

Q99. What is Arraylist ,linkedlist,map,hastable

Ans.

Arraylist, linkedlist, map, and hashtable are data structures used in programming.

  • Arraylist is a resizable array that can store any type of data.

  • Linkedlist is a collection of nodes that contain data and a reference to the next node.

  • Map is a collection of key-value pairs where each key is unique.

  • Hashtable is similar to a map but is synchronized and does not allow null keys or values.

Add your answer

Q100. For Senior analyst, If anyRansomeware attack how to handle the situation.

Ans.

Immediately isolate infected systems, contain the spread, assess impact, restore from backups, and strengthen security measures.

  • Isolate infected systems to prevent further spread of the ransomware.

  • Contain the spread by disconnecting affected devices from the network.

  • Assess the impact by identifying which systems are affected and the extent of the damage.

  • Restore from backups to recover data and systems to a pre-attack state.

  • Strengthen security measures by updating software, im...read more

Add your answer
1
2
3
4
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos

Interview Process at null

based on 227 interviews in the last 1 year
Interview experience
3.9
Good
View more
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Interview Questions from Similar Companies

4.0
 • 460 Interview Questions
3.5
 • 368 Interview Questions
4.2
 • 210 Interview Questions
3.9
 • 185 Interview Questions
3.5
 • 160 Interview Questions
View all
Top Coforge Interview Questions And Answers
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
70 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions
Get AmbitionBox app

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter