Cognizant
20+ Qentelli Interview Questions and Answers
Q1. Annotations to initialisation of the pre requisites and methods to perform actions in testng a d difference between background keywrod
Annotations in TestNG are used to initialize prerequisites and perform actions in tests. Background keyword is not a TestNG concept.
Annotations in TestNG are used to define the behavior of test methods or classes.
Annotations like @BeforeSuite, @BeforeTest, @BeforeClass, @BeforeMethod are used to initialize prerequisites.
Annotations like @Test are used to define the actual test methods.
Annotations like @AfterMethod, @AfterClass, @AfterTest, @AfterSuite are used to perform acti...read more
Q2. 1. What is owasp top 10 web? 2. Types of injection attack?. 3. Java based questions?. 4. Projects and internship?.
OWASP Top 10 is a list of the top 10 most critical web application security risks.
Injection attacks include SQL injection, LDAP injection, and XPath injection.
Java based questions may include topics like object-oriented programming, exception handling, and multithreading.
Projects and internships can showcase practical application of skills and knowledge gained in a real-world setting.
Q3. Program to build a traingle of squares in c or java
Program to build a triangle of squares in C or Java.
Use nested loops to print the required number of squares in each row.
The number of squares in each row increases by 1.
The loop should run for the required number of rows.
Use printf or cout statements to print the squares.
Q4. What is the use of Object cloning
Object cloning is the process of creating an exact copy of an object, including all of its properties and methods.
Object cloning is useful for creating backups of objects, preserving the state of an object at a particular point in time.
It allows for the creation of independent copies of objects, preventing unintended side effects from modifying the original object.
Object cloning can be achieved through shallow cloning (copying only the top-level properties) or deep cloning (c...read more
Q5. What is mul key in db?
A multi key in a database is a key that consists of multiple columns, used to uniquely identify a record in a table.
A multi key is created by combining two or more columns in a table.
It is used to ensure uniqueness and improve query performance.
Example: a multi key combining 'first_name' and 'last_name' columns in a 'users' table.
Q6. What are dangling and a null pointers
Dangling pointers are pointers that point to a memory location that has been deleted or freed. Null pointers point to nothing.
Dangling pointers can cause crashes or unexpected behavior in a program.
Null pointers are often used to indicate that a pointer does not point to a valid memory location.
Dangling pointers can be avoided by setting pointers to NULL after freeing the memory they point to.
Null pointers can be checked before dereferencing to avoid crashes.
Q7. Normalisation with example, ACID properties
Normalization is the process of organizing data in a database to reduce redundancy and improve data integrity. ACID properties ensure database transactions are reliable.
Normalization involves breaking down data into smaller, more manageable parts to reduce redundancy.
ACID properties (Atomicity, Consistency, Isolation, Durability) ensure database transactions are reliable and maintain data integrity.
Example: Normalization can be seen in a database where customer information is...read more
Q8. What is OOP and it's pillars.
OOP stands for Object-Oriented Programming. Its pillars are encapsulation, inheritance, and polymorphism.
Encapsulation: Bundling data and methods that operate on the data into a single unit (object).
Inheritance: Ability of a class to inherit properties and behavior from another class.
Polymorphism: Ability to present the same interface for different data types.
Q9. What is the use ofSerialisation
Serialization is the process of converting an object into a format that can be easily stored or transmitted.
Serialization is used to save the state of an object so that it can be reconstructed later.
It is commonly used in networking to send objects over the network.
Serialization is also used in file storage, database operations, and caching mechanisms.
Q10. Write a program to reverse a string
Program to reverse a string
Create a function that takes a string as input
Use a loop to iterate through the characters of the string in reverse order
Append each character to a new string to build the reversed string
Q11. Explain over riding and over loading
Overriding is when a subclass provides a specific implementation of a method that is already provided by its parent class, while overloading is when a class has multiple methods with the same name but different parameters.
Overriding involves a subclass providing a specific implementation of a method from its parent class.
Overloading involves a class having multiple methods with the same name but different parameters.
In overriding, the method in the subclass must have the same...read more
Q12. Explain factory design pattern with code
Factory design pattern is a creational pattern that provides an interface for creating objects in a superclass, but allows subclasses to alter the type of objects that will be created.
Factory design pattern involves creating an interface (or abstract class) for creating objects, and letting subclasses decide which class to instantiate.
It helps in creating objects without exposing the instantiation logic to the client and refers to the newly created object through a common int...read more
Q13. Difference between String and Stringbuffer
String is immutable, StringBuffer is mutable in Java.
String is immutable, meaning once created, it cannot be changed. StringBuffer is mutable, allowing for modifications.
String concatenation creates a new String object each time, while StringBuffer allows for efficient string manipulation.
StringBuffer is synchronized, making it thread-safe, while String is not.
Example: String str = "Hello"; StringBuffer sb = new StringBuffer("Hello");
Q14. Difference between set and list
Sets are unordered collections of unique elements, while lists are ordered collections of elements that allow duplicates.
Sets do not allow duplicate elements, while lists do.
Sets are unordered, while lists are ordered.
Sets are implemented using hash tables, while lists are implemented using arrays or linked lists.
Q15. Difference between map and hashmap
HashMap is a specific implementation of the Map interface in Java.
Map is an interface in Java that represents a mapping between a key and a value.
HashMap is a class in Java that implements the Map interface.
HashMap allows null values and one null key, while Map does not allow null keys.
Q16. What is change data capture
Change data capture is a process of identifying and capturing changes made to data in a database.
Captures changes made to data in a database
Tracks inserts, updates, and deletes
Enables synchronization of data across different systems
Used in data replication and integration processes
Q17. Hashmap architechure of project
Hashmap architecture of a project involves organizing data using key-value pairs for efficient retrieval and storage.
Hashmap is a data structure that stores key-value pairs and allows for fast retrieval of values based on keys.
It uses a hashing function to map keys to specific locations in memory for quick access.
Hashmaps are commonly used in programming for tasks like caching, indexing, and implementing associative arrays.
Example: In a social media application, a hashmap can...read more
Q18. Sort of numbers in a list
Sorting numbers in a list
Use a sorting algorithm like bubble sort, selection sort, or quicksort
Compare each pair of numbers and swap them if they are in the wrong order
Repeat this process until the list is sorted
Example: [5, 2, 8, 1, 3] -> [1, 2, 3, 5, 8]
Q19. C programming code prime number
To check if a number is prime in C programming, iterate from 2 to n/2 and check for divisibility.
Iterate from 2 to n/2 and check if n is divisible by any number
If n is divisible by any number, it is not a prime number
If n is not divisible by any number, it is a prime number
Q20. Angular hooks and types
Angular hooks are functions that allow developers to execute code at specific points in the component's lifecycle. Types in Angular refer to TypeScript data types used for type checking.
Angular hooks include ngOnInit, ngOnDestroy, ngOnChanges, etc.
Types in Angular help catch errors during development by enforcing strict data types.
Example: Using ngOnChanges hook to detect changes in input properties.
Example: Using types like string, number, boolean in Angular components.
Q21. Angular data sharing types
Angular data sharing types include Input, Output, ViewChild, and Services.
Input: Parent component passes data to child component using @Input decorator.
Output: Child component emits events to parent component using @Output decorator.
ViewChild: Parent component accesses child component using @ViewChild decorator.
Services: Shared services can be used to share data between components.
Q22. Veeva vault configuration
Veeva Vault configuration involves setting up user permissions, document types, workflows, and security settings.
Configure user roles and permissions to control access to documents
Define document types and metadata fields for organizing content
Set up workflows for document approval processes
Implement security settings to protect sensitive information
Q23. Oops concept from java
Oops concept from java
Object-oriented programming paradigm
Encapsulation, Inheritance, Polymorphism, Abstraction
Classes and Objects
Access Modifiers
Example: Class Car with properties like make, model, year and methods like start, stop, accelerate
Example: Inheritance - Class SUV extends Car with additional property like off-road capability
Q24. Locator techniques
Locator techniques involve methods used to find and identify specific items or objects.
Locator techniques can include GPS tracking, RFID technology, barcode scanning, and manual searching.
GPS tracking uses satellites to pinpoint the exact location of an object or person.
RFID technology uses radio waves to track and identify items with RFID tags.
Barcode scanning involves scanning a barcode to retrieve information about a product or item.
Manual searching involves physically loo...read more
Q25. explain scheduling process
Scheduling process involves creating a timeline for tasks and resources to ensure efficient completion of a project.
Identify tasks and their dependencies
Estimate duration for each task
Allocate resources based on availability
Create a timeline or Gantt chart
Monitor progress and adjust schedule as needed
Q26. Wiiling to relocate
Yes, I am willing to relocate for the right opportunity.
I am open to relocating for a position that aligns with my career goals and offers growth opportunities.
I have experience moving for previous job opportunities and am comfortable with the process.
I am excited about the possibility of exploring a new city or country and experiencing different cultures.
I understand the importance of being flexible and adaptable in today's job market.
Q27. Sql join conditions
SQL join conditions are used to combine rows from two or more tables based on a related column between them.
Join conditions are specified in the ON clause of the JOIN statement.
Common join types include INNER JOIN, LEFT JOIN, RIGHT JOIN, and FULL JOIN.
Example: SELECT * FROM table1 INNER JOIN table2 ON table1.column = table2.column;
More about working at Cognizant
Top HR Questions asked in Qentelli
Interview Process at Qentelli
Top Associate Engineer Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month