Add office photos
Engaged Employer

Cognizant

3.7
based on 50.4k Reviews
Video summary
Proud winner of ABECA 2024 - AmbitionBox Employee Choice Awards
Filter interviews by

500+ Quest Academy Interview Questions and Answers

Updated 5 Mar 2025
Popular Designations

Q201. How to create an empty class?

Ans.

An empty class can be created by simply declaring a class with no properties or methods.

  • Declare a class with no properties or methods

  • Example: class EmptyClass {}

  • The class can be used as a placeholder for future implementation

View 1 answer

Q202. What is constructor overloading?

Ans.

Constructor overloading is the ability to have multiple constructors with different parameters in a class.

  • Constructor overloading allows creating objects with different initializations.

  • It helps in providing flexibility and convenience to the users of the class.

  • Constructors can be overloaded by changing the number, type, or order of parameters.

  • Example: class Person { Person() {} Person(String name) {} }

View 1 answer

Q203. A basic C program to find the frequency of an alphabet in a string

Ans.

This program calculates the frequency of a given alphabet in a string using a basic C program.

  • Declare an array of size 26 to store the frequency of each alphabet

  • Iterate through the string character by character

  • For each character, check if it is an alphabet

  • If yes, increment the corresponding frequency count in the array

  • Print the frequency of the desired alphabet

View 2 more answers

Q204. What is synchronisation in java.

Ans.

Synchronization in Java is the process of controlling access to shared resources by multiple threads.

  • Synchronization is achieved using the synchronized keyword in Java.

  • It ensures that only one thread can access the shared resource at a time.

  • Synchronization can be applied to methods or blocks of code.

  • It is used to prevent race conditions and ensure thread safety.

  • Example: synchronized void myMethod() { //code }

  • Example: synchronized(this) { //code }

Add your answer
Discover Quest Academy interview dos and don'ts from real experiences

Q205. What is HTML?

Ans.

HTML stands for HyperText Markup Language, used to create and structure web pages.

  • HTML is the standard markup language for creating web pages

  • It uses tags to define the structure and content of a web page

  • Examples of HTML tags include <html>, <head>, <title>, <body>, <p>, <a>, <img>

View 1 answer

Q206. A running man crosses a bridge of length 500 meters in 4 minutes. At what speed he is running?

Add your answer
Are these interview questions helpful?

Q207. Do you have any backlogs?

Ans.

No, I do not have any backlogs.

  • I have successfully completed all my courses and exams.

  • I have maintained a good academic record throughout.

  • I have never had to repeat a course or exam.

  • I have always been diligent in my studies and time management.

Add your answer

Q208. types of testing

Ans.

Types of testing include unit, integration, system, acceptance, regression, performance, and security testing.

  • Unit testing: testing individual units or components of the software

  • Integration testing: testing how different units or components work together

  • System testing: testing the entire system as a whole

  • Acceptance testing: testing to ensure the software meets the requirements and is ready for release

  • Regression testing: testing to ensure changes or updates to the software do ...read more

Add your answer
Share interview questions and help millions of jobseekers 🌟

Q209. What is the fill factor in SQL? What is its default value?

Ans.

Fill factor is the percentage of space on each leaf-level page to be filled with data.

  • It determines how much data is written to a page during index creation or rebuild.

  • It can improve performance by reducing page splits and fragmentation.

  • The default value is 0, which means the page is filled to 100%.

  • A fill factor of 80 means the page is filled to 80% and 20% is left empty for future growth.

Add your answer

Q210. what are the features of oops?

Ans.

Object-oriented programming features include encapsulation, inheritance, polymorphism, and abstraction.

  • Encapsulation: bundling of data and methods that manipulate the data

  • Inheritance: creating new classes from existing ones

  • Polymorphism: ability of objects to take on multiple forms

  • Abstraction: hiding implementation details from users

Add your answer

Q211. What is cloud computing?

Ans.

Cloud computing is the delivery of computing services over the internet.

  • Cloud computing allows users to access data and applications from anywhere with an internet connection.

  • It offers scalability, flexibility, and cost-effectiveness compared to traditional on-premises computing.

  • Examples include Amazon Web Services, Microsoft Azure, and Google Cloud Platform.

Add your answer

Q212. Write string reverse program

Ans.

Program to reverse a given string.

  • Iterate through the string from end to start and append each character to a new string.

  • Use built-in functions like reverse() or slice() in some programming languages.

  • Convert the string to an array, reverse the array, and then join the array back into a string.

View 2 more answers

Q213. which cell phone do you use, and on which platform it runs, and tell me what changes you have made in your android, being a technical student ---told

Ans.

I use a Samsung Galaxy S20 running on Android platform. As a technical student, I have customized my Android by rooting the device and installing custom ROMs.

  • Samsung Galaxy S20 is my current cell phone

  • It runs on the Android platform

  • I have rooted the device and installed custom ROMs for customization

Add your answer

Q214. What are OOPS concepts?

Ans.

OOPS concepts are the fundamental principles of Object-Oriented Programming that help in designing and implementing software systems.

  • Encapsulation: Bundling data and methods together in a class.

  • Inheritance: Creating new classes from existing ones, inheriting their properties and behaviors.

  • Polymorphism: Objects of different classes can be treated as objects of a common superclass.

  • Abstraction: Hiding complex implementation details and providing simplified interfaces.

  • Encapsulati...read more

View 1 answer

Q215. Explain polymorphism, inheritance and OOPS.

Ans.

Polymorphism, inheritance and OOPS are concepts in object-oriented programming.

  • Polymorphism allows objects of different classes to be treated as if they are of the same class.

  • Inheritance allows a class to inherit properties and methods from another class.

  • OOPS is a programming paradigm that uses objects to represent real-world entities and their interactions.

  • Example of polymorphism: A shape class with different subclasses like circle, square, and triangle.

  • Example of inheritanc...read more

Add your answer

Q216. what is polymorphism in Object-Oriented Programming?

Ans.

Polymorphism is the ability of an object to take on many forms.

  • Polymorphism allows objects of different classes to be treated as objects of a common superclass.

  • It enables methods to be defined in the superclass and overridden in the subclasses.

  • Polymorphism helps in achieving code reusability and flexibility in object-oriented programming.

  • Example: A superclass 'Animal' with subclasses 'Dog' and 'Cat'. Both 'Dog' and 'Cat' can be treated as 'Animal'.

View 1 answer

Q217. What's your favorite software?

Ans.

My favorite software is Adobe Photoshop.

  • Adobe Photoshop is a powerful image editing software.

  • It offers a wide range of tools and features for editing and enhancing photos.

  • It is widely used by professionals in the graphic design and photography industries.

  • Photoshop allows for precise control over image manipulation and offers advanced editing capabilities.

  • It supports various file formats and provides options for creating stunning visual effects.

  • Some popular features include la...read more

View 3 more answers

Q218. Difference between list and tuple?

Ans.

List is mutable and tuple is immutable in Python.

  • Lists can be modified while tuples cannot be modified once created.

  • Lists are defined using square brackets while tuples are defined using parentheses.

  • Lists are used for collections of homogeneous items while tuples are used for heterogeneous items.

  • Lists are slower than tuples in terms of performance.

  • Example of list: my_list = [1, 2, 3]

  • Example of tuple: my_tuple = (1, 'hello', 3.14)

Add your answer

Q219. What is JVM?

Ans.

JVM stands for Java Virtual Machine. It is an abstract machine that enables a computer to run Java programs.

  • JVM is responsible for interpreting the compiled Java code and executing it on the computer.

  • It provides a platform-independent environment for Java programs to run on different operating systems.

  • JVM has various components such as Class Loader, Bytecode Verifier, Just-In-Time Compiler, and Garbage Collector.

  • Examples of JVM-based languages include Java, Kotlin, and Scala.

Add your answer

Q220. What is gibs free energy?

Ans.

Gibbs free energy is a thermodynamic potential that measures the maximum amount of work that can be obtained from a system.

  • It is denoted by the symbol G.

  • It takes into account both the enthalpy and entropy of a system.

  • A negative value of G indicates that a reaction is spontaneous.

  • It is used to predict the feasibility of a chemical reaction.

  • It is also used in the study of phase transitions and the stability of materials.

Add your answer

Q221. State the differences between C and C++.

Ans.

C++ is an extension of C with object-oriented programming features.

  • C++ supports classes and objects while C does not.

  • C++ has constructors and destructors while C does not.

  • C++ supports function overloading while C does not.

  • C++ has namespaces while C does not.

  • C++ supports exception handling while C does not.

Add your answer

Q222. what are maps? and what are the things you know about maps?

Ans.

Maps are visual representations of geographical locations, providing information about the terrain, landmarks, and routes.

  • Maps are visual tools used to represent geographical locations.

  • They provide information about the terrain, landmarks, and routes.

  • Maps can be physical or digital.

  • They can be used for navigation, planning, and exploration.

  • Examples of maps include world maps, city maps, and topographic maps.

Add your answer

Q223. Oops concepts in c#

Ans.

Oops concepts in C# include inheritance, polymorphism, encapsulation, and abstraction.

  • Inheritance allows a class to inherit properties and behavior from another class.

  • Polymorphism enables objects to be treated as instances of their parent class.

  • Encapsulation hides the internal state of an object and only exposes necessary functionality.

  • Abstraction focuses on the essential characteristics of an object while hiding irrelevant details.

Add your answer

Q224. what are the programming languages you know ?

Ans.

I know several programming languages including Java, Python, and C++.

  • Proficient in Java, Python, and C++

  • Familiar with HTML, CSS, and JavaScript

  • Experience with SQL and database management

  • Knowledge of object-oriented programming principles

  • Comfortable with version control systems like Git

Add your answer

Q225. Write a program using recursion

Ans.

A program using recursion

  • Recursion is a technique where a function calls itself to solve a problem

  • It involves a base case and a recursive case

  • Examples include factorial, Fibonacci sequence, and binary search

Add your answer

Q226. Speak for one min about the topic

Ans.

The importance of time management

  • Time management is crucial for personal and professional success

  • It involves setting priorities, creating schedules, and avoiding procrastination

  • Effective time management leads to increased productivity and reduced stress

  • Examples include using a planner, delegating tasks, and taking breaks

  • It is a skill that can be learned and improved upon

Add your answer

Q227. Rate yourself in 5 different programming languages on a 1-10 scale, 10 being the best.

Ans.

I rate myself differently in different languages based on my experience and proficiency.

  • Java - 8: I have worked on multiple projects using Java and have a good understanding of its concepts.

  • Python - 7: I have used Python for scripting and automation tasks and have a decent understanding of its libraries.

  • C++ - 6: I have basic knowledge of C++ and have implemented some algorithms using it.

  • JavaScript - 8: I have worked on web development projects using JavaScript and its framewo...read more

View 1 answer

Q228. A pipe can fill a tank in 6 hours and another pipe can empty the tank in 12 hours. If both the pipes are opened at the same time, the tank can be filled in

Add your answer

Q229. why in kV (kilo volt) k is written small and V is denoted by capital letter? ---because v stands for volt and volt is a name of a scientist, whereas kilo is a quantity

Add your answer

Q230. Main Differences Between C++ and Java

Ans.

C++ and Java are both object-oriented programming languages, but differ in syntax, memory management, and platform compatibility.

  • C++ supports multiple inheritance, while Java only supports single inheritance.

  • C++ allows direct memory manipulation, while Java has a garbage collector for automatic memory management.

  • C++ is closer to the hardware and provides more control, while Java is platform-independent and provides portability.

  • C++ has pointers, while Java uses references.

  • C++ ...read more

View 1 answer

Q231. What is 'quality' in your words?

Ans.

Quality is the measure of excellence or superiority in a product, service, or process.

  • Quality refers to meeting or exceeding customer expectations.

  • It involves consistency, reliability, and accuracy.

  • Quality is achieved through effective planning, control, and improvement.

  • Examples of quality include a durable and well-designed product, prompt and efficient customer service, and error-free processes.

View 1 answer

Q232. Write a program to perform Binary search on an array of N numbers.

Ans.

Program to perform Binary search on an array of N numbers.

  • Sort the array in ascending order

  • Set low and high variables to the first and last index of the array respectively

  • Calculate the mid index as (low+high)/2

  • If the element at mid index is equal to the search element, return mid

  • If the element at mid index is less than the search element, set low to mid+1

  • If the element at mid index is greater than the search element, set high to mid-1

  • Repeat until low is greater than high or e...read more

View 1 answer

Q233. Define memory management in Python

Ans.

Memory management in Python involves allocation and deallocation of memory for objects.

  • Python uses automatic memory management through garbage collection.

  • Memory is allocated dynamically as objects are created.

  • Unused memory is automatically deallocated through reference counting or garbage collection.

  • Python provides tools like sys.getsizeof() and tracemalloc to manage memory usage.

  • Memory leaks can occur if objects are not properly deallocated.

Add your answer

Q234. 1. What are the basic medical terminology? 2. Do you have any idea about medical scribe?

Ans.

Basic medical terminology includes terms related to anatomy, physiology, and medical procedures.

  • Anatomy terms: such as 'abdomen', 'thorax', 'femur'

  • Physiology terms: such as 'respiration', 'circulation', 'metabolism'

  • Medical procedures: such as 'biopsy', 'endoscopy', 'radiography'

Add your answer

Q235. What is a database?

Ans.

A database is a structured collection of data that is stored and organized for easy retrieval and manipulation.

  • A database is used to store and manage large amounts of data.

  • It allows for easy retrieval and manipulation of data.

  • Data is organized into tables, with each table containing related information.

  • Examples of databases include MySQL, Oracle, and MongoDB.

Add your answer

Q236. What is the difference between hashtable and hash map

Ans.

Hashtable is synchronized and does not allow null keys, while hashmap is not synchronized and allows one null key.

  • Hashtable is synchronized, while hashmap is not.

  • Hashtable does not allow null keys, while hashmap allows one null key.

  • Hashtable is thread-safe, while hashmap is not.

  • Hashtable is slower than hashmap.

  • Hashtable is part of the legacy collection classes, while hashmap is part of the Java Collections Framework.

Add your answer

Q237. What is the class?

Ans.

A class is a blueprint for creating objects that have similar attributes and methods.

  • A class is a user-defined data type that encapsulates data and functions.

  • It is a template for creating objects.

  • It provides a way to organize and structure code.

  • Objects are instances of a class.

  • Classes can inherit properties and methods from other classes.

  • Examples include String, Integer, and List in Java.

Add your answer

Q238. What is the difference between classful and classless addressing?

Ans.

Classful addressing uses fixed network sizes, while classless addressing allows for variable network sizes.

  • Classful addressing divides IP addresses into five classes: A, B, C, D, and E.

  • Classful addressing assumes that all networks within a class have the same network size.

  • Classless addressing allows for more flexibility in network size and allows for the creation of subnets.

  • Classless addressing is used in modern networks, while classful addressing is obsolete.

  • Example of class...read more

Add your answer

Q239. Which programming language are you comfortable with?

Add your answer

Q240. WHICH PROGRAMMING LANGUAGE YOU ARE MOST COMFORTABLE WITH?

Add your answer

Q241. What is DBMS?

Ans.

DBMS stands for Database Management System. It is a software that manages and organizes data in a structured manner.

  • DBMS is used to create, retrieve, update, and delete data in a database.

  • It provides a way to store and organize large amounts of data efficiently.

  • DBMS ensures data integrity, security, and concurrency control.

  • Examples of popular DBMS include MySQL, Oracle, SQL Server, and PostgreSQL.

View 1 answer

Q242. Write a program using any language of your choice (It was a palindrome-based program.)

Ans.

A program to check if a given string is a palindrome or not.

  • Take input string from user

  • Reverse the string

  • Compare the reversed string with the original string

  • If both are same, then the string is a palindrome

  • Else, the string is not a palindrome

View 1 answer

Q243. 2 coins were tossed simultaneously and what is the probability of Getting Two tails.

Add your answer

Q244. Statements P: Some children are adults. Q: Some adults are not old Conclusions I. Some children are not old. II. Some children are old.

Ans.

The conclusions are both valid based on the given statements.

  • The first conclusion follows from the fact that if some children are adults and some adults are not old, then it is possible that some children are not old.

  • The second conclusion is not necessarily true, as it is possible that all children who are adults are also not old.

  • The statements do not provide enough information to determine the exact relationship between children, adults, and old age.

Add your answer

Q245. What is pointer?

Ans.

A pointer is a variable that stores the memory address of another variable.

  • Pointers allow for dynamic memory allocation and manipulation.

  • They are commonly used in programming languages like C and C++.

  • Example: int *ptr; ptr = # *ptr = 10; // num now has a value of 10

Add your answer

Q246. What are loops?

Ans.

Loops are programming structures that allow a set of instructions to be repeated multiple times.

  • Loops are used to iterate over arrays or perform a set of instructions a certain number of times.

  • There are three types of loops in most programming languages: for, while, and do-while.

  • Example: for (var i = 0; i < 10; i++) { console.log(i); }

  • Example: while (condition) { // code block }

  • Example: do { // code block } while (condition);

Add your answer

Q247. Types of inheritance?

Ans.

Types of inheritance include single, multiple, multilevel, hierarchical, hybrid, and multipath inheritance.

  • Single inheritance: a class inherits from a single base class.

  • Multiple inheritance: a class inherits from multiple base classes.

  • Multilevel inheritance: a class inherits from a derived class, which in turn inherits from another class.

  • Hierarchical inheritance: multiple classes inherit from a single base class.

  • Hybrid inheritance: a combination of multiple and multilevel inh...read more

View 1 answer

Q248. What are the different regularization techniques?

Ans.

Regularization techniques are used to prevent overfitting in machine learning models.

  • L1 regularization (Lasso)

  • L2 regularization (Ridge)

  • Elastic Net regularization

  • Dropout regularization

  • Early stopping

  • Data augmentation

  • Batch normalization

Add your answer

Q249. What is virtual DOM and why ReactJS uses it?

Ans.

Virtual DOM is a lightweight copy of the actual DOM used for efficient updates.

  • Virtual DOM is a concept where a lightweight copy of the actual DOM is created.

  • ReactJS uses it to efficiently update the UI without re-rendering the entire page.

  • Virtual DOM compares the previous and current states and updates only the necessary changes.

  • This results in faster rendering and better performance.

  • Example: When a user types in a search bar, only the search results are updated, not the ent...read more

Add your answer

Q250. what type of operating system in apple phone

Ans.

The operating system in Apple phones is iOS.

  • iOS is a mobile operating system developed by Apple Inc.

  • It is the second most popular mobile operating system in the world.

  • iOS is known for its user-friendly interface and security features.

  • Examples of Apple phones that run on iOS are iPhone 12, iPhone 11, and iPhone SE.

View 1 answer

Q251. write a code that returns null

Ans.

Code snippet to return null

  • In Java: return null;

  • In Python: return None

  • In C#: return null;

  • In JavaScript: return null;

Add your answer

Q252. What is pointers?

Ans.

Pointers are variables that store memory addresses. They allow direct manipulation of memory and facilitate efficient memory management.

  • Pointers store memory addresses

  • They allow direct manipulation of memory

  • They facilitate efficient memory management

View 1 answer

Q253. Difference between primary key and unique key

Ans.

Primary key uniquely identifies a record in a table, while unique key ensures uniqueness of a column.

  • Primary key cannot have null values, while unique key can have one null value.

  • A table can have only one primary key, but multiple unique keys.

  • Primary key is automatically indexed, while unique key may or may not be indexed.

  • Example: Primary key - employee ID, Unique key - email address

View 3 more answers

Q254. What is Denormalization and what is its application?

Ans.

Denormalization is the process of adding redundant data to improve query performance.

  • It involves duplicating data in multiple tables to avoid joins and improve query speed.

  • It can be useful in read-heavy applications where query performance is critical.

  • Examples include adding a total sales column to a customer table instead of calculating it through joins.

  • It can also involve flattening nested data structures to improve query performance.

  • However, it can lead to data inconsisten...read more

Add your answer

Q255. How does Dynamic Loading help in better memory space utilization?

Ans.

Dynamic Loading allows loading of modules only when required, freeing up memory space.

  • Dynamic Loading loads modules only when required, freeing up memory space.

  • It allows for better memory utilization by loading only necessary modules.

  • For example, in a web application, images can be loaded dynamically as the user scrolls down the page.

  • This reduces the initial load time and improves the overall performance of the application.

Add your answer

Q256. Explain all the stages of creating a machine learning model on a given dataset

Ans.

Creating a machine learning model involves data preparation, model selection, training, evaluation, and deployment.

  • Data preparation involves cleaning, transforming, and splitting the data into training and testing sets.

  • Model selection involves choosing the appropriate algorithm and hyperparameters for the problem.

  • Training the model involves feeding the training data to the algorithm and adjusting the parameters to minimize the error.

  • Evaluation involves testing the model on th...read more

Add your answer

Q257. Write a SQL query for finding 3rd maximum salary?

Ans.

SQL query to find 3rd maximum salary.

  • Use the ORDER BY clause to sort the salaries in descending order.

  • Use the LIMIT clause to limit the result to the third row.

  • Use a subquery to exclude the top two salaries and select the third highest salary.

Add your answer

Q258. What is the medical term for belly button?

Ans.

The medical term for belly button is umbilicus.

  • The medical term for belly button is umbilicus

  • It is the scar left by the umbilical cord after it is removed at birth

  • The umbilicus is an important area for surgical procedures such as laparoscopy

Add your answer

Q259. Swapping number logic, what are C compilation stages, what is linker

Ans.

Answering questions on C compilation stages, linker, and swapping number logic.

  • Swapping number logic involves interchanging the values of two variables without using a third variable.

  • C compilation stages include preprocessing, compilation, assembly, and linking.

  • The linker is a program that combines object files generated by the compiler into a single executable file.

  • Example of swapping number logic: int a=5, b=10; a=a+b; b=a-b; a=a-b; //a=10, b=5

Add your answer

Q260. What do you know about beams?

Ans.

Beams are structural elements that support loads by resisting bending.

  • Beams are typically horizontal, but can also be vertical or diagonal.

  • They are commonly made of wood, steel, or concrete.

  • The shape and size of a beam depends on the load it needs to support and the span it needs to cover.

  • Examples of beams include floor joists, roof trusses, and bridge girders.

Add your answer

Q261. What is the law of conservation of momentum?

Add your answer

Q262. difference between array and list.

Ans.

Arrays are fixed in size and hold elements of the same data type, while lists are dynamic and can hold elements of different data types.

  • Arrays are declared with a fixed size, while lists can grow or shrink dynamically.

  • Arrays can only hold elements of the same data type, while lists can hold elements of different data types.

  • Arrays are accessed using an index, while lists are accessed using an iterator.

  • Examples: int[] arr = new int[5]; List list = new ArrayList<>();

Add your answer

Q263. Write a program to perform Merge sort on an array of N numbers.

Ans.

Program to perform Merge sort on an array of N numbers.

  • Divide the array into two halves recursively

  • Sort the two halves using merge sort

  • Merge the two sorted halves

  • Repeat until the entire array is sorted

  • Time complexity: O(nlogn)

Add your answer

Q264. 1. CODE FOR PRIME NUMBERS 2. CODE FOR CLUSTERED AND NON-CLUSTERED INDEX 3. OOPS, CONCEPTS 4. QUESTIONS ON YOUR PROJECTS 5. BASIC HR QUESTIONS

Add your answer

Q265. How to identify object in Selenium

Ans.

To identify objects in Selenium, we use locators such as ID, Name, Class Name, XPath, CSS Selector, etc.

  • Locators are used to identify web elements on a page

  • ID and Name are the most commonly used locators

  • XPath and CSS Selector are more powerful but slower

  • Class Name is useful for identifying multiple elements with the same class

  • Locators can be used with findElement() and findElements() methods

  • Example: driver.findElement(By.id("username"));

Add your answer

Q266. 2. Explain the OOPs concepts

Ans.

OOPs concepts are the fundamental principles of Object-Oriented Programming.

  • Abstraction: Hiding implementation details and showing only necessary information.

  • Encapsulation: Binding data and functions together to protect data from outside interference.

  • Inheritance: Acquiring properties and behavior of a parent class by a child class.

  • Polymorphism: Ability of an object to take many forms or have multiple behaviors.

Add your answer

Q267. What is the formula for gradient descent?

Ans.

Gradient descent is an optimization algorithm used to minimize the cost function of a machine learning model.

  • Start with an initial guess for the model parameters

  • Calculate the gradient of the cost function with respect to each parameter

  • Update the parameters in the opposite direction of the gradient

  • Repeat until convergence or a maximum number of iterations is reached

Add your answer

Q268. tell me the complete process and connection how the electricity reaches our switch board

Add your answer

Q269. What is opps ?, Difference between java and python?

Ans.

OOPs is Object Oriented Programming. Java and Python are both OOPs languages, but differ in syntax and usage.

  • Java is statically typed, while Python is dynamically typed

  • Java requires more verbose syntax, while Python is more concise

  • Java is better suited for large-scale enterprise applications, while Python is better for scripting and data analysis

  • Java has a stronger emphasis on performance, while Python prioritizes ease of use and readability

  • Both languages support inheritance,...read more

Add your answer

Q270. How to replicate the data from mdg to down stream systems

Ans.

Replicating data from mdg to downstream systems involves setting up data pipelines and transformation processes.

  • Set up data pipelines to extract data from mdg

  • Transform the data to match the downstream systems' format

  • Load the transformed data into the downstream systems

  • Monitor the data replication process for any errors or inconsistencies

View 1 answer

Q271. How to cal child to parent in Lightning aura

Ans.

To call child to parent in Lightning aura, use events and event handlers.

  • Create an event in the child component

  • Register the event in the parent component

  • Create an event handler in the parent component

  • Fire the event from the child component

  • Handle the event in the parent component

  • Pass data between the child and parent components using event attributes

Add your answer

Q272. tell me something about android 1

Add your answer

Q273. what is feature and step definitions in cucumber BDD

Ans.

Feature files contain high-level description of the functionality to be tested, while step definitions are the implementation of the steps in the feature file using code.

  • Feature files are written in Gherkin syntax and describe the behavior of the application in plain text.

  • Step definitions are written in programming languages like Java, Ruby, etc., and map the steps in the feature file to automation code.

  • Feature files and step definitions together form the basis of Behavior Dr...read more

Add your answer

Q274. What is IPv4 and IPv6?

Ans.

IPv4 and IPv6 are internet protocol versions used to identify devices on a network.

  • IPv4 uses 32-bit addresses and can support up to 4.3 billion unique addresses.

  • IPv6 uses 128-bit addresses and can support an almost infinite number of unique addresses.

  • IPv6 also includes features such as better security and improved routing.

  • Both protocols are currently in use, but IPv6 is becoming more widely adopted as IPv4 addresses become scarce.

View 3 more answers

Q275. What do u know about network security ?

Ans.

Network security refers to the practice of protecting computer networks from unauthorized access or attacks.

  • Network security involves implementing various measures to prevent unauthorized access to a network, such as firewalls, intrusion detection systems, and virtual private networks (VPNs).

  • It also includes ensuring the confidentiality, integrity, and availability of data transmitted over the network.

  • Examples of network security threats include malware, phishing attacks, and...read more

Add your answer

Q276. What is memory allocation?

Ans.

Memory allocation is the process of assigning memory space to programs or processes.

  • Memory allocation is essential for programs to run efficiently.

  • It involves reserving a block of memory for a program to use.

  • There are different methods of memory allocation such as stack allocation and heap allocation.

  • Examples of memory allocation functions in programming languages include malloc() in C and new operator in C++.

Add your answer

Q277. How to obtain values from a dictionary?

Add your answer

Q278. Enquiries about resolving different Salesforce tickets

Ans.

Resolving Salesforce tickets involves investigating and addressing customer inquiries.

  • Understand the nature of the ticket and prioritize based on urgency

  • Research solutions within Salesforce knowledge base or consult with team members

  • Communicate with customer to gather more information and provide updates on progress

  • Implement solutions and follow up to ensure customer satisfaction

Add your answer

Q279. Write a code to find prime number between two given numbers.

Ans.

Code to find prime numbers between two given numbers.

  • Create a function that takes two numbers as input

  • Loop through the range of numbers between the two inputs

  • Check if each number is prime using a separate function

  • If the number is prime, add it to a list

  • Return the list of prime numbers

Add your answer

Q280. Difference between UI police and client script.

Ans.

UI policy and client script are both used in ServiceNow for controlling field behavior and data on forms.

  • UI policy is used to dynamically change field properties, visibility, and mandatory status based on certain conditions.

  • Client script is used to add custom logic and behavior to forms, such as field validation, calculations, and UI interactions.

  • UI policy is executed on the server side, while client script is executed on the client side.

  • UI policy is defined using a simple dr...read more

View 1 answer

Q281. Example function overloading and overriding

Ans.

Function overloading is having multiple functions with the same name but different parameters, while function overriding is redefining a function in a subclass.

  • Function overloading: Same function name but different parameters (e.g. sum(int a, int b) and sum(double a, double b)

  • Function overriding: Redefining a function in a subclass with the same name and parameters as in the superclass

  • Overloading is resolved at compile time, while overriding is resolved at runtime

Add your answer

Q282. 1. What is owasp top 10 web? 2. Types of injection attack?. 3. Java based questions?. 4. Projects and internship?.

Ans.

OWASP Top 10 is a list of the top 10 most critical web application security risks.

  • Injection attacks include SQL injection, LDAP injection, and XPath injection.

  • Java based questions may include topics like object-oriented programming, exception handling, and multithreading.

  • Projects and internships can showcase practical application of skills and knowledge gained in a real-world setting.

Add your answer

Q283. Share personal information document verification

Ans.

Personal information document verification process

  • Personal information documents are verified to ensure authenticity and accuracy

  • Documents may include passport, driver's license, birth certificate, etc.

  • Verification process may involve cross-checking with government databases or contacting issuing authorities

  • Strict confidentiality and security measures are in place to protect personal information

View 1 answer

Q284. What is a Constructor and how to declare it?

Add your answer

Q285. Explain Inheritance

Ans.

Inheritance is a concept in object-oriented programming where a class inherits properties and behaviors from another class.

  • Inheritance allows for code reuse and promotes the concept of hierarchy.

  • The class that is being inherited from is called the superclass or base class.

  • The class that inherits from the superclass is called the subclass or derived class.

  • The subclass can access the public and protected members of the superclass.

  • Inheritance can be single, where a subclass inhe...read more

View 1 answer

Q286. program to print odd prime number?

Ans.

A program to print odd prime numbers.

  • Start with a loop to iterate through all odd numbers

  • Check if the number is prime using a function

  • If the number is prime, print it

Add your answer

Q287. What is a dangling pointers

Ans.

Dangling pointers are pointers that point to a memory location that has been deallocated or freed.

  • Dangling pointers occur when memory is freed but the pointer is not set to NULL.

  • They can lead to crashes, unpredictable behavior, or security vulnerabilities.

  • Example: int* ptr = new int; delete ptr; // ptr is now a dangling pointer.

View 1 answer

Q288. What are the datatypes in Python?

Add your answer

Q289. What are octane and cetane numbers?

Add your answer

Q290. Write a program to check for palindrome.

Ans.

Program to check if a given string is a palindrome or not.

  • Remove all non-alphanumeric characters from the string

  • Convert the string to lowercase

  • Reverse the string and compare with the original string

  • If both are equal, then the string is a palindrome

View 1 answer

Q291. What is the difference between ipv4 and ipv6

Ans.

IPv4 uses 32-bit addresses while IPv6 uses 128-bit addresses.

  • IPv4 addresses are written in decimal format (e.g. 192.168.1.1) while IPv6 addresses are written in hexadecimal format (e.g. 2001:0db8:85a3:0000:0000:8a2e:0370:7334).

  • IPv4 supports around 4.3 billion unique addresses while IPv6 supports an astronomical number of unique addresses (approximately 340 undecillion).

  • IPv4 uses ARP (Address Resolution Protocol) for mapping IP addresses to MAC addresses, while IPv6 uses NDP (...read more

Add your answer

Q292. What is difference between 4stroke and 2 stroke engine?

Ans.

4-stroke engines have 4 strokes per cycle, while 2-stroke engines have 2 strokes per cycle.

  • 4-stroke engines are more fuel-efficient and produce less pollution than 2-stroke engines.

  • 2-stroke engines are simpler and lighter than 4-stroke engines.

  • 4-stroke engines have separate intake, compression, power, and exhaust strokes, while 2-stroke engines combine intake and compression, and power and exhaust strokes.

  • Examples of 4-stroke engines include those found in cars, while example...read more

Add your answer

Q293. What is lazy loading and how we can implement in our project.

Ans.

Lazy loading is a technique used to defer loading non-essential resources until they are needed.

  • Lazy loading helps improve performance by only loading resources when they are required.

  • In React, lazy loading can be implemented using React.lazy() and Suspense components.

  • Example: const MyComponent = React.lazy(() => import('./MyComponent'));

  • Example: Loading...}>

Add your answer

Q294. What is react routing and how it is different from other conventional routing methods.

Ans.

React routing is a way to handle navigation in a React application by defining routes and rendering components based on the URL.

  • React routing allows for declarative routing, where routes are defined using JSX elements.

  • It enables dynamic routing based on the URL, allowing for different components to be rendered based on the route.

  • React Router is a popular library for handling routing in React applications.

  • Unlike conventional routing methods, React routing is more efficient as ...read more

Add your answer

Q295. program on c..sum of odd numbers from 0 to 100

Ans.

Program to calculate the sum of odd numbers from 0 to 100 in C.

  • Initialize a variable to store the sum.

  • Use a loop to iterate through numbers from 0 to 100.

  • Check if the number is odd using the modulo operator.

  • If the number is odd, add it to the sum variable.

  • Print or return the sum.

Add your answer

Q296. Do you have pan card?

View 3 more answers

Q297. What is object oriented programming language and explain ?

Ans.

Object oriented programming is a programming paradigm that uses objects to represent and manipulate data.

  • Object oriented programming focuses on creating reusable code by organizing data and behavior into objects.

  • Objects have attributes (data) and methods (behavior) that can be accessed and modified through the object's interface.

  • Inheritance allows objects to inherit attributes and methods from parent objects, promoting code reuse and reducing redundancy.

  • Polymorphism allows ob...read more

Add your answer

Q298. Do you know about any programing languages?

Add your answer

Q299. What is RAID and Raid 5 ,Raid 6 Types

Ans.

RAID stands for Redundant Array of Independent Disks. RAID 5 and RAID 6 are types of RAID configurations for data storage.

  • RAID (Redundant Array of Independent Disks) is a data storage virtualization technology that combines multiple physical disk drive components into one or more logical units for the purposes of data redundancy, performance improvement, or both.

  • RAID 5 uses block-level striping with distributed parity. It requires at least three disks to implement and provide...read more

View 2 more answers

Q300. Tell me about all the terms and conditions.

Ans.

Terms and conditions refer to the rules and regulations that govern a particular agreement or contract.

  • Terms and conditions outline the rights and responsibilities of both parties involved in the agreement.

  • They may include clauses related to payment, delivery, warranties, and liability.

  • It is important to read and understand the terms and conditions before agreeing to any contract.

  • Failure to comply with the terms and conditions may result in legal consequences.

  • Examples of term...read more

Add your answer
1
2
3
4
5
6

More about working at Cognizant

Top Rated Mega Company - 2024
Top Rated IT/ITES Company - 2024
HQ - Teaneck. New Jersey., United States (USA)
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos
Top Cognizant Interview Questions And Answers
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
75 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter