Cognizant
100+ Helukabel Interview Questions and Answers
Q1. Application of Row_Number, Rank, and Dense Rank? Different stages of defects/Bugs? What are Schema objects? Different types of loads in ETL Testing? What is Junk Dimension? SQL to remove duplicates from a table...
read moreInterview questions on SQL and ETL testing
Row_Number, Rank, and Dense Rank are used for ranking and ordering data in SQL
Defects/Bugs can be classified into different stages such as Open, In Progress, Resolved, Closed, etc.
Schema objects are database objects such as tables, views, indexes, etc.
Different types of loads in ETL Testing include Full Load, Incremental Load, and Delta Load
Junk Dimension is a dimension table that contains low cardinality columns
SQL to remove duplicat...read more
Q2. 1. Different types of schemas 2. Different types of slowly changing dimensions with real time examples used in our previous projects 3. Layers of ETL Testing and questions related to Staging layers 4. Report te...
read moreInterview questions for Senior Associate position in ETL Testing
Different types of schemas in ETL
Examples of slowly changing dimensions
Layers of ETL Testing and questions related to Staging layers
Types of reports and dashboard for report testing
Handling P1 defects in defect cycle
SQL queries with different scenarios
Q3. How to solve the problem if your team mate is underperforming
Address underperformance of team mate by identifying root cause and providing support.
Have a conversation with the team mate to understand the root cause of underperformance
Provide support and resources to help the team mate improve
Set clear expectations and goals for the team mate
Monitor progress and provide feedback regularly
Consider involving a supervisor or HR if the issue persists
Q4. What is the difference in mapping parameter and mapping variable ?
Mapping parameter is used to pass values to a mapping at run time, while mapping variable is used to store values within a mapping.
Mapping parameter is defined in the mapping configuration and can be changed at run time.
Mapping variable is defined within the mapping and can be used to store values temporarily.
Mapping parameter is used to pass values from one mapping to another.
Mapping variable is used to store values within a mapping for use in subsequent transformations.
Q5. 1.How can you improve performance tuning issue in informatica? 2.What is joiner Transformation and Router Transformation? 3.What is a mapping? 4.How you will handle complex mapping ? 5.What is session log ? 6. ...
read moreAnswers to questions related to Informatica performance tuning, transformations, mapping, and session log.
To improve performance tuning in Informatica, we can use techniques like partitioning, pushdown optimization, and caching.
Joiner Transformation is used to join two heterogeneous sources based on a common key, while Router Transformation is used to route data based on specified conditions.
A mapping is a set of source and target definitions, transformations, and rules that ...read more
Q6. What is the difference in view and materialized view? Can we update a view ?
View is a virtual table while materialized view is a physical table. Views cannot be updated directly.
View is a logical representation of data while materialized view is a physical copy of data.
Materialized views are stored on disk while views are not.
Views cannot be updated directly but can be updated indirectly by updating the underlying tables.
Materialized views can be updated but the refresh process can be time-consuming.
Q7. What is the difference in Source level commit and target level commit ?
Source level commit is done at the source code level while target level commit is done at the target code level.
Source level commit is done when changes are made to the source code and committed to the source code repository.
Target level commit is done when changes are made to the target code and committed to the target code repository.
Source level commit is done before the code is compiled while target level commit is done after the code is compiled.
Source level commit is mo...read more
Q8. What is difference between list and tuple. Data types in python , Code for Fibonacci series , List Comprehension, Python DataFrames , Types of Joins , Difference between UNION and UNION ALL
Explaining differences between list and tuple, Python data types, Fibonacci series, List Comprehension, DataFrames, Joins, UNION and UNION ALL.
List is mutable while tuple is immutable
List uses square brackets while tuple uses parentheses
Fibonacci series is a sequence of numbers where each number is the sum of the two preceding ones
List comprehension is a concise way to create lists based on existing lists
DataFrames are two-dimensional size-mutable, tabular data structures wit...read more
Q9. How to create department wise files by Informatica ?
To create department wise files in Informatica, use the Group By transformation and specify the department column as the grouping key.
Use a Source Qualifier transformation to read the input data
Add a Group By transformation and specify the department column as the grouping key
Connect the Group By transformation to multiple Target instances, each representing a department
Use a Router transformation to route the data to the appropriate Target instance based on the department co...read more
Q10. How router treats If both router group condition satisfies then which target will be loaded.
The router will load the target that has the highest priority.
Router group conditions are evaluated in order of priority.
The target with the highest priority that satisfies both conditions will be loaded.
Priority can be set using numerical values or by order of appearance in the configuration file.
Q11. Explain your data flow of current project and retention time in different variants of snowflake
The data flow of the current project involves multiple variants of Snowflake with varying retention times.
The project uses Snowflake for data storage and processing.
Different variants of Snowflake are used with varying retention times.
Data flows into Snowflake from various sources and is processed and analyzed.
The processed data is then used for reporting and decision-making.
Examples of Snowflake variants used include Standard, Enterprise, and Business Critical.
Retention time...read more
Q12. Integration Standard Design Patterns and which one to apply for which case
Integration standard design patterns are used to ensure consistency and efficiency in software integration. Different patterns are applied based on the specific use case.
Integration patterns include messaging, file transfer, remote procedure invocation, and database integration
Messaging patterns are used for asynchronous communication between systems
File transfer patterns are used for batch processing and data exchange
Remote procedure invocation patterns are used for synchron...read more
Q13. What port client uses for Symantec live update module.
Symantec live update module uses port number _____
Symantec live update module uses a dynamic port range from 80 to 443
The exact port number can be found in the LiveUpdate Settings in the Symantec Endpoint Protection Manager console
Firewall rules should be configured to allow traffic on these ports
Q14. What is the ration of applied and unapplied in your organisation
The ratio of applied and unapplied varies depending on the project and client needs.
We prioritize applying payments to outstanding invoices to reduce unapplied balances.
Unapplied balances can occur due to overpayments, prepayments, or misapplied payments.
We regularly review and reconcile unapplied balances to ensure accuracy.
The ratio can range from 1:1 to 10:1 depending on the project and client payment behavior.
Q15. 1.java 8 intermediate operations and terminal and nonterminal operations with exmaples. 2.functional interface uses and methods 3.streams of and streams intermediate operations.. 4.springboot flow 5.euroka serv...
read moreQuestions related to Java 8, functional interfaces, streams, Spring Boot, and externalized properties
Java 8 intermediate operations and terminal/non-terminal operations with examples
Functional interface uses and methods
Streams of and streams intermediate operations
Spring Boot flow
Eureka server uses in microservices
Producer and consumer examples of Java 8
Externalized application.properties file
What happens when we use both .yml and .properties
Q16. How to improve the performance Tuning Techniques using any scenario
Performance tuning techniques can be improved by analyzing query execution plans, optimizing indexes, and using caching.
Analyze query execution plans to identify bottlenecks and optimize them
Optimize indexes to improve query performance
Use caching to reduce the number of database calls
Use stored procedures to reduce network traffic and improve performance
Use database partitioning to distribute data across multiple servers
Use query hints to force the use of specific indexes or...read more
Q17. What is the difference in static cache and Dynamic cache ?
Static cache is preloaded and remains constant while dynamic cache is updated frequently based on usage.
Static cache is loaded once and remains unchanged until the cache is cleared or expired.
Dynamic cache is updated frequently based on usage and can change at any time.
Static cache is useful for content that doesn't change often, like images or CSS files.
Dynamic cache is useful for frequently changing content, like social media feeds or news articles.
Q18. How you will manage if client asks do little more enhancements which are not included in the sprint task
I would communicate with the client to understand the specific requirements and assess the impact on the project timeline and resources.
Communicate with the client to understand the specific enhancements they are requesting
Assess the impact of the additional enhancements on the project timeline and resources
Discuss with the team to evaluate the feasibility of incorporating the enhancements
Prioritize the enhancements based on their importance and impact on project goals
Update ...read more
Q19. What are the types of the dashboards you have worked in Tableau?
I have worked on various types of dashboards in Tableau including interactive dashboards, performance dashboards, and executive dashboards.
Interactive dashboards
Performance dashboards
Executive dashboards
Q20. What is the ETL tool used for Data wrangling and what is your proficiency on the same?
The ETL tool used for Data wrangling is Apache Spark. I have a high proficiency in using Apache Spark for ETL processes.
Apache Spark is a powerful open-source distributed computing system that can handle large-scale data processing and analytics.
It provides a unified engine for big data processing with built-in modules for SQL, streaming, machine learning, and graph processing.
I have experience in using Apache Spark for data wrangling tasks such as data cleaning, transformati...read more
Q21. Installation and configuration of Hyperion Planning essbase and Hyperion Financial Management.
Installation and configuration of Hyperion Planning essbase and Hyperion Financial Management.
Ensure all system requirements are met before installation
Install and configure Hyperion Planning essbase and Hyperion Financial Management software
Configure database connections and security settings
Test the installation and configuration to ensure proper functionality
Provide training and support to end-users
Q22. End to end installation of latest version and the difference with old version
The latest version has new features and improvements compared to the old version. End-to-end installation involves a complete installation process from start to finish.
The latest version has new features and improvements compared to the old version
End-to-end installation involves a complete installation process from start to finish
Old version may have compatibility issues with newer hardware or software
New version may have better security features
New version may have improved...read more
Q23. How spring boot is working behind , Bean Life cycle method
Spring Boot uses Bean Life cycle methods to manage the creation and destruction of beans in the application context.
Spring container instantiates the bean by calling the default constructor or a static factory method.
Spring sets the bean properties and dependencies using setters or constructor injection.
If the bean implements InitializingBean interface, the afterPropertiesSet() method is called.
If the bean has init-method specified in the configuration, that method is called....read more
Q24. How to create tasks in information steward
Creating tasks in Information Steward
Open Information Steward and go to the 'Tasks' tab
Click on 'New Task' and select the type of task you want to create
Fill in the necessary details and save the task
Assign the task to the appropriate user or group
Monitor the progress of the task in the 'Task Monitor' tab
Q25. Annotations of TestNG, Selenium Usage and Implementations using Java, Java HashMap, Java HashMap Program
The question is about TestNG annotations, Selenium usage and implementation using Java, and Java HashMap program.
TestNG annotations are used to define the test methods and their behavior.
Selenium is a web testing framework used to automate web browsers.
Java HashMap is a collection that stores key-value pairs.
Java HashMap program can be used to implement various functionalities like caching, data storage, etc.
Q26. What is Fault tolerance in MS , how do you achieve in Spring framework
Fault tolerance in MS and achieving it in Spring framework
Fault tolerance is the ability of a system to continue functioning even in the presence of faults or errors
In MS, fault tolerance can be achieved through technologies like clustering, load balancing, and replication
In Spring framework, fault tolerance can be achieved through the use of circuit breakers, retry mechanisms, and fallbacks
Circuit breakers can be used to prevent cascading failures by stopping requests to a s...read more
Q27. Daily activities, experience in SSL configuration for Hyperion
I have experience in configuring SSL for Hyperion and perform daily activities related to it.
I have configured SSL for Hyperion on multiple occasions
I am familiar with SSL certificate installation and renewal
I perform daily checks to ensure SSL is functioning properly
I troubleshoot SSL related issues when they arise
Q28. What is the life cycle of an implementation project
The life cycle of an implementation project involves planning, execution, monitoring, and closure.
Initiation: Define project scope, objectives, and stakeholders.
Planning: Develop project plan, schedule, and budget.
Execution: Implement project plan and deliverables.
Monitoring: Track progress, manage risks, and make adjustments as needed.
Closure: Finalize project deliverables, obtain client acceptance, and hand over project to operations.
Example: In a software implementation pr...read more
Q29. what is horizontal and vertical scaling ?
Horizontal scaling means adding more machines to a pool of resources, while vertical scaling means adding more power (CPU, RAM) to an existing machine.
Horizontal scaling involves adding more machines to a network to increase capacity
Vertical scaling involves adding more resources (CPU, RAM) to a single machine to increase capacity
Horizontal scaling is more cost-effective and easier to implement than vertical scaling
Examples of horizontal scaling include load balancing and clu...read more
Q30. Synchronized and Asynchronized calls to Microservice
Synchronized calls wait for a response before continuing, while asynchronized calls do not wait.
Synchronized calls block the calling thread until a response is received
Asynchronized calls do not block the calling thread and allow it to continue executing
Synchronized calls are useful when the response is needed immediately
Asynchronized calls are useful when the response is not needed immediately or when multiple calls can be made simultaneously
Examples of synchronized calls in...read more
Q31. What is component, app module, scope
Components are reusable UI elements, app modules are containers for related components and services, and scope defines the context in which a component or service is available.
Components are self-contained and can be easily reused throughout an application
App modules group related components and services together
Scope defines the context in which a component or service is available, such as within a specific module or across the entire application
Example: A component could be...read more
Q32. What is the difference between File poller and File Adapter?
File poller and File Adapter are both used for file integration but have different functionalities.
File poller is used to poll a directory for new or modified files and trigger a flow when a file is found.
File Adapter is used to read, write, and manage files in a directory.
File poller is event-driven while File Adapter is action-driven.
File poller is used for real-time integration while File Adapter is used for batch integration.
File poller is used to trigger a flow while Fil...read more
Q33. Store few values in hashmap and remove particular value based on key
Store and remove values in a hashmap based on keys
Create a hashmap to store key-value pairs
Use the put() method to store values in the hashmap
Use the remove() method to remove a particular value based on the key
Q34. Difference between hadr_timeout and hadr_peer_window
hadr_timeout is the time period for a failover to occur, while hadr_peer_window is the number of log records that can be sent to the secondary replica.
hadr_timeout determines how long it takes for a failover to occur if the primary replica becomes unavailable
hadr_peer_window determines the number of log records that can be sent to the secondary replica before waiting for acknowledgement
Both are important for maintaining high availability in SQL Server Always On Availability G...read more
Q35. Exception Hierarchy and user defined exceptions in Webservices
Explanation of exception hierarchy and user defined exceptions in Webservices
Exception hierarchy in Webservices includes checked and unchecked exceptions
Checked exceptions must be declared in the method signature or handled in a try-catch block
User defined exceptions can be created by extending the Exception class
These exceptions can be thrown and caught like any other exception
Examples of user defined exceptions include InvalidInputException or AuthenticationException
Q36. How to handle multiple browser using Selenium
To handle multiple browsers using Selenium, you can use the WebDriver interface to create separate instances for each browser.
Create separate WebDriver instances for each browser (e.g. ChromeDriver, FirefoxDriver)
Use the desired capabilities to specify the browser type and version
Implement a method to switch between different browser instances as needed
Q37. Various challenges in data visualization Projects where automation was implemented
Challenges in data visualization and automation implementation
Challenges in data visualization include selecting the appropriate chart type, ensuring accuracy and clarity of data, and avoiding misleading visualizations
Automation implementation in data visualization can improve efficiency and reduce errors, but requires careful planning and testing
Examples of projects where automation was implemented include creating dashboards that update automatically, generating reports wit...read more
Q38. How to delete duplicate value in a table
To delete duplicate values in a table, use the DISTINCT keyword in a SELECT statement.
Use the SELECT DISTINCT statement to retrieve only unique values from the table.
Create a new table with the unique values and drop the old table.
Use the GROUP BY clause to group the duplicate values together and then delete them.
Use the ROW_NUMBER() function to assign a unique number to each row and then delete the duplicates with a higher number.
Use a subquery to identify the duplicates and...read more
Q39. Iterating list and creating dictionary from the count
Iterate through a list and create a dictionary with the count of each item
Loop through the list and use a dictionary to store the count of each item
Use the item as the key and increment the count each time it appears
Example: ['apple', 'banana', 'apple'] -> {'apple': 2, 'banana': 1}
Q40. tell me about chromotographic data system
A chromatographic data system is a software used to collect, analyze and manage data from chromatography instruments.
It allows for real-time monitoring of chromatography runs
It can perform data analysis and generate reports
It can integrate with other laboratory software and instruments
Examples include Empower, Chromeleon, and OpenLAB
It is commonly used in pharmaceutical, biotech, and chemical industries
Q41. How to do conflict and stakeholder management
Conflict and stakeholder management involves effective communication, negotiation, and relationship-building.
Identify key stakeholders and their interests
Communicate openly and transparently with stakeholders
Listen actively to understand concerns and perspectives
Negotiate mutually beneficial solutions
Build strong relationships through trust and respect
Q42. Difference between applied credit and unallocated credit
Applied credit is assigned to a specific invoice or account, while unallocated credit is not yet assigned to any specific transaction.
Applied credit is used to pay off a specific invoice or account balance.
Unallocated credit is a payment that has been received but not yet applied to a specific invoice or account.
Applied credit reduces the outstanding balance of a specific invoice or account.
Unallocated credit can be applied to any outstanding balance in the future.
For example...read more
Q43. What is the memory Leak in java
Memory leak is a situation where a program fails to release memory that is no longer needed.
Memory leaks occur when objects are not properly deallocated from memory.
This can lead to the program consuming more and more memory over time.
Common causes of memory leaks include circular references, static variables, and unclosed resources.
Examples of memory leaks in Java include not closing database connections, not releasing file handles, and not removing event listeners.
Memory le...read more
Q44. what are promises and callback hell
Promises and callback hell are concepts in asynchronous programming where nested callbacks can lead to unreadable and difficult to maintain code.
Promises are objects representing the eventual completion or failure of an asynchronous operation. They help in handling asynchronous operations in a more organized and readable way.
Callback hell refers to the situation where multiple nested callbacks are used to handle asynchronous operations, leading to code that is hard to read, d...read more
Q45. Joiner transformation Connected and unconnected look u difference
Joiner transformation - connected and unconnected look up difference
Joiner transformation is used to join two sources based on a common key
Connected lookup is used when the lookup table is in the same mapping
Unconnected lookup is used when the lookup table is outside the mapping
Connected lookup returns multiple rows while unconnected lookup returns only one row
Joiner transformation can be used with both connected and unconnected lookup
Q46. TSA Installation and uses of Quorum network IP.
Quorum network IP is used for secure communication and data sharing in TSA installations.
Quorum network IP is a private network used for communication between nodes in a TSA installation.
It provides secure and encrypted communication for data sharing and transactions.
Quorum network IP is used for consensus mechanisms and smart contract execution.
Examples of TSA installations using Quorum network IP include supply chain management and financial services.
Q47. What is diff between online and onprem sharwpoint
Online SharePoint is cloud-based while on-premises SharePoint is installed on local servers.
Online SharePoint is accessed through a web browser, while on-premises SharePoint is accessed through a local network.
Online SharePoint is managed and maintained by Microsoft, while on-premises SharePoint requires in-house IT support.
Online SharePoint offers automatic updates and scalability, while on-premises SharePoint allows for more customization and control over data.
Online ShareP...read more
Q48. Typical studio implementation that you worked on?
Implemented a studio project involving virtual reality technology for immersive training experiences.
Developed interactive VR simulations for training purposes
Integrated motion tracking technology for realistic user interactions
Collaborated with subject matter experts to ensure accuracy and effectiveness
Utilized Unity3D and Unreal Engine for development
Implemented user feedback mechanisms for continuous improvement
Q49. PICOF or PECI which is recommendable
Both PICOF and PECI are recommendable depending on the specific context and requirements.
PICOF (Population, Intervention, Comparison, Outcome, Follow-up) is commonly used in research to formulate clinical questions and design studies.
PECI (Population, Exposure, Comparison, Outcome) is another framework used in epidemiology and public health research.
Choose PICOF for clinical research questions and PECI for epidemiological studies.
Consider the specific research goals and study...read more
Q50. Explain different ways data can be shared in components
Data can be shared in components through props, state, context, and Redux.
Props: data is passed down from parent to child components
State: data is managed within a component and can be updated
Context: data can be shared between components without having to pass it down through props
Redux: a state management library that allows for global data sharing and management
Examples: passing a user's name as a prop to a child component, managing a form's input data in state, sharing a ...read more
Q51. How to increase Backup performance
To increase backup performance, optimize backup settings, use faster hardware, and prioritize critical data.
Optimize backup settings such as compression and deduplication
Use faster hardware such as solid-state drives and high-speed network connections
Prioritize critical data to ensure it is backed up first
Consider using backup software that utilizes incremental backups
Regularly test and monitor backup performance to identify and address any issues
Q52. array list vs linked list , collections,overriding etc
Array list and linked list are both implementations of the List interface in Java Collections. Array list uses an array to store elements, while linked list uses nodes with references to the next element.
Array list provides fast random access to elements using indexes, but slower insertion and deletion operations compared to linked list.
Linked list allows for fast insertion and deletion operations by simply changing references, but slower random access due to traversal from t...read more
Q53. [1001,1100,1011] --> remove zeros from array
Remove zeros from array of strings
Iterate through the array and filter out any strings that contain '0'
Create a new array with the filtered strings
Q54. How did I dockerize my apps.
Dockerizing apps involves creating a Dockerfile, building an image, and running a container.
Create a Dockerfile that specifies the app's dependencies and commands
Build a Docker image using the Dockerfile
Run a Docker container from the image
Use Docker Compose to manage multiple containers
Example: docker build -t myapp .
Example: docker run -p 8080:80 myapp
Example: docker-compose up
Q55. Modes of HADR and their differences
HADR modes include prevention, preparedness, response, and recovery.
Prevention involves measures to avoid or reduce the impact of disasters.
Preparedness involves planning and training to respond effectively to disasters.
Response involves immediate actions to save lives and reduce damage during a disaster.
Recovery involves restoring normalcy and rebuilding after a disaster.
Examples of HADR modes include evacuation drills, emergency supplies, search and rescue operations, and i...read more
Q56. Array vs list - what is the difference
Arrays are fixed in size, while lists can dynamically grow or shrink.
Arrays have a fixed size, while lists can dynamically resize.
Arrays can only store elements of the same data type, while lists can store different data types.
Arrays are more efficient for random access, while lists are better for insertion and deletion operations.
Q57. Why string is immutable in java
String is immutable in Java to ensure security, thread safety, and optimization.
Immutable strings prevent accidental changes to sensitive data.
Immutable strings allow for safe sharing of strings between multiple threads.
Immutable strings enable string pooling for memory optimization.
Q58. Explain Angular Services and sharing of data
Angular services are singleton objects that can be injected into components to share data and functionality.
Services are used to share data and functionality across components
They are singleton objects, meaning there is only one instance of the service in the application
Services can be injected into components using dependency injection
Data can be shared between components using services
Examples of services include HTTP service for making API calls and a logging service for l...read more
Q59. What is your CTC and ECTC?
My current CTC is $80,000 and my expected CTC is $90,000.
Current CTC: $80,000
Expected CTC: $90,000
Q60. How to validate data in thoughtspot
ThoughtSpot provides various methods to validate data.
Use data validation rules to ensure data accuracy and integrity
Leverage built-in functions and expressions to validate data
Perform data quality checks using SQL queries
Implement custom validation scripts or plugins if needed
Q61. Load Options while load has failed.
Options to consider when load fails
Check if there is enough disk space
Verify if the network connection is stable
Ensure that the correct file format is being used
Try loading the file on a different machine
Contact technical support for further assistance
Q62. Deployment of webapp into Azure app services
Deployment of webapp into Azure app services involves creating an app service plan, configuring deployment settings, and deploying the webapp.
Create an app service plan in Azure portal
Configure deployment settings such as deployment slots, continuous deployment, and deployment credentials
Deploy the webapp using tools like Visual Studio, Azure CLI, or Azure DevOps
Q63. Microservices architecture using Spring Boot
Microservices architecture using Spring Boot
Microservices architecture is an approach to building applications as a collection of small, independent services
Spring Boot is a popular framework for building microservices in Java
Spring Boot provides a number of features that make it easy to build and deploy microservices, such as auto-configuration and embedded servers
Microservices can communicate with each other using RESTful APIs or messaging systems like Kafka or RabbitMQ
Micr...read more
Q64. Find second largest element in an array
Find the second largest element in an array of strings.
Convert the strings to integers for comparison.
Sort the array in descending order.
Return the second element in the sorted array.
Q65. How to override MUI classes
Override MUI classes by using the makeStyles function provided by Material-UI
Create a custom styles object using makeStyles function
Override specific classes by targeting them in the styles object
Apply the custom styles to the component using the className prop
Q66. What is claim adjudication?
Claim adjudication is the process of reviewing and determining the validity of a claim submitted by a policyholder.
Claim adjudication involves reviewing the claim for accuracy and completeness.
It also includes verifying the policy coverage and determining the amount to be paid out.
Adjudication may involve communication with healthcare providers or other parties involved in the claim.
Examples of claim adjudication include processing medical insurance claims or car insurance cl...read more
Q67. Tell me about OOPS concepts.
OOPS concepts refer to Object-Oriented Programming concepts which include inheritance, encapsulation, polymorphism, and abstraction.
Inheritance allows a class to inherit properties and behavior from another class.
Encapsulation refers to bundling data and methods that operate on the data into a single unit.
Polymorphism allows objects to be treated as instances of their parent class.
Abstraction hides the complex implementation details and only shows the necessary features to th...read more
Q68. WAP to Count the character in a String
A function to count the characters in a given string.
Iterate through the string and use a HashMap to store the count of each character.
Handle both uppercase and lowercase characters separately if needed.
Consider spaces and special characters as well.
Return the HashMap with character counts.
Q69. Dependency injection in Angular? Explain
Dependency injection is a design pattern used in Angular to inject dependencies into components or services.
Dependency injection allows for loose coupling between components and services
It makes testing easier by allowing for easy mocking of dependencies
Dependencies can be injected at the component or module level
Angular has a built-in dependency injection system
Example: injecting a service into a component constructor
Q70. What is dynamic sql
Dynamic SQL is a technique of generating SQL statements at runtime based on user input or other conditions.
Allows for flexibility in SQL queries
Can be used to build complex queries
Can be vulnerable to SQL injection attacks
Examples include using variables or concatenation to build queries
Q71. which device used for testing
The device used for testing depends on the type of test being conducted.
For medical tests, devices such as blood pressure monitors, ECG machines, and X-ray machines are used.
For software testing, devices such as computers, mobile phones, and tablets are used.
For mechanical testing, devices such as load cells, torque sensors, and strain gauges are used.
The choice of device depends on the type of test, the accuracy required, and the budget available.
Q72. explanation about chromotographic data system
A chromatographic data system is a software used to collect, process, and analyze data from chromatography experiments.
It allows for real-time monitoring of chromatography experiments
It can automatically detect and quantify peaks in chromatograms
It can generate reports and graphs for data analysis
Examples of chromatographic data systems include Empower and Chromeleon
Q73. How spring boot app starts
A Spring Boot app starts by initializing the Spring ApplicationContext and then launching the embedded Tomcat server.
Spring Boot app starts by scanning for components annotated with @ComponentScan in the specified package and sub-packages.
The application context is then created by loading the beans defined in the configuration classes annotated with @Configuration.
Once the application context is initialized, the embedded Tomcat server is started to serve incoming HTTP request...read more
Q74. Scd 2 and how to implement
SCD 2 is a type of slowly changing dimension in data warehousing, where historical data is preserved by creating new records for changes.
Use effective date and end date columns to track changes over time
Implement Type 2 SCD in ETL processes to handle updates and inserts
Maintain history of changes by creating new records instead of updating existing ones
Q75. How to create answers?
To create answers, one must provide a concise and informative response.
Understand the question and its context
Gather relevant information or data
Organize thoughts and structure the answer
Provide a clear and concise response
Support the answer with examples or evidence
Q76. What are hooks ?
Hooks are functions that allow developers to use state and other React features in functional components.
Hooks were introduced in React 16.8 to allow developers to use state and other React features in functional components.
Some commonly used hooks include useState, useEffect, useContext, and useReducer.
Hooks are used to manage component state, perform side effects, and access context in functional components.
Hooks are called inside functional components and cannot be used in...read more
Q77. Market Analysis of E commerce product
Market analysis of E-commerce product involves researching market trends, competition, target audience, and potential growth opportunities.
Research current market trends in the E-commerce industry
Analyze competition to identify strengths, weaknesses, opportunities, and threats (SWOT analysis)
Identify target audience and their preferences
Evaluate potential growth opportunities for the E-commerce product
Consider factors such as pricing, distribution channels, and marketing stra...read more
Q78. Functional interface Collection vs stream
Functional interface is a single abstract method interface. Collection is a group of objects while stream is a sequence of objects.
Functional interface has only one abstract method and can be used as lambda expressions.
Collection is a group of objects that can be manipulated using various methods like add, remove, etc.
Stream is a sequence of objects that can be processed in parallel or sequentially using various operations like filter, map, etc.
Stream is more efficient for la...read more
Q79. How microservices route ??
Microservices route using API gateways and service discovery mechanisms.
Microservices communicate through API gateways which route requests to the appropriate service
Service discovery mechanisms help microservices locate and communicate with each other
Routing can be based on various factors like load balancing, service health, and versioning
Examples include Netflix Zuul for API gateway and Consul for service discovery
Q80. What is OOPs concept?
OOPs concept stands for Object-Oriented Programming, a programming paradigm based on the concept of objects.
OOPs focuses on creating objects that contain data in the form of attributes and code in the form of methods.
Encapsulation, inheritance, and polymorphism are key principles of OOPs.
Example: In a banking system, a 'Customer' object can have attributes like name and account number, and methods like deposit and withdraw.
Q81. What is SOLID principle?
SOLID is a set of five design principles in object-oriented programming to make software designs more understandable, flexible, and maintainable.
S - Single Responsibility Principle: A class should have only one reason to change.
O - Open/Closed Principle: Software entities should be open for extension but closed for modification.
L - Liskov Substitution Principle: Objects of a superclass should be replaceable with objects of its subclasses without affecting the functionality.
I ...read more
Q82. What is Lambda Expression
Lambda expression is an anonymous function that allows you to write shorter and more concise code.
Lambda expressions are used to create anonymous functions in programming languages like Java, C#, Python, etc.
They are often used in functional programming to pass functions as arguments to other functions.
Lambda expressions can be used to define inline functions without having to explicitly name them.
They are commonly used in Java 8 streams API for concise and readable code.
Exam...read more
Q83. What is dependency injection
Dependency injection is a design pattern in which components are given their dependencies rather than creating them internally.
Dependency injection helps in achieving loose coupling between classes.
It allows for easier testing by providing mock dependencies.
There are three types of dependency injection: constructor injection, setter injection, and interface injection.
Example: Instead of a class creating an instance of a dependency, the dependency is passed to the class throug...read more
Q84. Out of memory error in java
Out of memory error occurs when the JVM runs out of memory to allocate for new objects.
Increase heap size using -Xmx flag
Avoid memory leaks by closing resources properly
Use efficient data structures and algorithms
Consider using a profiler to identify memory-intensive code
Use caching to reduce memory usage
Q85. tell me about framework
A framework is a structured approach or set of guidelines used to solve a specific problem or achieve a specific goal.
A framework provides a foundation for developing software applications.
It includes pre-defined functions, classes, and modules that can be used to build applications.
Frameworks promote code reusability and maintainability.
Examples of frameworks include Django for web development, TensorFlow for machine learning, and React for front-end development.
Q86. Tools of defect tracking
Tools used for tracking defects in software development.
JIRA
Bugzilla
Mantis
Trello
GitHub Issues
Q87. Configuring auto discovery in mulesoft
Auto discovery in MuleSoft allows for automatic detection and configuration of APIs and resources.
Auto discovery can be configured using Anypoint Platform's API Manager.
It automatically detects APIs and resources based on the specified criteria.
Auto discovery simplifies the process of managing APIs and resources by reducing manual configuration.
Examples of criteria for auto discovery include URL patterns, HTTP methods, and headers.
Q88. Explain Domain Driven Development
Domain Driven Development is an approach to software development that focuses on the core domain and domain logic of a business.
Focuses on understanding and modeling the core domain of the business
Emphasizes collaboration between domain experts and developers
Uses a common language to bridge the communication gap between technical and non-technical stakeholders
Encourages the use of domain models to represent the business logic
Helps in creating a flexible and maintainable softw...read more
Q89. What is private equity
Private equity is a type of investment where funds are raised from institutional and high-net-worth investors to acquire equity ownership in companies.
Private equity firms raise capital from investors to acquire ownership stakes in companies
They aim to improve the performance of the acquired companies and eventually sell them for a profit
Private equity investments are typically illiquid and have a long-term investment horizon
Examples of private equity firms include Blackstone...read more
Q90. difficulties faced in automation testing
Difficulties faced in automation testing
Complexity of test cases
Maintenance of test scripts
Handling dynamic elements
Integration with third-party tools
Limited support for non-GUI applications
Q91. Current CTC and Expected CTC
Current CTC is confidential. Expected CTC is based on market standards and my experience.
Current CTC is confidential information as per company policy
Expected CTC is based on market standards and my experience in the industry
I am looking for a competitive salary package that aligns with my skills and responsibilities
Q92. Explain about web protocols
Web protocols are rules and conventions for communication between devices on the internet.
Web protocols define how data is transmitted over the internet
Examples include HTTP, HTTPS, FTP, SMTP, and TCP/IP
They ensure that devices can understand and interpret data exchanged over the web
Q93. Explain Project Structure
Project structure refers to the organization of tasks, resources, and timelines within a project.
Project structure outlines the hierarchy of tasks and subtasks within a project
It includes defining roles and responsibilities of team members
Project structure also involves setting timelines and milestones for completion
Examples of project structures include waterfall, agile, and hybrid methodologies
Q94. Convert int to String
Use the toString() method to convert an int to a String in Java.
Use the toString() method of the Integer class to convert an int to a String.
Example: int num = 10; String str = Integer.toString(num);
Alternatively, you can also use String.valueOf() method to convert int to String.
Q95. What is o to c
O to C refers to the process of converting an object-oriented design into a concrete implementation in a programming language.
O to C involves translating the high-level design of an object-oriented system into code written in a programming language like C.
It requires mapping classes, objects, and their relationships to data structures and functions in C.
O to C often involves using techniques like encapsulation, inheritance, and polymorphism to achieve the desired functionalit...read more
Q96. Performance tuning techniques
Performance tuning techniques involve optimizing code, database queries, and server configurations to improve system efficiency.
Identify and eliminate bottlenecks in the code by profiling and analyzing performance metrics
Optimize database queries by using indexes, avoiding unnecessary joins, and limiting the amount of data retrieved
Fine-tune server configurations such as memory allocation, caching mechanisms, and thread pools
Utilize caching mechanisms like Redis or Memcached ...read more
Q97. Api auto discovery in mulesoft
API auto discovery in MuleSoft refers to the automatic detection and registration of APIs within the MuleSoft Anypoint Platform.
API auto discovery allows MuleSoft to automatically detect APIs within the platform without manual intervention.
This feature helps in easily managing and monitoring APIs within the organization.
API auto discovery simplifies the process of onboarding new APIs and services.
It enables seamless integration and communication between different systems and ...read more
Q98. Primary objects in PLSQL
Primary objects in PLSQL are tables, views, sequences, procedures, functions, packages, triggers, and exceptions.
Tables are used to store data.
Views are virtual tables that display data from one or more tables.
Sequences generate unique numbers.
Procedures and functions are used to perform specific tasks.
Packages are a collection of procedures, functions, and variables.
Triggers are used to automatically execute code when a specific event occurs.
Exceptions are used to handle err...read more
Q99. How to adjust claim,
Adjusting a claim involves reviewing the claim details and making necessary changes to ensure accuracy and completeness.
Review the claim details for accuracy
Identify any missing or incorrect information
Make necessary changes to the claim form or documentation
Submit the adjusted claim for processing
Follow up to ensure the claim is processed correctly
Q100. Interface vs Abstract
Interface defines a contract for classes to implement, while abstract class can have both abstract and concrete methods.
Interface can only have abstract methods and constants, while abstract class can have both abstract and concrete methods.
A class can implement multiple interfaces but can only inherit from one abstract class.
Interfaces are used to achieve multiple inheritance in Java, while abstract classes are used to provide a common base for subclasses.
Interfaces are used...read more
More about working at Cognizant
Top HR Questions asked in Helukabel
Interview Process at Helukabel
Top Senior Associate Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month