Add office photos
Engaged Employer

Cognizant

3.8
based on 48.4k Reviews
Proud winner of ABECA 2024 - AmbitionBox Employee Choice Awards
Filter interviews by

100+ Helukabel Interview Questions and Answers

Updated 20 Jan 2025
Popular Designations

Q1. Application of Row_Number, Rank, and Dense Rank? Different stages of defects/Bugs? What are Schema objects? Different types of loads in ETL Testing? What is Junk Dimension? SQL to remove duplicates from a table...

read more
Ans.

Interview questions on SQL and ETL testing

  • Row_Number, Rank, and Dense Rank are used for ranking and ordering data in SQL

  • Defects/Bugs can be classified into different stages such as Open, In Progress, Resolved, Closed, etc.

  • Schema objects are database objects such as tables, views, indexes, etc.

  • Different types of loads in ETL Testing include Full Load, Incremental Load, and Delta Load

  • Junk Dimension is a dimension table that contains low cardinality columns

  • SQL to remove duplicat...read more

View 1 answer

Q2. 1. Different types of schemas 2. Different types of slowly changing dimensions with real time examples used in our previous projects 3. Layers of ETL Testing and questions related to Staging layers 4. Report te...

read more
Ans.

Interview questions for Senior Associate position in ETL Testing

  • Different types of schemas in ETL

  • Examples of slowly changing dimensions

  • Layers of ETL Testing and questions related to Staging layers

  • Types of reports and dashboard for report testing

  • Handling P1 defects in defect cycle

  • SQL queries with different scenarios

Add your answer

Q3. How to solve the problem if your team mate is underperforming

Ans.

Address underperformance of team mate by identifying root cause and providing support.

  • Have a conversation with the team mate to understand the root cause of underperformance

  • Provide support and resources to help the team mate improve

  • Set clear expectations and goals for the team mate

  • Monitor progress and provide feedback regularly

  • Consider involving a supervisor or HR if the issue persists

View 4 more answers

Q4. What is the difference in mapping parameter and mapping variable ?

Ans.

Mapping parameter is used to pass values to a mapping at run time, while mapping variable is used to store values within a mapping.

  • Mapping parameter is defined in the mapping configuration and can be changed at run time.

  • Mapping variable is defined within the mapping and can be used to store values temporarily.

  • Mapping parameter is used to pass values from one mapping to another.

  • Mapping variable is used to store values within a mapping for use in subsequent transformations.

View 1 answer
Discover Helukabel interview dos and don'ts from real experiences

Q5. 1.How can you improve performance tuning issue in informatica? 2.What is joiner Transformation and Router Transformation? 3.What is a mapping? 4.How you will handle complex mapping ? 5.What is session log ? 6. ...

read more
Ans.

Answers to questions related to Informatica performance tuning, transformations, mapping, and session log.

  • To improve performance tuning in Informatica, we can use techniques like partitioning, pushdown optimization, and caching.

  • Joiner Transformation is used to join two heterogeneous sources based on a common key, while Router Transformation is used to route data based on specified conditions.

  • A mapping is a set of source and target definitions, transformations, and rules that ...read more

Add your answer

Q6. What is the difference in view and materialized view? Can we update a view ?

Ans.

View is a virtual table while materialized view is a physical table. Views cannot be updated directly.

  • View is a logical representation of data while materialized view is a physical copy of data.

  • Materialized views are stored on disk while views are not.

  • Views cannot be updated directly but can be updated indirectly by updating the underlying tables.

  • Materialized views can be updated but the refresh process can be time-consuming.

Add your answer
Are these interview questions helpful?

Q7. What is the difference in Source level commit and target level commit ?

Ans.

Source level commit is done at the source code level while target level commit is done at the target code level.

  • Source level commit is done when changes are made to the source code and committed to the source code repository.

  • Target level commit is done when changes are made to the target code and committed to the target code repository.

  • Source level commit is done before the code is compiled while target level commit is done after the code is compiled.

  • Source level commit is mo...read more

Add your answer

Q8. What is difference between list and tuple. Data types in python , Code for Fibonacci series , List Comprehension, Python DataFrames , Types of Joins , Difference between UNION and UNION ALL

Ans.

Explaining differences between list and tuple, Python data types, Fibonacci series, List Comprehension, DataFrames, Joins, UNION and UNION ALL.

  • List is mutable while tuple is immutable

  • List uses square brackets while tuple uses parentheses

  • Fibonacci series is a sequence of numbers where each number is the sum of the two preceding ones

  • List comprehension is a concise way to create lists based on existing lists

  • DataFrames are two-dimensional size-mutable, tabular data structures wit...read more

Add your answer
Share interview questions and help millions of jobseekers 🌟

Q9. How to create department wise files by Informatica ?

Ans.

To create department wise files in Informatica, use the Group By transformation and specify the department column as the grouping key.

  • Use a Source Qualifier transformation to read the input data

  • Add a Group By transformation and specify the department column as the grouping key

  • Connect the Group By transformation to multiple Target instances, each representing a department

  • Use a Router transformation to route the data to the appropriate Target instance based on the department co...read more

Add your answer

Q10. How router treats If both router group condition satisfies then which target will be loaded.

Ans.

The router will load the target that has the highest priority.

  • Router group conditions are evaluated in order of priority.

  • The target with the highest priority that satisfies both conditions will be loaded.

  • Priority can be set using numerical values or by order of appearance in the configuration file.

Add your answer

Q11. Explain your data flow of current project and retention time in different variants of snowflake

Ans.

The data flow of the current project involves multiple variants of Snowflake with varying retention times.

  • The project uses Snowflake for data storage and processing.

  • Different variants of Snowflake are used with varying retention times.

  • Data flows into Snowflake from various sources and is processed and analyzed.

  • The processed data is then used for reporting and decision-making.

  • Examples of Snowflake variants used include Standard, Enterprise, and Business Critical.

  • Retention time...read more

View 1 answer

Q12. Integration Standard Design Patterns and which one to apply for which case

Ans.

Integration standard design patterns are used to ensure consistency and efficiency in software integration. Different patterns are applied based on the specific use case.

  • Integration patterns include messaging, file transfer, remote procedure invocation, and database integration

  • Messaging patterns are used for asynchronous communication between systems

  • File transfer patterns are used for batch processing and data exchange

  • Remote procedure invocation patterns are used for synchron...read more

Add your answer

Q13. What port client uses for Symantec live update module.

Ans.

Symantec live update module uses port number _____

  • Symantec live update module uses a dynamic port range from 80 to 443

  • The exact port number can be found in the LiveUpdate Settings in the Symantec Endpoint Protection Manager console

  • Firewall rules should be configured to allow traffic on these ports

View 1 answer

Q14. What is the ration of applied and unapplied in your organisation

Ans.

The ratio of applied and unapplied varies depending on the project and client needs.

  • We prioritize applying payments to outstanding invoices to reduce unapplied balances.

  • Unapplied balances can occur due to overpayments, prepayments, or misapplied payments.

  • We regularly review and reconcile unapplied balances to ensure accuracy.

  • The ratio can range from 1:1 to 10:1 depending on the project and client payment behavior.

Add your answer

Q15. 1.java 8 intermediate operations and terminal and nonterminal operations with exmaples. 2.functional interface uses and methods 3.streams of and streams intermediate operations.. 4.springboot flow 5.euroka serv...

read more
Ans.

Questions related to Java 8, functional interfaces, streams, Spring Boot, and externalized properties

  • Java 8 intermediate operations and terminal/non-terminal operations with examples

  • Functional interface uses and methods

  • Streams of and streams intermediate operations

  • Spring Boot flow

  • Eureka server uses in microservices

  • Producer and consumer examples of Java 8

  • Externalized application.properties file

  • What happens when we use both .yml and .properties

Add your answer

Q16. How to improve the performance Tuning Techniques using any scenario

Ans.

Performance tuning techniques can be improved by analyzing query execution plans, optimizing indexes, and using caching.

  • Analyze query execution plans to identify bottlenecks and optimize them

  • Optimize indexes to improve query performance

  • Use caching to reduce the number of database calls

  • Use stored procedures to reduce network traffic and improve performance

  • Use database partitioning to distribute data across multiple servers

  • Use query hints to force the use of specific indexes or...read more

Add your answer

Q17. What is the difference in static cache and Dynamic cache ?

Ans.

Static cache is preloaded and remains constant while dynamic cache is updated frequently based on usage.

  • Static cache is loaded once and remains unchanged until the cache is cleared or expired.

  • Dynamic cache is updated frequently based on usage and can change at any time.

  • Static cache is useful for content that doesn't change often, like images or CSS files.

  • Dynamic cache is useful for frequently changing content, like social media feeds or news articles.

Add your answer

Q18. How you will manage if client asks do little more enhancements which are not included in the sprint task

Ans.

I would communicate with the client to understand the specific requirements and assess the impact on the project timeline and resources.

  • Communicate with the client to understand the specific enhancements they are requesting

  • Assess the impact of the additional enhancements on the project timeline and resources

  • Discuss with the team to evaluate the feasibility of incorporating the enhancements

  • Prioritize the enhancements based on their importance and impact on project goals

  • Update ...read more

Add your answer

Q19. What are the types of the dashboards you have worked in Tableau?

Ans.

I have worked on various types of dashboards in Tableau including interactive dashboards, performance dashboards, and executive dashboards.

  • Interactive dashboards

  • Performance dashboards

  • Executive dashboards

Add your answer

Q20. What is the ETL tool used for Data wrangling and what is your proficiency on the same?

Ans.

The ETL tool used for Data wrangling is Apache Spark. I have a high proficiency in using Apache Spark for ETL processes.

  • Apache Spark is a powerful open-source distributed computing system that can handle large-scale data processing and analytics.

  • It provides a unified engine for big data processing with built-in modules for SQL, streaming, machine learning, and graph processing.

  • I have experience in using Apache Spark for data wrangling tasks such as data cleaning, transformati...read more

Add your answer

Q21. Installation and configuration of Hyperion Planning essbase and Hyperion Financial Management.

Ans.

Installation and configuration of Hyperion Planning essbase and Hyperion Financial Management.

  • Ensure all system requirements are met before installation

  • Install and configure Hyperion Planning essbase and Hyperion Financial Management software

  • Configure database connections and security settings

  • Test the installation and configuration to ensure proper functionality

  • Provide training and support to end-users

Add your answer

Q22. End to end installation of latest version and the difference with old version

Ans.

The latest version has new features and improvements compared to the old version. End-to-end installation involves a complete installation process from start to finish.

  • The latest version has new features and improvements compared to the old version

  • End-to-end installation involves a complete installation process from start to finish

  • Old version may have compatibility issues with newer hardware or software

  • New version may have better security features

  • New version may have improved...read more

Add your answer

Q23. How spring boot is working behind , Bean Life cycle method

Ans.

Spring Boot uses Bean Life cycle methods to manage the creation and destruction of beans in the application context.

  • Spring container instantiates the bean by calling the default constructor or a static factory method.

  • Spring sets the bean properties and dependencies using setters or constructor injection.

  • If the bean implements InitializingBean interface, the afterPropertiesSet() method is called.

  • If the bean has init-method specified in the configuration, that method is called....read more

View 1 answer

Q24. How to create tasks in information steward

Ans.

Creating tasks in Information Steward

  • Open Information Steward and go to the 'Tasks' tab

  • Click on 'New Task' and select the type of task you want to create

  • Fill in the necessary details and save the task

  • Assign the task to the appropriate user or group

  • Monitor the progress of the task in the 'Task Monitor' tab

Add your answer

Q25. Annotations of TestNG, Selenium Usage and Implementations using Java, Java HashMap, Java HashMap Program

Ans.

The question is about TestNG annotations, Selenium usage and implementation using Java, and Java HashMap program.

  • TestNG annotations are used to define the test methods and their behavior.

  • Selenium is a web testing framework used to automate web browsers.

  • Java HashMap is a collection that stores key-value pairs.

  • Java HashMap program can be used to implement various functionalities like caching, data storage, etc.

Add your answer

Q26. What is Fault tolerance in MS , how do you achieve in Spring framework

Ans.

Fault tolerance in MS and achieving it in Spring framework

  • Fault tolerance is the ability of a system to continue functioning even in the presence of faults or errors

  • In MS, fault tolerance can be achieved through technologies like clustering, load balancing, and replication

  • In Spring framework, fault tolerance can be achieved through the use of circuit breakers, retry mechanisms, and fallbacks

  • Circuit breakers can be used to prevent cascading failures by stopping requests to a s...read more

Add your answer

Q27. Daily activities, experience in SSL configuration for Hyperion

Ans.

I have experience in configuring SSL for Hyperion and perform daily activities related to it.

  • I have configured SSL for Hyperion on multiple occasions

  • I am familiar with SSL certificate installation and renewal

  • I perform daily checks to ensure SSL is functioning properly

  • I troubleshoot SSL related issues when they arise

Add your answer

Q28. What is the life cycle of an implementation project

Ans.

The life cycle of an implementation project involves planning, execution, monitoring, and closure.

  • Initiation: Define project scope, objectives, and stakeholders.

  • Planning: Develop project plan, schedule, and budget.

  • Execution: Implement project plan and deliverables.

  • Monitoring: Track progress, manage risks, and make adjustments as needed.

  • Closure: Finalize project deliverables, obtain client acceptance, and hand over project to operations.

  • Example: In a software implementation pr...read more

Add your answer

Q29. what is horizontal and vertical scaling ?

Ans.

Horizontal scaling means adding more machines to a pool of resources, while vertical scaling means adding more power (CPU, RAM) to an existing machine.

  • Horizontal scaling involves adding more machines to a network to increase capacity

  • Vertical scaling involves adding more resources (CPU, RAM) to a single machine to increase capacity

  • Horizontal scaling is more cost-effective and easier to implement than vertical scaling

  • Examples of horizontal scaling include load balancing and clu...read more

Add your answer

Q30. Synchronized and Asynchronized calls to Microservice

Ans.

Synchronized calls wait for a response before continuing, while asynchronized calls do not wait.

  • Synchronized calls block the calling thread until a response is received

  • Asynchronized calls do not block the calling thread and allow it to continue executing

  • Synchronized calls are useful when the response is needed immediately

  • Asynchronized calls are useful when the response is not needed immediately or when multiple calls can be made simultaneously

  • Examples of synchronized calls in...read more

Add your answer

Q31. What is component, app module, scope

Ans.

Components are reusable UI elements, app modules are containers for related components and services, and scope defines the context in which a component or service is available.

  • Components are self-contained and can be easily reused throughout an application

  • App modules group related components and services together

  • Scope defines the context in which a component or service is available, such as within a specific module or across the entire application

  • Example: A component could be...read more

View 1 answer

Q32. What is the difference between File poller and File Adapter?

Ans.

File poller and File Adapter are both used for file integration but have different functionalities.

  • File poller is used to poll a directory for new or modified files and trigger a flow when a file is found.

  • File Adapter is used to read, write, and manage files in a directory.

  • File poller is event-driven while File Adapter is action-driven.

  • File poller is used for real-time integration while File Adapter is used for batch integration.

  • File poller is used to trigger a flow while Fil...read more

Add your answer

Q33. Store few values in hashmap and remove particular value based on key

Ans.

Store and remove values in a hashmap based on keys

  • Create a hashmap to store key-value pairs

  • Use the put() method to store values in the hashmap

  • Use the remove() method to remove a particular value based on the key

Add your answer

Q34. Difference between hadr_timeout and hadr_peer_window

Ans.

hadr_timeout is the time period for a failover to occur, while hadr_peer_window is the number of log records that can be sent to the secondary replica.

  • hadr_timeout determines how long it takes for a failover to occur if the primary replica becomes unavailable

  • hadr_peer_window determines the number of log records that can be sent to the secondary replica before waiting for acknowledgement

  • Both are important for maintaining high availability in SQL Server Always On Availability G...read more

Add your answer

Q35. Exception Hierarchy and user defined exceptions in Webservices

Ans.

Explanation of exception hierarchy and user defined exceptions in Webservices

  • Exception hierarchy in Webservices includes checked and unchecked exceptions

  • Checked exceptions must be declared in the method signature or handled in a try-catch block

  • User defined exceptions can be created by extending the Exception class

  • These exceptions can be thrown and caught like any other exception

  • Examples of user defined exceptions include InvalidInputException or AuthenticationException

Add your answer

Q36. How to handle multiple browser using Selenium

Ans.

To handle multiple browsers using Selenium, you can use the WebDriver interface to create separate instances for each browser.

  • Create separate WebDriver instances for each browser (e.g. ChromeDriver, FirefoxDriver)

  • Use the desired capabilities to specify the browser type and version

  • Implement a method to switch between different browser instances as needed

Add your answer

Q37. Various challenges in data visualization Projects where automation was implemented

Ans.

Challenges in data visualization and automation implementation

  • Challenges in data visualization include selecting the appropriate chart type, ensuring accuracy and clarity of data, and avoiding misleading visualizations

  • Automation implementation in data visualization can improve efficiency and reduce errors, but requires careful planning and testing

  • Examples of projects where automation was implemented include creating dashboards that update automatically, generating reports wit...read more

Add your answer

Q38. How to delete duplicate value in a table

Ans.

To delete duplicate values in a table, use the DISTINCT keyword in a SELECT statement.

  • Use the SELECT DISTINCT statement to retrieve only unique values from the table.

  • Create a new table with the unique values and drop the old table.

  • Use the GROUP BY clause to group the duplicate values together and then delete them.

  • Use the ROW_NUMBER() function to assign a unique number to each row and then delete the duplicates with a higher number.

  • Use a subquery to identify the duplicates and...read more

Add your answer

Q39. Iterating list and creating dictionary from the count

Ans.

Iterate through a list and create a dictionary with the count of each item

  • Loop through the list and use a dictionary to store the count of each item

  • Use the item as the key and increment the count each time it appears

  • Example: ['apple', 'banana', 'apple'] -> {'apple': 2, 'banana': 1}

Add your answer

Q40. tell me about chromotographic data system

Ans.

A chromatographic data system is a software used to collect, analyze and manage data from chromatography instruments.

  • It allows for real-time monitoring of chromatography runs

  • It can perform data analysis and generate reports

  • It can integrate with other laboratory software and instruments

  • Examples include Empower, Chromeleon, and OpenLAB

  • It is commonly used in pharmaceutical, biotech, and chemical industries

Add your answer

Q41. How to do conflict and stakeholder management

Ans.

Conflict and stakeholder management involves effective communication, negotiation, and relationship-building.

  • Identify key stakeholders and their interests

  • Communicate openly and transparently with stakeholders

  • Listen actively to understand concerns and perspectives

  • Negotiate mutually beneficial solutions

  • Build strong relationships through trust and respect

Add your answer

Q42. Difference between applied credit and unallocated credit

Ans.

Applied credit is assigned to a specific invoice or account, while unallocated credit is not yet assigned to any specific transaction.

  • Applied credit is used to pay off a specific invoice or account balance.

  • Unallocated credit is a payment that has been received but not yet applied to a specific invoice or account.

  • Applied credit reduces the outstanding balance of a specific invoice or account.

  • Unallocated credit can be applied to any outstanding balance in the future.

  • For example...read more

Add your answer

Q43. What is the memory Leak in java

Ans.

Memory leak is a situation where a program fails to release memory that is no longer needed.

  • Memory leaks occur when objects are not properly deallocated from memory.

  • This can lead to the program consuming more and more memory over time.

  • Common causes of memory leaks include circular references, static variables, and unclosed resources.

  • Examples of memory leaks in Java include not closing database connections, not releasing file handles, and not removing event listeners.

  • Memory le...read more

View 1 answer

Q44. what are promises and callback hell

Ans.

Promises and callback hell are concepts in asynchronous programming where nested callbacks can lead to unreadable and difficult to maintain code.

  • Promises are objects representing the eventual completion or failure of an asynchronous operation. They help in handling asynchronous operations in a more organized and readable way.

  • Callback hell refers to the situation where multiple nested callbacks are used to handle asynchronous operations, leading to code that is hard to read, d...read more

Add your answer

Q45. Joiner transformation Connected and unconnected look u difference

Ans.

Joiner transformation - connected and unconnected look up difference

  • Joiner transformation is used to join two sources based on a common key

  • Connected lookup is used when the lookup table is in the same mapping

  • Unconnected lookup is used when the lookup table is outside the mapping

  • Connected lookup returns multiple rows while unconnected lookup returns only one row

  • Joiner transformation can be used with both connected and unconnected lookup

Add your answer

Q46. TSA Installation and uses of Quorum network IP.

Ans.

Quorum network IP is used for secure communication and data sharing in TSA installations.

  • Quorum network IP is a private network used for communication between nodes in a TSA installation.

  • It provides secure and encrypted communication for data sharing and transactions.

  • Quorum network IP is used for consensus mechanisms and smart contract execution.

  • Examples of TSA installations using Quorum network IP include supply chain management and financial services.

Add your answer

Q47. What is diff between online and onprem sharwpoint

Ans.

Online SharePoint is cloud-based while on-premises SharePoint is installed on local servers.

  • Online SharePoint is accessed through a web browser, while on-premises SharePoint is accessed through a local network.

  • Online SharePoint is managed and maintained by Microsoft, while on-premises SharePoint requires in-house IT support.

  • Online SharePoint offers automatic updates and scalability, while on-premises SharePoint allows for more customization and control over data.

  • Online ShareP...read more

Add your answer

Q48. Typical studio implementation that you worked on?

Ans.

Implemented a studio project involving virtual reality technology for immersive training experiences.

  • Developed interactive VR simulations for training purposes

  • Integrated motion tracking technology for realistic user interactions

  • Collaborated with subject matter experts to ensure accuracy and effectiveness

  • Utilized Unity3D and Unreal Engine for development

  • Implemented user feedback mechanisms for continuous improvement

Add your answer

Q49. PICOF or PECI which is recommendable

Ans.

Both PICOF and PECI are recommendable depending on the specific context and requirements.

  • PICOF (Population, Intervention, Comparison, Outcome, Follow-up) is commonly used in research to formulate clinical questions and design studies.

  • PECI (Population, Exposure, Comparison, Outcome) is another framework used in epidemiology and public health research.

  • Choose PICOF for clinical research questions and PECI for epidemiological studies.

  • Consider the specific research goals and study...read more

Add your answer

Q50. Explain different ways data can be shared in components

Ans.

Data can be shared in components through props, state, context, and Redux.

  • Props: data is passed down from parent to child components

  • State: data is managed within a component and can be updated

  • Context: data can be shared between components without having to pass it down through props

  • Redux: a state management library that allows for global data sharing and management

  • Examples: passing a user's name as a prop to a child component, managing a form's input data in state, sharing a ...read more

Add your answer

Q51. How to increase Backup performance

Ans.

To increase backup performance, optimize backup settings, use faster hardware, and prioritize critical data.

  • Optimize backup settings such as compression and deduplication

  • Use faster hardware such as solid-state drives and high-speed network connections

  • Prioritize critical data to ensure it is backed up first

  • Consider using backup software that utilizes incremental backups

  • Regularly test and monitor backup performance to identify and address any issues

Add your answer

Q52. array list vs linked list , collections,overriding etc

Ans.

Array list and linked list are both implementations of the List interface in Java Collections. Array list uses an array to store elements, while linked list uses nodes with references to the next element.

  • Array list provides fast random access to elements using indexes, but slower insertion and deletion operations compared to linked list.

  • Linked list allows for fast insertion and deletion operations by simply changing references, but slower random access due to traversal from t...read more

Add your answer

Q53. [1001,1100,1011] --> remove zeros from array

Ans.

Remove zeros from array of strings

  • Iterate through the array and filter out any strings that contain '0'

  • Create a new array with the filtered strings

Add your answer

Q54. How did I dockerize my apps.

Ans.

Dockerizing apps involves creating a Dockerfile, building an image, and running a container.

  • Create a Dockerfile that specifies the app's dependencies and commands

  • Build a Docker image using the Dockerfile

  • Run a Docker container from the image

  • Use Docker Compose to manage multiple containers

  • Example: docker build -t myapp .

  • Example: docker run -p 8080:80 myapp

  • Example: docker-compose up

Add your answer

Q55. Modes of HADR and their differences

Ans.

HADR modes include prevention, preparedness, response, and recovery.

  • Prevention involves measures to avoid or reduce the impact of disasters.

  • Preparedness involves planning and training to respond effectively to disasters.

  • Response involves immediate actions to save lives and reduce damage during a disaster.

  • Recovery involves restoring normalcy and rebuilding after a disaster.

  • Examples of HADR modes include evacuation drills, emergency supplies, search and rescue operations, and i...read more

Add your answer

Q56. Array vs list - what is the difference

Ans.

Arrays are fixed in size, while lists can dynamically grow or shrink.

  • Arrays have a fixed size, while lists can dynamically resize.

  • Arrays can only store elements of the same data type, while lists can store different data types.

  • Arrays are more efficient for random access, while lists are better for insertion and deletion operations.

Add your answer

Q57. Why string is immutable in java

Ans.

String is immutable in Java to ensure security, thread safety, and optimization.

  • Immutable strings prevent accidental changes to sensitive data.

  • Immutable strings allow for safe sharing of strings between multiple threads.

  • Immutable strings enable string pooling for memory optimization.

Add your answer

Q58. Explain Angular Services and sharing of data

Ans.

Angular services are singleton objects that can be injected into components to share data and functionality.

  • Services are used to share data and functionality across components

  • They are singleton objects, meaning there is only one instance of the service in the application

  • Services can be injected into components using dependency injection

  • Data can be shared between components using services

  • Examples of services include HTTP service for making API calls and a logging service for l...read more

Add your answer

Q59. What is your CTC and ECTC?

Ans.

My current CTC is $80,000 and my expected CTC is $90,000.

  • Current CTC: $80,000

  • Expected CTC: $90,000

Add your answer

Q60. How to validate data in thoughtspot

Ans.

ThoughtSpot provides various methods to validate data.

  • Use data validation rules to ensure data accuracy and integrity

  • Leverage built-in functions and expressions to validate data

  • Perform data quality checks using SQL queries

  • Implement custom validation scripts or plugins if needed

Add your answer

Q61. Load Options while load has failed.

Ans.

Options to consider when load fails

  • Check if there is enough disk space

  • Verify if the network connection is stable

  • Ensure that the correct file format is being used

  • Try loading the file on a different machine

  • Contact technical support for further assistance

Add your answer

Q62. Deployment of webapp into Azure app services

Ans.

Deployment of webapp into Azure app services involves creating an app service plan, configuring deployment settings, and deploying the webapp.

  • Create an app service plan in Azure portal

  • Configure deployment settings such as deployment slots, continuous deployment, and deployment credentials

  • Deploy the webapp using tools like Visual Studio, Azure CLI, or Azure DevOps

Add your answer

Q63. Microservices architecture using Spring Boot

Ans.

Microservices architecture using Spring Boot

  • Microservices architecture is an approach to building applications as a collection of small, independent services

  • Spring Boot is a popular framework for building microservices in Java

  • Spring Boot provides a number of features that make it easy to build and deploy microservices, such as auto-configuration and embedded servers

  • Microservices can communicate with each other using RESTful APIs or messaging systems like Kafka or RabbitMQ

  • Micr...read more

Add your answer

Q64. Find second largest element in an array

Ans.

Find the second largest element in an array of strings.

  • Convert the strings to integers for comparison.

  • Sort the array in descending order.

  • Return the second element in the sorted array.

Add your answer

Q65. How to override MUI classes

Ans.

Override MUI classes by using the makeStyles function provided by Material-UI

  • Create a custom styles object using makeStyles function

  • Override specific classes by targeting them in the styles object

  • Apply the custom styles to the component using the className prop

Add your answer

Q66. What is claim adjudication?

Ans.

Claim adjudication is the process of reviewing and determining the validity of a claim submitted by a policyholder.

  • Claim adjudication involves reviewing the claim for accuracy and completeness.

  • It also includes verifying the policy coverage and determining the amount to be paid out.

  • Adjudication may involve communication with healthcare providers or other parties involved in the claim.

  • Examples of claim adjudication include processing medical insurance claims or car insurance cl...read more

View 1 answer

Q67. Tell me about OOPS concepts.

Ans.

OOPS concepts refer to Object-Oriented Programming concepts which include inheritance, encapsulation, polymorphism, and abstraction.

  • Inheritance allows a class to inherit properties and behavior from another class.

  • Encapsulation refers to bundling data and methods that operate on the data into a single unit.

  • Polymorphism allows objects to be treated as instances of their parent class.

  • Abstraction hides the complex implementation details and only shows the necessary features to th...read more

Add your answer

Q68. WAP to Count the character in a String

Ans.

A function to count the characters in a given string.

  • Iterate through the string and use a HashMap to store the count of each character.

  • Handle both uppercase and lowercase characters separately if needed.

  • Consider spaces and special characters as well.

  • Return the HashMap with character counts.

Add your answer

Q69. Dependency injection in Angular? Explain

Ans.

Dependency injection is a design pattern used in Angular to inject dependencies into components or services.

  • Dependency injection allows for loose coupling between components and services

  • It makes testing easier by allowing for easy mocking of dependencies

  • Dependencies can be injected at the component or module level

  • Angular has a built-in dependency injection system

  • Example: injecting a service into a component constructor

Add your answer

Q70. What is dynamic sql

Ans.

Dynamic SQL is a technique of generating SQL statements at runtime based on user input or other conditions.

  • Allows for flexibility in SQL queries

  • Can be used to build complex queries

  • Can be vulnerable to SQL injection attacks

  • Examples include using variables or concatenation to build queries

Add your answer

Q71. which device used for testing

Ans.

The device used for testing depends on the type of test being conducted.

  • For medical tests, devices such as blood pressure monitors, ECG machines, and X-ray machines are used.

  • For software testing, devices such as computers, mobile phones, and tablets are used.

  • For mechanical testing, devices such as load cells, torque sensors, and strain gauges are used.

  • The choice of device depends on the type of test, the accuracy required, and the budget available.

Add your answer

Q72. explanation about chromotographic data system

Ans.

A chromatographic data system is a software used to collect, process, and analyze data from chromatography experiments.

  • It allows for real-time monitoring of chromatography experiments

  • It can automatically detect and quantify peaks in chromatograms

  • It can generate reports and graphs for data analysis

  • Examples of chromatographic data systems include Empower and Chromeleon

Add your answer

Q73. How spring boot app starts

Ans.

A Spring Boot app starts by initializing the Spring ApplicationContext and then launching the embedded Tomcat server.

  • Spring Boot app starts by scanning for components annotated with @ComponentScan in the specified package and sub-packages.

  • The application context is then created by loading the beans defined in the configuration classes annotated with @Configuration.

  • Once the application context is initialized, the embedded Tomcat server is started to serve incoming HTTP request...read more

Add your answer

Q74. Scd 2 and how to implement

Ans.

SCD 2 is a type of slowly changing dimension in data warehousing, where historical data is preserved by creating new records for changes.

  • Use effective date and end date columns to track changes over time

  • Implement Type 2 SCD in ETL processes to handle updates and inserts

  • Maintain history of changes by creating new records instead of updating existing ones

Add your answer

Q75. How to create answers?

Ans.

To create answers, one must provide a concise and informative response.

  • Understand the question and its context

  • Gather relevant information or data

  • Organize thoughts and structure the answer

  • Provide a clear and concise response

  • Support the answer with examples or evidence

Add your answer

Q76. What are hooks ?

Ans.

Hooks are functions that allow developers to use state and other React features in functional components.

  • Hooks were introduced in React 16.8 to allow developers to use state and other React features in functional components.

  • Some commonly used hooks include useState, useEffect, useContext, and useReducer.

  • Hooks are used to manage component state, perform side effects, and access context in functional components.

  • Hooks are called inside functional components and cannot be used in...read more

Add your answer

Q77. Market Analysis of E commerce product

Ans.

Market analysis of E-commerce product involves researching market trends, competition, target audience, and potential growth opportunities.

  • Research current market trends in the E-commerce industry

  • Analyze competition to identify strengths, weaknesses, opportunities, and threats (SWOT analysis)

  • Identify target audience and their preferences

  • Evaluate potential growth opportunities for the E-commerce product

  • Consider factors such as pricing, distribution channels, and marketing stra...read more

Add your answer

Q78. Functional interface Collection vs stream

Ans.

Functional interface is a single abstract method interface. Collection is a group of objects while stream is a sequence of objects.

  • Functional interface has only one abstract method and can be used as lambda expressions.

  • Collection is a group of objects that can be manipulated using various methods like add, remove, etc.

  • Stream is a sequence of objects that can be processed in parallel or sequentially using various operations like filter, map, etc.

  • Stream is more efficient for la...read more

Add your answer

Q79. How microservices route ??

Ans.

Microservices route using API gateways and service discovery mechanisms.

  • Microservices communicate through API gateways which route requests to the appropriate service

  • Service discovery mechanisms help microservices locate and communicate with each other

  • Routing can be based on various factors like load balancing, service health, and versioning

  • Examples include Netflix Zuul for API gateway and Consul for service discovery

Add your answer

Q80. What is OOPs concept?

Ans.

OOPs concept stands for Object-Oriented Programming, a programming paradigm based on the concept of objects.

  • OOPs focuses on creating objects that contain data in the form of attributes and code in the form of methods.

  • Encapsulation, inheritance, and polymorphism are key principles of OOPs.

  • Example: In a banking system, a 'Customer' object can have attributes like name and account number, and methods like deposit and withdraw.

Add your answer

Q81. What is SOLID principle?

Ans.

SOLID is a set of five design principles in object-oriented programming to make software designs more understandable, flexible, and maintainable.

  • S - Single Responsibility Principle: A class should have only one reason to change.

  • O - Open/Closed Principle: Software entities should be open for extension but closed for modification.

  • L - Liskov Substitution Principle: Objects of a superclass should be replaceable with objects of its subclasses without affecting the functionality.

  • I ...read more

Add your answer

Q82. What is Lambda Expression

Ans.

Lambda expression is an anonymous function that allows you to write shorter and more concise code.

  • Lambda expressions are used to create anonymous functions in programming languages like Java, C#, Python, etc.

  • They are often used in functional programming to pass functions as arguments to other functions.

  • Lambda expressions can be used to define inline functions without having to explicitly name them.

  • They are commonly used in Java 8 streams API for concise and readable code.

  • Exam...read more

Add your answer

Q83. What is dependency injection

Ans.

Dependency injection is a design pattern in which components are given their dependencies rather than creating them internally.

  • Dependency injection helps in achieving loose coupling between classes.

  • It allows for easier testing by providing mock dependencies.

  • There are three types of dependency injection: constructor injection, setter injection, and interface injection.

  • Example: Instead of a class creating an instance of a dependency, the dependency is passed to the class throug...read more

Add your answer

Q84. Out of memory error in java

Ans.

Out of memory error occurs when the JVM runs out of memory to allocate for new objects.

  • Increase heap size using -Xmx flag

  • Avoid memory leaks by closing resources properly

  • Use efficient data structures and algorithms

  • Consider using a profiler to identify memory-intensive code

  • Use caching to reduce memory usage

Add your answer

Q85. tell me about framework

Ans.

A framework is a structured approach or set of guidelines used to solve a specific problem or achieve a specific goal.

  • A framework provides a foundation for developing software applications.

  • It includes pre-defined functions, classes, and modules that can be used to build applications.

  • Frameworks promote code reusability and maintainability.

  • Examples of frameworks include Django for web development, TensorFlow for machine learning, and React for front-end development.

Add your answer

Q86. Tools of defect tracking

Ans.

Tools used for tracking defects in software development.

  • JIRA

  • Bugzilla

  • Mantis

  • Trello

  • GitHub Issues

Add your answer

Q87. Configuring auto discovery in mulesoft

Ans.

Auto discovery in MuleSoft allows for automatic detection and configuration of APIs and resources.

  • Auto discovery can be configured using Anypoint Platform's API Manager.

  • It automatically detects APIs and resources based on the specified criteria.

  • Auto discovery simplifies the process of managing APIs and resources by reducing manual configuration.

  • Examples of criteria for auto discovery include URL patterns, HTTP methods, and headers.

Add your answer

Q88. Explain Domain Driven Development

Ans.

Domain Driven Development is an approach to software development that focuses on the core domain and domain logic of a business.

  • Focuses on understanding and modeling the core domain of the business

  • Emphasizes collaboration between domain experts and developers

  • Uses a common language to bridge the communication gap between technical and non-technical stakeholders

  • Encourages the use of domain models to represent the business logic

  • Helps in creating a flexible and maintainable softw...read more

Add your answer

Q89. What is private equity

Ans.

Private equity is a type of investment where funds are raised from institutional and high-net-worth investors to acquire equity ownership in companies.

  • Private equity firms raise capital from investors to acquire ownership stakes in companies

  • They aim to improve the performance of the acquired companies and eventually sell them for a profit

  • Private equity investments are typically illiquid and have a long-term investment horizon

  • Examples of private equity firms include Blackstone...read more

Add your answer

Q90. difficulties faced in automation testing

Ans.

Difficulties faced in automation testing

  • Complexity of test cases

  • Maintenance of test scripts

  • Handling dynamic elements

  • Integration with third-party tools

  • Limited support for non-GUI applications

Add your answer

Q91. Current CTC and Expected CTC

Ans.

Current CTC is confidential. Expected CTC is based on market standards and my experience.

  • Current CTC is confidential information as per company policy

  • Expected CTC is based on market standards and my experience in the industry

  • I am looking for a competitive salary package that aligns with my skills and responsibilities

View 1 answer

Q92. Explain about web protocols

Ans.

Web protocols are rules and conventions for communication between devices on the internet.

  • Web protocols define how data is transmitted over the internet

  • Examples include HTTP, HTTPS, FTP, SMTP, and TCP/IP

  • They ensure that devices can understand and interpret data exchanged over the web

View 1 answer

Q93. Explain Project Structure

Ans.

Project structure refers to the organization of tasks, resources, and timelines within a project.

  • Project structure outlines the hierarchy of tasks and subtasks within a project

  • It includes defining roles and responsibilities of team members

  • Project structure also involves setting timelines and milestones for completion

  • Examples of project structures include waterfall, agile, and hybrid methodologies

Add your answer

Q94. Convert int to String

Ans.

Use the toString() method to convert an int to a String in Java.

  • Use the toString() method of the Integer class to convert an int to a String.

  • Example: int num = 10; String str = Integer.toString(num);

  • Alternatively, you can also use String.valueOf() method to convert int to String.

Add your answer

Q95. What is o to c

Ans.

O to C refers to the process of converting an object-oriented design into a concrete implementation in a programming language.

  • O to C involves translating the high-level design of an object-oriented system into code written in a programming language like C.

  • It requires mapping classes, objects, and their relationships to data structures and functions in C.

  • O to C often involves using techniques like encapsulation, inheritance, and polymorphism to achieve the desired functionalit...read more

Add your answer

Q96. Performance tuning techniques

Ans.

Performance tuning techniques involve optimizing code, database queries, and server configurations to improve system efficiency.

  • Identify and eliminate bottlenecks in the code by profiling and analyzing performance metrics

  • Optimize database queries by using indexes, avoiding unnecessary joins, and limiting the amount of data retrieved

  • Fine-tune server configurations such as memory allocation, caching mechanisms, and thread pools

  • Utilize caching mechanisms like Redis or Memcached ...read more

Add your answer

Q97. Api auto discovery in mulesoft

Ans.

API auto discovery in MuleSoft refers to the automatic detection and registration of APIs within the MuleSoft Anypoint Platform.

  • API auto discovery allows MuleSoft to automatically detect APIs within the platform without manual intervention.

  • This feature helps in easily managing and monitoring APIs within the organization.

  • API auto discovery simplifies the process of onboarding new APIs and services.

  • It enables seamless integration and communication between different systems and ...read more

Add your answer

Q98. Primary objects in PLSQL

Ans.

Primary objects in PLSQL are tables, views, sequences, procedures, functions, packages, triggers, and exceptions.

  • Tables are used to store data.

  • Views are virtual tables that display data from one or more tables.

  • Sequences generate unique numbers.

  • Procedures and functions are used to perform specific tasks.

  • Packages are a collection of procedures, functions, and variables.

  • Triggers are used to automatically execute code when a specific event occurs.

  • Exceptions are used to handle err...read more

Add your answer

Q99. How to adjust claim,

Ans.

Adjusting a claim involves reviewing the claim details and making necessary changes to ensure accuracy and completeness.

  • Review the claim details for accuracy

  • Identify any missing or incorrect information

  • Make necessary changes to the claim form or documentation

  • Submit the adjusted claim for processing

  • Follow up to ensure the claim is processed correctly

Add your answer

Q100. Interface vs Abstract

Ans.

Interface defines a contract for classes to implement, while abstract class can have both abstract and concrete methods.

  • Interface can only have abstract methods and constants, while abstract class can have both abstract and concrete methods.

  • A class can implement multiple interfaces but can only inherit from one abstract class.

  • Interfaces are used to achieve multiple inheritance in Java, while abstract classes are used to provide a common base for subclasses.

  • Interfaces are used...read more

Add your answer
1
2

More about working at Cognizant

Top Rated Mega Company - 2024
Top Rated IT/ITES Company - 2024
HQ - Teaneck. New Jersey., United States (USA)
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos

Interview Process at Helukabel

based on 89 interviews in the last 1 year
3 Interview rounds
Technical Round 1
Technical Round 2
HR Round
View more
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Senior Associate Interview Questions from Similar Companies

3.9
 • 27 Interview Questions
3.7
 • 25 Interview Questions
3.5
 • 24 Interview Questions
3.7
 • 18 Interview Questions
3.9
 • 16 Interview Questions
3.0
 • 10 Interview Questions
View all
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
70 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions
Get AmbitionBox app

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter