Cognizant
2500+ Survival Technologies Interview Questions and Answers
Q101. Which programming languages you're comfortable with ?
Q102. If we have to return table, how to create a stored procedure?
To create a stored procedure that returns a table, use SELECT statement within the procedure.
Create a stored procedure using CREATE PROCEDURE statement.
Within the procedure, use SELECT statement to query the data and return the table.
Specify the columns to be returned in the SELECT statement.
Execute the stored procedure to retrieve the table data.
Q103. Write a query to find the employee name who earns maximum salary
The query finds the employee name who earns the maximum salary.
Use the SELECT statement to retrieve the employee name and salary from the database table.
Use the ORDER BY clause to sort the results in descending order based on salary.
Use the LIMIT clause to limit the result to only one row.
Return the employee name from the query result.
Q104. What is Object oriented programming? What are the 4 principal of Object oriented programming?
Object oriented programming is a programming paradigm that focuses on objects and their interactions to solve problems.
Encapsulation: bundling data and methods that operate on that data within a single unit.
Inheritance: creating new classes from existing ones, inheriting their properties and methods.
Polymorphism: the ability of objects to take on many forms, allowing them to be used in different ways.
Abstraction: hiding implementation details and only showing the necessary in...read more
Q105. Write a program to check whether a given integer is a prime or not and even or odd and it should not give any errors for any kind of inputs.
Program to check if an integer is prime, even or odd without errors.
Take input integer from user
Check if input is valid integer
Check if input is prime or not
Check if input is even or odd
Display the result
Q106. 1.Difference between role and profile, 2. For what level of owd the share object will be available fo an object in apex sharing. 3.How to check fls in apex class.4. With sharing also consider fls in apex class?...
read moreTechnical interview questions on Apex, Aura and Webservices
Role defines the responsibilities and expectations of a position, while profile defines the access and permissions of a user
Share object is available for the same OWD level or higher
FLS can be checked using the Schema.DescribeFieldResult class in Apex
FLS is considered even with sharing in Apex class
Webservices callout can be done using the fetch() method in LWC or using the HttpRequest class in Apex
Application events ...read more
Q107. Write a sql to delete duplicate records from a table
SQL query to delete duplicate records from a table.
Use the DELETE statement with a subquery to identify and delete duplicate records.
The subquery should select the duplicate records based on the criteria for duplication.
Ensure to keep at least one copy of the duplicate records to avoid deleting all instances.
Q108. 5. Git repository . How to push and pull code.
Git is a version control system. Push code to upload changes to a remote repository. Pull code to download changes from a remote repository.
To push code, use the command 'git push
'. For example, 'git push origin master'. To pull code, use the command 'git pull
'. For example, 'git pull origin master'. Make sure to commit changes before pushing code using the command 'git commit -m
'. Use 'git status' to check the status of your local repository.
Use 'git clone
' to clone a rem...read more
Q109. Write a c program which will display your name in first line and from second line one word will be lesser from the previous line. Display this until one word remains
The program will display the name of the user in the first line and then decrease one word in each subsequent line until only one word remains.
Create an array of strings containing the user's name split into individual words
Use a loop to iterate through the array and print the name with one less word in each iteration
Continue the loop until only one word remains
Q110. What is ment by the term void?
Void refers to a state of emptiness or absence of something.
It can refer to a physical space that is empty or without matter.
It can also refer to a lack of something, such as a void in one's life or a void in a contract.
In programming, void is a data type used to indicate that a function does not return a value.
In law, a void contract is one that is not legally binding.
In physics, a vacuum is often referred to as a void.
Q111. An sql query to find salary, department of employee
An SQL query to find the salary and department of an employee.
Use the SELECT statement to retrieve the desired columns.
Specify the table name and join it with the department table using the appropriate join condition.
Use the WHERE clause to filter the results based on employee criteria if needed.
Q112. What is the difference in mapping parameter and mapping variable ?
Mapping parameter is used to pass values to a mapping at run time, while mapping variable is used to store values within a mapping.
Mapping parameter is defined in the mapping configuration and can be changed at run time.
Mapping variable is defined within the mapping and can be used to store values temporarily.
Mapping parameter is used to pass values from one mapping to another.
Mapping variable is used to store values within a mapping for use in subsequent transformations.
Q113. Which programming language you like the most and why?
I like Python the most because of its simplicity and versatility.
Python has a simple syntax which makes it easy to learn and use.
It has a vast library of modules and frameworks for various purposes.
Python is used in various fields such as web development, data science, and automation.
It supports both object-oriented and functional programming paradigms.
Python is also known for its readability and maintainability of code.
For example, I have used Python for web scraping, data a...read more
Q114. What is your view on competition?
Competition is healthy and drives innovation, but it should not compromise ethics or fair play.
Competition can lead to better products and services for consumers
It can also motivate companies to improve their processes and efficiency
However, it should not result in unethical behavior or unfair practices
Examples of healthy competition include Apple vs Samsung, Coca-Cola vs Pepsi
Examples of unethical competition include price-fixing, false advertising, and stealing trade secret...read more
Q115. What are refs? How will you use it for getting input value? Explain with code.
Refs are a way to access DOM nodes or React components directly. They can be used to get input values.
Refs provide a way to access DOM nodes or React components directly.
They are commonly used to get input values or trigger imperative animations.
Refs can be created using the `createRef()` method or by using a callback function.
To get the value of an input using refs, you can assign a ref to the input element and access its value property.
Q116. What is the Default Methods and why it is required?
Default Methods are methods in interfaces with implementation, introduced in Java 8.
Introduced in Java 8 to provide backward compatibility for interfaces
Allows adding new methods to interfaces without breaking existing implementations
Default methods can be overridden in implementing classes
Example: default void display() { System.out.println("Default method"); }
Q117. 1.How can you improve performance tuning issue in informatica? 2.What is joiner Transformation and Router Transformation? 3.What is a mapping? 4.How you will handle complex mapping ? 5.What is session log ? 6. ...
read moreAnswers to questions related to Informatica performance tuning, transformations, mapping, and session log.
To improve performance tuning in Informatica, we can use techniques like partitioning, pushdown optimization, and caching.
Joiner Transformation is used to join two heterogeneous sources based on a common key, while Router Transformation is used to route data based on specified conditions.
A mapping is a set of source and target definitions, transformations, and rules that ...read more
Q118. what is the output for the given code sample explain
The output of the code sample is 'Hello World'.
The code sample is likely to print a string.
The string being printed is 'Hello World'.
Q119. What is a Purchase Order? Did you work on it?
A purchase order is a commercial document issued by a buyer to a seller, indicating the type, quantity, and agreed price of products or services.
A purchase order is a formal request for goods or services from a supplier.
It includes details such as the item description, quantity, price, delivery date, and payment terms.
Purchase orders help ensure accurate and timely delivery of goods or services.
They serve as a legally binding contract between the buyer and seller.
Purchase ord...read more
Q120. How many ways asynchronous code can be written in Salesforce
There are multiple ways to write asynchronous code in Salesforce.
Using @future annotation
Using Queueable interface
Using Batch Apex
Using Platform Events
Using Asynchronous Apex REST Callouts
Q121. Briefly explain the method you will use to execute an array linked list?
An array linked list can be executed using a loop to traverse through the array and access the linked nodes.
Create an array to store the linked nodes
Assign the first node to the first element of the array
Use a loop to traverse through the array and access the linked nodes
To access the next node, use the index of the current node as the index of the next node in the array
Stop the loop when the last node is reached
Q122. given a problem scenario what would action do you suggest to be taken?
The answer to the question depends on the specific problem scenario provided.
Analyze the problem scenario and identify the key issues
Consider the potential consequences of different actions
Evaluate the available resources and constraints
Propose a course of action that addresses the problem and maximizes positive outcomes
Provide a rationale for the chosen action
Q123. What are custom hooks in React, and what are their use cases? Additionally, can you provide an example of a custom hook that performs an API call and utilizes the retrieved data?
Custom hooks in React are reusable functions that allow you to extract component logic into separate functions for better code organization and reusability.
Custom hooks are created using the 'use' prefix and can be used to share logic between components.
Use cases for custom hooks include fetching data from an API, handling form state, managing local storage, and more.
Example of a custom hook for API call: const useFetchData = (url) => { // logic to fetch data from API }
1) What are the different types of languages that are available in the DBMS?
2) Explain the concepts of a Primary key and Foreign Key.
3) What is the concept of sub-query in terms of SQL?
Q125. What is the CSV? What is automation testing?
CSV stands for Computer System Validation. Automation testing is the use of software to execute tests.
CSV is a process of ensuring that a computer-based system meets its intended requirements and is compliant with regulatory standards.
Automation testing involves using software tools to run tests automatically, reducing the need for manual testing.
CSV and automation testing are often used together to ensure that computer systems are validated and tested thoroughly.
Examples of ...read more
Q126. What do you know about OOPS?
OOPS stands for Object-Oriented Programming System.
OOPS is a programming paradigm that focuses on objects and their interactions.
It emphasizes on encapsulation, inheritance, and polymorphism.
Encapsulation is the process of hiding implementation details from the user.
Inheritance allows a class to inherit properties and methods from another class.
Polymorphism allows objects to take on multiple forms or behaviors.
Examples of OOPS languages include Java, C++, Python, and Ruby.
Q127. Tell us from Scratch how you will find File count in Source folder and how you check files exist or not.?
To find file count in source folder and check if files exist, use SSIS Script Task with C# code.
Create a SSIS package with Script Task
Write C# code to get file count and check if files exist
Use System.IO namespace to access files and folders
Use Directory.GetFiles() method to get all files in folder
Use File.Exists() method to check if file exists
Use a variable to store file count and use it in subsequent tasks
Q128. What is a loop?
A loop is a programming construct that repeats a set of instructions until a certain condition is met.
Loops are used to automate repetitive tasks in programming.
There are three types of loops: for, while, and do-while.
For example, a for loop can be used to iterate over an array and perform a certain action on each element.
A while loop can be used to repeat a set of instructions until a certain condition is no longer true.
A do-while loop is similar to a while loop, but it alwa...read more
Q129. What error will you get if you enter a duplicate value to the primary key column
You will get a primary key violation error if you enter a duplicate value to the primary key column.
A primary key is a unique identifier for each record in a database table.
When you try to insert a duplicate value into the primary key column, the database system will throw an error.
The error message will typically indicate a primary key violation or duplicate key error.
To resolve the issue, you need to ensure that each value in the primary key column is unique.
Q130. Write a program to find the sum of the squares of each term of Fibonacci series
Program to find the sum of squares of each term of Fibonacci series
Generate Fibonacci series using loop or recursion
Calculate square of each term
Add all squares to get the sum
Q131. What are the ways to handle Errors in React?
Error handling in React can be done using try-catch blocks, error boundaries, and handling asynchronous errors.
Use try-catch blocks to handle synchronous errors
Use error boundaries to catch errors in child components
Handle asynchronous errors using promises or async/await
Use third-party libraries like Sentry or Bugsnag for better error tracking
Display user-friendly error messages to improve user experience
Q132. Whether E-commerce shopping safe or not
E-commerce shopping can be safe if proper precautions are taken.
Use secure websites with HTTPS encryption
Avoid public Wi-Fi when making purchases
Check for seller reviews and ratings
Use strong and unique passwords
Monitor credit card statements for any unauthorized charges
Q133. What if a wheel of a car suddenly screws off while driving will u apply break suddenly ?
No, I would not apply the brake suddenly.
I would try to maintain control of the car by steering it to the side of the road or a safe area.
Applying the brake suddenly could cause the car to skid or lose control.
I would also turn on the hazard lights to alert other drivers of the situation.
Once the car is safely stopped, I would assess the damage and call for assistance if necessary.
Q134. To convert a datatype into another what process is used?
Typecasting is used to convert one datatype into another.
Typecasting is the process of converting a value from one datatype to another.
It can be done implicitly or explicitly.
Implicit typecasting is done automatically by the compiler.
Explicit typecasting is done manually by the programmer using casting operators.
Examples of typecasting include converting an integer to a float, a string to an integer, etc.
Q135. Datastge - How will you remove Header and trailer from Sequential data file
To remove header and trailer from a sequential data file in Datastage.
Use Sequential File stage in Datastage.
Set the 'Skip Rows' property to the number of header rows to be skipped.
Set the 'Trailer Rows' property to the number of trailer rows to be skipped.
Use a Transformer stage to remove any remaining header or trailer rows.
Use the 'Remove' function in the Transformer stage to remove the rows.
Q136. What is the difference between primary key, foreign key, candidate key & super key?
Primary key uniquely identifies a record, foreign key links tables, candidate key can be primary key, super key is a set of attributes.
Primary key: Unique identifier for a record in a table
Foreign key: Links tables together by referencing the primary key of another table
Candidate key: A set of attributes that can be used as a primary key
Super key: A set of attributes that can uniquely identify a record
Q137. difference between data ware house and data mart , difference between router and filter, difference between lookup and joiner , difference between lookup and dynamic lookup , difference between lookup and union...
read moreQ138. what is self Join,types of joins.what is CDC and how we will use it in ETL testing
Self join is joining a table with itself. Types of joins are inner, outer, left and right. CDC is change data capture used for tracking data changes.
Self join is used when we need to join a table with itself to retrieve data.
Types of joins are inner, outer, left and right join.
CDC is used to track data changes in the source system and apply those changes to the target system.
CDC can be used in ETL testing to verify that the data is being correctly captured and transformed.
Q139. 1. Bais and variance trade-off 2. How to handle Imbalanced data? 3. What is Multicollinearity and how do you handle it? 4. Explain Lasso & Ridge? 5. Difference between Bagging and Boosting. 6. Explain K-Means c...
read moreQuestions related to data analysis techniques and methods.
Bais and variance trade-off: balancing model complexity and accuracy
Handling imbalanced data: resampling techniques, adjusting class weights, using different evaluation metrics
Multicollinearity: when predictor variables are highly correlated, can be handled by feature selection or regularization
Lasso & Ridge: regularization techniques to prevent overfitting by adding penalty terms to the loss function
Bagging vs Boostin...read more
Q140. 1. What is the difference between Inheritance and Abstract Class?
Inheritance is a way to create a new class from an existing class while Abstract Class is a class that cannot be instantiated.
Inheritance allows a subclass to inherit properties and methods from a superclass.
Abstract Class is used as a blueprint for other classes to inherit from.
An Abstract Class can have abstract methods that must be implemented by its subclasses.
Inheritance can create a hierarchy of classes with shared properties and methods.
An Abstract Class cannot be inst...read more
Q141. Explain how the Software Development process works ? And what is it that we are following now a days ?
Software development process involves planning, designing, coding, testing, and deployment of software.
Requirement gathering and analysis
Designing the software architecture
Coding and implementation
Testing and debugging
Deployment and maintenance
Agile methodology is commonly followed nowadays
Q142. If I have assigned different colors to an ID and a class and applied both to the same element, which color will be applied based on CSS specificity precedence?
The color applied will be based on the specificity of the selector, with ID having higher specificity than class.
ID has higher specificity than class in CSS
Color applied will be based on the selector with higher specificity
Example: If ID selector has color red and class selector has color blue, the color applied will be red
Q143. What will be the output of the following JavaScript code fragment: `const a; function test() { console.log(a); }; test();`?
The code will throw an error because 'a' is declared but not initialized.
The code will result in a ReferenceError because 'a' is declared but not assigned a value.
Variables declared with 'const' must be initialized at the time of declaration.
Initializing 'a' with a value before calling test() will prevent the error.
What is repeater?
What are flip flops?
What are latches?
What is Stack pointer What are Diodes,Sampling,Encoder, Decoder, Registers,Accumulator ?
Q145. Which programming language do you know?
I know multiple programming languages including Java, Python, and C++.
Proficient in Java with experience in developing web applications using Spring framework
Familiar with Python for data analysis and machine learning
Experience in C++ for developing high-performance applications
Also familiar with HTML, CSS, and JavaScript for front-end development
Q146. What are the Design features of spur gear?
Spur gears have straight teeth and are used to transmit power between parallel shafts.
Teeth are parallel to the axis of rotation
Teeth are straight and have a constant width
Pressure angle determines tooth shape and strength
Module or diametral pitch determines size of gear
Commonly used in machinery such as automobiles and industrial equipment
Q147. What scenarios to update plugin.cfg,why we need to stop node agent for synchronisation.what about 504 error and 403 error issue resolving method,Ear files Deoyment and Data source
Updating plugin.cfg, stopping node agent for sync, resolving 504 and 403 errors, deploying EAR files, and configuring data sources are important scenarios for a Middleware Administrator.
plugin.cfg needs to be updated when adding or removing a plugin
Stopping node agent is necessary for synchronizing plugin changes
504 error can be resolved by increasing timeout value or optimizing code
403 error can be resolved by checking permissions and access control
EAR files can be deployed ...read more
Q148. Find third lowest element from an array and count the occurrence of that number in the array.
Find third lowest element and its occurrence in an array.
Sort the array and return the element at index 2 with its count.
Use a hash table to count occurrences while iterating through the array.
Q149. What all are the annotations that we use in Spring Boot & it's usage
Some common annotations used in Spring Boot are @RestController, @Autowired, @RequestMapping, @Service, @Component, @Repository.
@RestController - Used to define a controller class in Spring MVC.
@Autowired - Used for automatic dependency injection.
@RequestMapping - Used to map web requests to specific handler methods.
@Service - Indicates that a class is a service.
@Component - Indicates that a class is a Spring component.
@Repository - Indicates that a class is a repository.
Q150. What do you know about maps, tell me something about maps?
Maps are visual representations of geographical areas, providing information about the location, terrain, and features of a specific area.
Maps are used to navigate and understand the world around us.
They can show political boundaries, roads, rivers, mountains, and other physical features.
Maps can be used for various purposes such as planning routes, analyzing data, and studying geography.
Different types of maps include topographic maps, road maps, weather maps, and thematic m...read more
Q151. What is R programming? What is Public class? What are access specifiers? Write a array program and explain it for nested loop concept?
R programming is a language and environment for statistical computing and graphics.
R programming is widely used for data analysis, statistical modeling, and visualization.
Public class in programming refers to a class that can be accessed from outside the package.
Access specifiers in programming define the accessibility of classes, methods, and variables.
An array program using nested loops can be used to iterate through a multi-dimensional array.
Q152. let us assume that a glass of water is fullfilled with exceeds its range so why water is not falling down from filled water n what is the resion behind that?
Water does not fall from a filled glass because of surface tension and gravity.
Surface tension of water creates a force that holds it together and prevents it from overflowing.
Gravity pulls the water downwards, keeping it inside the glass.
The shape of the glass also plays a role in containing the water.
If the glass is filled beyond its capacity, the surface tension may break and water will overflow.
Q153. What is the difference in view and materialized view? Can we update a view ?
View is a virtual table while materialized view is a physical table. Views cannot be updated directly.
View is a logical representation of data while materialized view is a physical copy of data.
Materialized views are stored on disk while views are not.
Views cannot be updated directly but can be updated indirectly by updating the underlying tables.
Materialized views can be updated but the refresh process can be time-consuming.
Q154. Can you tell me about your Google Facilitator Ready program?
Google Facilitator Ready program is a training program that equips individuals with skills to facilitate Google's workshops and events.
The program provides training on how to facilitate Google's workshops and events
Participants learn how to create engaging content and deliver it effectively
The program also covers how to manage logistics and handle participant questions
Upon completion, participants receive a certificate and are eligible to facilitate Google's events
Examples of...read more
There was a star and at each vertex, there was a number on each vertice the number was not given so we have to find the missing number.
Q156. How flexibility can help, what are its advantages and disadvantages
Flexibility can bring advantages like adaptability and creativity, but can also lead to indecisiveness and lack of focus.
Flexibility allows for adaptability to changing situations and creativity in problem-solving.
It can also lead to indecisiveness and lack of focus if not balanced with structure and clear goals.
Advantages include increased resilience, better teamwork, and improved communication.
Disadvantages include potential for burnout and difficulty in prioritizing tasks....read more
Q157. Where and how do you define if you need to set up payment above any threshhold should be done by a specific bank and below the threshold should be another bank?
Payment threshold determines bank selection. How to decide?
Consider transaction fees and exchange rates of banks
Analyze the frequency and volume of payments
Evaluate the reliability and security of banks
Consult with financial experts and stakeholders
Create a cost-benefit analysis to determine the optimal bank for each threshold
Q158. what you mean by call by value and reference ,funtions.
Call by value and reference are two ways of passing arguments to functions.
Call by value passes a copy of the argument's value to the function.
Call by reference passes a reference to the argument's memory location to the function.
Functions that use call by value cannot modify the original value of the argument.
Functions that use call by reference can modify the original value of the argument.
In some programming languages, call by reference is achieved using pointers.
Example: ...read more
Q159. Why can we update internal values of objects defined with const in javascript?
Internal values of const objects can be updated in JavaScript due to the nature of const keyword.
The const keyword only prevents reassignment of the variable identifier, not the object itself.
Internal values of objects can be modified without reassigning the object.
This behavior is different from other programming languages where const objects are completely immutable.
Q160. Informatica Powercenter grid Difference between Joiner and lookup Difference between router and filter What is mapplet and it's limitations Session Partitioning Scenario based questions and Unix and SQL questio...
read moreExplaining differences between Informatica Powercenter grid components and concepts
Joiner combines data from two sources based on a common key, while Lookup retrieves data from a reference table based on a matching key
Router sends data to different targets based on specified conditions, while Filter removes rows from a data set based on specified criteria
Mapplet is a reusable object that contains a set of transformations, but has limitations such as not being able to use dyna...read more
Q161. What is ment by machine learning?
Machine learning is a subset of artificial intelligence that enables machines to learn from data and improve their performance.
Machine learning involves training algorithms to make predictions or decisions based on data.
It uses statistical techniques to identify patterns in data and make predictions.
Examples include image recognition, speech recognition, and recommendation systems.
Machine learning can be supervised, unsupervised, or semi-supervised.
It is used in various indus...read more
Q162. 2. What are sealed classes and partial classes in C#?
Sealed classes cannot be inherited while partial classes allow a class to be divided into multiple files.
Sealed classes prevent inheritance and are used to restrict the class hierarchy.
Partial classes allow a class to be divided into multiple files for easier management.
Sealed classes are marked with the 'sealed' keyword while partial classes are marked with the 'partial' keyword.
Example of sealed class: 'sealed class MyClass {}'
Example of partial class: 'public partial class...read more
Q163. 3. What is the difference between method overloading and overriding?
Method overloading is having multiple methods with the same name but different parameters, while method overriding is having a subclass method with the same name and parameters as the superclass method.
Method overloading is used to provide different ways of calling the same method with different parameters.
Method overriding is used to provide a specific implementation of a method in a subclass that is already defined in the superclass.
Method overloading is resolved at compile...read more
Q164. 10. What is meant by Dependency injection in dot net?
Dependency injection is a design pattern used to remove dependencies between objects and make them more modular.
It allows objects to be created and configured externally, rather than within a class.
It helps to reduce coupling between classes and makes code more testable.
There are three types of dependency injection: constructor injection, property injection, and method injection.
Example: Instead of creating a database connection object within a class, it can be injected from ...read more
Q165. 1.Find last 5 records. 2. find unique records.
To find the last 5 records, use the ORDER BY clause with a descending order and limit the result to 5. To find unique records, use the DISTINCT keyword.
To find the last 5 records, use the ORDER BY clause with a descending order and limit the result to 5.
Example: SELECT * FROM table_name ORDER BY column_name DESC LIMIT 5
To find unique records, use the DISTINCT keyword.
Example: SELECT DISTINCT column_name FROM table_name
Q166. How to debug using gdb and write the commands used ?
Debugging using gdb and writing commands
Compile the code with -g flag to include debugging information
Start gdb with the executable file as argument
Set breakpoints using 'break' command
Run the program using 'run' command
Use 'next' or 'step' command to execute the code line by line
Print variable values using 'print' command
Use 'backtrace' command to see the call stack
Exit gdb using 'quit' command
Q167. What are the commands to push a file to a repository (add, commit, push)?
Commands to push a file to a repository are add, commit, push.
Use 'git add
' to stage the changes Use 'git commit -m
' to commit the changes Use 'git push' to push the changes to the remote repository
Q168. What is the difference between a primary key and a foreign key?
Primary key uniquely identifies a record in a table, while foreign key refers to a field in another table.
Primary key is used to enforce data integrity and ensure uniqueness of records.
Foreign key is used to establish a relationship between two tables.
A table can have only one primary key, but multiple foreign keys.
Example: CustomerID in Orders table is a foreign key that references the Customer table's primary key.
Primary key is denoted by a key symbol, while foreign key is ...read more
Q169. Under 'If' statement if more than 1 statements are there and curly brackets is not there then what will be the output?
If more than 1 statements are under 'If' statement without curly brackets, what will be the output?
The first statement after 'if' will be executed
The second statement will be executed regardless of the condition
It can lead to unexpected behavior and bugs
Always use curly brackets to avoid confusion
Q170. What are streams in C++? What are predefined streams in C++?
Streams in C++ are used for input and output operations. Predefined streams in C++ include cin, cout, cerr, and clog.
Streams in C++ are objects that allow reading from or writing to external sources or destinations.
cin is the standard input stream used for reading input from the user.
cout is the standard output stream used for printing output to the console.
cerr is the standard error stream used for printing error messages to the console.
clog is an alternative to cerr for pri...read more
Q171. 3. Write a program to sort a list in Ascending Order.
Program to sort a list in ascending order
Use a sorting algorithm like bubble sort, insertion sort, or selection sort
Compare adjacent elements and swap if necessary
Repeat until the list is sorted
Q172. How to reduce execution time in selenium?
To reduce execution time in Selenium, optimize test scripts, use efficient locators, and run tests in parallel.
Optimize test scripts by removing unnecessary steps and reducing wait times
Use efficient locators such as CSS selectors instead of XPath
Run tests in parallel using tools like Selenium Grid or TestNG
Use headless browsers like PhantomJS to speed up tests
Use page object model to reduce code duplication and improve maintainability
Q173. What are reference variables and how is it defined in C++?
Reference variables in C++ are aliases for other variables, allowing direct access and manipulation of the original data.
Reference variables are declared using an ampersand (&) symbol.
They must be initialized when declared and cannot be reassigned to refer to a different variable.
Changes made to a reference variable affect the original variable it refers to.
They are commonly used to pass variables by reference to functions.
Reference variables can be used to create multiple na...read more
Q174. What is machine learning, deep learning, artificial intelligence and cloud computing?
Machine learning, deep learning, artificial intelligence and cloud computing are all related to advanced computing technologies.
Machine learning is a subset of AI that involves training algorithms to make predictions or decisions based on data.
Deep learning is a subset of machine learning that uses neural networks to learn and make decisions.
Artificial intelligence is the broader field of creating intelligent machines that can perform tasks that typically require human intell...read more
Q175. Differentiate between supervised and unsupervised machine learning?
Supervised learning uses labeled data to train models while unsupervised learning uses unlabeled data.
Supervised learning requires a target variable to be predicted while unsupervised learning does not.
Supervised learning algorithms include regression, classification, and decision trees while unsupervised learning algorithms include clustering and association.
Examples of supervised learning include predicting housing prices and classifying emails as spam or not, while example...read more
Q176. What are star and mesh topology?
Star and mesh are network topologies used in computer networking.
Star topology connects all devices to a central hub or switch.
Mesh topology connects every device to every other device.
Star topology is easy to set up and troubleshoot.
Mesh topology is highly reliable and fault-tolerant.
Examples of star topology include Ethernet and Wi-Fi networks.
Examples of mesh topology include sensor networks and peer-to-peer networks.
Q177. What are the bounding methods in React? Difference between Class Component and Functional Component in ReactJS?
Bounding methods in React are used to limit the scope of a component's updates.
Bounding methods include shouldComponentUpdate, getSnapshotBeforeUpdate, and componentDidUpdate.
shouldComponentUpdate allows a component to decide if it should update based on changes in props or state.
getSnapshotBeforeUpdate allows a component to capture information before a change is made to the DOM.
componentDidUpdate is called after a component updates and can be used to perform additional actio...read more
Q178. What is the difference in Source level commit and target level commit ?
Source level commit is done at the source code level while target level commit is done at the target code level.
Source level commit is done when changes are made to the source code and committed to the source code repository.
Target level commit is done when changes are made to the target code and committed to the target code repository.
Source level commit is done before the code is compiled while target level commit is done after the code is compiled.
Source level commit is mo...read more
Q179. 1. Explain OTC cycle? 2. Explain the concept of copy control 3. Explain the steps of pricing procedure 4. Explain the structure of Idoc and why Idocs are used? 5. Billing types and explain with real time exampl...
read moreFunctional Test Engineer interview questions on OTC cycle, copy control, pricing procedure, Idoc structure and usage, billing types, and shipment process.
OTC cycle involves order creation, delivery, and billing
Copy control is used to copy data from one document to another
Pricing procedure involves condition types, access sequences, and calculation rules
Idocs are structured in segments and used for data exchange between systems
Billing types include invoice, credit memo, and de...read more
Q180. How will you print the address of a variable without using a pointer?
Printing the address of a variable without using a pointer can be done by using the & operator.
Use the & operator before the variable name to print its address
Example: int num = 10; printf("%p", &num);
This will print the address of the variable num
Q181. What is your aptittude for handling business development?
I have a strong aptitude for business development with experience in identifying opportunities, building relationships, and closing deals.
Proven track record of identifying and pursuing new business opportunities
Skilled in building and maintaining relationships with clients and stakeholders
Ability to analyze market trends and develop effective strategies
Experience in negotiating and closing deals
Strong communication and presentation skills
Examples: Successfully secured a part...read more
Q182. Networking Questions like What is IP ADDRESS WHAT IS MAC ADDRESS WHAT IS BSOD WHAT IS ACTIVE DIRECTORY WHAT IS NODE WHAT IS LAN WAN MAN WHAT IS SQL WHAT ARE SUBGROUPS OF SQL WHAT IS DML ,DDL TCL DCL? WHAT IS DB...
read moreAnswers to common networking and database related questions for a Trainee Programmer interview.
IP ADDRESS - unique identifier for devices on a network
MAC ADDRESS - unique identifier for network interface controllers
BSOD - Blue Screen of Death, an error screen displayed on Windows systems
ACTIVE DIRECTORY - centralized database for managing network resources
NODE - a device or computer on a network
LAN WAN MAN - types of networks (Local Area Network, Wide Area Network, Metropolit...read more
Q183. What type of language do you prefer for complex algorithm ?
I prefer using a language that is efficient and has strong support for data structures and algorithms.
Languages like C++, Java, and Python are good choices for complex algorithms
C++ has strong support for data structures and is efficient in terms of memory and speed
Java has a vast library of data structures and algorithms and is easy to read and maintain
Python has a simple syntax and is great for prototyping and testing algorithms
Ultimately, the choice of language depends on ...read more
Q184. What unit testing. What is the framework used for unit testing.
Unit testing is a software testing technique where individual units or components of a software application are tested in isolation.
Unit testing helps to identify defects early in the development cycle
It ensures that each unit of code is working as expected
Unit tests are automated and can be run frequently to catch regressions
Popular unit testing frameworks include JUnit for Java, NUnit for .NET, and pytest for Python
Q185. What is a Persistent Volume (PV) and a Persistent Volume Claim (PVC) in Kubernetes, and how do they relate to stateful applications?
PV and PVC in Kubernetes are used to provide persistent storage for stateful applications.
Persistent Volume (PV) in Kubernetes is a piece of storage in the cluster that has been provisioned by an administrator.
Persistent Volume Claim (PVC) is a request for storage by a user or pod in the cluster.
PVs and PVCs decouple storage from the pod, allowing for easier management and scaling of stateful applications.
PVs can be dynamically provisioned or statically provisioned, depending...read more
Q186. What is LVM, Explain LVM Architecture, What is Raid, What is the booting process of RHEL, How to manage failed unmount or mount, What are the issues you have faced in working with Linux Servers, What is special...
read moreLVM is Logical Volume Manager used for managing disk space, RAID is Redundant Array of Independent Disks for data protection, RHEL boot process involves BIOS, GRUB, kernel loading, and init process.
LVM allows for dynamic resizing of logical volumes without downtime.
RAID combines multiple disks for data redundancy or performance improvement.
RHEL boot process involves BIOS POST, GRUB bootloader, kernel loading, and init process.
Managing failed unmount or mount involves checking...read more
Q187. Spur gear transmit power at angle 90 degree, because it's perpendicular to the position of another gear.
Spur gears transmit power at 90 degree angle to each other.
Spur gears are designed to transmit power between parallel shafts.
The teeth on the gears mesh together to transfer torque and rotation.
The angle between the shafts determines the gear ratio and speed of rotation.
Spur gears are commonly used in machinery and vehicles.
Q188. 1. What is factless fact. 2. Star schema vs snowflake schema. And which is normalized. 3. About oracle joins.
Answers to questions related to Informatica Developer role.
Factless fact is a fact table that does not have any measures.
Star schema has a single fact table and multiple dimension tables, while snowflake schema has multiple dimension tables that are further normalized.
Oracle joins include inner join, left join, right join, and full outer join.
Q189. what is gps,what do u know about google maps,how are they imp in our lyf, except for maps and routing how is google maps useful.
GPS stands for Global Positioning System, Google Maps is a popular mapping service that provides navigation, traffic updates, and location information.
GPS is a satellite-based navigation system that allows users to determine their exact location on Earth.
Google Maps uses GPS data to provide accurate mapping and routing services.
Google Maps is important in our daily lives for navigation, finding nearby businesses, checking traffic conditions, and exploring new places.
Apart fro...read more
Q190. Can you mention some data structures? Explain Stack and Queue?
Data structures are ways to organize and store data. Stack and Queue are two commonly used data structures.
Stack is a Last-In-First-Out (LIFO) data structure where the last element added is the first one to be removed.
Queue is a First-In-First-Out (FIFO) data structure where the first element added is the first one to be removed.
Stack is used in undo-redo functionality, while Queue is used in scheduling tasks.
Examples of Stack include browser history, call stack in programmin...read more
Q191. What is the advantage of using netbeans for writing java ?
NetBeans provides a user-friendly interface, powerful code editing features, and seamless integration with Java development tools.
NetBeans offers a user-friendly interface with drag-and-drop functionality for easy development.
It provides powerful code editing features like code completion, refactoring, and debugging.
NetBeans has seamless integration with Java development tools, making it easier to build, test, and deploy Java applications.
It supports various frameworks and te...read more
Q192. As i am from ECE, difference between half duplex and full duplex
Half duplex allows communication in both directions, but not simultaneously. Full duplex allows simultaneous communication in both directions.
Half duplex allows communication in both directions, but only one direction at a time.
Full duplex allows simultaneous communication in both directions.
Examples of half duplex communication include walkie-talkies and CB radios.
Examples of full duplex communication include telephone conversations and video conferencing.
Q193. Tell me what you know about AWS cloud.
AWS cloud is a platform that provides a wide range of cloud computing services.
AWS stands for Amazon Web Services
It offers services like computing, storage, databases, analytics, and more
AWS provides a pay-as-you-go pricing model
Examples of AWS services include EC2, S3, RDS, and Lambda
Q194. what are hooks and what are the hooks you have used
Hooks are functions that allow you to use state and other React features without writing a class.
useState() - for managing state in functional components
useEffect() - for performing side effects in functional components
useContext() - for consuming context in functional components
useReducer() - for managing complex state in functional components
useCallback() - for memoizing functions in functional components
Q195. What is difference between RDBMS and DBMS? What is differenence between stack and queue?
RDBMS is a relational database management system that stores data in tables with predefined relationships. DBMS is a general-purpose database management system that stores data in various formats.
RDBMS enforces ACID properties while DBMS does not
RDBMS supports SQL while DBMS may or may not support SQL
RDBMS is used for large-scale applications while DBMS is used for small-scale applications
Stack is a LIFO data structure while Queue is a FIFO data structure
Stack uses push and p...read more
Q196. 1.Difference between unique key and primary key.
Unique key allows null values while primary key does not.
Primary key is a unique identifier for a record in a table.
Unique key allows null values but primary key does not.
A table can have only one primary key but multiple unique keys.
Example: Employee ID can be a primary key while email can be a unique key.
Q197. What approach did you take to learn data science?
I took a structured approach to learn data science.
Started with learning the basics of statistics and programming
Took online courses and read books on data science
Practiced on real-world datasets and participated in Kaggle competitions
Joined a data science community to learn from others and share knowledge
Continuously updated my skills and knowledge through online resources and attending conferences
Q198. What feature in Snowflake's architecture and pricing model set is apart from other competitors
Snowflake's architecture and pricing model sets it apart from competitors.
Snowflake's architecture is based on a unique multi-cluster, shared data architecture that separates compute and storage, allowing for unlimited scalability and concurrency.
Snowflake's pricing model is based on a pay-as-you-go approach, where users only pay for the resources they actually use, without any upfront costs or long-term commitments.
Snowflake's architecture also includes automatic scaling, wh...read more
Q199. What is Customer service,operating system , difference between ram & rom?
Customer service, operating system, RAM and ROM differences explained.
Customer service is the provision of assistance and support to customers before, during, and after a purchase.
An operating system is a software that manages computer hardware and software resources.
RAM (Random Access Memory) is a type of computer memory that is volatile and used for temporary storage.
ROM (Read-Only Memory) is a type of computer memory that is non-volatile and used for permanent storage.
The ...read more
Q200. Tell about encoder, decoder and Multiplexer
Encoders, decoders, and multiplexers are digital logic circuits used in data processing and communication systems.
An encoder is a circuit that converts a set of input signals into a coded output signal.
A decoder is a circuit that converts a coded input signal into a set of output signals.
A multiplexer is a circuit that selects one of many input signals and forwards it to a single output line.
Encoders and decoders are often used together to convert data between different forma...read more
More about working at Cognizant
Top HR Questions asked in Survival Technologies
Interview Process at Survival Technologies
Top Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month