Add office photos
Engaged Employer

Cognizant

3.8
based on 47k Reviews
Proud winner of ABECA 2024 - AmbitionBox Employee Choice Awards
Filter interviews by

2500+ Survival Technologies Interview Questions and Answers

Updated 17 Dec 2024
Popular Designations

Q101. Which programming languages you're comfortable with ?

View 6 more answers

Q102. If we have to return table, how to create a stored procedure?

Ans.

To create a stored procedure that returns a table, use SELECT statement within the procedure.

  • Create a stored procedure using CREATE PROCEDURE statement.

  • Within the procedure, use SELECT statement to query the data and return the table.

  • Specify the columns to be returned in the SELECT statement.

  • Execute the stored procedure to retrieve the table data.

View 1 answer

Q103. Write a query to find the employee name who earns maximum salary

Ans.

The query finds the employee name who earns the maximum salary.

  • Use the SELECT statement to retrieve the employee name and salary from the database table.

  • Use the ORDER BY clause to sort the results in descending order based on salary.

  • Use the LIMIT clause to limit the result to only one row.

  • Return the employee name from the query result.

View 2 more answers

Q104. What is Object oriented programming? What are the 4 principal of Object oriented programming?

Ans.

Object oriented programming is a programming paradigm that focuses on objects and their interactions to solve problems.

  • Encapsulation: bundling data and methods that operate on that data within a single unit.

  • Inheritance: creating new classes from existing ones, inheriting their properties and methods.

  • Polymorphism: the ability of objects to take on many forms, allowing them to be used in different ways.

  • Abstraction: hiding implementation details and only showing the necessary in...read more

Add your answer
Discover Survival Technologies interview dos and don'ts from real experiences

Q105. Write a program to check whether a given integer is a prime or not and even or odd and it should not give any errors for any kind of inputs.

Ans.

Program to check if an integer is prime, even or odd without errors.

  • Take input integer from user

  • Check if input is valid integer

  • Check if input is prime or not

  • Check if input is even or odd

  • Display the result

Add your answer

Q106. 1.Difference between role and profile, 2. For what level of owd the share object will be available fo an object in apex sharing. 3.How to check fls in apex class.4. With sharing also consider fls in apex class?...

read more
Ans.

Technical interview questions on Apex, Aura and Webservices

  • Role defines the responsibilities and expectations of a position, while profile defines the access and permissions of a user

  • Share object is available for the same OWD level or higher

  • FLS can be checked using the Schema.DescribeFieldResult class in Apex

  • FLS is considered even with sharing in Apex class

  • Webservices callout can be done using the fetch() method in LWC or using the HttpRequest class in Apex

  • Application events ...read more

View 1 answer
Are these interview questions helpful?

Q107. Write a sql to delete duplicate records from a table

Ans.

SQL query to delete duplicate records from a table.

  • Use the DELETE statement with a subquery to identify and delete duplicate records.

  • The subquery should select the duplicate records based on the criteria for duplication.

  • Ensure to keep at least one copy of the duplicate records to avoid deleting all instances.

View 7 more answers

Q108. 5. Git repository . How to push and pull code.

Ans.

Git is a version control system. Push code to upload changes to a remote repository. Pull code to download changes from a remote repository.

  • To push code, use the command 'git push '. For example, 'git push origin master'.

  • To pull code, use the command 'git pull '. For example, 'git pull origin master'.

  • Make sure to commit changes before pushing code using the command 'git commit -m '.

  • Use 'git status' to check the status of your local repository.

  • Use 'git clone ' to clone a rem...read more

View 2 more answers
Share interview questions and help millions of jobseekers 🌟

Q109. Write a c program which will display your name in first line and from second line one word will be lesser from the previous line. Display this until one word remains

Ans.

The program will display the name of the user in the first line and then decrease one word in each subsequent line until only one word remains.

  • Create an array of strings containing the user's name split into individual words

  • Use a loop to iterate through the array and print the name with one less word in each iteration

  • Continue the loop until only one word remains

Add your answer

Q110. What is ment by the term void?

Ans.

Void refers to a state of emptiness or absence of something.

  • It can refer to a physical space that is empty or without matter.

  • It can also refer to a lack of something, such as a void in one's life or a void in a contract.

  • In programming, void is a data type used to indicate that a function does not return a value.

  • In law, a void contract is one that is not legally binding.

  • In physics, a vacuum is often referred to as a void.

View 3 more answers

Q111. An sql query to find salary, department of employee

Ans.

An SQL query to find the salary and department of an employee.

  • Use the SELECT statement to retrieve the desired columns.

  • Specify the table name and join it with the department table using the appropriate join condition.

  • Use the WHERE clause to filter the results based on employee criteria if needed.

Add your answer

Q112. What is the difference in mapping parameter and mapping variable ?

Ans.

Mapping parameter is used to pass values to a mapping at run time, while mapping variable is used to store values within a mapping.

  • Mapping parameter is defined in the mapping configuration and can be changed at run time.

  • Mapping variable is defined within the mapping and can be used to store values temporarily.

  • Mapping parameter is used to pass values from one mapping to another.

  • Mapping variable is used to store values within a mapping for use in subsequent transformations.

View 1 answer

Q113. Which programming language you like the most and why?

Ans.

I like Python the most because of its simplicity and versatility.

  • Python has a simple syntax which makes it easy to learn and use.

  • It has a vast library of modules and frameworks for various purposes.

  • Python is used in various fields such as web development, data science, and automation.

  • It supports both object-oriented and functional programming paradigms.

  • Python is also known for its readability and maintainability of code.

  • For example, I have used Python for web scraping, data a...read more

Add your answer

Q114. What is your view on competition?

Ans.

Competition is healthy and drives innovation, but it should not compromise ethics or fair play.

  • Competition can lead to better products and services for consumers

  • It can also motivate companies to improve their processes and efficiency

  • However, it should not result in unethical behavior or unfair practices

  • Examples of healthy competition include Apple vs Samsung, Coca-Cola vs Pepsi

  • Examples of unethical competition include price-fixing, false advertising, and stealing trade secret...read more

View 8 more answers

Q115. What are refs? How will you use it for getting input value? Explain with code.

Ans.

Refs are a way to access DOM nodes or React components directly. They can be used to get input values.

  • Refs provide a way to access DOM nodes or React components directly.

  • They are commonly used to get input values or trigger imperative animations.

  • Refs can be created using the `createRef()` method or by using a callback function.

  • To get the value of an input using refs, you can assign a ref to the input element and access its value property.

View 1 answer

Q116. What is the Default Methods and why it is required?

Ans.

Default Methods are methods in interfaces with implementation, introduced in Java 8.

  • Introduced in Java 8 to provide backward compatibility for interfaces

  • Allows adding new methods to interfaces without breaking existing implementations

  • Default methods can be overridden in implementing classes

  • Example: default void display() { System.out.println("Default method"); }

View 1 answer

Q117. 1.How can you improve performance tuning issue in informatica? 2.What is joiner Transformation and Router Transformation? 3.What is a mapping? 4.How you will handle complex mapping ? 5.What is session log ? 6. ...

read more
Ans.

Answers to questions related to Informatica performance tuning, transformations, mapping, and session log.

  • To improve performance tuning in Informatica, we can use techniques like partitioning, pushdown optimization, and caching.

  • Joiner Transformation is used to join two heterogeneous sources based on a common key, while Router Transformation is used to route data based on specified conditions.

  • A mapping is a set of source and target definitions, transformations, and rules that ...read more

Add your answer

Q118. what is the output for the given code sample explain

Ans.

The output of the code sample is 'Hello World'.

  • The code sample is likely to print a string.

  • The string being printed is 'Hello World'.

Add your answer

Q119. What is a Purchase Order? Did you work on it?

Ans.

A purchase order is a commercial document issued by a buyer to a seller, indicating the type, quantity, and agreed price of products or services.

  • A purchase order is a formal request for goods or services from a supplier.

  • It includes details such as the item description, quantity, price, delivery date, and payment terms.

  • Purchase orders help ensure accurate and timely delivery of goods or services.

  • They serve as a legally binding contract between the buyer and seller.

  • Purchase ord...read more

View 4 more answers

Q120. How many ways asynchronous code can be written in Salesforce

Ans.

There are multiple ways to write asynchronous code in Salesforce.

  • Using @future annotation

  • Using Queueable interface

  • Using Batch Apex

  • Using Platform Events

  • Using Asynchronous Apex REST Callouts

View 1 answer

Q121. Briefly explain the method you will use to execute an array linked list?

Ans.

An array linked list can be executed using a loop to traverse through the array and access the linked nodes.

  • Create an array to store the linked nodes

  • Assign the first node to the first element of the array

  • Use a loop to traverse through the array and access the linked nodes

  • To access the next node, use the index of the current node as the index of the next node in the array

  • Stop the loop when the last node is reached

View 1 answer

Q122. given a problem scenario what would action do you suggest to be taken?

Ans.

The answer to the question depends on the specific problem scenario provided.

  • Analyze the problem scenario and identify the key issues

  • Consider the potential consequences of different actions

  • Evaluate the available resources and constraints

  • Propose a course of action that addresses the problem and maximizes positive outcomes

  • Provide a rationale for the chosen action

Add your answer

Q123. What are custom hooks in React, and what are their use cases? Additionally, can you provide an example of a custom hook that performs an API call and utilizes the retrieved data?

Ans.

Custom hooks in React are reusable functions that allow you to extract component logic into separate functions for better code organization and reusability.

  • Custom hooks are created using the 'use' prefix and can be used to share logic between components.

  • Use cases for custom hooks include fetching data from an API, handling form state, managing local storage, and more.

  • Example of a custom hook for API call: const useFetchData = (url) => { // logic to fetch data from API }

Add your answer
Q124. DBMS Questions

1) What are the different types of languages that are available in the DBMS?

2) Explain the concepts of a Primary key and Foreign Key.

3) What is the concept of sub-query in terms of SQL?

Add your answer

Q125. What is the CSV? What is automation testing?

Ans.

CSV stands for Computer System Validation. Automation testing is the use of software to execute tests.

  • CSV is a process of ensuring that a computer-based system meets its intended requirements and is compliant with regulatory standards.

  • Automation testing involves using software tools to run tests automatically, reducing the need for manual testing.

  • CSV and automation testing are often used together to ensure that computer systems are validated and tested thoroughly.

  • Examples of ...read more

View 1 answer

Q126. What do you know about OOPS?

Ans.

OOPS stands for Object-Oriented Programming System.

  • OOPS is a programming paradigm that focuses on objects and their interactions.

  • It emphasizes on encapsulation, inheritance, and polymorphism.

  • Encapsulation is the process of hiding implementation details from the user.

  • Inheritance allows a class to inherit properties and methods from another class.

  • Polymorphism allows objects to take on multiple forms or behaviors.

  • Examples of OOPS languages include Java, C++, Python, and Ruby.

View 1 answer

Q127. Tell us from Scratch how you will find File count in Source folder and how you check files exist or not.?

Ans.

To find file count in source folder and check if files exist, use SSIS Script Task with C# code.

  • Create a SSIS package with Script Task

  • Write C# code to get file count and check if files exist

  • Use System.IO namespace to access files and folders

  • Use Directory.GetFiles() method to get all files in folder

  • Use File.Exists() method to check if file exists

  • Use a variable to store file count and use it in subsequent tasks

Add your answer

Q128. What is a loop?

Ans.

A loop is a programming construct that repeats a set of instructions until a certain condition is met.

  • Loops are used to automate repetitive tasks in programming.

  • There are three types of loops: for, while, and do-while.

  • For example, a for loop can be used to iterate over an array and perform a certain action on each element.

  • A while loop can be used to repeat a set of instructions until a certain condition is no longer true.

  • A do-while loop is similar to a while loop, but it alwa...read more

View 6 more answers

Q129. What error will you get if you enter a duplicate value to the primary key column

Ans.

You will get a primary key violation error if you enter a duplicate value to the primary key column.

  • A primary key is a unique identifier for each record in a database table.

  • When you try to insert a duplicate value into the primary key column, the database system will throw an error.

  • The error message will typically indicate a primary key violation or duplicate key error.

  • To resolve the issue, you need to ensure that each value in the primary key column is unique.

View 1 answer

Q130. Write a program to find the sum of the squares of each term of Fibonacci series

Ans.

Program to find the sum of squares of each term of Fibonacci series

  • Generate Fibonacci series using loop or recursion

  • Calculate square of each term

  • Add all squares to get the sum

View 1 answer

Q131. What are the ways to handle Errors in React?

Ans.

Error handling in React can be done using try-catch blocks, error boundaries, and handling asynchronous errors.

  • Use try-catch blocks to handle synchronous errors

  • Use error boundaries to catch errors in child components

  • Handle asynchronous errors using promises or async/await

  • Use third-party libraries like Sentry or Bugsnag for better error tracking

  • Display user-friendly error messages to improve user experience

View 1 answer

Q132. Whether E-commerce shopping safe or not

Ans.

E-commerce shopping can be safe if proper precautions are taken.

  • Use secure websites with HTTPS encryption

  • Avoid public Wi-Fi when making purchases

  • Check for seller reviews and ratings

  • Use strong and unique passwords

  • Monitor credit card statements for any unauthorized charges

View 14 more answers

Q133. What if a wheel of a car suddenly screws off while driving will u apply break suddenly ?

Ans.

No, I would not apply the brake suddenly.

  • I would try to maintain control of the car by steering it to the side of the road or a safe area.

  • Applying the brake suddenly could cause the car to skid or lose control.

  • I would also turn on the hazard lights to alert other drivers of the situation.

  • Once the car is safely stopped, I would assess the damage and call for assistance if necessary.

View 1 answer

Q134. To convert a datatype into another what process is used?

Ans.

Typecasting is used to convert one datatype into another.

  • Typecasting is the process of converting a value from one datatype to another.

  • It can be done implicitly or explicitly.

  • Implicit typecasting is done automatically by the compiler.

  • Explicit typecasting is done manually by the programmer using casting operators.

  • Examples of typecasting include converting an integer to a float, a string to an integer, etc.

View 1 answer

Q135. Datastge - How will you remove Header and trailer from Sequential data file

Ans.

To remove header and trailer from a sequential data file in Datastage.

  • Use Sequential File stage in Datastage.

  • Set the 'Skip Rows' property to the number of header rows to be skipped.

  • Set the 'Trailer Rows' property to the number of trailer rows to be skipped.

  • Use a Transformer stage to remove any remaining header or trailer rows.

  • Use the 'Remove' function in the Transformer stage to remove the rows.

View 1 answer

Q136. What is the difference between primary key, foreign key, candidate key & super key?

Ans.

Primary key uniquely identifies a record, foreign key links tables, candidate key can be primary key, super key is a set of attributes.

  • Primary key: Unique identifier for a record in a table

  • Foreign key: Links tables together by referencing the primary key of another table

  • Candidate key: A set of attributes that can be used as a primary key

  • Super key: A set of attributes that can uniquely identify a record

View 1 answer

Q137. difference between data ware house and data mart , difference between router and filter, difference between lookup and joiner , difference between lookup and dynamic lookup , difference between lookup and union...

read more
Add your answer

Q138. what is self Join,types of joins.what is CDC and how we will use it in ETL testing

Ans.

Self join is joining a table with itself. Types of joins are inner, outer, left and right. CDC is change data capture used for tracking data changes.

  • Self join is used when we need to join a table with itself to retrieve data.

  • Types of joins are inner, outer, left and right join.

  • CDC is used to track data changes in the source system and apply those changes to the target system.

  • CDC can be used in ETL testing to verify that the data is being correctly captured and transformed.

Add your answer

Q139. 1. Bais and variance trade-off 2. How to handle Imbalanced data? 3. What is Multicollinearity and how do you handle it? 4. Explain Lasso & Ridge? 5. Difference between Bagging and Boosting. 6. Explain K-Means c...

read more
Ans.

Questions related to data analysis techniques and methods.

  • Bais and variance trade-off: balancing model complexity and accuracy

  • Handling imbalanced data: resampling techniques, adjusting class weights, using different evaluation metrics

  • Multicollinearity: when predictor variables are highly correlated, can be handled by feature selection or regularization

  • Lasso & Ridge: regularization techniques to prevent overfitting by adding penalty terms to the loss function

  • Bagging vs Boostin...read more

Add your answer

Q140. 1. What is the difference between Inheritance and Abstract Class?

Ans.

Inheritance is a way to create a new class from an existing class while Abstract Class is a class that cannot be instantiated.

  • Inheritance allows a subclass to inherit properties and methods from a superclass.

  • Abstract Class is used as a blueprint for other classes to inherit from.

  • An Abstract Class can have abstract methods that must be implemented by its subclasses.

  • Inheritance can create a hierarchy of classes with shared properties and methods.

  • An Abstract Class cannot be inst...read more

Add your answer

Q141. Explain how the Software Development process works ? And what is it that we are following now a days ?

Ans.

Software development process involves planning, designing, coding, testing, and deployment of software.

  • Requirement gathering and analysis

  • Designing the software architecture

  • Coding and implementation

  • Testing and debugging

  • Deployment and maintenance

  • Agile methodology is commonly followed nowadays

View 1 answer

Q142. If I have assigned different colors to an ID and a class and applied both to the same element, which color will be applied based on CSS specificity precedence?

Ans.

The color applied will be based on the specificity of the selector, with ID having higher specificity than class.

  • ID has higher specificity than class in CSS

  • Color applied will be based on the selector with higher specificity

  • Example: If ID selector has color red and class selector has color blue, the color applied will be red

Add your answer

Q143. What will be the output of the following JavaScript code fragment: `const a; function test() { console.log(a); }; test();`?

Ans.

The code will throw an error because 'a' is declared but not initialized.

  • The code will result in a ReferenceError because 'a' is declared but not assigned a value.

  • Variables declared with 'const' must be initialized at the time of declaration.

  • Initializing 'a' with a value before calling test() will prevent the error.

Add your answer
Q144. Digital Electronics Questions

What is repeater?

What are flip flops?

What are latches?

What is Stack pointer What are Diodes,Sampling,Encoder, Decoder, Registers,Accumulator ?

Add your answer

Q145. Which programming language do you know?

Ans.

I know multiple programming languages including Java, Python, and C++.

  • Proficient in Java with experience in developing web applications using Spring framework

  • Familiar with Python for data analysis and machine learning

  • Experience in C++ for developing high-performance applications

  • Also familiar with HTML, CSS, and JavaScript for front-end development

View 2 more answers

Q146. What are the Design features of spur gear?

Ans.

Spur gears have straight teeth and are used to transmit power between parallel shafts.

  • Teeth are parallel to the axis of rotation

  • Teeth are straight and have a constant width

  • Pressure angle determines tooth shape and strength

  • Module or diametral pitch determines size of gear

  • Commonly used in machinery such as automobiles and industrial equipment

View 1 answer

Q147. What scenarios to update plugin.cfg,why we need to stop node agent for synchronisation.what about 504 error and 403 error issue resolving method,Ear files Deoyment and Data source

Ans.

Updating plugin.cfg, stopping node agent for sync, resolving 504 and 403 errors, deploying EAR files, and configuring data sources are important scenarios for a Middleware Administrator.

  • plugin.cfg needs to be updated when adding or removing a plugin

  • Stopping node agent is necessary for synchronizing plugin changes

  • 504 error can be resolved by increasing timeout value or optimizing code

  • 403 error can be resolved by checking permissions and access control

  • EAR files can be deployed ...read more

Add your answer

Q148. Find third lowest element from an array and count the occurrence of that number in the array.

Ans.

Find third lowest element and its occurrence in an array.

  • Sort the array and return the element at index 2 with its count.

  • Use a hash table to count occurrences while iterating through the array.

Add your answer

Q149. What all are the annotations that we use in Spring Boot & it's usage

Ans.

Some common annotations used in Spring Boot are @RestController, @Autowired, @RequestMapping, @Service, @Component, @Repository.

  • @RestController - Used to define a controller class in Spring MVC.

  • @Autowired - Used for automatic dependency injection.

  • @RequestMapping - Used to map web requests to specific handler methods.

  • @Service - Indicates that a class is a service.

  • @Component - Indicates that a class is a Spring component.

  • @Repository - Indicates that a class is a repository.

Add your answer

Q150. What do you know about maps, tell me something about maps?

Ans.

Maps are visual representations of geographical areas, providing information about the location, terrain, and features of a specific area.

  • Maps are used to navigate and understand the world around us.

  • They can show political boundaries, roads, rivers, mountains, and other physical features.

  • Maps can be used for various purposes such as planning routes, analyzing data, and studying geography.

  • Different types of maps include topographic maps, road maps, weather maps, and thematic m...read more

View 2 more answers

Q151. What is R programming? What is Public class? What are access specifiers? Write a array program and explain it for nested loop concept?

Ans.

R programming is a language and environment for statistical computing and graphics.

  • R programming is widely used for data analysis, statistical modeling, and visualization.

  • Public class in programming refers to a class that can be accessed from outside the package.

  • Access specifiers in programming define the accessibility of classes, methods, and variables.

  • An array program using nested loops can be used to iterate through a multi-dimensional array.

Add your answer

Q152. let us assume that a glass of water is fullfilled with exceeds its range so why water is not falling down from filled water n what is the resion behind that?

Ans.

Water does not fall from a filled glass because of surface tension and gravity.

  • Surface tension of water creates a force that holds it together and prevents it from overflowing.

  • Gravity pulls the water downwards, keeping it inside the glass.

  • The shape of the glass also plays a role in containing the water.

  • If the glass is filled beyond its capacity, the surface tension may break and water will overflow.

Add your answer

Q153. What is the difference in view and materialized view? Can we update a view ?

Ans.

View is a virtual table while materialized view is a physical table. Views cannot be updated directly.

  • View is a logical representation of data while materialized view is a physical copy of data.

  • Materialized views are stored on disk while views are not.

  • Views cannot be updated directly but can be updated indirectly by updating the underlying tables.

  • Materialized views can be updated but the refresh process can be time-consuming.

Add your answer

Q154. Can you tell me about your Google Facilitator Ready program?

Ans.

Google Facilitator Ready program is a training program that equips individuals with skills to facilitate Google's workshops and events.

  • The program provides training on how to facilitate Google's workshops and events

  • Participants learn how to create engaging content and deliver it effectively

  • The program also covers how to manage logistics and handle participant questions

  • Upon completion, participants receive a certificate and are eligible to facilitate Google's events

  • Examples of...read more

View 2 more answers
Q155. Aptitude Question

There was a star and at each vertex, there was a number on each vertice the number was not given so we have to find the missing number.

Add your answer

Q156. How flexibility can help, what are its advantages and disadvantages

Ans.

Flexibility can bring advantages like adaptability and creativity, but can also lead to indecisiveness and lack of focus.

  • Flexibility allows for adaptability to changing situations and creativity in problem-solving.

  • It can also lead to indecisiveness and lack of focus if not balanced with structure and clear goals.

  • Advantages include increased resilience, better teamwork, and improved communication.

  • Disadvantages include potential for burnout and difficulty in prioritizing tasks....read more

Add your answer

Q157. Where and how do you define if you need to set up payment above any threshhold should be done by a specific bank and below the threshold should be another bank?

Ans.

Payment threshold determines bank selection. How to decide?

  • Consider transaction fees and exchange rates of banks

  • Analyze the frequency and volume of payments

  • Evaluate the reliability and security of banks

  • Consult with financial experts and stakeholders

  • Create a cost-benefit analysis to determine the optimal bank for each threshold

Add your answer

Q158. what you mean by call by value and reference ,funtions.

Ans.

Call by value and reference are two ways of passing arguments to functions.

  • Call by value passes a copy of the argument's value to the function.

  • Call by reference passes a reference to the argument's memory location to the function.

  • Functions that use call by value cannot modify the original value of the argument.

  • Functions that use call by reference can modify the original value of the argument.

  • In some programming languages, call by reference is achieved using pointers.

  • Example: ...read more

View 1 answer

Q159. Why can we update internal values of objects defined with const in javascript?

Ans.

Internal values of const objects can be updated in JavaScript due to the nature of const keyword.

  • The const keyword only prevents reassignment of the variable identifier, not the object itself.

  • Internal values of objects can be modified without reassigning the object.

  • This behavior is different from other programming languages where const objects are completely immutable.

View 1 answer

Q160. Informatica Powercenter grid Difference between Joiner and lookup Difference between router and filter What is mapplet and it's limitations Session Partitioning Scenario based questions and Unix and SQL questio...

read more
Ans.

Explaining differences between Informatica Powercenter grid components and concepts

  • Joiner combines data from two sources based on a common key, while Lookup retrieves data from a reference table based on a matching key

  • Router sends data to different targets based on specified conditions, while Filter removes rows from a data set based on specified criteria

  • Mapplet is a reusable object that contains a set of transformations, but has limitations such as not being able to use dyna...read more

View 1 answer

Q161. What is ment by machine learning?

Ans.

Machine learning is a subset of artificial intelligence that enables machines to learn from data and improve their performance.

  • Machine learning involves training algorithms to make predictions or decisions based on data.

  • It uses statistical techniques to identify patterns in data and make predictions.

  • Examples include image recognition, speech recognition, and recommendation systems.

  • Machine learning can be supervised, unsupervised, or semi-supervised.

  • It is used in various indus...read more

View 3 more answers

Q162. 2. What are sealed classes and partial classes in C#?

Ans.

Sealed classes cannot be inherited while partial classes allow a class to be divided into multiple files.

  • Sealed classes prevent inheritance and are used to restrict the class hierarchy.

  • Partial classes allow a class to be divided into multiple files for easier management.

  • Sealed classes are marked with the 'sealed' keyword while partial classes are marked with the 'partial' keyword.

  • Example of sealed class: 'sealed class MyClass {}'

  • Example of partial class: 'public partial class...read more

Add your answer

Q163. 3. What is the difference between method overloading and overriding?

Ans.

Method overloading is having multiple methods with the same name but different parameters, while method overriding is having a subclass method with the same name and parameters as the superclass method.

  • Method overloading is used to provide different ways of calling the same method with different parameters.

  • Method overriding is used to provide a specific implementation of a method in a subclass that is already defined in the superclass.

  • Method overloading is resolved at compile...read more

Add your answer

Q164. 10. What is meant by Dependency injection in dot net?

Ans.

Dependency injection is a design pattern used to remove dependencies between objects and make them more modular.

  • It allows objects to be created and configured externally, rather than within a class.

  • It helps to reduce coupling between classes and makes code more testable.

  • There are three types of dependency injection: constructor injection, property injection, and method injection.

  • Example: Instead of creating a database connection object within a class, it can be injected from ...read more

Add your answer

Q165. 1.Find last 5 records. 2. find unique records.

Ans.

To find the last 5 records, use the ORDER BY clause with a descending order and limit the result to 5. To find unique records, use the DISTINCT keyword.

  • To find the last 5 records, use the ORDER BY clause with a descending order and limit the result to 5.

  • Example: SELECT * FROM table_name ORDER BY column_name DESC LIMIT 5

  • To find unique records, use the DISTINCT keyword.

  • Example: SELECT DISTINCT column_name FROM table_name

View 5 more answers

Q166. How to debug using gdb and write the commands used ?

Ans.

Debugging using gdb and writing commands

  • Compile the code with -g flag to include debugging information

  • Start gdb with the executable file as argument

  • Set breakpoints using 'break' command

  • Run the program using 'run' command

  • Use 'next' or 'step' command to execute the code line by line

  • Print variable values using 'print' command

  • Use 'backtrace' command to see the call stack

  • Exit gdb using 'quit' command

Add your answer

Q167. What are the commands to push a file to a repository (add, commit, push)?

Ans.

Commands to push a file to a repository are add, commit, push.

  • Use 'git add ' to stage the changes

  • Use 'git commit -m ' to commit the changes

  • Use 'git push' to push the changes to the remote repository

Add your answer

Q168. What is the difference between a primary key and a foreign key?

Ans.

Primary key uniquely identifies a record in a table, while foreign key refers to a field in another table.

  • Primary key is used to enforce data integrity and ensure uniqueness of records.

  • Foreign key is used to establish a relationship between two tables.

  • A table can have only one primary key, but multiple foreign keys.

  • Example: CustomerID in Orders table is a foreign key that references the Customer table's primary key.

  • Primary key is denoted by a key symbol, while foreign key is ...read more

View 2 more answers

Q169. Under 'If' statement if more than 1 statements are there and curly brackets is not there then what will be the output?

Ans.

If more than 1 statements are under 'If' statement without curly brackets, what will be the output?

  • The first statement after 'if' will be executed

  • The second statement will be executed regardless of the condition

  • It can lead to unexpected behavior and bugs

  • Always use curly brackets to avoid confusion

Add your answer

Q170. What are streams in C++? What are predefined streams in C++?

Ans.

Streams in C++ are used for input and output operations. Predefined streams in C++ include cin, cout, cerr, and clog.

  • Streams in C++ are objects that allow reading from or writing to external sources or destinations.

  • cin is the standard input stream used for reading input from the user.

  • cout is the standard output stream used for printing output to the console.

  • cerr is the standard error stream used for printing error messages to the console.

  • clog is an alternative to cerr for pri...read more

View 1 answer

Q171. 3. Write a program to sort a list in Ascending Order.

Ans.

Program to sort a list in ascending order

  • Use a sorting algorithm like bubble sort, insertion sort, or selection sort

  • Compare adjacent elements and swap if necessary

  • Repeat until the list is sorted

Add your answer

Q172. How to reduce execution time in selenium?

Ans.

To reduce execution time in Selenium, optimize test scripts, use efficient locators, and run tests in parallel.

  • Optimize test scripts by removing unnecessary steps and reducing wait times

  • Use efficient locators such as CSS selectors instead of XPath

  • Run tests in parallel using tools like Selenium Grid or TestNG

  • Use headless browsers like PhantomJS to speed up tests

  • Use page object model to reduce code duplication and improve maintainability

Add your answer

Q173. What are reference variables and how is it defined in C++?

Ans.

Reference variables in C++ are aliases for other variables, allowing direct access and manipulation of the original data.

  • Reference variables are declared using an ampersand (&) symbol.

  • They must be initialized when declared and cannot be reassigned to refer to a different variable.

  • Changes made to a reference variable affect the original variable it refers to.

  • They are commonly used to pass variables by reference to functions.

  • Reference variables can be used to create multiple na...read more

View 1 answer

Q174. What is machine learning, deep learning, artificial intelligence and cloud computing?

Ans.

Machine learning, deep learning, artificial intelligence and cloud computing are all related to advanced computing technologies.

  • Machine learning is a subset of AI that involves training algorithms to make predictions or decisions based on data.

  • Deep learning is a subset of machine learning that uses neural networks to learn and make decisions.

  • Artificial intelligence is the broader field of creating intelligent machines that can perform tasks that typically require human intell...read more

Add your answer

Q175. Differentiate between supervised and unsupervised machine learning?

Ans.

Supervised learning uses labeled data to train models while unsupervised learning uses unlabeled data.

  • Supervised learning requires a target variable to be predicted while unsupervised learning does not.

  • Supervised learning algorithms include regression, classification, and decision trees while unsupervised learning algorithms include clustering and association.

  • Examples of supervised learning include predicting housing prices and classifying emails as spam or not, while example...read more

View 3 more answers

Q176. What are star and mesh topology?

Ans.

Star and mesh are network topologies used in computer networking.

  • Star topology connects all devices to a central hub or switch.

  • Mesh topology connects every device to every other device.

  • Star topology is easy to set up and troubleshoot.

  • Mesh topology is highly reliable and fault-tolerant.

  • Examples of star topology include Ethernet and Wi-Fi networks.

  • Examples of mesh topology include sensor networks and peer-to-peer networks.

Add your answer

Q177. What are the bounding methods in React? Difference between Class Component and Functional Component in ReactJS?

Ans.

Bounding methods in React are used to limit the scope of a component's updates.

  • Bounding methods include shouldComponentUpdate, getSnapshotBeforeUpdate, and componentDidUpdate.

  • shouldComponentUpdate allows a component to decide if it should update based on changes in props or state.

  • getSnapshotBeforeUpdate allows a component to capture information before a change is made to the DOM.

  • componentDidUpdate is called after a component updates and can be used to perform additional actio...read more

Add your answer

Q178. What is the difference in Source level commit and target level commit ?

Ans.

Source level commit is done at the source code level while target level commit is done at the target code level.

  • Source level commit is done when changes are made to the source code and committed to the source code repository.

  • Target level commit is done when changes are made to the target code and committed to the target code repository.

  • Source level commit is done before the code is compiled while target level commit is done after the code is compiled.

  • Source level commit is mo...read more

Add your answer

Q179. 1. Explain OTC cycle? 2. Explain the concept of copy control 3. Explain the steps of pricing procedure 4. Explain the structure of Idoc and why Idocs are used? 5. Billing types and explain with real time exampl...

read more
Ans.

Functional Test Engineer interview questions on OTC cycle, copy control, pricing procedure, Idoc structure and usage, billing types, and shipment process.

  • OTC cycle involves order creation, delivery, and billing

  • Copy control is used to copy data from one document to another

  • Pricing procedure involves condition types, access sequences, and calculation rules

  • Idocs are structured in segments and used for data exchange between systems

  • Billing types include invoice, credit memo, and de...read more

Add your answer

Q180. How will you print the address of a variable without using a pointer?

Ans.

Printing the address of a variable without using a pointer can be done by using the & operator.

  • Use the & operator before the variable name to print its address

  • Example: int num = 10; printf("%p", &num);

  • This will print the address of the variable num

View 3 more answers

Q181. What is your aptittude for handling business development?

Ans.

I have a strong aptitude for business development with experience in identifying opportunities, building relationships, and closing deals.

  • Proven track record of identifying and pursuing new business opportunities

  • Skilled in building and maintaining relationships with clients and stakeholders

  • Ability to analyze market trends and develop effective strategies

  • Experience in negotiating and closing deals

  • Strong communication and presentation skills

  • Examples: Successfully secured a part...read more

View 1 answer

Q182. Networking Questions like What is IP ADDRESS WHAT IS MAC ADDRESS WHAT IS BSOD WHAT IS ACTIVE DIRECTORY WHAT IS NODE WHAT IS LAN WAN MAN WHAT IS SQL WHAT ARE SUBGROUPS OF SQL WHAT IS DML ,DDL TCL DCL? WHAT IS DB...

read more
Ans.

Answers to common networking and database related questions for a Trainee Programmer interview.

  • IP ADDRESS - unique identifier for devices on a network

  • MAC ADDRESS - unique identifier for network interface controllers

  • BSOD - Blue Screen of Death, an error screen displayed on Windows systems

  • ACTIVE DIRECTORY - centralized database for managing network resources

  • NODE - a device or computer on a network

  • LAN WAN MAN - types of networks (Local Area Network, Wide Area Network, Metropolit...read more

Add your answer

Q183. What type of language do you prefer for complex algorithm ?

Ans.

I prefer using a language that is efficient and has strong support for data structures and algorithms.

  • Languages like C++, Java, and Python are good choices for complex algorithms

  • C++ has strong support for data structures and is efficient in terms of memory and speed

  • Java has a vast library of data structures and algorithms and is easy to read and maintain

  • Python has a simple syntax and is great for prototyping and testing algorithms

  • Ultimately, the choice of language depends on ...read more

View 2 more answers

Q184. What unit testing. What is the framework used for unit testing.

Ans.

Unit testing is a software testing technique where individual units or components of a software application are tested in isolation.

  • Unit testing helps to identify defects early in the development cycle

  • It ensures that each unit of code is working as expected

  • Unit tests are automated and can be run frequently to catch regressions

  • Popular unit testing frameworks include JUnit for Java, NUnit for .NET, and pytest for Python

Add your answer

Q185. What is a Persistent Volume (PV) and a Persistent Volume Claim (PVC) in Kubernetes, and how do they relate to stateful applications?

Ans.

PV and PVC in Kubernetes are used to provide persistent storage for stateful applications.

  • Persistent Volume (PV) in Kubernetes is a piece of storage in the cluster that has been provisioned by an administrator.

  • Persistent Volume Claim (PVC) is a request for storage by a user or pod in the cluster.

  • PVs and PVCs decouple storage from the pod, allowing for easier management and scaling of stateful applications.

  • PVs can be dynamically provisioned or statically provisioned, depending...read more

Add your answer

Q186. What is LVM, Explain LVM Architecture, What is Raid, What is the booting process of RHEL, How to manage failed unmount or mount, What are the issues you have faced in working with Linux Servers, What is special...

read more
Ans.

LVM is Logical Volume Manager used for managing disk space, RAID is Redundant Array of Independent Disks for data protection, RHEL boot process involves BIOS, GRUB, kernel loading, and init process.

  • LVM allows for dynamic resizing of logical volumes without downtime.

  • RAID combines multiple disks for data redundancy or performance improvement.

  • RHEL boot process involves BIOS POST, GRUB bootloader, kernel loading, and init process.

  • Managing failed unmount or mount involves checking...read more

Add your answer

Q187. Spur gear transmit power at angle 90 degree, because it's perpendicular to the position of another gear.

Ans.

Spur gears transmit power at 90 degree angle to each other.

  • Spur gears are designed to transmit power between parallel shafts.

  • The teeth on the gears mesh together to transfer torque and rotation.

  • The angle between the shafts determines the gear ratio and speed of rotation.

  • Spur gears are commonly used in machinery and vehicles.

Add your answer

Q188. 1. What is factless fact. 2. Star schema vs snowflake schema. And which is normalized. 3. About oracle joins.

Ans.

Answers to questions related to Informatica Developer role.

  • Factless fact is a fact table that does not have any measures.

  • Star schema has a single fact table and multiple dimension tables, while snowflake schema has multiple dimension tables that are further normalized.

  • Oracle joins include inner join, left join, right join, and full outer join.

Add your answer

Q189. what is gps,what do u know about google maps,how are they imp in our lyf, except for maps and routing how is google maps useful.

Ans.

GPS stands for Global Positioning System, Google Maps is a popular mapping service that provides navigation, traffic updates, and location information.

  • GPS is a satellite-based navigation system that allows users to determine their exact location on Earth.

  • Google Maps uses GPS data to provide accurate mapping and routing services.

  • Google Maps is important in our daily lives for navigation, finding nearby businesses, checking traffic conditions, and exploring new places.

  • Apart fro...read more

View 2 more answers

Q190. Can you mention some data structures? Explain Stack and Queue?

Ans.

Data structures are ways to organize and store data. Stack and Queue are two commonly used data structures.

  • Stack is a Last-In-First-Out (LIFO) data structure where the last element added is the first one to be removed.

  • Queue is a First-In-First-Out (FIFO) data structure where the first element added is the first one to be removed.

  • Stack is used in undo-redo functionality, while Queue is used in scheduling tasks.

  • Examples of Stack include browser history, call stack in programmin...read more

Add your answer

Q191. What is the advantage of using netbeans for writing java ?

Ans.

NetBeans provides a user-friendly interface, powerful code editing features, and seamless integration with Java development tools.

  • NetBeans offers a user-friendly interface with drag-and-drop functionality for easy development.

  • It provides powerful code editing features like code completion, refactoring, and debugging.

  • NetBeans has seamless integration with Java development tools, making it easier to build, test, and deploy Java applications.

  • It supports various frameworks and te...read more

View 1 answer

Q192. As i am from ECE, difference between half duplex and full duplex

Ans.

Half duplex allows communication in both directions, but not simultaneously. Full duplex allows simultaneous communication in both directions.

  • Half duplex allows communication in both directions, but only one direction at a time.

  • Full duplex allows simultaneous communication in both directions.

  • Examples of half duplex communication include walkie-talkies and CB radios.

  • Examples of full duplex communication include telephone conversations and video conferencing.

Add your answer

Q193. Tell me what you know about AWS cloud.

Ans.

AWS cloud is a platform that provides a wide range of cloud computing services.

  • AWS stands for Amazon Web Services

  • It offers services like computing, storage, databases, analytics, and more

  • AWS provides a pay-as-you-go pricing model

  • Examples of AWS services include EC2, S3, RDS, and Lambda

Add your answer

Q194. what are hooks and what are the hooks you have used

Ans.

Hooks are functions that allow you to use state and other React features without writing a class.

  • useState() - for managing state in functional components

  • useEffect() - for performing side effects in functional components

  • useContext() - for consuming context in functional components

  • useReducer() - for managing complex state in functional components

  • useCallback() - for memoizing functions in functional components

Add your answer

Q195. What is difference between RDBMS and DBMS? What is differenence between stack and queue?

Ans.

RDBMS is a relational database management system that stores data in tables with predefined relationships. DBMS is a general-purpose database management system that stores data in various formats.

  • RDBMS enforces ACID properties while DBMS does not

  • RDBMS supports SQL while DBMS may or may not support SQL

  • RDBMS is used for large-scale applications while DBMS is used for small-scale applications

  • Stack is a LIFO data structure while Queue is a FIFO data structure

  • Stack uses push and p...read more

Add your answer

Q196. 1.Difference between unique key and primary key.

Ans.

Unique key allows null values while primary key does not.

  • Primary key is a unique identifier for a record in a table.

  • Unique key allows null values but primary key does not.

  • A table can have only one primary key but multiple unique keys.

  • Example: Employee ID can be a primary key while email can be a unique key.

View 1 answer

Q197. What approach did you take to learn data science?

Ans.

I took a structured approach to learn data science.

  • Started with learning the basics of statistics and programming

  • Took online courses and read books on data science

  • Practiced on real-world datasets and participated in Kaggle competitions

  • Joined a data science community to learn from others and share knowledge

  • Continuously updated my skills and knowledge through online resources and attending conferences

View 1 answer

Q198. What feature in Snowflake's architecture and pricing model set is apart from other competitors

Ans.

Snowflake's architecture and pricing model sets it apart from competitors.

  • Snowflake's architecture is based on a unique multi-cluster, shared data architecture that separates compute and storage, allowing for unlimited scalability and concurrency.

  • Snowflake's pricing model is based on a pay-as-you-go approach, where users only pay for the resources they actually use, without any upfront costs or long-term commitments.

  • Snowflake's architecture also includes automatic scaling, wh...read more

View 1 answer

Q199. What is Customer service,operating system , difference between ram & rom?

Ans.

Customer service, operating system, RAM and ROM differences explained.

  • Customer service is the provision of assistance and support to customers before, during, and after a purchase.

  • An operating system is a software that manages computer hardware and software resources.

  • RAM (Random Access Memory) is a type of computer memory that is volatile and used for temporary storage.

  • ROM (Read-Only Memory) is a type of computer memory that is non-volatile and used for permanent storage.

  • The ...read more

Add your answer

Q200. Tell about encoder, decoder and Multiplexer

Ans.

Encoders, decoders, and multiplexers are digital logic circuits used in data processing and communication systems.

  • An encoder is a circuit that converts a set of input signals into a coded output signal.

  • A decoder is a circuit that converts a coded input signal into a set of output signals.

  • A multiplexer is a circuit that selects one of many input signals and forwards it to a single output line.

  • Encoders and decoders are often used together to convert data between different forma...read more

Add your answer
1
2
3
4
5
6
7

More about working at Cognizant

Top Rated Mega Company - 2024
Top Rated IT/ITES Company - 2024
HQ - Teaneck. New Jersey., United States (USA)
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos

Interview Process at Survival Technologies

based on 1.9k interviews in the last 1 year
Interview experience
4.1
Good
View more
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Interview Questions from Similar Companies

3.9
 • 675 Interview Questions
3.4
 • 289 Interview Questions
4.3
 • 273 Interview Questions
4.1
 • 221 Interview Questions
4.0
 • 160 Interview Questions
3.7
 • 135 Interview Questions
View all
Top Cognizant Interview Questions And Answers
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
70 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions
Get AmbitionBox app

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter