Add office photos
Employer?
Claim Account for FREE

Comviva Technology

3.2
based on 677 Reviews
Filter interviews by

40+ Interview Questions and Answers

Updated 27 Sep 2024
Q1. Trapping Rainwater

You have been given a long type array/list 'ARR' of size 'N'. It represents an elevation map wherein 'ARR[i]' denotes the elevation of the 'ith' bar. Print the total amount of rainwater that c...read more

View 4 more answers
Q2. Ways To Make Coin Change

You are given an infinite supply of coins of each of denominations D = {D0, D1, D2, D3, ...... Dn-1}. You need to figure out the total number of ways W, in which you can make a change f...read more

View 5 more answers
Q3. Merge sort

Given a sequence of numbers ‘ARR’. Your task is to return a sorted sequence of ‘ARR’ in non-descending order with help of the merge sort algorithm.

Example :

Merge Sort Algorithm - Merge sort is a Di...read more
View 3 more answers
Q4. Occurrence of X in a Sorted Array

You have been given a sorted array/list of integers of size N and an integer X. Find the total number of occurrences of X in the array/list.

Input Format
The first line of the ...read more
View 4 more answers
Discover null interview dos and don'ts from real experiences
Q5. Count nodes within K-distance

You are given a connected, undirected and acyclic graph with some of the nodes as marked and a positive number 'K'. You need to return the count of all such nodes which have a dista...read more

View 2 more answers

Q6. What is inheritance? Show me by a code that shouldn't be a pseudo code but can be in any language

Ans.

Inheritance is a mechanism in OOP where a new class is derived from an existing class.

  • Allows for code reusability and saves time

  • Derived class inherits properties and methods of base class

  • Can override base class methods in derived class

  • Can have multiple levels of inheritance

  • Example: class Dog extends Animal {}

Add your answer
Are these interview questions helpful?
Q7. Implement Stack with Linked List

You need to implement the Stack data structure using a Singly Linked List.

Create a class named 'Stack' which supports the following operations(all in O(1) time):


getSize: Retur...read more
View 2 more answers

Q8. What is normalization? What do you mean by 1NF, 2NF, 3NF, 4NF?

Ans.

Normalization is the process of organizing data in a database to reduce redundancy and dependency.

  • 1NF (First Normal Form) - Each column in a table must have atomic values.

  • 2NF (Second Normal Form) - A table must be in 1NF and all non-key attributes must be dependent on the primary key.

  • 3NF (Third Normal Form) - A table must be in 2NF and all non-key attributes must be independent of each other.

  • 4NF (Fourth Normal Form) - A table must be in 3NF and have no multi-valued dependenci...read more

Add your answer
Share interview questions and help millions of jobseekers 🌟

Q9. find first character repeating in the string, ex : 'abcddbc' ans = 'b'

Ans.

Find the first character that repeats in a given string.

  • Iterate through the string and keep track of characters seen so far.

  • If a character is already seen, return it as the first repeating character.

  • If no repeating character is found, return null.

Add your answer

Q10. What are framework are used in frontend and what are the layers in css and define checxbox and define tools we are using in web development and what are the tags in html and css

Ans.

Answering questions related to frontend frameworks, CSS layers, HTML/CSS tags, and web development tools.

  • Frontend frameworks include React, Angular, Vue, etc.

  • CSS layers include presentation, layout, and behavior.

  • Checkbox is a form element that allows users to select one or more options.

  • Web development tools include VS Code, Sublime Text, Atom, etc.

  • HTML tags include

    ,

    , , etc.

  • CSS tags include color, font-size, margin, etc.

Add your answer

Q11. 1)What is stack? 2)Overflowing condition for stack 3)What is binary tree? 4)Data structure used in DFS traversal.

Ans.

A stack is a data structure that follows the Last In First Out (LIFO) principle.

  • Stack is a linear data structure with two main operations: push (adds an element) and pop (removes the top element).

  • Overflowing condition for stack occurs when trying to push an element into a full stack.

  • A binary tree is a hierarchical data structure where each node has at most two children.

  • Depth First Search (DFS) traversal uses a stack data structure to keep track of nodes to visit.

Add your answer
Q12. How many trees are there in you college?
Add your answer

Q13. ISO-OSI model. purpose of various layers, protocols in various layers, TCP vs UDP

Add your answer

Q14. What's is functional components and class components

Ans.

Functional components are stateless components in React that are defined as functions, while class components are stateful components defined as ES6 classes.

  • Functional components are simpler and easier to read/write compared to class components

  • Functional components do not have access to lifecycle methods or state, while class components do

  • Class components can have local state and use lifecycle methods like componentDidMount, componentDidUpdate, etc.

  • Functional components can b...read more

Add your answer

Q15. For problem solving abilities Find the frequency of each element present in the string

Ans.

Count the frequency of each element in a string

  • Create a dictionary to store the count of each element

  • Iterate through the string and update the count in the dictionary

  • Return the dictionary with frequencies of each element

Add your answer

Q16. How an application running in cloud with tightly coupled infrastructure can be deployed to on-premise

Ans.

An application running in cloud with tightly coupled infrastructure can be deployed to on-premise by decoupling the components and using containerization.

  • Decouple the application components to make them more portable

  • Use containerization technologies like Docker to package the application and its dependencies

  • Deploy the containerized application to on-premise servers using tools like Kubernetes for orchestration

Add your answer

Q17. What is your favorite programming language

Ans.

My favorite programming language is Python because of its simplicity, readability, and versatility.

  • Simplicity of syntax makes it easy to learn and use

  • Readability allows for efficient collaboration with other developers

  • Versatility in application across various domains such as web development, data analysis, and automation

Add your answer

Q18. What to do for cost management on a cloud

Ans.

For cost management on a cloud, monitor usage, optimize resources, use cost allocation tags, leverage reserved instances, and consider spot instances.

  • Monitor usage regularly to identify any inefficiencies or unused resources

  • Optimize resources by right-sizing instances and using auto-scaling

  • Use cost allocation tags to track spending by project or department

  • Leverage reserved instances for predictable workloads to save costs

  • Consider using spot instances for non-critical workload...read more

Add your answer

Q19. Add a new column to the database table in production which is already having 100 million of data

Ans.

Use a tool like Rails migration to add a new column to the database table in production with 100 million data.

  • Create a new Rails migration file to add the new column to the database table.

  • Test the migration locally to ensure it works as expected.

  • Deploy the migration to the production environment during a maintenance window to avoid downtime.

  • Consider using tools like ActiveRecord's `change_column` method to efficiently add the new column to a large dataset.

Add your answer

Q20. Pros and cons of micro service based application

Ans.

Microservices offer scalability and flexibility but can increase complexity and require careful management.

  • Pros: Scalability, flexibility, independent deployment, technology diversity

  • Cons: Increased complexity, communication overhead, data consistency challenges

  • Example: Netflix uses microservices to handle millions of requests daily

  • Example: Amazon migrated to microservices to improve agility and scalability

Add your answer

Q21. What is heap and stack memory

Ans.

Heap and stack memory are two types of memory storage in computer systems. Heap memory is used for dynamic memory allocation, while stack memory is used for static memory allocation.

  • Heap memory is used for storing objects that are created at runtime and can be accessed randomly.

  • Stack memory is used for storing local variables and function call information.

  • Example: When a new object is created using 'new' keyword in Java, it is stored in heap memory. Local variables in a funct...read more

Add your answer

Q22. How application security is maintained

Ans.

Application security is maintained through regular security assessments, code reviews, penetration testing, and implementing security best practices.

  • Regular security assessments to identify vulnerabilities

  • Code reviews to ensure secure coding practices are followed

  • Penetration testing to simulate attacks and identify weaknesses

  • Implementing security best practices such as input validation, encryption, and access control

  • Using tools like firewalls, antivirus software, and intrusio...read more

Add your answer

Q23. What's is template and literal

Ans.

A template is a pre-designed format used as a starting point for a document or file. A literal is a value that is written exactly as it is.

  • Template: Used as a starting point for documents or files

  • Literal: Value written exactly as it is

  • Example: Template for a resume, literal value 'Hello World'

Add your answer

Q24. All operations of Linked list , strings

Add your answer

Q25. What do you think as a BD you will do?

Ans.

As a BD, I will identify new business opportunities, build relationships with potential clients, and negotiate deals.

  • Research and identify potential clients and markets

  • Develop and maintain relationships with clients and partners

  • Negotiate and close deals

  • Collaborate with internal teams to develop proposals and solutions

  • Stay up-to-date with industry trends and market changes

Add your answer

Q26. How monitoring tool elk works

Ans.

ELK is a monitoring tool that stands for Elasticsearch, Logstash, and Kibana.

  • ELK is a combination of three open-source tools: Elasticsearch, Logstash, and Kibana.

  • Elasticsearch is a search and analytics engine that stores and indexes data.

  • Logstash is a data processing pipeline that ingests, processes, and sends data to Elasticsearch.

  • Kibana is a visualization tool that allows users to interact with data stored in Elasticsearch.

  • ELK is commonly used for log management, monitoring...read more

Add your answer

Q27. what is mean by smoke testing

Ans.

Smoke testing is a preliminary testing to check if the software build is stable enough for further testing.

  • Smoke testing is a type of non-exhaustive testing

  • It is performed to ensure that the critical functionalities of the software are working fine

  • It is usually done after a new build is received

  • It helps in identifying the major issues early in the testing cycle

  • Example: Checking if the login page is working fine after a new build is received

Add your answer

Q28. Swap 2 variables without using a third one

Ans.

To swap 2 variables without using a third one, use arithmetic operations.

  • Add the values of both variables and store the result in one of the variables.

  • Subtract the value of the second variable from the sum and store the result in the second variable.

  • Subtract the value of the first variable from the sum and store the result in the first variable.

Add your answer

Q29. How do you debug a stripped process

Ans.

Debugging a stripped process involves using tools like GDB, analyzing memory dumps, and reverse engineering.

  • Use a debugger like GDB to analyze the stripped process

  • Analyze memory dumps to identify issues and trace the program flow

  • Utilize reverse engineering techniques to understand the code behavior

  • Look for patterns in the stripped process to identify potential bugs

View 1 answer

Q30. Pillers of oops , explain data science, concepts of ACID

Ans.

Pillars of OOPs are Inheritance, Encapsulation, Polymorphism, and Abstraction. Data science involves analyzing and interpreting complex data. ACID stands for Atomicity, Consistency, Isolation, Durability.

  • Pillars of OOPs: Inheritance, Encapsulation, Polymorphism, Abstraction

  • Data science: Analyzing and interpreting complex data to gain insights

  • ACID: Atomicity, Consistency, Isolation, Durability

Add your answer

Q31. difference between regression and retesting

Ans.

Regression testing is testing the entire system after changes while retesting is testing only the failed test cases.

  • Regression testing is done to ensure that changes made to the system do not affect the existing functionality.

  • Retesting is done to ensure that the defects found in the previous test cycle have been fixed.

  • Regression testing is done after every build while retesting is done after every defect fix.

  • Regression testing is time-consuming while retesting is less time-co...read more

Add your answer

Q32. semaphore from operating system

Add your answer

Q33. 5. Difference Between C and C++

Add your answer

Q34. Difference Between C and C++

Add your answer

Q35. Explain a project end to end

Ans.

Developed a predictive model to identify potential customers for a bank

  • Gathered and cleaned data on customer demographics, financial history, and behavior

  • Performed exploratory data analysis to identify patterns and correlations

  • Developed and trained a machine learning model using logistic regression

  • Evaluated model performance using metrics such as accuracy, precision, and recall

  • Deployed the model in a web application for use by bank employees

Add your answer

Q36. Different functionality of Burpsuite.

Ans.

Burpsuite is a web application security testing tool used for scanning, analyzing, and exploiting web applications.

  • Burpsuite can intercept and modify HTTP/S requests and responses

  • It can be used for scanning web applications for vulnerabilities

  • Burpsuite includes tools for spidering, scanning, and intruder attacks

  • It has a repeater tool for manually manipulating and re-sending requests

  • Burpsuite can be used for session handling and authentication testing

Add your answer

Q37. Validation of microservices

Ans.

Validation of microservices involves ensuring that each microservice functions correctly and integrates seamlessly with other services.

  • Validate each microservice individually to ensure it meets its functional requirements

  • Test the integration between microservices to ensure seamless communication

  • Perform end-to-end testing to validate the entire system

  • Use tools like unit testing frameworks, contract testing, and service virtualization

  • Implement monitoring and logging to identify...read more

Add your answer

Q38. Explain dashboards created by u

Ans.

I have created interactive dashboards using Tableau to visualize and analyze data for various projects.

  • Utilized Tableau to connect to data sources and create interactive visualizations

  • Designed dashboards with filters, drill-down capabilities, and dynamic elements

  • Included key performance indicators (KPIs) and trend analysis in the dashboards

  • Used color coding and data labels to enhance data interpretation

  • Shared dashboards with stakeholders for decision-making purposes

Add your answer

Q39. Exception about compensation

Ans.

Compensation exceptions can be made for exceptional performance or unique circumstances.

  • Compensation exceptions should be rare and well-justified.

  • Exceptions can be made for exceptional performance, such as exceeding sales targets.

  • Exceptions can also be made for unique circumstances, such as a sudden increase in workload or a change in job responsibilities.

  • Any exceptions should be approved by upper management and documented for transparency.

  • Regular compensation reviews should ...read more

Add your answer

Q40. explain opps concept

Ans.

OOPs concept stands for Object-Oriented Programming, a programming paradigm based on the concept of objects.

  • OOPs focuses on creating objects that contain data in the form of attributes and code in the form of methods.

  • Encapsulation, Inheritance, Polymorphism, and Abstraction are the four main principles of OOPs.

  • Example: In a banking system, a 'Customer' object can have attributes like name and account number, and methods like deposit and withdraw.

Add your answer

Q41. Use the XOR operator

Ans.

XOR operator is a logical operator that returns true if and only if both operands are different.

  • XOR is represented by the symbol ^

  • It can be used to toggle a bit (e.g. x ^= 1)

  • It can be used to check if two values are different (e.g. x ^ y)

  • It can be used to encrypt and decrypt data

  • It can be used to find the odd occurring element in an array

Add your answer
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos

Interview Process at null

based on 30 interviews in the last 1 year
Interview experience
3.9
Good
View more
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Interview Questions from Similar Companies

3.7
 • 2.6k Interview Questions
4.0
 • 683 Interview Questions
4.0
 • 371 Interview Questions
3.4
 • 289 Interview Questions
4.0
 • 242 Interview Questions
3.9
 • 151 Interview Questions
View all
Top Comviva Technology Interview Questions And Answers
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
70 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions
Get AmbitionBox app

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter