Deloitte
100+ CENTRUM LEGAL Interview Questions and Answers
Write a program to generate the reverse of a given number N. Print the corresponding reverse number.
Note : If a number has trailing zeros, then its reverse will not include them. For e.g., r...read more
Given a N * N matrix and the task is to check matrix is idempotent matrix or not.
See the sample input.
Idempotent matrix M follows the following property :
M*M = M
Input format :
Line 1 : Siz...read more
OOPS concepts.
What is SQL and NO SQL database?
What is difference between Stored procedures and functions?
Q4. Sql is installed on the server for enable which port needs to be open?
Port 1433 needs to be open for SQL Server.
SQL Server uses port 1433 for communication.
Ensure that port 1433 is open in the server's firewall.
Check the SQL Server configuration to confirm the port number.
Q5. You have to design a database for library. Which language will u prefer?
I would prefer using SQL for designing a database for a library.
SQL is a widely used language for managing relational databases.
It provides a structured and efficient way to store, retrieve, and manipulate data.
SQL allows for easy querying and joining of tables, which is essential for library operations.
It supports transactions and ensures data integrity.
SQL also offers various security features to protect sensitive library information.
Q6. Find out positions of numbers form an array whose sum is 9.
The positions of numbers in an array whose sum is 9 need to be found.
Iterate through the array and check for pairs of numbers that add up to 9.
Store the positions of the numbers that satisfy the condition.
Return the positions as the result.
Q7. Is it possible to convert bytecode in Java back to original code and how to do it?
Yes, it is possible to decompile bytecode in Java back to the original code.
Decompilation is the process of converting bytecode back to its original source code.
There are several tools available for decompiling Java bytecode, such as JD-GUI, FernFlower, and Procyon.
Decompiling bytecode can be useful for understanding how a program works, reverse engineering, or debugging.
However, the decompiled code may not be an exact replica of the original source code, as some information ...read more
Q8. If C drive is running out of space , what kind of troubleshooting you will do.
To troubleshoot a C drive running out of space, check for large files, uninstall unnecessary programs, clear temporary files, and consider expanding storage capacity.
Check for large files that can be deleted or moved to another drive
Uninstall unnecessary programs to free up space
Clear temporary files using disk cleanup tools
Consider expanding storage capacity by adding a new hard drive or using external storage
Q9. Who regulates Markets in US? Responsibilities of their Market regulator?
The Securities and Exchange Commission (SEC) regulates markets in the US. Their responsibilities include enforcing federal securities laws, protecting investors, and maintaining fair and orderly markets.
The SEC is responsible for overseeing securities exchanges such as the New York Stock Exchange (NYSE) and NASDAQ.
They enforce laws such as the Securities Act of 1933 and the Securities Exchange Act of 1934.
The SEC also regulates investment advisers, mutual funds, and other inv...read more
Q10. Explain the concept of inheritance in Java .What is its use?
Inheritance in Java allows a class to inherit properties and methods from another class, promoting code reuse.
Inheritance is achieved using the 'extends' keyword in Java.
The class that is being inherited from is called the superclass or parent class.
The class that inherits from the superclass is called the subclass or child class.
The subclass can access the public and protected members of the superclass.
Inheritance promotes code reuse and allows for the creation of more speci...read more
Q11. What is difference between article and section tag?
Article and section tags are used for structuring HTML documents, but have different semantic meanings.
The
tag represents a self-contained piece of content that can be distributed independently from the rest of the page. The
tag represents a group of related content, typically with a heading. The
tag is often used for blog posts, news articles, and product descriptions. The
tag is often used for chapters, sections, and sub-sections of a document. Both tags can be nested withi...read more
Q12. How to find Largest element in the array wid most efficiency?
Use a loop to iterate through the array and keep track of the largest element.
Initialize a variable to store the largest element as the first element of the array
Loop through the array and compare each element to the current largest element
If the current element is larger, update the largest element variable
Return the largest element variable
Q13. If you have created the server , some website is not working . what will you do.
I would check the server logs and troubleshoot the issue.
Check if the website is properly configured on the server
Check if there are any errors in the server logs
Check if there are any issues with the website's code or database
Restart the server or relevant services if necessary
Q14. Two VM's are running on differenct host how they are communicating.
VMs communicate through network protocols and virtual switches.
VMs use network protocols like TCP/IP to communicate.
Virtual switches connect VMs to the physical network.
Hosts can also use virtual network adapters to communicate with VMs.
Firewalls and security policies can restrict VM communication.
Examples of virtual switches include VMware vSwitch and Hyper-V Virtual Switch.
Q15. You know Normalizastion? Tell me what is 3rd normal form
3rd normal form is a database normalization technique where every non-key attribute is dependent on the primary key.
In 3NF, there should be no transitive dependencies between non-key attributes.
It reduces data redundancy and improves data integrity.
Example: A table with columns for customer ID, order ID, and product ID. The product name should not be stored in this table as it is dependent on the product ID, not the customer or order ID.
Another example: A table with columns f...read more
Q16. - If you had to choose between two processes which give the same outcome, but one of them is longer but more accurate and the other is short but less accurate, which one would you choose?
I would choose the longer but more accurate process.
Accuracy is crucial in decision-making and can have long-term consequences.
Investing more time in a process can lead to better outcomes and prevent costly mistakes.
Examples: Medical diagnosis, financial analysis, scientific research.
Q17. How do components interact with each other in Angular?
Components interact with each other through inputs, outputs, and services.
Components can pass data to child components through inputs.
Components can emit events to parent components through outputs.
Components can share data and functionality through services.
Components can also communicate through the @ViewChild and @ContentChild decorators.
Example: A parent component passes data to a child component through an input property.
Example: A child component emits an event to a par...read more
Q18. 2) what is SDLC (Software Development Life Cycle) how it helps?
SDLC is a process followed by software development teams to design, develop and test high-quality software.
SDLC is a structured approach to software development.
It involves several phases such as planning, analysis, design, implementation, testing, and maintenance.
It helps in delivering high-quality software that meets customer requirements.
It ensures that the software is developed within budget and on time.
It helps in identifying and resolving issues early in the development...read more
Q19. What is Close-Ended Mutual Fund?
A mutual fund with a fixed number of shares, traded on an exchange like a stock.
Investors buy and sell shares of the fund on the exchange
The price of the shares is determined by supply and demand
The fund is managed by a professional portfolio manager
Examples include index funds and ETFs
Q20. How can you troubleshoot Disk corrupt issue.
To troubleshoot disk corrupt issue, check disk errors, run chkdsk, repair disk, and recover data.
Check for disk errors using Event Viewer or Disk Utility
Run chkdsk command to scan and fix disk errors
Repair disk using disk repair tool or reinstalling OS
Recover data using data recovery software or professional services
Q21. What’s the relation between pointers and Security?
Pointers are used in programming to manage memory and can be a potential security vulnerability if not handled properly.
Pointers allow direct access to memory locations, making it possible to manipulate data or execute arbitrary code.
Improper use of pointers can lead to buffer overflows, memory leaks, and other security vulnerabilities.
Pointers can be exploited by attackers to gain unauthorized access, execute malicious code, or crash a system.
Examples of pointer-related secu...read more
Q22. What is different ways of identification in tosca? What os exploratory testing? What is module based testing? What are standard modules available in tosca? Syntax for date time format?
Tosca offers multiple ways of identification including visual recognition, object recognition, and text recognition.
Visual recognition identifies objects based on their appearance
Object recognition identifies objects based on their properties and attributes
Text recognition identifies objects based on their text content
Module based testing involves testing individual modules of an application separately
Standard modules in Tosca include Test Case Design, Test Data Management, a...read more
Q23. What is call by value and call by reference?
Call by value and call by reference are two ways of passing arguments to a function.
Call by value passes a copy of the argument's value to the function.
Call by reference passes a reference to the argument's memory location to the function.
Call by value is used for simple data types like int, float, etc.
Call by reference is used for complex data types like arrays, structures, etc.
Q24. What are the 7 layers in OSI model of Networking?
The OSI model has 7 layers that define how data is transmitted over a network.
The layers are: Physical, Data Link, Network, Transport, Session, Presentation, and Application.
Each layer has a specific function and communicates with the layers above and below it.
For example, the Physical layer deals with the physical transmission of data, while the Application layer deals with user interfaces and applications.
The OSI model is a conceptual model and is not always followed exactl...read more
Q25. What is a stock and a bond?
A stock is a share of ownership in a company, while a bond is a debt security issued by a company or government.
Stocks represent ownership in a company and give shareholders voting rights and potential dividends.
Bonds represent a loan to a company or government and pay interest to the bondholder.
Stocks are generally considered riskier but offer higher potential returns, while bonds are considered safer but offer lower returns.
Investors often use a combination of stocks and bo...read more
Q26. How would you use Data Analytics to device a solution so that school kids reach to school and back home safely and on time without the parents being worried
Utilize data analytics to ensure safe and timely transportation for school kids without parents' worry
Collect data on traffic patterns and congestion to optimize bus routes
Implement GPS tracking on buses to monitor their location in real-time
Utilize predictive analytics to anticipate potential delays and adjust schedules accordingly
Create a communication platform for parents to receive updates on their child's transportation status
Analyze historical data to identify common is...read more
Q27. What are mutable and immutable data types?
Mutable data types can be changed after creation, while immutable data types cannot be changed.
Mutable data types include lists, dictionaries, and sets.
Immutable data types include strings, tuples, and frozensets.
Changing a mutable data type will modify the original object, while changing an immutable data type will create a new object.
Example: changing a list by appending an element will modify the original list, while concatenating two strings will create a new string.
Q28. Can we create composite unique keys on multiple columns in a single table
Yes, composite unique keys can be created on multiple columns in a single table.
Composite unique keys are useful for ensuring data integrity and preventing duplicates.
Syntax: CREATE TABLE table_name (column1 datatype, column2 datatype, ..., CONSTRAINT constraint_name UNIQUE (column1, column2, ...));
Example: CREATE TABLE employees (id INT, name VARCHAR(50), email VARCHAR(50), CONSTRAINT emp_unique UNIQUE (id, email));
Q29. Write a function to normalise a decimal number without using math functions.
Function to normalise a decimal number without using math functions.
Extract the integer and decimal parts of the number
Count the number of digits in the decimal part
Multiply the decimal part by 10^number of decimal digits to convert it to an integer
Add the integer and converted decimal parts and return the result
Q30. What is the use of JVM in Java?
JVM is the virtual machine that executes Java bytecode. It provides platform independence and memory management.
JVM stands for Java Virtual Machine
It interprets compiled Java code into machine language
JVM provides platform independence by executing bytecode on any platform
It manages memory allocation and garbage collection
Examples of JVM-based languages include Kotlin and Scala
Q31. What are the basic differences between the different types of SQL joins?
SQL joins are used to combine rows from two or more tables based on a related column between them.
INNER JOIN: Returns records that have matching values in both tables.
LEFT JOIN: Returns all records from the left table and the matched records from the right table.
RIGHT JOIN: Returns all records from the right table and the matched records from the left table.
FULL JOIN: Returns all records when there is a match in either left or right table.
CROSS JOIN: Returns the Cartesian pro...read more
Q32. Explain Inheritance and how you have implemented inheritance in your work?
Inheritance is a concept in object-oriented programming where a class inherits properties and behaviors from another class.
Inheritance allows for code reuse and promotes modularity.
The class that is being inherited from is called the superclass or base class.
The class that inherits from the superclass is called the subclass or derived class.
The subclass inherits all the public and protected members of the superclass.
Inheritance is implemented using the 'extends' keyword in la...read more
Q33. Example, when your are script writer. How do you establish connection to DB?
Establishing connection to a DB as a script writer.
Choose a suitable programming language for the task
Install the necessary database driver
Provide the correct credentials for the database
Test the connection before proceeding with the script
Q34. State all the differences which are possible and also the application of both the relationships.
There are different types of relationships possible with varying degrees of commitment and intimacy. Each has its own application.
Types of relationships: casual, romantic, platonic, familial, professional
Casual relationships are low-commitment and often short-term
Romantic relationships involve emotional and physical intimacy
Platonic relationships are non-romantic and non-sexual
Familial relationships are based on blood or legal ties
Professional relationships are based on work ...read more
Q35. how will you handle a situation when client is unhappy with ur product
I would address the client's concerns promptly and work towards finding a solution to meet their needs.
Listen to the client's feedback and understand their specific concerns
Apologize for any inconvenience caused and assure them that their feedback is valued
Offer potential solutions or alternatives to address their dissatisfaction
Follow up with the client to ensure that the issue has been resolved to their satisfaction
Q36. How do you print multiple logo from a single template
To print multiple logos from a single template, use a batch processing tool or create a script to automate the process.
Use a batch processing tool like Adobe Photoshop's Batch Processing feature to apply the template to multiple logos at once.
Create a script using a programming language like Python to automate the process of applying the template to multiple logos.
Ensure that the logos are in a compatible file format for the template.
Adjust the template as necessary to fit ea...read more
Q37. On resume- difference between html5 and its previous version?
HTML5 is the latest version of HTML with new features and improvements.
HTML5 has new semantic tags like
, HTML5 supports audio and video elements without the need for plugins.
HTML5 has improved form elements like date pickers, range sliders, etc.
HTML5 has improved canvas and SVG support for graphics.
HTML5 has improved accessibility features.
HTML5 has improved support for mobile devices.
Previous versions of HTML did not have these features.
Q38. Would you work differently with competitors data as opposed to own data?
Yes, competitor data requires additional scrutiny and validation before use.
Competitor data may not be as reliable as own data
Competitor data may have different methodologies or definitions
Competitor data may require additional validation and verification
Competitor data may require additional legal considerations
Own data may be more readily available and easier to use
Q39. What is the difference between the Master-Detail and Lookup relationship?
Master-Detail is a parent-child relationship where the child record cannot exist without the parent. Lookup is a simple reference relationship.
Master-Detail relationship is a stricter form of relationship where the child record inherits the security and sharing settings of the parent record.
In a Master-Detail relationship, deleting the parent record will delete all the child records associated with it.
Lookup relationship is a simpler form of relationship where the child recor...read more
Q40. Coding problem like swapping two variables without a third one
Swapping two variables without a third one using XOR operation
Use XOR operation to swap two variables without a third one
Example: a = 5, b = 10. a ^= b; b ^= a; a ^= b; // Now a = 10, b = 5
Q41. How do you manage application state?
Application state is managed through various techniques such as Redux, Context API, and local state.
Redux is a popular state management library that allows for a centralized store of application state.
Context API is a built-in React feature that allows for sharing state between components without the need for props drilling.
Local state can be used for managing state within a single component.
Other techniques include using third-party libraries like MobX or implementing the Fl...read more
Q42. What do u mean by DNS?
DNS stands for Domain Name System, which is a system that translates domain names into IP addresses.
DNS is used to locate websites and other resources on the internet.
It works by translating human-readable domain names into machine-readable IP addresses.
DNS servers store information about domain names and their corresponding IP addresses.
Examples of DNS servers include Google DNS, OpenDNS, and Cloudflare DNS.
Q43. What is variable hoisting in JavaScript?
Variable hoisting is a behavior in JavaScript where variable declarations are moved to the top of their scope.
Variable declarations are processed before any code is executed.
Variables declared with 'var' are hoisted to the top of their scope.
This can lead to unexpected behavior if variables are used before they are declared.
Example: console.log(x); // undefined var x = 5;
Example: function example() { console.log(y); // undefined var y = 10; } example();
Variables declared with...read more
Q44. is JavaScript clientside or serverside?
JavaScript is both clientside and serverside.
JavaScript is primarily used for clientside scripting in web browsers.
However, it can also be used for serverside scripting with Node.js.
Clientside JavaScript is executed by the user's browser.
Serverside JavaScript is executed by the server.
JavaScript can be used for both front-end and back-end development.
Q45. Why Typescript over JavaScript?
Typescript offers static typing, better tooling, and improved scalability over JavaScript.
Static typing catches errors at compile time instead of runtime
Better tooling with features like code completion and refactoring
Improved scalability with support for interfaces and classes
Can be transpiled to JavaScript for browser compatibility
Used by popular frameworks like Angular and React Native
Q46. Is a DP question where you have to find the prefix.
A DP question where you have to find the prefix.
Identify the common prefix among the given strings
Iterate through each character of the strings to find the prefix
Return the prefix once it no longer matches in all strings
Q47. Which area of law and business appeals to you most?
I am most interested in the intersection of intellectual property law and technology business.
I am fascinated by the evolving landscape of intellectual property rights in the digital age.
I am drawn to the challenges of protecting innovations and creative works in a rapidly changing technological environment.
I am interested in how legal frameworks can support and regulate the development and commercialization of new technologies.
Examples: patent law, copyright law, technology ...read more
Q48. How do you print page numbers in a report
To print page numbers in a report, use the page number feature in your word processing software.
Insert page numbers in the header or footer section of the document
Choose the format and position of the page numbers
Update the page numbers automatically as you add or remove pages
Preview the document to ensure the page numbers appear correctly
Q49. What are directives in Angular?
Directives are markers on a DOM element that tell AngularJS's HTML compiler ($compile) to attach a specified behavior to that DOM element.
Directives are used to create custom HTML tags that serve as new, reusable widgets.
They can be used to manipulate the DOM, add event listeners, and create two-way data bindings.
Examples include ng-repeat, ng-model, and ng-show.
Directives can be restricted to only apply to elements, attributes, classes, or comments.
They can also be used to c...read more
Q50. What are decorators in Angular?
Decorators are functions that modify classes, methods, or properties in Angular.
Decorators are used to add metadata to classes, methods, or properties.
They are prefixed with the @ symbol and placed immediately before the item they are modifying.
Examples include @Component, @Injectable, and @Input.
They can be used to provide additional functionality or configuration to Angular components.
Q51. Tell us about Firewall?
A firewall is a network security system that monitors and controls incoming and outgoing network traffic.
Firewalls can be hardware or software-based
They can be configured to block or allow specific types of traffic
Firewalls can also be used to create virtual private networks (VPNs)
Examples of popular firewall software include Norton, McAfee, and Windows Firewall
Q52. Coding Questions *Find sentence character length *Try catch block example
Answering coding questions on finding sentence character length and try-catch block example.
To find sentence character length, use the length() method on the string variable containing the sentence.
For try-catch block, use try{} block to enclose the code that may throw an exception and catch{} block to handle the exception.
Example: String sentence = 'This is a sample sentence'; int length = sentence.length(); try { //code that may throw an exception } catch(Exception e) { //c...read more
Q53. 7) difference between call by value and call by reference
Call by value passes a copy of the value while call by reference passes the address of the value.
Call by value passes a copy of the value while call by reference passes the address of the value.
Call by value is used for simple data types while call by reference is used for complex data types.
In call by value, changes made to the parameter do not affect the original value while in call by reference, changes made to the parameter affect the original value.
Q54. how strings can be stored in java
Strings in Java can be stored as objects of the String class or as arrays of characters.
Strings are immutable in Java, meaning their values cannot be changed once created.
String objects can be created using the new keyword or by assigning a string literal.
Strings can also be concatenated using the + operator or the concat() method.
Arrays of characters can be used to store strings as well, with each character representing a single element.
The String class provides many useful ...read more
Q55. Difference between rank() and dense rank() function
Rank() assigns unique rank to each distinct value, while Dense_rank() assigns consecutive rank to each distinct value.
Rank() function skips the rank if there are ties, while Dense_rank() does not.
Rank() function returns the same rank for the same set of values, while Dense_rank() does not.
Rank() function is used to find the rank of a value in a group, while Dense_rank() is used to find the rank of a value in a group without gaps.
Example: For values 1, 2, 2, 3, 4, Rank() will ...read more
Q56. Calculate number of baseballs which can come in this room
The number of baseballs that can fit in a room can be calculated based on the room's dimensions and the size of a baseball.
Calculate the volume of the room (length x width x height)
Calculate the volume of a baseball (4/3 x pi x radius^3)
Divide the room's volume by the baseball's volume to get the number of baseballs that can fit
Consider any obstacles or furniture in the room that may affect the available space
Q57. code to print largest number, code to find prime number
Code to print largest number and find prime number.
For printing largest number, initialize a variable with the first element of the array and loop through the array to compare each element with the variable. If the element is greater than the variable, update the variable with the element.
For finding prime number, loop through the numbers from 2 to n-1 and check if n is divisible by any of them. If n is divisible by any number, it is not a prime number.
To optimize prime numbe...read more
Q58. what are the types of cybersecurity attacks
Types of cybersecurity attacks include malware, phishing, ransomware, DDoS attacks, and insider threats.
Malware: malicious software designed to damage or gain unauthorized access to a computer system.
Phishing: fraudulent attempts to obtain sensitive information by disguising as a trustworthy entity.
Ransomware: a type of malware that encrypts a user's files and demands payment for their release.
DDoS attacks: Distributed Denial of Service attacks overwhelm a system with traffic...read more
Q59. who are the clients of Deloitte?
Deloitte's clients are diverse and include businesses, governments, and non-profit organizations.
Deloitte serves clients in various industries such as healthcare, financial services, technology, and consumer products.
Their clients range from small startups to large multinational corporations.
They also work with government agencies and non-profit organizations.
Examples of their clients include Amazon, Coca-Cola, and the United States Department of Defense.
Q60. Difference between var, let and const?
var, let and const are all used for variable declaration in JavaScript.
var is function-scoped and can be redeclared and updated.
let is block-scoped and can be updated but not redeclared.
const is block-scoped and cannot be updated or redeclared.
Use const for values that won't change, let for values that will change, and var for legacy code.
Example: var x = 10; let y = 'hello'; const z = true;
Q61. What is dependency injection?
Dependency injection is a design pattern where the dependencies of an object are provided externally rather than created internally.
It helps to decouple the code and makes it more testable and maintainable.
It allows for easier swapping of dependencies without changing the code.
There are three types of dependency injection: constructor injection, setter injection, and interface injection.
Example: Instead of creating a database connection object inside a class, it is passed as ...read more
Q62. What are the 5 Key Enabling areas of Deloitte?
The 5 key enabling areas of Deloitte are Strategy, Analytics & M&A, Customer & Marketing, Core Business Operations, Human Capital, and Technology.
Strategy: Helping clients develop strategies to navigate complex business challenges.
Analytics & M&A: Providing data-driven insights and support for mergers and acquisitions.
Customer & Marketing: Assisting clients in understanding customer needs and developing effective marketing strategies.
Core Business Operations: Improving effici...read more
Q63. Tell me something about yourself, Java, Html
I am a skilled Analyst with expertise in Java and HTML.
Proficient in Java programming language for developing applications
Experienced in creating web pages using HTML and CSS
Familiar with front-end development frameworks like Bootstrap
Knowledgeable in back-end technologies like Spring framework
Able to integrate Java and HTML for dynamic web applications
Q64. What do you know about conditional loop
Conditional loop is a loop that executes a block of code repeatedly as long as a specified condition is true.
Conditional loop is used to iterate over a block of code multiple times based on a condition.
The loop will continue to execute as long as the specified condition remains true.
Common examples of conditional loops include 'while' and 'for' loops in programming languages.
Q65. What is method overloading and method overriding
Method overloading is when multiple methods have the same name but different parameters. Method overriding is when a subclass provides a different implementation of a method that is already defined in its superclass.
Method overloading allows a class to have multiple methods with the same name but different parameters.
Method overriding occurs when a subclass provides a specific implementation of a method that is already defined in its superclass.
Method overloading is determine...read more
Q66. What do you mean by Accrual revenue?
Accrual revenue refers to revenue that has been earned but not yet received or recorded.
Accrual revenue is recognized when it is earned, regardless of when payment is received.
It is recorded as a receivable on the balance sheet until payment is received.
Examples include services rendered but not yet billed, or goods sold but not yet paid for.
Accrual accounting is the opposite of cash accounting, which only records revenue when payment is received.
Accrual revenue is important ...read more
Q67. What is a constructor?
A constructor is a special method that is used to initialize objects in a class.
Constructors have the same name as the class they are in.
They are called automatically when an object is created.
They can take parameters to set initial values for object properties.
Example: public class Car { public Car(String make, String model) { this.make = make; this.model = model; } }
Example: Car myCar = new Car("Toyota", "Corolla");
Q68. what's process and control and give example
Process and control involves establishing procedures and measures to ensure efficiency and accuracy in operations.
Process refers to the series of steps or actions taken to achieve a specific goal or outcome.
Control involves implementing checks and measures to monitor and regulate the process to ensure it is carried out effectively.
Example: In a manufacturing company, the process of quality control involves inspecting products at various stages to ensure they meet standards.
Q69. Write a trigger code for a before save context
Trigger code for before save context
Use 'before insert' and 'before update' events
Access and modify record fields using 'Trigger.new' and 'Trigger.old'
Use 'addError' method to prevent record from being saved
Q70. how many parameters be passed in bip reports
The number of parameters that can be passed in BIP reports varies depending on the specific report and its requirements.
The number of parameters can range from 0 to multiple parameters depending on the complexity of the report.
Parameters can be used to filter data, customize the report output, or specify criteria for the report.
Examples of parameters in BIP reports include date ranges, customer IDs, product categories, and regions.
Q71. How do you test an application?
Testing an application involves various methods to ensure its functionality and quality.
Create test cases based on requirements and user stories
Perform functional testing to check if the application meets specifications
Conduct regression testing to ensure new changes do not affect existing functionality
Utilize automated testing tools for efficiency
Perform user acceptance testing to ensure the application meets user expectations
Q72. What is left join with example ?
Left join is used to combine rows from two tables based on a related column, including all rows from the left table.
Left join returns all rows from the left table and the matched rows from the right table.
If there is no match, NULL values are returned for the columns from the right table.
Example: SELECT * FROM table1 LEFT JOIN table2 ON table1.id = table2.id;
Q73. Vulnerabilities of adapting Cloud Computing for a firm
Adopting Cloud Computing can expose firms to security risks and data breaches.
Security vulnerabilities such as data breaches and unauthorized access
Reliance on third-party providers for data storage and security
Potential for downtime and service interruptions
Compliance and regulatory concerns
Data privacy issues and lack of control over data location
Cost implications and potential hidden fees
Q74. How do you create a bulk collect
Bulk collect can be created using the BULK COLLECT INTO clause in SQL.
Use SELECT statement to retrieve data
Use BULK COLLECT INTO clause to store data in a collection
Use LIMIT clause to limit the number of rows fetched
Example: SELECT * BULK COLLECT INTO my_collection FROM my_table WHERE column = value;
Q75. What is Abstraction?
Abstraction is the process of simplifying complex systems by focusing on the essential details.
Abstraction involves hiding unnecessary details and exposing only the relevant information.
It allows us to create models or representations that capture the important aspects of a system.
Abstraction helps in managing complexity and improving understanding and communication.
For example, in programming, object-oriented abstraction allows us to create classes that encapsulate data and ...read more
Q76. what is foreign key and primary key
Primary key uniquely identifies each record in a table, while foreign key establishes a link between two tables.
Primary key ensures uniqueness of each record in a table
Foreign key establishes a relationship between two tables
Example: In a 'students' table, 'student_id' can be a primary key, while in a 'courses' table, 'student_id' can be a foreign key linking to 'students' table
Q77. What is networking?
Networking is the process of connecting devices and systems to share information and resources.
Networking involves the use of hardware and software to connect devices and systems.
It allows for the sharing of information and resources such as files, printers, and internet access.
Networking can be done through wired or wireless connections.
Examples of networking technologies include Ethernet, Wi-Fi, and Bluetooth.
Q78. Explain CV Elaborate on internship experience in 1 sentence
CV stands for Curriculum Vitae, which is a document that provides an overview of a person's education, work experience, skills, and achievements.
A CV is a comprehensive summary of a person's professional background and qualifications.
It includes information such as education, work experience, skills, certifications, and achievements.
Internship experience can be highlighted in the CV by mentioning the organization, duration, role, and key responsibilities.
For example, 'Interne...read more
Q79. write python code to find odd sum pairs in a list
Python code to find odd sum pairs in a list
Iterate through the list and check for pairs with odd sum
Use a nested loop to compare each pair of elements
Add the pairs with odd sum to a new list
Q80. 1. Explain spring mvc 2. Reverse string program And many
Spring MVC is a framework for building web applications in Java. Reverse string program reverses the characters in a given string.
Spring MVC is based on the Model-View-Controller design pattern
It provides components like DispatcherServlet, Controller, Model, and ViewResolver
Reverse string program can be implemented using StringBuilder or char array
Q81. can OIC be triggered using ess job ?
Yes, OIC can be triggered using ess job.
OIC can be triggered using Oracle Integration Cloud (OIC) REST APIs.
ESS job can be used to schedule and trigger OIC integrations.
By configuring the ESS job to call the OIC REST API endpoint, OIC can be triggered.
This allows for automation and scheduling of OIC integrations.
Q82. Explain any flow in any of modules in erp
In ERP, flow can be disrupted in any module due to various reasons.
Flow disruption can occur due to system errors or incorrect data entry.
For example, in the inventory module, if incorrect stock levels are entered, it can disrupt the flow of the entire supply chain.
Similarly, in the finance module, if there are errors in the billing process, it can lead to delayed payments and affect cash flow.
Regular maintenance and data validation can help prevent flow disruptions in ERP mo...read more
Q83. Guesstimate on Size of EV Market in India
The EV market in India is estimated to be around 2-3% of total vehicle sales currently.
EV sales in India have been steadily increasing due to government incentives and growing environmental awareness.
Major players in the Indian EV market include Tata Motors, Mahindra Electric, and Hero Electric.
Charging infrastructure is a key factor in the growth of the EV market in India.
The government has set a target of 30% EV penetration by 2030.
The EV market in India is expected to grow...read more
Q84. Guesstimate on Revenue of a Fast Food Restaurant
The revenue of a fast food restaurant can vary greatly depending on factors like location, menu offerings, and customer traffic.
Consider the average number of customers served per day
Look at the menu prices and estimate the average spend per customer
Factor in any special promotions or discounts that may impact revenue
Take into account the operating hours of the restaurant and peak times of business
Compare with industry averages for similar fast food establishments
Q85. how do you drop columns and rows
To drop columns and rows in a dataset, you can use the drop() method in pandas library in Python.
Use the drop() method with the axis parameter set to 0 for dropping rows and 1 for dropping columns.
Specify the labels of the rows or columns you want to drop in the labels parameter.
Use the inplace parameter to make the changes in the original dataset.
Example: df.drop(labels=['column1', 'column2'], axis=1, inplace=True) will drop columns 'column1' and 'column2' from the DataFrame...read more
Q86. Difference between hash map and hashtable
HashMap allows null values and keys, while Hashtable does not. HashMap is not synchronized, Hashtable is synchronized.
HashMap allows null values and keys, while Hashtable does not
HashMap is not synchronized, Hashtable is synchronized
HashMap is part of the Java Collections Framework, Hashtable is a legacy class
Q87. Print the fibonacci for a given user input.
Print the fibonacci sequence for a given user input.
Create a function to generate the fibonacci sequence.
Take user input for the length of the sequence.
Use a loop to calculate and print each fibonacci number.
Q88. 6) what is exception handling
Exception handling is the process of handling errors and unexpected events in a program.
It allows a program to gracefully handle errors and prevent crashes.
It involves catching and handling exceptions that occur during program execution.
Examples include try-catch blocks in Java and error handling functions in Python.
Good exception handling can improve the reliability and maintainability of a program.
Q89. whether strings can be modified or not
Yes, strings can be modified in most programming languages.
Strings are mutable in languages like Python, Ruby, and JavaScript.
In C and Java, strings are immutable but can be modified using pointers or StringBuilder class respectively.
Modifying a string creates a new string object with the modified value.
Example: str = 'hello', str = str.replace('o', 'a') will modify str to 'hella'.
Q90. What is hashing?
Hashing is a process of converting data into a fixed-size output, often used for security purposes.
Hashing is a one-way function, meaning it cannot be reversed to obtain the original data.
Hashing is commonly used for password storage, as the hashed value can be stored instead of the actual password.
Hashing is also used for data integrity checks, as any changes to the original data will result in a different hash value.
Examples of hashing algorithms include MD5, SHA-1, and SHA...read more
Q91. Diff between C and Java?
C is a procedural language while Java is an object-oriented language.
C is compiled while Java is interpreted
C has pointers while Java does not
Java has automatic garbage collection while C does not
Java has platform independence while C does not
Java has built-in exception handling while C does not
Q92. Component lifecycle hooks in React.
Component lifecycle hooks are methods that allow you to handle events during the lifecycle of a component in React.
There are three phases in the lifecycle of a component: Mounting, Updating, and Unmounting.
Mounting phase: constructor(), static getDerivedStateFromProps(), render(), componentDidMount()
Updating phase: static getDerivedStateFromProps(), shouldComponentUpdate(), render(), getSnapshotBeforeUpdate(), componentDidUpdate()
Unmounting phase: componentWillUnmount()
Exampl...read more
Q93. What are the layers of OSI model
The OSI model consists of 7 layers that define the functions of a network communication system.
Physical layer - deals with physical connections and transmission of raw data
Data link layer - responsible for node-to-node communication and error detection
Network layer - manages routing and addressing
Transport layer - ensures end-to-end communication and data flow control
Session layer - establishes, manages, and terminates connections
Presentation layer - translates data into a fo...read more
Q94. difference between normal sensor and smart sensor
Normal sensors collect raw data, while smart sensors process data and provide actionable insights.
Normal sensors collect raw data without any processing
Smart sensors have built-in processing capabilities to analyze data and provide actionable insights
Smart sensors can communicate with other devices or systems to trigger actions based on the data collected
Examples of smart sensors include smart thermostats, fitness trackers, and industrial IoT sensors
Q95. Difference between C and Java?
C is a low-level programming language while Java is a high-level programming language.
C is compiled while Java is interpreted
C has pointers while Java does not
C is closer to the hardware while Java is platform-independent
C is used for system programming while Java is used for web and mobile app development
Q96. 5) what is final variable
A final variable is a variable whose value cannot be changed once it is assigned.
Final variables are declared using the 'final' keyword.
They can be initialized either at the time of declaration or in a constructor.
Final variables are often used to declare constants.
Example: final int MAX_VALUE = 100;
Example: final String MESSAGE = "Hello, world!";
Q97. What is Salesforce Marketing Cloud.
Salesforce Marketing Cloud is a platform for creating and managing personalized customer journeys across multiple channels.
Allows businesses to create and manage email, social media, mobile, and web marketing campaigns
Provides tools for audience segmentation, content creation, and analytics
Integrates with Salesforce CRM for a complete view of customer interactions
Examples of companies using Salesforce Marketing Cloud include Coca-Cola, Adidas, and T-Mobile
Q98. explain some data structure questions 2 actually
Data structure questions are commonly asked in analyst interviews to assess problem-solving skills and understanding of fundamental concepts.
Explain the difference between arrays and linked lists
Discuss the advantages and disadvantages of using a hash table
Describe how a stack and a queue work and provide examples of real-world applications
Q99. What is monolithic andmicroservices
Monolithic architecture is a single-tiered software application where all components are tightly coupled, while microservices architecture is a distributed approach where the application is broken down into smaller, independent services.
Monolithic architecture: all components are tightly coupled in a single-tiered application
Microservices architecture: application is broken down into smaller, independent services
Monolithic architecture can be harder to scale and maintain
Micro...read more
Q100. Linked List Implementation
Linked list is a data structure where each element points to the next element in the sequence.
Nodes in a linked list contain data and a reference to the next node
Insertion and deletion operations are efficient in linked lists
Examples: Singly linked list, Doubly linked list, Circular linked list
More about working at Deloitte
Top HR Questions asked in CENTRUM LEGAL
Interview Process at CENTRUM LEGAL
Top Analyst Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month