Add office photos
Premium Employer

Deloitte

3.8
based on 16.7k Reviews
Proud winner of ABECA 2024 - AmbitionBox Employee Choice Awards
Filter interviews by

100+ CENTRUM LEGAL Interview Questions and Answers

Updated 15 Dec 2024
Popular Designations
Q1. Reverse of a number

Write a program to generate the reverse of a given number N. Print the corresponding reverse number.

Note : If a number has trailing zeros, then its reverse will not include them. For e.g., r...read more
View 2 more answers
Q2. Idempotent Matrix

Given a N * N matrix and the task is to check matrix is idempotent matrix or not.

See the sample input.

Idempotent matrix M follows the following property :

M*M = M 
Input format :
Line 1 : Siz...read more
Add your answer
Q3. Technical Questions

OOPS concepts.

What is SQL and NO SQL database?

What is difference between Stored procedures and functions?

Add your answer

Q4. Sql is installed on the server for enable which port needs to be open?

Ans.

Port 1433 needs to be open for SQL Server.

  • SQL Server uses port 1433 for communication.

  • Ensure that port 1433 is open in the server's firewall.

  • Check the SQL Server configuration to confirm the port number.

View 1 answer
Discover CENTRUM LEGAL interview dos and don'ts from real experiences

Q5. You have to design a database for library. Which language will u prefer?

Ans.

I would prefer using SQL for designing a database for a library.

  • SQL is a widely used language for managing relational databases.

  • It provides a structured and efficient way to store, retrieve, and manipulate data.

  • SQL allows for easy querying and joining of tables, which is essential for library operations.

  • It supports transactions and ensures data integrity.

  • SQL also offers various security features to protect sensitive library information.

Add your answer

Q6. Find out positions of numbers form an array whose sum is 9.

Ans.

The positions of numbers in an array whose sum is 9 need to be found.

  • Iterate through the array and check for pairs of numbers that add up to 9.

  • Store the positions of the numbers that satisfy the condition.

  • Return the positions as the result.

View 2 more answers
Are these interview questions helpful?

Q7. Is it possible to convert bytecode in Java back to original code and how to do it?

Ans.

Yes, it is possible to decompile bytecode in Java back to the original code.

  • Decompilation is the process of converting bytecode back to its original source code.

  • There are several tools available for decompiling Java bytecode, such as JD-GUI, FernFlower, and Procyon.

  • Decompiling bytecode can be useful for understanding how a program works, reverse engineering, or debugging.

  • However, the decompiled code may not be an exact replica of the original source code, as some information ...read more

Add your answer

Q8. If C drive is running out of space , what kind of troubleshooting you will do.

Ans.

To troubleshoot a C drive running out of space, check for large files, uninstall unnecessary programs, clear temporary files, and consider expanding storage capacity.

  • Check for large files that can be deleted or moved to another drive

  • Uninstall unnecessary programs to free up space

  • Clear temporary files using disk cleanup tools

  • Consider expanding storage capacity by adding a new hard drive or using external storage

View 1 answer
Share interview questions and help millions of jobseekers 🌟

Q9. Who regulates Markets in US? Responsibilities of their Market regulator?

Ans.

The Securities and Exchange Commission (SEC) regulates markets in the US. Their responsibilities include enforcing federal securities laws, protecting investors, and maintaining fair and orderly markets.

  • The SEC is responsible for overseeing securities exchanges such as the New York Stock Exchange (NYSE) and NASDAQ.

  • They enforce laws such as the Securities Act of 1933 and the Securities Exchange Act of 1934.

  • The SEC also regulates investment advisers, mutual funds, and other inv...read more

Add your answer

Q10. Explain the concept of inheritance in Java .What is its use?

Ans.

Inheritance in Java allows a class to inherit properties and methods from another class, promoting code reuse.

  • Inheritance is achieved using the 'extends' keyword in Java.

  • The class that is being inherited from is called the superclass or parent class.

  • The class that inherits from the superclass is called the subclass or child class.

  • The subclass can access the public and protected members of the superclass.

  • Inheritance promotes code reuse and allows for the creation of more speci...read more

Add your answer

Q11. What is difference between article and section tag?

Ans.

Article and section tags are used for structuring HTML documents, but have different semantic meanings.

  • The

    tag represents a self-contained piece of content that can be distributed independently from the rest of the page.

  • The

    tag represents a group of related content, typically with a heading.

  • The

    tag is often used for blog posts, news articles, and product descriptions.

  • The

    tag is often used for chapters, sections, and sub-sections of a document.

  • Both tags can be nested withi...read more

Add your answer

Q12. How to find Largest element in the array wid most efficiency?

Ans.

Use a loop to iterate through the array and keep track of the largest element.

  • Initialize a variable to store the largest element as the first element of the array

  • Loop through the array and compare each element to the current largest element

  • If the current element is larger, update the largest element variable

  • Return the largest element variable

Add your answer

Q13. If you have created the server , some website is not working . what will you do.

Ans.

I would check the server logs and troubleshoot the issue.

  • Check if the website is properly configured on the server

  • Check if there are any errors in the server logs

  • Check if there are any issues with the website's code or database

  • Restart the server or relevant services if necessary

Add your answer

Q14. Two VM's are running on differenct host how they are communicating.

Ans.

VMs communicate through network protocols and virtual switches.

  • VMs use network protocols like TCP/IP to communicate.

  • Virtual switches connect VMs to the physical network.

  • Hosts can also use virtual network adapters to communicate with VMs.

  • Firewalls and security policies can restrict VM communication.

  • Examples of virtual switches include VMware vSwitch and Hyper-V Virtual Switch.

Add your answer

Q15. You know Normalizastion? Tell me what is 3rd normal form

Ans.

3rd normal form is a database normalization technique where every non-key attribute is dependent on the primary key.

  • In 3NF, there should be no transitive dependencies between non-key attributes.

  • It reduces data redundancy and improves data integrity.

  • Example: A table with columns for customer ID, order ID, and product ID. The product name should not be stored in this table as it is dependent on the product ID, not the customer or order ID.

  • Another example: A table with columns f...read more

Add your answer

Q16. - If you had to choose between two processes which give the same outcome, but one of them is longer but more accurate and the other is short but less accurate, which one would you choose?

Ans.

I would choose the longer but more accurate process.

  • Accuracy is crucial in decision-making and can have long-term consequences.

  • Investing more time in a process can lead to better outcomes and prevent costly mistakes.

  • Examples: Medical diagnosis, financial analysis, scientific research.

Add your answer

Q17. How do components interact with each other in Angular?

Ans.

Components interact with each other through inputs, outputs, and services.

  • Components can pass data to child components through inputs.

  • Components can emit events to parent components through outputs.

  • Components can share data and functionality through services.

  • Components can also communicate through the @ViewChild and @ContentChild decorators.

  • Example: A parent component passes data to a child component through an input property.

  • Example: A child component emits an event to a par...read more

Add your answer

Q18. 2) what is SDLC (Software Development Life Cycle) how it helps?

Ans.

SDLC is a process followed by software development teams to design, develop and test high-quality software.

  • SDLC is a structured approach to software development.

  • It involves several phases such as planning, analysis, design, implementation, testing, and maintenance.

  • It helps in delivering high-quality software that meets customer requirements.

  • It ensures that the software is developed within budget and on time.

  • It helps in identifying and resolving issues early in the development...read more

Add your answer

Q19. What is Close-Ended Mutual Fund?

Ans.

A mutual fund with a fixed number of shares, traded on an exchange like a stock.

  • Investors buy and sell shares of the fund on the exchange

  • The price of the shares is determined by supply and demand

  • The fund is managed by a professional portfolio manager

  • Examples include index funds and ETFs

Add your answer

Q20. How can you troubleshoot Disk corrupt issue.

Ans.

To troubleshoot disk corrupt issue, check disk errors, run chkdsk, repair disk, and recover data.

  • Check for disk errors using Event Viewer or Disk Utility

  • Run chkdsk command to scan and fix disk errors

  • Repair disk using disk repair tool or reinstalling OS

  • Recover data using data recovery software or professional services

View 1 answer

Q21. What’s the relation between pointers and Security?

Ans.

Pointers are used in programming to manage memory and can be a potential security vulnerability if not handled properly.

  • Pointers allow direct access to memory locations, making it possible to manipulate data or execute arbitrary code.

  • Improper use of pointers can lead to buffer overflows, memory leaks, and other security vulnerabilities.

  • Pointers can be exploited by attackers to gain unauthorized access, execute malicious code, or crash a system.

  • Examples of pointer-related secu...read more

Add your answer

Q22. What is different ways of identification in tosca? What os exploratory testing? What is module based testing? What are standard modules available in tosca? Syntax for date time format?

Ans.

Tosca offers multiple ways of identification including visual recognition, object recognition, and text recognition.

  • Visual recognition identifies objects based on their appearance

  • Object recognition identifies objects based on their properties and attributes

  • Text recognition identifies objects based on their text content

  • Module based testing involves testing individual modules of an application separately

  • Standard modules in Tosca include Test Case Design, Test Data Management, a...read more

Add your answer

Q23. What is call by value and call by reference?

Ans.

Call by value and call by reference are two ways of passing arguments to a function.

  • Call by value passes a copy of the argument's value to the function.

  • Call by reference passes a reference to the argument's memory location to the function.

  • Call by value is used for simple data types like int, float, etc.

  • Call by reference is used for complex data types like arrays, structures, etc.

Add your answer

Q24. What are the 7 layers in OSI model of Networking?

Ans.

The OSI model has 7 layers that define how data is transmitted over a network.

  • The layers are: Physical, Data Link, Network, Transport, Session, Presentation, and Application.

  • Each layer has a specific function and communicates with the layers above and below it.

  • For example, the Physical layer deals with the physical transmission of data, while the Application layer deals with user interfaces and applications.

  • The OSI model is a conceptual model and is not always followed exactl...read more

Add your answer

Q25. What is a stock and a bond?

Ans.

A stock is a share of ownership in a company, while a bond is a debt security issued by a company or government.

  • Stocks represent ownership in a company and give shareholders voting rights and potential dividends.

  • Bonds represent a loan to a company or government and pay interest to the bondholder.

  • Stocks are generally considered riskier but offer higher potential returns, while bonds are considered safer but offer lower returns.

  • Investors often use a combination of stocks and bo...read more

Add your answer

Q26. How would you use Data Analytics to device a solution so that school kids reach to school and back home safely and on time without the parents being worried

Ans.

Utilize data analytics to ensure safe and timely transportation for school kids without parents' worry

  • Collect data on traffic patterns and congestion to optimize bus routes

  • Implement GPS tracking on buses to monitor their location in real-time

  • Utilize predictive analytics to anticipate potential delays and adjust schedules accordingly

  • Create a communication platform for parents to receive updates on their child's transportation status

  • Analyze historical data to identify common is...read more

Add your answer

Q27. What are mutable and immutable data types?

Ans.

Mutable data types can be changed after creation, while immutable data types cannot be changed.

  • Mutable data types include lists, dictionaries, and sets.

  • Immutable data types include strings, tuples, and frozensets.

  • Changing a mutable data type will modify the original object, while changing an immutable data type will create a new object.

  • Example: changing a list by appending an element will modify the original list, while concatenating two strings will create a new string.

Add your answer

Q28. Can we create composite unique keys on multiple columns in a single table

Ans.

Yes, composite unique keys can be created on multiple columns in a single table.

  • Composite unique keys are useful for ensuring data integrity and preventing duplicates.

  • Syntax: CREATE TABLE table_name (column1 datatype, column2 datatype, ..., CONSTRAINT constraint_name UNIQUE (column1, column2, ...));

  • Example: CREATE TABLE employees (id INT, name VARCHAR(50), email VARCHAR(50), CONSTRAINT emp_unique UNIQUE (id, email));

Add your answer

Q29. Write a function to normalise a decimal number without using math functions.

Ans.

Function to normalise a decimal number without using math functions.

  • Extract the integer and decimal parts of the number

  • Count the number of digits in the decimal part

  • Multiply the decimal part by 10^number of decimal digits to convert it to an integer

  • Add the integer and converted decimal parts and return the result

Add your answer

Q30. What is the use of JVM in Java?

Ans.

JVM is the virtual machine that executes Java bytecode. It provides platform independence and memory management.

  • JVM stands for Java Virtual Machine

  • It interprets compiled Java code into machine language

  • JVM provides platform independence by executing bytecode on any platform

  • It manages memory allocation and garbage collection

  • Examples of JVM-based languages include Kotlin and Scala

View 1 answer

Q31. What are the basic differences between the different types of SQL joins?

Ans.

SQL joins are used to combine rows from two or more tables based on a related column between them.

  • INNER JOIN: Returns records that have matching values in both tables.

  • LEFT JOIN: Returns all records from the left table and the matched records from the right table.

  • RIGHT JOIN: Returns all records from the right table and the matched records from the left table.

  • FULL JOIN: Returns all records when there is a match in either left or right table.

  • CROSS JOIN: Returns the Cartesian pro...read more

Add your answer

Q32. Explain Inheritance and how you have implemented inheritance in your work?

Ans.

Inheritance is a concept in object-oriented programming where a class inherits properties and behaviors from another class.

  • Inheritance allows for code reuse and promotes modularity.

  • The class that is being inherited from is called the superclass or base class.

  • The class that inherits from the superclass is called the subclass or derived class.

  • The subclass inherits all the public and protected members of the superclass.

  • Inheritance is implemented using the 'extends' keyword in la...read more

Add your answer

Q33. Example, when your are script writer. How do you establish connection to DB?

Ans.

Establishing connection to a DB as a script writer.

  • Choose a suitable programming language for the task

  • Install the necessary database driver

  • Provide the correct credentials for the database

  • Test the connection before proceeding with the script

Add your answer

Q34. State all the differences which are possible and also the application of both the relationships.

Ans.

There are different types of relationships possible with varying degrees of commitment and intimacy. Each has its own application.

  • Types of relationships: casual, romantic, platonic, familial, professional

  • Casual relationships are low-commitment and often short-term

  • Romantic relationships involve emotional and physical intimacy

  • Platonic relationships are non-romantic and non-sexual

  • Familial relationships are based on blood or legal ties

  • Professional relationships are based on work ...read more

Add your answer

Q35. how will you handle a situation when client is unhappy with ur product

Ans.

I would address the client's concerns promptly and work towards finding a solution to meet their needs.

  • Listen to the client's feedback and understand their specific concerns

  • Apologize for any inconvenience caused and assure them that their feedback is valued

  • Offer potential solutions or alternatives to address their dissatisfaction

  • Follow up with the client to ensure that the issue has been resolved to their satisfaction

Add your answer

Q36. How do you print multiple logo from a single template

Ans.

To print multiple logos from a single template, use a batch processing tool or create a script to automate the process.

  • Use a batch processing tool like Adobe Photoshop's Batch Processing feature to apply the template to multiple logos at once.

  • Create a script using a programming language like Python to automate the process of applying the template to multiple logos.

  • Ensure that the logos are in a compatible file format for the template.

  • Adjust the template as necessary to fit ea...read more

Add your answer

Q37. On resume- difference between html5 and its previous version?

Ans.

HTML5 is the latest version of HTML with new features and improvements.

  • HTML5 has new semantic tags like

    ,
    ,
  • HTML5 supports audio and video elements without the need for plugins.

  • HTML5 has improved form elements like date pickers, range sliders, etc.

  • HTML5 has improved canvas and SVG support for graphics.

  • HTML5 has improved accessibility features.

  • HTML5 has improved support for mobile devices.

  • Previous versions of HTML did not have these features.

Add your answer

Q38. Would you work differently with competitors data as opposed to own data?

Ans.

Yes, competitor data requires additional scrutiny and validation before use.

  • Competitor data may not be as reliable as own data

  • Competitor data may have different methodologies or definitions

  • Competitor data may require additional validation and verification

  • Competitor data may require additional legal considerations

  • Own data may be more readily available and easier to use

Add your answer

Q39. What is the difference between the Master-Detail and Lookup relationship?

Ans.

Master-Detail is a parent-child relationship where the child record cannot exist without the parent. Lookup is a simple reference relationship.

  • Master-Detail relationship is a stricter form of relationship where the child record inherits the security and sharing settings of the parent record.

  • In a Master-Detail relationship, deleting the parent record will delete all the child records associated with it.

  • Lookup relationship is a simpler form of relationship where the child recor...read more

Add your answer

Q40. Coding problem like swapping two variables without a third one

Ans.

Swapping two variables without a third one using XOR operation

  • Use XOR operation to swap two variables without a third one

  • Example: a = 5, b = 10. a ^= b; b ^= a; a ^= b; // Now a = 10, b = 5

Add your answer

Q41. How do you manage application state?

Ans.

Application state is managed through various techniques such as Redux, Context API, and local state.

  • Redux is a popular state management library that allows for a centralized store of application state.

  • Context API is a built-in React feature that allows for sharing state between components without the need for props drilling.

  • Local state can be used for managing state within a single component.

  • Other techniques include using third-party libraries like MobX or implementing the Fl...read more

Add your answer

Q42. What do u mean by DNS?

Ans.

DNS stands for Domain Name System, which is a system that translates domain names into IP addresses.

  • DNS is used to locate websites and other resources on the internet.

  • It works by translating human-readable domain names into machine-readable IP addresses.

  • DNS servers store information about domain names and their corresponding IP addresses.

  • Examples of DNS servers include Google DNS, OpenDNS, and Cloudflare DNS.

Add your answer

Q43. What is variable hoisting in JavaScript?

Ans.

Variable hoisting is a behavior in JavaScript where variable declarations are moved to the top of their scope.

  • Variable declarations are processed before any code is executed.

  • Variables declared with 'var' are hoisted to the top of their scope.

  • This can lead to unexpected behavior if variables are used before they are declared.

  • Example: console.log(x); // undefined var x = 5;

  • Example: function example() { console.log(y); // undefined var y = 10; } example();

  • Variables declared with...read more

Add your answer

Q44. is JavaScript clientside or serverside?

Ans.

JavaScript is both clientside and serverside.

  • JavaScript is primarily used for clientside scripting in web browsers.

  • However, it can also be used for serverside scripting with Node.js.

  • Clientside JavaScript is executed by the user's browser.

  • Serverside JavaScript is executed by the server.

  • JavaScript can be used for both front-end and back-end development.

Add your answer

Q45. Why Typescript over JavaScript?

Ans.

Typescript offers static typing, better tooling, and improved scalability over JavaScript.

  • Static typing catches errors at compile time instead of runtime

  • Better tooling with features like code completion and refactoring

  • Improved scalability with support for interfaces and classes

  • Can be transpiled to JavaScript for browser compatibility

  • Used by popular frameworks like Angular and React Native

Add your answer

Q46. Is a DP question where you have to find the prefix.

Ans.

A DP question where you have to find the prefix.

  • Identify the common prefix among the given strings

  • Iterate through each character of the strings to find the prefix

  • Return the prefix once it no longer matches in all strings

Add your answer

Q47. Which area of law and business appeals to you most?

Ans.

I am most interested in the intersection of intellectual property law and technology business.

  • I am fascinated by the evolving landscape of intellectual property rights in the digital age.

  • I am drawn to the challenges of protecting innovations and creative works in a rapidly changing technological environment.

  • I am interested in how legal frameworks can support and regulate the development and commercialization of new technologies.

  • Examples: patent law, copyright law, technology ...read more

Add your answer

Q48. How do you print page numbers in a report

Ans.

To print page numbers in a report, use the page number feature in your word processing software.

  • Insert page numbers in the header or footer section of the document

  • Choose the format and position of the page numbers

  • Update the page numbers automatically as you add or remove pages

  • Preview the document to ensure the page numbers appear correctly

Add your answer

Q49. What are directives in Angular?

Ans.

Directives are markers on a DOM element that tell AngularJS's HTML compiler ($compile) to attach a specified behavior to that DOM element.

  • Directives are used to create custom HTML tags that serve as new, reusable widgets.

  • They can be used to manipulate the DOM, add event listeners, and create two-way data bindings.

  • Examples include ng-repeat, ng-model, and ng-show.

  • Directives can be restricted to only apply to elements, attributes, classes, or comments.

  • They can also be used to c...read more

Add your answer

Q50. What are decorators in Angular?

Ans.

Decorators are functions that modify classes, methods, or properties in Angular.

  • Decorators are used to add metadata to classes, methods, or properties.

  • They are prefixed with the @ symbol and placed immediately before the item they are modifying.

  • Examples include @Component, @Injectable, and @Input.

  • They can be used to provide additional functionality or configuration to Angular components.

Add your answer

Q51. Tell us about Firewall?

Ans.

A firewall is a network security system that monitors and controls incoming and outgoing network traffic.

  • Firewalls can be hardware or software-based

  • They can be configured to block or allow specific types of traffic

  • Firewalls can also be used to create virtual private networks (VPNs)

  • Examples of popular firewall software include Norton, McAfee, and Windows Firewall

Add your answer

Q52. Coding Questions *Find sentence character length *Try catch block example

Ans.

Answering coding questions on finding sentence character length and try-catch block example.

  • To find sentence character length, use the length() method on the string variable containing the sentence.

  • For try-catch block, use try{} block to enclose the code that may throw an exception and catch{} block to handle the exception.

  • Example: String sentence = 'This is a sample sentence'; int length = sentence.length(); try { //code that may throw an exception } catch(Exception e) { //c...read more

Add your answer

Q53. 7) difference between call by value and call by reference

Ans.

Call by value passes a copy of the value while call by reference passes the address of the value.

  • Call by value passes a copy of the value while call by reference passes the address of the value.

  • Call by value is used for simple data types while call by reference is used for complex data types.

  • In call by value, changes made to the parameter do not affect the original value while in call by reference, changes made to the parameter affect the original value.

Add your answer

Q54. how strings can be stored in java

Ans.

Strings in Java can be stored as objects of the String class or as arrays of characters.

  • Strings are immutable in Java, meaning their values cannot be changed once created.

  • String objects can be created using the new keyword or by assigning a string literal.

  • Strings can also be concatenated using the + operator or the concat() method.

  • Arrays of characters can be used to store strings as well, with each character representing a single element.

  • The String class provides many useful ...read more

View 1 answer

Q55. Difference between rank() and dense rank() function

Ans.

Rank() assigns unique rank to each distinct value, while Dense_rank() assigns consecutive rank to each distinct value.

  • Rank() function skips the rank if there are ties, while Dense_rank() does not.

  • Rank() function returns the same rank for the same set of values, while Dense_rank() does not.

  • Rank() function is used to find the rank of a value in a group, while Dense_rank() is used to find the rank of a value in a group without gaps.

  • Example: For values 1, 2, 2, 3, 4, Rank() will ...read more

Add your answer

Q56. Calculate number of baseballs which can come in this room

Ans.

The number of baseballs that can fit in a room can be calculated based on the room's dimensions and the size of a baseball.

  • Calculate the volume of the room (length x width x height)

  • Calculate the volume of a baseball (4/3 x pi x radius^3)

  • Divide the room's volume by the baseball's volume to get the number of baseballs that can fit

  • Consider any obstacles or furniture in the room that may affect the available space

Add your answer

Q57. code to print largest number, code to find prime number

Ans.

Code to print largest number and find prime number.

  • For printing largest number, initialize a variable with the first element of the array and loop through the array to compare each element with the variable. If the element is greater than the variable, update the variable with the element.

  • For finding prime number, loop through the numbers from 2 to n-1 and check if n is divisible by any of them. If n is divisible by any number, it is not a prime number.

  • To optimize prime numbe...read more

Add your answer

Q58. what are the types of cybersecurity attacks

Ans.

Types of cybersecurity attacks include malware, phishing, ransomware, DDoS attacks, and insider threats.

  • Malware: malicious software designed to damage or gain unauthorized access to a computer system.

  • Phishing: fraudulent attempts to obtain sensitive information by disguising as a trustworthy entity.

  • Ransomware: a type of malware that encrypts a user's files and demands payment for their release.

  • DDoS attacks: Distributed Denial of Service attacks overwhelm a system with traffic...read more

Add your answer

Q59. who are the clients of Deloitte?

Ans.

Deloitte's clients are diverse and include businesses, governments, and non-profit organizations.

  • Deloitte serves clients in various industries such as healthcare, financial services, technology, and consumer products.

  • Their clients range from small startups to large multinational corporations.

  • They also work with government agencies and non-profit organizations.

  • Examples of their clients include Amazon, Coca-Cola, and the United States Department of Defense.

Add your answer

Q60. Difference between var, let and const?

Ans.

var, let and const are all used for variable declaration in JavaScript.

  • var is function-scoped and can be redeclared and updated.

  • let is block-scoped and can be updated but not redeclared.

  • const is block-scoped and cannot be updated or redeclared.

  • Use const for values that won't change, let for values that will change, and var for legacy code.

  • Example: var x = 10; let y = 'hello'; const z = true;

Add your answer

Q61. What is dependency injection?

Ans.

Dependency injection is a design pattern where the dependencies of an object are provided externally rather than created internally.

  • It helps to decouple the code and makes it more testable and maintainable.

  • It allows for easier swapping of dependencies without changing the code.

  • There are three types of dependency injection: constructor injection, setter injection, and interface injection.

  • Example: Instead of creating a database connection object inside a class, it is passed as ...read more

Add your answer

Q62. What are the 5 Key Enabling areas of Deloitte?

Ans.

The 5 key enabling areas of Deloitte are Strategy, Analytics & M&A, Customer & Marketing, Core Business Operations, Human Capital, and Technology.

  • Strategy: Helping clients develop strategies to navigate complex business challenges.

  • Analytics & M&A: Providing data-driven insights and support for mergers and acquisitions.

  • Customer & Marketing: Assisting clients in understanding customer needs and developing effective marketing strategies.

  • Core Business Operations: Improving effici...read more

Add your answer

Q63. Tell me something about yourself, Java, Html

Ans.

I am a skilled Analyst with expertise in Java and HTML.

  • Proficient in Java programming language for developing applications

  • Experienced in creating web pages using HTML and CSS

  • Familiar with front-end development frameworks like Bootstrap

  • Knowledgeable in back-end technologies like Spring framework

  • Able to integrate Java and HTML for dynamic web applications

Add your answer

Q64. What do you know about conditional loop

Ans.

Conditional loop is a loop that executes a block of code repeatedly as long as a specified condition is true.

  • Conditional loop is used to iterate over a block of code multiple times based on a condition.

  • The loop will continue to execute as long as the specified condition remains true.

  • Common examples of conditional loops include 'while' and 'for' loops in programming languages.

Add your answer

Q65. What is method overloading and method overriding

Ans.

Method overloading is when multiple methods have the same name but different parameters. Method overriding is when a subclass provides a different implementation of a method that is already defined in its superclass.

  • Method overloading allows a class to have multiple methods with the same name but different parameters.

  • Method overriding occurs when a subclass provides a specific implementation of a method that is already defined in its superclass.

  • Method overloading is determine...read more

Add your answer

Q66. What do you mean by Accrual revenue?

Ans.

Accrual revenue refers to revenue that has been earned but not yet received or recorded.

  • Accrual revenue is recognized when it is earned, regardless of when payment is received.

  • It is recorded as a receivable on the balance sheet until payment is received.

  • Examples include services rendered but not yet billed, or goods sold but not yet paid for.

  • Accrual accounting is the opposite of cash accounting, which only records revenue when payment is received.

  • Accrual revenue is important ...read more

Add your answer

Q67. What is a constructor?

Ans.

A constructor is a special method that is used to initialize objects in a class.

  • Constructors have the same name as the class they are in.

  • They are called automatically when an object is created.

  • They can take parameters to set initial values for object properties.

  • Example: public class Car { public Car(String make, String model) { this.make = make; this.model = model; } }

  • Example: Car myCar = new Car("Toyota", "Corolla");

Add your answer

Q68. what's process and control and give example

Ans.

Process and control involves establishing procedures and measures to ensure efficiency and accuracy in operations.

  • Process refers to the series of steps or actions taken to achieve a specific goal or outcome.

  • Control involves implementing checks and measures to monitor and regulate the process to ensure it is carried out effectively.

  • Example: In a manufacturing company, the process of quality control involves inspecting products at various stages to ensure they meet standards.

Add your answer

Q69. Write a trigger code for a before save context

Ans.

Trigger code for before save context

  • Use 'before insert' and 'before update' events

  • Access and modify record fields using 'Trigger.new' and 'Trigger.old'

  • Use 'addError' method to prevent record from being saved

View 1 answer

Q70. how many parameters be passed in bip reports

Ans.

The number of parameters that can be passed in BIP reports varies depending on the specific report and its requirements.

  • The number of parameters can range from 0 to multiple parameters depending on the complexity of the report.

  • Parameters can be used to filter data, customize the report output, or specify criteria for the report.

  • Examples of parameters in BIP reports include date ranges, customer IDs, product categories, and regions.

Add your answer

Q71. How do you test an application?

Ans.

Testing an application involves various methods to ensure its functionality and quality.

  • Create test cases based on requirements and user stories

  • Perform functional testing to check if the application meets specifications

  • Conduct regression testing to ensure new changes do not affect existing functionality

  • Utilize automated testing tools for efficiency

  • Perform user acceptance testing to ensure the application meets user expectations

Add your answer

Q72. What is left join with example ?

Ans.

Left join is used to combine rows from two tables based on a related column, including all rows from the left table.

  • Left join returns all rows from the left table and the matched rows from the right table.

  • If there is no match, NULL values are returned for the columns from the right table.

  • Example: SELECT * FROM table1 LEFT JOIN table2 ON table1.id = table2.id;

Add your answer

Q73. Vulnerabilities of adapting Cloud Computing for a firm

Ans.

Adopting Cloud Computing can expose firms to security risks and data breaches.

  • Security vulnerabilities such as data breaches and unauthorized access

  • Reliance on third-party providers for data storage and security

  • Potential for downtime and service interruptions

  • Compliance and regulatory concerns

  • Data privacy issues and lack of control over data location

  • Cost implications and potential hidden fees

Add your answer

Q74. How do you create a bulk collect

Ans.

Bulk collect can be created using the BULK COLLECT INTO clause in SQL.

  • Use SELECT statement to retrieve data

  • Use BULK COLLECT INTO clause to store data in a collection

  • Use LIMIT clause to limit the number of rows fetched

  • Example: SELECT * BULK COLLECT INTO my_collection FROM my_table WHERE column = value;

Add your answer

Q75. What is Abstraction?

Ans.

Abstraction is the process of simplifying complex systems by focusing on the essential details.

  • Abstraction involves hiding unnecessary details and exposing only the relevant information.

  • It allows us to create models or representations that capture the important aspects of a system.

  • Abstraction helps in managing complexity and improving understanding and communication.

  • For example, in programming, object-oriented abstraction allows us to create classes that encapsulate data and ...read more

Add your answer

Q76. what is foreign key and primary key

Ans.

Primary key uniquely identifies each record in a table, while foreign key establishes a link between two tables.

  • Primary key ensures uniqueness of each record in a table

  • Foreign key establishes a relationship between two tables

  • Example: In a 'students' table, 'student_id' can be a primary key, while in a 'courses' table, 'student_id' can be a foreign key linking to 'students' table

Add your answer

Q77. What is networking?

Ans.

Networking is the process of connecting devices and systems to share information and resources.

  • Networking involves the use of hardware and software to connect devices and systems.

  • It allows for the sharing of information and resources such as files, printers, and internet access.

  • Networking can be done through wired or wireless connections.

  • Examples of networking technologies include Ethernet, Wi-Fi, and Bluetooth.

Add your answer

Q78. Explain CV Elaborate on internship experience in 1 sentence

Ans.

CV stands for Curriculum Vitae, which is a document that provides an overview of a person's education, work experience, skills, and achievements.

  • A CV is a comprehensive summary of a person's professional background and qualifications.

  • It includes information such as education, work experience, skills, certifications, and achievements.

  • Internship experience can be highlighted in the CV by mentioning the organization, duration, role, and key responsibilities.

  • For example, 'Interne...read more

Add your answer

Q79. write python code to find odd sum pairs in a list

Ans.

Python code to find odd sum pairs in a list

  • Iterate through the list and check for pairs with odd sum

  • Use a nested loop to compare each pair of elements

  • Add the pairs with odd sum to a new list

Add your answer

Q80. 1. Explain spring mvc 2. Reverse string program And many

Ans.

Spring MVC is a framework for building web applications in Java. Reverse string program reverses the characters in a given string.

  • Spring MVC is based on the Model-View-Controller design pattern

  • It provides components like DispatcherServlet, Controller, Model, and ViewResolver

  • Reverse string program can be implemented using StringBuilder or char array

Add your answer

Q81. can OIC be triggered using ess job ?

Ans.

Yes, OIC can be triggered using ess job.

  • OIC can be triggered using Oracle Integration Cloud (OIC) REST APIs.

  • ESS job can be used to schedule and trigger OIC integrations.

  • By configuring the ESS job to call the OIC REST API endpoint, OIC can be triggered.

  • This allows for automation and scheduling of OIC integrations.

Add your answer

Q82. Explain any flow in any of modules in erp

Ans.

In ERP, flow can be disrupted in any module due to various reasons.

  • Flow disruption can occur due to system errors or incorrect data entry.

  • For example, in the inventory module, if incorrect stock levels are entered, it can disrupt the flow of the entire supply chain.

  • Similarly, in the finance module, if there are errors in the billing process, it can lead to delayed payments and affect cash flow.

  • Regular maintenance and data validation can help prevent flow disruptions in ERP mo...read more

Add your answer

Q83. Guesstimate on Size of EV Market in India

Ans.

The EV market in India is estimated to be around 2-3% of total vehicle sales currently.

  • EV sales in India have been steadily increasing due to government incentives and growing environmental awareness.

  • Major players in the Indian EV market include Tata Motors, Mahindra Electric, and Hero Electric.

  • Charging infrastructure is a key factor in the growth of the EV market in India.

  • The government has set a target of 30% EV penetration by 2030.

  • The EV market in India is expected to grow...read more

Add your answer

Q84. Guesstimate on Revenue of a Fast Food Restaurant

Ans.

The revenue of a fast food restaurant can vary greatly depending on factors like location, menu offerings, and customer traffic.

  • Consider the average number of customers served per day

  • Look at the menu prices and estimate the average spend per customer

  • Factor in any special promotions or discounts that may impact revenue

  • Take into account the operating hours of the restaurant and peak times of business

  • Compare with industry averages for similar fast food establishments

Add your answer

Q85. how do you drop columns and rows

Ans.

To drop columns and rows in a dataset, you can use the drop() method in pandas library in Python.

  • Use the drop() method with the axis parameter set to 0 for dropping rows and 1 for dropping columns.

  • Specify the labels of the rows or columns you want to drop in the labels parameter.

  • Use the inplace parameter to make the changes in the original dataset.

  • Example: df.drop(labels=['column1', 'column2'], axis=1, inplace=True) will drop columns 'column1' and 'column2' from the DataFrame...read more

Add your answer

Q86. Difference between hash map and hashtable

Ans.

HashMap allows null values and keys, while Hashtable does not. HashMap is not synchronized, Hashtable is synchronized.

  • HashMap allows null values and keys, while Hashtable does not

  • HashMap is not synchronized, Hashtable is synchronized

  • HashMap is part of the Java Collections Framework, Hashtable is a legacy class

Add your answer

Q87. Print the fibonacci for a given user input.

Ans.

Print the fibonacci sequence for a given user input.

  • Create a function to generate the fibonacci sequence.

  • Take user input for the length of the sequence.

  • Use a loop to calculate and print each fibonacci number.

Add your answer

Q88. 6) what is exception handling

Ans.

Exception handling is the process of handling errors and unexpected events in a program.

  • It allows a program to gracefully handle errors and prevent crashes.

  • It involves catching and handling exceptions that occur during program execution.

  • Examples include try-catch blocks in Java and error handling functions in Python.

  • Good exception handling can improve the reliability and maintainability of a program.

Add your answer

Q89. whether strings can be modified or not

Ans.

Yes, strings can be modified in most programming languages.

  • Strings are mutable in languages like Python, Ruby, and JavaScript.

  • In C and Java, strings are immutable but can be modified using pointers or StringBuilder class respectively.

  • Modifying a string creates a new string object with the modified value.

  • Example: str = 'hello', str = str.replace('o', 'a') will modify str to 'hella'.

View 1 answer

Q90. What is hashing?

Ans.

Hashing is a process of converting data into a fixed-size output, often used for security purposes.

  • Hashing is a one-way function, meaning it cannot be reversed to obtain the original data.

  • Hashing is commonly used for password storage, as the hashed value can be stored instead of the actual password.

  • Hashing is also used for data integrity checks, as any changes to the original data will result in a different hash value.

  • Examples of hashing algorithms include MD5, SHA-1, and SHA...read more

Add your answer

Q91. Diff between C and Java?

Ans.

C is a procedural language while Java is an object-oriented language.

  • C is compiled while Java is interpreted

  • C has pointers while Java does not

  • Java has automatic garbage collection while C does not

  • Java has platform independence while C does not

  • Java has built-in exception handling while C does not

Add your answer

Q92. Component lifecycle hooks in React.

Ans.

Component lifecycle hooks are methods that allow you to handle events during the lifecycle of a component in React.

  • There are three phases in the lifecycle of a component: Mounting, Updating, and Unmounting.

  • Mounting phase: constructor(), static getDerivedStateFromProps(), render(), componentDidMount()

  • Updating phase: static getDerivedStateFromProps(), shouldComponentUpdate(), render(), getSnapshotBeforeUpdate(), componentDidUpdate()

  • Unmounting phase: componentWillUnmount()

  • Exampl...read more

Add your answer

Q93. What are the layers of OSI model

Ans.

The OSI model consists of 7 layers that define the functions of a network communication system.

  • Physical layer - deals with physical connections and transmission of raw data

  • Data link layer - responsible for node-to-node communication and error detection

  • Network layer - manages routing and addressing

  • Transport layer - ensures end-to-end communication and data flow control

  • Session layer - establishes, manages, and terminates connections

  • Presentation layer - translates data into a fo...read more

Add your answer

Q94. difference between normal sensor and smart sensor

Ans.

Normal sensors collect raw data, while smart sensors process data and provide actionable insights.

  • Normal sensors collect raw data without any processing

  • Smart sensors have built-in processing capabilities to analyze data and provide actionable insights

  • Smart sensors can communicate with other devices or systems to trigger actions based on the data collected

  • Examples of smart sensors include smart thermostats, fitness trackers, and industrial IoT sensors

Add your answer

Q95. Difference between C and Java?

Ans.

C is a low-level programming language while Java is a high-level programming language.

  • C is compiled while Java is interpreted

  • C has pointers while Java does not

  • C is closer to the hardware while Java is platform-independent

  • C is used for system programming while Java is used for web and mobile app development

Add your answer

Q96. 5) what is final variable

Ans.

A final variable is a variable whose value cannot be changed once it is assigned.

  • Final variables are declared using the 'final' keyword.

  • They can be initialized either at the time of declaration or in a constructor.

  • Final variables are often used to declare constants.

  • Example: final int MAX_VALUE = 100;

  • Example: final String MESSAGE = "Hello, world!";

Add your answer

Q97. What is Salesforce Marketing Cloud.

Ans.

Salesforce Marketing Cloud is a platform for creating and managing personalized customer journeys across multiple channels.

  • Allows businesses to create and manage email, social media, mobile, and web marketing campaigns

  • Provides tools for audience segmentation, content creation, and analytics

  • Integrates with Salesforce CRM for a complete view of customer interactions

  • Examples of companies using Salesforce Marketing Cloud include Coca-Cola, Adidas, and T-Mobile

Add your answer

Q98. explain some data structure questions 2 actually

Ans.

Data structure questions are commonly asked in analyst interviews to assess problem-solving skills and understanding of fundamental concepts.

  • Explain the difference between arrays and linked lists

  • Discuss the advantages and disadvantages of using a hash table

  • Describe how a stack and a queue work and provide examples of real-world applications

Add your answer

Q99. What is monolithic andmicroservices

Ans.

Monolithic architecture is a single-tiered software application where all components are tightly coupled, while microservices architecture is a distributed approach where the application is broken down into smaller, independent services.

  • Monolithic architecture: all components are tightly coupled in a single-tiered application

  • Microservices architecture: application is broken down into smaller, independent services

  • Monolithic architecture can be harder to scale and maintain

  • Micro...read more

Add your answer

Q100. Linked List Implementation

Ans.

Linked list is a data structure where each element points to the next element in the sequence.

  • Nodes in a linked list contain data and a reference to the next node

  • Insertion and deletion operations are efficient in linked lists

  • Examples: Singly linked list, Doubly linked list, Circular linked list

Add your answer
1
2
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos

Interview Process at CENTRUM LEGAL

based on 166 interviews in the last 1 year
3 Interview rounds
Aptitude Test Round
Technical Round
HR Round
View more
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Analyst Interview Questions from Similar Companies

3.3
 • 28 Interview Questions
3.7
 • 25 Interview Questions
3.9
 • 15 Interview Questions
4.1
 • 11 Interview Questions
3.9
 • 11 Interview Questions
2.9
 • 10 Interview Questions
View all
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
70 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions
Get AmbitionBox app

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter