Deloitte
10+ Encon Systems International Automation And Robotics Interview Questions and Answers
Q1. Sort 0 1 2 Problem Statement
Given an integer array arr
of size 'N' containing only 0s, 1s, and 2s, write an algorithm to sort the array.
Input:
The first line contains an integer 'T' representing the number of...read more
Q2. Bursting Balloons Problem
Given an array ARR
of size N
, where each element represents the height of a balloon. The task is to destroy all balloons by shooting arrows from left to right. When an arrow hits a bal...read more
Q3. How does Infor ION works & implementation done on number of projects
Infor ION is a middleware platform that connects disparate systems and enables data exchange.
Infor ION uses a publish-and-subscribe model to facilitate communication between systems.
It can be implemented on a variety of projects, including ERP, CRM, and supply chain management systems.
Infor ION also includes pre-built connectors for popular systems like Salesforce and SAP.
Implementation typically involves configuring the platform to connect to the desired systems and defining...read more
Q4. Which date in the year 2020 is a palindrome
The date 02/02/2020 is a palindrome.
A palindrome is a word, phrase, number, or other sequence of characters that reads the same forward and backward.
02/02/2020 reads the same forward and backward.
Other palindromic dates in 2020 include 11/02/2020 and 22/02/2020.
Q5. In shell scripting how to use a particular type shell like korn or bash shell ?
To use a particular type of shell like korn or bash shell in shell scripting, specify the shell at the beginning of the script.
Specify the shell at the beginning of the script using the shebang line (#!/bin/bash for bash shell, #!/bin/ksh for korn shell, etc.)
Make sure the specified shell is installed on the system where the script will be executed
Use shell-specific syntax and features in the script based on the chosen shell
Q6. How do you find block level corruption and resolve it?
Block level corruption can be found using tools like checksums and resolved by restoring from backups or repairing the corrupted blocks.
Use checksums to detect block level corruption by comparing the checksum of the data against a known good checksum.
Regularly run integrity checks on storage devices to identify any corrupted blocks.
Restore the corrupted blocks from backups if available, or repair them using tools like fsck.
Isolate the corrupted blocks to prevent further data ...read more
Q7. How can you make a class immutable in java?
How to make a class immutable in Java?
Make all fields private and final
Do not provide any setter methods
Make the class final
If mutable fields are present, return a copy of them in getter methods
Q8. Explain about the given html command.
The given HTML command is used to create a hyperlink in a webpage.
The <a> tag is used to define a hyperlink in HTML.
The href attribute specifies the URL of the page the link goes to.
Text between the opening and closing <a> tags is the clickable text of the link.
Q9. Difference between hashtable and concurrent hashmap!
Hashtable is not thread-safe while Concurrent HashMap is thread-safe.
Hashtable is a legacy class while Concurrent HashMap is a modern class.
Concurrent HashMap allows concurrent read and write operations while Hashtable does not.
Concurrent HashMap uses a technique called lock striping to achieve thread-safety.
Hashtable is synchronized while Concurrent HashMap is not fully synchronized.
Concurrent HashMap is faster than Hashtable in multi-threaded environments.
Example: Hashtable...read more
Q10. How will you incorporate CR
I will incorporate CR by analyzing customer feedback and implementing changes accordingly.
Collect customer feedback through surveys, social media, and other channels
Analyze feedback to identify common issues and areas for improvement
Develop and implement strategies to address feedback and improve customer satisfaction
Monitor and track progress to ensure changes are effective
Continuously gather feedback and make adjustments as needed
Q11. What are the backup strategies?
Backup strategies are plans and procedures put in place to protect data in case of loss or corruption.
Regularly scheduled backups to ensure data is up to date
Offsite backups to protect against physical damage or theft
Incremental backups to save storage space and time
Automated backups to reduce human error
Testing backups to ensure they can be restored successfully
Q12. Why string is immutable?
String is immutable because its value cannot be changed once it is created.
Immutable objects are more secure as they cannot be modified by external sources.
String pool in Java is possible because of immutability.
StringBuffer and StringBuilder classes are used for mutable strings.
Q13. What is a database
A database is a structured collection of data that can be accessed, managed, and updated.
A database stores data in tables with columns and rows
It allows for efficient data retrieval and manipulation
Examples include MySQL, Oracle, and MongoDB
Q14. How do you use logminer?
LogMiner is a utility provided by Oracle to analyze and mine redo log files for data changes.
LogMiner is used to analyze and extract data from redo log files generated by Oracle databases.
It can be used for tasks like auditing, troubleshooting, and recovering lost data.
LogMiner can help track changes made to the database, such as INSERT, UPDATE, and DELETE operations.
Q15. How do you clone database?
Cloning a database involves creating an exact copy of an existing database.
Use database management tools like SQL Server Management Studio or MySQL Workbench to clone a database.
Backup the existing database before cloning to avoid data loss.
Restore the backup file to create a new database with the same schema and data.
Update connection strings and configurations to point to the new cloned database.
Test the cloned database to ensure it functions correctly before using it in pr...read more
Q16. How hashmap works?
Hashmap is a data structure that stores key-value pairs and uses hashing to quickly retrieve values.
Hashmap uses a hash function to map keys to indices in an array.
Collisions can occur when multiple keys map to the same index, which can be resolved using techniques like chaining or open addressing.
Retrieving a value from a hashmap is typically an O(1) operation.
Examples of hashmaps include Python's dictionary and Java's HashMap class.
Q17. Explain sprint
Sprint is a time-boxed period of development in Agile methodology.
Sprint is a fixed duration of time, usually 1-4 weeks, during which a team works on a set of prioritized tasks.
The goal of a sprint is to deliver a potentially shippable product increment.
Sprint planning, daily stand-up meetings, sprint review, and sprint retrospective are key events in a sprint.
Sprint backlog is a list of tasks that the team plans to complete during the sprint.
Example: A software development t...read more
Q18. SQL DML commands with synatxs
SQL DML commands are used to manipulate data in a database.
INSERT: Adds new rows of data into a table
UPDATE: Modifies existing data in a table
DELETE: Removes rows of data from a table
Q19. Use of AI in health care
AI is revolutionizing healthcare by improving diagnostics, personalized treatment, and operational efficiency.
AI can analyze medical images to detect diseases like cancer at an early stage
AI-powered chatbots can provide personalized health advice and support to patients
AI algorithms can predict patient outcomes and recommend treatment plans based on data analysis
AI can streamline administrative tasks in healthcare facilities, reducing costs and improving efficiency
More about working at Deloitte
Top HR Questions asked in Encon Systems International Automation And Robotics
Interview Process at Encon Systems International Automation And Robotics
Top Business Technology Analyst Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month