i
Deloitte
Proud winner of ABECA 2024 - AmbitionBox Employee Choice Awards
Filter interviews by
posted on 20 Feb 2021
I applied via Naukri.com and was interviewed in Jan 2021. There was 1 interview round.
Values can be sent without using sendkeys method by directly manipulating the DOM or using JavaScriptExecutor.
Use JavaScriptExecutor to execute JavaScript code to set values of input fields.
Find the element using appropriate locators and then use JavaScriptExecutor to set the value.
Example: driver.executeScript("document.getElementById('elementId').value='text'");
Collections used in Selenium include List, Set, and Map.
List is used to store a collection of elements in a specific order.
Set is used to store a collection of unique elements.
Map is used to store a collection of key-value pairs.
Examples include List<WebElement>, Set<String>, and Map<String, Object>.
The windowHandles method returns a set of window handles as a set of strings.
The windowHandles method is used to retrieve all the window handles of the current session.
The return type is set because it ensures that each window handle is unique and there are no duplicates.
The set data structure allows for efficient retrieval and manipulation of window handles.
Example: Set<String> handles = driver.getWindowHandles(
Test cases can be prioritized in TestNG using priority attribute.
Add priority attribute to @Test annotation
Test cases with lower priority value will be executed first
Priority can be any integer value, default is 0
Parallel testing can be achieved by dividing test cases into smaller chunks and running them simultaneously on multiple machines.
Divide test cases into smaller chunks
Use a test framework that supports parallel testing
Run tests on multiple machines or virtual machines
Ensure tests do not interfere with each other
Aggregate test results from all machines
Failed test cases can be rerun in TestNG using the 'rerun-failed.xml' file.
Create a new XML file named 'rerun-failed.xml'
Add the failed test cases to the XML file using the 'include' tag
Run the 'rerun-failed.xml' file using TestNG
Test automation framework can be implemented by following these steps:
Identify the testing requirements
Choose the appropriate tools and technologies
Design the framework architecture
Develop and integrate the framework components
Create test scripts and execute them
Integrate with CI/CD pipeline
Maintain and update the framework regularly
HTTP is a protocol for transmitting data over the internet, while HTTPS is a secure version of HTTP that encrypts the data.
HTTP stands for Hypertext Transfer Protocol, while HTTPS stands for Hypertext Transfer Protocol Secure.
HTTP operates on port 80, while HTTPS operates on port 443.
HTTP is not secure and data is transmitted in plain text, while HTTPS uses SSL/TLS encryption to secure the data transmission.
HTTPS is co...
Rest-assured is a Java-based library used for testing RESTful APIs.
Rest-assured simplifies the testing of RESTful APIs by providing a domain-specific language (DSL) for writing tests.
To handle certificate issues in rest-assured, we can use the relaxedHTTPSValidation() method to bypass SSL certificate validation.
We can also import the certificate into the truststore and use it for SSL validation.
requestSpecification is a class in RestAssured library used to define the request details for API testing.
It is used to set the base URI, path, headers, query parameters, etc. for the API request.
It allows customization of the request before sending it.
Serialization is the process of converting an object into a format that can be stored or transmitted.
In API testing, serialization is used to convert Java objects into J...
Status codes are used in API's to indicate the outcome of a request.
Status codes are three-digit numbers that are returned by the server in response to a client's request.
They indicate whether the request was successful or not, and if not, what went wrong.
Some common status codes include 200 (OK), 404 (Not Found), and 500 (Internal Server Error).
To post a value in a server, you need to consider the endpoint, request method, headers, body, and authentication.
Identify the endpoint where the value needs to be posted
Choose the appropriate request method (e.g., POST)
Set the necessary headers (e.g., Content-Type)
Construct the body payload with the value to be posted
Handle authentication if required (e.g., API key, token)
Common exceptions in Selenium automation include NoSuchElementException, TimeoutException, and StaleElementReferenceException.
NoSuchElementException occurs when an element cannot be found in the DOM.
TimeoutException occurs when a command takes longer than the timeout value to complete.
StaleElementReferenceException occurs when an element is no longer attached to the DOM.
Other exceptions include ElementNotVisibleExcepti...
I faced arrayIndexOutOfBoundary exception while accessing an array element beyond its size.
The exception occurred when trying to access an array element at an index greater than or equal to its size.
To fix it, I checked the array size before accessing its elements.
I also made sure to properly initialize the array with the correct size.
Example: String[] arr = new String[5]; arr[5] = "hello"; // throws exception
Jenkins is an open-source automation server that helps to automate parts of the software development process.
Jenkins is used for continuous integration and continuous delivery (CI/CD) of software projects.
It can be integrated with Git to create a pipeline for building, testing, and deploying code.
The Git pipeline in Jenkins involves creating a Jenkinsfile that defines the stages of the pipeline, such as checkout, build...
Git flow is a branching model for software development.
Git flow consists of two main branches: master and develop.
Feature branches are created off of develop and merged back into it.
Release branches are created off of develop for preparing a new release.
Hotfix branches are created off of master to fix critical issues in production.
Git flow helps to maintain a structured and organized workflow for development.
Example: g...
Excel reading involves extracting data from an Excel file using programming languages.
Excel files can be read using libraries like Apache POI, OpenPyXL, and xlrd.
Data can be extracted from specific cells or entire sheets.
Excel files can be read in various formats like .xls, .xlsx, and .csv.
Extent Reports Config is a Java library used for generating interactive HTML reports for test automation results.
Extent Reports Config is used to customize the look and feel of the generated reports.
It allows users to add or remove report sections, change report themes, and configure report settings.
Users can also add custom logos, CSS, and JavaScript to the reports.
Extent Reports Config can be integrated with various ...
I applied via Campus Placement and was interviewed before Nov 2020. There was 1 interview round.
Program to calculate factorial
Use a loop to multiply the numbers from 1 to n
Handle edge cases like 0 and negative numbers
Use recursion for a more elegant solution
I applied via Campus Placement and was interviewed before May 2021. There were 3 interview rounds.
Internal case of a biscuit manufacturing company. Details about company background, sales, figures are given and based on those 3 questions were asked.
Part 2 of the same case study was asked where the company should go for IPO or expansion in local market. based on the facts, decision and justification had to be given
I am a highly experienced consultant with a strong background in problem-solving and strategic planning.
Over 10 years of experience in consulting for various industries
Expertise in analyzing complex business challenges and providing effective solutions
Proven track record of delivering successful projects on time and within budget
Strong communication and interpersonal skills, able to build rapport with clients
Ability to...
I applied via Naukri.com and was interviewed before Oct 2020. There were 3 interview rounds.
Query to retrieve all customer names starting with A.
Use the SELECT statement to retrieve customer names.
Use the LIKE operator with the pattern 'A%' to match names starting with A.
Specify the table and column name where the customer names are stored.
Example: SELECT customer_name FROM customers WHERE customer_name LIKE 'A%';
I applied via Recruitment Consultant and was interviewed before Oct 2020. There were 3 interview rounds.
I applied via Campus Placement and was interviewed in Oct 2020. There were 3 interview rounds.
Digitising NBFC loan disbursement involves implementing a digital platform for loan application, approval, and disbursement.
Develop a user-friendly digital platform for loan application and approval
Integrate the platform with credit bureaus for credit checks and risk assessment
Implement e-signature and e-KYC for paperless verification
Use APIs to connect with banks for fund transfer
Ensure data security and compliance wi...
I applied via Naukri.com and was interviewed in May 2020. There were 3 interview rounds.
I applied via Referral and was interviewed before Jan 2020. There were 3 interview rounds.
I applied via Referral and was interviewed before May 2020. There were 4 interview rounds.
Money laundering is the process of making illegally obtained money appear legal.
Money is moved through a series of transactions to conceal its origin
The money is often invested in legitimate businesses or assets
The launderer may use shell companies or offshore accounts to hide the money
Examples include drug trafficking, embezzlement, and tax evasion
Money laundering is a serious crime with severe penalties
Some of the top questions asked at the Deloitte Sdet (Software Development Engineer in Test) interview -
Consultant
34.8k
salaries
| ₹6.5 L/yr - ₹28.2 L/yr |
Senior Consultant
22k
salaries
| ₹11 L/yr - ₹42 L/yr |
Analyst
14.8k
salaries
| ₹3.8 L/yr - ₹12.9 L/yr |
Assistant Manager
10.4k
salaries
| ₹7.8 L/yr - ₹28 L/yr |
Manager
7.3k
salaries
| ₹16 L/yr - ₹52 L/yr |
Accenture
PwC
Ernst & Young
Cognizant