DELTA
10+ Impelsys Interview Questions and Answers
Q1. how to achieve aws cross account sharing?
AWS cross account sharing can be achieved by using IAM roles and policies.
Create an IAM role in the account that will share resources
Define a trust policy in the role to allow the other account to assume the role
Attach a policy to the role granting the necessary permissions
In the receiving account, create an IAM role with a trust policy allowing the sharing account to assume the role
Use the AWS CLI or console to assume the role and access the shared resources
Q2. Difference between logical plan and physical plan in pyspark?
Logical plan represents the high-level abstract representation of the computation to be performed, while physical plan represents the actual execution plan with specific optimizations and details.
Logical plan is a high-level abstract representation of the computation to be performed.
Physical plan is the actual execution plan with specific optimizations and details.
Logical plan is created first and then optimized to generate the physical plan.
Physical plan includes details lik...read more
Q3. write a python program to greoup annagram
Python program to group anagrams in an array of strings
Create a dictionary to store sorted strings as keys and corresponding anagrams as values
Iterate through the array of strings, sort each string and add it to the dictionary
Return the values of the dictionary as grouped anagrams
Q4. What is ACL,what is routing,tell something about switching and osi layers
ACL is Access Control List used to control network traffic. Routing is the process of forwarding data packets between networks. Switching is the process of forwarding data packets between devices. OSI layers are a model for understanding and designing computer networks.
ACL is used to filter network traffic based on rules and policies.
Routing involves selecting the best path for data packets to travel between networks.
Switching involves forwarding data packets between devices ...read more
Q5. Explain Spark architecture
Spark architecture is based on a master-slave architecture with a cluster manager to coordinate tasks.
Spark has a master node that manages the cluster and worker nodes that execute tasks.
It uses a cluster manager like YARN or Mesos to allocate resources and schedule tasks.
Spark applications are run as independent sets of processes on a cluster, coordinated by the SparkContext object.
It has a resilient distributed dataset (RDD) abstraction for efficient data processing.
Spark S...read more
Q6. Do you know Dynatrace, sumologic tools?
Yes, I am familiar with Dynatrace and Sumo Logic tools.
I have experience using Dynatrace for application performance monitoring and management.
I have used Sumo Logic for log management and analytics.
I am proficient in setting up alerts, dashboards, and troubleshooting issues using these tools.
Q7. What is SAML flow?
SAML flow is a process for exchanging authentication and authorization data between identity providers and service providers.
SAML flow involves the exchange of XML-based security assertions.
It typically includes steps such as authentication request, response, and validation.
SAML flow can be initiated by a user trying to access a service that requires authentication.
It helps establish trust between different systems by securely exchanging identity information.
Q8. How to Diploy 3 tier Application
Deploying a 3 tier application involves setting up separate layers for presentation, application logic, and data storage.
Set up the presentation layer on a web server, such as Apache or Nginx.
Deploy the application logic layer on application servers, like Tomcat or JBoss.
Utilize a database server, such as MySQL or PostgreSQL, for the data storage layer.
Ensure proper communication and connectivity between the layers.
Use tools like Docker or Kubernetes for containerization and ...read more
Q9. Explain flows in OAUTH?
OAUTH flows are different ways in which a client application can obtain authorization to access resources on behalf of a user.
Authorization Code Flow: Client exchanges an authorization code for an access token.
Implicit Flow: Client receives access token directly.
Client Credentials Flow: Client uses its own credentials to authenticate and receive access token.
Resource Owner Password Credentials Flow: Client collects user's credentials and exchanges them for access token.
Q10. Difference between industry 4.0 and 5.0.
Industry 4.0 focuses on automation and data exchange in manufacturing, while Industry 5.0 emphasizes human-machine collaboration and personalized production.
Industry 4.0 is characterized by the use of IoT, AI, and big data analytics to automate processes and improve efficiency.
Industry 5.0 integrates human workers with advanced robotics and AI systems to create a more flexible and personalized production environment.
Industry 4.0 aims for mass production with minimal human int...read more
Q11. Pcb techniques , types of pcb
PCB techniques involve designing and manufacturing printed circuit boards using various methods.
Types of PCB include single-sided, double-sided, and multi-layered PCBs.
PCB techniques include surface mount technology (SMT) and through-hole technology (THT).
Other techniques include flexible PCBs, rigid-flex PCBs, and high-frequency PCBs.
PCBs can also be classified based on materials used, such as FR-4, polyimide, and Rogers materials.
Q12. Static in java, final
Static keyword in Java is used to create class-level variables and methods, while final keyword is used to make variables constant.
Static keyword is used to create variables and methods that belong to the class itself, rather than instances of the class.
Final keyword is used to make variables constant and cannot be changed once initialized.
Static variables are shared among all instances of a class, while final variables are unique to each instance.
Q13. Collection in java
Collection in Java refers to a group of objects that are stored and manipulated together.
Collections framework in Java provides interfaces (e.g. List, Set, Map) and classes (e.g. ArrayList, HashSet, HashMap) for storing and manipulating collections of objects.
Collections can store objects of any type, including primitive types.
Collections provide methods for adding, removing, and accessing elements in the collection.
Collections can be iterated over using loops or streams.
Exam...read more
Top HR Questions asked in Impelsys
Interview Process at Impelsys
Top Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month