Deutsche Telekom Digital Labs
40+ Unique Autoweld Systems Interview Questions and Answers
Q1. Multithreading- Write program to print even and odd numbers from 1 to 20 using 2 threads. 1 thread will responsible for printing even and another for Odd. And print in such a manner it should be alternate. (can...
read moreProgram to print even and odd numbers from 1 to 20 using 2 threads alternately.
Create two threads, one for printing even numbers and one for printing odd numbers.
Use wait(), notify(), and notifyAll() to ensure alternate printing.
Ensure synchronization between the two threads to avoid race conditions.
Example: Thread 1 prints even numbers (2, 4, 6, ...) and Thread 2 prints odd numbers (1, 3, 5, ...).
Q2. What is the purpose of using default methods in java8?
Default methods in Java 8 allow interfaces to have method implementations, enabling backward compatibility and reducing code duplication.
Default methods were introduced in Java 8 to provide a way to add new methods to interfaces without breaking existing implementations.
They allow interfaces to have method implementations, which was not possible before Java 8.
Default methods can be overridden in implementing classes to provide specific implementations.
They help in reducing co...read more
Q3. How microservices communicate with each other
Microservices communicate with each other through APIs, messaging queues, or service meshes.
APIs: Microservices can communicate with each other by exposing APIs that allow them to send and receive data.
Messaging queues: Microservices can use messaging queues like RabbitMQ or Kafka to send messages to each other asynchronously.
Service meshes: Microservices can communicate through a service mesh like Istio, which handles communication, security, and monitoring between services.
Q4. Gave one scenario to solve using streams in java8
Using streams in Java 8 to filter and map a list of numbers
Create a list of numbers
Use stream to filter out even numbers
Use map to square each number
Collect the results into a new list
Q5. Complete flow and business use case of the project
The project involves creating a web-based platform for online shopping with features like user registration, product browsing, shopping cart, and payment processing.
User registers on the platform with personal information
User browses products by category or search
User adds products to the shopping cart
User proceeds to checkout and makes payment
Order is confirmed and user receives a confirmation email
Q6. Purpose of @SpringBootApplication annotation?
Annotation used to mark a class as a Spring Boot application
Combines @Configuration, @EnableAutoConfiguration, and @ComponentScan annotations
Used to bootstrap and launch a Spring application
Automatically scans for Spring components in the package and sub-packages
Q7. what are microservices?
Microservices are a software development technique where an application is composed of small, independent services that communicate with each other.
Microservices are designed to be small, focused on specific tasks, and independently deployable.
Each microservice typically runs its own process and communicates with other services through APIs.
Microservices allow for easier scalability, flexibility, and maintenance compared to monolithic architectures.
Examples of companies using...read more
Q8. Design a custom recyclerview with appropriate data structures
Custom recyclerview with appropriate data structures
Create a custom adapter extending RecyclerView.Adapter
Implement onCreateViewHolder() and onBindViewHolder() methods
Use appropriate data structures like ArrayList or HashMap for efficient data handling
Implement onClickListener for item clicks
Use ViewHolder pattern for efficient view recycling
Q9. Why strings immutable
Strings are immutable to ensure data integrity and security.
Immutable strings prevent accidental changes to data
Immutable strings allow for safe sharing of data between different parts of a program
Immutable strings help prevent security vulnerabilities like SQL injection attacks
Q10. what are checked exceptions
Checked exceptions are exceptions that must be either caught or declared in the method signature.
Checked exceptions are subclasses of Exception (excluding RuntimeException and its subclasses)
Checked exceptions must be either caught using try-catch block or declared in the method signature using 'throws' keyword
Examples of checked exceptions in Java include IOException, SQLException, and ClassNotFoundException
Q11. Difference between static and final
Static is used to define class-level variables and methods, while final is used to define constants that cannot be changed.
Static variables belong to the class itself, while final variables are constants that cannot be modified.
Static methods can be called without creating an instance of the class, while final methods cannot be overridden.
Static variables are shared among all instances of a class, while final variables have the same value for all instances.
Example: 'static in...read more
Q12. Describe Java8 Features
Java8 introduced several new features including lambda expressions, functional interfaces, streams, and default methods.
Lambda expressions allow you to write code in a more concise and readable way.
Functional interfaces are interfaces with a single abstract method, which can be implemented using lambda expressions.
Streams provide a way to work with collections of objects in a functional style.
Default methods allow interfaces to have methods with implementations.
Other features...read more
Q13. ArraysList vs LinkedList
ArrayList is better for random access, LinkedList is better for frequent insertions/deletions.
ArrayList uses dynamic array to store elements, LinkedList uses doubly linked list.
ArrayList provides fast random access to elements using index, LinkedList provides fast insertion/deletion at any position.
Example: ArrayList is suitable for scenarios where random access is required like searching, LinkedList is suitable for scenarios where frequent insertions/deletions are needed lik...read more
Q14. 1 Java8 streams problem
Using Java8 streams to solve a problem
Use stream() method to convert a collection into a stream
Use filter() method to filter elements based on a condition
Use map() method to transform elements
Use collect() method to collect the elements into a new collection
Q15. Design a hashmap, and optimise it
Design and optimize a hashmap
Choose a good hash function to minimize collisions
Implement dynamic resizing to handle increasing load factor
Consider using open addressing or separate chaining for collision resolution
Use an efficient data structure for storing key-value pairs, such as an array or linked list
Q16. Use of @Qualifier
Annotation used in Spring to specify which bean to autowire
Used to disambiguate when multiple beans of the same type are present
Can be used with @Autowired to specify which bean to inject
Helps in resolving dependencies when multiple beans of the same type are available
Q17. Reverse a linked list
Reverse a linked list by changing the next pointers of each node
Iterate through the linked list and change the next pointers to reverse the list
Use three pointers - prev, current, and next to keep track of nodes
Example: 1 -> 2 -> 3 -> 4 -> null, after reversing: 4 -> 3 -> 2 -> 1 -> null
Q18. Minimum element in an array
Find the minimum element in an array of strings
Iterate through the array and compare each element to find the minimum
Use built-in functions like Math.min() or sort() to find the minimum
Handle edge cases like empty array or array with only one element
Q19. What is selenium rc how u can run screept on different stage
Selenium RC is a deprecated tool for automating web browsers. Scripts can be run on different stages using different configurations.
Selenium RC stands for Remote Control
It allows running tests on multiple browsers and platforms
Scripts can be run on different stages by changing the configuration settings
Selenium RC is now deprecated and replaced by Selenium WebDriver
Q20. How Services interact with each other in k8s.
Services in k8s interact with each other through DNS-based service discovery and communication via network requests.
Services are assigned a DNS name which other services can use to communicate with them
Services can communicate with each other using the DNS name or IP address and port number
Communication between services can be within the same namespace or across namespaces
Services can also use Kubernetes Ingress to expose HTTP and HTTPS routes to external services
Q21. Sorry Array on the basis of alphabetical order of keys
Sort an array of strings based on alphabetical order of keys
Use the sort() method with a custom compare function to sort the array alphabetically
The compare function should compare the keys of the strings using localeCompare() method
Example: ['banana', 'apple', 'cherry'] should be sorted as ['apple', 'banana', 'cherry']
Q22. Culture fit and proformace enchancement in current project
Culture fit and performance enhancement are crucial for success in the current project.
Creating a positive and inclusive work environment can improve culture fit.
Encouraging open communication and collaboration among team members.
Providing opportunities for professional development and growth.
Recognizing and rewarding individual and team achievements.
Regularly seeking feedback from team members to identify areas for improvement.
Q23. Design a cola can dispursal machine at an airport for blind people
A cola can dispensing machine designed for blind people at airports
Include braille labels for different soda options
Utilize voice activation for selecting and dispensing drinks
Provide tactile buttons for navigation and confirmation
Offer audio feedback for successful dispensing
Ensure easy reach and accessibility for all users
Q24. Designing Scalable system and data structure
Designing scalable systems involves creating efficient data structures to handle large amounts of data and traffic.
Consider using distributed systems to handle high traffic loads.
Use data partitioning to distribute data across multiple servers.
Optimize data structures for quick access and retrieval.
Implement caching mechanisms to reduce load on the system.
Regularly monitor and optimize system performance to ensure scalability.
Example: Designing a social media platform that ca...read more
Q25. Slenium is good tool or manual testing is good?
Selenium is a good tool for automated testing, while manual testing is essential for certain scenarios.
Selenium is great for automating repetitive test cases and regression testing
Manual testing is important for exploratory testing and usability testing
Combining both Selenium and manual testing can provide comprehensive test coverage
Q26. whats is oops and protcols
OOPs stands for Object-Oriented Programming and protocols are a set of rules for communication between devices.
OOPs is a programming paradigm that uses objects and classes to design applications.
Protocols are a set of rules that define how data is transmitted between devices.
In OOPs, objects have attributes and methods that define their behavior.
Examples of OOPs languages include Java, C++, and Python.
Examples of protocols include HTTP, TCP/IP, and SMTP.
Q27. Two Strings are anagram or not
Check if two strings are anagrams by comparing the frequency of characters.
Create two arrays to store the frequency of characters for each string.
Compare the frequency arrays to check if they are anagrams.
Example: 'listen' and 'silent' are anagrams.
Q28. differnce between public private
Public and private sectors differ in ownership, funding, and management.
Public sector is owned and operated by the government, while private sector is owned and operated by individuals or companies.
Public sector is funded by taxpayer money, while private sector is funded by investors or owners.
Public sector is managed by government officials, while private sector is managed by business owners or executives.
Q29. what is a class
A class is a blueprint for creating objects in object-oriented programming.
Classes define the properties and behaviors of objects.
Objects are instances of classes.
Classes can inherit properties and behaviors from other classes.
Encapsulation, inheritance, and polymorphism are key concepts in class-based programming.
Q30. Low level design of UPI system
The low level design of a UPI system involves defining the architecture, data flow, and components at a detailed level.
Define the architecture of the UPI system, including client-server communication, data storage, and security measures.
Identify the different components of the UPI system, such as user interface, payment processing, and database management.
Specify the data flow within the UPI system, including how user requests are processed, transactions are authenticated, an...read more
Q31. Explain about your framework
Our framework is a hybrid framework that combines data-driven and keyword-driven approaches.
Our framework uses Excel sheets to store test data and test cases.
We have created custom keywords for frequently used actions.
We use Selenium WebDriver for web application testing.
Our framework supports parallel execution of test cases.
We have integrated our framework with Jenkins for continuous integration.
We have also implemented logging and reporting features.
Our framework is scalab...read more
Q32. What is test framework?
A test framework is a set of guidelines or rules used for creating and designing test cases and test scripts.
Test framework provides structure and organization for testing activities
It includes tools, libraries, coding standards, and best practices
Examples include Selenium for web testing, JUnit for unit testing
Q33. How to do automation testing?
Automation testing involves using tools to execute test cases and compare actual outcomes with expected outcomes.
Identify test cases that can be automated
Select appropriate automation tools like Selenium, Appium, etc.
Develop test scripts to automate test cases
Execute test scripts and analyze results
Integrate automation testing into CI/CD pipeline for continuous testing
Q34. how do you see adding value to the org
I see adding value to the organization by implementing innovative branding strategies, enhancing customer engagement, and driving revenue growth.
Developing and executing creative branding campaigns to increase brand awareness
Utilizing data analytics to identify target audience and optimize marketing efforts
Collaborating with cross-functional teams to ensure brand consistency across all channels
Implementing customer feedback mechanisms to improve products and services
Exploring...read more
Q35. what is linked list
A linked list is a data structure where each element is a separate object, connected to the next element by a pointer.
Consists of nodes where each node contains data and a reference to the next node
Dynamic in size and can grow or shrink during execution
Common operations include insertion, deletion, and traversal
Example: Singly linked list, Doubly linked list, Circular linked list
Q36. Design a storage similar to S3
Design a scalable and reliable storage system similar to S3.
Use distributed architecture to handle large amounts of data
Implement data redundancy and replication for high availability
Provide a simple API for easy access and management
Support for different storage classes like standard, infrequent access, and archive
Include features like versioning, encryption, and lifecycle policies
Q37. previous project architecture
Previous project architecture involved microservices with Docker containers and Kubernetes for orchestration.
Utilized microservices architecture for scalability and flexibility
Deployed services in Docker containers for easy portability and consistency
Managed containerized applications with Kubernetes for automated scaling and orchestration
Q38. write code for star paattern
Code for star pattern using nested loops
Use nested loops to print the desired pattern
Outer loop controls the number of rows and inner loop controls the number of stars in each row
Example: for a pattern with 5 rows, the code would involve two nested loops to print stars in a pyramid shape
Q39. Any experience in cloud security
Yes, I have experience in cloud security with a focus on securing data and applications in cloud environments.
Implemented security measures to protect data stored in cloud services
Configured and monitored security controls in cloud platforms like AWS and Azure
Performed regular security assessments and audits to identify vulnerabilities
Developed incident response plans for cloud security breaches
Stayed updated on industry best practices and compliance regulations for cloud sec...read more
Q40. Jenkins Master Node Setup.
Setting up a Jenkins master node involves installing Jenkins, configuring plugins, setting up security, and managing nodes.
Install Jenkins on a server
Configure necessary plugins for your project
Set up security measures such as user authentication and authorization
Manage nodes for distributing workload
Q41. Design a distributed Cache
Design a distributed Cache
Use consistent hashing to distribute data across multiple nodes
Implement replication for fault tolerance
Consider data eviction policies like LRU or LFU
Use a distributed coordination service like ZooKeeper or etcd for node coordination
Q42. AWS services used ?
Various AWS services are used in DevOps such as EC2, S3, RDS, Lambda, CloudFormation, and more.
EC2 - for scalable computing capacity
S3 - for object storage
RDS - for managed relational databases
Lambda - for serverless computing
CloudFormation - for infrastructure as code
Q43. Second smallest integer in array
Find the second smallest integer in an array of strings.
Convert the array of strings to an array of integers.
Sort the array of integers in ascending order.
Return the second element in the sorted array.
Q44. Design CI CD Pipeline
Q45. Setting up DR across Region
Q46. Shortest path algorithm
Shortest path algorithm finds the shortest path between two nodes in a graph.
Dijkstra's algorithm is a popular shortest path algorithm that uses a priority queue to find the shortest path in a weighted graph.
A* algorithm is another popular shortest path algorithm that uses heuristics to guide the search towards the goal node.
Bellman-Ford algorithm is used for finding the shortest path in a graph with negative edge weights.
Q47. Soap Vs Rest API
Q48. Reverse given string
Reverse a given string
Use a loop to iterate through the characters of the string and build a new string in reverse order
Alternatively, use built-in functions like reverse() or StringBuilder in some programming languages
Ensure to handle edge cases like empty string or null input
Top HR Questions asked in Unique Autoweld Systems
Interview Process at Unique Autoweld Systems
Top Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month