Add office photos
Engaged Employer

DXC Technology

3.7
based on 9.5k Reviews
Filter interviews by

400+ Interview Questions and Answers

Updated 16 Dec 2024
Popular Designations

Q1. If someone has deleted the table in a database, then how can you find out the user that has deleted the table ? Can you find out using the log file? Can you retsore the table using the tail log backup?

Ans.

Yes, the user who deleted the table can be identified using the transaction log file.

  • To find out the user who deleted the table, you can query the transaction log file using the fn_dblog function.

  • The transaction log contains information about all the transactions performed on the database, including the table deletion.

  • By analyzing the log records, you can identify the specific transaction that deleted the table and retrieve the associated user information.

  • Restoring the table ...read more

View 2 more answers
Q2. Count Ways To Reach The N-th Stairs

You have been given a number of stairs. Initially, you are at the 0th stair, and you need to reach the Nth stair. Each time you can either climb one step or two steps. You are...read more

View 4 more answers

Q3. 1. Describe project 2. What do you understand by OOPs. 3. What all Access modifiers are there in Java. 4. Difference between protected and default. 5. Overloading and overriding (difference, example and questio...

read more
Ans.

Interview questions for Software Engineer position

  • Describe a project you have worked on

  • Explain OOPs concepts and access modifiers in Java

  • Differentiate between protected and default access modifiers

  • Provide examples and differences between overloading and overriding

  • Use Java 8 to find even numbers in a list and to find the square of elements in a list using lambda expressions

  • Write a template for a REST controller with different HTTP methods

  • Provide the URI for deleting a request

  • W...read more

Add your answer

Q4. What is the default port of sql server & Can we change the default port, if so where can we change it?

Ans.

The default port of SQL Server is 1433. Yes, we can change the default port by modifying the SQL Server Configuration Manager.

  • The default port for SQL Server is 1433.

  • To change the default port, open SQL Server Configuration Manager.

  • Navigate to SQL Server Network Configuration and select Protocols for the desired SQL Server instance.

  • Right-click on TCP/IP and choose Properties.

  • In the IP Addresses tab, scroll down to the IPAll section.

  • Change the TCP Port value to the desired por...read more

View 2 more answers
Discover null interview dos and don'ts from real experiences

Q5. What is the default isolation level in sql server? What happens with that isolation level ?

Ans.

The default isolation level in SQL Server is READ COMMITTED. It ensures that each transaction sees only committed data.

  • The default isolation level in SQL Server is READ COMMITTED.

  • READ COMMITTED ensures that each transaction sees only committed data.

  • It provides a balance between concurrency and data consistency.

  • Under READ COMMITTED, a transaction can read data that has been modified by another transaction but not yet committed.

  • However, it cannot read uncommitted data or data m...read more

View 2 more answers

Q6. What is the backup strategy for the biggest database you handled?

Ans.

The backup strategy for the biggest database I handled involved regular full backups, daily differential backups, and hourly transaction log backups.

  • Regular full backups were performed to capture the entire database.

  • Daily differential backups were taken to capture the changes since the last full backup.

  • Hourly transaction log backups were taken to capture the changes since the last differential backup.

  • Backups were stored on separate storage devices to ensure data redundancy.

  • Ba...read more

View 1 answer
Are these interview questions helpful?

Q7. OOPs features, what is a carriage return, the syntax for making a 2D matrix, what is nested loop incase of the switch statement

Ans.

Questions on OOPs features, carriage return, 2D matrix syntax, and nested loops in switch statement.

  • OOPs features include encapsulation, inheritance, and polymorphism.

  • A carriage return is a character that moves the cursor to the beginning of the next line.

  • The syntax for making a 2D matrix is: int matrix[][] = new int[rows][columns];

  • A nested loop in a switch statement is used to handle multiple cases with the same code block.

Add your answer

Q8. When we run CheckDB, what command it runs in the background ?

Ans.

CheckDB runs DBCC CHECKDB command in the background.

  • CheckDB is a command used to check the logical and physical integrity of all objects in the specified database.

  • DBCC CHECKDB is the command that CheckDB runs in the background.

  • DBCC CHECKDB checks the allocation and structural integrity of all the objects in the specified database.

  • DBCC CHECKDB also checks for common errors like torn pages, index and data page corruptions, etc.

View 1 answer
Share interview questions and help millions of jobseekers 🌟

Q9. Can you write the codee which is shown below in any of the languages which you know?

Ans.

Yes, I can write the code in multiple languages.

  • I am proficient in multiple programming languages such as Java, Python, C++, and JavaScript.

  • I can write the code in any of these languages based on the requirements.

  • The code shown in the question is not provided, so I cannot provide an example.

  • However, I can assure you that I have the necessary skills to write the code in any language.

Add your answer

Q10. What are blockings ? What are deadlocks and difference to blockings ?

Ans.

Blockings occur when one transaction holds a lock on a resource, preventing other transactions from accessing it. Deadlocks are a specific type of blocking where two or more transactions are waiting for each other to release resources.

  • Blockings happen when one transaction holds a lock on a resource and other transactions are blocked from accessing it.

  • Deadlocks occur when two or more transactions are waiting for each other to release resources, resulting in a deadlock situatio...read more

View 1 answer

Q11. How to send a file without any internet connection if you are in first floor and your coligue was in second floor?

Ans.

Use a physical medium like a USB drive or a portable storage device to transfer the file.

  • Physically carry the file on a USB drive or portable storage device.

  • Use a local network connection to transfer the file between the two floors.

  • Utilize Bluetooth or other wireless technologies to transfer the file.

  • If the distance is short, use a physical method like printing the file and physically handing it over.

View 1 answer

Q12. What to do if an email is stuck in outbox in Outlook?

Ans.

Check network connection, try resending, check email size and attachments.

  • Check network connection and ensure it's stable.

  • Try resending the email by clicking on the 'Send/Receive' button.

  • Check the email size and attachments. Large files may cause the email to get stuck.

  • Restart Outlook and try sending the email again.

  • Check if the email is being blocked by antivirus or firewall software.

  • Delete the email from the Outbox and try sending it again.

Add your answer

Q13. When to update statistics with respect to index rebuild and reorganize ? (Maintenance plans)

Ans.

Updating statistics is necessary after index rebuild or reorganize to ensure query optimization.

  • Statistics provide information about the distribution of data in a table or index.

  • Index rebuild or reorganize can change the distribution of data, making old statistics inaccurate.

  • Outdated statistics can lead to poor query performance.

  • Updating statistics after index rebuild or reorganize ensures query optimization.

  • Maintenance plans can be set up to automate this process.

Add your answer

Q14. What is the database size you jave used in your previous project?

Ans.

The database size I have used in my previous project was approximately 500 GB.

  • The database size was around 500 GB.

  • It contained various tables, indexes, and stored procedures.

  • The data included millions of records from different sources.

  • We regularly optimized the database to ensure efficient performance.

  • Backup and recovery strategies were implemented to safeguard the data.

View 1 answer

Q15. How to index reorganize and index rebuild based on index fragmentation?

Ans.

Index reorganize and rebuild based on fragmentation level

  • For fragmentation level < 5%, use reorganize

  • For fragmentation level > 30%, use rebuild

  • For fragmentation level between 5% and 30%, choose based on table size and usage

  • Use ALTER INDEX statement to perform reorganize or rebuild

  • Monitor fragmentation level regularly to maintain optimal performance

Add your answer

Q16. What is the parameter (-1) used in DBCC TRACEON(1204,-1) ? Why it is used?

Ans.

Parameter (-1) in DBCC TRACEON(1204,-1) is used to enable deadlock tracing for all sessions.

  • DBCC TRACEON(1204,-1) enables deadlock tracing for all sessions

  • The parameter -1 specifies that the trace flag should be enabled for all sessions

  • Deadlock tracing helps identify and resolve deadlocks in SQL Server

Add your answer

Q17. While applyong patching, some msi files are missing ? How do you resolve this?

Ans.

Check if the missing msi files are required for the patch. If yes, download and install them.

  • Verify if the missing msi files are essential for the patch

  • Check if the msi files are available in the original installation media or backup

  • If not, download the missing msi files from the vendor's website

  • Install the missing msi files before applying the patch

Add your answer

Q18. What is the difference between Abstraction and Interface?

Ans.

Abstraction is hiding implementation details while Interface is a contract for implementing classes.

  • Abstraction is achieved through abstract classes and methods.

  • Interface defines a set of methods that a class must implement.

  • Abstraction focuses on hiding complexity and providing a simpler interface.

  • Interface focuses on defining a standard for communication between classes.

  • Abstraction is a way to achieve modularity and maintainability.

  • Interface is a way to achieve polymorphism ...read more

Add your answer

Q19. What is the difference between Summary.txt and Detail.txt ?

Ans.

Summary.txt contains summarized information while Detail.txt contains detailed information.

  • Summary.txt provides a brief overview of data while Detail.txt provides a more comprehensive view.

  • Summary.txt may contain aggregated data while Detail.txt contains individual data points.

  • Summary.txt is useful for quick analysis while Detail.txt is useful for in-depth analysis.

  • Example: Summary.txt may contain total sales for a month while Detail.txt contains sales data for each day of th...read more

Add your answer

Q20. Do you use any monitoring tool for monitoring Sql server?

Ans.

Yes, I use SQL Server Management Studio (SSMS) and SQL Server Profiler for monitoring SQL Server.

  • I use SSMS to monitor server activity, query performance, and resource usage.

  • I use SQL Server Profiler to capture and analyze SQL Server events and performance data.

  • I also use third-party tools like SolarWinds Database Performance Analyzer and Redgate SQL Monitor for more advanced monitoring and alerting.

  • Regularly monitoring SQL Server helps identify and resolve performance issues...read more

Add your answer

Q21. What is IP address What are the classes of IP What is workgroup and domain What is BSOD What is 32 bit and 64 bit OS SSD vs HDD explain windows boot process System keeps restarting. Steps to resolve how to reco...

read more
Ans.

IP address is a unique identifier assigned to each device connected to a network. Classes of IP include A, B, C, D, and E. Workgroup and domain are network organization structures. BSOD is Blue Screen of Death.

  • IP address is a unique numerical label assigned to each device on a network

  • Classes of IP include A, B, C, D, and E with different ranges of addresses

  • Workgroup is a peer-to-peer network where each computer has its own security settings, while domain is a centralized netw...read more

Add your answer
Q22. OOPS Question

Difference between C++ and Java

Add your answer

Q23. why java is preferred? whats the benefit of functional programming and why introduced in java. what are wrapper classes, fibonaaci series , whats the use of join? what is threadinterrupted exception ? how hashm...

read more
Ans.

Answers to various technical questions related to Java programming.

  • Java is preferred for its platform independence, object-oriented nature, and vast community support.

  • Functional programming in Java allows for more concise and readable code, and better support for parallel processing.

  • Wrapper classes are used to convert primitive data types into objects, and vice versa.

  • Fibonacci series is a sequence of numbers where each number is the sum of the two preceding ones.

  • Join is a met...read more

Add your answer

Q24. What is perform? Mention its different types.

Ans.

Perform refers to carrying out a task or activity. Its types include job performance, academic performance, and athletic performance.

  • Perform refers to the execution of a task or activity.

  • Job performance refers to how well an employee performs their job duties.

  • Academic performance refers to a student's success in their studies.

  • Athletic performance refers to an athlete's ability to perform in their sport.

  • Other types of performance include musical performance, theatrical perform...read more

Add your answer

Q25. What is the difference between a table and a view?

Ans.

A table is a physical storage structure while a view is a virtual table created from a query.

  • A table stores data in a structured manner while a view is a virtual table created from a query.

  • A table can have indexes and constraints while a view cannot.

  • A table can be updated, inserted or deleted while a view cannot be directly modified.

  • A view can be used to simplify complex queries or restrict access to certain columns of a table.

  • Example: A table named 'employees' can have a vie...read more

Add your answer
Q26. Computer Network Question

What is WiFi?

Add your answer

Q27. How to check server performance, incase application running on the server performing slow, what will you do ?

Ans.

To check server performance, monitor CPU, memory, disk usage. Use tools like top, htop, iostat. Check logs for errors.

  • Monitor CPU usage with top or htop command

  • Monitor memory usage with free or vmstat command

  • Monitor disk usage with df or iostat command

  • Check logs for errors related to the application

  • Use performance monitoring tools like Nagios or Zabbix

Add your answer

Q28. Write any code of your choice without even a minor error.

Ans.

I wrote a Python code to find the sum of all even numbers in a given list.

  • Define a list of numbers

  • Use a for loop to iterate through the list

  • Use an if statement to check if the number is even

  • Add the even number to a variable that stores the sum

  • Return the sum of even numbers

  • Example: num_list = [1, 2, 3, 4, 5, 6, 7, 8, 9, 10] sum_even = 0 for num in num_list: if num % 2 == 0: sum_even += num print(sum_even)

Add your answer

Q29. What are the layers of the OSI model?

Ans.

The OSI model has 7 layers that define how data is transmitted over a network.

  • The layers are: Physical, Data Link, Network, Transport, Session, Presentation, and Application.

  • Each layer has a specific function and communicates with the layers above and below it.

  • For example, the Physical layer deals with the physical transmission of data, while the Application layer deals with user interfaces and applications.

  • The OSI model is a conceptual model and is used to help understand ho...read more

View 1 answer
Q30. Basic CS Fundamentals Question

How to transfer files without internet?

Add your answer

Q31. How to know about deadlocks in sql server?

Ans.

Deadlocks in SQL Server can be identified using SQL Server Profiler or by querying the system_health extended event session.

  • Use SQL Server Profiler to capture deadlock events

  • Query the system_health extended event session to view deadlock graphs

  • Use sp_whoisactive to identify blocking and deadlocking processes

  • Enable trace flag 1222 to capture deadlock information in the SQL Server error log

Add your answer

Q32. What is the command for the Tail log backup?

Ans.

The command for Tail log backup is BACKUP LOG WITH NORECOVERY

  • Use the BACKUP LOG command to create a tail log backup

  • Add the WITH NORECOVERY option to allow further log backups

  • Tail log backups are used to capture any transactions that occurred after the last log backup

  • Syntax: BACKUP LOG database_name TO disk = 'backup_device' WITH NORECOVERY

View 1 answer

Q33. If TempDB is full, how do you resolve it?

Ans.

To resolve TempDB full issue, identify the cause and take appropriate action.

  • Identify the cause of TempDB full issue using DMVs or third-party tools

  • Check for long-running transactions or open transactions

  • Check for large sorts or hash joins

  • Increase the size of TempDB or add more files

  • Move TempDB to a faster disk

  • Restart SQL Server to clear TempDB

  • Modify application code to reduce TempDB usage

Add your answer

Q34. What do you know about DXC?

Ans.

DXC is a global IT services company that provides end-to-end solutions for clients in various industries.

  • DXC was formed in 2017 through the merger of CSC and the Enterprise Services business of Hewlett Packard Enterprise.

  • They offer services in areas such as cloud computing, cybersecurity, analytics, and digital transformation.

  • DXC has clients in industries such as healthcare, finance, manufacturing, and government.

  • They have a global workforce of over 130,000 employees.

  • DXC is h...read more

Add your answer

Q35. Where we could use trunk and where we can use access

Ans.

Trunk is used to carry multiple VLANs between switches, while access is used to connect end devices to the network.

  • Trunk is used to connect switches together and carry multiple VLANs

  • Access is used to connect end devices like computers, printers, etc. to the network

  • Trunk ports are configured with VLAN tagging, while access ports are not

  • Examples of trunk ports are inter-switch links, while examples of access ports are ports connected to end devices

Add your answer

Q36. how can you increase the Ranking and visibility of a website in a Search engine? ---explained him About SEO Optimization

Add your answer
Q37. Java Question

What are the memory types in Java?

Add your answer

Q38. What is the difference between UL and VUL

Ans.

UL and VUL are both types of life insurance policies, but VUL offers investment options while UL does not.

  • UL stands for Universal Life Insurance, which offers a fixed premium and death benefit but no investment options

  • VUL stands for Variable Universal Life Insurance, which offers investment options in addition to a flexible premium and death benefit

  • VUL policyholders can choose to invest in stocks, bonds, and mutual funds, while UL policyholders cannot

  • VUL policies have the pot...read more

Add your answer

Q39. How you provision EC2 instances, SG, etc thru Cloud Formation

Ans.

I use CloudFormation templates to provision EC2 instances and security groups.

  • Create a CloudFormation template with the necessary resources

  • Specify the instance type, AMI, and other details in the template

  • Define the security group rules in the template

  • Use the AWS CLI or console to deploy the CloudFormation stack

Add your answer

Q40. What are the issues you faced in log shipping?

Ans.

Issues faced in log shipping

  • Network latency causing delays in log shipping

  • Log backups not being taken frequently enough

  • Failure to restore logs due to mismatched log backups

  • Lack of monitoring and alerting for log shipping failures

Add your answer

Q41. What is VPN? How to connect to VPN?

Ans.

VPN stands for Virtual Private Network. It is a secure way to connect to a private network over the internet.

  • To connect to a VPN, you need to have a VPN client installed on your device.

  • You also need to have the login credentials for the VPN network.

  • Once you have the client installed and the credentials, you can connect to the VPN by selecting the network and entering your login details.

  • VPN can be used to access resources on a private network while working remotely or to secur...read more

Add your answer
Q42. Computer Network Question

Explain the OSI Layers.

Add your answer

Q43. Tell some new technology which is coming?

Ans.

5G technology is coming which will revolutionize the way we communicate and connect with the world.

  • 5G technology will provide faster internet speeds and lower latency.

  • It will enable the development of new technologies such as self-driving cars and smart cities.

  • 5G networks will be able to support a larger number of devices connected simultaneously.

  • Major telecommunication companies such as Verizon and AT&T are already rolling out 5G networks in select cities.

  • 5G technology will ...read more

Add your answer

Q44. How to reinstall drivers for any hardware?

Ans.

To reinstall drivers for any hardware, follow these steps.

  • Uninstall the current driver from Device Manager

  • Download the latest driver from the manufacturer's website

  • Install the new driver by running the setup file

  • Restart the computer to complete the installation

  • If the driver is not available on the website, use Windows Update or a driver update tool

  • Ensure compatibility with the operating system and hardware version

Add your answer

Q45. How do you allocate memory to 2D array dynamically? How and why does that work?

Ans.

Dynamic allocation of memory to 2D array is done using double pointer and malloc function.

  • Declare a double pointer to hold the 2D array.

  • Allocate memory to the first dimension using malloc function.

  • Allocate memory to the second dimension using a loop and malloc function.

  • Free the memory after use to avoid memory leaks.

  • Example: int **arr; arr = (int **)malloc(rows * sizeof(int *));

  • Example: for(int i=0; i

Add your answer

Q46. What are the isolation levels in sql server?

Ans.

Isolation levels in SQL Server determine how transactions interact with each other.

  • There are five isolation levels: READ UNCOMMITTED, READ COMMITTED, REPEATABLE READ, SNAPSHOT, and SERIALIZABLE.

  • Each level has its own trade-offs between concurrency and consistency.

  • The default isolation level is READ COMMITTED.

  • Isolation levels can be set at the transaction level or for the entire database.

  • For example, the SNAPSHOT isolation level allows for consistent reads even when data is be...read more

Add your answer

Q47. What do you used to do using the ticketing tool?

Ans.

I used the ticketing tool to track and manage database-related issues and requests.

  • Create and assign tickets for database-related issues and requests

  • Monitor ticket status and update as necessary

  • Communicate with stakeholders regarding ticket status and resolution

  • Close tickets once issues are resolved

  • Generate reports on ticket volume and resolution time

Add your answer

Q48. What is Polymorphism?

Ans.

Polymorphism is the ability of an object to take on many forms.

  • It allows objects of different classes to be treated as if they were objects of the same class.

  • It is achieved through method overriding and method overloading.

  • Example: A shape class can have different subclasses like circle, square, and triangle, each with their own implementation of the draw method.

  • Example: A method can take in different types of objects as parameters, and the appropriate method will be called ba...read more

View 1 answer
Q49. Computer Network Question

Difference between LAN and MAN.

Add your answer

Q50. in ubuntu we have the version as 12.XX or 13.XX. What that XX? --- I told him

Add your answer

Q51. What do you do if the server stuck recovery level after patching. What is the patching tool you are using?

Ans.

If server stuck at recovery level after patching, check logs and rollback if necessary. Patching tool used is XYZ.

  • Check server logs for any errors or issues

  • If necessary, rollback the patch to the previous version

  • Ensure that the patching tool used is XYZ

  • Contact vendor support if the issue persists

Add your answer

Q52. What is point in time recovery?

Ans.

Point in time recovery is the ability to restore a database to a specific moment in time.

  • It allows for recovery of data up to a specific point in time.

  • It requires regular backups and transaction logs.

  • It is useful in case of accidental data deletion or corruption.

  • It can be done manually or through automated tools.

  • Example: Restoring a database to its state before a specific transaction occurred.

View 1 answer

Q53. How I will achieve the IOS upgrade when only I have 10 minutes left in PE window??

Ans.

Use pre-staged image and fast transfer methods to achieve IOS upgrade within 10 minutes.

  • Pre-stage the image on the device before the upgrade window

  • Use fast transfer methods like TFTP or FTP to transfer the image quickly

  • Ensure all necessary configurations are saved and backed up before the upgrade

  • Have a rollback plan in case of any issues during the upgrade

Add your answer

Q54. What to do if a word file is not opening?

Ans.

Check for file corruption and try opening in safe mode.

  • Check if the file is corrupted or damaged.

  • Try opening the file in safe mode.

  • Check for any updates or patches for the software.

  • Try opening the file on a different computer.

  • Use a file recovery tool to repair the file.

Add your answer

Q55. What is DHCP and why do we use it what is dns How does DHCP work in a network What is the role of a router What is a gateway How to boot into safemode

Ans.

DHCP is a network protocol that automatically assigns IP addresses to devices, DNS translates domain names to IP addresses, routers connect networks, gateways connect networks with different protocols, booting into safe mode allows troubleshooting.

  • DHCP automatically assigns IP addresses to devices on a network

  • DNS translates domain names to IP addresses for easier access

  • Routers connect different networks together to enable communication

  • Gateways connect networks with different ...read more

Add your answer

Q56. Do you have idea on replication ?

Ans.

Yes, replication is the process of copying and distributing data from one database to another.

  • Replication is used to improve data availability, scalability, and disaster recovery.

  • It involves a publisher database that sends data to one or more subscriber databases.

  • There are three types of replication: snapshot, transactional, and merge.

  • Snapshot replication copies the entire database to the subscriber.

  • Transactional replication sends only the changes made to the database since t...read more

View 1 answer

Q57. Do you have any idea on SQL Profiler ?

Ans.

SQL Profiler is a tool used to capture and analyze SQL Server events and activities.

  • SQL Profiler captures events such as queries, stored procedures, and errors.

  • It can be used to troubleshoot performance issues and optimize queries.

  • Profiling can be done on a live server or on a trace file.

  • Events can be filtered and grouped for easier analysis.

  • SQL Profiler has been replaced by Extended Events in newer versions of SQL Server.

View 1 answer

Q58. How to check if webcam is working or not?

Ans.

To check if webcam is working or not, follow these steps.

  • Check if the webcam is properly connected to the computer

  • Open the webcam application or any video conferencing app to check if the webcam is working

  • Check if the webcam drivers are installed and updated

  • Restart the computer and try again

  • If the webcam still doesn't work, try connecting it to another computer to check if it's a hardware issue

Add your answer

Q59. What is object oriented programming language in java

Ans.

Java is an object-oriented programming language that uses classes and objects to organize and structure code.

  • Java is based on the concept of classes and objects

  • Classes define the properties and behaviors of objects

  • Objects are instances of classes that can interact with each other

  • Java supports encapsulation, inheritance, and polymorphism

  • Examples of object-oriented programming in Java include creating a class for a car with properties like make, model, and year, and methods lik...read more

Add your answer

Q60. Patching and the process of how I do patching

Ans.

Patching is the process of updating software to fix vulnerabilities and improve performance.

  • Patching involves identifying and applying updates to software systems.

  • It is important to regularly check for patches and updates from vendors.

  • Patching can be done manually or through automated tools.

  • Before applying patches, it is crucial to test them in a controlled environment.

  • Patching should be performed in a planned and systematic manner to minimize downtime and ensure system stabi...read more

View 1 answer

Q61. 1. What are the different types of ip address 2. What is Static and Dynamic IP address 3. What is incident management

Ans.

This question covers IP address types, static and dynamic IP addresses, and incident management.

  • Different types of IP addresses include IPv4 and IPv6

  • Static IP addresses are manually assigned and do not change, while dynamic IP addresses are assigned by a DHCP server and can change

  • Incident management is the process of identifying, analyzing, and resolving IT incidents to minimize their impact on business operations

Add your answer

Q62. Major differences between traditional life and whole life products?

Ans.

Traditional life products provide coverage for a specific term while whole life products provide coverage for the entire life of the policyholder.

  • Traditional life products have a fixed term and premium payments, while whole life products have flexible premium payments and coverage for the entire life of the policyholder.

  • Whole life products have a cash value component that grows over time, while traditional life products do not.

  • Whole life products are generally more expensive ...read more

Add your answer

Q63. How will you handle exceptions of a procedure getting called in another procedure.

Ans.

I will use try-catch blocks to handle exceptions and log the error message for debugging purposes.

  • Enclose the procedure call in a try block.

  • Catch the exception in the catch block.

  • Log the error message for debugging purposes.

  • Handle the exception appropriately based on the specific scenario.

Add your answer

Q64. How would you present a SAN LUN to Solaris LDOM or CDOM ?

Ans.

To present a SAN LUN to Solaris LDOM or CDOM, we need to follow a few steps.

  • First, we need to identify the SAN LUN and the target LDOM/CDOM.

  • Then, we need to create a logical device using the format command.

  • Next, we need to configure the LUN using the cfgadm command.

  • Finally, we need to add the LUN to the LDOM/CDOM using the ldm add-vdsdev command.

Add your answer

Q65. What is the backup strategy you have?

Ans.

Our backup strategy includes full backups weekly, differential backups daily, and transaction log backups every 15 minutes.

  • Weekly full backups

  • Daily differential backups

  • Transaction log backups every 15 minutes

  • Backups stored on separate disk

  • Regular testing of backups for restoration

Add your answer

Q66. What is server and client ?

Ans.

Server and client are two entities in a client-server architecture where the server provides services to the client.

  • Server is a computer program or device that provides services to other computer programs or devices, known as clients.

  • Client is a computer program or device that requests services from a server.

  • Examples of servers include web servers, mail servers, and file servers.

  • Examples of clients include web browsers, email clients, and FTP clients.

Add your answer

Q67. what is the Latest Version of APACHE Web server? ---told

Ans.

The latest version of APACHE Web server is Apache 2.4.48.

  • The latest stable release of Apache Web server is version 2.4.48.

  • It was released on June 1, 2021.

  • Apache 2.4.48 includes various bug fixes and security enhancements.

  • Some notable features of Apache 2.4.48 are improved HTTP/2 support, enhanced SSL/TLS capabilities, and better performance optimizations.

Add your answer

Q68. Do you have any idea why programming languages exist?

Ans.

Programming languages exist to provide a standardized way for humans to communicate instructions to computers.

  • Programming languages allow humans to write code that can be understood and executed by computers.

  • They provide a set of rules and syntax for writing code.

  • Programming languages enable the development of software applications and systems.

  • They help in automating tasks, solving complex problems, and improving efficiency.

  • Examples of programming languages include Python, Ja...read more

View 1 answer

Q69. How to create the Facebook comment system reaction status?

Ans.

To create the Facebook comment system reaction status, you can use a combination of emojis and text labels.

  • Use emojis like 👍, ❤️, 😆, 😢, 😡 to represent different reactions.

  • Add text labels like 'Like', 'Love', 'Haha', 'Sad', 'Angry' for each reaction.

  • Allow users to click on the reaction they want to use and display the total count of each reaction.

Add your answer

Q70. What is unbilled revenue and provide journal entries

Ans.

Unbilled revenue is revenue that has been earned but not yet invoiced to the customer.

  • Unbilled revenue is recorded as a current asset on the balance sheet.

  • Journal entry for recognizing unbilled revenue: Debit Unbilled Revenue and Credit Revenue.

  • Journal entry for invoicing unbilled revenue: Debit Accounts Receivable and Credit Unbilled Revenue.

Add your answer

Q71. What is SQL Error 911?

Ans.

SQL Error 911 is a database connection error that occurs when the maximum number of concurrent connections has been reached.

  • Occurs when the maximum number of concurrent connections has been reached

  • Can be resolved by increasing the maximum number of connections allowed

  • May also be caused by insufficient memory or disk space

  • Commonly seen in IBM DB2 databases

Add your answer

Q72. Print fibonacci series. DBMS and how it is different from RDBMS.

Ans.

Fibonacci series is a sequence of numbers where each number is the sum of the two preceding ones.

  • Start with two initial numbers, usually 0 and 1.

  • Add the two previous numbers to get the next number in the sequence.

  • Repeat this process to generate the Fibonacci series.

Add your answer

Q73. 2. What is control panel?

Ans.

Control panel is a graphical user interface that allows users to manage and control computer hardware and software settings.

  • It provides access to various system settings and features

  • It allows users to install and uninstall software

  • It can be used to configure hardware devices such as printers and scanners

  • Examples include Windows Control Panel and macOS System Preferences

View 2 more answers

Q74. Latest FIlesystem and LVM how to extend and reduce filesystem?

Ans.

To extend a filesystem, first extend the underlying LVM volume, then use the resize2fs command. To reduce a filesystem, first unmount it, then use the resize2fs command followed by the lvreduce command.

  • To extend a filesystem:

  • - Extend the underlying LVM volume using lvextend command

  • - Use resize2fs command to extend the filesystem

  • - Example: sudo lvextend -L +10G /dev/mapper/vg01-lv01 && sudo resize2fs /dev/mapper/vg01-lv01

  • To reduce a filesystem:

  • - Unmount the filesystem using um...read more

Add your answer

Q75. Which database you have used for practical in SQL subject

Ans.

I have used MySQL for practical in SQL subject.

  • MySQL is a popular open-source relational database management system.

  • I have practiced creating tables, querying data, and performing various operations in MySQL.

  • I have also worked with MySQL Workbench for database design and management.

Add your answer

Q76. 1. What are he drivers in computer and can you tell if speakers are not working then what are all the steps you will follow

Ans.

Drivers in computer are software components that enable communication between the operating system and hardware devices.

  • Drivers are essential for the proper functioning of hardware components such as printers, graphics cards, and network adapters.

  • If speakers are not working, steps to follow include checking the volume settings, ensuring the speakers are properly connected to the computer, updating or reinstalling audio drivers, and testing the speakers on another device.

  • Troub...read more

Add your answer

Q77. Different ways to repair MS Office suite?

Ans.

There are multiple ways to repair MS Office suite.

  • Use the built-in repair option in the Control Panel

  • Use the Microsoft Office Configuration Analyzer Tool

  • Uninstall and reinstall the software

  • Use the Microsoft Support and Recovery Assistant

  • Run the SFC (System File Checker) scan

  • Check for and install any available updates

Add your answer

Q78. what is list, dictionary, set and tuple and difference between them

Ans.

List, dictionary, set, and tuple are data structures in Python with different characteristics and use cases.

  • List: ordered collection of items, mutable (can be changed), represented by square brackets []

  • Dictionary: unordered collection of key-value pairs, mutable, represented by curly braces {}

  • Set: unordered collection of unique items, mutable, represented by curly braces {}

  • Tuple: ordered collection of items, immutable (cannot be changed), represented by parentheses ()

Add your answer

Q79. How to exit without executing the final?

Ans.

To exit without executing the final, use the 'return' statement or 'exit' function.

  • Use the 'return' statement to exit a function or method without executing the remaining code.

  • In some programming languages, like C or C++, you can use the 'exit' function to terminate the program immediately.

  • Consider using conditional statements or loops to control the flow and determine when to exit without executing the final.

View 1 answer
Q80. Computer Network Question

Working of router

Add your answer

Q81. Difference between call by value and call by reference

Ans.

Call by value passes a copy of the value while call by reference passes the address of the value.

  • Call by value is used for simple data types like int, float, etc.

  • Call by reference is used for complex data types like arrays, structures, etc.

  • Call by value does not modify the original value while call by reference can modify the original value.

  • Call by value is faster than call by reference as it does not involve memory access.

  • Example of call by value: int a = 5; func(a);

  • Example ...read more

Add your answer

Q82. What is the ledger entry of credit sale

Ans.

The ledger entry for a credit sale involves recording the increase in accounts receivable and the corresponding increase in sales revenue.

  • Credit sale is a transaction where goods or services are sold on credit, meaning the payment is expected at a later date.

  • To record a credit sale, the accounts receivable account is debited to increase the amount owed by the customer.

  • Simultaneously, the sales revenue account is credited to reflect the increase in revenue generated from the s...read more

View 2 more answers

Q83. What ticketing tool you use?

Ans.

We use ServiceNow as our ticketing tool.

  • ServiceNow is a cloud-based platform that offers IT service management (ITSM), IT operations management (ITOM), and IT business management (ITBM) solutions.

  • It allows us to manage incidents, problems, changes, and service requests in a single system.

  • We can also track the status of tickets, assign them to team members, and set priorities and deadlines.

  • ServiceNow also provides reporting and analytics capabilities to help us monitor perform...read more

View 1 answer

Q84. Are you aware of Servers, Database and Data center?

Ans.

Yes, I am aware of Servers, Database and Data center.

  • I have experience in managing servers and databases.

  • I am familiar with data center operations and maintenance.

  • I understand the importance of data security and backup.

  • Examples: I have worked with Microsoft SQL Server, Oracle Database, and MySQL. I have also managed servers on AWS and Azure.

Add your answer

Q85. What do you know about migration and decommissioning process?

Ans.

Migration and decommissioning process involves moving data from one system to another or retiring an old system.

  • Migration process involves transferring data from one system to another, ensuring data integrity and minimizing downtime.

  • Decommissioning process involves retiring an old system, ensuring data security and proper disposal of hardware.

  • Both processes require careful planning, testing, and communication with stakeholders.

  • Examples of migration and decommissioning include...read more

Add your answer

Q86. Tell about Function Overloading,Polymorphism and to give the difference

Ans.

Function overloading is when multiple functions have the same name but different parameters. Polymorphism is the ability of an object to take on many forms.

  • Function overloading allows multiple functions with the same name but different parameters to be defined.

  • Polymorphism allows objects of different classes to be treated as objects of a common superclass.

  • Function overloading is resolved at compile-time, while polymorphism is resolved at runtime.

View 1 answer

Q87. Write a program for generating prime numbers? Write a program for swapping of two numbers?

Ans.

Programs for generating prime numbers and swapping two numbers.

  • For generating prime numbers, iterate through numbers and check if they are divisible by any number less than them.

  • For swapping two numbers, use a temporary variable to store one of the numbers before swapping them.

  • Both programs can be implemented using loops and conditional statements.

Add your answer

Q88. What are the daemons in avamar

Ans.

Daemons in Avamar are background processes that perform various tasks such as data deduplication, backup scheduling, and replication.

  • Avvagentd: Manages communication between the Avamar server and clients

  • Avvcbimage: Performs backup and restore operations

  • Avvcbjobd: Controls backup and restore job scheduling

  • Avvcbrestore: Handles restore operations

  • Avvcbrepd: Manages replication between Avamar grids

  • Avvcbverify: Verifies the integrity of backed up data

  • Avvsshd: Provides secure shell...read more

View 1 answer

Q89. What is VMware What is sv motion What is v-mostion What is ha and dr

Ans.

VMware is a virtualization and cloud computing software provider. SV motion and v-motion are features that enable live migration of virtual machines. HA stands for High Availability and DR stands for Disaster Recovery.

  • VMware is a software company that provides virtualization and cloud computing solutions.

  • SV motion is a feature in VMware that allows live migration of virtual machines between storage devices.

  • V-motion is a feature in VMware that enables live migration of virtual...read more

View 1 answer

Q90. which technology stands on top in future

Ans.

Artificial Intelligence (AI) will stand on top in the future.

  • AI is already being used in various industries such as healthcare, finance, and transportation.

  • AI has the potential to automate repetitive tasks and improve efficiency.

  • AI can also help in making better decisions by analyzing large amounts of data.

  • AI is constantly evolving and improving, making it a promising technology for the future.

Add your answer
Q91. Java Question

What is JVM?

Add your answer

Q92. HOW TO CREATE OUR OWN IMMUTABLE CLASS? WHY IMMUTABLE CLASS

Ans.

Immutable classes in Java are classes whose objects cannot be modified once they are created.

  • Make the class final to prevent inheritance

  • Make all fields private and final

  • Do not provide setter methods for fields

  • Ensure that any mutable objects within the class are also immutable

Add your answer

Q93. IN WHICH SITUATION WE USE @PRIMARY AND @ QUALIFIER ?

Ans.

Use @Primary to specify a primary bean when multiple beans of the same type are present. Use @Qualifier to specify a specific bean when multiple beans of the same type are present.

  • Use @Primary to indicate the primary bean to be used when multiple beans of the same type are present in the Spring application context.

  • Use @Qualifier along with @Autowired to specify a specific bean to be injected when multiple beans of the same type are present.

  • Example: @Primary annotation can be ...read more

Add your answer

Q94. What is the latest version of Python

Ans.

The latest version of Python is Python 3.10.

  • Python 3.10 was released on October 4, 2021.

  • It includes new features such as structural pattern matching, improved error messages, and more.

  • Python 2.7 is no longer supported and users are encouraged to upgrade to Python 3.10.

  • Python 3.10 can be downloaded from the official Python website.

Add your answer

Q95. how would you elimnate error while recording the financial documents?

Ans.

To eliminate errors while recording financial documents, one can implement various measures.

  • Establishing clear and standardized procedures for recording financial transactions

  • Implementing regular checks and audits to ensure accuracy

  • Using accounting software with built-in error-checking features

  • Providing training and education to staff on proper financial recording practices

  • Maintaining proper documentation and record-keeping

  • Double-checking all entries before finalizing financi...read more

Add your answer

Q96. Why python is differ from Java?

Ans.

Python is dynamically typed and has simpler syntax, while Java is statically typed and has more complex syntax.

  • Python is interpreted, while Java is compiled

  • Python has automatic memory management, while Java requires manual memory management

  • Python has a smaller standard library compared to Java

  • Python is often used for scripting and data analysis, while Java is used for enterprise applications and Android development

Add your answer

Q97. Which programing lagauges you are familiar to write code

Add your answer

Q98. What are the Death Benefit Options?

Ans.

Death benefit options refer to the different ways in which a life insurance policy pays out to beneficiaries upon the death of the insured.

  • Common death benefit options include lump sum payments, installment payments, and annuity payments.

  • Lump sum payments provide the entire death benefit amount in one payment.

  • Installment payments provide the death benefit in a series of payments over a set period of time.

  • Annuity payments provide a regular stream of income to the beneficiary o...read more

Add your answer

Q99. What is your experience with Cloud Technolgies? Any recent project which you had faced challenges?

Ans.

I have extensive experience with Cloud Technologies, including managing migration projects and implementing cloud solutions.

  • Managed migration of on-premise servers to AWS cloud for a large enterprise

  • Implemented Azure cloud solutions for a startup company to improve scalability and cost-efficiency

  • Faced challenges with data security during cloud migration project, resolved by implementing encryption and access controls

Add your answer

Q100. What are class loaders, Why java is a robust language , what are enums etc

Ans.

Class loaders are responsible for loading classes into memory, Java is robust due to its strong memory management and exception handling, enums are a special data type that restricts variables to a predefined set of values.

  • Class loaders in Java are responsible for dynamically loading classes into memory at runtime.

  • Java is considered a robust language due to its strong memory management, garbage collection, and exception handling capabilities.

  • Enums in Java are a special data t...read more

Add your answer
1
2
3
4
5
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos

Interview Process at null

based on 240 interviews in the last 1 year
Interview experience
4.0
Good
View more
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Interview Questions from Similar Companies

4.1
 • 402 Interview Questions
4.0
 • 391 Interview Questions
4.0
 • 371 Interview Questions
4.4
 • 218 Interview Questions
3.8
 • 209 Interview Questions
3.8
 • 202 Interview Questions
View all
Top DXC Technology Interview Questions And Answers
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
70 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions
Get AmbitionBox app

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter