DXC Technology
400+ Interview Questions and Answers
Q1. If someone has deleted the table in a database, then how can you find out the user that has deleted the table ? Can you find out using the log file? Can you retsore the table using the tail log backup?
Yes, the user who deleted the table can be identified using the transaction log file.
To find out the user who deleted the table, you can query the transaction log file using the fn_dblog function.
The transaction log contains information about all the transactions performed on the database, including the table deletion.
By analyzing the log records, you can identify the specific transaction that deleted the table and retrieve the associated user information.
Restoring the table ...read more
You have been given a number of stairs. Initially, you are at the 0th stair, and you need to reach the Nth stair. Each time you can either climb one step or two steps. You are...read more
Q3. 1. Describe project 2. What do you understand by OOPs. 3. What all Access modifiers are there in Java. 4. Difference between protected and default. 5. Overloading and overriding (difference, example and questio...
read moreInterview questions for Software Engineer position
Describe a project you have worked on
Explain OOPs concepts and access modifiers in Java
Differentiate between protected and default access modifiers
Provide examples and differences between overloading and overriding
Use Java 8 to find even numbers in a list and to find the square of elements in a list using lambda expressions
Write a template for a REST controller with different HTTP methods
Provide the URI for deleting a request
W...read more
Q4. What is the default port of sql server & Can we change the default port, if so where can we change it?
The default port of SQL Server is 1433. Yes, we can change the default port by modifying the SQL Server Configuration Manager.
The default port for SQL Server is 1433.
To change the default port, open SQL Server Configuration Manager.
Navigate to SQL Server Network Configuration and select Protocols for the desired SQL Server instance.
Right-click on TCP/IP and choose Properties.
In the IP Addresses tab, scroll down to the IPAll section.
Change the TCP Port value to the desired por...read more
Q5. What is the default isolation level in sql server? What happens with that isolation level ?
The default isolation level in SQL Server is READ COMMITTED. It ensures that each transaction sees only committed data.
The default isolation level in SQL Server is READ COMMITTED.
READ COMMITTED ensures that each transaction sees only committed data.
It provides a balance between concurrency and data consistency.
Under READ COMMITTED, a transaction can read data that has been modified by another transaction but not yet committed.
However, it cannot read uncommitted data or data m...read more
Q6. What is the backup strategy for the biggest database you handled?
The backup strategy for the biggest database I handled involved regular full backups, daily differential backups, and hourly transaction log backups.
Regular full backups were performed to capture the entire database.
Daily differential backups were taken to capture the changes since the last full backup.
Hourly transaction log backups were taken to capture the changes since the last differential backup.
Backups were stored on separate storage devices to ensure data redundancy.
Ba...read more
Q7. OOPs features, what is a carriage return, the syntax for making a 2D matrix, what is nested loop incase of the switch statement
Questions on OOPs features, carriage return, 2D matrix syntax, and nested loops in switch statement.
OOPs features include encapsulation, inheritance, and polymorphism.
A carriage return is a character that moves the cursor to the beginning of the next line.
The syntax for making a 2D matrix is: int matrix[][] = new int[rows][columns];
A nested loop in a switch statement is used to handle multiple cases with the same code block.
Q8. When we run CheckDB, what command it runs in the background ?
CheckDB runs DBCC CHECKDB command in the background.
CheckDB is a command used to check the logical and physical integrity of all objects in the specified database.
DBCC CHECKDB is the command that CheckDB runs in the background.
DBCC CHECKDB checks the allocation and structural integrity of all the objects in the specified database.
DBCC CHECKDB also checks for common errors like torn pages, index and data page corruptions, etc.
Q9. Can you write the codee which is shown below in any of the languages which you know?
Yes, I can write the code in multiple languages.
I am proficient in multiple programming languages such as Java, Python, C++, and JavaScript.
I can write the code in any of these languages based on the requirements.
The code shown in the question is not provided, so I cannot provide an example.
However, I can assure you that I have the necessary skills to write the code in any language.
Q10. What are blockings ? What are deadlocks and difference to blockings ?
Blockings occur when one transaction holds a lock on a resource, preventing other transactions from accessing it. Deadlocks are a specific type of blocking where two or more transactions are waiting for each other to release resources.
Blockings happen when one transaction holds a lock on a resource and other transactions are blocked from accessing it.
Deadlocks occur when two or more transactions are waiting for each other to release resources, resulting in a deadlock situatio...read more
Q11. How to send a file without any internet connection if you are in first floor and your coligue was in second floor?
Use a physical medium like a USB drive or a portable storage device to transfer the file.
Physically carry the file on a USB drive or portable storage device.
Use a local network connection to transfer the file between the two floors.
Utilize Bluetooth or other wireless technologies to transfer the file.
If the distance is short, use a physical method like printing the file and physically handing it over.
Q12. What to do if an email is stuck in outbox in Outlook?
Check network connection, try resending, check email size and attachments.
Check network connection and ensure it's stable.
Try resending the email by clicking on the 'Send/Receive' button.
Check the email size and attachments. Large files may cause the email to get stuck.
Restart Outlook and try sending the email again.
Check if the email is being blocked by antivirus or firewall software.
Delete the email from the Outbox and try sending it again.
Q13. When to update statistics with respect to index rebuild and reorganize ? (Maintenance plans)
Updating statistics is necessary after index rebuild or reorganize to ensure query optimization.
Statistics provide information about the distribution of data in a table or index.
Index rebuild or reorganize can change the distribution of data, making old statistics inaccurate.
Outdated statistics can lead to poor query performance.
Updating statistics after index rebuild or reorganize ensures query optimization.
Maintenance plans can be set up to automate this process.
Q14. What is the database size you jave used in your previous project?
The database size I have used in my previous project was approximately 500 GB.
The database size was around 500 GB.
It contained various tables, indexes, and stored procedures.
The data included millions of records from different sources.
We regularly optimized the database to ensure efficient performance.
Backup and recovery strategies were implemented to safeguard the data.
Q15. How to index reorganize and index rebuild based on index fragmentation?
Index reorganize and rebuild based on fragmentation level
For fragmentation level < 5%, use reorganize
For fragmentation level > 30%, use rebuild
For fragmentation level between 5% and 30%, choose based on table size and usage
Use ALTER INDEX statement to perform reorganize or rebuild
Monitor fragmentation level regularly to maintain optimal performance
Q16. What is the parameter (-1) used in DBCC TRACEON(1204,-1) ? Why it is used?
Parameter (-1) in DBCC TRACEON(1204,-1) is used to enable deadlock tracing for all sessions.
DBCC TRACEON(1204,-1) enables deadlock tracing for all sessions
The parameter -1 specifies that the trace flag should be enabled for all sessions
Deadlock tracing helps identify and resolve deadlocks in SQL Server
Q17. While applyong patching, some msi files are missing ? How do you resolve this?
Check if the missing msi files are required for the patch. If yes, download and install them.
Verify if the missing msi files are essential for the patch
Check if the msi files are available in the original installation media or backup
If not, download the missing msi files from the vendor's website
Install the missing msi files before applying the patch
Q18. What is the difference between Abstraction and Interface?
Abstraction is hiding implementation details while Interface is a contract for implementing classes.
Abstraction is achieved through abstract classes and methods.
Interface defines a set of methods that a class must implement.
Abstraction focuses on hiding complexity and providing a simpler interface.
Interface focuses on defining a standard for communication between classes.
Abstraction is a way to achieve modularity and maintainability.
Interface is a way to achieve polymorphism ...read more
Q19. What is the difference between Summary.txt and Detail.txt ?
Summary.txt contains summarized information while Detail.txt contains detailed information.
Summary.txt provides a brief overview of data while Detail.txt provides a more comprehensive view.
Summary.txt may contain aggregated data while Detail.txt contains individual data points.
Summary.txt is useful for quick analysis while Detail.txt is useful for in-depth analysis.
Example: Summary.txt may contain total sales for a month while Detail.txt contains sales data for each day of th...read more
Q20. Do you use any monitoring tool for monitoring Sql server?
Yes, I use SQL Server Management Studio (SSMS) and SQL Server Profiler for monitoring SQL Server.
I use SSMS to monitor server activity, query performance, and resource usage.
I use SQL Server Profiler to capture and analyze SQL Server events and performance data.
I also use third-party tools like SolarWinds Database Performance Analyzer and Redgate SQL Monitor for more advanced monitoring and alerting.
Regularly monitoring SQL Server helps identify and resolve performance issues...read more
Q21. What is IP address What are the classes of IP What is workgroup and domain What is BSOD What is 32 bit and 64 bit OS SSD vs HDD explain windows boot process System keeps restarting. Steps to resolve how to reco...
read moreIP address is a unique identifier assigned to each device connected to a network. Classes of IP include A, B, C, D, and E. Workgroup and domain are network organization structures. BSOD is Blue Screen of Death.
IP address is a unique numerical label assigned to each device on a network
Classes of IP include A, B, C, D, and E with different ranges of addresses
Workgroup is a peer-to-peer network where each computer has its own security settings, while domain is a centralized netw...read more
Difference between C++ and Java
Q23. why java is preferred? whats the benefit of functional programming and why introduced in java. what are wrapper classes, fibonaaci series , whats the use of join? what is threadinterrupted exception ? how hashm...
read moreAnswers to various technical questions related to Java programming.
Java is preferred for its platform independence, object-oriented nature, and vast community support.
Functional programming in Java allows for more concise and readable code, and better support for parallel processing.
Wrapper classes are used to convert primitive data types into objects, and vice versa.
Fibonacci series is a sequence of numbers where each number is the sum of the two preceding ones.
Join is a met...read more
Q24. What is perform? Mention its different types.
Perform refers to carrying out a task or activity. Its types include job performance, academic performance, and athletic performance.
Perform refers to the execution of a task or activity.
Job performance refers to how well an employee performs their job duties.
Academic performance refers to a student's success in their studies.
Athletic performance refers to an athlete's ability to perform in their sport.
Other types of performance include musical performance, theatrical perform...read more
Q25. What is the difference between a table and a view?
A table is a physical storage structure while a view is a virtual table created from a query.
A table stores data in a structured manner while a view is a virtual table created from a query.
A table can have indexes and constraints while a view cannot.
A table can be updated, inserted or deleted while a view cannot be directly modified.
A view can be used to simplify complex queries or restrict access to certain columns of a table.
Example: A table named 'employees' can have a vie...read more
What is WiFi?
Q27. How to check server performance, incase application running on the server performing slow, what will you do ?
To check server performance, monitor CPU, memory, disk usage. Use tools like top, htop, iostat. Check logs for errors.
Monitor CPU usage with top or htop command
Monitor memory usage with free or vmstat command
Monitor disk usage with df or iostat command
Check logs for errors related to the application
Use performance monitoring tools like Nagios or Zabbix
Q28. Write any code of your choice without even a minor error.
I wrote a Python code to find the sum of all even numbers in a given list.
Define a list of numbers
Use a for loop to iterate through the list
Use an if statement to check if the number is even
Add the even number to a variable that stores the sum
Return the sum of even numbers
Example: num_list = [1, 2, 3, 4, 5, 6, 7, 8, 9, 10] sum_even = 0 for num in num_list: if num % 2 == 0: sum_even += num print(sum_even)
Q29. What are the layers of the OSI model?
The OSI model has 7 layers that define how data is transmitted over a network.
The layers are: Physical, Data Link, Network, Transport, Session, Presentation, and Application.
Each layer has a specific function and communicates with the layers above and below it.
For example, the Physical layer deals with the physical transmission of data, while the Application layer deals with user interfaces and applications.
The OSI model is a conceptual model and is used to help understand ho...read more
How to transfer files without internet?
Q31. How to know about deadlocks in sql server?
Deadlocks in SQL Server can be identified using SQL Server Profiler or by querying the system_health extended event session.
Use SQL Server Profiler to capture deadlock events
Query the system_health extended event session to view deadlock graphs
Use sp_whoisactive to identify blocking and deadlocking processes
Enable trace flag 1222 to capture deadlock information in the SQL Server error log
Q32. What is the command for the Tail log backup?
The command for Tail log backup is BACKUP LOG WITH NORECOVERY
Use the BACKUP LOG command to create a tail log backup
Add the WITH NORECOVERY option to allow further log backups
Tail log backups are used to capture any transactions that occurred after the last log backup
Syntax: BACKUP LOG database_name TO disk = 'backup_device' WITH NORECOVERY
Q33. If TempDB is full, how do you resolve it?
To resolve TempDB full issue, identify the cause and take appropriate action.
Identify the cause of TempDB full issue using DMVs or third-party tools
Check for long-running transactions or open transactions
Check for large sorts or hash joins
Increase the size of TempDB or add more files
Move TempDB to a faster disk
Restart SQL Server to clear TempDB
Modify application code to reduce TempDB usage
Q34. What do you know about DXC?
DXC is a global IT services company that provides end-to-end solutions for clients in various industries.
DXC was formed in 2017 through the merger of CSC and the Enterprise Services business of Hewlett Packard Enterprise.
They offer services in areas such as cloud computing, cybersecurity, analytics, and digital transformation.
DXC has clients in industries such as healthcare, finance, manufacturing, and government.
They have a global workforce of over 130,000 employees.
DXC is h...read more
Q35. Where we could use trunk and where we can use access
Trunk is used to carry multiple VLANs between switches, while access is used to connect end devices to the network.
Trunk is used to connect switches together and carry multiple VLANs
Access is used to connect end devices like computers, printers, etc. to the network
Trunk ports are configured with VLAN tagging, while access ports are not
Examples of trunk ports are inter-switch links, while examples of access ports are ports connected to end devices
Q36. how can you increase the Ranking and visibility of a website in a Search engine? ---explained him About SEO Optimization
What are the memory types in Java?
Q38. What is the difference between UL and VUL
UL and VUL are both types of life insurance policies, but VUL offers investment options while UL does not.
UL stands for Universal Life Insurance, which offers a fixed premium and death benefit but no investment options
VUL stands for Variable Universal Life Insurance, which offers investment options in addition to a flexible premium and death benefit
VUL policyholders can choose to invest in stocks, bonds, and mutual funds, while UL policyholders cannot
VUL policies have the pot...read more
Q39. How you provision EC2 instances, SG, etc thru Cloud Formation
I use CloudFormation templates to provision EC2 instances and security groups.
Create a CloudFormation template with the necessary resources
Specify the instance type, AMI, and other details in the template
Define the security group rules in the template
Use the AWS CLI or console to deploy the CloudFormation stack
Q40. What are the issues you faced in log shipping?
Issues faced in log shipping
Network latency causing delays in log shipping
Log backups not being taken frequently enough
Failure to restore logs due to mismatched log backups
Lack of monitoring and alerting for log shipping failures
Q41. What is VPN? How to connect to VPN?
VPN stands for Virtual Private Network. It is a secure way to connect to a private network over the internet.
To connect to a VPN, you need to have a VPN client installed on your device.
You also need to have the login credentials for the VPN network.
Once you have the client installed and the credentials, you can connect to the VPN by selecting the network and entering your login details.
VPN can be used to access resources on a private network while working remotely or to secur...read more
Explain the OSI Layers.
Q43. Tell some new technology which is coming?
5G technology is coming which will revolutionize the way we communicate and connect with the world.
5G technology will provide faster internet speeds and lower latency.
It will enable the development of new technologies such as self-driving cars and smart cities.
5G networks will be able to support a larger number of devices connected simultaneously.
Major telecommunication companies such as Verizon and AT&T are already rolling out 5G networks in select cities.
5G technology will ...read more
Q44. How to reinstall drivers for any hardware?
To reinstall drivers for any hardware, follow these steps.
Uninstall the current driver from Device Manager
Download the latest driver from the manufacturer's website
Install the new driver by running the setup file
Restart the computer to complete the installation
If the driver is not available on the website, use Windows Update or a driver update tool
Ensure compatibility with the operating system and hardware version
Q45. How do you allocate memory to 2D array dynamically? How and why does that work?
Dynamic allocation of memory to 2D array is done using double pointer and malloc function.
Declare a double pointer to hold the 2D array.
Allocate memory to the first dimension using malloc function.
Allocate memory to the second dimension using a loop and malloc function.
Free the memory after use to avoid memory leaks.
Example: int **arr; arr = (int **)malloc(rows * sizeof(int *));
Example: for(int i=0; i
Q46. What are the isolation levels in sql server?
Isolation levels in SQL Server determine how transactions interact with each other.
There are five isolation levels: READ UNCOMMITTED, READ COMMITTED, REPEATABLE READ, SNAPSHOT, and SERIALIZABLE.
Each level has its own trade-offs between concurrency and consistency.
The default isolation level is READ COMMITTED.
Isolation levels can be set at the transaction level or for the entire database.
For example, the SNAPSHOT isolation level allows for consistent reads even when data is be...read more
Q47. What do you used to do using the ticketing tool?
I used the ticketing tool to track and manage database-related issues and requests.
Create and assign tickets for database-related issues and requests
Monitor ticket status and update as necessary
Communicate with stakeholders regarding ticket status and resolution
Close tickets once issues are resolved
Generate reports on ticket volume and resolution time
Q48. What is Polymorphism?
Polymorphism is the ability of an object to take on many forms.
It allows objects of different classes to be treated as if they were objects of the same class.
It is achieved through method overriding and method overloading.
Example: A shape class can have different subclasses like circle, square, and triangle, each with their own implementation of the draw method.
Example: A method can take in different types of objects as parameters, and the appropriate method will be called ba...read more
Difference between LAN and MAN.
Q50. in ubuntu we have the version as 12.XX or 13.XX. What that XX? --- I told him
Q51. What do you do if the server stuck recovery level after patching. What is the patching tool you are using?
If server stuck at recovery level after patching, check logs and rollback if necessary. Patching tool used is XYZ.
Check server logs for any errors or issues
If necessary, rollback the patch to the previous version
Ensure that the patching tool used is XYZ
Contact vendor support if the issue persists
Q52. What is point in time recovery?
Point in time recovery is the ability to restore a database to a specific moment in time.
It allows for recovery of data up to a specific point in time.
It requires regular backups and transaction logs.
It is useful in case of accidental data deletion or corruption.
It can be done manually or through automated tools.
Example: Restoring a database to its state before a specific transaction occurred.
Q53. How I will achieve the IOS upgrade when only I have 10 minutes left in PE window??
Use pre-staged image and fast transfer methods to achieve IOS upgrade within 10 minutes.
Pre-stage the image on the device before the upgrade window
Use fast transfer methods like TFTP or FTP to transfer the image quickly
Ensure all necessary configurations are saved and backed up before the upgrade
Have a rollback plan in case of any issues during the upgrade
Q54. What to do if a word file is not opening?
Check for file corruption and try opening in safe mode.
Check if the file is corrupted or damaged.
Try opening the file in safe mode.
Check for any updates or patches for the software.
Try opening the file on a different computer.
Use a file recovery tool to repair the file.
Q55. What is DHCP and why do we use it what is dns How does DHCP work in a network What is the role of a router What is a gateway How to boot into safemode
DHCP is a network protocol that automatically assigns IP addresses to devices, DNS translates domain names to IP addresses, routers connect networks, gateways connect networks with different protocols, booting into safe mode allows troubleshooting.
DHCP automatically assigns IP addresses to devices on a network
DNS translates domain names to IP addresses for easier access
Routers connect different networks together to enable communication
Gateways connect networks with different ...read more
Q56. Do you have idea on replication ?
Yes, replication is the process of copying and distributing data from one database to another.
Replication is used to improve data availability, scalability, and disaster recovery.
It involves a publisher database that sends data to one or more subscriber databases.
There are three types of replication: snapshot, transactional, and merge.
Snapshot replication copies the entire database to the subscriber.
Transactional replication sends only the changes made to the database since t...read more
Q57. Do you have any idea on SQL Profiler ?
SQL Profiler is a tool used to capture and analyze SQL Server events and activities.
SQL Profiler captures events such as queries, stored procedures, and errors.
It can be used to troubleshoot performance issues and optimize queries.
Profiling can be done on a live server or on a trace file.
Events can be filtered and grouped for easier analysis.
SQL Profiler has been replaced by Extended Events in newer versions of SQL Server.
Q58. How to check if webcam is working or not?
To check if webcam is working or not, follow these steps.
Check if the webcam is properly connected to the computer
Open the webcam application or any video conferencing app to check if the webcam is working
Check if the webcam drivers are installed and updated
Restart the computer and try again
If the webcam still doesn't work, try connecting it to another computer to check if it's a hardware issue
Q59. What is object oriented programming language in java
Java is an object-oriented programming language that uses classes and objects to organize and structure code.
Java is based on the concept of classes and objects
Classes define the properties and behaviors of objects
Objects are instances of classes that can interact with each other
Java supports encapsulation, inheritance, and polymorphism
Examples of object-oriented programming in Java include creating a class for a car with properties like make, model, and year, and methods lik...read more
Q60. Patching and the process of how I do patching
Patching is the process of updating software to fix vulnerabilities and improve performance.
Patching involves identifying and applying updates to software systems.
It is important to regularly check for patches and updates from vendors.
Patching can be done manually or through automated tools.
Before applying patches, it is crucial to test them in a controlled environment.
Patching should be performed in a planned and systematic manner to minimize downtime and ensure system stabi...read more
Q61. 1. What are the different types of ip address 2. What is Static and Dynamic IP address 3. What is incident management
This question covers IP address types, static and dynamic IP addresses, and incident management.
Different types of IP addresses include IPv4 and IPv6
Static IP addresses are manually assigned and do not change, while dynamic IP addresses are assigned by a DHCP server and can change
Incident management is the process of identifying, analyzing, and resolving IT incidents to minimize their impact on business operations
Q62. Major differences between traditional life and whole life products?
Traditional life products provide coverage for a specific term while whole life products provide coverage for the entire life of the policyholder.
Traditional life products have a fixed term and premium payments, while whole life products have flexible premium payments and coverage for the entire life of the policyholder.
Whole life products have a cash value component that grows over time, while traditional life products do not.
Whole life products are generally more expensive ...read more
Q63. How will you handle exceptions of a procedure getting called in another procedure.
I will use try-catch blocks to handle exceptions and log the error message for debugging purposes.
Enclose the procedure call in a try block.
Catch the exception in the catch block.
Log the error message for debugging purposes.
Handle the exception appropriately based on the specific scenario.
Q64. How would you present a SAN LUN to Solaris LDOM or CDOM ?
To present a SAN LUN to Solaris LDOM or CDOM, we need to follow a few steps.
First, we need to identify the SAN LUN and the target LDOM/CDOM.
Then, we need to create a logical device using the format command.
Next, we need to configure the LUN using the cfgadm command.
Finally, we need to add the LUN to the LDOM/CDOM using the ldm add-vdsdev command.
Q65. What is the backup strategy you have?
Our backup strategy includes full backups weekly, differential backups daily, and transaction log backups every 15 minutes.
Weekly full backups
Daily differential backups
Transaction log backups every 15 minutes
Backups stored on separate disk
Regular testing of backups for restoration
Q66. What is server and client ?
Server and client are two entities in a client-server architecture where the server provides services to the client.
Server is a computer program or device that provides services to other computer programs or devices, known as clients.
Client is a computer program or device that requests services from a server.
Examples of servers include web servers, mail servers, and file servers.
Examples of clients include web browsers, email clients, and FTP clients.
Q67. what is the Latest Version of APACHE Web server? ---told
The latest version of APACHE Web server is Apache 2.4.48.
The latest stable release of Apache Web server is version 2.4.48.
It was released on June 1, 2021.
Apache 2.4.48 includes various bug fixes and security enhancements.
Some notable features of Apache 2.4.48 are improved HTTP/2 support, enhanced SSL/TLS capabilities, and better performance optimizations.
Q68. Do you have any idea why programming languages exist?
Programming languages exist to provide a standardized way for humans to communicate instructions to computers.
Programming languages allow humans to write code that can be understood and executed by computers.
They provide a set of rules and syntax for writing code.
Programming languages enable the development of software applications and systems.
They help in automating tasks, solving complex problems, and improving efficiency.
Examples of programming languages include Python, Ja...read more
Q69. How to create the Facebook comment system reaction status?
To create the Facebook comment system reaction status, you can use a combination of emojis and text labels.
Use emojis like 👍, ❤️, 😆, 😢, 😡 to represent different reactions.
Add text labels like 'Like', 'Love', 'Haha', 'Sad', 'Angry' for each reaction.
Allow users to click on the reaction they want to use and display the total count of each reaction.
Q70. What is unbilled revenue and provide journal entries
Unbilled revenue is revenue that has been earned but not yet invoiced to the customer.
Unbilled revenue is recorded as a current asset on the balance sheet.
Journal entry for recognizing unbilled revenue: Debit Unbilled Revenue and Credit Revenue.
Journal entry for invoicing unbilled revenue: Debit Accounts Receivable and Credit Unbilled Revenue.
Q71. What is SQL Error 911?
SQL Error 911 is a database connection error that occurs when the maximum number of concurrent connections has been reached.
Occurs when the maximum number of concurrent connections has been reached
Can be resolved by increasing the maximum number of connections allowed
May also be caused by insufficient memory or disk space
Commonly seen in IBM DB2 databases
Q72. Print fibonacci series. DBMS and how it is different from RDBMS.
Fibonacci series is a sequence of numbers where each number is the sum of the two preceding ones.
Start with two initial numbers, usually 0 and 1.
Add the two previous numbers to get the next number in the sequence.
Repeat this process to generate the Fibonacci series.
Q73. 2. What is control panel?
Control panel is a graphical user interface that allows users to manage and control computer hardware and software settings.
It provides access to various system settings and features
It allows users to install and uninstall software
It can be used to configure hardware devices such as printers and scanners
Examples include Windows Control Panel and macOS System Preferences
Q74. Latest FIlesystem and LVM how to extend and reduce filesystem?
To extend a filesystem, first extend the underlying LVM volume, then use the resize2fs command. To reduce a filesystem, first unmount it, then use the resize2fs command followed by the lvreduce command.
To extend a filesystem:
- Extend the underlying LVM volume using lvextend command
- Use resize2fs command to extend the filesystem
- Example: sudo lvextend -L +10G /dev/mapper/vg01-lv01 && sudo resize2fs /dev/mapper/vg01-lv01
To reduce a filesystem:
- Unmount the filesystem using um...read more
Q75. Which database you have used for practical in SQL subject
I have used MySQL for practical in SQL subject.
MySQL is a popular open-source relational database management system.
I have practiced creating tables, querying data, and performing various operations in MySQL.
I have also worked with MySQL Workbench for database design and management.
Q76. 1. What are he drivers in computer and can you tell if speakers are not working then what are all the steps you will follow
Drivers in computer are software components that enable communication between the operating system and hardware devices.
Drivers are essential for the proper functioning of hardware components such as printers, graphics cards, and network adapters.
If speakers are not working, steps to follow include checking the volume settings, ensuring the speakers are properly connected to the computer, updating or reinstalling audio drivers, and testing the speakers on another device.
Troub...read more
Q77. Different ways to repair MS Office suite?
There are multiple ways to repair MS Office suite.
Use the built-in repair option in the Control Panel
Use the Microsoft Office Configuration Analyzer Tool
Uninstall and reinstall the software
Use the Microsoft Support and Recovery Assistant
Run the SFC (System File Checker) scan
Check for and install any available updates
Q78. what is list, dictionary, set and tuple and difference between them
List, dictionary, set, and tuple are data structures in Python with different characteristics and use cases.
List: ordered collection of items, mutable (can be changed), represented by square brackets []
Dictionary: unordered collection of key-value pairs, mutable, represented by curly braces {}
Set: unordered collection of unique items, mutable, represented by curly braces {}
Tuple: ordered collection of items, immutable (cannot be changed), represented by parentheses ()
Q79. How to exit without executing the final?
To exit without executing the final, use the 'return' statement or 'exit' function.
Use the 'return' statement to exit a function or method without executing the remaining code.
In some programming languages, like C or C++, you can use the 'exit' function to terminate the program immediately.
Consider using conditional statements or loops to control the flow and determine when to exit without executing the final.
Working of router
Q81. Difference between call by value and call by reference
Call by value passes a copy of the value while call by reference passes the address of the value.
Call by value is used for simple data types like int, float, etc.
Call by reference is used for complex data types like arrays, structures, etc.
Call by value does not modify the original value while call by reference can modify the original value.
Call by value is faster than call by reference as it does not involve memory access.
Example of call by value: int a = 5; func(a);
Example ...read more
Q82. What is the ledger entry of credit sale
The ledger entry for a credit sale involves recording the increase in accounts receivable and the corresponding increase in sales revenue.
Credit sale is a transaction where goods or services are sold on credit, meaning the payment is expected at a later date.
To record a credit sale, the accounts receivable account is debited to increase the amount owed by the customer.
Simultaneously, the sales revenue account is credited to reflect the increase in revenue generated from the s...read more
Q83. What ticketing tool you use?
We use ServiceNow as our ticketing tool.
ServiceNow is a cloud-based platform that offers IT service management (ITSM), IT operations management (ITOM), and IT business management (ITBM) solutions.
It allows us to manage incidents, problems, changes, and service requests in a single system.
We can also track the status of tickets, assign them to team members, and set priorities and deadlines.
ServiceNow also provides reporting and analytics capabilities to help us monitor perform...read more
Q84. Are you aware of Servers, Database and Data center?
Yes, I am aware of Servers, Database and Data center.
I have experience in managing servers and databases.
I am familiar with data center operations and maintenance.
I understand the importance of data security and backup.
Examples: I have worked with Microsoft SQL Server, Oracle Database, and MySQL. I have also managed servers on AWS and Azure.
Q85. What do you know about migration and decommissioning process?
Migration and decommissioning process involves moving data from one system to another or retiring an old system.
Migration process involves transferring data from one system to another, ensuring data integrity and minimizing downtime.
Decommissioning process involves retiring an old system, ensuring data security and proper disposal of hardware.
Both processes require careful planning, testing, and communication with stakeholders.
Examples of migration and decommissioning include...read more
Q86. Tell about Function Overloading,Polymorphism and to give the difference
Function overloading is when multiple functions have the same name but different parameters. Polymorphism is the ability of an object to take on many forms.
Function overloading allows multiple functions with the same name but different parameters to be defined.
Polymorphism allows objects of different classes to be treated as objects of a common superclass.
Function overloading is resolved at compile-time, while polymorphism is resolved at runtime.
Q87. Write a program for generating prime numbers? Write a program for swapping of two numbers?
Programs for generating prime numbers and swapping two numbers.
For generating prime numbers, iterate through numbers and check if they are divisible by any number less than them.
For swapping two numbers, use a temporary variable to store one of the numbers before swapping them.
Both programs can be implemented using loops and conditional statements.
Q88. What are the daemons in avamar
Daemons in Avamar are background processes that perform various tasks such as data deduplication, backup scheduling, and replication.
Avvagentd: Manages communication between the Avamar server and clients
Avvcbimage: Performs backup and restore operations
Avvcbjobd: Controls backup and restore job scheduling
Avvcbrestore: Handles restore operations
Avvcbrepd: Manages replication between Avamar grids
Avvcbverify: Verifies the integrity of backed up data
Avvsshd: Provides secure shell...read more
Q89. What is VMware What is sv motion What is v-mostion What is ha and dr
VMware is a virtualization and cloud computing software provider. SV motion and v-motion are features that enable live migration of virtual machines. HA stands for High Availability and DR stands for Disaster Recovery.
VMware is a software company that provides virtualization and cloud computing solutions.
SV motion is a feature in VMware that allows live migration of virtual machines between storage devices.
V-motion is a feature in VMware that enables live migration of virtual...read more
Q90. which technology stands on top in future
Artificial Intelligence (AI) will stand on top in the future.
AI is already being used in various industries such as healthcare, finance, and transportation.
AI has the potential to automate repetitive tasks and improve efficiency.
AI can also help in making better decisions by analyzing large amounts of data.
AI is constantly evolving and improving, making it a promising technology for the future.
Q92. HOW TO CREATE OUR OWN IMMUTABLE CLASS? WHY IMMUTABLE CLASS
Immutable classes in Java are classes whose objects cannot be modified once they are created.
Make the class final to prevent inheritance
Make all fields private and final
Do not provide setter methods for fields
Ensure that any mutable objects within the class are also immutable
Q93. IN WHICH SITUATION WE USE @PRIMARY AND @ QUALIFIER ?
Use @Primary to specify a primary bean when multiple beans of the same type are present. Use @Qualifier to specify a specific bean when multiple beans of the same type are present.
Use @Primary to indicate the primary bean to be used when multiple beans of the same type are present in the Spring application context.
Use @Qualifier along with @Autowired to specify a specific bean to be injected when multiple beans of the same type are present.
Example: @Primary annotation can be ...read more
Q94. What is the latest version of Python
The latest version of Python is Python 3.10.
Python 3.10 was released on October 4, 2021.
It includes new features such as structural pattern matching, improved error messages, and more.
Python 2.7 is no longer supported and users are encouraged to upgrade to Python 3.10.
Python 3.10 can be downloaded from the official Python website.
Q95. how would you elimnate error while recording the financial documents?
To eliminate errors while recording financial documents, one can implement various measures.
Establishing clear and standardized procedures for recording financial transactions
Implementing regular checks and audits to ensure accuracy
Using accounting software with built-in error-checking features
Providing training and education to staff on proper financial recording practices
Maintaining proper documentation and record-keeping
Double-checking all entries before finalizing financi...read more
Q96. Why python is differ from Java?
Python is dynamically typed and has simpler syntax, while Java is statically typed and has more complex syntax.
Python is interpreted, while Java is compiled
Python has automatic memory management, while Java requires manual memory management
Python has a smaller standard library compared to Java
Python is often used for scripting and data analysis, while Java is used for enterprise applications and Android development
Q97. Which programing lagauges you are familiar to write code
Q98. What are the Death Benefit Options?
Death benefit options refer to the different ways in which a life insurance policy pays out to beneficiaries upon the death of the insured.
Common death benefit options include lump sum payments, installment payments, and annuity payments.
Lump sum payments provide the entire death benefit amount in one payment.
Installment payments provide the death benefit in a series of payments over a set period of time.
Annuity payments provide a regular stream of income to the beneficiary o...read more
Q99. What is your experience with Cloud Technolgies? Any recent project which you had faced challenges?
I have extensive experience with Cloud Technologies, including managing migration projects and implementing cloud solutions.
Managed migration of on-premise servers to AWS cloud for a large enterprise
Implemented Azure cloud solutions for a startup company to improve scalability and cost-efficiency
Faced challenges with data security during cloud migration project, resolved by implementing encryption and access controls
Q100. What are class loaders, Why java is a robust language , what are enums etc
Class loaders are responsible for loading classes into memory, Java is robust due to its strong memory management and exception handling, enums are a special data type that restricts variables to a predefined set of values.
Class loaders in Java are responsible for dynamically loading classes into memory at runtime.
Java is considered a robust language due to its strong memory management, garbage collection, and exception handling capabilities.
Enums in Java are a special data t...read more
Top HR Questions asked in null
Interview Process at null
Top Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month