DXC Technology
100+ Ahmed Dry Fruits Interview Questions and Answers
Q1. If someone has deleted the table in a database, then how can you find out the user that has deleted the table ? Can you find out using the log file? Can you retsore the table using the tail log backup?
Yes, the user who deleted the table can be identified using the transaction log file.
To find out the user who deleted the table, you can query the transaction log file using the fn_dblog function.
The transaction log contains information about all the transactions performed on the database, including the table deletion.
By analyzing the log records, you can identify the specific transaction that deleted the table and retrieve the associated user information.
Restoring the table ...read more
Q2. 1. Describe project 2. What do you understand by OOPs. 3. What all Access modifiers are there in Java. 4. Difference between protected and default. 5. Overloading and overriding (difference, example and questio...
read moreInterview questions for Software Engineer position
Describe a project you have worked on
Explain OOPs concepts and access modifiers in Java
Differentiate between protected and default access modifiers
Provide examples and differences between overloading and overriding
Use Java 8 to find even numbers in a list and to find the square of elements in a list using lambda expressions
Write a template for a REST controller with different HTTP methods
Provide the URI for deleting a request
W...read more
Q3. What is the default port of sql server & Can we change the default port, if so where can we change it?
The default port of SQL Server is 1433. Yes, we can change the default port by modifying the SQL Server Configuration Manager.
The default port for SQL Server is 1433.
To change the default port, open SQL Server Configuration Manager.
Navigate to SQL Server Network Configuration and select Protocols for the desired SQL Server instance.
Right-click on TCP/IP and choose Properties.
In the IP Addresses tab, scroll down to the IPAll section.
Change the TCP Port value to the desired por...read more
Q4. What is the default isolation level in sql server? What happens with that isolation level ?
The default isolation level in SQL Server is READ COMMITTED. It ensures that each transaction sees only committed data.
The default isolation level in SQL Server is READ COMMITTED.
READ COMMITTED ensures that each transaction sees only committed data.
It provides a balance between concurrency and data consistency.
Under READ COMMITTED, a transaction can read data that has been modified by another transaction but not yet committed.
However, it cannot read uncommitted data or data m...read more
Q5. What is the backup strategy for the biggest database you handled?
The backup strategy for the biggest database I handled involved regular full backups, daily differential backups, and hourly transaction log backups.
Regular full backups were performed to capture the entire database.
Daily differential backups were taken to capture the changes since the last full backup.
Hourly transaction log backups were taken to capture the changes since the last differential backup.
Backups were stored on separate storage devices to ensure data redundancy.
Ba...read more
Q6. When we run CheckDB, what command it runs in the background ?
CheckDB runs DBCC CHECKDB command in the background.
CheckDB is a command used to check the logical and physical integrity of all objects in the specified database.
DBCC CHECKDB is the command that CheckDB runs in the background.
DBCC CHECKDB checks the allocation and structural integrity of all the objects in the specified database.
DBCC CHECKDB also checks for common errors like torn pages, index and data page corruptions, etc.
Q7. What are blockings ? What are deadlocks and difference to blockings ?
Blockings occur when one transaction holds a lock on a resource, preventing other transactions from accessing it. Deadlocks are a specific type of blocking where two or more transactions are waiting for each other to release resources.
Blockings happen when one transaction holds a lock on a resource and other transactions are blocked from accessing it.
Deadlocks occur when two or more transactions are waiting for each other to release resources, resulting in a deadlock situatio...read more
Q8. What to do if an email is stuck in outbox in Outlook?
Check network connection, try resending, check email size and attachments.
Check network connection and ensure it's stable.
Try resending the email by clicking on the 'Send/Receive' button.
Check the email size and attachments. Large files may cause the email to get stuck.
Restart Outlook and try sending the email again.
Check if the email is being blocked by antivirus or firewall software.
Delete the email from the Outbox and try sending it again.
Q9. When to update statistics with respect to index rebuild and reorganize ? (Maintenance plans)
Updating statistics is necessary after index rebuild or reorganize to ensure query optimization.
Statistics provide information about the distribution of data in a table or index.
Index rebuild or reorganize can change the distribution of data, making old statistics inaccurate.
Outdated statistics can lead to poor query performance.
Updating statistics after index rebuild or reorganize ensures query optimization.
Maintenance plans can be set up to automate this process.
Q10. What is the database size you jave used in your previous project?
The database size I have used in my previous project was approximately 500 GB.
The database size was around 500 GB.
It contained various tables, indexes, and stored procedures.
The data included millions of records from different sources.
We regularly optimized the database to ensure efficient performance.
Backup and recovery strategies were implemented to safeguard the data.
Q11. How to index reorganize and index rebuild based on index fragmentation?
Index reorganize and rebuild based on fragmentation level
For fragmentation level < 5%, use reorganize
For fragmentation level > 30%, use rebuild
For fragmentation level between 5% and 30%, choose based on table size and usage
Use ALTER INDEX statement to perform reorganize or rebuild
Monitor fragmentation level regularly to maintain optimal performance
Q12. What is the parameter (-1) used in DBCC TRACEON(1204,-1) ? Why it is used?
Parameter (-1) in DBCC TRACEON(1204,-1) is used to enable deadlock tracing for all sessions.
DBCC TRACEON(1204,-1) enables deadlock tracing for all sessions
The parameter -1 specifies that the trace flag should be enabled for all sessions
Deadlock tracing helps identify and resolve deadlocks in SQL Server
Q13. While applyong patching, some msi files are missing ? How do you resolve this?
Check if the missing msi files are required for the patch. If yes, download and install them.
Verify if the missing msi files are essential for the patch
Check if the msi files are available in the original installation media or backup
If not, download the missing msi files from the vendor's website
Install the missing msi files before applying the patch
Q14. What is the difference between Summary.txt and Detail.txt ?
Summary.txt contains summarized information while Detail.txt contains detailed information.
Summary.txt provides a brief overview of data while Detail.txt provides a more comprehensive view.
Summary.txt may contain aggregated data while Detail.txt contains individual data points.
Summary.txt is useful for quick analysis while Detail.txt is useful for in-depth analysis.
Example: Summary.txt may contain total sales for a month while Detail.txt contains sales data for each day of th...read more
Q15. Do you use any monitoring tool for monitoring Sql server?
Yes, I use SQL Server Management Studio (SSMS) and SQL Server Profiler for monitoring SQL Server.
I use SSMS to monitor server activity, query performance, and resource usage.
I use SQL Server Profiler to capture and analyze SQL Server events and performance data.
I also use third-party tools like SolarWinds Database Performance Analyzer and Redgate SQL Monitor for more advanced monitoring and alerting.
Regularly monitoring SQL Server helps identify and resolve performance issues...read more
Q16. What is object oriented programming language in java
Java is an object-oriented programming language that uses classes and objects to organize and structure code.
Java is based on the concept of classes and objects
Classes define the properties and behaviors of objects
Objects are instances of classes that can interact with each other
Java supports encapsulation, inheritance, and polymorphism
Examples of object-oriented programming in Java include creating a class for a car with properties like make, model, and year, and methods lik...read more
Q17. How to know about deadlocks in sql server?
Deadlocks in SQL Server can be identified using SQL Server Profiler or by querying the system_health extended event session.
Use SQL Server Profiler to capture deadlock events
Query the system_health extended event session to view deadlock graphs
Use sp_whoisactive to identify blocking and deadlocking processes
Enable trace flag 1222 to capture deadlock information in the SQL Server error log
Q18. What is the command for the Tail log backup?
The command for Tail log backup is BACKUP LOG WITH NORECOVERY
Use the BACKUP LOG command to create a tail log backup
Add the WITH NORECOVERY option to allow further log backups
Tail log backups are used to capture any transactions that occurred after the last log backup
Syntax: BACKUP LOG database_name TO disk = 'backup_device' WITH NORECOVERY
Q19. If TempDB is full, how do you resolve it?
To resolve TempDB full issue, identify the cause and take appropriate action.
Identify the cause of TempDB full issue using DMVs or third-party tools
Check for long-running transactions or open transactions
Check for large sorts or hash joins
Increase the size of TempDB or add more files
Move TempDB to a faster disk
Restart SQL Server to clear TempDB
Modify application code to reduce TempDB usage
Q20. why java is preferred? whats the benefit of functional programming and why introduced in java. what are wrapper classes, fibonaaci series , whats the use of join? what is threadinterrupted exception ? how hashm...
read moreAnswers to various technical questions related to Java programming.
Java is preferred for its platform independence, object-oriented nature, and vast community support.
Functional programming in Java allows for more concise and readable code, and better support for parallel processing.
Wrapper classes are used to convert primitive data types into objects, and vice versa.
Fibonacci series is a sequence of numbers where each number is the sum of the two preceding ones.
Join is a met...read more
Q21. Where we could use trunk and where we can use access
Trunk is used to carry multiple VLANs between switches, while access is used to connect end devices to the network.
Trunk is used to connect switches together and carry multiple VLANs
Access is used to connect end devices like computers, printers, etc. to the network
Trunk ports are configured with VLAN tagging, while access ports are not
Examples of trunk ports are inter-switch links, while examples of access ports are ports connected to end devices
Q22. What is the difference between UL and VUL
UL and VUL are both types of life insurance policies, but VUL offers investment options while UL does not.
UL stands for Universal Life Insurance, which offers a fixed premium and death benefit but no investment options
VUL stands for Variable Universal Life Insurance, which offers investment options in addition to a flexible premium and death benefit
VUL policyholders can choose to invest in stocks, bonds, and mutual funds, while UL policyholders cannot
VUL policies have the pot...read more
Q23. How to check server performance, incase application running on the server performing slow, what will you do ?
To check server performance, monitor CPU, memory, disk usage. Use tools like top, htop, iostat. Check logs for errors.
Monitor CPU usage with top or htop command
Monitor memory usage with free or vmstat command
Monitor disk usage with df or iostat command
Check logs for errors related to the application
Use performance monitoring tools like Nagios or Zabbix
Q24. What are the issues you faced in log shipping?
Issues faced in log shipping
Network latency causing delays in log shipping
Log backups not being taken frequently enough
Failure to restore logs due to mismatched log backups
Lack of monitoring and alerting for log shipping failures
Q25. What is VPN? How to connect to VPN?
VPN stands for Virtual Private Network. It is a secure way to connect to a private network over the internet.
To connect to a VPN, you need to have a VPN client installed on your device.
You also need to have the login credentials for the VPN network.
Once you have the client installed and the credentials, you can connect to the VPN by selecting the network and entering your login details.
VPN can be used to access resources on a private network while working remotely or to secur...read more
Q26. How to reinstall drivers for any hardware?
To reinstall drivers for any hardware, follow these steps.
Uninstall the current driver from Device Manager
Download the latest driver from the manufacturer's website
Install the new driver by running the setup file
Restart the computer to complete the installation
If the driver is not available on the website, use Windows Update or a driver update tool
Ensure compatibility with the operating system and hardware version
Q27. What are the isolation levels in sql server?
Isolation levels in SQL Server determine how transactions interact with each other.
There are five isolation levels: READ UNCOMMITTED, READ COMMITTED, REPEATABLE READ, SNAPSHOT, and SERIALIZABLE.
Each level has its own trade-offs between concurrency and consistency.
The default isolation level is READ COMMITTED.
Isolation levels can be set at the transaction level or for the entire database.
For example, the SNAPSHOT isolation level allows for consistent reads even when data is be...read more
Q28. What do you used to do using the ticketing tool?
I used the ticketing tool to track and manage database-related issues and requests.
Create and assign tickets for database-related issues and requests
Monitor ticket status and update as necessary
Communicate with stakeholders regarding ticket status and resolution
Close tickets once issues are resolved
Generate reports on ticket volume and resolution time
Q29. What is point in time recovery?
Point in time recovery is the ability to restore a database to a specific moment in time.
It allows for recovery of data up to a specific point in time.
It requires regular backups and transaction logs.
It is useful in case of accidental data deletion or corruption.
It can be done manually or through automated tools.
Example: Restoring a database to its state before a specific transaction occurred.
Q30. How you provision EC2 instances, SG, etc thru Cloud Formation
I use CloudFormation templates to provision EC2 instances and security groups.
Create a CloudFormation template with the necessary resources
Specify the instance type, AMI, and other details in the template
Define the security group rules in the template
Use the AWS CLI or console to deploy the CloudFormation stack
Q31. What to do if a word file is not opening?
Check for file corruption and try opening in safe mode.
Check if the file is corrupted or damaged.
Try opening the file in safe mode.
Check for any updates or patches for the software.
Try opening the file on a different computer.
Use a file recovery tool to repair the file.
Q32. Do you have idea on replication ?
Yes, replication is the process of copying and distributing data from one database to another.
Replication is used to improve data availability, scalability, and disaster recovery.
It involves a publisher database that sends data to one or more subscriber databases.
There are three types of replication: snapshot, transactional, and merge.
Snapshot replication copies the entire database to the subscriber.
Transactional replication sends only the changes made to the database since t...read more
Q33. Do you have any idea on SQL Profiler ?
SQL Profiler is a tool used to capture and analyze SQL Server events and activities.
SQL Profiler captures events such as queries, stored procedures, and errors.
It can be used to troubleshoot performance issues and optimize queries.
Profiling can be done on a live server or on a trace file.
Events can be filtered and grouped for easier analysis.
SQL Profiler has been replaced by Extended Events in newer versions of SQL Server.
Q34. How to check if webcam is working or not?
To check if webcam is working or not, follow these steps.
Check if the webcam is properly connected to the computer
Open the webcam application or any video conferencing app to check if the webcam is working
Check if the webcam drivers are installed and updated
Restart the computer and try again
If the webcam still doesn't work, try connecting it to another computer to check if it's a hardware issue
Q35. Major differences between traditional life and whole life products?
Traditional life products provide coverage for a specific term while whole life products provide coverage for the entire life of the policyholder.
Traditional life products have a fixed term and premium payments, while whole life products have flexible premium payments and coverage for the entire life of the policyholder.
Whole life products have a cash value component that grows over time, while traditional life products do not.
Whole life products are generally more expensive ...read more
Q36. What do you do if the server stuck recovery level after patching. What is the patching tool you are using?
If server stuck at recovery level after patching, check logs and rollback if necessary. Patching tool used is XYZ.
Check server logs for any errors or issues
If necessary, rollback the patch to the previous version
Ensure that the patching tool used is XYZ
Contact vendor support if the issue persists
Q37. How I will achieve the IOS upgrade when only I have 10 minutes left in PE window??
Use pre-staged image and fast transfer methods to achieve IOS upgrade within 10 minutes.
Pre-stage the image on the device before the upgrade window
Use fast transfer methods like TFTP or FTP to transfer the image quickly
Ensure all necessary configurations are saved and backed up before the upgrade
Have a rollback plan in case of any issues during the upgrade
Q38. What is the backup strategy you have?
Our backup strategy includes full backups weekly, differential backups daily, and transaction log backups every 15 minutes.
Weekly full backups
Daily differential backups
Transaction log backups every 15 minutes
Backups stored on separate disk
Regular testing of backups for restoration
Q39. What is the difference between DDL & DML
DDL stands for Data Definition Language and is used to define the structure of database objects. DML stands for Data Manipulation Language and is used to manipulate data within the database.
DDL is used to create, modify, and delete database objects such as tables, indexes, and views.
DML is used to insert, update, delete, and retrieve data from database tables.
Examples of DDL statements include CREATE TABLE, ALTER TABLE, and DROP TABLE.
Examples of DML statements include INSERT...read more
Q40. Patching and the process of how I do patching
Patching is the process of updating software to fix vulnerabilities and improve performance.
Patching involves identifying and applying updates to software systems.
It is important to regularly check for patches and updates from vendors.
Patching can be done manually or through automated tools.
Before applying patches, it is crucial to test them in a controlled environment.
Patching should be performed in a planned and systematic manner to minimize downtime and ensure system stabi...read more
Q41. How would you present a SAN LUN to Solaris LDOM or CDOM ?
To present a SAN LUN to Solaris LDOM or CDOM, we need to follow a few steps.
First, we need to identify the SAN LUN and the target LDOM/CDOM.
Then, we need to create a logical device using the format command.
Next, we need to configure the LUN using the cfgadm command.
Finally, we need to add the LUN to the LDOM/CDOM using the ldm add-vdsdev command.
Q42. 2. What is control panel?
Control panel is a graphical user interface that allows users to manage and control computer hardware and software settings.
It provides access to various system settings and features
It allows users to install and uninstall software
It can be used to configure hardware devices such as printers and scanners
Examples include Windows Control Panel and macOS System Preferences
Q43. Different ways to repair MS Office suite?
There are multiple ways to repair MS Office suite.
Use the built-in repair option in the Control Panel
Use the Microsoft Office Configuration Analyzer Tool
Uninstall and reinstall the software
Use the Microsoft Support and Recovery Assistant
Run the SFC (System File Checker) scan
Check for and install any available updates
Q44. How to exit without executing the final?
To exit without executing the final, use the 'return' statement or 'exit' function.
Use the 'return' statement to exit a function or method without executing the remaining code.
In some programming languages, like C or C++, you can use the 'exit' function to terminate the program immediately.
Consider using conditional statements or loops to control the flow and determine when to exit without executing the final.
Q45. Difference between call by value and call by reference
Call by value passes a copy of the value while call by reference passes the address of the value.
Call by value is used for simple data types like int, float, etc.
Call by reference is used for complex data types like arrays, structures, etc.
Call by value does not modify the original value while call by reference can modify the original value.
Call by value is faster than call by reference as it does not involve memory access.
Example of call by value: int a = 5; func(a);
Example ...read more
Q46. What ticketing tool you use?
We use ServiceNow as our ticketing tool.
ServiceNow is a cloud-based platform that offers IT service management (ITSM), IT operations management (ITOM), and IT business management (ITBM) solutions.
It allows us to manage incidents, problems, changes, and service requests in a single system.
We can also track the status of tickets, assign them to team members, and set priorities and deadlines.
ServiceNow also provides reporting and analytics capabilities to help us monitor perform...read more
Q47. Do you have any idea why programming languages exist?
Programming languages exist to provide a standardized way for humans to communicate instructions to computers.
Programming languages allow humans to write code that can be understood and executed by computers.
They provide a set of rules and syntax for writing code.
Programming languages enable the development of software applications and systems.
They help in automating tasks, solving complex problems, and improving efficiency.
Examples of programming languages include Python, Ja...read more
Q48. What is unbilled revenue and provide journal entries
Unbilled revenue is revenue that has been earned but not yet invoiced to the customer.
Unbilled revenue is recorded as a current asset on the balance sheet.
Journal entry for recognizing unbilled revenue: Debit Unbilled Revenue and Credit Revenue.
Journal entry for invoicing unbilled revenue: Debit Accounts Receivable and Credit Unbilled Revenue.
Q49. Latest FIlesystem and LVM how to extend and reduce filesystem?
To extend a filesystem, first extend the underlying LVM volume, then use the resize2fs command. To reduce a filesystem, first unmount it, then use the resize2fs command followed by the lvreduce command.
To extend a filesystem:
- Extend the underlying LVM volume using lvextend command
- Use resize2fs command to extend the filesystem
- Example: sudo lvextend -L +10G /dev/mapper/vg01-lv01 && sudo resize2fs /dev/mapper/vg01-lv01
To reduce a filesystem:
- Unmount the filesystem using um...read more
Q50. 1. What are he drivers in computer and can you tell if speakers are not working then what are all the steps you will follow
Drivers in computer are software components that enable communication between the operating system and hardware devices.
Drivers are essential for the proper functioning of hardware components such as printers, graphics cards, and network adapters.
If speakers are not working, steps to follow include checking the volume settings, ensuring the speakers are properly connected to the computer, updating or reinstalling audio drivers, and testing the speakers on another device.
Troub...read more
Q51. What are the Death Benefit Options?
Death benefit options refer to the different ways in which a life insurance policy pays out to beneficiaries upon the death of the insured.
Common death benefit options include lump sum payments, installment payments, and annuity payments.
Lump sum payments provide the entire death benefit amount in one payment.
Installment payments provide the death benefit in a series of payments over a set period of time.
Annuity payments provide a regular stream of income to the beneficiary o...read more
Q52. What is the ledger entry of credit sale
The ledger entry for a credit sale involves recording the increase in accounts receivable and the corresponding increase in sales revenue.
Credit sale is a transaction where goods or services are sold on credit, meaning the payment is expected at a later date.
To record a credit sale, the accounts receivable account is debited to increase the amount owed by the customer.
Simultaneously, the sales revenue account is credited to reflect the increase in revenue generated from the s...read more
Q53. Are you aware of Servers, Database and Data center?
Yes, I am aware of Servers, Database and Data center.
I have experience in managing servers and databases.
I am familiar with data center operations and maintenance.
I understand the importance of data security and backup.
Examples: I have worked with Microsoft SQL Server, Oracle Database, and MySQL. I have also managed servers on AWS and Azure.
Q54. What do you know about migration and decommissioning process?
Migration and decommissioning process involves moving data from one system to another or retiring an old system.
Migration process involves transferring data from one system to another, ensuring data integrity and minimizing downtime.
Decommissioning process involves retiring an old system, ensuring data security and proper disposal of hardware.
Both processes require careful planning, testing, and communication with stakeholders.
Examples of migration and decommissioning include...read more
Q55. Write a program for generating prime numbers? Write a program for swapping of two numbers?
Programs for generating prime numbers and swapping two numbers.
For generating prime numbers, iterate through numbers and check if they are divisible by any number less than them.
For swapping two numbers, use a temporary variable to store one of the numbers before swapping them.
Both programs can be implemented using loops and conditional statements.
Q56. What are the daemons in avamar
Daemons in Avamar are background processes that perform various tasks such as data deduplication, backup scheduling, and replication.
Avvagentd: Manages communication between the Avamar server and clients
Avvcbimage: Performs backup and restore operations
Avvcbjobd: Controls backup and restore job scheduling
Avvcbrestore: Handles restore operations
Avvcbrepd: Manages replication between Avamar grids
Avvcbverify: Verifies the integrity of backed up data
Avvsshd: Provides secure shell...read more
Q57. What is VMware What is sv motion What is v-mostion What is ha and dr
VMware is a virtualization and cloud computing software provider. SV motion and v-motion are features that enable live migration of virtual machines. HA stands for High Availability and DR stands for Disaster Recovery.
VMware is a software company that provides virtualization and cloud computing solutions.
SV motion is a feature in VMware that allows live migration of virtual machines between storage devices.
V-motion is a feature in VMware that enables live migration of virtual...read more
Q58. What happens when we delete
When we delete, the data or file is removed from the system and may be moved to a recycle bin or permanently erased.
Data or file is removed from the system
May be moved to a recycle bin before permanent deletion
Space previously occupied by the deleted data/file becomes available for new data
Q59. HOW TO CREATE OUR OWN IMMUTABLE CLASS? WHY IMMUTABLE CLASS
Immutable classes in Java are classes whose objects cannot be modified once they are created.
Make the class final to prevent inheritance
Make all fields private and final
Do not provide setter methods for fields
Ensure that any mutable objects within the class are also immutable
Q60. IN WHICH SITUATION WE USE @PRIMARY AND @ QUALIFIER ?
Use @Primary to specify a primary bean when multiple beans of the same type are present. Use @Qualifier to specify a specific bean when multiple beans of the same type are present.
Use @Primary to indicate the primary bean to be used when multiple beans of the same type are present in the Spring application context.
Use @Qualifier along with @Autowired to specify a specific bean to be injected when multiple beans of the same type are present.
Example: @Primary annotation can be ...read more
Q61. Query to select top 2 data of a column.
To select the top 2 data of a column, use the 'SELECT TOP' statement in SQL.
Use the 'SELECT TOP' statement followed by the number of rows you want to retrieve.
Specify the column name after the 'SELECT' keyword.
Order the data in the column using 'ORDER BY' clause if needed.
Example: SELECT TOP 2 column_name FROM table_name ORDER BY column_name DESC;
Q62. How to check the Performance issues in Windows?
Performance issues in Windows can be checked using various tools and techniques.
Use Task Manager to check CPU, memory, and disk usage
Use Resource Monitor to check detailed performance information
Use Performance Monitor to monitor specific performance counters
Check for any software or driver updates
Run a virus scan to check for malware
Check for any hardware issues such as failing hard drives or overheating components
Q63. What is load balancer? How does it work? Application gateway basics and functionality? OSI model? Update manager errors and troubleshooting steps? Backup and recovery, migration ?
Q64. WHAT IS DIFFERENCE BETWEEN COMPOSITION AND AGGREGATION ?
Composition is a strong relationship where the child object cannot exist independently of the parent object, while aggregation is a weak relationship where the child object can exist independently.
Composition is a 'has-a' relationship, where the child object is a part of the parent object.
Aggregation is a 'has-a' relationship, where the child object is not a part of the parent object.
In composition, the child object is created and destroyed along with the parent object.
In agg...read more
Q65. What is Sql? Explain
SQL is a programming language used for managing and manipulating databases.
SQL stands for Structured Query Language.
It is used to communicate with databases to perform tasks like querying data, updating data, and creating tables.
Common SQL commands include SELECT, INSERT, UPDATE, DELETE.
SQL is used in various database management systems like MySQL, PostgreSQL, Oracle.
Example: SELECT * FROM customers WHERE city = 'New York';
Q66. What we can do in security as port wise
Port-based security involves controlling access to network resources based on the physical port of the device.
Port security can be implemented by limiting the number of MAC addresses that can be learned on a port.
It can also involve configuring the port to only allow traffic from specific VLANs.
Port security can be used to prevent unauthorized access to the network by limiting the devices that can connect to it.
It can also be used to prevent rogue devices from being connected...read more
Q67. What are the Non-forfeiture options?
Non-forfeiture options are the choices available to a policyholder when they stop paying premiums.
Non-forfeiture options allow policyholders to retain some value from their policy even if they stop paying premiums.
Common non-forfeiture options include reduced paid-up insurance, extended term insurance, and cash surrender value.
Reduced paid-up insurance provides a smaller death benefit but does not require further premium payments.
Extended term insurance allows the policyholde...read more
Q68. Explain the Smoke testing,Sanity testing with an examples?
Smoke testing and Sanity testing are two types of software testing used to check the basic functionality of the application.
Smoke testing is a type of testing that checks whether the critical functionalities of the application are working fine or not.
Sanity testing is a type of testing that checks whether the bugs have been fixed or not after a new build is released.
Smoke testing is done to ensure that the application is stable enough for further testing.
Sanity testing is don...read more
Q69. What is vss admin list writers
vss admin list writers is a command used to list all the registered Volume Shadow Copy Service (VSS) writers on a Windows system.
VSS writers are responsible for creating consistent snapshots of data on a system for backup purposes.
The vss admin list writers command provides information about the state and availability of each VSS writer.
It is commonly used to troubleshoot VSS-related issues and ensure that all writers are functioning correctly.
The output of the command includ...read more
Q70. What is deduplication
Deduplication is a data compression technique that eliminates duplicate copies of data, reducing storage space and improving efficiency.
Deduplication is used to identify and remove redundant data.
It compares incoming data with existing data and stores only unique instances.
Deduplication can be performed at the file, block, or byte level.
It helps in reducing storage costs and improving backup and restore times.
Examples of deduplication technologies include inline deduplication...read more
Q71. Configuration of SAP time management, personal administration module
Configuration of SAP time management and personal administration module involves setting up employee data, time recording, and absence management.
Employee data is maintained in the Personnel Administration module
Time recording is done through Time Management module
Absence management is handled through Absence Management module
Configuration involves defining work schedules, absence types, and time quotas
Integration with payroll module is important for accurate payroll processi...read more
Q72. How DNS works? what happens when you click any link on browser?
DNS translates domain names to IP addresses. When you click a link, browser sends a DNS query to resolve the domain name.
DNS stands for Domain Name System
When you click a link, browser sends a DNS query to a DNS server to resolve the domain name to an IP address
The DNS server then responds with the corresponding IP address
The browser then uses the IP address to connect to the server hosting the website
Q73. How you can delete the record on database ?
To delete a record from a database, you can use the DELETE statement.
Use the DELETE statement with the WHERE clause to specify the record to be deleted.
Make sure to backup the database before deleting any records.
Example: DELETE FROM table_name WHERE column_name = value;
Q74. What is Accountancy
Accountancy is the practice of recording, analyzing, and reporting financial transactions for individuals, businesses, and organizations.
Accountancy involves the systematic recording of financial transactions.
It includes analyzing financial data to provide insights and make informed decisions.
Accountants prepare financial statements and reports to communicate the financial health of an entity.
They ensure compliance with financial regulations and tax laws.
Accountancy can be ap...read more
Q75. How would you handle escalations & Customer queries
I would handle escalations and customer queries by actively listening, empathizing, and providing timely and effective solutions.
Listen actively to the customer's concerns and empathize with their situation
Provide timely and effective solutions to resolve the issue
Ensure that the customer is satisfied with the resolution and follow up to ensure their continued satisfaction
Document the issue and resolution for future reference and process improvement
Train and empower team memb...read more
Q76. How would we convert access into trunk
To convert access into trunk, we need to configure the switch port as a trunk port.
Configure the switch port as a trunk port using the 'switchport mode trunk' command.
Verify the trunk configuration using the 'show interfaces trunk' command.
Ensure that the VLANs allowed on the trunk are configured using the 'switchport trunk allowed vlan' command.
Ensure that the native VLAN is configured using the 'switchport trunk native vlan' command.
Q77. What is the insurance
Insurance is a contract between an individual and an insurance company to protect against financial loss.
Insurance provides financial protection against unexpected events such as accidents, illnesses, and natural disasters.
The individual pays a premium to the insurance company in exchange for coverage.
Types of insurance include health, life, auto, home, and business insurance.
Insurance policies have terms and conditions that outline what is covered and what is not.
Insurance h...read more
Q78. What is Reinsurance?
Reinsurance is a process where an insurance company transfers a portion of its risk to another insurance company.
Reinsurance helps insurance companies manage their risk exposure.
It allows insurance companies to protect themselves against large losses.
Reinsurance can be either proportional or non-proportional.
Proportional reinsurance involves sharing both premiums and losses with the reinsurer.
Non-proportional reinsurance involves transferring only losses above a certain thres...read more
Q79. Explain the communication from VM to VM in Vmware Vsphere cluster?
VM communication in VMware Vsphere cluster is facilitated through virtual switches and network adapters.
VMs communicate through virtual switches that connect to physical network adapters.
Virtual switches can be configured with different network policies and security settings.
VMware tools can also be used to enhance communication and performance.
VMware NSX can provide advanced networking and security features for VM communication.
VMware vMotion allows live migration of VMs bet...read more
Q80. How to add and generate SSL certificate in Linux.
To add and generate SSL certificate in Linux, follow these steps:
Install OpenSSL package
Create a private key
Create a CSR (Certificate Signing Request)
Submit CSR to a Certificate Authority (CA)
Receive SSL certificate from CA
Install SSL certificate on the server
Configure web server to use SSL certificate
Q81. What is DBMS,RDBMS
DBMS stands for Database Management System, while RDBMS stands for Relational Database Management System.
DBMS is a software system that allows users to define, create, maintain and control access to the database.
RDBMS is a type of DBMS that stores data in a structured format using tables with rows and columns.
RDBMS uses SQL (Structured Query Language) for querying and managing the database.
Examples of RDBMS include MySQL, Oracle, SQL Server, and PostgreSQL.
Q82. What is an Underwriting?
Underwriting is the process of evaluating and assessing the risk of insuring a person or entity.
Underwriting involves analyzing the potential risks and determining the appropriate premium to charge for insurance coverage.
It is commonly used in the insurance industry for various types of insurance policies such as life, health, and property insurance.
Underwriting also involves reviewing the applicant's financial and medical history to determine their insurability and potential...read more
Q83. How we can configure continuously integrated development and implementation
Continuous integration and implementation can be configured by setting up automated build and deployment pipelines.
Set up a version control system like Git to track changes in code
Use a continuous integration tool like Jenkins to automatically build and test code changes
Configure automated deployment pipelines to deploy code changes to different environments
Integrate automated testing to ensure code quality and catch bugs early
Monitor and analyze the build and deployment proc...read more
Q84. What is accrual and deferral and when do we do it
Accrual is recognizing revenue and expenses when they are incurred, not when cash is exchanged. Deferral is postponing recognition of revenue or expenses to a later period.
Accrual accounting matches revenues with expenses in the same accounting period
Accruals are recorded as adjusting journal entries at the end of an accounting period
Deferrals involve recognizing revenue or expenses at a later date
Examples of accruals include recognizing revenue when services are provided, ev...read more
Q85. Why stacks, what are there usecases?
Stacks are data structures that follow Last In First Out (LIFO) principle, commonly used in function calls, expression evaluation, and undo mechanisms.
Used in function calls to store return addresses and local variables
Expression evaluation like infix to postfix conversion and evaluation
Undo mechanisms in text editors and web browsers
Q86. What is the IP Address qnd how can you check this?
An IP address is a unique numerical label assigned to each device connected to a computer network.
IP address stands for Internet Protocol address.
It is used to identify and locate devices on a network.
IP addresses can be either IPv4 (32-bit) or IPv6 (128-bit) format.
To check your IP address, you can use various methods such as using command prompt, checking network settings, or using online IP lookup tools.
Q87. what is salvage, what is rating, what is copay
Salvage refers to the value of an asset after it has been damaged or destroyed. Rating is an evaluation of the creditworthiness of a company or individual. Copay is the amount of money an insured person pays for a covered healthcare service.
Salvage is the residual value of an asset that has been damaged or destroyed, often used in insurance claims.
Rating is a measure of the creditworthiness or financial stability of a company or individual, used by credit agencies and lenders...read more
Q88. Logic of Knight's move in chess.
The knight in chess moves in an L-shape, two squares in one direction and one square in a perpendicular direction.
The knight can move to any of the eight squares that are two squares away in one direction and one square away in a perpendicular direction.
The knight's move is unique as it can jump over other pieces on the board.
The knight's move can be represented using algebraic notation, such as Nf3 or Nc6.
Here are a few examples of valid knight moves: Nf3, Nc6, Ng5, Nh4.
Q89. How to deploy war file in jboss
To deploy a war file in JBoss, use the JBoss Management Console or the command line interface.
Access the JBoss Management Console by navigating to http://localhost:9990/console/App.html#deployments
Click on the 'Add' button to upload the war file
Alternatively, use the command line interface by navigating to the bin directory and running the command 'jboss-cli.bat --connect --command="deploy path/to/war/file.war"'
Make sure the war file is properly packaged and contains all nece...read more
Q90. What is Artificial Intelligence?
Artificial Intelligence is the simulation of human intelligence in machines that are programmed to think and learn.
AI refers to the development of computer systems that can perform tasks that would typically require human intelligence.
It involves the ability of machines to understand, reason, learn, and adapt to new situations.
AI can be categorized into narrow AI (focused on specific tasks) and general AI (possessing human-like intelligence).
Examples of AI include virtual ass...read more
Q91. Difference between an asset and CI
An asset is a physical or virtual item that has financial value, while a CI is any item that needs to be managed for IT purposes.
Assets are typically tangible items, such as hardware or software licenses, that have a monetary value.
CIs are any items that need to be managed for IT purposes, such as servers, applications, or network devices.
Assets are often tracked in financial systems, while CIs are tracked in IT service management systems.
An asset can be a CI, but not all CIs...read more
Q92. Explain the complex test scenario automated by you in your career
Automated testing of a complex financial transaction system with multiple user roles and permissions
Created automated test scripts using Selenium to simulate different user roles accessing the system
Tested various scenarios such as fund transfers, account creation, and transaction history
Implemented data-driven testing to validate different input combinations and edge cases
Used API testing tools like Postman to verify backend functionality
Integrated test automation with CI/CD...read more
Q93. What is the full form of SDLC?
SDLC stands for Software Development Life Cycle.
SDLC is a systematic process for developing software applications.
It includes various phases such as requirements gathering, design, coding, testing, deployment, and maintenance.
Each phase has specific activities and deliverables.
SDLC ensures the development of high-quality software within budget and time constraints.
Examples of SDLC models include Waterfall, Agile, and DevOps.
Q94. How to actiavate a Volume Group or LV ?
To activate a Volume Group or LV, use the vgchange or lvchange command.
Use the vgchange command to activate a Volume Group.
Use the lvchange command to activate a Logical Volume.
Specify the name of the Volume Group or Logical Volume as an argument.
Use the -a y option with vgchange to activate all Volume Groups.
Use the -a y option with lvchange to activate all Logical Volumes in a Volume Group.
Q95. What is backup agent
A backup agent is a software component that facilitates the backup and restore process by managing communication between the backup server and the devices being backed up.
Backup agent acts as an intermediary between the backup server and the devices being backed up.
It facilitates the transfer of data from the devices to the backup server and vice versa.
Backup agents often provide features like compression, encryption, and deduplication to optimize the backup process.
Examples ...read more
Q96. What is lvm ? Explain breef
LVM stands for Logical Volume Manager. It is a tool used for managing disk space in Linux systems.
LVM allows for dynamic allocation of disk space
It allows for easy resizing of partitions
LVM can create snapshots of logical volumes for backup purposes
It can also be used for RAID configurations
Examples of LVM commands include pvcreate, vgcreate, and lvcreate
Q97. General computer troubleshooting steps. What are nvram etc.
NVRAM is a type of memory that stores settings for the computer's hardware. General troubleshooting steps include checking connections and restarting the system.
Check connections and cables
Restart the system
Check for error messages
Run diagnostic tests
Update drivers and software
Reset BIOS settings
Clear NVRAM settings
Q98. What is cache and cookies?
Cache and cookies are temporary storage files used by web browsers to improve website performance and user experience.
Cache stores website data to load pages faster on subsequent visits
Cookies store user information and preferences for a personalized experience
Clearing cache and cookies can help troubleshoot website issues
Third-party cookies can track user behavior for targeted advertising
Browser settings allow users to manage cache and cookie storage
Q99. Which programming language you know?
I know multiple programming languages including Java, Python, and C++.
Proficient in Java and Python
Familiar with C++ and JavaScript
Experience with SQL and HTML/CSS
Comfortable with object-oriented programming
Able to learn new languages quickly
Q100. What is Credit sales and credit purchases
Credit sales and credit purchases involve transactions where payment is deferred to a later date.
Credit sales refer to goods or services sold on credit, where payment is received at a later date.
Credit purchases refer to goods or services purchased on credit, where payment is made at a later date.
Both credit sales and credit purchases are common in business-to-business transactions.
Example: A company sells products to another company on credit terms of 30 days.
Example: A comp...read more
Top HR Questions asked in Ahmed Dry Fruits
Interview Process at Ahmed Dry Fruits
Top Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month