Add office photos
Engaged Employer

DXC Technology

3.7
based on 10k Reviews
Video summary
Filter interviews by

100+ Ahmed Dry Fruits Interview Questions and Answers

Updated 26 Feb 2025
Popular Designations

Q1. If someone has deleted the table in a database, then how can you find out the user that has deleted the table ? Can you find out using the log file? Can you retsore the table using the tail log backup?

Ans.

Yes, the user who deleted the table can be identified using the transaction log file.

  • To find out the user who deleted the table, you can query the transaction log file using the fn_dblog function.

  • The transaction log contains information about all the transactions performed on the database, including the table deletion.

  • By analyzing the log records, you can identify the specific transaction that deleted the table and retrieve the associated user information.

  • Restoring the table ...read more

View 2 more answers

Q2. 1. Describe project 2. What do you understand by OOPs. 3. What all Access modifiers are there in Java. 4. Difference between protected and default. 5. Overloading and overriding (difference, example and questio...

read more
Ans.

Interview questions for Software Engineer position

  • Describe a project you have worked on

  • Explain OOPs concepts and access modifiers in Java

  • Differentiate between protected and default access modifiers

  • Provide examples and differences between overloading and overriding

  • Use Java 8 to find even numbers in a list and to find the square of elements in a list using lambda expressions

  • Write a template for a REST controller with different HTTP methods

  • Provide the URI for deleting a request

  • W...read more

Add your answer

Q3. What is the default port of sql server & Can we change the default port, if so where can we change it?

Ans.

The default port of SQL Server is 1433. Yes, we can change the default port by modifying the SQL Server Configuration Manager.

  • The default port for SQL Server is 1433.

  • To change the default port, open SQL Server Configuration Manager.

  • Navigate to SQL Server Network Configuration and select Protocols for the desired SQL Server instance.

  • Right-click on TCP/IP and choose Properties.

  • In the IP Addresses tab, scroll down to the IPAll section.

  • Change the TCP Port value to the desired por...read more

View 2 more answers

Q4. What is the default isolation level in sql server? What happens with that isolation level ?

Ans.

The default isolation level in SQL Server is READ COMMITTED. It ensures that each transaction sees only committed data.

  • The default isolation level in SQL Server is READ COMMITTED.

  • READ COMMITTED ensures that each transaction sees only committed data.

  • It provides a balance between concurrency and data consistency.

  • Under READ COMMITTED, a transaction can read data that has been modified by another transaction but not yet committed.

  • However, it cannot read uncommitted data or data m...read more

View 2 more answers
Discover Ahmed Dry Fruits interview dos and don'ts from real experiences

Q5. What is the backup strategy for the biggest database you handled?

Ans.

The backup strategy for the biggest database I handled involved regular full backups, daily differential backups, and hourly transaction log backups.

  • Regular full backups were performed to capture the entire database.

  • Daily differential backups were taken to capture the changes since the last full backup.

  • Hourly transaction log backups were taken to capture the changes since the last differential backup.

  • Backups were stored on separate storage devices to ensure data redundancy.

  • Ba...read more

View 1 answer

Q6. When we run CheckDB, what command it runs in the background ?

Ans.

CheckDB runs DBCC CHECKDB command in the background.

  • CheckDB is a command used to check the logical and physical integrity of all objects in the specified database.

  • DBCC CHECKDB is the command that CheckDB runs in the background.

  • DBCC CHECKDB checks the allocation and structural integrity of all the objects in the specified database.

  • DBCC CHECKDB also checks for common errors like torn pages, index and data page corruptions, etc.

View 1 answer
Are these interview questions helpful?

Q7. What are blockings ? What are deadlocks and difference to blockings ?

Ans.

Blockings occur when one transaction holds a lock on a resource, preventing other transactions from accessing it. Deadlocks are a specific type of blocking where two or more transactions are waiting for each other to release resources.

  • Blockings happen when one transaction holds a lock on a resource and other transactions are blocked from accessing it.

  • Deadlocks occur when two or more transactions are waiting for each other to release resources, resulting in a deadlock situatio...read more

View 1 answer

Q8. What to do if an email is stuck in outbox in Outlook?

Ans.

Check network connection, try resending, check email size and attachments.

  • Check network connection and ensure it's stable.

  • Try resending the email by clicking on the 'Send/Receive' button.

  • Check the email size and attachments. Large files may cause the email to get stuck.

  • Restart Outlook and try sending the email again.

  • Check if the email is being blocked by antivirus or firewall software.

  • Delete the email from the Outbox and try sending it again.

Add your answer
Share interview questions and help millions of jobseekers 🌟

Q9. When to update statistics with respect to index rebuild and reorganize ? (Maintenance plans)

Ans.

Updating statistics is necessary after index rebuild or reorganize to ensure query optimization.

  • Statistics provide information about the distribution of data in a table or index.

  • Index rebuild or reorganize can change the distribution of data, making old statistics inaccurate.

  • Outdated statistics can lead to poor query performance.

  • Updating statistics after index rebuild or reorganize ensures query optimization.

  • Maintenance plans can be set up to automate this process.

Add your answer

Q10. What is the database size you jave used in your previous project?

Ans.

The database size I have used in my previous project was approximately 500 GB.

  • The database size was around 500 GB.

  • It contained various tables, indexes, and stored procedures.

  • The data included millions of records from different sources.

  • We regularly optimized the database to ensure efficient performance.

  • Backup and recovery strategies were implemented to safeguard the data.

View 1 answer

Q11. How to index reorganize and index rebuild based on index fragmentation?

Ans.

Index reorganize and rebuild based on fragmentation level

  • For fragmentation level < 5%, use reorganize

  • For fragmentation level > 30%, use rebuild

  • For fragmentation level between 5% and 30%, choose based on table size and usage

  • Use ALTER INDEX statement to perform reorganize or rebuild

  • Monitor fragmentation level regularly to maintain optimal performance

Add your answer

Q12. What is the parameter (-1) used in DBCC TRACEON(1204,-1) ? Why it is used?

Ans.

Parameter (-1) in DBCC TRACEON(1204,-1) is used to enable deadlock tracing for all sessions.

  • DBCC TRACEON(1204,-1) enables deadlock tracing for all sessions

  • The parameter -1 specifies that the trace flag should be enabled for all sessions

  • Deadlock tracing helps identify and resolve deadlocks in SQL Server

Add your answer

Q13. While applyong patching, some msi files are missing ? How do you resolve this?

Ans.

Check if the missing msi files are required for the patch. If yes, download and install them.

  • Verify if the missing msi files are essential for the patch

  • Check if the msi files are available in the original installation media or backup

  • If not, download the missing msi files from the vendor's website

  • Install the missing msi files before applying the patch

Add your answer

Q14. What is the difference between Summary.txt and Detail.txt ?

Ans.

Summary.txt contains summarized information while Detail.txt contains detailed information.

  • Summary.txt provides a brief overview of data while Detail.txt provides a more comprehensive view.

  • Summary.txt may contain aggregated data while Detail.txt contains individual data points.

  • Summary.txt is useful for quick analysis while Detail.txt is useful for in-depth analysis.

  • Example: Summary.txt may contain total sales for a month while Detail.txt contains sales data for each day of th...read more

Add your answer

Q15. Do you use any monitoring tool for monitoring Sql server?

Ans.

Yes, I use SQL Server Management Studio (SSMS) and SQL Server Profiler for monitoring SQL Server.

  • I use SSMS to monitor server activity, query performance, and resource usage.

  • I use SQL Server Profiler to capture and analyze SQL Server events and performance data.

  • I also use third-party tools like SolarWinds Database Performance Analyzer and Redgate SQL Monitor for more advanced monitoring and alerting.

  • Regularly monitoring SQL Server helps identify and resolve performance issues...read more

Add your answer

Q16. What is object oriented programming language in java

Ans.

Java is an object-oriented programming language that uses classes and objects to organize and structure code.

  • Java is based on the concept of classes and objects

  • Classes define the properties and behaviors of objects

  • Objects are instances of classes that can interact with each other

  • Java supports encapsulation, inheritance, and polymorphism

  • Examples of object-oriented programming in Java include creating a class for a car with properties like make, model, and year, and methods lik...read more

Add your answer

Q17. How to know about deadlocks in sql server?

Ans.

Deadlocks in SQL Server can be identified using SQL Server Profiler or by querying the system_health extended event session.

  • Use SQL Server Profiler to capture deadlock events

  • Query the system_health extended event session to view deadlock graphs

  • Use sp_whoisactive to identify blocking and deadlocking processes

  • Enable trace flag 1222 to capture deadlock information in the SQL Server error log

Add your answer

Q18. What is the command for the Tail log backup?

Ans.

The command for Tail log backup is BACKUP LOG WITH NORECOVERY

  • Use the BACKUP LOG command to create a tail log backup

  • Add the WITH NORECOVERY option to allow further log backups

  • Tail log backups are used to capture any transactions that occurred after the last log backup

  • Syntax: BACKUP LOG database_name TO disk = 'backup_device' WITH NORECOVERY

View 1 answer

Q19. If TempDB is full, how do you resolve it?

Ans.

To resolve TempDB full issue, identify the cause and take appropriate action.

  • Identify the cause of TempDB full issue using DMVs or third-party tools

  • Check for long-running transactions or open transactions

  • Check for large sorts or hash joins

  • Increase the size of TempDB or add more files

  • Move TempDB to a faster disk

  • Restart SQL Server to clear TempDB

  • Modify application code to reduce TempDB usage

Add your answer

Q20. why java is preferred? whats the benefit of functional programming and why introduced in java. what are wrapper classes, fibonaaci series , whats the use of join? what is threadinterrupted exception ? how hashm...

read more
Ans.

Answers to various technical questions related to Java programming.

  • Java is preferred for its platform independence, object-oriented nature, and vast community support.

  • Functional programming in Java allows for more concise and readable code, and better support for parallel processing.

  • Wrapper classes are used to convert primitive data types into objects, and vice versa.

  • Fibonacci series is a sequence of numbers where each number is the sum of the two preceding ones.

  • Join is a met...read more

Add your answer

Q21. Where we could use trunk and where we can use access

Ans.

Trunk is used to carry multiple VLANs between switches, while access is used to connect end devices to the network.

  • Trunk is used to connect switches together and carry multiple VLANs

  • Access is used to connect end devices like computers, printers, etc. to the network

  • Trunk ports are configured with VLAN tagging, while access ports are not

  • Examples of trunk ports are inter-switch links, while examples of access ports are ports connected to end devices

Add your answer

Q22. What is the difference between UL and VUL

Ans.

UL and VUL are both types of life insurance policies, but VUL offers investment options while UL does not.

  • UL stands for Universal Life Insurance, which offers a fixed premium and death benefit but no investment options

  • VUL stands for Variable Universal Life Insurance, which offers investment options in addition to a flexible premium and death benefit

  • VUL policyholders can choose to invest in stocks, bonds, and mutual funds, while UL policyholders cannot

  • VUL policies have the pot...read more

Add your answer

Q23. How to check server performance, incase application running on the server performing slow, what will you do ?

Ans.

To check server performance, monitor CPU, memory, disk usage. Use tools like top, htop, iostat. Check logs for errors.

  • Monitor CPU usage with top or htop command

  • Monitor memory usage with free or vmstat command

  • Monitor disk usage with df or iostat command

  • Check logs for errors related to the application

  • Use performance monitoring tools like Nagios or Zabbix

Add your answer

Q24. What are the issues you faced in log shipping?

Ans.

Issues faced in log shipping

  • Network latency causing delays in log shipping

  • Log backups not being taken frequently enough

  • Failure to restore logs due to mismatched log backups

  • Lack of monitoring and alerting for log shipping failures

Add your answer

Q25. What is VPN? How to connect to VPN?

Ans.

VPN stands for Virtual Private Network. It is a secure way to connect to a private network over the internet.

  • To connect to a VPN, you need to have a VPN client installed on your device.

  • You also need to have the login credentials for the VPN network.

  • Once you have the client installed and the credentials, you can connect to the VPN by selecting the network and entering your login details.

  • VPN can be used to access resources on a private network while working remotely or to secur...read more

Add your answer

Q26. How to reinstall drivers for any hardware?

Ans.

To reinstall drivers for any hardware, follow these steps.

  • Uninstall the current driver from Device Manager

  • Download the latest driver from the manufacturer's website

  • Install the new driver by running the setup file

  • Restart the computer to complete the installation

  • If the driver is not available on the website, use Windows Update or a driver update tool

  • Ensure compatibility with the operating system and hardware version

Add your answer

Q27. What are the isolation levels in sql server?

Ans.

Isolation levels in SQL Server determine how transactions interact with each other.

  • There are five isolation levels: READ UNCOMMITTED, READ COMMITTED, REPEATABLE READ, SNAPSHOT, and SERIALIZABLE.

  • Each level has its own trade-offs between concurrency and consistency.

  • The default isolation level is READ COMMITTED.

  • Isolation levels can be set at the transaction level or for the entire database.

  • For example, the SNAPSHOT isolation level allows for consistent reads even when data is be...read more

Add your answer

Q28. What do you used to do using the ticketing tool?

Ans.

I used the ticketing tool to track and manage database-related issues and requests.

  • Create and assign tickets for database-related issues and requests

  • Monitor ticket status and update as necessary

  • Communicate with stakeholders regarding ticket status and resolution

  • Close tickets once issues are resolved

  • Generate reports on ticket volume and resolution time

Add your answer

Q29. What is point in time recovery?

Ans.

Point in time recovery is the ability to restore a database to a specific moment in time.

  • It allows for recovery of data up to a specific point in time.

  • It requires regular backups and transaction logs.

  • It is useful in case of accidental data deletion or corruption.

  • It can be done manually or through automated tools.

  • Example: Restoring a database to its state before a specific transaction occurred.

View 1 answer

Q30. How you provision EC2 instances, SG, etc thru Cloud Formation

Ans.

I use CloudFormation templates to provision EC2 instances and security groups.

  • Create a CloudFormation template with the necessary resources

  • Specify the instance type, AMI, and other details in the template

  • Define the security group rules in the template

  • Use the AWS CLI or console to deploy the CloudFormation stack

Add your answer

Q31. What to do if a word file is not opening?

Ans.

Check for file corruption and try opening in safe mode.

  • Check if the file is corrupted or damaged.

  • Try opening the file in safe mode.

  • Check for any updates or patches for the software.

  • Try opening the file on a different computer.

  • Use a file recovery tool to repair the file.

Add your answer

Q32. Do you have idea on replication ?

Ans.

Yes, replication is the process of copying and distributing data from one database to another.

  • Replication is used to improve data availability, scalability, and disaster recovery.

  • It involves a publisher database that sends data to one or more subscriber databases.

  • There are three types of replication: snapshot, transactional, and merge.

  • Snapshot replication copies the entire database to the subscriber.

  • Transactional replication sends only the changes made to the database since t...read more

View 1 answer

Q33. Do you have any idea on SQL Profiler ?

Ans.

SQL Profiler is a tool used to capture and analyze SQL Server events and activities.

  • SQL Profiler captures events such as queries, stored procedures, and errors.

  • It can be used to troubleshoot performance issues and optimize queries.

  • Profiling can be done on a live server or on a trace file.

  • Events can be filtered and grouped for easier analysis.

  • SQL Profiler has been replaced by Extended Events in newer versions of SQL Server.

View 1 answer

Q34. How to check if webcam is working or not?

Ans.

To check if webcam is working or not, follow these steps.

  • Check if the webcam is properly connected to the computer

  • Open the webcam application or any video conferencing app to check if the webcam is working

  • Check if the webcam drivers are installed and updated

  • Restart the computer and try again

  • If the webcam still doesn't work, try connecting it to another computer to check if it's a hardware issue

Add your answer

Q35. Major differences between traditional life and whole life products?

Ans.

Traditional life products provide coverage for a specific term while whole life products provide coverage for the entire life of the policyholder.

  • Traditional life products have a fixed term and premium payments, while whole life products have flexible premium payments and coverage for the entire life of the policyholder.

  • Whole life products have a cash value component that grows over time, while traditional life products do not.

  • Whole life products are generally more expensive ...read more

Add your answer

Q36. What do you do if the server stuck recovery level after patching. What is the patching tool you are using?

Ans.

If server stuck at recovery level after patching, check logs and rollback if necessary. Patching tool used is XYZ.

  • Check server logs for any errors or issues

  • If necessary, rollback the patch to the previous version

  • Ensure that the patching tool used is XYZ

  • Contact vendor support if the issue persists

Add your answer

Q37. How I will achieve the IOS upgrade when only I have 10 minutes left in PE window??

Ans.

Use pre-staged image and fast transfer methods to achieve IOS upgrade within 10 minutes.

  • Pre-stage the image on the device before the upgrade window

  • Use fast transfer methods like TFTP or FTP to transfer the image quickly

  • Ensure all necessary configurations are saved and backed up before the upgrade

  • Have a rollback plan in case of any issues during the upgrade

Add your answer

Q38. What is the backup strategy you have?

Ans.

Our backup strategy includes full backups weekly, differential backups daily, and transaction log backups every 15 minutes.

  • Weekly full backups

  • Daily differential backups

  • Transaction log backups every 15 minutes

  • Backups stored on separate disk

  • Regular testing of backups for restoration

Add your answer

Q39. What is the difference between DDL &amp; DML

Ans.

DDL stands for Data Definition Language and is used to define the structure of database objects. DML stands for Data Manipulation Language and is used to manipulate data within the database.

  • DDL is used to create, modify, and delete database objects such as tables, indexes, and views.

  • DML is used to insert, update, delete, and retrieve data from database tables.

  • Examples of DDL statements include CREATE TABLE, ALTER TABLE, and DROP TABLE.

  • Examples of DML statements include INSERT...read more

Add your answer

Q40. Patching and the process of how I do patching

Ans.

Patching is the process of updating software to fix vulnerabilities and improve performance.

  • Patching involves identifying and applying updates to software systems.

  • It is important to regularly check for patches and updates from vendors.

  • Patching can be done manually or through automated tools.

  • Before applying patches, it is crucial to test them in a controlled environment.

  • Patching should be performed in a planned and systematic manner to minimize downtime and ensure system stabi...read more

View 1 answer

Q41. How would you present a SAN LUN to Solaris LDOM or CDOM ?

Ans.

To present a SAN LUN to Solaris LDOM or CDOM, we need to follow a few steps.

  • First, we need to identify the SAN LUN and the target LDOM/CDOM.

  • Then, we need to create a logical device using the format command.

  • Next, we need to configure the LUN using the cfgadm command.

  • Finally, we need to add the LUN to the LDOM/CDOM using the ldm add-vdsdev command.

Add your answer

Q42. 2. What is control panel?

Ans.

Control panel is a graphical user interface that allows users to manage and control computer hardware and software settings.

  • It provides access to various system settings and features

  • It allows users to install and uninstall software

  • It can be used to configure hardware devices such as printers and scanners

  • Examples include Windows Control Panel and macOS System Preferences

View 2 more answers

Q43. Different ways to repair MS Office suite?

Ans.

There are multiple ways to repair MS Office suite.

  • Use the built-in repair option in the Control Panel

  • Use the Microsoft Office Configuration Analyzer Tool

  • Uninstall and reinstall the software

  • Use the Microsoft Support and Recovery Assistant

  • Run the SFC (System File Checker) scan

  • Check for and install any available updates

Add your answer

Q44. How to exit without executing the final?

Ans.

To exit without executing the final, use the 'return' statement or 'exit' function.

  • Use the 'return' statement to exit a function or method without executing the remaining code.

  • In some programming languages, like C or C++, you can use the 'exit' function to terminate the program immediately.

  • Consider using conditional statements or loops to control the flow and determine when to exit without executing the final.

View 1 answer

Q45. Difference between call by value and call by reference

Ans.

Call by value passes a copy of the value while call by reference passes the address of the value.

  • Call by value is used for simple data types like int, float, etc.

  • Call by reference is used for complex data types like arrays, structures, etc.

  • Call by value does not modify the original value while call by reference can modify the original value.

  • Call by value is faster than call by reference as it does not involve memory access.

  • Example of call by value: int a = 5; func(a);

  • Example ...read more

Add your answer

Q46. What ticketing tool you use?

Ans.

We use ServiceNow as our ticketing tool.

  • ServiceNow is a cloud-based platform that offers IT service management (ITSM), IT operations management (ITOM), and IT business management (ITBM) solutions.

  • It allows us to manage incidents, problems, changes, and service requests in a single system.

  • We can also track the status of tickets, assign them to team members, and set priorities and deadlines.

  • ServiceNow also provides reporting and analytics capabilities to help us monitor perform...read more

View 1 answer

Q47. Do you have any idea why programming languages exist?

Ans.

Programming languages exist to provide a standardized way for humans to communicate instructions to computers.

  • Programming languages allow humans to write code that can be understood and executed by computers.

  • They provide a set of rules and syntax for writing code.

  • Programming languages enable the development of software applications and systems.

  • They help in automating tasks, solving complex problems, and improving efficiency.

  • Examples of programming languages include Python, Ja...read more

View 1 answer

Q48. What is unbilled revenue and provide journal entries

Ans.

Unbilled revenue is revenue that has been earned but not yet invoiced to the customer.

  • Unbilled revenue is recorded as a current asset on the balance sheet.

  • Journal entry for recognizing unbilled revenue: Debit Unbilled Revenue and Credit Revenue.

  • Journal entry for invoicing unbilled revenue: Debit Accounts Receivable and Credit Unbilled Revenue.

Add your answer

Q49. Latest FIlesystem and LVM how to extend and reduce filesystem?

Ans.

To extend a filesystem, first extend the underlying LVM volume, then use the resize2fs command. To reduce a filesystem, first unmount it, then use the resize2fs command followed by the lvreduce command.

  • To extend a filesystem:

  • - Extend the underlying LVM volume using lvextend command

  • - Use resize2fs command to extend the filesystem

  • - Example: sudo lvextend -L +10G /dev/mapper/vg01-lv01 && sudo resize2fs /dev/mapper/vg01-lv01

  • To reduce a filesystem:

  • - Unmount the filesystem using um...read more

Add your answer

Q50. 1. What are he drivers in computer and can you tell if speakers are not working then what are all the steps you will follow

Ans.

Drivers in computer are software components that enable communication between the operating system and hardware devices.

  • Drivers are essential for the proper functioning of hardware components such as printers, graphics cards, and network adapters.

  • If speakers are not working, steps to follow include checking the volume settings, ensuring the speakers are properly connected to the computer, updating or reinstalling audio drivers, and testing the speakers on another device.

  • Troub...read more

Add your answer

Q51. What are the Death Benefit Options?

Ans.

Death benefit options refer to the different ways in which a life insurance policy pays out to beneficiaries upon the death of the insured.

  • Common death benefit options include lump sum payments, installment payments, and annuity payments.

  • Lump sum payments provide the entire death benefit amount in one payment.

  • Installment payments provide the death benefit in a series of payments over a set period of time.

  • Annuity payments provide a regular stream of income to the beneficiary o...read more

Add your answer

Q52. What is the ledger entry of credit sale

Ans.

The ledger entry for a credit sale involves recording the increase in accounts receivable and the corresponding increase in sales revenue.

  • Credit sale is a transaction where goods or services are sold on credit, meaning the payment is expected at a later date.

  • To record a credit sale, the accounts receivable account is debited to increase the amount owed by the customer.

  • Simultaneously, the sales revenue account is credited to reflect the increase in revenue generated from the s...read more

View 2 more answers

Q53. Are you aware of Servers, Database and Data center?

Ans.

Yes, I am aware of Servers, Database and Data center.

  • I have experience in managing servers and databases.

  • I am familiar with data center operations and maintenance.

  • I understand the importance of data security and backup.

  • Examples: I have worked with Microsoft SQL Server, Oracle Database, and MySQL. I have also managed servers on AWS and Azure.

Add your answer

Q54. What do you know about migration and decommissioning process?

Ans.

Migration and decommissioning process involves moving data from one system to another or retiring an old system.

  • Migration process involves transferring data from one system to another, ensuring data integrity and minimizing downtime.

  • Decommissioning process involves retiring an old system, ensuring data security and proper disposal of hardware.

  • Both processes require careful planning, testing, and communication with stakeholders.

  • Examples of migration and decommissioning include...read more

Add your answer

Q55. Write a program for generating prime numbers? Write a program for swapping of two numbers?

Ans.

Programs for generating prime numbers and swapping two numbers.

  • For generating prime numbers, iterate through numbers and check if they are divisible by any number less than them.

  • For swapping two numbers, use a temporary variable to store one of the numbers before swapping them.

  • Both programs can be implemented using loops and conditional statements.

Add your answer

Q56. What are the daemons in avamar

Ans.

Daemons in Avamar are background processes that perform various tasks such as data deduplication, backup scheduling, and replication.

  • Avvagentd: Manages communication between the Avamar server and clients

  • Avvcbimage: Performs backup and restore operations

  • Avvcbjobd: Controls backup and restore job scheduling

  • Avvcbrestore: Handles restore operations

  • Avvcbrepd: Manages replication between Avamar grids

  • Avvcbverify: Verifies the integrity of backed up data

  • Avvsshd: Provides secure shell...read more

View 1 answer

Q57. What is VMware What is sv motion What is v-mostion What is ha and dr

Ans.

VMware is a virtualization and cloud computing software provider. SV motion and v-motion are features that enable live migration of virtual machines. HA stands for High Availability and DR stands for Disaster Recovery.

  • VMware is a software company that provides virtualization and cloud computing solutions.

  • SV motion is a feature in VMware that allows live migration of virtual machines between storage devices.

  • V-motion is a feature in VMware that enables live migration of virtual...read more

View 1 answer

Q58. What happens when we delete

Ans.

When we delete, the data or file is removed from the system and may be moved to a recycle bin or permanently erased.

  • Data or file is removed from the system

  • May be moved to a recycle bin before permanent deletion

  • Space previously occupied by the deleted data/file becomes available for new data

Add your answer

Q59. HOW TO CREATE OUR OWN IMMUTABLE CLASS? WHY IMMUTABLE CLASS

Ans.

Immutable classes in Java are classes whose objects cannot be modified once they are created.

  • Make the class final to prevent inheritance

  • Make all fields private and final

  • Do not provide setter methods for fields

  • Ensure that any mutable objects within the class are also immutable

Add your answer

Q60. IN WHICH SITUATION WE USE @PRIMARY AND @ QUALIFIER ?

Ans.

Use @Primary to specify a primary bean when multiple beans of the same type are present. Use @Qualifier to specify a specific bean when multiple beans of the same type are present.

  • Use @Primary to indicate the primary bean to be used when multiple beans of the same type are present in the Spring application context.

  • Use @Qualifier along with @Autowired to specify a specific bean to be injected when multiple beans of the same type are present.

  • Example: @Primary annotation can be ...read more

Add your answer

Q61. Query to select top 2 data of a column.

Ans.

To select the top 2 data of a column, use the 'SELECT TOP' statement in SQL.

  • Use the 'SELECT TOP' statement followed by the number of rows you want to retrieve.

  • Specify the column name after the 'SELECT' keyword.

  • Order the data in the column using 'ORDER BY' clause if needed.

  • Example: SELECT TOP 2 column_name FROM table_name ORDER BY column_name DESC;

Add your answer

Q62. How to check the Performance issues in Windows?

Ans.

Performance issues in Windows can be checked using various tools and techniques.

  • Use Task Manager to check CPU, memory, and disk usage

  • Use Resource Monitor to check detailed performance information

  • Use Performance Monitor to monitor specific performance counters

  • Check for any software or driver updates

  • Run a virus scan to check for malware

  • Check for any hardware issues such as failing hard drives or overheating components

Add your answer

Q63. What is load balancer? How does it work? Application gateway basics and functionality? OSI model? Update manager errors and troubleshooting steps? Backup and recovery, migration ?

Add your answer

Q64. WHAT IS DIFFERENCE BETWEEN COMPOSITION AND AGGREGATION ?

Ans.

Composition is a strong relationship where the child object cannot exist independently of the parent object, while aggregation is a weak relationship where the child object can exist independently.

  • Composition is a 'has-a' relationship, where the child object is a part of the parent object.

  • Aggregation is a 'has-a' relationship, where the child object is not a part of the parent object.

  • In composition, the child object is created and destroyed along with the parent object.

  • In agg...read more

Add your answer

Q65. What is Sql? Explain

Ans.

SQL is a programming language used for managing and manipulating databases.

  • SQL stands for Structured Query Language.

  • It is used to communicate with databases to perform tasks like querying data, updating data, and creating tables.

  • Common SQL commands include SELECT, INSERT, UPDATE, DELETE.

  • SQL is used in various database management systems like MySQL, PostgreSQL, Oracle.

  • Example: SELECT * FROM customers WHERE city = 'New York';

Add your answer

Q66. What we can do in security as port wise

Ans.

Port-based security involves controlling access to network resources based on the physical port of the device.

  • Port security can be implemented by limiting the number of MAC addresses that can be learned on a port.

  • It can also involve configuring the port to only allow traffic from specific VLANs.

  • Port security can be used to prevent unauthorized access to the network by limiting the devices that can connect to it.

  • It can also be used to prevent rogue devices from being connected...read more

Add your answer

Q67. What are the Non-forfeiture options?

Ans.

Non-forfeiture options are the choices available to a policyholder when they stop paying premiums.

  • Non-forfeiture options allow policyholders to retain some value from their policy even if they stop paying premiums.

  • Common non-forfeiture options include reduced paid-up insurance, extended term insurance, and cash surrender value.

  • Reduced paid-up insurance provides a smaller death benefit but does not require further premium payments.

  • Extended term insurance allows the policyholde...read more

Add your answer

Q68. Explain the Smoke testing,Sanity testing with an examples?

Ans.

Smoke testing and Sanity testing are two types of software testing used to check the basic functionality of the application.

  • Smoke testing is a type of testing that checks whether the critical functionalities of the application are working fine or not.

  • Sanity testing is a type of testing that checks whether the bugs have been fixed or not after a new build is released.

  • Smoke testing is done to ensure that the application is stable enough for further testing.

  • Sanity testing is don...read more

Add your answer

Q69. What is vss admin list writers

Ans.

vss admin list writers is a command used to list all the registered Volume Shadow Copy Service (VSS) writers on a Windows system.

  • VSS writers are responsible for creating consistent snapshots of data on a system for backup purposes.

  • The vss admin list writers command provides information about the state and availability of each VSS writer.

  • It is commonly used to troubleshoot VSS-related issues and ensure that all writers are functioning correctly.

  • The output of the command includ...read more

View 1 answer

Q70. What is deduplication

Ans.

Deduplication is a data compression technique that eliminates duplicate copies of data, reducing storage space and improving efficiency.

  • Deduplication is used to identify and remove redundant data.

  • It compares incoming data with existing data and stores only unique instances.

  • Deduplication can be performed at the file, block, or byte level.

  • It helps in reducing storage costs and improving backup and restore times.

  • Examples of deduplication technologies include inline deduplication...read more

View 2 more answers

Q71. Configuration of SAP time management, personal administration module

Ans.

Configuration of SAP time management and personal administration module involves setting up employee data, time recording, and absence management.

  • Employee data is maintained in the Personnel Administration module

  • Time recording is done through Time Management module

  • Absence management is handled through Absence Management module

  • Configuration involves defining work schedules, absence types, and time quotas

  • Integration with payroll module is important for accurate payroll processi...read more

Add your answer

Q72. How DNS works? what happens when you click any link on browser?

Ans.

DNS translates domain names to IP addresses. When you click a link, browser sends a DNS query to resolve the domain name.

  • DNS stands for Domain Name System

  • When you click a link, browser sends a DNS query to a DNS server to resolve the domain name to an IP address

  • The DNS server then responds with the corresponding IP address

  • The browser then uses the IP address to connect to the server hosting the website

Add your answer

Q73. How you can delete the record on database ?

Ans.

To delete a record from a database, you can use the DELETE statement.

  • Use the DELETE statement with the WHERE clause to specify the record to be deleted.

  • Make sure to backup the database before deleting any records.

  • Example: DELETE FROM table_name WHERE column_name = value;

Add your answer

Q74. What is Accountancy

Ans.

Accountancy is the practice of recording, analyzing, and reporting financial transactions for individuals, businesses, and organizations.

  • Accountancy involves the systematic recording of financial transactions.

  • It includes analyzing financial data to provide insights and make informed decisions.

  • Accountants prepare financial statements and reports to communicate the financial health of an entity.

  • They ensure compliance with financial regulations and tax laws.

  • Accountancy can be ap...read more

View 6 more answers

Q75. How would you handle escalations &amp; Customer queries

Ans.

I would handle escalations and customer queries by actively listening, empathizing, and providing timely and effective solutions.

  • Listen actively to the customer's concerns and empathize with their situation

  • Provide timely and effective solutions to resolve the issue

  • Ensure that the customer is satisfied with the resolution and follow up to ensure their continued satisfaction

  • Document the issue and resolution for future reference and process improvement

  • Train and empower team memb...read more

Add your answer

Q76. How would we convert access into trunk

Ans.

To convert access into trunk, we need to configure the switch port as a trunk port.

  • Configure the switch port as a trunk port using the 'switchport mode trunk' command.

  • Verify the trunk configuration using the 'show interfaces trunk' command.

  • Ensure that the VLANs allowed on the trunk are configured using the 'switchport trunk allowed vlan' command.

  • Ensure that the native VLAN is configured using the 'switchport trunk native vlan' command.

Add your answer

Q77. What is the insurance

Ans.

Insurance is a contract between an individual and an insurance company to protect against financial loss.

  • Insurance provides financial protection against unexpected events such as accidents, illnesses, and natural disasters.

  • The individual pays a premium to the insurance company in exchange for coverage.

  • Types of insurance include health, life, auto, home, and business insurance.

  • Insurance policies have terms and conditions that outline what is covered and what is not.

  • Insurance h...read more

View 1 answer

Q78. What is Reinsurance?

Ans.

Reinsurance is a process where an insurance company transfers a portion of its risk to another insurance company.

  • Reinsurance helps insurance companies manage their risk exposure.

  • It allows insurance companies to protect themselves against large losses.

  • Reinsurance can be either proportional or non-proportional.

  • Proportional reinsurance involves sharing both premiums and losses with the reinsurer.

  • Non-proportional reinsurance involves transferring only losses above a certain thres...read more

Add your answer

Q79. Explain the communication from VM to VM in Vmware Vsphere cluster?

Ans.

VM communication in VMware Vsphere cluster is facilitated through virtual switches and network adapters.

  • VMs communicate through virtual switches that connect to physical network adapters.

  • Virtual switches can be configured with different network policies and security settings.

  • VMware tools can also be used to enhance communication and performance.

  • VMware NSX can provide advanced networking and security features for VM communication.

  • VMware vMotion allows live migration of VMs bet...read more

Add your answer

Q80. How to add and generate SSL certificate in Linux.

Ans.

To add and generate SSL certificate in Linux, follow these steps:

  • Install OpenSSL package

  • Create a private key

  • Create a CSR (Certificate Signing Request)

  • Submit CSR to a Certificate Authority (CA)

  • Receive SSL certificate from CA

  • Install SSL certificate on the server

  • Configure web server to use SSL certificate

Add your answer

Q81. What is DBMS,RDBMS

Ans.

DBMS stands for Database Management System, while RDBMS stands for Relational Database Management System.

  • DBMS is a software system that allows users to define, create, maintain and control access to the database.

  • RDBMS is a type of DBMS that stores data in a structured format using tables with rows and columns.

  • RDBMS uses SQL (Structured Query Language) for querying and managing the database.

  • Examples of RDBMS include MySQL, Oracle, SQL Server, and PostgreSQL.

Add your answer

Q82. What is an Underwriting?

Ans.

Underwriting is the process of evaluating and assessing the risk of insuring a person or entity.

  • Underwriting involves analyzing the potential risks and determining the appropriate premium to charge for insurance coverage.

  • It is commonly used in the insurance industry for various types of insurance policies such as life, health, and property insurance.

  • Underwriting also involves reviewing the applicant's financial and medical history to determine their insurability and potential...read more

Add your answer

Q83. How we can configure continuously integrated development and implementation

Ans.

Continuous integration and implementation can be configured by setting up automated build and deployment pipelines.

  • Set up a version control system like Git to track changes in code

  • Use a continuous integration tool like Jenkins to automatically build and test code changes

  • Configure automated deployment pipelines to deploy code changes to different environments

  • Integrate automated testing to ensure code quality and catch bugs early

  • Monitor and analyze the build and deployment proc...read more

Add your answer

Q84. What is accrual and deferral and when do we do it

Ans.

Accrual is recognizing revenue and expenses when they are incurred, not when cash is exchanged. Deferral is postponing recognition of revenue or expenses to a later period.

  • Accrual accounting matches revenues with expenses in the same accounting period

  • Accruals are recorded as adjusting journal entries at the end of an accounting period

  • Deferrals involve recognizing revenue or expenses at a later date

  • Examples of accruals include recognizing revenue when services are provided, ev...read more

Add your answer

Q85. Why stacks, what are there usecases?

Ans.

Stacks are data structures that follow Last In First Out (LIFO) principle, commonly used in function calls, expression evaluation, and undo mechanisms.

  • Used in function calls to store return addresses and local variables

  • Expression evaluation like infix to postfix conversion and evaluation

  • Undo mechanisms in text editors and web browsers

Add your answer

Q86. What is the IP Address qnd how can you check this?

Ans.

An IP address is a unique numerical label assigned to each device connected to a computer network.

  • IP address stands for Internet Protocol address.

  • It is used to identify and locate devices on a network.

  • IP addresses can be either IPv4 (32-bit) or IPv6 (128-bit) format.

  • To check your IP address, you can use various methods such as using command prompt, checking network settings, or using online IP lookup tools.

Add your answer

Q87. what is salvage, what is rating, what is copay

Ans.

Salvage refers to the value of an asset after it has been damaged or destroyed. Rating is an evaluation of the creditworthiness of a company or individual. Copay is the amount of money an insured person pays for a covered healthcare service.

  • Salvage is the residual value of an asset that has been damaged or destroyed, often used in insurance claims.

  • Rating is a measure of the creditworthiness or financial stability of a company or individual, used by credit agencies and lenders...read more

Add your answer

Q88. Logic of Knight's move in chess.

Ans.

The knight in chess moves in an L-shape, two squares in one direction and one square in a perpendicular direction.

  • The knight can move to any of the eight squares that are two squares away in one direction and one square away in a perpendicular direction.

  • The knight's move is unique as it can jump over other pieces on the board.

  • The knight's move can be represented using algebraic notation, such as Nf3 or Nc6.

  • Here are a few examples of valid knight moves: Nf3, Nc6, Ng5, Nh4.

Add your answer

Q89. How to deploy war file in jboss

Ans.

To deploy a war file in JBoss, use the JBoss Management Console or the command line interface.

  • Access the JBoss Management Console by navigating to http://localhost:9990/console/App.html#deployments

  • Click on the 'Add' button to upload the war file

  • Alternatively, use the command line interface by navigating to the bin directory and running the command 'jboss-cli.bat --connect --command="deploy path/to/war/file.war"'

  • Make sure the war file is properly packaged and contains all nece...read more

Add your answer

Q90. What is Artificial Intelligence?

Ans.

Artificial Intelligence is the simulation of human intelligence in machines that are programmed to think and learn.

  • AI refers to the development of computer systems that can perform tasks that would typically require human intelligence.

  • It involves the ability of machines to understand, reason, learn, and adapt to new situations.

  • AI can be categorized into narrow AI (focused on specific tasks) and general AI (possessing human-like intelligence).

  • Examples of AI include virtual ass...read more

View 1 answer

Q91. Difference between an asset and CI

Ans.

An asset is a physical or virtual item that has financial value, while a CI is any item that needs to be managed for IT purposes.

  • Assets are typically tangible items, such as hardware or software licenses, that have a monetary value.

  • CIs are any items that need to be managed for IT purposes, such as servers, applications, or network devices.

  • Assets are often tracked in financial systems, while CIs are tracked in IT service management systems.

  • An asset can be a CI, but not all CIs...read more

Add your answer

Q92. Explain the complex test scenario automated by you in your career

Ans.

Automated testing of a complex financial transaction system with multiple user roles and permissions

  • Created automated test scripts using Selenium to simulate different user roles accessing the system

  • Tested various scenarios such as fund transfers, account creation, and transaction history

  • Implemented data-driven testing to validate different input combinations and edge cases

  • Used API testing tools like Postman to verify backend functionality

  • Integrated test automation with CI/CD...read more

Add your answer

Q93. What is the full form of SDLC?

Ans.

SDLC stands for Software Development Life Cycle.

  • SDLC is a systematic process for developing software applications.

  • It includes various phases such as requirements gathering, design, coding, testing, deployment, and maintenance.

  • Each phase has specific activities and deliverables.

  • SDLC ensures the development of high-quality software within budget and time constraints.

  • Examples of SDLC models include Waterfall, Agile, and DevOps.

View 1 answer

Q94. How to actiavate a Volume Group or LV ?

Ans.

To activate a Volume Group or LV, use the vgchange or lvchange command.

  • Use the vgchange command to activate a Volume Group.

  • Use the lvchange command to activate a Logical Volume.

  • Specify the name of the Volume Group or Logical Volume as an argument.

  • Use the -a y option with vgchange to activate all Volume Groups.

  • Use the -a y option with lvchange to activate all Logical Volumes in a Volume Group.

Add your answer

Q95. What is backup agent

Ans.

A backup agent is a software component that facilitates the backup and restore process by managing communication between the backup server and the devices being backed up.

  • Backup agent acts as an intermediary between the backup server and the devices being backed up.

  • It facilitates the transfer of data from the devices to the backup server and vice versa.

  • Backup agents often provide features like compression, encryption, and deduplication to optimize the backup process.

  • Examples ...read more

View 1 answer

Q96. What is lvm ? Explain breef

Ans.

LVM stands for Logical Volume Manager. It is a tool used for managing disk space in Linux systems.

  • LVM allows for dynamic allocation of disk space

  • It allows for easy resizing of partitions

  • LVM can create snapshots of logical volumes for backup purposes

  • It can also be used for RAID configurations

  • Examples of LVM commands include pvcreate, vgcreate, and lvcreate

Add your answer

Q97. General computer troubleshooting steps. What are nvram etc.

Ans.

NVRAM is a type of memory that stores settings for the computer's hardware. General troubleshooting steps include checking connections and restarting the system.

  • Check connections and cables

  • Restart the system

  • Check for error messages

  • Run diagnostic tests

  • Update drivers and software

  • Reset BIOS settings

  • Clear NVRAM settings

Add your answer

Q98. What is cache and cookies?

Ans.

Cache and cookies are temporary storage files used by web browsers to improve website performance and user experience.

  • Cache stores website data to load pages faster on subsequent visits

  • Cookies store user information and preferences for a personalized experience

  • Clearing cache and cookies can help troubleshoot website issues

  • Third-party cookies can track user behavior for targeted advertising

  • Browser settings allow users to manage cache and cookie storage

Add your answer

Q99. Which programming language you know?

Ans.

I know multiple programming languages including Java, Python, and C++.

  • Proficient in Java and Python

  • Familiar with C++ and JavaScript

  • Experience with SQL and HTML/CSS

  • Comfortable with object-oriented programming

  • Able to learn new languages quickly

Add your answer

Q100. What is Credit sales and credit purchases

Ans.

Credit sales and credit purchases involve transactions where payment is deferred to a later date.

  • Credit sales refer to goods or services sold on credit, where payment is received at a later date.

  • Credit purchases refer to goods or services purchased on credit, where payment is made at a later date.

  • Both credit sales and credit purchases are common in business-to-business transactions.

  • Example: A company sells products to another company on credit terms of 30 days.

  • Example: A comp...read more

Add your answer
1
2
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos

Interview Process at Ahmed Dry Fruits

based on 128 interviews
Interview experience
4.2
Good
View more
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Interview Questions from Similar Companies

4.1
 • 367 Interview Questions
3.9
 • 246 Interview Questions
4.2
 • 177 Interview Questions
3.3
 • 150 Interview Questions
3.3
 • 135 Interview Questions
4.3
 • 135 Interview Questions
View all
Top DXC Technology Interview Questions And Answers
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
75 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter