DXC Technology
400+ Diverse Lynx Interview Questions and Answers
Q101. What are class loaders, Why java is a robust language , what are enums etc
Class loaders are responsible for loading classes into memory, Java is robust due to its strong memory management and exception handling, enums are a special data type that restricts variables to a predefined set of values.
Class loaders in Java are responsible for dynamically loading classes into memory at runtime.
Java is considered a robust language due to its strong memory management, garbage collection, and exception handling capabilities.
Enums in Java are a special data t...read more
Q102. How to check the Performance issues in Windows?
Performance issues in Windows can be checked using various tools and techniques.
Use Task Manager to check CPU, memory, and disk usage
Use Resource Monitor to check detailed performance information
Use Performance Monitor to monitor specific performance counters
Check for any software or driver updates
Run a virus scan to check for malware
Check for any hardware issues such as failing hard drives or overheating components
Q103. What do you know about python ?
Python is a high-level, interpreted programming language known for its simplicity and readability.
Python is used for web development, data analysis, artificial intelligence, and scientific computing.
It has a large standard library and supports multiple programming paradigms.
Python uses indentation to indicate blocks of code, making it easy to read and understand.
It is dynamically typed, meaning that variable types are determined at runtime.
Python is open-source and has a larg...read more
Q104. What is load balancer? How does it work? Application gateway basics and functionality? OSI model? Update manager errors and troubleshooting steps? Backup and recovery, migration ?
Q105. WHAT IS DIFFERENCE BETWEEN COMPOSITION AND AGGREGATION ?
Composition is a strong relationship where the child object cannot exist independently of the parent object, while aggregation is a weak relationship where the child object can exist independently.
Composition is a 'has-a' relationship, where the child object is a part of the parent object.
Aggregation is a 'has-a' relationship, where the child object is not a part of the parent object.
In composition, the child object is created and destroyed along with the parent object.
In agg...read more
Q106. What are different types of documents for requirement gathering and difference among them.
Different types of documents for requirement gathering and their differences.
Business Requirements Document (BRD) - high-level overview of business needs
Functional Requirements Document (FRD) - detailed description of system functionality
Use Case Document - describes user interactions with the system
User Stories - brief descriptions of user requirements
Wireframes - visual representation of system design
The main difference is the level of detail and focus on different aspects ...read more
Q107. Explain the Smoke testing,Sanity testing with an examples?
Smoke testing and Sanity testing are two types of software testing used to check the basic functionality of the application.
Smoke testing is a type of testing that checks whether the critical functionalities of the application are working fine or not.
Sanity testing is a type of testing that checks whether the bugs have been fixed or not after a new build is released.
Smoke testing is done to ensure that the application is stable enough for further testing.
Sanity testing is don...read more
Q108. What is vss admin list writers
vss admin list writers is a command used to list all the registered Volume Shadow Copy Service (VSS) writers on a Windows system.
VSS writers are responsible for creating consistent snapshots of data on a system for backup purposes.
The vss admin list writers command provides information about the state and availability of each VSS writer.
It is commonly used to troubleshoot VSS-related issues and ensure that all writers are functioning correctly.
The output of the command includ...read more
Q109. writ a quay that should retrieve all the the columns but show only 10 records and ordered by name
Use SQL query to retrieve all columns, show only 10 records, and order by name
Use SELECT * to retrieve all columns
Use LIMIT 10 to show only 10 records
Use ORDER BY name to order the results by name
Q110. What if civil engineering will suit for production manager of dxc technology ؟
Civil engineering may not be the ideal background for a production manager role in DXC Technology.
Production management requires knowledge of technology and software development
Civil engineering focuses on construction and infrastructure
However, transferable skills such as project management and problem-solving may be useful
Experience in manufacturing or software development would be more relevant
DXC Technology may have specific requirements for the role
Q111. What is deduplication
Deduplication is a data compression technique that eliminates duplicate copies of data, reducing storage space and improving efficiency.
Deduplication is used to identify and remove redundant data.
It compares incoming data with existing data and stores only unique instances.
Deduplication can be performed at the file, block, or byte level.
It helps in reducing storage costs and improving backup and restore times.
Examples of deduplication technologies include inline deduplication...read more
Q112. Configuration of SAP time management, personal administration module
Configuration of SAP time management and personal administration module involves setting up employee data, time recording, and absence management.
Employee data is maintained in the Personnel Administration module
Time recording is done through Time Management module
Absence management is handled through Absence Management module
Configuration involves defining work schedules, absence types, and time quotas
Integration with payroll module is important for accurate payroll processi...read more
Q113. What is the lastest technology that you have learnt
The latest technology I have learned is artificial intelligence (AI).
AI is a branch of computer science that focuses on creating intelligent machines capable of performing tasks that typically require human intelligence.
Some examples of AI applications include virtual assistants like Siri and Alexa, self-driving cars, and recommendation systems.
I have learned about different AI techniques such as machine learning, natural language processing, and computer vision.
Q114. How DNS works? what happens when you click any link on browser?
DNS translates domain names to IP addresses. When you click a link, browser sends a DNS query to resolve the domain name.
DNS stands for Domain Name System
When you click a link, browser sends a DNS query to a DNS server to resolve the domain name to an IP address
The DNS server then responds with the corresponding IP address
The browser then uses the IP address to connect to the server hosting the website
Q115. What is OS? And paging techniques
OS stands for Operating System. Paging is a memory management technique used by OS to store and retrieve data from secondary storage.
OS is a software that manages computer hardware resources and provides common services for computer programs.
Paging is a memory management scheme that eliminates the need for contiguous allocation of physical memory.
Paging allows the operating system to use virtual memory, which is larger than physical memory.
Examples of paging techniques includ...read more
Q116. Introduction Project Write code for Prime number
Code to check if a number is prime or not
A prime number is a positive integer greater than 1 that has no positive integer divisors other than 1 and itself
One way to check if a number is prime is to iterate from 2 to the square root of the number and check if any of them divide the number without a remainder
Another way is to use the Sieve of Eratosthenes algorithm to generate all prime numbers up to a certain limit
Q117. How you can delete the record on database ?
To delete a record from a database, you can use the DELETE statement.
Use the DELETE statement with the WHERE clause to specify the record to be deleted.
Make sure to backup the database before deleting any records.
Example: DELETE FROM table_name WHERE column_name = value;
Q118. Query to select top 2 data of a column.
To select the top 2 data of a column, use the 'SELECT TOP' statement in SQL.
Use the 'SELECT TOP' statement followed by the number of rows you want to retrieve.
Specify the column name after the 'SELECT' keyword.
Order the data in the column using 'ORDER BY' clause if needed.
Example: SELECT TOP 2 column_name FROM table_name ORDER BY column_name DESC;
Q119. What are four pillars of oops
Four pillars of OOPs are Abstraction, Encapsulation, Inheritance, and Polymorphism.
Abstraction: Hiding implementation details and showing only necessary information.
Encapsulation: Binding data and functions together and restricting access to data.
Inheritance: Creating new classes from existing ones, inheriting properties and methods.
Polymorphism: Ability of objects to take on multiple forms or behaviors.
Q120. What is the difference between DDL & DML
DDL stands for Data Definition Language and is used to define the structure of database objects. DML stands for Data Manipulation Language and is used to manipulate data within the database.
DDL is used to create, modify, and delete database objects such as tables, indexes, and views.
DML is used to insert, update, delete, and retrieve data from database tables.
Examples of DDL statements include CREATE TABLE, ALTER TABLE, and DROP TABLE.
Examples of DML statements include INSERT...read more
Q121. What is Accountancy
Accountancy is the practice of recording, analyzing, and reporting financial transactions for individuals, businesses, and organizations.
Accountancy involves the systematic recording of financial transactions.
It includes analyzing financial data to provide insights and make informed decisions.
Accountants prepare financial statements and reports to communicate the financial health of an entity.
They ensure compliance with financial regulations and tax laws.
Accountancy can be ap...read more
Q122. How would you handle escalations & Customer queries
I would handle escalations and customer queries by actively listening, empathizing, and providing timely and effective solutions.
Listen actively to the customer's concerns and empathize with their situation
Provide timely and effective solutions to resolve the issue
Ensure that the customer is satisfied with the resolution and follow up to ensure their continued satisfaction
Document the issue and resolution for future reference and process improvement
Train and empower team memb...read more
Q123. Context switching. Problems faced during chatbot development and delivery to customers.
Context switching during chatbot development can lead to problems in delivery to customers.
Context switching can cause delays in development and testing.
It can also lead to miscommunication and errors in the chatbot's responses.
Developers may need to switch between different programming languages or platforms, which can be challenging.
Testing and debugging can become more difficult when context switching is frequent.
Proper planning and organization can help minimize the impac...read more
Q124. How to find ip address of the website
To find the IP address of a website, use the command prompt or a website like WhatIsMyIPAddress.com.
Open the command prompt and type 'ping website.com' to get the IP address
Use a website like WhatIsMyIPAddress.com to find the IP address
IP addresses can change, so it's important to check periodically
Q125. 1. What is difference between all enhancements? 2. Which approach is better for system integration?
The first question is unclear. The second question depends on the specific system being integrated.
The first question needs clarification on what enhancements are being referred to.
The second question depends on the specific systems being integrated and their requirements.
Approaches for system integration include point-to-point, middleware, and service-oriented architecture.
The best approach depends on factors such as scalability, flexibility, and cost.
Examples of system inte...read more
Q126. Explain the communication from VM to VM in Vmware Vsphere cluster?
VM communication in VMware Vsphere cluster is facilitated through virtual switches and network adapters.
VMs communicate through virtual switches that connect to physical network adapters.
Virtual switches can be configured with different network policies and security settings.
VMware tools can also be used to enhance communication and performance.
VMware NSX can provide advanced networking and security features for VM communication.
VMware vMotion allows live migration of VMs bet...read more
Q127. How to add and generate SSL certificate in Linux.
To add and generate SSL certificate in Linux, follow these steps:
Install OpenSSL package
Create a private key
Create a CSR (Certificate Signing Request)
Submit CSR to a Certificate Authority (CA)
Receive SSL certificate from CA
Install SSL certificate on the server
Configure web server to use SSL certificate
Q128. What are the types of exceptions ?
There are two types of exceptions: checked and unchecked.
Checked exceptions are checked at compile-time and must be handled by the programmer.
Unchecked exceptions are not checked at compile-time and can be handled by the JVM.
Examples of checked exceptions include IOException and SQLException.
Examples of unchecked exceptions include NullPointerException and ArrayIndexOutOfBoundsException.
Q129. What do you know about HPLC..?
HPLC stands for High Performance Liquid Chromatography. It is a technique used to separate, identify, and quantify components in a mixture.
HPLC is a widely used analytical technique in various industries including pharmaceuticals, food and beverage, environmental analysis, and forensic science.
It involves the use of a liquid mobile phase and a stationary phase packed in a column to separate the components of a sample based on their interactions with the stationary phase.
The s...read more
Q130. Write any code of your choice and explain it step by step
Q131. What is DHCP , DNS , Public and Private IP ex
DHCP assigns IP addresses, DNS resolves domain names to IP addresses, Public IP is visible to internet, Private IP is for internal network.
DHCP - Dynamic Host Configuration Protocol assigns IP addresses to devices on a network.
DNS - Domain Name System resolves domain names to IP addresses.
Public IP - Visible to the internet and assigned by the ISP.
Private IP - Used for internal network and assigned by the router.
Example: DHCP assigns IP address 192.168.1.100 to a device on th...read more
Q132. what is networking?
Networking is the practice of connecting devices together to share resources and information.
Networking involves the use of hardware and software to connect devices together.
It allows for the sharing of resources such as printers and files.
Networking also enables communication between devices, such as sending emails or accessing websites.
Examples of networking technologies include Ethernet, Wi-Fi, and Bluetooth.
Q133. What is annuity and tell their benefits over other insurance.
An annuity is a financial product that provides a steady stream of income for a fixed period or for life.
Annuities are typically used for retirement planning.
They offer tax-deferred growth, meaning you don't pay taxes on the earnings until you withdraw the money.
Annuities can provide a guaranteed income stream for life, which can be helpful for those who are worried about outliving their savings.
They also offer a death benefit, which means that if you die before the annuity p...read more
Q134. What we can do in security as port wise
Port-based security involves controlling access to network resources based on the physical port of the device.
Port security can be implemented by limiting the number of MAC addresses that can be learned on a port.
It can also involve configuring the port to only allow traffic from specific VLANs.
Port security can be used to prevent unauthorized access to the network by limiting the devices that can connect to it.
It can also be used to prevent rogue devices from being connected...read more
Q135. What do you know about insurance sector
Insurance sector involves the business of providing financial protection against potential risks and losses.
Insurance sector is a part of the financial services industry.
It involves the transfer of risk from an individual or entity to an insurance company.
Insurance policies are contracts that outline the terms and conditions of coverage.
Types of insurance include life, health, property, auto, and liability insurance.
Insurance companies collect premiums from policyholders and ...read more
Q136. How we can configure continuously integrated development and implementation
Continuous integration and implementation can be configured by setting up automated build and deployment pipelines.
Set up a version control system like Git to track changes in code
Use a continuous integration tool like Jenkins to automatically build and test code changes
Configure automated deployment pipelines to deploy code changes to different environments
Integrate automated testing to ensure code quality and catch bugs early
Monitor and analyze the build and deployment proc...read more
Q137. How to windows 10 difference windows 11
Windows 10 and Windows 11 have differences in terms of user interface, features, system requirements, and performance improvements.
User Interface: Windows 11 introduces a centered Start menu, redesigned taskbar, and new snap layouts.
Features: Windows 11 includes new features like Snap Groups, Direct integration with Microsoft Teams, and improved gaming capabilities.
System Requirements: Windows 11 has stricter hardware requirements compared to Windows 10.
Performance Improvemen...read more
Q138. What are the Non-forfeiture options?
Non-forfeiture options are the choices available to a policyholder when they stop paying premiums.
Non-forfeiture options allow policyholders to retain some value from their policy even if they stop paying premiums.
Common non-forfeiture options include reduced paid-up insurance, extended term insurance, and cash surrender value.
Reduced paid-up insurance provides a smaller death benefit but does not require further premium payments.
Extended term insurance allows the policyholde...read more
Q139. what is database? how is data stored in a database
A database is a collection of data that is organized in a way that allows for efficient storage, retrieval, and manipulation.
Data is stored in tables with rows and columns
Each table has a unique identifier called a primary key
Data can be queried using SQL (Structured Query Language)
Examples of databases include MySQL, Oracle, and MongoDB
Q140. What is data structure and linked list
Data structure is a way of organizing and storing data in a computer so that it can be accessed and used efficiently. A linked list is a linear data structure where elements are stored in nodes and each node points to the next node in the sequence.
Data structure organizes and stores data efficiently
Linked list is a linear data structure with nodes pointing to next node
Example: Singly linked list, doubly linked list
Q141. Write a pyspark program that reads multiple csv files and creates a data frame with count of records against each file
A pyspark program to read multiple csv files and create a data frame with count of records against each file.
Use SparkSession to create a Spark application
Read multiple csv files using spark.read.csv() method
Use groupBy() and count() functions to get count of records for each file
Create a new column to store the file name
Join all data frames to create a final data frame with count of records against each file
Q142. What are the memories in JDK?
JDK memories are areas of memory used by Java programs to store data and code.
JDK memories include heap memory, stack memory, and non-heap memory.
Heap memory is used to store objects and is managed by the garbage collector.
Stack memory is used to store method calls and local variables.
Non-heap memory is used to store class definitions and other data.
Examples of non-heap memory include the method area and the permanent generation.
Memory leaks can occur if objects are not prope...read more
Q143. what is oops and explain each of the terms
OOPs stands for Object-Oriented Programming. It is a programming paradigm based on the concept of objects.
OOPs consists of four main principles: Inheritance, Encapsulation, Abstraction, and Polymorphism.
Inheritance allows a class to inherit properties and behavior from another class.
Encapsulation refers to the bundling of data and methods that operate on the data into a single unit.
Abstraction focuses on hiding the internal implementation details of a class and showing only t...read more
Q144. Technologies used in Group project?
We used a variety of technologies including Java, Spring Boot, React, and MySQL.
Java was used for the backend development
Spring Boot was used to create RESTful APIs
React was used for the frontend development
MySQL was used as the database management system
Q145. How to post Deferred revenue entry
Deferred revenue entry is posted by debiting the deferred revenue account and crediting the revenue account.
Identify the amount of revenue that has been deferred
Debit the deferred revenue account for the identified amount
Credit the revenue account for the same amount
Ensure that the deferred revenue account balance is reduced as revenue is recognized
Update the financial statements accordingly
Q146. What is the IP Address qnd how can you check this?
An IP address is a unique numerical label assigned to each device connected to a computer network.
IP address stands for Internet Protocol address.
It is used to identify and locate devices on a network.
IP addresses can be either IPv4 (32-bit) or IPv6 (128-bit) format.
To check your IP address, you can use various methods such as using command prompt, checking network settings, or using online IP lookup tools.
Q147. What are the differences between String and StringBuilder in programming?
Q148. how to implement SCD in Azure environment. Performance tuning in scala
SCD implementation in Azure environment and performance tuning in Scala.
Use Azure Data Factory for SCD implementation
Choose appropriate SCD type based on business requirements
Use Azure Databricks for performance tuning in Scala
Optimize code by using efficient data structures and algorithms
Use caching and parallel processing to improve performance
Q149. T codes which used in account payable processing
T codes are used in account payable processing to categorize transactions for reporting and analysis.
T-code FB60 is used for creating invoices in SAP
T-code F-43 is used for entering vendor invoice in SAP
T-code F-53 is used for clearing vendor down payment in SAP
Q150. Wap to find each character occurrence in string
Wap to find each character occurrence in string
Iterate through the string and use a dictionary to keep track of character counts
Use a for loop to iterate through the string and increment the count of each character in the dictionary
Print the dictionary to display the character counts
Q151. Explain types of GC column used ..?
There are several types of GC columns used in quality control, including packed columns, capillary columns, and specialty columns.
Packed columns are filled with a solid support material, such as diatomaceous earth or molecular sieves.
Capillary columns have a small inner diameter, allowing for higher resolution and faster analysis.
Specialty columns are designed for specific applications, such as chiral separations or analysis of volatile compounds.
Other types of columns includ...read more
Q152. How would we convert access into trunk
To convert access into trunk, we need to configure the switch port as a trunk port.
Configure the switch port as a trunk port using the 'switchport mode trunk' command.
Verify the trunk configuration using the 'show interfaces trunk' command.
Ensure that the VLANs allowed on the trunk are configured using the 'switchport trunk allowed vlan' command.
Ensure that the native VLAN is configured using the 'switchport trunk native vlan' command.
Q153. How to windows Blue screen error
A Windows Blue Screen error occurs when the operating system encounters a critical error and cannot recover.
Blue Screen of Death (BSOD) is a stop error screen displayed by Windows when it encounters a system crash or error.
It is usually caused by hardware or software issues, such as faulty drivers, incompatible software, or hardware failures.
To troubleshoot a BSOD, you can analyze the error code displayed on the screen, check for recent hardware or software changes, update dr...read more
Q154. What is the insurance
Insurance is a contract between an individual and an insurance company to protect against financial loss.
Insurance provides financial protection against unexpected events such as accidents, illnesses, and natural disasters.
The individual pays a premium to the insurance company in exchange for coverage.
Types of insurance include health, life, auto, home, and business insurance.
Insurance policies have terms and conditions that outline what is covered and what is not.
Insurance h...read more
Q155. What is Reinsurance?
Reinsurance is a process where an insurance company transfers a portion of its risk to another insurance company.
Reinsurance helps insurance companies manage their risk exposure.
It allows insurance companies to protect themselves against large losses.
Reinsurance can be either proportional or non-proportional.
Proportional reinsurance involves sharing both premiums and losses with the reinsurer.
Non-proportional reinsurance involves transferring only losses above a certain thres...read more
Q156. What are the disaster recovery plan you have implemented
Implemented comprehensive disaster recovery plans to ensure business continuity and data integrity during unforeseen events.
Conducted risk assessments to identify potential threats and vulnerabilities.
Developed a detailed recovery strategy, including data backup solutions and alternate site arrangements.
Regularly tested the disaster recovery plan through simulations and drills to ensure effectiveness.
Established clear communication protocols for stakeholders during a disaster...read more
Q157. Why not python instead of using Java?
Java is preferred for its performance, scalability, and strong typing compared to Python.
Java is statically typed, which helps catch errors at compile time, while Python is dynamically typed.
Java is faster in terms of execution speed compared to Python.
Java is preferred for large-scale enterprise applications due to its scalability and performance.
Java has a strong ecosystem and support for multi-threading, making it suitable for high-performance applications.
Q158. What Do you know About DXC Technology
DXC Technology is a global IT services company that provides technology solutions and consulting services to businesses and governments.
DXC Technology was formed in 2017 through the merger of Computer Sciences Corporation (CSC) and the Enterprise Services business of Hewlett Packard Enterprise (HPE).
It offers a wide range of services including cloud and security solutions, analytics, application services, and consulting.
DXC Technology serves clients in various industries such...read more
Q159. What is the software installation process
Software installation process involves planning, preparation, installation, configuration, and testing.
Plan the installation by determining software requirements and compatibility with the system
Prepare the system by ensuring it meets the software's prerequisites
Install the software using the appropriate installation method (e.g. setup wizard, command line)
Configure the software settings based on the requirements and best practices
Test the software to ensure it is functioning...read more
Q160. 2. Difference between DELETE and TRUNCATE and DROP
DELETE removes specific rows, TRUNCATE removes all rows, DROP removes entire table.
DELETE is a DML command, TRUNCATE and DROP are DDL commands.
DELETE can have a WHERE clause to specify which rows to delete.
TRUNCATE resets the table and cannot be undone.
DROP removes the table and all associated objects.
Example: DELETE FROM table WHERE id = 1;
Example: TRUNCATE table;
Example: DROP TABLE table;
Q161. Which data sources are used for Finacle application in Weblogic
Finacle application in Weblogic uses various data sources
Finacle application uses Oracle database as its primary data source
Other data sources include LDAP for user authentication and authorization
JMS queues are used for messaging between different components of the application
Web services are used to integrate with other systems
Data sources can be configured in the Weblogic server console
Q162. What is Artificial Intelligence?
Artificial Intelligence is the simulation of human intelligence in machines that are programmed to think and learn.
AI refers to the development of computer systems that can perform tasks that would typically require human intelligence.
It involves the ability of machines to understand, reason, learn, and adapt to new situations.
AI can be categorized into narrow AI (focused on specific tasks) and general AI (possessing human-like intelligence).
Examples of AI include virtual ass...read more
Q163. What is an Underwriting?
Underwriting is the process of evaluating and assessing the risk of insuring a person or entity.
Underwriting involves analyzing the potential risks and determining the appropriate premium to charge for insurance coverage.
It is commonly used in the insurance industry for various types of insurance policies such as life, health, and property insurance.
Underwriting also involves reviewing the applicant's financial and medical history to determine their insurability and potential...read more
Q164. What do you mean by information security
Information security refers to the protection of data from unauthorized access, use, disclosure, disruption, modification, or destruction.
It involves implementing measures to ensure confidentiality, integrity, and availability of data
Examples include firewalls, encryption, access controls, and security audits
Information security is important for protecting sensitive data such as personal information, financial data, and intellectual property
Q165. Have you ever used AAS.?
Yes, I have used AAS in my previous role as a Quality Control Officer.
I have experience using AAS (Atomic Absorption Spectroscopy) in analyzing samples for quality control purposes.
I am familiar with the operation and maintenance of AAS instruments.
I have successfully utilized AAS to detect and quantify trace elements in various samples.
I have also interpreted and analyzed AAS data to ensure compliance with quality standards.
Q166. Explain the complex test scenario automated by you in your career
Automated testing of a complex financial transaction system with multiple user roles and permissions
Created automated test scripts using Selenium to simulate different user roles accessing the system
Tested various scenarios such as fund transfers, account creation, and transaction history
Implemented data-driven testing to validate different input combinations and edge cases
Used API testing tools like Postman to verify backend functionality
Integrated test automation with CI/CD...read more
Q167. Difference between an asset and CI
An asset is a physical or virtual item that has financial value, while a CI is any item that needs to be managed for IT purposes.
Assets are typically tangible items, such as hardware or software licenses, that have a monetary value.
CIs are any items that need to be managed for IT purposes, such as servers, applications, or network devices.
Assets are often tracked in financial systems, while CIs are tracked in IT service management systems.
An asset can be a CI, but not all CIs...read more
Q168. what are the different testing methodology
Different testing methodologies include black box, white box, grey box, manual, automated, and exploratory testing.
Black box testing: testing without knowledge of internal workings
White box testing: testing with knowledge of internal workings
Grey box testing: combination of black and white box testing
Manual testing: testing done manually by a human
Automated testing: testing done by software tools
Exploratory testing: testing done without a predefined test plan
Examples: Seleniu...read more
Q169. Tell about Cloud Computing
Cloud computing is the delivery of computing services over the internet, including storage, databases, networking, software, and more.
Cloud computing allows users to access resources on-demand without the need for physical infrastructure.
Examples of cloud computing services include Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform.
Cloud computing offers scalability, flexibility, and cost-effectiveness for businesses and individuals.
Types of cloud computing...read more
Q170. what is the different between =, ==, ===?
The different between =, ==, === is related to assignment, equality, and strict equality in programming.
= is used for assignment in programming languages.
== is used for equality comparison, it checks if two values are equal.
=== is used for strict equality comparison, it checks if two values are equal in both value and data type.
Q171. What are the projects you did? Write a c program to reverse a string?
A C program to reverse a string
Use a loop to iterate through the string and swap the characters at the beginning and end of the string
Create a temporary variable to hold the character being swapped
Terminate the loop when the index of the beginning of the string is greater than or equal to the index of the end of the string
Q172. What is accrual and deferral and when do we do it
Accrual is recognizing revenue and expenses when they are incurred, not when cash is exchanged. Deferral is postponing recognition of revenue or expenses to a later period.
Accrual accounting matches revenues with expenses in the same accounting period
Accruals are recorded as adjusting journal entries at the end of an accounting period
Deferrals involve recognizing revenue or expenses at a later date
Examples of accruals include recognizing revenue when services are provided, ev...read more
Q173. What is the full form of SDLC?
SDLC stands for Software Development Life Cycle.
SDLC is a systematic process for developing software applications.
It includes various phases such as requirements gathering, design, coding, testing, deployment, and maintenance.
Each phase has specific activities and deliverables.
SDLC ensures the development of high-quality software within budget and time constraints.
Examples of SDLC models include Waterfall, Agile, and DevOps.
Q174. How to actiavate a Volume Group or LV ?
To activate a Volume Group or LV, use the vgchange or lvchange command.
Use the vgchange command to activate a Volume Group.
Use the lvchange command to activate a Logical Volume.
Specify the name of the Volume Group or Logical Volume as an argument.
Use the -a y option with vgchange to activate all Volume Groups.
Use the -a y option with lvchange to activate all Logical Volumes in a Volume Group.
Q175. What is backup agent
A backup agent is a software component that facilitates the backup and restore process by managing communication between the backup server and the devices being backed up.
Backup agent acts as an intermediary between the backup server and the devices being backed up.
It facilitates the transfer of data from the devices to the backup server and vice versa.
Backup agents often provide features like compression, encryption, and deduplication to optimize the backup process.
Examples ...read more
Q176. Round Robin Algo Bankers algo Encapsulation Pillars of oops Multithreading
Round Robin and Banker's algorithms are scheduling algorithms used in operating systems. Encapsulation is a concept in OOP. Multithreading allows multiple threads to run concurrently.
Round Robin algorithm is a CPU scheduling algorithm where each process gets a small unit of CPU time.
Banker's algorithm is a resource allocation and deadlock avoidance algorithm used in operating systems.
Encapsulation is the bundling of data and methods that operate on the data into a single unit...read more
Q177. Why stacks, what are there usecases?
Stacks are data structures that follow Last In First Out (LIFO) principle, commonly used in function calls, expression evaluation, and undo mechanisms.
Used in function calls to store return addresses and local variables
Expression evaluation like infix to postfix conversion and evaluation
Undo mechanisms in text editors and web browsers
JVM stands for Java Virtual Machine, which is a virtual machine that enables a computer to run Java programs.
JVM is responsible for converting Java bytecode into machine code that can be executed by the computer's CPU.
It provides platform independence by abstracting the hardware and operating system details.
JVM manages memory, handles garbage collection, and provides security features for Java applications.
Popular JVM implementations include Oracle HotSpot, OpenJ9, and GraalV...read more
Q179. What is dbms and what are its types?
DBMS stands for Database Management System. It is a software system that manages databases.
DBMS is used to store, retrieve, and manage data efficiently.
There are different types of DBMS such as relational, object-oriented, hierarchical, network, and more.
Relational DBMS is the most commonly used type and uses tables to store data.
Object-oriented DBMS stores data in objects and is used for complex data structures.
Hierarchical DBMS organizes data in a tree-like structure and is...read more
Q180. What is oops and os and why we use it?
OOPs stands for Object-Oriented Programming and OS stands for Operating System. OOPs is used for creating reusable code and OS is used for managing computer hardware and software resources.
OOPs is a programming paradigm that focuses on creating objects that contain data and methods to manipulate that data.
It allows for code reusability, encapsulation, and abstraction.
Examples of OOPs languages include Java, Python, and C++.
OS is a software that manages computer hardware and s...read more
Q181. General computer troubleshooting steps. What are nvram etc.
NVRAM is a type of memory that stores settings for the computer's hardware. General troubleshooting steps include checking connections and restarting the system.
Check connections and cables
Restart the system
Check for error messages
Run diagnostic tests
Update drivers and software
Reset BIOS settings
Clear NVRAM settings
Q182. what is salvage, what is rating, what is copay
Salvage refers to the value of an asset after it has been damaged or destroyed. Rating is an evaluation of the creditworthiness of a company or individual. Copay is the amount of money an insured person pays for a covered healthcare service.
Salvage is the residual value of an asset that has been damaged or destroyed, often used in insurance claims.
Rating is a measure of the creditworthiness or financial stability of a company or individual, used by credit agencies and lenders...read more
Q183. How to implement a project in sap
To implement a project in SAP, you need to follow a structured approach involving planning, configuration, testing, and deployment.
Define project scope and objectives
Gather requirements from stakeholders
Configure SAP system based on requirements
Test the system to ensure functionality and performance
Train end users on using the new system
Deploy the project and monitor for any issues
Provide ongoing support and maintenance
Q184. What is cache and cookies?
Cache and cookies are temporary storage files used by web browsers to improve website performance and user experience.
Cache stores website data to load pages faster on subsequent visits
Cookies store user information and preferences for a personalized experience
Clearing cache and cookies can help troubleshoot website issues
Third-party cookies can track user behavior for targeted advertising
Browser settings allow users to manage cache and cookie storage
Q185. What is vpn? Difference between modem and router
VPN stands for Virtual Private Network. Modem connects to the internet, while router connects devices to the modem and manages network traffic.
VPN allows secure connection to a private network over the internet
Modem connects to the internet service provider to access the internet
Router connects multiple devices to the modem and manages network traffic
Modem is like the gateway to the internet, while router directs traffic within the network
Q186. Which programming language you know?
I know multiple programming languages including Java, Python, and C++.
Proficient in Java and Python
Familiar with C++ and JavaScript
Experience with SQL and HTML/CSS
Comfortable with object-oriented programming
Able to learn new languages quickly
Q187. What is Linux and which flavor you've worked on?
Linux is an open-source operating system based on Unix, known for its stability, security, and flexibility.
Linux is an open-source operating system that is widely used in servers, supercomputers, and embedded systems.
There are many flavors of Linux, known as distributions, such as Ubuntu, CentOS, Debian, and Red Hat.
Each Linux distribution has its own package management system, desktop environment, and software repositories.
As a System Administrator, I have worked on CentOS, ...read more
Q188. simple C program to accept and print a name
A simple C program to accept and print a name.
Use scanf() function to accept the name from the user.
Use printf() function to print the name on the screen.
Q189. What is Credit sales and credit purchases
Credit sales and credit purchases involve transactions where payment is deferred to a later date.
Credit sales refer to goods or services sold on credit, where payment is received at a later date.
Credit purchases refer to goods or services purchased on credit, where payment is made at a later date.
Both credit sales and credit purchases are common in business-to-business transactions.
Example: A company sells products to another company on credit terms of 30 days.
Example: A comp...read more
Q190. what is data loader how we can use deleteall and delete difference between lwc and aura
Data Loader is a tool provided by Salesforce for importing, exporting, and deleting data in Salesforce.
Data Loader is used for bulk importing, exporting, and deleting data in Salesforce
DeleteAll operation in Data Loader deletes all records in a specified object
Delete operation in Data Loader deletes specific records based on a query
Difference between LWC and Aura: LWC is a new programming model for building Lightning components while Aura is the older model
LWC provides better...read more
Q191. Logic of Knight's move in chess.
The knight in chess moves in an L-shape, two squares in one direction and one square in a perpendicular direction.
The knight can move to any of the eight squares that are two squares away in one direction and one square away in a perpendicular direction.
The knight's move is unique as it can jump over other pieces on the board.
The knight's move can be represented using algebraic notation, such as Nf3 or Nc6.
Here are a few examples of valid knight moves: Nf3, Nc6, Ng5, Nh4.
Q192. How to deploy war file in jboss
To deploy a war file in JBoss, use the JBoss Management Console or the command line interface.
Access the JBoss Management Console by navigating to http://localhost:9990/console/App.html#deployments
Click on the 'Add' button to upload the war file
Alternatively, use the command line interface by navigating to the bin directory and running the command 'jboss-cli.bat --connect --command="deploy path/to/war/file.war"'
Make sure the war file is properly packaged and contains all nece...read more
Q193. what is java, oops, dsa, etc
Java is a popular programming language, OOPs stands for Object-Oriented Programming, DSA refers to Data Structures and Algorithms.
Java is a high-level, class-based, object-oriented programming language known for its portability and versatility.
OOPs is a programming paradigm based on the concept of 'objects', which can contain data in the form of fields and code in the form of procedures.
DSA involves the study of data structures (like arrays, linked lists, trees) and algorithm...read more
Q194. What is data encapsulation
Data encapsulation is the process of hiding implementation details and exposing only necessary information.
It is a fundamental concept in object-oriented programming.
It helps in achieving data abstraction and information hiding.
It allows for better control over data and prevents unauthorized access.
Example: A class in Java that has private variables and public methods to access them.
Example: A capsule that contains medicine and only allows access through a small opening.
Q195. What are 4 Pillars of OOPs
4 Pillars of OOPs are Abstraction, Encapsulation, Inheritance, and Polymorphism.
Abstraction: Hiding implementation details and showing only necessary information.
Encapsulation: Binding data and functions together and restricting access to them.
Inheritance: Creating new classes from existing ones, inheriting properties and methods.
Polymorphism: Ability of objects to take on multiple forms or behaviors.
Q196. What is Dns and what are its use
DNS stands for Domain Name System. It is a decentralized naming system for computers, services, or any resource connected to the Internet.
DNS translates domain names to IP addresses
It helps in locating resources on the Internet
DNS servers store domain name records like A, CNAME, MX, etc.
Examples: www.google.com translates to 172.217.3.196
Q197. What is creditor
A creditor is a person or entity to whom money is owed.
A creditor is someone who has provided goods or services on credit.
They are owed money by the debtor.
Creditors can be individuals, businesses, or financial institutions.
Examples of creditors include suppliers, banks, and bondholders.
Q198. What is client I’d
Client ID is a unique identifier assigned to a client device or application that connects to a storage backup system.
Client ID is used to track and manage client devices or applications in a storage backup system.
It helps in identifying and authenticating clients during backup and restore operations.
Client ID can be a combination of alphanumeric characters or a generated unique identifier.
Examples of client IDs include MAC addresses, IP addresses, or user-defined names.
Q199. What is java? Is java platform independent?
Java is a high-level programming language known for its platform independence.
Java is an object-oriented programming language developed by Sun Microsystems.
Java code is compiled into bytecode that can run on any Java Virtual Machine (JVM).
Java's platform independence is achieved through the use of JVM, allowing Java programs to run on any platform that has a JVM installed.
Examples of platform-independent Java applications include web applications, mobile apps, and enterprise ...read more
Q200. What is Aws and what services it provides
AWS (Amazon Web Services) is a cloud computing platform that offers a wide range of services for computing, storage, databases, machine learning, and more.
Provides computing power through EC2 (Elastic Compute Cloud)
Offers storage solutions like S3 (Simple Storage Service)
Includes database services such as RDS (Relational Database Service)
Provides machine learning services like SageMaker
Offers serverless computing through AWS Lambda
Top HR Questions asked in Diverse Lynx
Interview Process at Diverse Lynx
Top Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month