Add office photos
Engaged Employer

DXC Technology

3.7
based on 10.3k Reviews
Video summary
Filter interviews by

400+ Diverse Lynx Interview Questions and Answers

Updated 4 Apr 2025
Popular Designations

Q101. What are class loaders, Why java is a robust language , what are enums etc

Ans.

Class loaders are responsible for loading classes into memory, Java is robust due to its strong memory management and exception handling, enums are a special data type that restricts variables to a predefined set of values.

  • Class loaders in Java are responsible for dynamically loading classes into memory at runtime.

  • Java is considered a robust language due to its strong memory management, garbage collection, and exception handling capabilities.

  • Enums in Java are a special data t...read more

Add your answer

Q102. How to check the Performance issues in Windows?

Ans.

Performance issues in Windows can be checked using various tools and techniques.

  • Use Task Manager to check CPU, memory, and disk usage

  • Use Resource Monitor to check detailed performance information

  • Use Performance Monitor to monitor specific performance counters

  • Check for any software or driver updates

  • Run a virus scan to check for malware

  • Check for any hardware issues such as failing hard drives or overheating components

Add your answer

Q103. What do you know about python ?

Ans.

Python is a high-level, interpreted programming language known for its simplicity and readability.

  • Python is used for web development, data analysis, artificial intelligence, and scientific computing.

  • It has a large standard library and supports multiple programming paradigms.

  • Python uses indentation to indicate blocks of code, making it easy to read and understand.

  • It is dynamically typed, meaning that variable types are determined at runtime.

  • Python is open-source and has a larg...read more

Add your answer

Q104. What is load balancer? How does it work? Application gateway basics and functionality? OSI model? Update manager errors and troubleshooting steps? Backup and recovery, migration ?

Add your answer
Discover Diverse Lynx interview dos and don'ts from real experiences

Q105. WHAT IS DIFFERENCE BETWEEN COMPOSITION AND AGGREGATION ?

Ans.

Composition is a strong relationship where the child object cannot exist independently of the parent object, while aggregation is a weak relationship where the child object can exist independently.

  • Composition is a 'has-a' relationship, where the child object is a part of the parent object.

  • Aggregation is a 'has-a' relationship, where the child object is not a part of the parent object.

  • In composition, the child object is created and destroyed along with the parent object.

  • In agg...read more

Add your answer

Q106. What are different types of documents for requirement gathering and difference among them.

Ans.

Different types of documents for requirement gathering and their differences.

  • Business Requirements Document (BRD) - high-level overview of business needs

  • Functional Requirements Document (FRD) - detailed description of system functionality

  • Use Case Document - describes user interactions with the system

  • User Stories - brief descriptions of user requirements

  • Wireframes - visual representation of system design

  • The main difference is the level of detail and focus on different aspects ...read more

Add your answer
Are these interview questions helpful?

Q107. Explain the Smoke testing,Sanity testing with an examples?

Ans.

Smoke testing and Sanity testing are two types of software testing used to check the basic functionality of the application.

  • Smoke testing is a type of testing that checks whether the critical functionalities of the application are working fine or not.

  • Sanity testing is a type of testing that checks whether the bugs have been fixed or not after a new build is released.

  • Smoke testing is done to ensure that the application is stable enough for further testing.

  • Sanity testing is don...read more

Add your answer

Q108. What is vss admin list writers

Ans.

vss admin list writers is a command used to list all the registered Volume Shadow Copy Service (VSS) writers on a Windows system.

  • VSS writers are responsible for creating consistent snapshots of data on a system for backup purposes.

  • The vss admin list writers command provides information about the state and availability of each VSS writer.

  • It is commonly used to troubleshoot VSS-related issues and ensure that all writers are functioning correctly.

  • The output of the command includ...read more

View 1 answer
Share interview questions and help millions of jobseekers 🌟

Q109. writ a quay that should retrieve all the the columns but show only 10 records and ordered by name

Ans.

Use SQL query to retrieve all columns, show only 10 records, and order by name

  • Use SELECT * to retrieve all columns

  • Use LIMIT 10 to show only 10 records

  • Use ORDER BY name to order the results by name

Add your answer

Q110. What if civil engineering will suit for production manager of dxc technology ؟

Ans.

Civil engineering may not be the ideal background for a production manager role in DXC Technology.

  • Production management requires knowledge of technology and software development

  • Civil engineering focuses on construction and infrastructure

  • However, transferable skills such as project management and problem-solving may be useful

  • Experience in manufacturing or software development would be more relevant

  • DXC Technology may have specific requirements for the role

Add your answer

Q111. What is deduplication

Ans.

Deduplication is a data compression technique that eliminates duplicate copies of data, reducing storage space and improving efficiency.

  • Deduplication is used to identify and remove redundant data.

  • It compares incoming data with existing data and stores only unique instances.

  • Deduplication can be performed at the file, block, or byte level.

  • It helps in reducing storage costs and improving backup and restore times.

  • Examples of deduplication technologies include inline deduplication...read more

View 2 more answers

Q112. Configuration of SAP time management, personal administration module

Ans.

Configuration of SAP time management and personal administration module involves setting up employee data, time recording, and absence management.

  • Employee data is maintained in the Personnel Administration module

  • Time recording is done through Time Management module

  • Absence management is handled through Absence Management module

  • Configuration involves defining work schedules, absence types, and time quotas

  • Integration with payroll module is important for accurate payroll processi...read more

Add your answer

Q113. What is the lastest technology that you have learnt

Ans.

The latest technology I have learned is artificial intelligence (AI).

  • AI is a branch of computer science that focuses on creating intelligent machines capable of performing tasks that typically require human intelligence.

  • Some examples of AI applications include virtual assistants like Siri and Alexa, self-driving cars, and recommendation systems.

  • I have learned about different AI techniques such as machine learning, natural language processing, and computer vision.

Add your answer

Q114. How DNS works? what happens when you click any link on browser?

Ans.

DNS translates domain names to IP addresses. When you click a link, browser sends a DNS query to resolve the domain name.

  • DNS stands for Domain Name System

  • When you click a link, browser sends a DNS query to a DNS server to resolve the domain name to an IP address

  • The DNS server then responds with the corresponding IP address

  • The browser then uses the IP address to connect to the server hosting the website

Add your answer

Q115. What is OS? And paging techniques

Ans.

OS stands for Operating System. Paging is a memory management technique used by OS to store and retrieve data from secondary storage.

  • OS is a software that manages computer hardware resources and provides common services for computer programs.

  • Paging is a memory management scheme that eliminates the need for contiguous allocation of physical memory.

  • Paging allows the operating system to use virtual memory, which is larger than physical memory.

  • Examples of paging techniques includ...read more

Add your answer

Q116. Introduction Project Write code for Prime number

Ans.

Code to check if a number is prime or not

  • A prime number is a positive integer greater than 1 that has no positive integer divisors other than 1 and itself

  • One way to check if a number is prime is to iterate from 2 to the square root of the number and check if any of them divide the number without a remainder

  • Another way is to use the Sieve of Eratosthenes algorithm to generate all prime numbers up to a certain limit

Add your answer

Q117. How you can delete the record on database ?

Ans.

To delete a record from a database, you can use the DELETE statement.

  • Use the DELETE statement with the WHERE clause to specify the record to be deleted.

  • Make sure to backup the database before deleting any records.

  • Example: DELETE FROM table_name WHERE column_name = value;

Add your answer

Q118. Query to select top 2 data of a column.

Ans.

To select the top 2 data of a column, use the 'SELECT TOP' statement in SQL.

  • Use the 'SELECT TOP' statement followed by the number of rows you want to retrieve.

  • Specify the column name after the 'SELECT' keyword.

  • Order the data in the column using 'ORDER BY' clause if needed.

  • Example: SELECT TOP 2 column_name FROM table_name ORDER BY column_name DESC;

Add your answer

Q119. What are four pillars of oops

Ans.

Four pillars of OOPs are Abstraction, Encapsulation, Inheritance, and Polymorphism.

  • Abstraction: Hiding implementation details and showing only necessary information.

  • Encapsulation: Binding data and functions together and restricting access to data.

  • Inheritance: Creating new classes from existing ones, inheriting properties and methods.

  • Polymorphism: Ability of objects to take on multiple forms or behaviors.

View 1 answer

Q120. What is the difference between DDL & DML

Ans.

DDL stands for Data Definition Language and is used to define the structure of database objects. DML stands for Data Manipulation Language and is used to manipulate data within the database.

  • DDL is used to create, modify, and delete database objects such as tables, indexes, and views.

  • DML is used to insert, update, delete, and retrieve data from database tables.

  • Examples of DDL statements include CREATE TABLE, ALTER TABLE, and DROP TABLE.

  • Examples of DML statements include INSERT...read more

Add your answer

Q121. What is Accountancy

Ans.

Accountancy is the practice of recording, analyzing, and reporting financial transactions for individuals, businesses, and organizations.

  • Accountancy involves the systematic recording of financial transactions.

  • It includes analyzing financial data to provide insights and make informed decisions.

  • Accountants prepare financial statements and reports to communicate the financial health of an entity.

  • They ensure compliance with financial regulations and tax laws.

  • Accountancy can be ap...read more

View 6 more answers

Q122. How would you handle escalations & Customer queries

Ans.

I would handle escalations and customer queries by actively listening, empathizing, and providing timely and effective solutions.

  • Listen actively to the customer's concerns and empathize with their situation

  • Provide timely and effective solutions to resolve the issue

  • Ensure that the customer is satisfied with the resolution and follow up to ensure their continued satisfaction

  • Document the issue and resolution for future reference and process improvement

  • Train and empower team memb...read more

Add your answer

Q123. Context switching. Problems faced during chatbot development and delivery to customers.

Ans.

Context switching during chatbot development can lead to problems in delivery to customers.

  • Context switching can cause delays in development and testing.

  • It can also lead to miscommunication and errors in the chatbot's responses.

  • Developers may need to switch between different programming languages or platforms, which can be challenging.

  • Testing and debugging can become more difficult when context switching is frequent.

  • Proper planning and organization can help minimize the impac...read more

Add your answer

Q124. How to find ip address of the website

Ans.

To find the IP address of a website, use the command prompt or a website like WhatIsMyIPAddress.com.

  • Open the command prompt and type 'ping website.com' to get the IP address

  • Use a website like WhatIsMyIPAddress.com to find the IP address

  • IP addresses can change, so it's important to check periodically

Add your answer

Q125. 1. What is difference between all enhancements? 2. Which approach is better for system integration?

Ans.

The first question is unclear. The second question depends on the specific system being integrated.

  • The first question needs clarification on what enhancements are being referred to.

  • The second question depends on the specific systems being integrated and their requirements.

  • Approaches for system integration include point-to-point, middleware, and service-oriented architecture.

  • The best approach depends on factors such as scalability, flexibility, and cost.

  • Examples of system inte...read more

Add your answer

Q126. Explain the communication from VM to VM in Vmware Vsphere cluster?

Ans.

VM communication in VMware Vsphere cluster is facilitated through virtual switches and network adapters.

  • VMs communicate through virtual switches that connect to physical network adapters.

  • Virtual switches can be configured with different network policies and security settings.

  • VMware tools can also be used to enhance communication and performance.

  • VMware NSX can provide advanced networking and security features for VM communication.

  • VMware vMotion allows live migration of VMs bet...read more

Add your answer

Q127. How to add and generate SSL certificate in Linux.

Ans.

To add and generate SSL certificate in Linux, follow these steps:

  • Install OpenSSL package

  • Create a private key

  • Create a CSR (Certificate Signing Request)

  • Submit CSR to a Certificate Authority (CA)

  • Receive SSL certificate from CA

  • Install SSL certificate on the server

  • Configure web server to use SSL certificate

Add your answer

Q128. What are the types of exceptions ?

Ans.

There are two types of exceptions: checked and unchecked.

  • Checked exceptions are checked at compile-time and must be handled by the programmer.

  • Unchecked exceptions are not checked at compile-time and can be handled by the JVM.

  • Examples of checked exceptions include IOException and SQLException.

  • Examples of unchecked exceptions include NullPointerException and ArrayIndexOutOfBoundsException.

Add your answer

Q129. What do you know about HPLC..?

Ans.

HPLC stands for High Performance Liquid Chromatography. It is a technique used to separate, identify, and quantify components in a mixture.

  • HPLC is a widely used analytical technique in various industries including pharmaceuticals, food and beverage, environmental analysis, and forensic science.

  • It involves the use of a liquid mobile phase and a stationary phase packed in a column to separate the components of a sample based on their interactions with the stationary phase.

  • The s...read more

Add your answer

Q130. Write any code of your choice and explain it step by step

Add your answer

Q131. What is DHCP , DNS , Public and Private IP ex

Ans.

DHCP assigns IP addresses, DNS resolves domain names to IP addresses, Public IP is visible to internet, Private IP is for internal network.

  • DHCP - Dynamic Host Configuration Protocol assigns IP addresses to devices on a network.

  • DNS - Domain Name System resolves domain names to IP addresses.

  • Public IP - Visible to the internet and assigned by the ISP.

  • Private IP - Used for internal network and assigned by the router.

  • Example: DHCP assigns IP address 192.168.1.100 to a device on th...read more

Add your answer

Q132. what is networking?

Ans.

Networking is the practice of connecting devices together to share resources and information.

  • Networking involves the use of hardware and software to connect devices together.

  • It allows for the sharing of resources such as printers and files.

  • Networking also enables communication between devices, such as sending emails or accessing websites.

  • Examples of networking technologies include Ethernet, Wi-Fi, and Bluetooth.

View 1 answer

Q133. What is annuity and tell their benefits over other insurance.

Ans.

An annuity is a financial product that provides a steady stream of income for a fixed period or for life.

  • Annuities are typically used for retirement planning.

  • They offer tax-deferred growth, meaning you don't pay taxes on the earnings until you withdraw the money.

  • Annuities can provide a guaranteed income stream for life, which can be helpful for those who are worried about outliving their savings.

  • They also offer a death benefit, which means that if you die before the annuity p...read more

Add your answer

Q134. What we can do in security as port wise

Ans.

Port-based security involves controlling access to network resources based on the physical port of the device.

  • Port security can be implemented by limiting the number of MAC addresses that can be learned on a port.

  • It can also involve configuring the port to only allow traffic from specific VLANs.

  • Port security can be used to prevent unauthorized access to the network by limiting the devices that can connect to it.

  • It can also be used to prevent rogue devices from being connected...read more

Add your answer

Q135. What do you know about insurance sector

Ans.

Insurance sector involves the business of providing financial protection against potential risks and losses.

  • Insurance sector is a part of the financial services industry.

  • It involves the transfer of risk from an individual or entity to an insurance company.

  • Insurance policies are contracts that outline the terms and conditions of coverage.

  • Types of insurance include life, health, property, auto, and liability insurance.

  • Insurance companies collect premiums from policyholders and ...read more

View 1 answer

Q136. How we can configure continuously integrated development and implementation

Ans.

Continuous integration and implementation can be configured by setting up automated build and deployment pipelines.

  • Set up a version control system like Git to track changes in code

  • Use a continuous integration tool like Jenkins to automatically build and test code changes

  • Configure automated deployment pipelines to deploy code changes to different environments

  • Integrate automated testing to ensure code quality and catch bugs early

  • Monitor and analyze the build and deployment proc...read more

Add your answer

Q137. How to windows 10 difference windows 11

Ans.

Windows 10 and Windows 11 have differences in terms of user interface, features, system requirements, and performance improvements.

  • User Interface: Windows 11 introduces a centered Start menu, redesigned taskbar, and new snap layouts.

  • Features: Windows 11 includes new features like Snap Groups, Direct integration with Microsoft Teams, and improved gaming capabilities.

  • System Requirements: Windows 11 has stricter hardware requirements compared to Windows 10.

  • Performance Improvemen...read more

View 1 answer

Q138. What are the Non-forfeiture options?

Ans.

Non-forfeiture options are the choices available to a policyholder when they stop paying premiums.

  • Non-forfeiture options allow policyholders to retain some value from their policy even if they stop paying premiums.

  • Common non-forfeiture options include reduced paid-up insurance, extended term insurance, and cash surrender value.

  • Reduced paid-up insurance provides a smaller death benefit but does not require further premium payments.

  • Extended term insurance allows the policyholde...read more

Add your answer

Q139. what is database? how is data stored in a database

Ans.

A database is a collection of data that is organized in a way that allows for efficient storage, retrieval, and manipulation.

  • Data is stored in tables with rows and columns

  • Each table has a unique identifier called a primary key

  • Data can be queried using SQL (Structured Query Language)

  • Examples of databases include MySQL, Oracle, and MongoDB

Add your answer

Q140. What is data structure and linked list

Ans.

Data structure is a way of organizing and storing data in a computer so that it can be accessed and used efficiently. A linked list is a linear data structure where elements are stored in nodes and each node points to the next node in the sequence.

  • Data structure organizes and stores data efficiently

  • Linked list is a linear data structure with nodes pointing to next node

  • Example: Singly linked list, doubly linked list

Add your answer

Q141. Write a pyspark program that reads multiple csv files and creates a data frame with count of records against each file

Ans.

A pyspark program to read multiple csv files and create a data frame with count of records against each file.

  • Use SparkSession to create a Spark application

  • Read multiple csv files using spark.read.csv() method

  • Use groupBy() and count() functions to get count of records for each file

  • Create a new column to store the file name

  • Join all data frames to create a final data frame with count of records against each file

Add your answer

Q142. What are the memories in JDK?

Ans.

JDK memories are areas of memory used by Java programs to store data and code.

  • JDK memories include heap memory, stack memory, and non-heap memory.

  • Heap memory is used to store objects and is managed by the garbage collector.

  • Stack memory is used to store method calls and local variables.

  • Non-heap memory is used to store class definitions and other data.

  • Examples of non-heap memory include the method area and the permanent generation.

  • Memory leaks can occur if objects are not prope...read more

Add your answer

Q143. what is oops and explain each of the terms

Ans.

OOPs stands for Object-Oriented Programming. It is a programming paradigm based on the concept of objects.

  • OOPs consists of four main principles: Inheritance, Encapsulation, Abstraction, and Polymorphism.

  • Inheritance allows a class to inherit properties and behavior from another class.

  • Encapsulation refers to the bundling of data and methods that operate on the data into a single unit.

  • Abstraction focuses on hiding the internal implementation details of a class and showing only t...read more

Add your answer

Q144. Technologies used in Group project?

Ans.

We used a variety of technologies including Java, Spring Boot, React, and MySQL.

  • Java was used for the backend development

  • Spring Boot was used to create RESTful APIs

  • React was used for the frontend development

  • MySQL was used as the database management system

Add your answer

Q145. How to post Deferred revenue entry

Ans.

Deferred revenue entry is posted by debiting the deferred revenue account and crediting the revenue account.

  • Identify the amount of revenue that has been deferred

  • Debit the deferred revenue account for the identified amount

  • Credit the revenue account for the same amount

  • Ensure that the deferred revenue account balance is reduced as revenue is recognized

  • Update the financial statements accordingly

Add your answer

Q146. What is the IP Address qnd how can you check this?

Ans.

An IP address is a unique numerical label assigned to each device connected to a computer network.

  • IP address stands for Internet Protocol address.

  • It is used to identify and locate devices on a network.

  • IP addresses can be either IPv4 (32-bit) or IPv6 (128-bit) format.

  • To check your IP address, you can use various methods such as using command prompt, checking network settings, or using online IP lookup tools.

Add your answer

Q147. What are the differences between String and StringBuilder in programming?

Add your answer

Q148. how to implement SCD in Azure environment. Performance tuning in scala

Ans.

SCD implementation in Azure environment and performance tuning in Scala.

  • Use Azure Data Factory for SCD implementation

  • Choose appropriate SCD type based on business requirements

  • Use Azure Databricks for performance tuning in Scala

  • Optimize code by using efficient data structures and algorithms

  • Use caching and parallel processing to improve performance

Add your answer

Q149. T codes which used in account payable processing

Ans.

T codes are used in account payable processing to categorize transactions for reporting and analysis.

  • T-code FB60 is used for creating invoices in SAP

  • T-code F-43 is used for entering vendor invoice in SAP

  • T-code F-53 is used for clearing vendor down payment in SAP

Add your answer

Q150. Wap to find each character occurrence in string

Ans.

Wap to find each character occurrence in string

  • Iterate through the string and use a dictionary to keep track of character counts

  • Use a for loop to iterate through the string and increment the count of each character in the dictionary

  • Print the dictionary to display the character counts

Add your answer

Q151. Explain types of GC column used ..?

Ans.

There are several types of GC columns used in quality control, including packed columns, capillary columns, and specialty columns.

  • Packed columns are filled with a solid support material, such as diatomaceous earth or molecular sieves.

  • Capillary columns have a small inner diameter, allowing for higher resolution and faster analysis.

  • Specialty columns are designed for specific applications, such as chiral separations or analysis of volatile compounds.

  • Other types of columns includ...read more

Add your answer

Q152. How would we convert access into trunk

Ans.

To convert access into trunk, we need to configure the switch port as a trunk port.

  • Configure the switch port as a trunk port using the 'switchport mode trunk' command.

  • Verify the trunk configuration using the 'show interfaces trunk' command.

  • Ensure that the VLANs allowed on the trunk are configured using the 'switchport trunk allowed vlan' command.

  • Ensure that the native VLAN is configured using the 'switchport trunk native vlan' command.

Add your answer

Q153. How to windows Blue screen error

Ans.

A Windows Blue Screen error occurs when the operating system encounters a critical error and cannot recover.

  • Blue Screen of Death (BSOD) is a stop error screen displayed by Windows when it encounters a system crash or error.

  • It is usually caused by hardware or software issues, such as faulty drivers, incompatible software, or hardware failures.

  • To troubleshoot a BSOD, you can analyze the error code displayed on the screen, check for recent hardware or software changes, update dr...read more

View 1 answer

Q154. What is the insurance

Ans.

Insurance is a contract between an individual and an insurance company to protect against financial loss.

  • Insurance provides financial protection against unexpected events such as accidents, illnesses, and natural disasters.

  • The individual pays a premium to the insurance company in exchange for coverage.

  • Types of insurance include health, life, auto, home, and business insurance.

  • Insurance policies have terms and conditions that outline what is covered and what is not.

  • Insurance h...read more

View 1 answer

Q155. What is Reinsurance?

Ans.

Reinsurance is a process where an insurance company transfers a portion of its risk to another insurance company.

  • Reinsurance helps insurance companies manage their risk exposure.

  • It allows insurance companies to protect themselves against large losses.

  • Reinsurance can be either proportional or non-proportional.

  • Proportional reinsurance involves sharing both premiums and losses with the reinsurer.

  • Non-proportional reinsurance involves transferring only losses above a certain thres...read more

Add your answer

Q156. What are the disaster recovery plan you have implemented

Ans.

Implemented comprehensive disaster recovery plans to ensure business continuity and data integrity during unforeseen events.

  • Conducted risk assessments to identify potential threats and vulnerabilities.

  • Developed a detailed recovery strategy, including data backup solutions and alternate site arrangements.

  • Regularly tested the disaster recovery plan through simulations and drills to ensure effectiveness.

  • Established clear communication protocols for stakeholders during a disaster...read more

Add your answer

Q157. Why not python instead of using Java?

Ans.

Java is preferred for its performance, scalability, and strong typing compared to Python.

  • Java is statically typed, which helps catch errors at compile time, while Python is dynamically typed.

  • Java is faster in terms of execution speed compared to Python.

  • Java is preferred for large-scale enterprise applications due to its scalability and performance.

  • Java has a strong ecosystem and support for multi-threading, making it suitable for high-performance applications.

Add your answer

Q158. What Do you know About DXC Technology

Ans.

DXC Technology is a global IT services company that provides technology solutions and consulting services to businesses and governments.

  • DXC Technology was formed in 2017 through the merger of Computer Sciences Corporation (CSC) and the Enterprise Services business of Hewlett Packard Enterprise (HPE).

  • It offers a wide range of services including cloud and security solutions, analytics, application services, and consulting.

  • DXC Technology serves clients in various industries such...read more

Add your answer

Q159. What is the software installation process

Ans.

Software installation process involves planning, preparation, installation, configuration, and testing.

  • Plan the installation by determining software requirements and compatibility with the system

  • Prepare the system by ensuring it meets the software's prerequisites

  • Install the software using the appropriate installation method (e.g. setup wizard, command line)

  • Configure the software settings based on the requirements and best practices

  • Test the software to ensure it is functioning...read more

Add your answer

Q160. 2. Difference between DELETE and TRUNCATE and DROP

Ans.

DELETE removes specific rows, TRUNCATE removes all rows, DROP removes entire table.

  • DELETE is a DML command, TRUNCATE and DROP are DDL commands.

  • DELETE can have a WHERE clause to specify which rows to delete.

  • TRUNCATE resets the table and cannot be undone.

  • DROP removes the table and all associated objects.

  • Example: DELETE FROM table WHERE id = 1;

  • Example: TRUNCATE table;

  • Example: DROP TABLE table;

Add your answer

Q161. Which data sources are used for Finacle application in Weblogic

Ans.

Finacle application in Weblogic uses various data sources

  • Finacle application uses Oracle database as its primary data source

  • Other data sources include LDAP for user authentication and authorization

  • JMS queues are used for messaging between different components of the application

  • Web services are used to integrate with other systems

  • Data sources can be configured in the Weblogic server console

Add your answer

Q162. What is Artificial Intelligence?

Ans.

Artificial Intelligence is the simulation of human intelligence in machines that are programmed to think and learn.

  • AI refers to the development of computer systems that can perform tasks that would typically require human intelligence.

  • It involves the ability of machines to understand, reason, learn, and adapt to new situations.

  • AI can be categorized into narrow AI (focused on specific tasks) and general AI (possessing human-like intelligence).

  • Examples of AI include virtual ass...read more

View 1 answer

Q163. What is an Underwriting?

Ans.

Underwriting is the process of evaluating and assessing the risk of insuring a person or entity.

  • Underwriting involves analyzing the potential risks and determining the appropriate premium to charge for insurance coverage.

  • It is commonly used in the insurance industry for various types of insurance policies such as life, health, and property insurance.

  • Underwriting also involves reviewing the applicant's financial and medical history to determine their insurability and potential...read more

Add your answer

Q164. What do you mean by information security

Ans.

Information security refers to the protection of data from unauthorized access, use, disclosure, disruption, modification, or destruction.

  • It involves implementing measures to ensure confidentiality, integrity, and availability of data

  • Examples include firewalls, encryption, access controls, and security audits

  • Information security is important for protecting sensitive data such as personal information, financial data, and intellectual property

Add your answer

Q165. Have you ever used AAS.?

Ans.

Yes, I have used AAS in my previous role as a Quality Control Officer.

  • I have experience using AAS (Atomic Absorption Spectroscopy) in analyzing samples for quality control purposes.

  • I am familiar with the operation and maintenance of AAS instruments.

  • I have successfully utilized AAS to detect and quantify trace elements in various samples.

  • I have also interpreted and analyzed AAS data to ensure compliance with quality standards.

Add your answer

Q166. Explain the complex test scenario automated by you in your career

Ans.

Automated testing of a complex financial transaction system with multiple user roles and permissions

  • Created automated test scripts using Selenium to simulate different user roles accessing the system

  • Tested various scenarios such as fund transfers, account creation, and transaction history

  • Implemented data-driven testing to validate different input combinations and edge cases

  • Used API testing tools like Postman to verify backend functionality

  • Integrated test automation with CI/CD...read more

Add your answer

Q167. Difference between an asset and CI

Ans.

An asset is a physical or virtual item that has financial value, while a CI is any item that needs to be managed for IT purposes.

  • Assets are typically tangible items, such as hardware or software licenses, that have a monetary value.

  • CIs are any items that need to be managed for IT purposes, such as servers, applications, or network devices.

  • Assets are often tracked in financial systems, while CIs are tracked in IT service management systems.

  • An asset can be a CI, but not all CIs...read more

Add your answer

Q168. what are the different testing methodology

Ans.

Different testing methodologies include black box, white box, grey box, manual, automated, and exploratory testing.

  • Black box testing: testing without knowledge of internal workings

  • White box testing: testing with knowledge of internal workings

  • Grey box testing: combination of black and white box testing

  • Manual testing: testing done manually by a human

  • Automated testing: testing done by software tools

  • Exploratory testing: testing done without a predefined test plan

  • Examples: Seleniu...read more

Add your answer

Q169. Tell about Cloud Computing

Ans.

Cloud computing is the delivery of computing services over the internet, including storage, databases, networking, software, and more.

  • Cloud computing allows users to access resources on-demand without the need for physical infrastructure.

  • Examples of cloud computing services include Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform.

  • Cloud computing offers scalability, flexibility, and cost-effectiveness for businesses and individuals.

  • Types of cloud computing...read more

View 1 answer

Q170. what is the different between =, ==, ===?

Ans.

The different between =, ==, === is related to assignment, equality, and strict equality in programming.

  • = is used for assignment in programming languages.

  • == is used for equality comparison, it checks if two values are equal.

  • === is used for strict equality comparison, it checks if two values are equal in both value and data type.

Add your answer

Q171. What are the projects you did? Write a c program to reverse a string?

Ans.

A C program to reverse a string

  • Use a loop to iterate through the string and swap the characters at the beginning and end of the string

  • Create a temporary variable to hold the character being swapped

  • Terminate the loop when the index of the beginning of the string is greater than or equal to the index of the end of the string

Add your answer

Q172. What is accrual and deferral and when do we do it

Ans.

Accrual is recognizing revenue and expenses when they are incurred, not when cash is exchanged. Deferral is postponing recognition of revenue or expenses to a later period.

  • Accrual accounting matches revenues with expenses in the same accounting period

  • Accruals are recorded as adjusting journal entries at the end of an accounting period

  • Deferrals involve recognizing revenue or expenses at a later date

  • Examples of accruals include recognizing revenue when services are provided, ev...read more

Add your answer

Q173. What is the full form of SDLC?

Ans.

SDLC stands for Software Development Life Cycle.

  • SDLC is a systematic process for developing software applications.

  • It includes various phases such as requirements gathering, design, coding, testing, deployment, and maintenance.

  • Each phase has specific activities and deliverables.

  • SDLC ensures the development of high-quality software within budget and time constraints.

  • Examples of SDLC models include Waterfall, Agile, and DevOps.

View 1 answer

Q174. How to actiavate a Volume Group or LV ?

Ans.

To activate a Volume Group or LV, use the vgchange or lvchange command.

  • Use the vgchange command to activate a Volume Group.

  • Use the lvchange command to activate a Logical Volume.

  • Specify the name of the Volume Group or Logical Volume as an argument.

  • Use the -a y option with vgchange to activate all Volume Groups.

  • Use the -a y option with lvchange to activate all Logical Volumes in a Volume Group.

Add your answer

Q175. What is backup agent

Ans.

A backup agent is a software component that facilitates the backup and restore process by managing communication between the backup server and the devices being backed up.

  • Backup agent acts as an intermediary between the backup server and the devices being backed up.

  • It facilitates the transfer of data from the devices to the backup server and vice versa.

  • Backup agents often provide features like compression, encryption, and deduplication to optimize the backup process.

  • Examples ...read more

View 1 answer

Q176. Round Robin Algo Bankers algo Encapsulation Pillars of oops Multithreading

Ans.

Round Robin and Banker's algorithms are scheduling algorithms used in operating systems. Encapsulation is a concept in OOP. Multithreading allows multiple threads to run concurrently.

  • Round Robin algorithm is a CPU scheduling algorithm where each process gets a small unit of CPU time.

  • Banker's algorithm is a resource allocation and deadlock avoidance algorithm used in operating systems.

  • Encapsulation is the bundling of data and methods that operate on the data into a single unit...read more

Add your answer

Q177. Why stacks, what are there usecases?

Ans.

Stacks are data structures that follow Last In First Out (LIFO) principle, commonly used in function calls, expression evaluation, and undo mechanisms.

  • Used in function calls to store return addresses and local variables

  • Expression evaluation like infix to postfix conversion and evaluation

  • Undo mechanisms in text editors and web browsers

Add your answer
Q178. What is the JVM?
Ans.

JVM stands for Java Virtual Machine, which is a virtual machine that enables a computer to run Java programs.

  • JVM is responsible for converting Java bytecode into machine code that can be executed by the computer's CPU.

  • It provides platform independence by abstracting the hardware and operating system details.

  • JVM manages memory, handles garbage collection, and provides security features for Java applications.

  • Popular JVM implementations include Oracle HotSpot, OpenJ9, and GraalV...read more

Add your answer

Q179. What is dbms and what are its types?

Ans.

DBMS stands for Database Management System. It is a software system that manages databases.

  • DBMS is used to store, retrieve, and manage data efficiently.

  • There are different types of DBMS such as relational, object-oriented, hierarchical, network, and more.

  • Relational DBMS is the most commonly used type and uses tables to store data.

  • Object-oriented DBMS stores data in objects and is used for complex data structures.

  • Hierarchical DBMS organizes data in a tree-like structure and is...read more

Add your answer

Q180. What is oops and os and why we use it?

Ans.

OOPs stands for Object-Oriented Programming and OS stands for Operating System. OOPs is used for creating reusable code and OS is used for managing computer hardware and software resources.

  • OOPs is a programming paradigm that focuses on creating objects that contain data and methods to manipulate that data.

  • It allows for code reusability, encapsulation, and abstraction.

  • Examples of OOPs languages include Java, Python, and C++.

  • OS is a software that manages computer hardware and s...read more

Add your answer

Q181. General computer troubleshooting steps. What are nvram etc.

Ans.

NVRAM is a type of memory that stores settings for the computer's hardware. General troubleshooting steps include checking connections and restarting the system.

  • Check connections and cables

  • Restart the system

  • Check for error messages

  • Run diagnostic tests

  • Update drivers and software

  • Reset BIOS settings

  • Clear NVRAM settings

Add your answer

Q182. what is salvage, what is rating, what is copay

Ans.

Salvage refers to the value of an asset after it has been damaged or destroyed. Rating is an evaluation of the creditworthiness of a company or individual. Copay is the amount of money an insured person pays for a covered healthcare service.

  • Salvage is the residual value of an asset that has been damaged or destroyed, often used in insurance claims.

  • Rating is a measure of the creditworthiness or financial stability of a company or individual, used by credit agencies and lenders...read more

Add your answer

Q183. How to implement a project in sap

Ans.

To implement a project in SAP, you need to follow a structured approach involving planning, configuration, testing, and deployment.

  • Define project scope and objectives

  • Gather requirements from stakeholders

  • Configure SAP system based on requirements

  • Test the system to ensure functionality and performance

  • Train end users on using the new system

  • Deploy the project and monitor for any issues

  • Provide ongoing support and maintenance

Add your answer

Q184. What is cache and cookies?

Ans.

Cache and cookies are temporary storage files used by web browsers to improve website performance and user experience.

  • Cache stores website data to load pages faster on subsequent visits

  • Cookies store user information and preferences for a personalized experience

  • Clearing cache and cookies can help troubleshoot website issues

  • Third-party cookies can track user behavior for targeted advertising

  • Browser settings allow users to manage cache and cookie storage

Add your answer

Q185. What is vpn? Difference between modem and router

Ans.

VPN stands for Virtual Private Network. Modem connects to the internet, while router connects devices to the modem and manages network traffic.

  • VPN allows secure connection to a private network over the internet

  • Modem connects to the internet service provider to access the internet

  • Router connects multiple devices to the modem and manages network traffic

  • Modem is like the gateway to the internet, while router directs traffic within the network

Add your answer

Q186. Which programming language you know?

Ans.

I know multiple programming languages including Java, Python, and C++.

  • Proficient in Java and Python

  • Familiar with C++ and JavaScript

  • Experience with SQL and HTML/CSS

  • Comfortable with object-oriented programming

  • Able to learn new languages quickly

Add your answer

Q187. What is Linux and which flavor you've worked on?

Ans.

Linux is an open-source operating system based on Unix, known for its stability, security, and flexibility.

  • Linux is an open-source operating system that is widely used in servers, supercomputers, and embedded systems.

  • There are many flavors of Linux, known as distributions, such as Ubuntu, CentOS, Debian, and Red Hat.

  • Each Linux distribution has its own package management system, desktop environment, and software repositories.

  • As a System Administrator, I have worked on CentOS, ...read more

Add your answer

Q188. simple C program to accept and print a name

Ans.

A simple C program to accept and print a name.

  • Use scanf() function to accept the name from the user.

  • Use printf() function to print the name on the screen.

View 1 answer

Q189. What is Credit sales and credit purchases

Ans.

Credit sales and credit purchases involve transactions where payment is deferred to a later date.

  • Credit sales refer to goods or services sold on credit, where payment is received at a later date.

  • Credit purchases refer to goods or services purchased on credit, where payment is made at a later date.

  • Both credit sales and credit purchases are common in business-to-business transactions.

  • Example: A company sells products to another company on credit terms of 30 days.

  • Example: A comp...read more

Add your answer

Q190. what is data loader how we can use deleteall and delete difference between lwc and aura

Ans.

Data Loader is a tool provided by Salesforce for importing, exporting, and deleting data in Salesforce.

  • Data Loader is used for bulk importing, exporting, and deleting data in Salesforce

  • DeleteAll operation in Data Loader deletes all records in a specified object

  • Delete operation in Data Loader deletes specific records based on a query

  • Difference between LWC and Aura: LWC is a new programming model for building Lightning components while Aura is the older model

  • LWC provides better...read more

Add your answer

Q191. Logic of Knight's move in chess.

Ans.

The knight in chess moves in an L-shape, two squares in one direction and one square in a perpendicular direction.

  • The knight can move to any of the eight squares that are two squares away in one direction and one square away in a perpendicular direction.

  • The knight's move is unique as it can jump over other pieces on the board.

  • The knight's move can be represented using algebraic notation, such as Nf3 or Nc6.

  • Here are a few examples of valid knight moves: Nf3, Nc6, Ng5, Nh4.

Add your answer

Q192. How to deploy war file in jboss

Ans.

To deploy a war file in JBoss, use the JBoss Management Console or the command line interface.

  • Access the JBoss Management Console by navigating to http://localhost:9990/console/App.html#deployments

  • Click on the 'Add' button to upload the war file

  • Alternatively, use the command line interface by navigating to the bin directory and running the command 'jboss-cli.bat --connect --command="deploy path/to/war/file.war"'

  • Make sure the war file is properly packaged and contains all nece...read more

Add your answer

Q193. what is java, oops, dsa, etc

Ans.

Java is a popular programming language, OOPs stands for Object-Oriented Programming, DSA refers to Data Structures and Algorithms.

  • Java is a high-level, class-based, object-oriented programming language known for its portability and versatility.

  • OOPs is a programming paradigm based on the concept of 'objects', which can contain data in the form of fields and code in the form of procedures.

  • DSA involves the study of data structures (like arrays, linked lists, trees) and algorithm...read more

Add your answer

Q194. What is data encapsulation

Ans.

Data encapsulation is the process of hiding implementation details and exposing only necessary information.

  • It is a fundamental concept in object-oriented programming.

  • It helps in achieving data abstraction and information hiding.

  • It allows for better control over data and prevents unauthorized access.

  • Example: A class in Java that has private variables and public methods to access them.

  • Example: A capsule that contains medicine and only allows access through a small opening.

View 1 answer

Q195. What are 4 Pillars of OOPs

Ans.

4 Pillars of OOPs are Abstraction, Encapsulation, Inheritance, and Polymorphism.

  • Abstraction: Hiding implementation details and showing only necessary information.

  • Encapsulation: Binding data and functions together and restricting access to them.

  • Inheritance: Creating new classes from existing ones, inheriting properties and methods.

  • Polymorphism: Ability of objects to take on multiple forms or behaviors.

Add your answer

Q196. What is Dns and what are its use

Ans.

DNS stands for Domain Name System. It is a decentralized naming system for computers, services, or any resource connected to the Internet.

  • DNS translates domain names to IP addresses

  • It helps in locating resources on the Internet

  • DNS servers store domain name records like A, CNAME, MX, etc.

  • Examples: www.google.com translates to 172.217.3.196

Add your answer

Q197. What is creditor

Ans.

A creditor is a person or entity to whom money is owed.

  • A creditor is someone who has provided goods or services on credit.

  • They are owed money by the debtor.

  • Creditors can be individuals, businesses, or financial institutions.

  • Examples of creditors include suppliers, banks, and bondholders.

View 3 more answers

Q198. What is client I’d

Ans.

Client ID is a unique identifier assigned to a client device or application that connects to a storage backup system.

  • Client ID is used to track and manage client devices or applications in a storage backup system.

  • It helps in identifying and authenticating clients during backup and restore operations.

  • Client ID can be a combination of alphanumeric characters or a generated unique identifier.

  • Examples of client IDs include MAC addresses, IP addresses, or user-defined names.

View 1 answer

Q199. What is java? Is java platform independent?

Ans.

Java is a high-level programming language known for its platform independence.

  • Java is an object-oriented programming language developed by Sun Microsystems.

  • Java code is compiled into bytecode that can run on any Java Virtual Machine (JVM).

  • Java's platform independence is achieved through the use of JVM, allowing Java programs to run on any platform that has a JVM installed.

  • Examples of platform-independent Java applications include web applications, mobile apps, and enterprise ...read more

Add your answer

Q200. What is Aws and what services it provides

Ans.

AWS (Amazon Web Services) is a cloud computing platform that offers a wide range of services for computing, storage, databases, machine learning, and more.

  • Provides computing power through EC2 (Elastic Compute Cloud)

  • Offers storage solutions like S3 (Simple Storage Service)

  • Includes database services such as RDS (Relational Database Service)

  • Provides machine learning services like SageMaker

  • Offers serverless computing through AWS Lambda

Add your answer
1
2
3
4
5
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos

Interview Process at Diverse Lynx

based on 583 interviews
Interview experience
4.0
Good
View more
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Interview Questions from Similar Companies

3.7
 • 656 Interview Questions
3.7
 • 430 Interview Questions
3.8
 • 354 Interview Questions
4.1
 • 217 Interview Questions
4.0
 • 169 Interview Questions
4.1
 • 164 Interview Questions
View all
Top DXC Technology Interview Questions And Answers
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
75 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter