Add office photos
Employer?
Claim Account for FREE

EPAM Systems

3.7
based on 1.3k Reviews
Filter interviews by

300+ Insight Engineering Systems Interview Questions and Answers

Updated 24 Dec 2024
Popular Designations

Q201. Explain SOLID principle.

Ans.

SOLID is a set of five design principles to make software designs more understandable, flexible, and maintainable.

  • S - Single Responsibility Principle: A class should have only one reason to change.

  • O - Open/Closed Principle: Software entities should be open for extension but closed for modification.

  • L - Liskov Substitution Principle: Objects of a superclass should be replaceable with objects of its subclasses without affecting the program's correctness.

  • I - Interface Segregation...read more

Add your answer

Q202. write a program to move all the zeros in a array into end

Ans.

Program to move all zeros in an array to the end

  • Iterate through the array and move all zeros to the end

  • Use two pointers approach to swap non-zero elements with zeros

  • Maintain a count of non-zero elements to determine the swap position

Add your answer

Q203. Explain your application architecture?

Ans.

Our application architecture follows a microservices approach with containerization using Docker and Kubernetes.

  • We use microservices to break down our application into smaller, independent components.

  • Containerization allows us to package and deploy these components quickly and efficiently.

  • Docker is used to create and manage containers, while Kubernetes is used to orchestrate and manage containerized applications.

  • We also use RESTful APIs to facilitate communication between our...read more

Add your answer

Q204. Tell me about terraform

Ans.

Terraform is an open-source infrastructure as code software tool created by HashiCorp.

  • Terraform allows users to define and provision infrastructure using a declarative configuration language.

  • It supports multiple cloud providers such as AWS, Azure, and Google Cloud Platform.

  • Terraform uses a 'plan and apply' workflow to make changes to infrastructure.

  • It helps in automating the process of setting up and managing infrastructure.

  • Terraform state file keeps track of the current stat...read more

Add your answer
Discover Insight Engineering Systems interview dos and don'ts from real experiences

Q205. Find the longest string with no repeating characters in the string.

Ans.

Use sliding window approach to find longest substring with no repeating characters.

  • Use a set to keep track of characters in the current substring

  • Use two pointers to create a sliding window

  • Update the pointers and set as you iterate through the string

Add your answer

Q206. what epam syste, is doing they will explain you

Ans.

EPAM Systems is a global provider of digital platform engineering and software development services.

  • EPAM Systems offers services in software development, testing, and maintenance.

  • They specialize in digital platform engineering, data analytics, and consulting.

  • EPAM works with clients in various industries such as finance, healthcare, and retail.

  • They focus on delivering innovative solutions and helping clients achieve their business goals.

Add your answer
Are these interview questions helpful?

Q207. what is Business object model ?

Ans.

A business object model is a representation of the data and processes within a business domain.

  • It defines the structure and behavior of business entities.

  • It helps in understanding the relationships between different business objects.

  • It is often used in software development to design and implement business logic.

  • Examples include customer, product, order, and invoice objects.

Add your answer

Q208. How do you write a docker file.

Ans.

A Dockerfile is a script that contains instructions to build a Docker image.

  • Start with a base image

  • Add necessary dependencies and packages

  • Copy application code into the image

  • Set environment variables

  • Expose necessary ports

  • Define the command to run the application

  • Build the image using 'docker build' command

Add your answer
Share interview questions and help millions of jobseekers 🌟

Q209. Write Selenium Code for automation for Gmail ?

Ans.

Automate Gmail login and send email using Selenium WebDriver

  • Create a new WebDriver instance

  • Navigate to Gmail login page

  • Enter username and password

  • Click on the login button

  • Compose and send an email

Add your answer

Q210. routing in angular

Ans.

Routing in Angular allows navigation between different components in a single-page application.

  • Angular Router is a built-in library that provides navigation and routing functionality.

  • Routes are defined in the app-routing.module.ts file using RouterModule.forRoot() method.

  • Route parameters can be accessed using ActivatedRoute service in the component.

  • Lazy loading can be implemented to load modules only when needed for better performance.

Add your answer

Q211. Sanity and smoke testing difference

Ans.

Sanity testing is a narrow regression test while smoke testing is a broad acceptance test.

  • Sanity testing is a quick test to check if the critical functionalities are working after a change in code.

  • Smoke testing is a preliminary test to check if the software is stable enough for further testing.

  • Sanity testing is usually performed after a build while smoke testing is performed before a build.

  • Sanity testing is a subset of regression testing while smoke testing is a subset of acc...read more

Add your answer

Q212. finally vs finalize

Ans.

finally is used in exception handling to define a block of code that will always be executed, while finalize is a method in Java used for cleanup operations before an object is destroyed.

  • finally is used in try-catch blocks to define a block of code that will always be executed, regardless of whether an exception is thrown or not

  • finalize is a method in Java that is called by the garbage collector before an object is destroyed

  • Example: try { // code that may throw an exception }...read more

Add your answer

Q213. test listeners types

Ans.

Test listeners types are used in software testing to monitor and respond to events during test execution.

  • Types of test listeners include TestNG listeners, JUnit listeners, and custom listeners

  • TestNG listeners include ITestListener, ISuiteListener, and IInvokedMethodListener

  • JUnit listeners include RunListener and TestWatcher

  • Custom listeners can be created to handle specific events in test execution

Add your answer

Q214. cucumber how to run in parallel

Ans.

Cucumber can be run in parallel using tools like TestNG or JUnit with the help of plugins like Cucumber-JVM-Parallel or Cucumber-JVM-Parallel-plugin.

  • Use TestNG or JUnit to run Cucumber tests in parallel

  • Utilize plugins like Cucumber-JVM-Parallel or Cucumber-JVM-Parallel-plugin

  • Configure the test runner to run scenarios in parallel by specifying the number of threads

Add your answer

Q215. Sourcing Methods, Skills worked on.

Ans.

I have experience using various sourcing methods such as job boards, social media, employee referrals, and networking events.

  • Utilized job boards like Indeed and LinkedIn to find qualified candidates

  • Leveraged social media platforms such as Facebook and Twitter for sourcing

  • Encouraged employee referrals to tap into existing networks

  • Attended networking events to connect with potential candidates

Add your answer

Q216. How to optimise sp

Ans.

Optimizing SP involves improving performance and efficiency of stored procedures in a database.

  • Identify and eliminate unnecessary or redundant code

  • Use appropriate indexing to speed up data retrieval

  • Avoid using cursors and loops whenever possible

  • Consider parameterizing queries to improve execution plan caching

  • Regularly monitor and analyze performance metrics to identify bottlenecks

Add your answer

Q217. Evaluation metrics in linear regression, Assumption of linear regression,

Ans.

Evaluation metrics and assumptions in linear regression

  • Evaluation metrics in linear regression include Mean Squared Error (MSE), Root Mean Squared Error (RMSE), R-squared, and Adjusted R-squared.

  • Assumptions of linear regression include linearity, independence, homoscedasticity, and normality of residuals.

  • Example: MSE = sum((actual - predicted)^2) / n

Add your answer

Q218. Small coding task, preferable using Streams...

Ans.

Filter out strings starting with 'a' and convert to uppercase using Streams

  • Use Stream.filter() to filter out strings starting with 'a'

  • Use Stream.map() to convert remaining strings to uppercase

  • Collect the result back into an array using Collectors.toList()

Add your answer

Q219. write sql query to get 2 nd largest salary

Ans.

Use SQL query with ORDER BY and LIMIT to get 2nd largest salary.

  • Use SELECT statement to retrieve salary column

  • Use ORDER BY clause to sort salaries in descending order

  • Use LIMIT 1,1 to get the second row

Add your answer

Q220. What is closure?

Ans.

Closure is a function that captures the environment in which it was created, allowing it to access variables from its outer scope even after the outer function has finished executing.

  • Closure allows a function to access variables from its outer scope even after the outer function has finished executing.

  • It 'closes over' the variables in its lexical scope, preserving their values.

  • Closure is commonly used in event handlers, callbacks, and asynchronous code.

  • Example: function outer...read more

Add your answer

Q221. Explain the difference between deepcopy and shallowcopy

Ans.

deepcopy creates a new object and recursively copies all objects it references, while shallowcopy creates a new object and copies only the references to the original objects.

  • deepcopy creates a new object and recursively copies all objects it references

  • shallowcopy creates a new object and copies only the references to the original objects

  • Changes made to the original object after shallow copy reflect in the copied object, but not in deepcopy

Add your answer

Q222. How to retrive dropped column's in snwofalke

Add your answer

Q223. check if strings are anagrams

Ans.

Check if strings are anagrams by sorting characters and comparing

  • Sort characters in each string and compare if they are equal

  • Use a hashmap to count characters in each string and compare the counts

  • Example: 'listen' and 'silent' are anagrams

Add your answer

Q224. Java coding on to print the nearest pair in a list

Ans.

Java code to find the nearest pair in a list

  • Iterate through the list and compare each pair of elements to find the closest pair

  • Calculate the distance between each pair using a distance formula

  • Keep track of the closest pair found so far

Add your answer

Q225. Internal working of hashmap in Java 8?

Ans.

HashMap in Java 8 uses an array of linked lists to store key-value pairs, with bucketing and resizing for efficient retrieval.

  • HashMap internally uses an array of linked lists to store key-value pairs

  • Each element in the array is a bucket, and each bucket can have multiple entries

  • Hashing is used to determine the index of the array where the key-value pair will be stored

  • In case of hash collisions, entries are stored in a linked list within the same bucket

  • HashMap dynamically resi...read more

Add your answer

Q226. Write Powershell Script

Ans.

Best practices for writing PowerShell scripts

  • Use clear and descriptive variable names

  • Comment your code to explain complex logic

  • Handle errors gracefully with try/catch blocks

  • Use functions to modularize your script

  • Avoid hardcoding values whenever possible

Add your answer

Q227. What is a functional interface in Java

Ans.

A functional interface in Java is an interface that contains only one abstract method.

  • Functional interfaces can have multiple default or static methods, but only one abstract method.

  • They are used to enable lambda expressions and method references in Java.

  • Examples of functional interfaces in Java include Runnable, Callable, and ActionListener.

Add your answer

Q228. Explain difference between comparator vs comparable

Ans.

Comparator is used to compare two objects for sorting while Comparable is implemented by a class to define natural ordering.

  • Comparator is an interface in Java used to sort objects based on custom criteria

  • Comparable is an interface in Java implemented by a class to define natural ordering

  • Comparator can be used to sort objects of different classes, while Comparable is used for objects of the same class

Add your answer

Q229. What are most used BA tools by you?

Ans.

Some of the most used BA tools by me include Microsoft Excel, Jira, and Lucidchart.

  • Microsoft Excel for data analysis and visualization

  • Jira for project management and issue tracking

  • Lucidchart for creating process flows and diagrams

Add your answer

Q230. What is D in SOLID principles.

Ans.

D stands for Dependency Inversion Principle in SOLID principles.

  • High-level modules should not depend on low-level modules. Both should depend on abstractions.

  • Abstractions should not depend on details. Details should depend on abstractions.

  • Example: Using interfaces to decouple classes and allow for easier testing and maintenance.

Add your answer

Q231. difference between generator and iterator, find 3 highest salaried employeed

Ans.

Generators are functions that return an iterator, while iterators are objects that can be iterated over. To find 3 highest salaried employees, sort the employees by salary and select the top 3.

  • Generators are functions that use yield keyword to return data one at a time, while iterators are objects that implement __iter__ and __next__ methods.

  • To find 3 highest salaried employees, sort the employees by salary in descending order and select the first 3.

  • Example: employees = [{'na...read more

Add your answer

Q232. Company policies and locations.

Ans.

Company policies and locations

  • Our company has strict policies regarding data privacy and security

  • We have multiple locations across the country and internationally

  • Each location has its own set of policies and procedures

  • Employees are expected to adhere to all company policies regardless of location

Add your answer

Q233. AWS concepts services used architecture for Kubernetes

Ans.

AWS provides various services that can be used to build a scalable and reliable architecture for Kubernetes.

  • AWS Elastic Kubernetes Service (EKS) is a managed Kubernetes service that simplifies the deployment, management, and scaling of Kubernetes clusters.

  • AWS CloudFormation can be used to automate the provisioning of infrastructure resources for Kubernetes clusters.

  • AWS Identity and Access Management (IAM) can be used to manage access control and permissions for Kubernetes res...read more

Add your answer

Q234. Difference between interface and abstract class

Ans.

Interface is a contract specifying methods that a class must implement, while abstract class can have both implemented and abstract methods.

  • Interface can only have abstract methods and cannot have any implementation, while abstract class can have both abstract and non-abstract methods.

  • A class can implement multiple interfaces but can only inherit from one abstract class.

  • Interfaces are used to achieve multiple inheritance in Java, while abstract classes are used to provide a c...read more

Add your answer

Q235. architecture of spark,airflow,bigquery,

Ans.

Spark is a distributed processing engine, Airflow is a workflow management system, and BigQuery is a fully managed data warehouse.

  • Spark is designed for big data processing and provides in-memory computation capabilities.

  • Airflow is used for orchestrating and scheduling data pipelines.

  • BigQuery is a serverless data warehouse that allows for fast and scalable analytics.

  • Spark can be integrated with Airflow to schedule and monitor Spark jobs.

  • BigQuery can be used as a data source or...read more

Add your answer

Q236. Write API automation codes Authorization and Authentication

Ans.

API automation codes for Authorization and Authentication

  • Use libraries like RestAssured or Postman for API testing

  • Implement OAuth2 for authorization and JWT for authentication

  • Write test cases to validate successful and unsuccessful authorization/authentication scenarios

Add your answer

Q237. Different elicitation techniques, stakeholder management, change management

Ans.

Elicitation techniques involve gathering requirements, stakeholder management ensures stakeholder needs are met, and change management handles changes effectively.

  • Elicitation techniques include interviews, surveys, observations, and workshops to gather requirements.

  • Stakeholder management involves identifying stakeholders, understanding their needs, and communicating with them effectively.

  • Change management ensures that changes to requirements are documented, approved, and comm...read more

Add your answer

Q238. What is scrum and user story

Ans.

Scrum is an agile framework for managing work, and user stories are short, simple descriptions of a feature told from the perspective of the person who desires the new capability.

  • Scrum is a framework that helps teams work together. It includes roles, events, artifacts, and rules.

  • User stories are short, simple descriptions of a feature told from the perspective of the end user.

  • User stories typically follow the format: As a [type of user], I want [some goal] so that [some reaso...read more

Add your answer

Q239. What is the roal you applied to?

Ans.

I applied for the role of Marketing Intern.

  • I have experience in social media marketing and content creation.

  • I am familiar with SEO and Google Analytics.

  • I have completed relevant coursework in marketing strategies.

  • I have previously interned at a marketing agency.

Add your answer

Q240. What is IP Surrogate in zscaler

Ans.

IP Surrogate in Zscaler is a feature that allows users to access the internet using a virtual IP address instead of their actual IP address.

  • IP Surrogate helps to protect user privacy by masking their real IP address.

  • It can also help bypass geo-restrictions by appearing to be located in a different region.

  • Organizations can use IP Surrogate to enhance security and anonymity for their network traffic.

  • Example: A company using Zscaler can enable IP Surrogate for employees working ...read more

Add your answer

Q241. Tell technical challanges faced

Ans.

One of the technical challenges faced was integrating legacy systems with new technology.

  • Legacy systems were not designed to work with modern technology

  • Compatibility issues arose during integration process

  • Data migration from old systems to new systems was complex

Add your answer

Q242. AWS services worked on? Features of AWS?

Ans.

Worked on AWS services like EC2, S3, RDS, Lambda, and more. Familiar with features like scalability, security, and cost-effectiveness.

  • Worked on EC2 for scalable computing power

  • Utilized S3 for secure and durable storage

  • Managed RDS for relational database management

  • Implemented Lambda for serverless computing

  • Familiar with features like scalability, security, and cost-effectiveness

Add your answer

Q243. Event handler in dotnet

Ans.

Event handler in dotnet is a function that responds to events triggered by user actions or system events.

  • Event handlers are used to handle events like button clicks, mouse movements, etc.

  • In .NET, event handlers are typically defined using delegates.

  • Example: handling a button click event in a Windows Forms application.

Add your answer

Q244. JavaScript array method

Ans.

JavaScript array method is used to manipulate arrays in JavaScript.

  • Some common array methods include push(), pop(), shift(), unshift(), splice(), slice(), concat(), and join().

  • Example: let arr = ['apple', 'banana', 'orange']; arr.push('grape'); // ['apple', 'banana', 'orange', 'grape']

  • Example: let arr = ['apple', 'banana', 'orange']; arr.pop(); // ['apple', 'banana']

Add your answer

Q245. what do springboot do?

Ans.

Spring Boot is a Java-based framework used for creating standalone, production-grade Spring-based Applications.

  • Spring Boot simplifies the process of creating Spring applications by providing a set of default configurations.

  • It allows developers to quickly set up and run standalone Spring applications.

  • Spring Boot includes embedded servers like Tomcat, Jetty, or Undertow, making it easy to deploy applications.

  • It provides production-ready features such as metrics, health checks, ...read more

Add your answer

Q246. Difference between implicit and explicit wait.

Ans.

Implicit wait is set globally for all elements, while explicit wait is applied only to specific elements.

  • Implicit wait is set using driver.manage().timeouts().implicitlyWait() method

  • Explicit wait is set using WebDriverWait class with ExpectedConditions

  • Implicit wait is applied globally to all elements, while explicit wait is applied only to specific elements

  • Implicit wait is used to wait for elements to load before performing actions, while explicit wait is used to wait for spe...read more

Add your answer

Q247. longest sub string without repeating chars from a string

Ans.

Find the longest substring without repeating characters in a given string.

  • Use a sliding window approach to track the current substring.

  • Maintain a set to check for duplicate characters.

  • Update the start and end indices of the window as you iterate through the string.

  • Keep track of the longest substring encountered so far.

Add your answer

Q248. what is seo and how it was used

Ans.

SEO stands for Search Engine Optimization, which is the practice of increasing the quantity and quality of traffic to your website through organic search engine results.

  • SEO involves optimizing your website content, meta tags, and backlinks to improve its visibility on search engines like Google.

  • Keywords play a crucial role in SEO, as they help search engines understand the relevance of your content to users' search queries.

  • Creating high-quality, relevant content that is optim...read more

Add your answer

Q249. what is fail safe feature in snowflake

Ans.

Fail-safe feature in Snowflake ensures data integrity and availability by automatically recovering from failures.

  • Automatically recovers from hardware failures

  • Maintains data integrity during system failures

  • Ensures high availability of data

  • Supports continuous data processing even during failures

Add your answer

Q250. Write Update and delete query

Ans.

Update and delete queries in SQL

  • For updating a record in a table: UPDATE table_name SET column1 = value1, column2 = value2 WHERE condition;

  • For deleting a record from a table: DELETE FROM table_name WHERE condition;

Add your answer

Q251. How to add VPC and subnet

Ans.

To add VPC and subnet, go to the VPC dashboard and click on 'Create VPC' button. Then create a subnet within the VPC.

  • Go to the VPC dashboard in the AWS console

  • Click on the 'Create VPC' button

  • Enter the details for the VPC such as name, CIDR block, etc.

  • Create a subnet within the VPC by clicking on 'Create Subnet' button

  • Enter the details for the subnet such as name, CIDR block, availability zone, etc.

Add your answer

Q252. How sprint will start and end.

Ans.

Sprint starts with sprint planning meeting and ends with sprint review and retrospective.

  • Sprint planning meeting is held at the beginning of the sprint to plan the work to be done.

  • Daily stand-up meetings are held to discuss progress and plan for the day.

  • Sprint review is held at the end of the sprint to demonstrate the work done.

  • Sprint retrospective is held to discuss what went well and what can be improved.

  • The sprint ends with a sprint demo and retrospective meeting.

Add your answer

Q253. what is html and why do we use it

Ans.

HTML is a markup language used for creating and structuring web pages.

  • HTML stands for HyperText Markup Language

  • It is used to create the structure and content of web pages

  • HTML uses tags to define elements such as headings, paragraphs, images, links, etc.

  • Example:

    This is a heading

Add your answer

Q254. What are singleton classes

Ans.

Singleton classes are classes that can only have one instance created throughout the program.

  • Singleton classes have a private constructor to prevent multiple instances.

  • They typically provide a static method to access the single instance.

  • Commonly used for logging, database connections, and configuration settings.

  • Example: Logger class in a software application.

Add your answer

Q255. Find duplicates in a string

Ans.

Use a hash set to find duplicates in a string efficiently.

  • Create a hash set to store characters as you iterate through the string.

  • If a character is already in the hash set, it is a duplicate.

  • Return the set of duplicates found.

Add your answer

Q256. React app creation to toggle dark and light mode

Ans.

Use React state to toggle between dark and light mode in a web app

  • Create a state variable to track the current mode (dark or light)

  • Use CSS classes to style the app differently based on the current mode

  • Implement a button or toggle switch to allow users to switch between modes

Add your answer

Q257. Difference between Some and sanity testing ?

Ans.

Some testing is a subset of regression testing, focusing on specific areas of the software, while sanity testing is a quick check to see if the software is ready for further testing.

  • Some testing is performed after a major change in the software to ensure that the critical functionalities are working as expected.

  • Sanity testing is a cursory check to verify if the software is stable enough for further testing.

  • Some testing is more comprehensive and detailed compared to sanity tes...read more

Add your answer

Q258. Difference between agile and safe agile ?

Ans.

Agile is a software development methodology focused on flexibility and collaboration, while SAFe Agile is a framework for scaling agile practices to larger organizations.

  • Agile is a software development methodology that emphasizes flexibility, adaptability, and collaboration within small teams.

  • SAFe Agile (Scaled Agile Framework) is a framework for applying agile practices at scale, typically in larger organizations with multiple teams.

  • Agile focuses on delivering working softwa...read more

Add your answer

Q259. Write a docker file?

Ans.

A Dockerfile is a text document that contains all the commands a user could call on the command line to assemble an image.

  • Start with a base image using the FROM keyword

  • Use the RUN keyword to execute commands in the image

  • Use the COPY or ADD keyword to add files from the host machine to the image

  • Use the CMD keyword to specify the command to run when the container starts

Add your answer

Q260. What are microservices pattern?

Ans.

Microservices pattern is an architectural style that structures an application as a collection of small, independent services.

  • Microservices are independently deployable and scalable.

  • Each microservice focuses on a specific business capability.

  • Communication between microservices is usually done through APIs.

  • Microservices can be developed using different programming languages and technologies.

  • Examples of companies using microservices include Netflix, Amazon, and Uber.

Add your answer

Q261. What is OAuth authentication?

Ans.

OAuth authentication is a secure way to grant access to resources without sharing credentials.

  • OAuth stands for Open Authorization

  • It allows a user to grant a third-party application access to their resources without sharing their credentials

  • OAuth uses tokens for authentication instead of passwords

  • It is commonly used in APIs and web applications for secure authorization

Add your answer

Q262. SCD types and what is SCD type 0

Add your answer

Q263. Count frequency of elements using java 8

Ans.

Using Java 8 streams to count frequency of elements in an array of strings

  • Use Java 8 streams to convert the array to a map with element as key and count as value

  • Use Collectors.groupingBy and Collectors.counting to achieve this

  • Example: Arrays.stream(array).collect(Collectors.groupingBy(Function.identity(), Collectors.counting()))

Add your answer

Q264. Do you know about TESTNG listeners

Ans.

TESTNG listeners are used to customize the test execution process and perform actions before or after test methods.

  • TESTNG listeners can be used to perform actions before or after a test method, class, suite, or all tests.

  • Listeners can be used to generate logs, take screenshots, or perform any custom actions during test execution.

  • Some commonly used listeners in TESTNG are IInvokedMethodListener, ITestListener, and ISuiteListener.

Add your answer

Q265. Create ci/cd pipeline

Ans.

Set up a ci/cd pipeline for automated software deployment

  • Choose a CI/CD tool like Jenkins, GitLab CI, or CircleCI

  • Define the stages of the pipeline (build, test, deploy)

  • Integrate with version control system (e.g. GitHub, Bitbucket)

  • Automate testing and code quality checks

  • Configure notifications for pipeline status updates

Add your answer

Q266. Explain the differences between lists and tuples

Ans.

Lists are mutable, ordered collections while tuples are immutable, ordered collections.

  • Lists are mutable, meaning their elements can be changed after creation, while tuples are immutable.

  • Lists are defined using square brackets [], while tuples are defined using parentheses ().

  • Lists are typically used for collections of similar items that may need to be modified, while tuples are used for fixed collections of items.

  • Example: list_example = [1, 2, 3] and tuple_example = (4, 5, 6...read more

Add your answer

Q267. What technologies have you used?

Ans.

I have experience with technologies such as Java, Kotlin, Android Studio, Firebase, and RESTful APIs.

  • Java

  • Kotlin

  • Android Studio

  • Firebase

  • RESTful APIs

Add your answer

Q268. Difference between Git fetch and git pull

Ans.

Git fetch downloads changes from the remote repository, while git pull downloads changes and merges them into the current branch.

  • Git fetch only downloads changes from the remote repository, but does not merge them into the current branch.

  • Git pull downloads changes from the remote repository and merges them into the current branch.

  • Git fetch is useful for reviewing changes before merging, while git pull is more convenient for quickly updating the local branch.

Add your answer

Q269. Tell us your process, in detail

Ans.

My process involves thorough research, analysis, collaboration, and implementation to deliver effective solutions.

  • Research: Gather relevant data and information

  • Analysis: Evaluate the data to identify patterns and insights

  • Collaboration: Work with team members and stakeholders to develop strategies

  • Implementation: Execute the plan and monitor results

  • Continuous improvement: Review outcomes and make adjustments as needed

Add your answer

Q270. What is POM and Page Objects .

Ans.

POM stands for Page Object Model, a design pattern used in test automation to create reusable and maintainable code by separating test scripts from web elements.

  • POM helps in creating a clear separation between test code and page-specific code

  • Each web page is represented as a separate class in POM

  • Page Objects contain the locators and methods to interact with the elements on that page

  • POM promotes code reusability and maintainability in test automation

Add your answer

Q271. Convert lower case string to uppercase

Ans.

Convert a lower case string to uppercase.

  • Use the toUpperCase() method in JavaScript.

  • Loop through the string and convert each character to uppercase.

  • Use the toupper() function in C++.

  • Use the upper() function in Python.

Add your answer

Q272. What iS rest api?

Ans.

REST API stands for Representational State Transfer Application Programming Interface, which is a set of rules and conventions for building and interacting with web services.

  • REST API is a type of web service that allows communication between different systems over the internet.

  • It uses standard HTTP methods like GET, POST, PUT, DELETE to perform operations on resources.

  • REST APIs typically return data in JSON or XML format.

  • They are stateless, meaning each request from a client ...read more

Add your answer

Q273. What is a functional interface?

Ans.

A functional interface is an interface that contains only one abstract method and can be used as a lambda expression.

  • Functional interfaces can have multiple default or static methods, but only one abstract method.

  • Functional interfaces are used in lambda expressions to provide implementation for the abstract method.

  • Examples of functional interfaces in Java include Runnable, Callable, and ActionListener.

Add your answer

Q274. What are the Clustered Gateway?

Ans.

Clustered Gateway is a feature in Power BI that allows multiple gateway instances to be clustered together for high availability and load balancing.

  • Clustered Gateway allows multiple gateway instances to be grouped together to provide high availability and load balancing.

  • It helps in distributing the data refresh and query processing workload across multiple gateway instances.

  • Clustered Gateway ensures that if one gateway instance fails, another instance can take over to ensure ...read more

Add your answer

Q275. What does it mean CI/CD ?

Ans.

CI/CD stands for Continuous Integration/Continuous Deployment. It is a software development practice that enables frequent and automated code integration, testing, and deployment.

  • CI/CD is a set of practices and tools that aim to automate the software development process.

  • Continuous Integration involves regularly merging code changes into a shared repository and running automated tests to detect integration issues.

  • Continuous Deployment focuses on automating the release and depl...read more

Add your answer

Q276. what are test Layers ?

Ans.

Test layers refer to the different levels of testing that are performed in software testing.

  • Test layers include unit testing, integration testing, system testing, and acceptance testing.

  • Each layer focuses on testing different aspects of the software, from individual components to the entire system.

  • Unit testing involves testing individual units or components of the software in isolation.

  • Integration testing focuses on testing the interactions between different units or componen...read more

Add your answer

Q277. AWS services used in the project?

Ans.

The project utilizes various AWS services for cloud infrastructure and automation.

  • EC2 instances for hosting applications

  • S3 for storing static files

  • RDS for database management

  • Lambda functions for serverless computing

  • CloudFormation for infrastructure as code

Add your answer

Q278. What is the meaning of dbms?

Ans.

DBMS stands for Database Management System. It is a software that allows users to interact with a database.

  • DBMS is a software that manages databases by enabling users to create, retrieve, update, and delete data.

  • It provides a way to store and organize data efficiently.

  • Examples of DBMS include MySQL, Oracle Database, and Microsoft SQL Server.

Add your answer

Q279. memory usage in spark. types of memory

Ans.

Spark uses two types of memory - storage memory and execution memory.

  • Spark uses storage memory to cache and persist data for reuse.

  • Execution memory is used for computation and shuffling data between stages.

  • Memory management in Spark is crucial for optimizing performance and avoiding out-of-memory errors.

Add your answer

Q280. Working of LRU cache

Ans.

LRU cache is a data structure that stores the most recently used items and discards the least recently used items.

  • LRU stands for Least Recently Used

  • It has a fixed size and when it reaches its limit, the least recently used item is removed to make space for a new item

  • It uses a doubly linked list and a hash map to achieve O(1) time complexity for both insertion and deletion

  • Example: A web browser caching the most recently visited web pages to improve performance

Add your answer

Q281. What is the data warehouse

Ans.

A data warehouse is a centralized repository that stores structured and unstructured data from multiple sources for analysis and reporting.

  • Data warehouses are designed for querying and analysis rather than transaction processing.

  • They often contain historical data that is used for creating reports and data analysis.

  • Data warehouses typically use ETL processes to extract, transform, and load data from various sources.

  • Examples of data warehouse tools include Amazon Redshift, Snow...read more

Add your answer

Q282. HashMap principles

Ans.

HashMap principles involve key-value pairs, hashing, and efficient retrieval.

  • HashMap stores key-value pairs using hashing for efficient retrieval.

  • Keys must be unique but values can be duplicated.

  • HashMap allows null keys and values.

  • HashMap is not synchronized, use ConcurrentHashMap for thread safety.

Add your answer

Q283. Functional and non functional difference

Ans.

Functional requirements specify what the system should do, while non-functional requirements specify how the system should perform.

  • Functional requirements focus on specific behaviors of the system, such as user interactions or data manipulation.

  • Non-functional requirements focus on qualities of the system, such as performance, scalability, security, and usability.

  • Functional requirements are typically easier to test and verify compared to non-functional requirements.

  • Examples of...read more

Add your answer

Q284. How to call service in angular

Ans.

To call a service in Angular, you need to inject the service into a component or another service and then call its methods.

  • Inject the service into the component or service constructor

  • Call the service method using the injected instance

Add your answer

Q285. balanced parenthsis using js

Ans.

JavaScript function to check if parentheses are balanced

  • Create an empty stack

  • Loop through each character in the string

  • If the character is an opening parenthesis, push it onto the stack

  • If the character is a closing parenthesis, pop the top element from the stack and check if it matches the closing parenthesis

  • If the stack is empty at the end of the loop, the parentheses are balanced

Add your answer

Q286. merge 2 lists in sorted order with O(n)

Ans.

Merge 2 sorted lists in O(n) time complexity.

  • Use two pointers to iterate through both lists simultaneously.

  • Compare elements at the pointers and add the smaller one to the result list.

  • Move the pointer of the list from which the element was added.

  • Repeat until all elements are merged in sorted order.

Add your answer

Q287. how to write custom exceptions

Ans.

Custom exceptions can be created by extending the Exception class in Java.

  • Create a new class that extends the Exception class

  • Add a constructor to the custom exception class

  • Throw the custom exception using the 'throw' keyword

Add your answer

Q288. Tell me about your framework

Ans.

My framework is a data-driven automation framework built using Selenium WebDriver and TestNG.

  • Built using Selenium WebDriver for web automation

  • Utilizes TestNG for test case management and execution

  • Follows data-driven approach for test data separation

  • Includes reporting features for test result analysis

Add your answer

Q289. How to make class mutable?

Ans.

To make a class mutable, provide public setter methods to modify its internal state.

  • Add public setter methods to modify class fields

  • Avoid using final keyword for class fields

  • Implement proper validation logic in setter methods

  • Consider thread safety when allowing mutability

Add your answer
Asked in
SSE Interview

Q290. What are structural directives

Ans.

Structural directives are Angular directives that modify the structure of the DOM by adding, removing, or manipulating elements.

  • Structural directives are prefixed with an asterisk (*) in Angular templates.

  • They are used to conditionally display or hide elements, repeat elements, or switch between views.

  • Examples include *ngIf, *ngFor, and *ngSwitch.

Add your answer

Q291. name types on collections in Kotlin

Ans.

Kotlin provides several types of collections, including arrays and lists, to store and manipulate data.

  • Kotlin arrays are fixed-size collections that store elements of the same type.

  • Kotlin lists are dynamic-size collections that can store elements of different types.

  • To create an array of strings in Kotlin, you can use the Array type.

  • Alternatively, you can use the shortcut syntax StringArray.

  • Example: val names: Array = arrayOf("John", "Jane", "Alice")

Add your answer

Q292. Sort an array in ascending order

Ans.

Sort an array of strings in ascending order

  • Use built-in sorting function like Array.sort()

  • Provide a compare function to sort based on string values

  • Use the ASCII values of characters to compare strings

Add your answer

Q293. How does ViewModel work?

Ans.

ViewModel is a class that is designed to store and manage UI-related data in a lifecycle conscious way.

  • ViewModel survives configuration changes such as screen rotations.

  • ViewModel is not destroyed when an activity is destroyed and recreated.

  • ViewModel is typically used to hold and manage data for UI components such as activities and fragments.

Add your answer

Q294. What is SOLID Principle?

Ans.

SOLID is a set of five principles in object-oriented programming to make software designs more understandable, flexible, and maintainable.

  • S - Single Responsibility Principle: A class should have only one reason to change.

  • O - Open/Closed Principle: Software entities should be open for extension but closed for modification.

  • L - Liskov Substitution Principle: Objects of a superclass should be replaceable with objects of its subclasses without affecting the functionality.

  • I - Inter...read more

Add your answer

Q295. contents of test plan and stratergy

Ans.

Test plan and strategy outline the approach for testing a software application.

  • Test plan includes objectives, scope, resources, schedule, and risks.

  • Test strategy defines testing approach, techniques, tools, and responsibilities.

  • Both documents are essential for successful testing and quality assurance.

  • Example: Test plan may include test cases, test scenarios, and test data.

  • Example: Test strategy may outline automation testing, performance testing, and regression testing.

Add your answer

Q296. Encapsulation vs Abstraction?

Ans.

Encapsulation focuses on hiding the internal state of an object, while abstraction focuses on showing only the necessary details of an object.

  • Encapsulation is the concept of bundling the data (attributes) and methods (behaviors) that operate on the data into a single unit (class).

  • Abstraction is the concept of hiding the implementation details and showing only the necessary features of an object.

  • Encapsulation helps in data hiding and protecting the internal state of an object ...read more

Add your answer

Q297. in a array move zeros to end

Ans.

Move all zeros in an array of strings to the end.

  • Iterate through the array and keep track of the count of zeros encountered.

  • Remove each zero encountered and append it to the end of the array.

  • Continue this process until all zeros are moved to the end.

Add your answer

Q298. Functional and non functional requirements

Ans.

Functional requirements specify what the system should do, while non-functional requirements specify how the system should perform.

  • Functional requirements describe the specific behavior or functions of the system.

  • Non-functional requirements describe the quality attributes of the system such as performance, security, and usability.

  • Functional requirements are typically documented in use cases or user stories.

  • Non-functional requirements are often documented in a separate section...read more

Add your answer

Q299. longest prefix in a given array of words

Ans.

Find the longest common prefix among an array of strings

  • Iterate through the characters of the first word and compare with the corresponding characters of other words

  • Stop when a mismatch is found or when reaching the end of any word

  • Return the prefix found so far

Add your answer

Q300. do you write docker files?

Ans.

Yes, I write Docker files to define the environment and dependencies for containerized applications.

  • I have experience writing Dockerfiles to define the steps needed to create a Docker image.

  • I use Dockerfiles to specify the base image, dependencies, environment variables, and commands to run.

  • I am familiar with best practices for writing efficient and secure Dockerfiles.

  • For example, I have written Dockerfiles for microservices, web applications, and databases.

Add your answer
1
2
3
4
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos

Interview Process at Insight Engineering Systems

based on 346 interviews in the last 1 year
Interview experience
4.0
Good
View more
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Interview Questions from Similar Companies

3.9
 • 468 Interview Questions
4.1
 • 247 Interview Questions
3.6
 • 215 Interview Questions
4.0
 • 165 Interview Questions
3.8
 • 140 Interview Questions
3.9
 • 135 Interview Questions
View all
Top EPAM Systems Interview Questions And Answers
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
70 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions
Get AmbitionBox app

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter