EPAM Systems
300+ Insight Engineering Systems Interview Questions and Answers
Q201. Explain SOLID principle.
SOLID is a set of five design principles to make software designs more understandable, flexible, and maintainable.
S - Single Responsibility Principle: A class should have only one reason to change.
O - Open/Closed Principle: Software entities should be open for extension but closed for modification.
L - Liskov Substitution Principle: Objects of a superclass should be replaceable with objects of its subclasses without affecting the program's correctness.
I - Interface Segregation...read more
Q202. write a program to move all the zeros in a array into end
Program to move all zeros in an array to the end
Iterate through the array and move all zeros to the end
Use two pointers approach to swap non-zero elements with zeros
Maintain a count of non-zero elements to determine the swap position
Q203. Explain your application architecture?
Our application architecture follows a microservices approach with containerization using Docker and Kubernetes.
We use microservices to break down our application into smaller, independent components.
Containerization allows us to package and deploy these components quickly and efficiently.
Docker is used to create and manage containers, while Kubernetes is used to orchestrate and manage containerized applications.
We also use RESTful APIs to facilitate communication between our...read more
Q204. Tell me about terraform
Terraform is an open-source infrastructure as code software tool created by HashiCorp.
Terraform allows users to define and provision infrastructure using a declarative configuration language.
It supports multiple cloud providers such as AWS, Azure, and Google Cloud Platform.
Terraform uses a 'plan and apply' workflow to make changes to infrastructure.
It helps in automating the process of setting up and managing infrastructure.
Terraform state file keeps track of the current stat...read more
Q205. Find the longest string with no repeating characters in the string.
Use sliding window approach to find longest substring with no repeating characters.
Use a set to keep track of characters in the current substring
Use two pointers to create a sliding window
Update the pointers and set as you iterate through the string
Q206. what epam syste, is doing they will explain you
EPAM Systems is a global provider of digital platform engineering and software development services.
EPAM Systems offers services in software development, testing, and maintenance.
They specialize in digital platform engineering, data analytics, and consulting.
EPAM works with clients in various industries such as finance, healthcare, and retail.
They focus on delivering innovative solutions and helping clients achieve their business goals.
Q207. what is Business object model ?
A business object model is a representation of the data and processes within a business domain.
It defines the structure and behavior of business entities.
It helps in understanding the relationships between different business objects.
It is often used in software development to design and implement business logic.
Examples include customer, product, order, and invoice objects.
Q208. How do you write a docker file.
A Dockerfile is a script that contains instructions to build a Docker image.
Start with a base image
Add necessary dependencies and packages
Copy application code into the image
Set environment variables
Expose necessary ports
Define the command to run the application
Build the image using 'docker build' command
Q209. Write Selenium Code for automation for Gmail ?
Automate Gmail login and send email using Selenium WebDriver
Create a new WebDriver instance
Navigate to Gmail login page
Enter username and password
Click on the login button
Compose and send an email
Q210. routing in angular
Routing in Angular allows navigation between different components in a single-page application.
Angular Router is a built-in library that provides navigation and routing functionality.
Routes are defined in the app-routing.module.ts file using RouterModule.forRoot() method.
Route parameters can be accessed using ActivatedRoute service in the component.
Lazy loading can be implemented to load modules only when needed for better performance.
Q211. Sanity and smoke testing difference
Sanity testing is a narrow regression test while smoke testing is a broad acceptance test.
Sanity testing is a quick test to check if the critical functionalities are working after a change in code.
Smoke testing is a preliminary test to check if the software is stable enough for further testing.
Sanity testing is usually performed after a build while smoke testing is performed before a build.
Sanity testing is a subset of regression testing while smoke testing is a subset of acc...read more
Q212. finally vs finalize
finally is used in exception handling to define a block of code that will always be executed, while finalize is a method in Java used for cleanup operations before an object is destroyed.
finally is used in try-catch blocks to define a block of code that will always be executed, regardless of whether an exception is thrown or not
finalize is a method in Java that is called by the garbage collector before an object is destroyed
Example: try { // code that may throw an exception }...read more
Q213. test listeners types
Test listeners types are used in software testing to monitor and respond to events during test execution.
Types of test listeners include TestNG listeners, JUnit listeners, and custom listeners
TestNG listeners include ITestListener, ISuiteListener, and IInvokedMethodListener
JUnit listeners include RunListener and TestWatcher
Custom listeners can be created to handle specific events in test execution
Q214. cucumber how to run in parallel
Cucumber can be run in parallel using tools like TestNG or JUnit with the help of plugins like Cucumber-JVM-Parallel or Cucumber-JVM-Parallel-plugin.
Use TestNG or JUnit to run Cucumber tests in parallel
Utilize plugins like Cucumber-JVM-Parallel or Cucumber-JVM-Parallel-plugin
Configure the test runner to run scenarios in parallel by specifying the number of threads
Q215. Sourcing Methods, Skills worked on.
I have experience using various sourcing methods such as job boards, social media, employee referrals, and networking events.
Utilized job boards like Indeed and LinkedIn to find qualified candidates
Leveraged social media platforms such as Facebook and Twitter for sourcing
Encouraged employee referrals to tap into existing networks
Attended networking events to connect with potential candidates
Q216. How to optimise sp
Optimizing SP involves improving performance and efficiency of stored procedures in a database.
Identify and eliminate unnecessary or redundant code
Use appropriate indexing to speed up data retrieval
Avoid using cursors and loops whenever possible
Consider parameterizing queries to improve execution plan caching
Regularly monitor and analyze performance metrics to identify bottlenecks
Q217. Evaluation metrics in linear regression, Assumption of linear regression,
Evaluation metrics and assumptions in linear regression
Evaluation metrics in linear regression include Mean Squared Error (MSE), Root Mean Squared Error (RMSE), R-squared, and Adjusted R-squared.
Assumptions of linear regression include linearity, independence, homoscedasticity, and normality of residuals.
Example: MSE = sum((actual - predicted)^2) / n
Q218. Small coding task, preferable using Streams...
Filter out strings starting with 'a' and convert to uppercase using Streams
Use Stream.filter() to filter out strings starting with 'a'
Use Stream.map() to convert remaining strings to uppercase
Collect the result back into an array using Collectors.toList()
Q219. write sql query to get 2 nd largest salary
Use SQL query with ORDER BY and LIMIT to get 2nd largest salary.
Use SELECT statement to retrieve salary column
Use ORDER BY clause to sort salaries in descending order
Use LIMIT 1,1 to get the second row
Q220. What is closure?
Closure is a function that captures the environment in which it was created, allowing it to access variables from its outer scope even after the outer function has finished executing.
Closure allows a function to access variables from its outer scope even after the outer function has finished executing.
It 'closes over' the variables in its lexical scope, preserving their values.
Closure is commonly used in event handlers, callbacks, and asynchronous code.
Example: function outer...read more
Q221. Explain the difference between deepcopy and shallowcopy
deepcopy creates a new object and recursively copies all objects it references, while shallowcopy creates a new object and copies only the references to the original objects.
deepcopy creates a new object and recursively copies all objects it references
shallowcopy creates a new object and copies only the references to the original objects
Changes made to the original object after shallow copy reflect in the copied object, but not in deepcopy
Q222. How to retrive dropped column's in snwofalke
Q223. check if strings are anagrams
Check if strings are anagrams by sorting characters and comparing
Sort characters in each string and compare if they are equal
Use a hashmap to count characters in each string and compare the counts
Example: 'listen' and 'silent' are anagrams
Q224. Java coding on to print the nearest pair in a list
Java code to find the nearest pair in a list
Iterate through the list and compare each pair of elements to find the closest pair
Calculate the distance between each pair using a distance formula
Keep track of the closest pair found so far
Q225. Internal working of hashmap in Java 8?
HashMap in Java 8 uses an array of linked lists to store key-value pairs, with bucketing and resizing for efficient retrieval.
HashMap internally uses an array of linked lists to store key-value pairs
Each element in the array is a bucket, and each bucket can have multiple entries
Hashing is used to determine the index of the array where the key-value pair will be stored
In case of hash collisions, entries are stored in a linked list within the same bucket
HashMap dynamically resi...read more
Q226. Write Powershell Script
Best practices for writing PowerShell scripts
Use clear and descriptive variable names
Comment your code to explain complex logic
Handle errors gracefully with try/catch blocks
Use functions to modularize your script
Avoid hardcoding values whenever possible
Q227. What is a functional interface in Java
A functional interface in Java is an interface that contains only one abstract method.
Functional interfaces can have multiple default or static methods, but only one abstract method.
They are used to enable lambda expressions and method references in Java.
Examples of functional interfaces in Java include Runnable, Callable, and ActionListener.
Q228. Explain difference between comparator vs comparable
Comparator is used to compare two objects for sorting while Comparable is implemented by a class to define natural ordering.
Comparator is an interface in Java used to sort objects based on custom criteria
Comparable is an interface in Java implemented by a class to define natural ordering
Comparator can be used to sort objects of different classes, while Comparable is used for objects of the same class
Q229. What are most used BA tools by you?
Some of the most used BA tools by me include Microsoft Excel, Jira, and Lucidchart.
Microsoft Excel for data analysis and visualization
Jira for project management and issue tracking
Lucidchart for creating process flows and diagrams
Q230. What is D in SOLID principles.
D stands for Dependency Inversion Principle in SOLID principles.
High-level modules should not depend on low-level modules. Both should depend on abstractions.
Abstractions should not depend on details. Details should depend on abstractions.
Example: Using interfaces to decouple classes and allow for easier testing and maintenance.
Q231. difference between generator and iterator, find 3 highest salaried employeed
Generators are functions that return an iterator, while iterators are objects that can be iterated over. To find 3 highest salaried employees, sort the employees by salary and select the top 3.
Generators are functions that use yield keyword to return data one at a time, while iterators are objects that implement __iter__ and __next__ methods.
To find 3 highest salaried employees, sort the employees by salary in descending order and select the first 3.
Example: employees = [{'na...read more
Q232. Company policies and locations.
Company policies and locations
Our company has strict policies regarding data privacy and security
We have multiple locations across the country and internationally
Each location has its own set of policies and procedures
Employees are expected to adhere to all company policies regardless of location
Q233. AWS concepts services used architecture for Kubernetes
AWS provides various services that can be used to build a scalable and reliable architecture for Kubernetes.
AWS Elastic Kubernetes Service (EKS) is a managed Kubernetes service that simplifies the deployment, management, and scaling of Kubernetes clusters.
AWS CloudFormation can be used to automate the provisioning of infrastructure resources for Kubernetes clusters.
AWS Identity and Access Management (IAM) can be used to manage access control and permissions for Kubernetes res...read more
Q234. Difference between interface and abstract class
Interface is a contract specifying methods that a class must implement, while abstract class can have both implemented and abstract methods.
Interface can only have abstract methods and cannot have any implementation, while abstract class can have both abstract and non-abstract methods.
A class can implement multiple interfaces but can only inherit from one abstract class.
Interfaces are used to achieve multiple inheritance in Java, while abstract classes are used to provide a c...read more
Q235. architecture of spark,airflow,bigquery,
Spark is a distributed processing engine, Airflow is a workflow management system, and BigQuery is a fully managed data warehouse.
Spark is designed for big data processing and provides in-memory computation capabilities.
Airflow is used for orchestrating and scheduling data pipelines.
BigQuery is a serverless data warehouse that allows for fast and scalable analytics.
Spark can be integrated with Airflow to schedule and monitor Spark jobs.
BigQuery can be used as a data source or...read more
Q236. Write API automation codes Authorization and Authentication
API automation codes for Authorization and Authentication
Use libraries like RestAssured or Postman for API testing
Implement OAuth2 for authorization and JWT for authentication
Write test cases to validate successful and unsuccessful authorization/authentication scenarios
Q237. Different elicitation techniques, stakeholder management, change management
Elicitation techniques involve gathering requirements, stakeholder management ensures stakeholder needs are met, and change management handles changes effectively.
Elicitation techniques include interviews, surveys, observations, and workshops to gather requirements.
Stakeholder management involves identifying stakeholders, understanding their needs, and communicating with them effectively.
Change management ensures that changes to requirements are documented, approved, and comm...read more
Q238. What is scrum and user story
Scrum is an agile framework for managing work, and user stories are short, simple descriptions of a feature told from the perspective of the person who desires the new capability.
Scrum is a framework that helps teams work together. It includes roles, events, artifacts, and rules.
User stories are short, simple descriptions of a feature told from the perspective of the end user.
User stories typically follow the format: As a [type of user], I want [some goal] so that [some reaso...read more
Q239. What is the roal you applied to?
I applied for the role of Marketing Intern.
I have experience in social media marketing and content creation.
I am familiar with SEO and Google Analytics.
I have completed relevant coursework in marketing strategies.
I have previously interned at a marketing agency.
Q240. What is IP Surrogate in zscaler
IP Surrogate in Zscaler is a feature that allows users to access the internet using a virtual IP address instead of their actual IP address.
IP Surrogate helps to protect user privacy by masking their real IP address.
It can also help bypass geo-restrictions by appearing to be located in a different region.
Organizations can use IP Surrogate to enhance security and anonymity for their network traffic.
Example: A company using Zscaler can enable IP Surrogate for employees working ...read more
Q241. Tell technical challanges faced
One of the technical challenges faced was integrating legacy systems with new technology.
Legacy systems were not designed to work with modern technology
Compatibility issues arose during integration process
Data migration from old systems to new systems was complex
Q242. AWS services worked on? Features of AWS?
Worked on AWS services like EC2, S3, RDS, Lambda, and more. Familiar with features like scalability, security, and cost-effectiveness.
Worked on EC2 for scalable computing power
Utilized S3 for secure and durable storage
Managed RDS for relational database management
Implemented Lambda for serverless computing
Familiar with features like scalability, security, and cost-effectiveness
Q243. Event handler in dotnet
Event handler in dotnet is a function that responds to events triggered by user actions or system events.
Event handlers are used to handle events like button clicks, mouse movements, etc.
In .NET, event handlers are typically defined using delegates.
Example: handling a button click event in a Windows Forms application.
Q244. JavaScript array method
JavaScript array method is used to manipulate arrays in JavaScript.
Some common array methods include push(), pop(), shift(), unshift(), splice(), slice(), concat(), and join().
Example: let arr = ['apple', 'banana', 'orange']; arr.push('grape'); // ['apple', 'banana', 'orange', 'grape']
Example: let arr = ['apple', 'banana', 'orange']; arr.pop(); // ['apple', 'banana']
Q245. what do springboot do?
Spring Boot is a Java-based framework used for creating standalone, production-grade Spring-based Applications.
Spring Boot simplifies the process of creating Spring applications by providing a set of default configurations.
It allows developers to quickly set up and run standalone Spring applications.
Spring Boot includes embedded servers like Tomcat, Jetty, or Undertow, making it easy to deploy applications.
It provides production-ready features such as metrics, health checks, ...read more
Q246. Difference between implicit and explicit wait.
Implicit wait is set globally for all elements, while explicit wait is applied only to specific elements.
Implicit wait is set using driver.manage().timeouts().implicitlyWait() method
Explicit wait is set using WebDriverWait class with ExpectedConditions
Implicit wait is applied globally to all elements, while explicit wait is applied only to specific elements
Implicit wait is used to wait for elements to load before performing actions, while explicit wait is used to wait for spe...read more
Q247. longest sub string without repeating chars from a string
Find the longest substring without repeating characters in a given string.
Use a sliding window approach to track the current substring.
Maintain a set to check for duplicate characters.
Update the start and end indices of the window as you iterate through the string.
Keep track of the longest substring encountered so far.
Q248. what is seo and how it was used
SEO stands for Search Engine Optimization, which is the practice of increasing the quantity and quality of traffic to your website through organic search engine results.
SEO involves optimizing your website content, meta tags, and backlinks to improve its visibility on search engines like Google.
Keywords play a crucial role in SEO, as they help search engines understand the relevance of your content to users' search queries.
Creating high-quality, relevant content that is optim...read more
Q249. what is fail safe feature in snowflake
Fail-safe feature in Snowflake ensures data integrity and availability by automatically recovering from failures.
Automatically recovers from hardware failures
Maintains data integrity during system failures
Ensures high availability of data
Supports continuous data processing even during failures
Q250. Write Update and delete query
Update and delete queries in SQL
For updating a record in a table: UPDATE table_name SET column1 = value1, column2 = value2 WHERE condition;
For deleting a record from a table: DELETE FROM table_name WHERE condition;
Q251. How to add VPC and subnet
To add VPC and subnet, go to the VPC dashboard and click on 'Create VPC' button. Then create a subnet within the VPC.
Go to the VPC dashboard in the AWS console
Click on the 'Create VPC' button
Enter the details for the VPC such as name, CIDR block, etc.
Create a subnet within the VPC by clicking on 'Create Subnet' button
Enter the details for the subnet such as name, CIDR block, availability zone, etc.
Q252. How sprint will start and end.
Sprint starts with sprint planning meeting and ends with sprint review and retrospective.
Sprint planning meeting is held at the beginning of the sprint to plan the work to be done.
Daily stand-up meetings are held to discuss progress and plan for the day.
Sprint review is held at the end of the sprint to demonstrate the work done.
Sprint retrospective is held to discuss what went well and what can be improved.
The sprint ends with a sprint demo and retrospective meeting.
Q253. what is html and why do we use it
HTML is a markup language used for creating and structuring web pages.
HTML stands for HyperText Markup Language
It is used to create the structure and content of web pages
HTML uses tags to define elements such as headings, paragraphs, images, links, etc.
Example:
This is a heading
Q254. What are singleton classes
Singleton classes are classes that can only have one instance created throughout the program.
Singleton classes have a private constructor to prevent multiple instances.
They typically provide a static method to access the single instance.
Commonly used for logging, database connections, and configuration settings.
Example: Logger class in a software application.
Q255. Find duplicates in a string
Use a hash set to find duplicates in a string efficiently.
Create a hash set to store characters as you iterate through the string.
If a character is already in the hash set, it is a duplicate.
Return the set of duplicates found.
Q256. React app creation to toggle dark and light mode
Use React state to toggle between dark and light mode in a web app
Create a state variable to track the current mode (dark or light)
Use CSS classes to style the app differently based on the current mode
Implement a button or toggle switch to allow users to switch between modes
Q257. Difference between Some and sanity testing ?
Some testing is a subset of regression testing, focusing on specific areas of the software, while sanity testing is a quick check to see if the software is ready for further testing.
Some testing is performed after a major change in the software to ensure that the critical functionalities are working as expected.
Sanity testing is a cursory check to verify if the software is stable enough for further testing.
Some testing is more comprehensive and detailed compared to sanity tes...read more
Q258. Difference between agile and safe agile ?
Agile is a software development methodology focused on flexibility and collaboration, while SAFe Agile is a framework for scaling agile practices to larger organizations.
Agile is a software development methodology that emphasizes flexibility, adaptability, and collaboration within small teams.
SAFe Agile (Scaled Agile Framework) is a framework for applying agile practices at scale, typically in larger organizations with multiple teams.
Agile focuses on delivering working softwa...read more
Q259. Write a docker file?
A Dockerfile is a text document that contains all the commands a user could call on the command line to assemble an image.
Start with a base image using the FROM keyword
Use the RUN keyword to execute commands in the image
Use the COPY or ADD keyword to add files from the host machine to the image
Use the CMD keyword to specify the command to run when the container starts
Q260. What are microservices pattern?
Microservices pattern is an architectural style that structures an application as a collection of small, independent services.
Microservices are independently deployable and scalable.
Each microservice focuses on a specific business capability.
Communication between microservices is usually done through APIs.
Microservices can be developed using different programming languages and technologies.
Examples of companies using microservices include Netflix, Amazon, and Uber.
Q261. What is OAuth authentication?
OAuth authentication is a secure way to grant access to resources without sharing credentials.
OAuth stands for Open Authorization
It allows a user to grant a third-party application access to their resources without sharing their credentials
OAuth uses tokens for authentication instead of passwords
It is commonly used in APIs and web applications for secure authorization
Q262. SCD types and what is SCD type 0
Q263. Count frequency of elements using java 8
Using Java 8 streams to count frequency of elements in an array of strings
Use Java 8 streams to convert the array to a map with element as key and count as value
Use Collectors.groupingBy and Collectors.counting to achieve this
Example: Arrays.stream(array).collect(Collectors.groupingBy(Function.identity(), Collectors.counting()))
Q264. Do you know about TESTNG listeners
TESTNG listeners are used to customize the test execution process and perform actions before or after test methods.
TESTNG listeners can be used to perform actions before or after a test method, class, suite, or all tests.
Listeners can be used to generate logs, take screenshots, or perform any custom actions during test execution.
Some commonly used listeners in TESTNG are IInvokedMethodListener, ITestListener, and ISuiteListener.
Q265. Create ci/cd pipeline
Set up a ci/cd pipeline for automated software deployment
Choose a CI/CD tool like Jenkins, GitLab CI, or CircleCI
Define the stages of the pipeline (build, test, deploy)
Integrate with version control system (e.g. GitHub, Bitbucket)
Automate testing and code quality checks
Configure notifications for pipeline status updates
Q266. Explain the differences between lists and tuples
Lists are mutable, ordered collections while tuples are immutable, ordered collections.
Lists are mutable, meaning their elements can be changed after creation, while tuples are immutable.
Lists are defined using square brackets [], while tuples are defined using parentheses ().
Lists are typically used for collections of similar items that may need to be modified, while tuples are used for fixed collections of items.
Example: list_example = [1, 2, 3] and tuple_example = (4, 5, 6...read more
Q267. What technologies have you used?
I have experience with technologies such as Java, Kotlin, Android Studio, Firebase, and RESTful APIs.
Java
Kotlin
Android Studio
Firebase
RESTful APIs
Q268. Difference between Git fetch and git pull
Git fetch downloads changes from the remote repository, while git pull downloads changes and merges them into the current branch.
Git fetch only downloads changes from the remote repository, but does not merge them into the current branch.
Git pull downloads changes from the remote repository and merges them into the current branch.
Git fetch is useful for reviewing changes before merging, while git pull is more convenient for quickly updating the local branch.
Q269. Tell us your process, in detail
My process involves thorough research, analysis, collaboration, and implementation to deliver effective solutions.
Research: Gather relevant data and information
Analysis: Evaluate the data to identify patterns and insights
Collaboration: Work with team members and stakeholders to develop strategies
Implementation: Execute the plan and monitor results
Continuous improvement: Review outcomes and make adjustments as needed
Q270. What is POM and Page Objects .
POM stands for Page Object Model, a design pattern used in test automation to create reusable and maintainable code by separating test scripts from web elements.
POM helps in creating a clear separation between test code and page-specific code
Each web page is represented as a separate class in POM
Page Objects contain the locators and methods to interact with the elements on that page
POM promotes code reusability and maintainability in test automation
Q271. Convert lower case string to uppercase
Convert a lower case string to uppercase.
Use the toUpperCase() method in JavaScript.
Loop through the string and convert each character to uppercase.
Use the toupper() function in C++.
Use the upper() function in Python.
Q272. What iS rest api?
REST API stands for Representational State Transfer Application Programming Interface, which is a set of rules and conventions for building and interacting with web services.
REST API is a type of web service that allows communication between different systems over the internet.
It uses standard HTTP methods like GET, POST, PUT, DELETE to perform operations on resources.
REST APIs typically return data in JSON or XML format.
They are stateless, meaning each request from a client ...read more
Q273. What is a functional interface?
A functional interface is an interface that contains only one abstract method and can be used as a lambda expression.
Functional interfaces can have multiple default or static methods, but only one abstract method.
Functional interfaces are used in lambda expressions to provide implementation for the abstract method.
Examples of functional interfaces in Java include Runnable, Callable, and ActionListener.
Q274. What are the Clustered Gateway?
Clustered Gateway is a feature in Power BI that allows multiple gateway instances to be clustered together for high availability and load balancing.
Clustered Gateway allows multiple gateway instances to be grouped together to provide high availability and load balancing.
It helps in distributing the data refresh and query processing workload across multiple gateway instances.
Clustered Gateway ensures that if one gateway instance fails, another instance can take over to ensure ...read more
Q275. What does it mean CI/CD ?
CI/CD stands for Continuous Integration/Continuous Deployment. It is a software development practice that enables frequent and automated code integration, testing, and deployment.
CI/CD is a set of practices and tools that aim to automate the software development process.
Continuous Integration involves regularly merging code changes into a shared repository and running automated tests to detect integration issues.
Continuous Deployment focuses on automating the release and depl...read more
Q276. what are test Layers ?
Test layers refer to the different levels of testing that are performed in software testing.
Test layers include unit testing, integration testing, system testing, and acceptance testing.
Each layer focuses on testing different aspects of the software, from individual components to the entire system.
Unit testing involves testing individual units or components of the software in isolation.
Integration testing focuses on testing the interactions between different units or componen...read more
Q277. AWS services used in the project?
The project utilizes various AWS services for cloud infrastructure and automation.
EC2 instances for hosting applications
S3 for storing static files
RDS for database management
Lambda functions for serverless computing
CloudFormation for infrastructure as code
Q278. What is the meaning of dbms?
DBMS stands for Database Management System. It is a software that allows users to interact with a database.
DBMS is a software that manages databases by enabling users to create, retrieve, update, and delete data.
It provides a way to store and organize data efficiently.
Examples of DBMS include MySQL, Oracle Database, and Microsoft SQL Server.
Q279. memory usage in spark. types of memory
Spark uses two types of memory - storage memory and execution memory.
Spark uses storage memory to cache and persist data for reuse.
Execution memory is used for computation and shuffling data between stages.
Memory management in Spark is crucial for optimizing performance and avoiding out-of-memory errors.
Q280. Working of LRU cache
LRU cache is a data structure that stores the most recently used items and discards the least recently used items.
LRU stands for Least Recently Used
It has a fixed size and when it reaches its limit, the least recently used item is removed to make space for a new item
It uses a doubly linked list and a hash map to achieve O(1) time complexity for both insertion and deletion
Example: A web browser caching the most recently visited web pages to improve performance
Q281. What is the data warehouse
A data warehouse is a centralized repository that stores structured and unstructured data from multiple sources for analysis and reporting.
Data warehouses are designed for querying and analysis rather than transaction processing.
They often contain historical data that is used for creating reports and data analysis.
Data warehouses typically use ETL processes to extract, transform, and load data from various sources.
Examples of data warehouse tools include Amazon Redshift, Snow...read more
Q282. HashMap principles
HashMap principles involve key-value pairs, hashing, and efficient retrieval.
HashMap stores key-value pairs using hashing for efficient retrieval.
Keys must be unique but values can be duplicated.
HashMap allows null keys and values.
HashMap is not synchronized, use ConcurrentHashMap for thread safety.
Q283. Functional and non functional difference
Functional requirements specify what the system should do, while non-functional requirements specify how the system should perform.
Functional requirements focus on specific behaviors of the system, such as user interactions or data manipulation.
Non-functional requirements focus on qualities of the system, such as performance, scalability, security, and usability.
Functional requirements are typically easier to test and verify compared to non-functional requirements.
Examples of...read more
Q284. How to call service in angular
To call a service in Angular, you need to inject the service into a component or another service and then call its methods.
Inject the service into the component or service constructor
Call the service method using the injected instance
Q285. balanced parenthsis using js
JavaScript function to check if parentheses are balanced
Create an empty stack
Loop through each character in the string
If the character is an opening parenthesis, push it onto the stack
If the character is a closing parenthesis, pop the top element from the stack and check if it matches the closing parenthesis
If the stack is empty at the end of the loop, the parentheses are balanced
Q286. merge 2 lists in sorted order with O(n)
Merge 2 sorted lists in O(n) time complexity.
Use two pointers to iterate through both lists simultaneously.
Compare elements at the pointers and add the smaller one to the result list.
Move the pointer of the list from which the element was added.
Repeat until all elements are merged in sorted order.
Q287. how to write custom exceptions
Custom exceptions can be created by extending the Exception class in Java.
Create a new class that extends the Exception class
Add a constructor to the custom exception class
Throw the custom exception using the 'throw' keyword
Q288. Tell me about your framework
My framework is a data-driven automation framework built using Selenium WebDriver and TestNG.
Built using Selenium WebDriver for web automation
Utilizes TestNG for test case management and execution
Follows data-driven approach for test data separation
Includes reporting features for test result analysis
Q289. How to make class mutable?
To make a class mutable, provide public setter methods to modify its internal state.
Add public setter methods to modify class fields
Avoid using final keyword for class fields
Implement proper validation logic in setter methods
Consider thread safety when allowing mutability
Q290. What are structural directives
Structural directives are Angular directives that modify the structure of the DOM by adding, removing, or manipulating elements.
Structural directives are prefixed with an asterisk (*) in Angular templates.
They are used to conditionally display or hide elements, repeat elements, or switch between views.
Examples include *ngIf, *ngFor, and *ngSwitch.
Q291. name types on collections in Kotlin
Kotlin provides several types of collections, including arrays and lists, to store and manipulate data.
Kotlin arrays are fixed-size collections that store elements of the same type.
Kotlin lists are dynamic-size collections that can store elements of different types.
To create an array of strings in Kotlin, you can use the Array
type. Alternatively, you can use the shortcut syntax StringArray.
Example: val names: Array
= arrayOf("John", "Jane", "Alice")
Q292. Sort an array in ascending order
Sort an array of strings in ascending order
Use built-in sorting function like Array.sort()
Provide a compare function to sort based on string values
Use the ASCII values of characters to compare strings
Q293. How does ViewModel work?
ViewModel is a class that is designed to store and manage UI-related data in a lifecycle conscious way.
ViewModel survives configuration changes such as screen rotations.
ViewModel is not destroyed when an activity is destroyed and recreated.
ViewModel is typically used to hold and manage data for UI components such as activities and fragments.
Q294. What is SOLID Principle?
SOLID is a set of five principles in object-oriented programming to make software designs more understandable, flexible, and maintainable.
S - Single Responsibility Principle: A class should have only one reason to change.
O - Open/Closed Principle: Software entities should be open for extension but closed for modification.
L - Liskov Substitution Principle: Objects of a superclass should be replaceable with objects of its subclasses without affecting the functionality.
I - Inter...read more
Q295. contents of test plan and stratergy
Test plan and strategy outline the approach for testing a software application.
Test plan includes objectives, scope, resources, schedule, and risks.
Test strategy defines testing approach, techniques, tools, and responsibilities.
Both documents are essential for successful testing and quality assurance.
Example: Test plan may include test cases, test scenarios, and test data.
Example: Test strategy may outline automation testing, performance testing, and regression testing.
Q296. Encapsulation vs Abstraction?
Encapsulation focuses on hiding the internal state of an object, while abstraction focuses on showing only the necessary details of an object.
Encapsulation is the concept of bundling the data (attributes) and methods (behaviors) that operate on the data into a single unit (class).
Abstraction is the concept of hiding the implementation details and showing only the necessary features of an object.
Encapsulation helps in data hiding and protecting the internal state of an object ...read more
Q297. in a array move zeros to end
Move all zeros in an array of strings to the end.
Iterate through the array and keep track of the count of zeros encountered.
Remove each zero encountered and append it to the end of the array.
Continue this process until all zeros are moved to the end.
Q298. Functional and non functional requirements
Functional requirements specify what the system should do, while non-functional requirements specify how the system should perform.
Functional requirements describe the specific behavior or functions of the system.
Non-functional requirements describe the quality attributes of the system such as performance, security, and usability.
Functional requirements are typically documented in use cases or user stories.
Non-functional requirements are often documented in a separate section...read more
Q299. longest prefix in a given array of words
Find the longest common prefix among an array of strings
Iterate through the characters of the first word and compare with the corresponding characters of other words
Stop when a mismatch is found or when reaching the end of any word
Return the prefix found so far
Q300. do you write docker files?
Yes, I write Docker files to define the environment and dependencies for containerized applications.
I have experience writing Dockerfiles to define the steps needed to create a Docker image.
I use Dockerfiles to specify the base image, dependencies, environment variables, and commands to run.
I am familiar with best practices for writing efficient and secure Dockerfiles.
For example, I have written Dockerfiles for microservices, web applications, and databases.
Top HR Questions asked in Insight Engineering Systems
Interview Process at Insight Engineering Systems
Top Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month