Fujitsu
100+ Piktorlabs Interview Questions and Answers
Q1. Reverse Linked List Problem Statement
Given a singly linked list of integers, return the head of the reversed linked list.
Example:
Initial linked list: 1 -> 2 -> 3 -> 4 -> NULL
Reversed linked list: 4 -> 3 -> 2...read more
Reverse a singly linked list of integers and return the head of the reversed linked list.
Iterate through the linked list and reverse the pointers to point to the previous node instead of the next node.
Use three pointers to keep track of the current, previous, and next nodes while reversing the linked list.
Update the head of the reversed linked list as the last node encountered during the reversal process.
JVM allocates 5 types of memory areas: Heap, Stack, Method Area, PC Register, and Native Method Stack.
Heap is used for storing objects and is shared among all threads.
Stack is used for storing method calls and local variables, each thread has its own stack.
Method Area stores class structures, method data, and static variables.
PC Register stores the address of the currently executing instruction.
Native Method Stack is used for native method calls.
Spring Boot offers basic annotations like @SpringBootApplication, @RestController, @Autowired, @RequestMapping, @ComponentScan.
@SpringBootApplication - Used to mark the main class of a Spring Boot application.
@RestController - Used to define RESTful web services.
@Autowired - Used for automatic dependency injection.
@RequestMapping - Used to map web requests to specific handler methods.
@ComponentScan - Used to specify the base packages to scan for Spring components.
ArrayList is non-synchronized and Vector is synchronized in Java.
ArrayList is not synchronized, while Vector is synchronized.
ArrayList is faster than Vector as it is not synchronized.
Vector is thread-safe, while ArrayList is not.
Example: ArrayList<String> list = new ArrayList<>(); Vector<String> vector = new Vector<>();
The starter dependency of the Spring Boot module is spring-boot-starter-parent.
The starter dependency provides a set of default configurations and dependencies for Spring Boot applications.
It helps in reducing the amount of boilerplate code needed to set up a Spring Boot project.
The spring-boot-starter-parent is typically used as the parent project in a Spring Boot application's pom.xml file.
Autowiring in Spring Boot is a feature that allows Spring to automatically inject dependencies into a Spring bean.
Autowiring eliminates the need for explicit bean wiring in the Spring configuration file.
There are different modes of autowiring in Spring Boot: 'byName', 'byType', 'constructor', 'autodetect', and 'no'.
For example, 'byName' autowiring matches and injects a bean based on the name of the bean property.
Different types of waits in Selenium WebDriver include Implicit Wait, Explicit Wait, and Fluent Wait.
Implicit Wait: Waits for a certain amount of time before throwing a NoSuchElementException.
Explicit Wait: Waits for a certain condition to occur before proceeding further in the code.
Fluent Wait: Waits for a condition to be true with a specified polling frequency and timeout.
HashSet is a collection of unique elements, while HashMap is a key-value pair collection.
HashSet does not allow duplicate elements, while HashMap allows duplicate values but not duplicate keys.
HashSet uses a hash table to store elements, while HashMap uses key-value pairs to store data.
Example: HashSet<String> set = new HashSet<>(); HashMap<String, Integer> map = new HashMap<>();
The @SpringBootApplication annotation is used to mark the main class of a Spring Boot application.
Combines @Configuration, @EnableAutoConfiguration, and @ComponentScan annotations
Enables the application to start with a main method
Automatically scans for Spring components in the package and sub-packages
Java code is compiled into bytecode which can run on any platform with JVM, making it platform independent. JVM itself is platform dependent as it needs to be installed on each platform to execute the bytecode.
Java code is compiled into bytecode, which is a platform-independent intermediate code
JVM interprets and executes the bytecode on different platforms
JVM needs to be installed on each platform to run Java programs
This allows Java programs to be written once and run anywh...read more
Q11. Explain final, finally and finalize in Java? Where do we use final? Is String class final? In what scenario does finally not get executed?
Explanation of final, finally and finalize in Java with examples
final is a keyword used to declare a constant value or to prevent method overriding or class inheritance
finally is a block of code that executes after try-catch block, regardless of exception occurrence
finalize is a method that gets called by garbage collector before destroying an object
final is used for declaring constant values, method parameters, and local variables
String class is final in Java, which means it...read more
SOLID principles are a set of five design principles in object-oriented programming to make software designs more understandable, flexible, and maintainable.
S - Single Responsibility Principle: A class should have only one reason to change.
O - Open/Closed Principle: Software entities should be open for extension but closed for modification.
L - Liskov Substitution Principle: Objects of a superclass should be replaceable with objects of its subclasses without affecting the corr...read more
ConcurrentHashMap is a thread-safe implementation of the Map interface in Java.
ConcurrentHashMap allows multiple threads to read and write to the map concurrently without causing any inconsistencies.
It achieves thread-safety by dividing the map into segments, each of which can be locked independently.
ConcurrentHashMap uses a technique called lock striping to minimize contention and improve performance.
It does not throw ConcurrentModificationException during iteration as it wo...read more
Optional class in Java provides a way to handle null values more effectively.
Prevents NullPointerException by explicitly checking for null values
Encourages developers to handle null values properly
Improves code readability and maintainability
Helps avoid unnecessary null checks and nested if statements
setMaxResults() limits the number of results returned by a query, while setFetchSize() determines the number of rows fetched at a time from the database.
setMaxResults() is used to limit the number of results returned by a query.
setFetchSize() determines the number of rows fetched at a time from the database.
setMaxResults() is typically used for pagination purposes, while setFetchSize() can improve performance by reducing the number of round trips to the database.
Example: setM...read more
Q16. Create a regular expression accepting 10-digit numeric characters starting with 1, 2, or 3.
Regular expression for 10-digit numeric characters starting with 1, 2, or 3.
Use the pattern ^[1-3]\d{9}$ to match the criteria
The ^ symbol denotes the start of the string
The [1-3] specifies that the first digit must be 1, 2, or 3
\d{9} matches exactly 9 numeric digits
$ indicates the end of the string
Data encapsulation is the concept of bundling data with the methods that operate on that data within a class.
Data encapsulation restricts access to certain components of an object, protecting the data from external interference.
It allows for better control over the data by hiding the implementation details and only exposing necessary information through methods.
Encapsulation helps in achieving data abstraction, where the internal representation of an object is hidden from the...read more
Q18. What are the different layers of Springboot application? What are the webservers that comes with Springboot? What is the default webserver? How to change the default webserver? What are the different ways to co...
read moreThe different layers of Springboot application, webservers that come with Springboot, default webserver, changing default webserver, and configuring port on spring-boot.
The different layers of Springboot application are presentation layer, service layer, business layer, and data access layer.
The webservers that come with Springboot are Tomcat, Jetty, and Undertow.
The default webserver is Tomcat.
To change the default webserver, exclude the default starter and add the desired s...read more
Q19. what is a join in SQL? What are the types of joins?
A join in SQL is used to combine rows from two or more tables based on a related column between them.
Types of joins include INNER JOIN, LEFT JOIN, RIGHT JOIN, and FULL JOIN.
INNER JOIN returns rows when there is at least one match in both tables.
LEFT JOIN returns all rows from the left table and the matched rows from the right table.
RIGHT JOIN returns all rows from the right table and the matched rows from the left table.
FULL JOIN returns rows when there is a match in one of t...read more
Abstract class can have method implementations, while interface cannot.
Abstract class can have method implementations, while interface cannot
Abstract class can have constructors, while interface cannot
A class can implement multiple interfaces, but can only inherit from one abstract class
No, static methods cannot be overridden in Java.
Static methods belong to the class itself, not to any specific instance of the class.
Subclasses can define static methods with the same signature as the parent class, but it is not considered overriding.
Example: Parent class has a static method 'display()', and subclass also has a static method 'display()'. These are two separate methods, not overriding each other.
Q22. what are the different types of references in Java? When do we use them?
Java has four types of references: strong, weak, soft, and phantom.
Strong references are the default and are used to refer to objects that are still in use.
Weak references are used to refer to objects that can be garbage collected when there are no strong references to them.
Soft references are used to refer to objects that should be garbage collected only when memory is low.
Phantom references are used to track when an object is about to be garbage collected.
References are use...read more
Abstraction in OOP is the concept of hiding complex implementation details and showing only the necessary features of an object.
Abstraction allows developers to focus on what an object does rather than how it does it
It helps in reducing complexity and improving code reusability
Example: In a car object, we only need to know how to drive it (interface) without worrying about the internal engine workings (implementation)
Standard Java pre-defined functional interfaces include Function, Consumer, Predicate, Supplier, etc.
Function: Represents a function that accepts one argument and produces a result. Example: Function<Integer, String>
Consumer: Represents an operation that accepts a single input argument and returns no result. Example: Consumer<String>
Predicate: Represents a predicate (boolean-valued function) of one argument. Example: Predicate<Integer>
Supplier: Represents a supplier of result...read more
The @RestController annotation in Spring Boot is used to define a class as a RESTful controller.
Used to create RESTful web services in Spring Boot
Combines @Controller and @ResponseBody annotations
Eliminates the need to annotate each method with @ResponseBody
Q26. what is the difference between rollout and implementation project?
Rollout is a project to implement a solution in multiple locations, while implementation is a project to implement a solution in a single location.
Rollout involves implementing a solution in multiple locations, while implementation is focused on a single location.
Rollout projects are typically larger in scope and require more resources than implementation projects.
Rollout projects may require customization for each location, while implementation projects may be more standardi...read more
Selenium is a popular testing tool for web applications due to its flexibility, compatibility, and robust features.
Selenium supports multiple programming languages like Java, Python, and C#, making it versatile for different teams and projects.
It can automate testing across different browsers and platforms, ensuring consistent results regardless of the user's environment.
Selenium integrates well with other testing frameworks and tools, allowing for seamless test automation wo...read more
Q28. Kafka, How does kafka work? What are the commands you execute to debug if the messages are not received?
Kafka is a distributed streaming platform that allows publishing and subscribing to streams of records.
Kafka works by having producers publish messages to topics, which are then stored in partitions on brokers.
Consumers subscribe to topics and read messages from partitions.
To debug if messages are not received, use the command-line tool kafka-console-consumer to check if messages are being produced and consumed.
Also check the Kafka logs for any errors or issues with the broke...read more
Manual testing is done by humans, while automated testing is done using tools and scripts.
Manual testing involves testers executing test cases manually without the use of automation tools.
Automated testing involves using tools and scripts to automate the execution of test cases.
Manual testing is time-consuming and prone to human errors, while automated testing is faster and more reliable.
Manual testing is suitable for exploratory testing and ad-hoc scenarios, while automated ...read more
findElement() returns the first matching element on the web page, while findElements() returns a list of all matching elements.
findElement() returns a single WebElement matching the locator provided.
findElements() returns a list of WebElements matching the locator provided.
If no elements are found, findElement() will throw a NoSuchElementException, while findElements() will return an empty list.
Microservice Architecture is an architectural style that structures an application as a collection of loosely coupled services.
Microservices are small, independent services that work together to form a complete application.
Each microservice is responsible for a specific business function and can be developed, deployed, and scaled independently.
Communication between microservices is typically done through APIs.
Microservices promote flexibility, scalability, and resilience in a...read more
Spring Cloud addresses issues related to microservices architecture and cloud-native applications.
Service discovery and registration
Load balancing
Circuit breakers
Distributed messaging
Configuration management
Fault tolerance
Monitoring and tracing
Q33. What do you mean by OOPS?
OOPS stands for Object-Oriented Programming System. It is a programming paradigm based on the concept of objects.
OOPS focuses on creating objects that contain data in the form of fields (attributes) and code in the form of procedures (methods).
Encapsulation, inheritance, and polymorphism are key principles of OOPS.
Encapsulation refers to the bundling of data and methods that operate on the data into a single unit (object).
Inheritance allows a class to inherit properties and b...read more
Q34. Kubernetes, What are the different fields used in a deployment file for creating pod? What are the different ways of pulling images? Explain QoS for pods
Answering questions related to Kubernetes deployment file, image pulling, and QoS for pods.
Fields in deployment file: apiVersion, kind, metadata, spec (replicas, selector, template)
Ways of pulling images: using imagePullPolicy (Always, IfNotPresent, Never), specifying image name and tag
QoS for pods: Guaranteed (requests and limits specified), Burstable (only requests specified), BestEffort (no requests or limits specified)
STLC is a process followed by testers to ensure high quality software is delivered.
STLC involves planning, designing, executing, and reporting on tests.
Phases include requirement analysis, test planning, test design, test execution, and test closure.
Each phase has specific goals and deliverables to ensure thorough testing.
Example: In requirement analysis, testers review requirements to identify test scenarios.
Example: In test execution, testers run test cases and report defec...read more
A test automation framework consists of different parts that work together to automate testing processes.
Test scripts
Test data
Object repositories
Driver scripts
Reporting tools
Spring supports five bean scopes: singleton, prototype, request, session, and application.
Singleton scope: Default scope, only one instance per Spring container
Prototype scope: New instance created each time bean is requested
Request scope: Bean is created once per HTTP request
Session scope: Bean is created once per HTTP session
Application scope: Bean is created once per ServletContext
Hibernate provides several concurrency strategies like optimistic locking, pessimistic locking, and versioning.
Optimistic locking: Allows multiple transactions to read and write to the database without locking the data. It checks for conflicts before committing the transaction.
Pessimistic locking: Locks the data when a transaction reads it, preventing other transactions from accessing it until the lock is released.
Versioning: Uses a version number to track changes to an entit...read more
Java Strings are immutable to ensure data integrity, thread safety, and security.
Immutable strings prevent accidental modification of data.
String pool optimization is possible due to immutability.
Thread safety is ensured as strings cannot be modified concurrently.
Security is enhanced as sensitive information cannot be altered.
Some best practices in test automation include proper planning, selecting the right tools, maintaining test scripts, and continuous integration.
Proper planning before starting test automation to define objectives, scope, and strategy.
Selecting the right tools based on project requirements and team expertise.
Maintaining test scripts regularly to keep them up-to-date and relevant.
Implementing continuous integration to automate the testing process and catch issues early.
Q41. What is the difference between WFH(Work from Home) and WFO(Work from Office)?
WFH allows employees to work remotely from their homes, while WFO requires employees to work from a physical office location.
WFH provides flexibility in work location and schedule, while WFO requires employees to be present in the office during specified hours.
WFH may lead to increased productivity and work-life balance for some employees, while WFO allows for better collaboration and communication among team members.
Examples: WFH - working from home on a laptop; WFO - workin...read more
Dependency injection is a design pattern where components are given their dependencies rather than creating them internally.
Allows for easier testing by providing mock dependencies
Promotes loose coupling between components
Improves code reusability and maintainability
Examples: Constructor injection, Setter injection, Interface injection
Q43. Will you explain what is WBS and RBS in project management? What is RAD model?
WBS is a hierarchical breakdown of project deliverables. RBS is a hierarchical breakdown of project resources. RAD is a software development model.
WBS stands for Work Breakdown Structure and is used to break down project deliverables into smaller, more manageable components.
RBS stands for Resource Breakdown Structure and is used to break down project resources into smaller, more manageable components.
RAD stands for Rapid Application Development and is a software development m...read more
Q44. Do you know java reflection? Can you write a program to explain reflection concepts?
Yes, reflection is a feature in Java that allows inspecting and modifying runtime behavior of a program.
Reflection allows accessing and modifying fields, methods, and constructors of a class at runtime.
It is useful for creating generic code, debugging, and testing.
Example: getting the class name of an object using getClass() method.
Example: accessing private fields of a class using reflection.
Example: creating an instance of a class using reflection.
Q45. When do we use inner class? What is the use case of static and non-static inner classes?
Inner classes are used for encapsulation and code organization. Static inner classes are used for utility classes.
Inner classes are used to group related classes together and improve encapsulation.
Non-static inner classes have access to the outer class's fields and methods.
Static inner classes are used for utility classes that don't need access to the outer class's fields and methods.
Inner classes can also be used for anonymous classes and event listeners.
JUnit annotations like @Before, @Test, @After are commonly used with Selenium for test automation.
Annotations like @Before are used to set up preconditions before each test method
Annotations like @Test are used to mark a method as a test method
Annotations like @After are used to clean up after each test method
Annotations like @Ignore are used to skip a test method
Annotations like @RunWith are used to specify a custom test runner
Q47. What is the difference between automation testing and manual testing?
Automation testing is the use of tools and scripts to execute test cases, while manual testing is performed manually by human testers.
Automation testing involves the use of automation tools and scripts to execute test cases.
Manual testing is performed manually by human testers without the use of automation tools.
Automation testing is faster and more efficient for repetitive tasks.
Manual testing allows for exploratory testing and human intuition.
Automation testing is suitable ...read more
Selenium is a tool for automating web browsers, while Cucumber is a tool for behavior-driven development.
Selenium is used for automating web browsers to perform testing on web applications.
Cucumber is a tool for behavior-driven development, allowing tests to be written in plain language.
Selenium requires programming knowledge to write test scripts, while Cucumber allows tests to be written in a more user-friendly language like Gherkin.
Selenium can be used with various program...read more
Automating CAPTCHA testing involves using tools like Selenium, API testing, and image recognition techniques.
Use Selenium to interact with the CAPTCHA element on the web page.
Utilize API testing to verify the functionality of the CAPTCHA system.
Implement image recognition techniques to automate solving CAPTCHAs.
Consider using third-party CAPTCHA solving services if necessary.
Q50. What is Inversion of Control? In springboot, how is a bean created, injected and resolved?
Inversion of Control is a design pattern where control is inverted from the application to a framework.
In Springboot, a bean is created by annotating a class with @Component or its specialized annotations like @Service, @Repository, etc.
Beans are injected using @Autowired annotation or constructor injection.
Bean resolution is done by the Spring container which maintains a registry of all beans and their dependencies.
Inversion of Control helps in decoupling the application cod...read more
Q51. Data Management process and what should be done before completing XYZ task, whose approval is required for what and how workflow works, etc
Data management process involves understanding workflow, required approvals, and tasks before completing XYZ task.
Understand the data management process and workflow for completing XYZ task
Identify the necessary approvals required before completing the task
Ensure proper documentation and record-keeping throughout the process
Collaborate with relevant stakeholders to streamline the workflow
Regularly review and update the data management process for efficiency
Example: Before com...read more
Selenium has different components like Selenium IDE, Selenium WebDriver, Selenium Grid, and Selenium RC.
Selenium IDE is a record and playback tool for creating test scripts without coding.
Selenium WebDriver is a powerful tool for automating web applications across different browsers.
Selenium Grid is used for parallel testing across multiple machines and browsers.
Selenium RC (Remote Control) is the predecessor of WebDriver and is now deprecated.
Q53. Kubernetes, When do we use statefulset? How is the storage mapping done in a statefulset?
StatefulSets are used for stateful applications that require stable network identities and persistent storage.
StatefulSets are used for applications that require ordered deployment, scaling, and termination.
They provide stable network identities and persistent storage for each pod in the set.
Storage mapping is done using PersistentVolumeClaims (PVCs) which are bound to PersistentVolumes (PVs).
Each pod in the StatefulSet gets a unique hostname based on its ordinal index, which...read more
A classloader in Java is a part of the Java Runtime Environment that dynamically loads Java classes into the Java Virtual Machine.
Classloaders are responsible for loading classes at runtime based on the fully qualified name of the class.
There are different types of classloaders in Java such as Bootstrap Classloader, Extension Classloader, and Application Classloader.
Classloaders follow a delegation model where a classloader delegates the class loading to its parent classloade...read more
Q55. what are the basic SQL skills?
Basic SQL skills include querying databases, manipulating data, and understanding database structures.
Writing basic SQL queries to retrieve data from databases
Understanding and using SQL functions and operators
Creating and modifying database tables and relationships
Using SQL to filter, sort, and group data
Understanding basic SQL syntax and commands
Agile testing is important for ensuring continuous feedback, adapting to changes, and delivering high-quality software.
Allows for continuous feedback from stakeholders and end-users
Enables teams to adapt to changing requirements and priorities
Promotes collaboration between developers, testers, and business stakeholders
Helps in delivering high-quality software in shorter iterations
Encourages early and frequent testing to catch defects early on
SQL privileges control access to database objects and operations.
SQL privileges determine what actions a user can perform on a database object.
Privileges include SELECT, INSERT, UPDATE, DELETE, and EXECUTE.
Privileges can be granted or revoked by the database administrator.
Users can have different privileges on different database objects.
For example, a user may have SELECT privilege on a table but not UPDATE privilege.
Q58. Which technology were used? Pick any topic and describe?
The technology used was artificial intelligence in healthcare.
AI algorithms for medical image analysis
Machine learning for predicting patient outcomes
Natural language processing for analyzing medical records
Q59. Can we call a future method from a batch class?
Yes
A future method can be called from a batch class
Future methods are used to perform long-running operations asynchronously
Batch classes are used to process large data sets in smaller chunks
Calling a future method from a batch class allows for parallel processing
Q60. Java 8, Using streams search for a given string in a list of Strings.
Using Java 8 streams, search for a given string in a list of Strings.
Create a stream from the list of Strings
Use the filter() method to filter out the Strings that do not contain the given string
Collect the filtered Strings into a new list using the collect() method
Q61. Pointers are used in C/ C++. Why does Java not make use of pointers?
Java does not use pointers because it was designed to be a simpler and safer language, with automatic memory management.
Java was designed to be a simpler and safer language compared to C/C++.
Java uses references instead of pointers to access objects in memory.
Pointers in C/C++ can lead to memory leaks and security vulnerabilities.
Example: In C/C++, you can directly manipulate memory addresses using pointers, while in Java, you cannot.
Q62. What is Linux, how will you add the commands
Linux is an open-source operating system based on Unix. Commands can be added using the terminal or by installing packages.
Linux is free and can be customized to suit specific needs
Commands can be added using the terminal by creating a script or alias
Packages can be installed using package managers like apt-get or yum
Examples of commands include ls, cd, mkdir, rm, etc.
Q63. 1)What is the difference between do while and while loop. 2) what is call by reference and call by value 3) explain pointer. 4) what is array. 5) difference between c c++ and java
1) do while loop executes the code block at least once before checking the condition, while loop checks the condition before executing the code block. 2) Call by reference passes the address of the variable, call by value passes the value of the variable. 3) Pointer is a variable that stores the memory address of another variable. 4) Array is a data structure that stores a collection of elements of the same data type. 5) C is a procedural programming language, C++ is an objec...read more
Q64. What is difference between ISO 9001:2008 vs 2015
ISO 9001:2015 emphasizes risk-based thinking and a process approach to quality management.
ISO 9001:2015 has a new high-level structure (HLS) that aligns with other ISO management system standards
ISO 9001:2015 emphasizes leadership and engagement of people
ISO 9001:2015 requires a documented information management system instead of a quality manual
ISO 9001:2015 introduces the concept of risk-based thinking throughout the standard
ISO 9001:2015 requires organizations to identify ...read more
Q65. Recruitment and it's cycle and what are the varius job portals and how to use it effectively.
Recruitment cycle involves sourcing, screening, interviewing, selecting, and onboarding. Job portals like Indeed, LinkedIn, and Glassdoor are commonly used.
Recruitment cycle includes sourcing candidates, screening resumes, conducting interviews, selecting candidates, and onboarding.
Popular job portals include Indeed, LinkedIn, Glassdoor, Monster, and CareerBuilder.
To use job portals effectively, create a detailed profile, set up job alerts, customize job searches, and network...read more
Q66. What is ASAP methodology?
ASAP methodology is a framework for SAP implementation that follows a structured approach.
ASAP stands for Accelerated SAP.
It is a phased approach that covers all aspects of implementation from project preparation to post-implementation support.
It emphasizes on business process re-engineering and continuous improvement.
It provides templates, tools, and guidelines for each phase of the project.
It helps to reduce implementation time and cost while ensuring quality and customer s...read more
Q67. What is Agile methodology?
Agile methodology is an iterative approach to project management that emphasizes flexibility and customer satisfaction.
Agile focuses on delivering working software in short iterations
It values collaboration between cross-functional teams and customers
It emphasizes responding to change over following a plan
Examples of Agile methodologies include Scrum, Kanban, and Extreme Programming (XP)
Q68. What is planning and remote infocubes?
Planning infocubes are used for planning and forecasting data, while remote infocubes are used for accessing data from a remote system.
Planning infocubes are used for budgeting, forecasting, and planning data.
Remote infocubes are used for accessing data from a remote system, such as a different SAP system.
Remote infocubes can be used for reporting on data from multiple systems.
Planning infocubes can be used for creating scenarios and simulations.
Both types of infocubes are us...read more
Q69. Organisation structure Assignment of organisation structure Configuration of sap mm Integration between sap mm with other modules Sap implementation project In project what you have done
I have experience in configuring SAP MM, integrating with other modules, and working on SAP implementation projects.
Configured organization structure in SAP MM to align with client's business requirements
Assigned organization structure to various entities such as plants, storage locations, and purchasing organizations
Integrated SAP MM with other modules like SAP SD for seamless order-to-cash process
Worked on SAP implementation projects by conducting workshops, gathering requi...read more
Q70. How a certificate authority issue a certificate?
A certificate authority issues a certificate by verifying the identity of the requester and digitally signing the certificate.
Verify the identity of the requester through various methods such as domain validation, organization validation, or extended validation.
Generate a public and private key pair for the requester.
Create a certificate signing request (CSR) containing the requester's public key and identity information.
Verify the information in the CSR and validate the requ...read more
Q71. Can we call a future method from another?
Yes, we can call a future method from another future method.
A future method can call another future method using the @future annotation.
The second future method will be queued and executed after the first future method completes.
It is important to note that there is a limit of 50 future method calls per Apex invocation.
Q72. Springboot, write a controller class for REST APIs.
A controller class in Springboot is used to handle REST API requests and responses.
Annotate the class with @RestController
Define methods for each API endpoint with @RequestMapping annotation
Use appropriate HTTP methods like GET, POST, PUT, DELETE
Inject dependencies using @Autowired annotation
Return response using ResponseEntity class
Q73. What is the load factor for HASH MAP?
Load factor for HASH MAP is the ratio of number of elements to the size of the table.
Load factor determines the efficiency of the HASH MAP.
It is calculated as the number of elements divided by the size of the table.
A higher load factor means more collisions and slower performance.
A good load factor is around 0.75.
Load factor can be adjusted by increasing or decreasing the size of the table.
Q74. Sql plsql data strucntire and differences
SQL is a language used to manage and query databases, PL/SQL is an extension that adds procedural programming capabilities.
SQL is used for querying and manipulating data in databases.
PL/SQL is a procedural language extension for SQL, allowing for more complex logic and programming capabilities.
Data structures in SQL refer to the way data is organized and stored in tables.
PL/SQL allows for the creation of custom data structures using variables, arrays, and records.
Differences ...read more
Annotations in Cucumber are tags that can be added to feature files or step definitions to provide additional information or functionality.
Annotations in Cucumber start with the '@' symbol.
Annotations can be used to organize and categorize feature files or step definitions.
Annotations can also be used to control the execution flow of scenarios.
Examples of annotations in Cucumber include @Before, @After, @Given, @When, @Then, etc.
Q76. Convert Hours into Seconds.
To convert hours into seconds, multiply the number of hours by 3600.
Multiply the number of hours by 3600 to get the equivalent seconds.
For example, 2 hours = 2 * 3600 = 7200 seconds.
Triggers in SQL are special stored procedures that are automatically executed when certain events occur in a database.
Triggers can be used to enforce business rules, maintain referential integrity, and automate tasks.
There are two main types of triggers: DML triggers (executed in response to data manipulation language events) and DDL triggers (executed in response to data definition language events).
Examples of triggers include automatically updating a timestamp when a record...read more
Automation testing is useful when repetitive tests need to be executed quickly and efficiently.
Useful for regression testing to ensure previous functionality still works
Helps in executing tests on multiple configurations quickly
Useful for load testing to simulate multiple users accessing the system simultaneously
Q79. What is .net,what is oops explain briefly
The .NET framework is a software development platform developed by Microsoft. OOPs stands for Object-Oriented Programming, a programming paradigm based on the concept of objects.
The .NET framework is used for building various types of applications, including web, desktop, and mobile applications.
OOPs is a programming paradigm that uses objects and classes to design and develop applications.
In OOPs, objects are instances of classes that encapsulate data and behavior.
Some key p...read more
Q80. What is the difference between args and kwargs
args and kwargs are used to pass variable-length arguments to a function, but args is for positional arguments and kwargs is for keyword arguments.
args is a tuple of positional arguments, while kwargs is a dictionary of keyword arguments
args is used when the number of arguments is not known beforehand, while kwargs is used when passing named arguments
Example: def my_func(*args, **kwargs):
Example: my_func(1, 2, 3, name='John', age=30)
Q81. What language you haveused
I have used a variety of programming languages including Java, Python, C++, and JavaScript.
Java
Python
C++
JavaScript
Q82. What is sql and plsql?
SQL is a language used for managing and querying databases, while PL/SQL is an extension of SQL used for procedural programming.
SQL stands for Structured Query Language and is used for managing and querying relational databases.
PL/SQL stands for Procedural Language/SQL and is an extension of SQL that adds procedural programming capabilities.
SQL is used to retrieve and manipulate data in databases using queries like SELECT, INSERT, UPDATE, DELETE.
PL/SQL allows for the creation...read more
Q83. What is array What is String Sample coding swap number palindrome number
An array is a data structure that stores a collection of elements of the same type. A string is a sequence of characters. Swapping numbers involves exchanging the values of two variables. A palindrome number reads the same forwards and backwards.
An array can store multiple values of the same data type, accessed by index.
A string is a sequence of characters enclosed in quotes, like 'hello'.
Swapping numbers involves using a temporary variable to exchange their values.
A palindro...read more
Q84. How to manage user account using LDAP
LDAP can be used to manage user accounts by storing user information in a centralized directory.
Set up LDAP server and configure it to store user account information
Use LDAP client tools to manage user accounts such as creating, modifying, or deleting accounts
Authenticate users against LDAP server for access control
Implement LDAP schema to define attributes and object classes for user accounts
Q85. How to handle the ConcureentModificationException
ConcurrentModificationException occurs when a collection is modified while iterating over it.
Use Iterator to iterate over the collection instead of foreach loop.
If modification is necessary, use Iterator's remove() method instead of collection's remove() method.
Consider using synchronized collections or ConcurrentHashMap to avoid ConcurrentModificationException.
Q86. Difference between Green Belt and Black Belt
Green Belt and Black Belt are both Six Sigma certifications, but Black Belt is a higher level of expertise.
Green Belt is an entry-level certification in Six Sigma methodology
Black Belt is a more advanced certification, requiring more training and experience
Black Belts are typically responsible for leading Six Sigma projects and mentoring Green Belts
Green Belts work on Six Sigma projects under the guidance of Black Belts
Black Belts have a deeper understanding of statistical an...read more
Q87. Have you managed financials and how?
Yes, I have managed financials in my previous roles as a Project Manager.
I have experience in creating and managing project budgets.
I have worked closely with finance teams to track and monitor project expenses.
I have prepared financial reports and presented them to stakeholders.
I have implemented cost-saving measures and identified areas for financial improvement.
I have ensured projects stay within budget and made adjustments as needed.
Q88. How to handle exception in java
In Java, exceptions can be handled using try-catch blocks to catch and handle specific exceptions.
Use try-catch blocks to catch exceptions and handle them gracefully
Use multiple catch blocks to handle different types of exceptions
Use finally block to execute code regardless of whether an exception is thrown or not
Throw custom exceptions using throw keyword
Q89. Implement an Iterator for a custom object.
Implementing an iterator for a custom object
Create a custom class and implement the Iterable interface
Override the iterator() method to return a custom Iterator object
Implement the hasNext() and next() methods in the Iterator class
Use the for-each loop to iterate through the custom object
Q90. How to troubleshoot network issue?
To troubleshoot network issues, start by checking physical connections, verifying network settings, testing connectivity, and analyzing network traffic.
Check physical connections (cables, ports, etc.)
Verify network settings (IP address, subnet mask, gateway, DNS)
Test connectivity using tools like ping, traceroute, and netcat
Analyze network traffic with tools like Wireshark or tcpdump
Q91. Network routing and switching in depth till CCNP
Network routing and switching knowledge up to CCNP level.
Understanding of routing protocols such as OSPF, BGP, EIGRP
Knowledge of VLANs, STP, VTP, and other switching technologies
Ability to troubleshoot network connectivity issues
Experience with Cisco IOS and Nexus operating systems
Familiarity with network security concepts such as ACLs and firewalls
Q92. In Java8, different between flatmap and map
map transforms each element in a stream, while flatMap transforms each element into multiple elements
map applies a function to each element in a stream and returns a new stream of the results
flatMap applies a function that returns a stream for each element in the original stream, then flattens the streams into a single stream
Example: map - stream.map(x -> x * x), flatMap - stream.flatMap(str -> Arrays.stream(str.split("")))
Q93. difference beyween fporms and reports
Forms are used to input data while reports are used to display data.
Forms are used to collect and input data into a system.
Reports are used to display and present data in a structured format.
Forms are interactive and allow users to input data, while reports are static and provide information based on the data entered.
Examples: A registration form on a website vs. a sales report generated from a database.
Q94. What is Lean Six Sigma
Lean Six Sigma is a methodology that combines Lean Manufacturing and Six Sigma to eliminate waste and improve quality.
It focuses on reducing waste and increasing efficiency
It uses statistical analysis to identify and solve problems
It involves a structured approach to problem-solving
It aims to improve customer satisfaction and reduce costs
Example: A hospital uses Lean Six Sigma to reduce patient wait times and improve the quality of care
Q95. Is technology making us less human?
Technology is changing the way we interact and communicate, but it doesn't necessarily make us less human.
Technology enhances our abilities and connections with others.
It can improve efficiency and productivity in various aspects of life.
However, over-reliance on technology may lead to decreased face-to-face interactions and empathy.
Balancing technology use with real-life experiences is key to maintaining our humanity.
Q96. Explain about Spring MVC architecture
Spring MVC is a framework for building web applications in Java, following the Model-View-Controller design pattern.
Spring MVC follows the Model-View-Controller design pattern, where the model represents the data, the view represents the UI, and the controller handles the user input.
It provides components like DispatcherServlet, Controller, Model, and ViewResolver to handle requests and responses.
It supports the use of annotations like @Controller, @RequestMapping, and @Model...read more
Q97. Explain about Java Collections framework
Java Collections framework is a set of classes and interfaces that provide various data structures and algorithms to store and manipulate collections of objects.
Provides interfaces (List, Set, Map) and classes (ArrayList, HashSet, HashMap) for storing and manipulating collections of objects
Includes utility classes like Collections for sorting, searching, and other operations on collections
Supports generics to ensure type safety and reduce the need for explicit type casting
Off...read more
Q98. How did you manage communication?
I managed communication by establishing clear channels, utilizing various tools, and promoting open dialogue.
Established clear communication channels to ensure efficient flow of information
Utilized project management tools like Slack, Trello, and email to facilitate communication
Scheduled regular team meetings to discuss progress, address concerns, and foster collaboration
Encouraged open dialogue and active listening to promote effective communication
Implemented a feedback lo...read more
Q99. Difference between future method and Queueable?
Future methods are asynchronous and execute in a separate thread, while Queueable allows chaining of jobs and can handle larger data volumes.
Future methods are limited to 50 per transaction and cannot be chained
Queueable can be chained and can handle up to 50 jobs in a single transaction
Future methods are executed in a separate thread and are useful for long-running operations
Queueable jobs can be scheduled to run at a specific time
Both can be used to offload processing from ...read more
Q100. What is a cell definition?
A cell definition is a set of rules that define the structure and behavior of a cell in a spreadsheet.
A cell definition includes the data type, formatting, and validation rules for a cell.
It can also include formulas or functions that calculate values based on other cells.
Cell definitions are used to ensure consistency and accuracy in spreadsheet data.
Examples of cell definitions include setting a cell to only accept numerical values or limiting the number of characters that ...read more
Top HR Questions asked in Piktorlabs
Interview Process at Piktorlabs
Top Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month