GAVS Technologies
30+ RankUno Interactive Technologies Interview Questions and Answers
Q1. What is the concept of boundary value in programming or testing?
Boundary value is a testing technique where test cases are designed around the boundaries of input ranges.
Boundary value testing involves testing the minimum, maximum, and just beyond the boundaries of valid input ranges.
It helps in identifying errors that occur at the boundaries of input values.
For example, if a program accepts values from 1 to 10, boundary value testing would include test cases for 0, 1, 10, and 11.
Q2. What is the entry point for dotnet core applications?
The entry point for dotnet core applications is the Main method in the Program class.
The Main method serves as the entry point for dotnet core applications.
It is typically located in the Program class.
The Main method is where the application starts its execution.
Q3. How to handle alerts in Cypress
Alerts in Cypress can be handled using cy.on() method and event listeners.
Use cy.on() method to listen to the 'window:alert' event
Pass a callback function to handle the alert message
Use cy.stub() method to stub the window.alert() method
Check if the alert was called with the expected message using cy.get('@stub').should('have.been.calledWith', 'expected message')
Q4. What are the interfaces and classes in java collection ?
Java collection framework provides interfaces and classes to store, manipulate, and retrieve collections of objects.
Interfaces: List, Set, Map, Queue, Deque
Classes: ArrayList, LinkedList, HashSet, HashMap, PriorityQueue
Example: List interface is implemented by classes like ArrayList and LinkedList
Q5. What are managable codes in dot net?
Manageable codes in dot net are codes that are easy to understand, maintain, and debug.
Well-structured and organized code
Proper commenting and documentation
Consistent naming conventions
Modular design with reusable components
Avoiding complex nested logic
Using design patterns for better code architecture
Q6. How to handle popups in Cypress
Popups in Cypress can be handled using cy.window() and cy.stub() commands.
Use cy.window() command to access the window object and its properties.
Use cy.stub() command to stub the window.alert() and window.confirm() methods.
Use cy.on() command to listen for events and handle popups accordingly.
Use cy.get() command to select and interact with popup elements.
Q7. Write a sql query to find the maximum mark of maths subject in a student table?
SQL query to find the maximum mark of maths subject in a student table.
Use the MAX() function to find the maximum mark in the maths subject column.
Specify the maths subject column in the query.
Include the student table name in the query.
Q8. How would you implement Authorization in a ASP.NET Core web API??
Authorization in ASP.NET Core web API can be implemented using various methods such as JWT, OAuth, and Identity.
Use JWT (JSON Web Tokens) for token-based authentication and authorization.
Implement OAuth for third-party authentication and authorization.
Utilize ASP.NET Core Identity for role-based authorization.
Configure authentication and authorization middleware in the ASP.NET Core pipeline.
Use attributes like [Authorize] to restrict access to specific endpoints.
Q9. Print the duplicate character occurrence in a string?
Print duplicate character occurrences in a string.
Iterate through the string and store character counts in a HashMap.
Print characters with count greater than 1 to find duplicates.
Q10. What happens when we dont get full data from the client
Incomplete data from the client can lead to inaccurate analysis and conclusions.
Missing data can result in biased models and inaccurate predictions.
Imputation techniques can be used to fill in missing values, but this can introduce errors.
Communication with the client to obtain the missing data is crucial for accurate analysis.
Consider the impact of missing data on the overall project timeline and budget.
Example: Missing demographic information in a customer dataset can skew ...read more
Q11. How to implement sessions?
Sessions can be implemented using cookies or server-side storage to store user data and maintain state between requests.
Use cookies to store a session ID on the client side
Store session data on the server side using a database or in-memory storage
Use session tokens to authenticate and authorize users during their session
Q12. Create sql query to generate report with list of employee group by dept, count of emp with join employee and dept table
SQL query to generate report of employees grouped by department with count
Use JOIN to combine employee and department tables
Group by department to get count of employees in each department
Select department name and count of employees
Q13. Print the character occurance in a string?
Count the occurrence of each character in a given string.
Create a map to store character counts
Iterate through the string and update the counts in the map
Print the character counts from the map
Q14. Print the differences between the array elements?
Use nested loops to compare each pair of elements and print the differences.
Use nested loops to compare each pair of elements in the array.
Calculate the absolute difference between each pair of elements.
Print the differences between the array elements.
Q15. Print the duplicate elements count in a list?
Count duplicate elements in a list of strings.
Create a HashMap to store the count of each element in the list.
Iterate through the list and update the count in the HashMap.
Finally, iterate through the HashMap and print the count of elements with count greater than 1.
Q16. Create basic React based component to print all array items in Html table
Create a React component to display array items in an HTML table
Create a functional component in React
Map through the array of strings to generate table rows
Use JSX to structure the table with appropriate tags
Q17. Explain oops concepts?
OOPs concepts are the principles of Object-Oriented Programming that focus on objects, classes, inheritance, encapsulation, and polymorphism.
Objects: Instances of classes that encapsulate data and behavior
Classes: Blueprint for creating objects with attributes and methods
Inheritance: Ability for a class to inherit properties and behavior from another class
Encapsulation: Binding data and methods that operate on the data into a single unit
Polymorphism: Ability for objects of di...read more
Q18. What are the types of SQL joins
Types of SQL joins include inner join, left join, right join, and full outer join.
Inner join: Returns rows when there is a match in both tables
Left join: Returns all rows from the left table and the matched rows from the right table
Right join: Returns all rows from the right table and the matched rows from the left table
Full outer join: Returns rows when there is a match in either table
Q19. what is FRD and SRS ?
FRD stands for Functional Requirements Document and SRS stands for Software Requirements Specification.
FRD is a document that describes the functional requirements of a system or software.
SRS is a document that specifies the software requirements for a system or software.
FRD focuses on what the system should do from a functional perspective.
SRS provides detailed information on how the software should behave and interact with users.
FRD is typically created by business analysts...read more
Q20. MVC pattern in spring boot
MVC pattern in Spring Boot is a design pattern that separates an application into three main components: Model, View, and Controller.
Model represents the data and business logic of the application
View is responsible for rendering the user interface
Controller handles user input and updates the model accordingly
Spring Boot provides support for implementing MVC pattern through annotations like @Controller, @RequestMapping, and @ModelAttribute
Q21. What is dependency injection
Dependency injection is a design pattern where components are given their dependencies rather than creating them internally.
Allows for easier testing by mocking dependencies
Promotes loose coupling between components
Improves code reusability and maintainability
Example: Constructor injection, Setter injection
Q22. What is rendering varient
Rendering variant refers to different ways in which a software application can display content or user interface elements.
Rendering variant can include different layouts, themes, colors, fonts, and styles for displaying content.
It allows users to customize the appearance of the application to suit their preferences.
For example, a website may offer a light and dark mode as rendering variants for users to choose from.
Q23. what is EDI? and types
EDI stands for Electronic Data Interchange. It is the electronic exchange of business documents between trading partners.
EDI enables the transfer of structured data between different computer systems.
It replaces the need for paper-based documents and manual data entry.
EDI standards define the format and structure of the exchanged data.
Common types of EDI include EDIFACT, ANSI X12, and XML.
EDI can be used for various business processes such as purchase orders, invoices, and sh...read more
Q24. Explain framework
A framework is a set of rules, guidelines, and standards that provide a structure for developing software applications.
A framework provides a foundation for building software applications
It includes pre-written code and libraries that can be reused
Frameworks can be specific to a programming language or platform
Examples include React for web development and TensorFlow for machine learning
Q25. Create singleton class from scratch in Java
Singleton class ensures only one instance of the class is created.
Create a private static instance of the class
Private constructor to prevent instantiation
Public static method to return the instance
Q26. OOPS concepts with example program
OOPS concepts include inheritance, encapsulation, polymorphism, and abstraction.
Inheritance: Allows a class to inherit properties and behavior from another class. Example: class Dog extends Animal.
Encapsulation: Bundling data and methods that operate on the data into a single unit. Example: private variables in a class.
Polymorphism: Ability to present the same interface for different data types. Example: method overloading or overriding.
Abstraction: Hiding the complex impleme...read more
Q27. SLA of p1, P2, p3, P4 incidents
SLA of incidents p1, p2, p3, p4 varies based on severity and impact.
SLA for p1 incidents is typically shorter as they are critical and require immediate attention.
SLA for p2 incidents is longer than p1 but still requires prompt resolution.
SLA for p3 incidents is moderate as they are less critical and can be resolved within a reasonable timeframe.
SLA for p4 incidents is the longest as they are minor issues with low impact on operations.
Q28. What is solid, describe LSP
LSP is a principle of SOLID design that states that objects of a superclass should be replaceable with objects of its subclasses.
LSP stands for Liskov Substitution Principle
It ensures that the behavior of the program remains consistent when a subclass is used in place of its superclass
Violating LSP can lead to unexpected behavior and bugs
Example: If a program expects a Bird object, it should be able to use any subclass of Bird (e.g. Eagle, Penguin) without issues
Q29. OPSF LSA Types from 1 to 7
OSPF LSA Types range from 1 to 7, each serving a specific purpose in the OSPF routing protocol.
LSA Type 1: Router LSA - Describes the state and cost of router interfaces.
LSA Type 2: Network LSA - Represents multi-access networks and the routers connected to them.
LSA Type 3: Summary LSA - Summarizes routes from one area to another.
LSA Type 4: ASBR Summary LSA - Advertises ASBRs to other areas.
LSA Type 5: External LSA - Advertises routes redistributed into OSPF from external so...read more
Q30. IPSEC how it works
IPSEC is a protocol suite used to secure internet protocol (IP) communications by authenticating and encrypting each IP packet in a data stream.
IPSEC operates at the network layer of the OSI model
It provides security services such as encryption, authentication, and key management
IPSEC can be implemented in two modes: Transport mode and Tunnel mode
Examples of IPSEC implementations include VPNs and secure communication between network devices
Q31. 2. Project Explanation and Uses.
The project is a web-based inventory management system for a retail company.
Allows users to track inventory levels, sales, and orders in real-time
Generates reports on sales trends, popular products, and inventory turnover
Integrates with barcode scanners and POS systems for efficient data entry
Q32. Tell me about SVM
SVM is a supervised machine learning algorithm used for classification and regression tasks.
SVM finds the hyperplane that best separates different classes in the feature space
It works well for high-dimensional data and is effective in cases where the number of dimensions is greater than the number of samples
SVM uses kernel functions to transform the input data into higher dimensions for better separation
It can handle both linear and non-linear data by using different types of...read more
Q33. wht is IAM and benefits?
IAM stands for Identity and Access Management. It is a framework of policies and technologies that ensure the right individuals have the right access to resources.
IAM helps organizations manage user identities and their access to various systems and applications.
It enhances security by controlling user access based on roles and responsibilities.
IAM centralizes user management, making it easier to grant or revoke access as needed.
It improves compliance with regulations and sta...read more
Q34. Joiner mover leaver process?
Joiner mover leaver process refers to the process of onboarding new employees, transferring existing employees, and offboarding employees who are leaving the organization.
Onboarding new employees involves setting up their accounts, providing training, and introducing them to the team.
Transferring existing employees may involve updating their roles, responsibilities, and access permissions.
Offboarding employees includes revoking access, collecting company assets, and conductin...read more
Q35. Describe Angular life cycle
Angular life cycle is a series of events that occur from the creation of a component to its destruction.
ngOnChanges - called when an input property changes
ngOnInit - called once after the first ngOnChanges
ngDoCheck - called during every change detection cycle
ngAfterContentInit - called after content is projected into component
ngAfterContentChecked - called after every check of projected content
ngAfterViewInit - called after component's view has been initialized
ngAfterViewChec...read more
Top HR Questions asked in RankUno Interactive Technologies
Interview Process at RankUno Interactive Technologies
Top Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month