Add office photos
Engaged Employer

GlobalLogic

3.7
based on 4.5k Reviews
Video summary
Filter interviews by

300+ Bounteous x Accolite Interview Questions and Answers

Updated 25 Feb 2025
Popular Designations

Q1. MapSum Pair Implementation

Create a data structure named 'MapSum' with the ability to perform two operations and a constructor.

Explanation:

Implement the following:
  • MapSum(): Initializes the MapSum.
  • insert(...read more
Ans.

The question asks to implement a data structure called 'MapSum' with functions to initialize, insert key-value pairs, and find the sum of values with a given prefix.

  • Implement a class called 'MapSum' with a constructor to initialize the data structure.

  • Implement the 'insert' function to insert key-value pairs into the 'MapSum'. If a key is already present, replace its value with the new one.

  • Implement the 'sum' function to find the sum of values whose key has a prefix equal to t...read more

Add your answer

Q2. Find Terms of Series Problem

Ayush is tasked with determining the first 'X' terms of the series defined by 3 * N + 2, ensuring that no term is a multiple of 4.

Input:

The first line contains a single integer 'T...read more
Ans.

Generate the first 'X' terms of a series 3 * N + 2, excluding multiples of 4.

  • Iterate through numbers starting from 1 and check if 3 * N + 2 is not a multiple of 4.

  • Keep track of the count of terms generated and stop when 'X' terms are found.

  • Return the list of 'X' terms that meet the criteria.

  • Example: For X = 4, the output should be [5, 11, 14, 17].

View 1 answer

Q3. Reverse the String Problem Statement

You are given a string STR which contains alphabets, numbers, and special characters. Your task is to reverse the string.

Example:

Input:
STR = "abcde"
Output:
"edcba"

Input...read more

Ans.

The task is to reverse a given string containing alphanumeric and special characters.

  • Iterate through the string from the last character to the first character

  • Append each character to a new string to get the reversed string

  • Return the reversed string as the output

Add your answer

Q4. What do you know about machine intelligence? Have you heard Google Assistant?

Ans.

Machine intelligence refers to the ability of machines to learn and make decisions without explicit programming.

  • Machine intelligence involves the use of algorithms and statistical models to enable machines to learn from data and make predictions or decisions.

  • Google Assistant is an example of machine intelligence, as it uses natural language processing and machine learning to understand and respond to user queries.

  • Other examples of machine intelligence include self-driving car...read more

View 6 more answers
Discover Bounteous x Accolite interview dos and don'ts from real experiences

Q5. Reverse Array Elements

Given an array containing 'N' elements, the task is to reverse the order of all array elements and display the reversed array.

Explanation:

The elements of the given array need to be rear...read more

Ans.

Reverse the order of elements in an array and display the reversed array.

  • Iterate through the array from both ends and swap the elements until the middle is reached.

  • Use a temporary variable to store the element being swapped.

  • Print the reversed array after all elements have been swapped.

Add your answer

Q6. Slot Game Problem Statement

You are given a slot machine with four slots, each containing one of the colors Red (R), Yellow (Y), Green (G), or Blue (B). You must guess the colors without prior knowledge. For ea...read more

Ans.

Calculate total score based on guessing colors in a slot machine.

  • Iterate through each slot in the original and guess strings to compare colors.

  • Count perfect hits when color matches in correct slot, and pseudo-hits when color matches in different slot.

  • Calculate total score by adding perfect hits and pseudo-hits.

  • Handle edge cases like invalid input strings or exceeding constraints.

Add your answer
Are these interview questions helpful?

Q7. Tiling Problem Statement

Given a board with 2 rows and N columns, and an infinite supply of 2x1 tiles, determine the number of distinct ways to completely cover the board using these tiles.

You can place each t...read more

Ans.

The problem involves finding the number of ways to tile a 2xN board using 2x1 tiles.

  • Use dynamic programming to solve this problem efficiently.

  • Define a recursive function to calculate the number of ways to tile the board.

  • Consider both horizontal and vertical placements of tiles.

  • Implement the function to handle large values of N using modulo arithmetic.

  • Example: For N = 4, the number of ways to tile the board is 5.

View 1 answer

Q8. 1. What is oops concepts 2. Explain inheritance with example and how to prevent inheritance in Java?. 3. What is sealed, final, static keywords in Java 4. Implement Fibonacci, factorials, prime no. 5. Return al...

read more
Ans.

This interview question covers various topics in Java programming, including OOP concepts, inheritance, keywords, and implementing mathematical algorithms.

  • OOP concepts include encapsulation, inheritance, polymorphism, and abstraction.

  • Inheritance allows a class to inherit properties and methods from another class.

  • To prevent inheritance in Java, use the 'final' keyword before the class declaration.

  • Sealed, final, and static are keywords in Java with different functionalities.

  • Imp...read more

View 2 more answers
Share interview questions and help millions of jobseekers 🌟

Q9. selenium: what are selenium components, what are the different locators in selenium, what is selenium web driver, write a xpath for a given element on a web page

Ans.

Selenium components include Selenium IDE, Selenium RC, Selenium WebDriver. Different locators are ID, Name, Class Name, Tag Name, Link Text, Partial Link Text, CSS Selector and XPath. Selenium WebDriver is a tool used to automate web application testing. XPath is a language used to navigate through XML documents and web pages.

  • Selenium components: Selenium IDE, Selenium RC, Selenium WebDriver

  • Different locators: ID, Name, Class Name, Tag Name, Link Text, Partial Link Text, CSS ...read more

View 4 more answers

Q10. What is the IDisposal? Give an example used in the applicstion.

Ans.

IDisposable is an interface used to release unmanaged resources.

  • It is used to release unmanaged resources like file handles, database connections, etc.

  • It has a single method called Dispose() which is used to release the resources.

  • It is implemented by classes that use unmanaged resources and needs to be disposed of.

  • Example: SqlConnection class implements IDisposable to release the database connection.

  • Example: FileStream class implements IDisposable to release the file handle.

Add your answer

Q11. Left Rotations of an Array

Given an array of size N and Q queries, each query requires left rotating the original array by a specified number of elements. Return the modified array for each query.

Input:

The fi...read more
Ans.

Rotate an array left by a specified number of elements for each query.

  • Parse input: read number of test cases, array size, queries, and array elements

  • For each query, left rotate the array by the specified number of elements

  • Return the modified array for each query

Add your answer

Q12. What is Solid Principle? Give the examples used in your application.

Ans.

SOLID is a set of principles for object-oriented programming to make software more maintainable and scalable.

  • S - Single Responsibility Principle

  • O - Open/Closed Principle

  • L - Liskov Substitution Principle

  • I - Interface Segregation Principle

  • D - Dependency Inversion Principle

  • Example: Using Single Responsibility Principle to separate UI and business logic

  • Example: Using Open/Closed Principle to extend functionality without modifying existing code

Add your answer

Q13. How you will handle Exceptions in Spring Boot?

Ans.

Exceptions in Spring Boot can be handled using @ExceptionHandler annotation and ResponseEntity class.

  • Use @ExceptionHandler annotation to handle exceptions in a specific controller or globally

  • Use ResponseEntity class to return a custom error message and HTTP status code

  • Use try-catch block to handle exceptions in service layer

  • Use @ControllerAdvice annotation to handle exceptions globally across all controllers

  • Use @ResponseStatus annotation to set a default HTTP status code for ...read more

Add your answer

Q14. Middle of a Linked List

You are given the head node of a singly linked list. Your task is to return a pointer pointing to the middle of the linked list.

If there is an odd number of elements, return the middle ...read more

Ans.

Return the middle element of a singly linked list, or the one farther from the head if there are even elements.

  • Traverse the linked list with two pointers, one moving twice as fast as the other

  • When the fast pointer reaches the end, the slow pointer will be at the middle

  • If there are even elements, return the one that is farther from the head node

  • Handle edge cases like linked list of size 1 or empty list

Add your answer

Q15. code to find the occurence of character in a string.

Ans.

Code to find the occurrence of a character in a string.

  • Iterate through the string and check each character against the target character.

  • Use a loop to count the number of occurrences.

  • Consider using built-in functions like count() or find().

Add your answer

Q16. Write the code to concatenate the value with comma in the given array. int[] arr = {1, 2, 3,4,5}

Ans.

Concatenate the values in the given integer array with comma.

  • Convert the integer array to string array using Arrays.toString()

  • Use String.join() method to concatenate with comma

Add your answer

Q17. What is inheritance, abstract class, override, Interface and everything in oops.

Ans.

Inheritance, abstract class, override, and interface are all concepts in object-oriented programming.

  • Inheritance allows a class to inherit properties and methods from another class.

  • Abstract classes cannot be instantiated and are used as a blueprint for other classes.

  • Override is used to provide a new implementation for a method that is already defined in a parent class.

  • Interfaces define a set of methods that a class must implement.

  • All of these concepts are used to create modul...read more

Add your answer

Q18. php caching techniques, how session works in PHP? What are the security to prevent token hijack in API?

Ans.

PHP caching, session handling, and API token security

  • PHP caching techniques include opcode caching, data caching, and query caching

  • Session handling in PHP involves creating a unique session ID for each user and storing session data on the server

  • To prevent token hijacking in APIs, use HTTPS, set expiration times for tokens, and use token revocation

  • Other security measures include input validation, output encoding, and using secure coding practices

Add your answer

Q19. Pair Sum Problem Statement

You are given an integer array 'ARR' of size 'N' and an integer 'S'. Your task is to find and return a list of all pairs of elements where each sum of a pair equals 'S'.

Note:

Each pa...read more

Ans.

Given an array and a target sum, find pairs of elements that add up to the target sum.

  • Iterate through the array and for each element, check if the complement (target sum - current element) exists in a hash set.

  • If the complement exists, add the pair to the result list.

  • Sort the result list based on the first element of each pair, and then the second element if the first elements are equal.

Add your answer

Q20. What is Dependency Injection and how can we inplement those?

Ans.

Dependency Injection is a design pattern that allows objects to receive dependencies rather than creating them internally.

  • Dependency Injection is used to reduce tight coupling between software components.

  • It allows for easier testing and maintenance of code.

  • There are three types of Dependency Injection: Constructor Injection, Setter Injection, and Interface Injection.

  • Frameworks like Spring and Angular provide built-in support for Dependency Injection.

Add your answer

Q21. How do you convert json object to string and vice versa?

Ans.

To convert JSON object to string, use JSON.stringify(). To convert string to JSON object, use JSON.parse().

  • JSON.stringify() method converts a JavaScript object or value to a JSON string.

  • JSON.parse() method parses a JSON string and returns a JavaScript object.

  • Example: var obj = {name: 'John', age: 30}; var jsonString = JSON.stringify(obj); var jsonObj = JSON.parse(jsonString);

  • Make sure the JSON string is valid, else it will throw an error.

Add your answer

Q22. N Queens Problem

Given an integer N, find all possible placements of N queens on an N x N chessboard such that no two queens threaten each other.

Explanation:

A queen can attack another queen if they are in the...read more

Ans.

The N Queens Problem involves finding all possible placements of N queens on an N x N chessboard where no two queens threaten each other.

  • Understand the constraints of the problem: N represents the size of the chessboard and the number of queens, and queens can attack each other if they are in the same row, column, or diagonal.

  • Implement a backtracking algorithm to explore all possible configurations of queen placements without conflicts.

  • Ensure that each valid configuration is ...read more

Add your answer

Q23. Robot Framework : what are standard libraries in Robot Framework? Explain robot framework architechture, what is setup and teardown, write a sample login script using robot framework?

Ans.

Answering questions related to Robot Framework and its standard libraries, architecture, setup and teardown, and a sample login script.

  • Standard libraries in Robot Framework include BuiltIn, Collections, DateTime, Dialogs, OperatingSystem, Process, Screenshot, String, Telnet, and XML.

  • Robot Framework architecture consists of test cases, test suites, and keywords.

  • Setup and teardown are pre and post conditions for test cases.

  • Sample login script using Robot Framework:

  • Open Browser ...read more

View 1 answer

Q24. Is it possible to instanciate the abstract class? Explain.

Ans.

No, abstract classes cannot be instantiated.

  • Abstract classes are incomplete and cannot be instantiated on their own.

  • They can only be used as a base class for other classes.

  • Instantiation of an abstract class will result in a compile-time error.

  • However, concrete classes that inherit from the abstract class can be instantiated.

Add your answer
Q25. What is meant by an interface in Object-Oriented Programming?
Ans.

An interface in OOP defines a contract for classes to implement, specifying methods without implementation details.

  • An interface contains method signatures without any implementation.

  • Classes can implement multiple interfaces in Java.

  • Interfaces are used to achieve abstraction and multiple inheritance in OOP.

  • Example: Java interface 'Runnable' with 'run()' method.

View 1 answer

Q26. Write a program to find the elements of a list that have least difference in python? input = [3,9,50,15,99,7,98,65] output = [98,99]

Ans.

Program to find elements of a list with least difference in Python

  • Sort the list

  • Find the minimum difference between adjacent elements

  • Return the elements with minimum difference

Add your answer
Q27. What are the different types of EC2 instances based on their costs?
Ans.

Different types of EC2 instances based on costs include On-Demand Instances, Reserved Instances, and Spot Instances.

  • On-Demand Instances: Pay for compute capacity by the hour or second with no long-term commitments.

  • Reserved Instances: Reserved capacity for 1 or 3 years, offering significant discounts compared to On-Demand pricing.

  • Spot Instances: Bid on spare Amazon EC2 computing capacity, often available at a fraction of the cost of On-Demand instances.

View 1 answer

Q28. What are your views on Demonetisation in India?

Ans.

Demonetisation in India was a bold move with mixed results.

  • Demonetisation aimed to curb black money, corruption and counterfeit currency.

  • It caused inconvenience to the common people, especially those in rural areas.

  • The move led to a temporary slowdown in the economy.

  • Digital transactions and tax compliance increased.

  • However, the amount of black money recovered was not significant.

  • The informal sector and small businesses were hit hard.

  • Overall, demonetisation had both positive a...read more

Add your answer

Q29. What do you know about the constructors and destructors?

Ans.

Constructors and destructors are special methods used in object-oriented programming languages to initialize and destroy objects.

  • Constructors are used to initialize objects when they are created.

  • Destructors are used to clean up resources used by an object when it is destroyed.

  • Constructors have the same name as the class and are called automatically when an object is created.

  • Destructors have the same name as the class preceded by a tilde (~) and are called automatically when a...read more

Add your answer
Q30. What command can be run to import a pre-exported Docker image into another Docker host?
Ans.

The command to import a pre-exported Docker image into another Docker host is 'docker load'.

  • Use the 'docker load' command followed by the file path of the exported image to import it into the new Docker host.

  • For example, 'docker load < exported_image.tar' will import the image from the file 'exported_image.tar'.

View 1 answer

Q31. MySql: what are store procedures, Indexes and virtual tables.

Ans.

Store procedures, indexes, and virtual tables are important features of MySql.

  • Store procedures are pre-written code blocks that can be executed on demand.

  • Indexes are used to speed up database queries by creating a quick lookup table.

  • Virtual tables are temporary tables that are created on the fly and do not persist in the database.

  • Examples of store procedures include creating a new user or updating a record.

  • Examples of indexes include primary keys, unique keys, and full-text i...read more

Add your answer

Q32. Code to check the strings are anagram or not

Ans.

Code to check if two strings are anagram or not

  • An anagram is a word or phrase formed by rearranging the letters of a different word or phrase

  • To check if two strings are anagram, we can sort both strings and compare them

  • Alternatively, we can use a hash table to count the frequency of each character in both strings and compare the counts

Add your answer
Q33. Write a query to retrieve the first four characters of EmpLname from the given EmployeeInfo table.
Ans.

Query to retrieve the first four characters of EmpLname from EmployeeInfo table.

  • Use the SUBSTRING function in SQL to extract the first four characters of EmpLname.

  • The query should be like: SELECT SUBSTRING(EmpLname, 1, 4) FROM EmployeeInfo;

  • Make sure to adjust the column name and table name according to the actual database schema.

Add your answer

Q34. How can we remove duplicate objects from array of multiple objects.

Ans.

Remove duplicate objects from an array of multiple objects.

  • Create a new array to store unique objects

  • Loop through the original array and check if the object already exists in the new array

  • If not, add it to the new array

  • Return the new array

Add your answer

Q35. What is AI ? Where can we use it ?

Ans.

AI stands for Artificial Intelligence. It is a branch of computer science that focuses on creating intelligent machines.

  • AI is the simulation of human intelligence in machines that are programmed to think and learn like humans.

  • It involves the development of algorithms and models that enable machines to perform tasks that typically require human intelligence.

  • AI can be used in various fields such as healthcare, finance, transportation, education, and entertainment.

  • In healthcare,...read more

View 1 answer

Q36. Explain about the design pattern used in your application.

Ans.

We used the Model-View-Controller (MVC) design pattern in our application.

  • MVC separates the application into three interconnected components: the model, the view, and the controller.

  • The model represents the data and business logic of the application.

  • The view displays the data to the user.

  • The controller handles user input and updates the model and view accordingly.

  • MVC promotes separation of concerns and modularity.

  • Example: Our web application uses AngularJS as the front-end fr...read more

Add your answer
Q37. What is the difference between an abstract class and an interface in OOP?
Ans.

Abstract class can have both abstract and non-abstract methods, while interface can only have abstract methods.

  • Abstract class can have constructors, member variables, and methods with implementation.

  • Interface can only have abstract methods and constants.

  • A class can implement multiple interfaces but can only inherit from one abstract class.

  • Example: Abstract class - Animal with abstract method 'eat', Interface - Flyable with method 'fly'.

Add your answer
Q38. What is the difference between CMD and ENTRYPOINT in a Dockerfile?
Ans.

CMD specifies the default command to run when a container is started, while ENTRYPOINT specifies the executable to run when the container starts.

  • CMD can be overridden at runtime by passing arguments to docker run command

  • ENTRYPOINT cannot be overridden at runtime, but arguments can be passed to it using docker run command

  • CMD is often used for specifying the main application to run in the container

  • ENTRYPOINT is commonly used for defining the executable that runs the main applic...read more

Add your answer

Q39. What’s the diff b/w comparator and comparable

Ans.

Comparator is used to compare objects of different classes while Comparable is used to compare objects of the same class.

  • Comparator is an interface that needs to be implemented to compare objects of different classes.

  • Comparable is an interface that needs to be implemented to compare objects of the same class.

  • Comparator uses compare() method while Comparable uses compareTo() method.

  • Comparator can be used to sort a collection in any order while Comparable can only sort in natur...read more

Add your answer

Q40. What is serialisation and serialisation where actually it used?

Ans.

Serialisation is the process of converting an object into a format that can be easily stored or transmitted.

  • Serialisation is used in data storage and transmission, allowing objects to be saved to a file or sent over a network.

  • It is commonly used in programming languages to convert objects into a byte stream for storage or communication.

  • Examples include saving an object to a file in JSON or XML format, or sending an object over a network using protocols like HTTP.

Add your answer

Q41. 1.What is primary foreign key 2. Explain ACID properties 3. Return 3 rd maximum salary 4. One SQL query on join 5. IN In SQL 6. Let var const in JS 7. what is proto in JS 8. Explain closure in JS

Ans.

Answers to interview questions for Software Engineer Trainee

  • Primary foreign key is a column in a table that is used to link to the primary key of another table

  • ACID properties are Atomicity, Consistency, Isolation, and Durability which ensure database transactions are reliable

  • To return 3rd maximum salary, use the LIMIT and OFFSET clauses in SQL

  • SQL join is used to combine data from two or more tables based on a related column

  • IN in SQL is used to specify multiple values in a WHE...read more

Add your answer

Q42. what are the locators in selenium? what is the difference between driver.quit and drive.close? What is implicit wait and explicit wait ?

Ans.

Answers to common Selenium interview questions.

  • Locators in Selenium are used to identify web elements on a web page. Examples include ID, class name, name, tag name, link text, and partial link text.

  • driver.quit() closes the entire browser window and ends the WebDriver session, while driver.close() only closes the current window or tab.

  • Implicit wait is a global wait that applies to all web elements and waits for a specified amount of time before throwing an exception if the el...read more

Add your answer
Q43. Can you explain the SOLID principles in Object-Oriented Design?
Ans.

SOLID principles are a set of five design principles in object-oriented programming to make software designs more understandable, flexible, and maintainable.

  • S - Single Responsibility Principle: A class should have only one reason to change.

  • O - Open/Closed Principle: Software entities should be open for extension but closed for modification.

  • L - Liskov Substitution Principle: Objects of a superclass should be replaceable with objects of its subclasses without affecting the func...read more

Add your answer

Q44. What is globallogic and self introduction

Ans.

GlobalLogic is a digital product engineering company that provides software development and design services.

  • GlobalLogic was founded in 2000 and has over 16,000 employees in 30+ locations worldwide.

  • They work with companies in various industries such as automotive, healthcare, and finance.

  • Their services include product engineering, digital transformation, and customer experience design.

  • Some of their clients include Reuters, Philips, and Qualcomm.

  • As for my self introduction, my ...read more

Add your answer

Q45. Explaination of Interface and Abstract classes.

Ans.

Interfaces and abstract classes are used for abstraction and defining contracts.

  • Interfaces are a collection of abstract methods that define a contract for a class to implement.

  • Abstract classes are classes that cannot be instantiated and can have both abstract and concrete methods.

  • Interfaces can be implemented by multiple classes, while a class can only inherit from one abstract class.

  • Interfaces are used for loose coupling and to achieve multiple inheritance-like behavior.

  • Abst...read more

View 1 answer
Q46. What is the use of lifecycle hooks in Auto Scaling?
Ans.

Lifecycle hooks in Auto Scaling allow you to perform custom actions before instances launch or terminate.

  • Lifecycle hooks can be used to pause the instance launch process to perform custom actions, such as bootstrapping or configuration setup.

  • They can also be used to pause the instance termination process to allow for data backup or graceful shutdown.

  • By using lifecycle hooks, you can ensure that your instances are properly configured and prepared before they become fully opera...read more

Add your answer

Q47. What do you understand by Cash flow statement

Ans.

Cash flow statement is a financial statement that shows the inflows and outflows of cash in a business over a specific period of time.

  • It provides information on how well a company manages its cash position.

  • It consists of three main sections: operating activities, investing activities, and financing activities.

  • Operating activities include cash received from sales, payments to suppliers, and salaries paid to employees.

  • Investing activities include cash spent on purchasing assets...read more

View 1 answer
Q48. How do you delete duplicates from a table in SQL Server?
Ans.

Use a common table expression (CTE) with ROW_NUMBER() function to delete duplicates from a table in SQL Server.

  • Create a CTE with ROW_NUMBER() function to assign a unique row number to each row based on the duplicate column(s)

  • Use the DELETE statement with the CTE to delete rows where the row number is greater than 1

Add your answer

Q49. image in pop up how would you redirect user to a different website without using events(using setTimeout()) finding 7th highest salary from a table in sql duplicating tables in sql immediately invoked function...

read more
Ans.

Technical interview questions for Associate Software Engineer position

  • To redirect user to a different website without using events, use window.location.replace() method

  • To find 7th highest salary from a table in SQL, use subquery or join with itself

  • To duplicate tables in SQL, use CREATE TABLE AS or SELECT INTO statement

  • Immediately invoked function is a function that is executed as soon as it is defined

  • To change array element of array defined by const keyword in JavaScript, use...read more

Add your answer
Q50. Can you describe the lifecycle of a Docker container?
Ans.

The lifecycle of a Docker container involves creation, running, pausing, stopping, and deletion.

  • Creation: Docker container is created from an image using 'docker run' command.

  • Running: Container is started and runs the specified application or service.

  • Pausing: Container can be paused using 'docker pause' command to temporarily stop its processes.

  • Stopping: Container can be stopped using 'docker stop' command, which halts its processes.

  • Deletion: Container is removed using 'docke...read more

Add your answer

Q51. What is Artificial Intelligence

Ans.

Artificial Intelligence is the simulation of human intelligence in machines.

  • AI involves creating intelligent machines that can perform tasks without human intervention

  • It includes machine learning, natural language processing, and robotics

  • Examples include Siri, Alexa, and self-driving cars

Add your answer

Q52. How to maintain state if code if repeated one.

Ans.

Maintain state by using a global variable or a state management system.

  • Use a global variable to store the state and access it whenever needed.

  • Use a state management system like Redux or MobX to manage the state.

  • Avoid using local variables or closures to store state as they will be lost when the code is repeated.

  • Consider using object-oriented programming principles to encapsulate state within objects.

  • Use functional programming principles to avoid mutating state directly.

  • Consid...read more

Add your answer

Q53. How to trigger the Job in Jenkins and How to configure

Ans.

To trigger a job in Jenkins, configure a build trigger and specify the source code repository.

  • Configure a build trigger such as a schedule or webhook

  • Specify the source code repository to pull code from

  • Set up any necessary build steps or scripts

  • Ensure proper permissions and credentials are set up

  • Test the job to ensure it runs successfully

Add your answer
Q54. Can you explain the ETL process in a data warehouse?
Ans.

ETL process involves extracting data from various sources, transforming it to fit the data warehouse schema, and loading it into the warehouse.

  • Extract: Data is extracted from different sources such as databases, files, APIs, etc.

  • Transform: Data is cleaned, filtered, aggregated, and transformed to match the data warehouse schema.

  • Load: Transformed data is loaded into the data warehouse for analysis and reporting.

  • Example: Extracting sales data from a CRM system, transforming it ...read more

Add your answer
Q55. What do you mean by virtual functions in C++?
Ans.

Virtual functions in C++ allow a function to be overridden in a derived class, enabling polymorphic behavior.

  • Virtual functions are declared in a base class with the 'virtual' keyword.

  • They are overridden in derived classes to provide specific implementations.

  • Virtual functions enable polymorphism, allowing objects of different derived classes to be treated as objects of the base class.

  • Example: class Animal { virtual void makeSound() { cout << 'Animal sound'; } }; class Dog : pu...read more

Add your answer
Q56. What is the difference between a Fact Table and a Dimension Table in a Data Warehouse?
Ans.

Fact Table contains quantitative data and measures, while Dimension Table contains descriptive attributes.

  • Fact Table contains numerical data that can be aggregated, such as sales revenue or quantity sold

  • Dimension Table contains descriptive attributes for analysis, such as product name or customer details

  • Fact Table typically has a many-to-one relationship with Dimension Table

  • Fact Table is usually normalized, while Dimension Table is denormalized for faster query performance

Add your answer

Q57. Dsa question- move all the zeroes to left and 1s to the right

Ans.

Move all zeroes to left and ones to right in an array

  • Iterate through the array from both ends

  • Swap the elements if left is 1 and right is 0

  • Stop when left and right pointers meet

Add your answer

Q58. What is full text index?

Ans.

Full text index is a database index that allows for efficient text-based searching.

  • Full text index is used to search for specific words or phrases within a large amount of text data.

  • It is commonly used in search engines, document management systems, and social media platforms.

  • Full text index can be created on one or more columns of a table in a database.

  • It uses techniques such as stemming, stop words, and word proximity to improve search accuracy.

  • Examples of databases that su...read more

Add your answer

Q59. What are lists and its functions?

Ans.

Lists are a collection of ordered and changeable elements. They have various functions to manipulate the data.

  • Lists are created using square brackets []

  • They can contain any data type such as strings, integers, or even other lists

  • Functions include append(), insert(), remove(), pop(), sort(), and reverse()

  • Example: my_list = ['apple', 'banana', 'cherry']

  • Example: my_list.append('orange') adds 'orange' to the end of the list

Add your answer

Q60. How do you migrate code from one language to another

Ans.

Code migration involves understanding the existing codebase, planning the migration process, translating code to the new language, testing thoroughly, and ensuring compatibility.

  • Understand the existing codebase thoroughly to identify dependencies, logic, and functionality.

  • Plan the migration process by breaking it down into smaller tasks, setting timelines, and allocating resources.

  • Translate the code to the new language by rewriting or using automated tools like transpilers.

  • Te...read more

Add your answer

Q61. 4. How to delete duplicate rows based on key in a table?

Ans.

To delete duplicate rows based on key in a table, use the DELETE statement with a subquery.

  • Identify the key column(s) that define the uniqueness of a row

  • Use the GROUP BY clause to group the rows by the key column(s)

  • Use the HAVING clause to filter out the groups that have more than one row

  • Use the subquery to select the duplicate rows to be deleted

  • Use the DELETE statement with the subquery to delete the duplicate rows

Add your answer
Q62. What is the difference between INNER JOIN and OUTER JOIN in SQL?
Ans.

INNER JOIN returns rows when there is at least one match in both tables, while OUTER JOIN returns all rows from both tables.

  • INNER JOIN only returns rows that have matching values in both tables

  • OUTER JOIN returns all rows from both tables, filling in NULLs for unmatched rows

  • Types of OUTER JOIN include LEFT JOIN, RIGHT JOIN, and FULL JOIN

  • Example: SELECT * FROM table1 INNER JOIN table2 ON table1.id = table2.id

  • Example: SELECT * FROM table1 LEFT JOIN table2 ON table1.id = table2.i...read more

Add your answer

Q63. what is Interface and Java 8 feature in Inter face?

Ans.

An interface is a collection of abstract methods. Java 8 introduced default and static methods in interfaces.

  • Interface is a blueprint for classes to implement its methods

  • Java 8 introduced default methods which provide a default implementation for methods in an interface

  • Static methods can also be defined in interfaces

  • Example: interface MyInterface { void method1(); default void method2() { //default implementation } static void method3() { //static implementation }}

Add your answer
Q64. When should you use Git rebase or Git merge?
Ans.

Git rebase is used to maintain a linear project history, while Git merge is used to combine branches.

  • Use Git rebase when you want to maintain a clean and linear project history.

  • Use Git merge when you want to combine branches while preserving the commit history.

  • Rebasing is useful for keeping feature branches up to date with the main branch.

  • Merging is useful for integrating changes from multiple branches into a single branch.

  • Rebasing can lead to a cleaner history but can cause ...read more

Add your answer

Q65. Difference between Compile Time Polymorphism and Runtime Polymorphism

Ans.

Compile time polymorphism is achieved through function overloading and operator overloading, while runtime polymorphism is achieved through function overriding using virtual functions.

  • Compile time polymorphism is resolved during compile time based on the number and types of arguments passed to a function.

  • Runtime polymorphism is resolved during runtime based on the actual object being referred to by a base class pointer or reference.

  • Compile time polymorphism is also known as s...read more

Add your answer

Q66. Write Java Program to Reverse given String. By sharing Screen.

Ans.

Java program to reverse a given string using StringBuilder

  • Create a StringBuilder object with the given string

  • Use the reverse() method of StringBuilder to reverse the string

  • Convert the reversed StringBuilder object back to a string

Add your answer

Q67. What is POM and implementation in project?

Ans.

POM stands for Page Object Model. It is a design pattern used in automation testing to create object repositories for web UI elements.

  • POM separates the UI elements and the test scripts, making the code more modular and maintainable.

  • It helps in reducing code duplication and improves code reusability.

  • POM also makes it easier to update the UI elements in case of any changes in the application.

  • Implementation of POM involves creating a separate class for each web page, defining th...read more

Add your answer

Q68. Give me some examples for AI

Ans.

AI refers to the simulation of human intelligence in machines that are programmed to think and learn.

  • Virtual personal assistants like Siri and Alexa

  • Recommendation systems like Netflix and Amazon

  • Autonomous vehicles like self-driving cars

  • Natural language processing used in chatbots

  • Image recognition and computer vision technologies

  • Fraud detection systems in banking

  • AI-powered medical diagnosis and treatment systems

Add your answer

Q69. difference between php 5 and php 7?

Ans.

PHP 7 is faster, more secure and has new features compared to PHP 5.

  • PHP 7 has improved performance with up to 2x faster execution

  • PHP 7 has better error handling and type declarations

  • PHP 7 has new operators and functions like spaceship operator and null coalescing operator

  • PHP 7 has removed deprecated features like mysql extension

  • PHP 7 has improved support for Unicode

  • PHP 7 requires 64-bit architecture

  • PHP 7 has improved memory usage

  • PHP 7 has improved support for anonymous classe...read more

Add your answer

Q70. Use of pointer in C Storage class in C Memory layout in C little and big endian program how find Com stack and COM-SM

Ans.

Pointers in C are used to store memory addresses, storage classes determine the scope and lifetime of variables, memory layout refers to how data is organized in memory, endianness refers to byte order, COM stack is a communication protocol.

  • Pointers in C are used to store memory addresses of variables.

  • Storage classes in C determine the scope and lifetime of variables.

  • Memory layout in C refers to how data is organized in memory.

  • Endianness in C refers to the byte order of multi...read more

Add your answer

Q71. API testing using rest assured and types of assertion.

Ans.

Rest assured is a Java library used for API testing. Types of assertion include status code, response body, and header.

  • Rest assured is a popular Java library used for API testing

  • It simplifies the process of sending HTTP requests and verifying the response

  • Types of assertion include status code, response body, and header

  • Status code assertion checks if the response code is as expected

  • Response body assertion checks if the response body contains expected values

  • Header assertion che...read more

Add your answer
Q72. Can you explain Amazon EC2 in brief?
Ans.

Amazon EC2 is a web service that provides resizable compute capacity in the cloud.

  • Amazon EC2 stands for Elastic Compute Cloud

  • It allows users to rent virtual servers on which to run their own applications

  • Users can choose from a variety of instance types with different CPU, memory, storage, and networking capacities

  • EC2 instances can be easily scaled up or down based on demand

  • Users only pay for the compute capacity they actually use

Add your answer

Q73. Write a program to print the duplicate character in a string?

Ans.

Program to print duplicate characters in a string

  • Create a map to store characters and their counts

  • Iterate through the string and update the map

  • Print characters with count > 1 as duplicates

Add your answer
Q74. What do you know about git stash?
Ans.

Git stash is a command in Git that temporarily shelves changes you've made to your working directory.

  • Git stash is used to save changes that are not ready to be committed yet.

  • It allows you to switch branches without committing changes.

  • You can apply the stashed changes later on using 'git stash apply'.

  • You can list all stashed changes with 'git stash list'.

  • You can remove stashed changes with 'git stash drop'.

Add your answer

Q75. What is SLA, Incident, Service request. Incident and Problem Management.

Add your answer

Q76. Memory leakage, how to avoid and identify

Ans.

Memory leakage can cause app crashes and slow performance. It can be avoided by proper memory management and identifying the root cause.

  • Avoid creating unnecessary objects

  • Release unused resources

  • Use memory profiling tools like Android Profiler

  • Avoid static references to objects

  • Use weak references when necessary

Add your answer

Q77. what is diff b/w HTML5 vs HTML?

Ans.

HTML5 is the latest version of HTML with new features and improvements.

  • HTML5 supports new elements like <header>, <footer>, <nav>, <article>, <section> etc.

  • HTML5 introduces new APIs like Geolocation API, Drag and Drop API, Canvas API, Web Storage API, etc.

  • HTML5 supports multimedia elements like <audio> and <video> without the need for plugins.

  • HTML5 has improved semantics, accessibility, and performance compared to HTML.

  • HTML5 supports offline web applications through the use o...read more

Add your answer

Q78. GIT commands and how to create project in git?

Ans.

GIT commands and project creation in GIT

  • GIT commands: add, commit, push, pull, clone, branch, merge

  • To create a project in GIT: initialize a repository, add files, commit changes, create a remote repository, push changes to remote repository

  • Example: git init, git add ., git commit -m 'initial commit', create a repository on GitHub, git remote add origin , git push -u origin master

Add your answer

Q79. What is sql definition and uses?

Ans.

SQL is a programming language used for managing and manipulating relational databases.

  • SQL stands for Structured Query Language.

  • It is used to communicate with and manipulate databases.

  • SQL can be used to retrieve data, update data, insert data, and delete data from databases.

  • Common SQL commands include SELECT, INSERT, UPDATE, DELETE.

  • Examples of SQL database systems include MySQL, PostgreSQL, Oracle, SQL Server.

Add your answer

Q80. Count number of occurences of characters in a string

Ans.

Count occurrences of characters in a string

  • Iterate through the string and use a hashmap to store character counts

  • Handle both uppercase and lowercase characters separately

  • Consider using ASCII values for efficient counting

Add your answer

Q81. Oops Analytical program any from array or string Garbage collection Use of Static and private class and members

Ans.

Answering questions on analytical programs, garbage collection, and use of static and private class and members.

  • Analytical programs can manipulate arrays and strings to extract useful information.

  • Garbage collection is an automatic process of freeing up memory used by objects that are no longer needed.

  • Static and private class and members are used to control access to certain variables and methods within a class.

  • Static members are shared across all instances of a class, while p...read more

Add your answer

Q82. What is AI and examples

Ans.

AI stands for Artificial Intelligence, which refers to the simulation of human intelligence in machines.

  • AI is used in various fields such as healthcare, finance, transportation, and entertainment.

  • Examples of AI include virtual assistants like Siri and Alexa, self-driving cars, facial recognition technology, and chatbots.

  • AI can be categorized into three types: narrow or weak AI, general AI, and super AI.

  • AI technologies include machine learning, natural language processing, and...read more

Add your answer

Q83. What is difference between fall fast and fall safe.

Ans.

Fall fast refers to failing quickly and early in the development process, while fall safe refers to implementing safety measures to prevent failures.

  • Fall fast involves identifying and addressing issues early on in the development cycle.

  • Fall safe involves implementing safety measures such as error handling and redundancy to prevent failures.

  • An example of fall fast is using automated testing to catch bugs early in the development process.

  • An example of fall safe is implementing ...read more

Add your answer

Q84. How will you improve performance of legacy app which has to work with your latest microservice.

Ans.

Improve legacy app performance by optimizing code, implementing caching, and scaling resources.

  • Optimize code by identifying and removing bottlenecks

  • Implement caching to reduce database calls and improve response time

  • Scale resources by using containers or serverless architecture

  • Use asynchronous processing for long-running tasks

  • Upgrade hardware or infrastructure if necessary

Add your answer

Q85. How to handle alerts and capture the screenshots?

Ans.

Alerts can be handled using automation tools and screenshots can be captured using built-in functions or third-party libraries.

  • Use automation tools like Selenium or Appium to handle alerts in web or mobile applications respectively.

  • For capturing screenshots, use built-in functions like 'screenshot' in Selenium or third-party libraries like 'Puppeteer' in Node.js.

  • Save the screenshots with appropriate names and in a designated folder for easy access and reference.

  • Include the ca...read more

Add your answer

Q86. Given a scenario what techniques you would apply to resolve and how do you convey bad results to client

Ans.

Utilize problem-solving techniques and communicate bad results professionally to clients.

  • Analyze the scenario to identify root causes

  • Develop a plan of action to address the issue

  • Communicate openly and honestly with the client

  • Provide alternative solutions if possible

  • Offer support and assistance in implementing the resolution

  • Follow up with the client to ensure satisfaction

Add your answer

Q87. Load Balancer types , difference between application load balancer and network load balancer

Ans.

Application Load Balancer and Network Load Balancer are two types of load balancers used in cloud computing.

  • Application Load Balancer operates at the application layer and is used to distribute traffic to multiple targets based on the content of the request.

  • Network Load Balancer operates at the transport layer and is used to distribute traffic to multiple targets based on IP protocol data.

  • Application Load Balancer supports HTTP/HTTPS protocols and can route traffic based on U...read more

Add your answer

Q88. Docker Files. Difference between CMD and ENTRYPOINT ,ADD and COPY instructions

Ans.

CMD and ENTRYPOINT are used to define the default command to run in a container. ADD and COPY are used to add files to a container.

  • CMD is used to specify the default command to run when a container is started. It can be overridden by passing a command to docker run.

  • ENTRYPOINT is similar to CMD, but it is not overridden by passing a command to docker run. It is used to define the main command that should be run in the container.

  • ADD and COPY are used to add files to a container...read more

Add your answer

Q89. 5. What are the differences between fact and dimension?

Ans.

Fact and dimension are two types of data in a data warehouse.

  • Fact is a measurable event that can be analyzed, while dimension provides context to the fact.

  • Fact is quantitative, while dimension is qualitative.

  • Fact is stored in a fact table, while dimension is stored in a dimension table.

  • Examples of fact include sales, revenue, and profit, while examples of dimension include time, location, and product.

  • Fact and dimension are used in data modeling to create a star schema or snow...read more

Add your answer

Q90. 3.How to implement SCDs and different between them?

Ans.

SCDs are used to track changes in data over time. There are three types: Type 1, Type 2, and Type 3.

  • Type 1 SCDs overwrite old data with new data.

  • Type 2 SCDs add a new row for each change, with a start and end date.

  • Type 3 SCDs add columns to the existing row to track changes.

  • SCDs are commonly used in data warehousing and business intelligence.

  • The choice of SCD type depends on the specific use case and data requirements.

Add your answer
Q91. What do you mean by a degenerate dimension?
Ans.

A degenerate dimension is a dimension that consists of only one attribute or column.

  • It is typically used when a dimension table has only one column and no other attributes.

  • It is often denormalized and included directly in the fact table.

  • Example: a date dimension with only a date column can be considered a degenerate dimension.

Add your answer
Q92. What is the difference between OLAP and OLTP?
Ans.

OLAP is used for analyzing historical data for decision-making, while OLTP is used for managing real-time transactional data.

  • OLAP stands for Online Analytical Processing, used for complex queries and data analysis.

  • OLTP stands for Online Transaction Processing, used for managing real-time transactional data.

  • OLAP databases are optimized for read-heavy workloads, while OLTP databases are optimized for write-heavy workloads.

  • OLAP databases typically have denormalized data structur...read more

Add your answer
Q93. Can you explain piping in Unix/Linux?
Ans.

Piping in Unix/Linux allows output of one command to be used as input for another command.

  • Piping is done using the | symbol in Unix/Linux.

  • It allows for the output of one command to be directly used as input for another command.

  • Piping can be used to chain multiple commands together to perform complex operations.

  • Example: ls -l | grep 'txt' - This command lists files in long format and then filters for files with 'txt' in their name.

Add your answer

Q94. What is quick sort in data structure?

Ans.

Quick sort is a sorting algorithm that uses divide and conquer approach to sort an array or list.

  • It selects a pivot element and partitions the other elements into two sub-arrays, according to whether they are less than or greater than the pivot.

  • It then recursively sorts the sub-arrays.

  • It is a very efficient sorting algorithm with an average time complexity of O(n log n).

Add your answer

Q95. Whats a knowledge box?

Ans.

A knowledge box is a tool used to organize and store information for easy access and retrieval.

  • It can be physical or digital

  • It can contain information on a specific topic or subject

  • It can be used for personal or professional purposes

  • Examples include a file cabinet, a computer folder, or a wiki page

Add your answer

Q96. What is java and explain it's concepts.

Ans.

Java is a high-level programming language known for its portability, security, and object-oriented features.

  • Java is platform-independent, meaning it can run on any device with a Java Virtual Machine (JVM).

  • It is object-oriented, allowing for the creation of reusable code through classes and objects.

  • Java is known for its security features, such as sandboxing and encryption.

  • It supports multithreading, allowing for concurrent execution of multiple tasks.

  • Java has a rich standard l...read more

Add your answer

Q97. 2.How to differentiate outer and inner joins with sample data?

Ans.

Outer join returns all records from one table and matching records from another, while inner join returns only matching records.

  • Outer join uses the (+) symbol in Oracle and LEFT/RIGHT OUTER JOIN in SQL Server

  • Inner join uses INNER JOIN keyword in SQL

  • Sample data: Table A has 5 records, Table B has 3 records, Outer join returns 8 records while Inner join returns 3 records

Add your answer

Q98. Tell me about special variables used in Shell Scripting ?

Ans.

Special variables in Shell Scripting

  • Special variables are predefined variables in shell scripts

  • They provide information about the script and its environment

  • Examples include $0 (name of the script), $1-$9 (arguments passed to the script), and $# (number of arguments)

  • Other special variables include $?, $$ (process ID of the script), and $! (process ID of the last background command)

Add your answer

Q99. Name the google application you know

Ans.

Google Maps - a web mapping service developed by Google

  • Provides satellite imagery, street maps, panoramic views, and route planning

  • Used for navigation, finding local businesses, and exploring new places

  • Available on desktop and mobile devices

Add your answer

Q100. How to handle dropdown using selenium?

Ans.

Dropdowns can be handled using Select class in Selenium.

  • Locate the dropdown element using any of the locators available in Selenium

  • Create an object of Select class and pass the dropdown element as argument

  • Use selectByVisibleText(), selectByValue() or selectByIndex() methods to select an option

  • Use getOptions() method to get all the options in the dropdown

  • Use isMultiple() method to check if the dropdown allows multiple selections

Add your answer
1
2
3
4
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos

Interview Process at Bounteous x Accolite

based on 525 interviews
Interview experience
4.0
Good
View more
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Interview Questions from Similar Companies

3.8
 • 1.5k Interview Questions
3.4
 • 653 Interview Questions
4.0
 • 158 Interview Questions
4.2
 • 156 Interview Questions
4.1
 • 148 Interview Questions
4.3
 • 138 Interview Questions
View all
Top GlobalLogic Interview Questions And Answers
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
70 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter