GlobalLogic
300+ FinIQ Consulting Interview Questions and Answers
Q1. MapSum Pair Implementation
Create a data structure named 'MapSum' with the ability to perform two operations and a constructor.
Explanation:
MapSum()
: Initializes the MapSum.insert(...read more
The question asks to implement a data structure called 'MapSum' with functions to initialize, insert key-value pairs, and find the sum of values with a given prefix.
Implement a class called 'MapSum' with a constructor to initialize the data structure.
Implement the 'insert' function to insert key-value pairs into the 'MapSum'. If a key is already present, replace its value with the new one.
Implement the 'sum' function to find the sum of values whose key has a prefix equal to t...read more
Q2. Find Terms of Series Problem
Ayush is tasked with determining the first 'X' terms of the series defined by 3 * N + 2, ensuring that no term is a multiple of 4.
Input:
The first line contains a single integer 'T...read more
Generate the first 'X' terms of a series 3 * N + 2, excluding multiples of 4.
Iterate through numbers starting from 1 and check if 3 * N + 2 is not a multiple of 4.
Keep track of the count of terms generated and stop when 'X' terms are found.
Return the list of 'X' terms that meet the criteria.
Example: For X = 4, the output should be [5, 11, 14, 17].
Q3. Reverse the String Problem Statement
You are given a string STR
which contains alphabets, numbers, and special characters. Your task is to reverse the string.
Example:
Input:
STR = "abcde"
Output:
"edcba"
Input...read more
The task is to reverse a given string containing alphanumeric and special characters.
Iterate through the string from the last character to the first character
Append each character to a new string to get the reversed string
Return the reversed string as the output
Q4. What do you know about machine intelligence? Have you heard Google Assistant?
Machine intelligence refers to the ability of machines to learn and make decisions without explicit programming.
Machine intelligence involves the use of algorithms and statistical models to enable machines to learn from data and make predictions or decisions.
Google Assistant is an example of machine intelligence, as it uses natural language processing and machine learning to understand and respond to user queries.
Other examples of machine intelligence include self-driving car...read more
Q5. Reverse Array Elements
Given an array containing 'N' elements, the task is to reverse the order of all array elements and display the reversed array.
Explanation:
The elements of the given array need to be rear...read more
Reverse the order of elements in an array and display the reversed array.
Iterate through the array from both ends and swap the elements until the middle is reached.
Use a temporary variable to store the element being swapped.
Print the reversed array after all elements have been swapped.
Q6. Slot Game Problem Statement
You are given a slot machine with four slots, each containing one of the colors Red (R), Yellow (Y), Green (G), or Blue (B). You must guess the colors without prior knowledge. For ea...read more
Calculate total score based on guessing colors in a slot machine.
Iterate through each slot in the original and guess strings to compare colors.
Count perfect hits when color matches in correct slot, and pseudo-hits when color matches in different slot.
Calculate total score by adding perfect hits and pseudo-hits.
Handle edge cases like invalid input strings or exceeding constraints.
Q7. Tiling Problem Statement
Given a board with 2 rows and N columns, and an infinite supply of 2x1 tiles, determine the number of distinct ways to completely cover the board using these tiles.
You can place each t...read more
The problem involves finding the number of ways to tile a 2xN board using 2x1 tiles.
Use dynamic programming to solve this problem efficiently.
Define a recursive function to calculate the number of ways to tile the board.
Consider both horizontal and vertical placements of tiles.
Implement the function to handle large values of N using modulo arithmetic.
Example: For N = 4, the number of ways to tile the board is 5.
Q8. 1. What is oops concepts 2. Explain inheritance with example and how to prevent inheritance in Java?. 3. What is sealed, final, static keywords in Java 4. Implement Fibonacci, factorials, prime no. 5. Return al...
read moreThis interview question covers various topics in Java programming, including OOP concepts, inheritance, keywords, and implementing mathematical algorithms.
OOP concepts include encapsulation, inheritance, polymorphism, and abstraction.
Inheritance allows a class to inherit properties and methods from another class.
To prevent inheritance in Java, use the 'final' keyword before the class declaration.
Sealed, final, and static are keywords in Java with different functionalities.
Imp...read more
Q9. selenium: what are selenium components, what are the different locators in selenium, what is selenium web driver, write a xpath for a given element on a web page
Selenium components include Selenium IDE, Selenium RC, Selenium WebDriver. Different locators are ID, Name, Class Name, Tag Name, Link Text, Partial Link Text, CSS Selector and XPath. Selenium WebDriver is a tool used to automate web application testing. XPath is a language used to navigate through XML documents and web pages.
Selenium components: Selenium IDE, Selenium RC, Selenium WebDriver
Different locators: ID, Name, Class Name, Tag Name, Link Text, Partial Link Text, CSS ...read more
Q10. What is the IDisposal? Give an example used in the applicstion.
IDisposable is an interface used to release unmanaged resources.
It is used to release unmanaged resources like file handles, database connections, etc.
It has a single method called Dispose() which is used to release the resources.
It is implemented by classes that use unmanaged resources and needs to be disposed of.
Example: SqlConnection class implements IDisposable to release the database connection.
Example: FileStream class implements IDisposable to release the file handle.
Q11. Left Rotations of an Array
Given an array of size N
and Q
queries, each query requires left rotating the original array by a specified number of elements. Return the modified array for each query.
Input:
The fi...read more
Rotate an array left by a specified number of elements for each query.
Parse input: read number of test cases, array size, queries, and array elements
For each query, left rotate the array by the specified number of elements
Return the modified array for each query
Q12. What is Solid Principle? Give the examples used in your application.
SOLID is a set of principles for object-oriented programming to make software more maintainable and scalable.
S - Single Responsibility Principle
O - Open/Closed Principle
L - Liskov Substitution Principle
I - Interface Segregation Principle
D - Dependency Inversion Principle
Example: Using Single Responsibility Principle to separate UI and business logic
Example: Using Open/Closed Principle to extend functionality without modifying existing code
Q13. How you will handle Exceptions in Spring Boot?
Exceptions in Spring Boot can be handled using @ExceptionHandler annotation and ResponseEntity class.
Use @ExceptionHandler annotation to handle exceptions in a specific controller or globally
Use ResponseEntity class to return a custom error message and HTTP status code
Use try-catch block to handle exceptions in service layer
Use @ControllerAdvice annotation to handle exceptions globally across all controllers
Use @ResponseStatus annotation to set a default HTTP status code for ...read more
Q14. Middle of a Linked List
You are given the head node of a singly linked list. Your task is to return a pointer pointing to the middle of the linked list.
If there is an odd number of elements, return the middle ...read more
Return the middle element of a singly linked list, or the one farther from the head if there are even elements.
Traverse the linked list with two pointers, one moving twice as fast as the other
When the fast pointer reaches the end, the slow pointer will be at the middle
If there are even elements, return the one that is farther from the head node
Handle edge cases like linked list of size 1 or empty list
Q15. code to find the occurence of character in a string.
Code to find the occurrence of a character in a string.
Iterate through the string and check each character against the target character.
Use a loop to count the number of occurrences.
Consider using built-in functions like count() or find().
Q16. Write the code to concatenate the value with comma in the given array. int[] arr = {1, 2, 3,4,5}
Concatenate the values in the given integer array with comma.
Convert the integer array to string array using Arrays.toString()
Use String.join() method to concatenate with comma
Q17. What is inheritance, abstract class, override, Interface and everything in oops.
Inheritance, abstract class, override, and interface are all concepts in object-oriented programming.
Inheritance allows a class to inherit properties and methods from another class.
Abstract classes cannot be instantiated and are used as a blueprint for other classes.
Override is used to provide a new implementation for a method that is already defined in a parent class.
Interfaces define a set of methods that a class must implement.
All of these concepts are used to create modul...read more
Q18. php caching techniques, how session works in PHP? What are the security to prevent token hijack in API?
PHP caching, session handling, and API token security
PHP caching techniques include opcode caching, data caching, and query caching
Session handling in PHP involves creating a unique session ID for each user and storing session data on the server
To prevent token hijacking in APIs, use HTTPS, set expiration times for tokens, and use token revocation
Other security measures include input validation, output encoding, and using secure coding practices
Q19. Pair Sum Problem Statement
You are given an integer array 'ARR' of size 'N' and an integer 'S'. Your task is to find and return a list of all pairs of elements where each sum of a pair equals 'S'.
Note:
Each pa...read more
Given an array and a target sum, find pairs of elements that add up to the target sum.
Iterate through the array and for each element, check if the complement (target sum - current element) exists in a hash set.
If the complement exists, add the pair to the result list.
Sort the result list based on the first element of each pair, and then the second element if the first elements are equal.
Q20. What is Dependency Injection and how can we inplement those?
Dependency Injection is a design pattern that allows objects to receive dependencies rather than creating them internally.
Dependency Injection is used to reduce tight coupling between software components.
It allows for easier testing and maintenance of code.
There are three types of Dependency Injection: Constructor Injection, Setter Injection, and Interface Injection.
Frameworks like Spring and Angular provide built-in support for Dependency Injection.
Q21. How do you convert json object to string and vice versa?
To convert JSON object to string, use JSON.stringify(). To convert string to JSON object, use JSON.parse().
JSON.stringify() method converts a JavaScript object or value to a JSON string.
JSON.parse() method parses a JSON string and returns a JavaScript object.
Example: var obj = {name: 'John', age: 30}; var jsonString = JSON.stringify(obj); var jsonObj = JSON.parse(jsonString);
Make sure the JSON string is valid, else it will throw an error.
Q22. N Queens Problem
Given an integer N
, find all possible placements of N
queens on an N x N
chessboard such that no two queens threaten each other.
Explanation:
A queen can attack another queen if they are in the...read more
The N Queens Problem involves finding all possible placements of N queens on an N x N chessboard where no two queens threaten each other.
Understand the constraints of the problem: N represents the size of the chessboard and the number of queens, and queens can attack each other if they are in the same row, column, or diagonal.
Implement a backtracking algorithm to explore all possible configurations of queen placements without conflicts.
Ensure that each valid configuration is ...read more
Q23. Robot Framework : what are standard libraries in Robot Framework? Explain robot framework architechture, what is setup and teardown, write a sample login script using robot framework?
Answering questions related to Robot Framework and its standard libraries, architecture, setup and teardown, and a sample login script.
Standard libraries in Robot Framework include BuiltIn, Collections, DateTime, Dialogs, OperatingSystem, Process, Screenshot, String, Telnet, and XML.
Robot Framework architecture consists of test cases, test suites, and keywords.
Setup and teardown are pre and post conditions for test cases.
Sample login script using Robot Framework:
Open Browser ...read more
Q24. Is it possible to instanciate the abstract class? Explain.
No, abstract classes cannot be instantiated.
Abstract classes are incomplete and cannot be instantiated on their own.
They can only be used as a base class for other classes.
Instantiation of an abstract class will result in a compile-time error.
However, concrete classes that inherit from the abstract class can be instantiated.
An interface in OOP defines a contract for classes to implement, specifying methods without implementation details.
An interface contains method signatures without any implementation.
Classes can implement multiple interfaces in Java.
Interfaces are used to achieve abstraction and multiple inheritance in OOP.
Example: Java interface 'Runnable' with 'run()' method.
Q26. Write a program to find the elements of a list that have least difference in python? input = [3,9,50,15,99,7,98,65] output = [98,99]
Program to find elements of a list with least difference in Python
Sort the list
Find the minimum difference between adjacent elements
Return the elements with minimum difference
Different types of EC2 instances based on costs include On-Demand Instances, Reserved Instances, and Spot Instances.
On-Demand Instances: Pay for compute capacity by the hour or second with no long-term commitments.
Reserved Instances: Reserved capacity for 1 or 3 years, offering significant discounts compared to On-Demand pricing.
Spot Instances: Bid on spare Amazon EC2 computing capacity, often available at a fraction of the cost of On-Demand instances.
Q28. What are your views on Demonetisation in India?
Demonetisation in India was a bold move with mixed results.
Demonetisation aimed to curb black money, corruption and counterfeit currency.
It caused inconvenience to the common people, especially those in rural areas.
The move led to a temporary slowdown in the economy.
Digital transactions and tax compliance increased.
However, the amount of black money recovered was not significant.
The informal sector and small businesses were hit hard.
Overall, demonetisation had both positive a...read more
Q29. What do you know about the constructors and destructors?
Constructors and destructors are special methods used in object-oriented programming languages to initialize and destroy objects.
Constructors are used to initialize objects when they are created.
Destructors are used to clean up resources used by an object when it is destroyed.
Constructors have the same name as the class and are called automatically when an object is created.
Destructors have the same name as the class preceded by a tilde (~) and are called automatically when a...read more
The command to import a pre-exported Docker image into another Docker host is 'docker load'.
Use the 'docker load' command followed by the file path of the exported image to import it into the new Docker host.
For example, 'docker load < exported_image.tar' will import the image from the file 'exported_image.tar'.
Q31. MySql: what are store procedures, Indexes and virtual tables.
Store procedures, indexes, and virtual tables are important features of MySql.
Store procedures are pre-written code blocks that can be executed on demand.
Indexes are used to speed up database queries by creating a quick lookup table.
Virtual tables are temporary tables that are created on the fly and do not persist in the database.
Examples of store procedures include creating a new user or updating a record.
Examples of indexes include primary keys, unique keys, and full-text i...read more
Q32. Code to check the strings are anagram or not
Code to check if two strings are anagram or not
An anagram is a word or phrase formed by rearranging the letters of a different word or phrase
To check if two strings are anagram, we can sort both strings and compare them
Alternatively, we can use a hash table to count the frequency of each character in both strings and compare the counts
Query to retrieve the first four characters of EmpLname from EmployeeInfo table.
Use the SUBSTRING function in SQL to extract the first four characters of EmpLname.
The query should be like: SELECT SUBSTRING(EmpLname, 1, 4) FROM EmployeeInfo;
Make sure to adjust the column name and table name according to the actual database schema.
Q34. How can we remove duplicate objects from array of multiple objects.
Remove duplicate objects from an array of multiple objects.
Create a new array to store unique objects
Loop through the original array and check if the object already exists in the new array
If not, add it to the new array
Return the new array
Q35. What is AI ? Where can we use it ?
AI stands for Artificial Intelligence. It is a branch of computer science that focuses on creating intelligent machines.
AI is the simulation of human intelligence in machines that are programmed to think and learn like humans.
It involves the development of algorithms and models that enable machines to perform tasks that typically require human intelligence.
AI can be used in various fields such as healthcare, finance, transportation, education, and entertainment.
In healthcare,...read more
Q36. Explain about the design pattern used in your application.
We used the Model-View-Controller (MVC) design pattern in our application.
MVC separates the application into three interconnected components: the model, the view, and the controller.
The model represents the data and business logic of the application.
The view displays the data to the user.
The controller handles user input and updates the model and view accordingly.
MVC promotes separation of concerns and modularity.
Example: Our web application uses AngularJS as the front-end fr...read more
Abstract class can have both abstract and non-abstract methods, while interface can only have abstract methods.
Abstract class can have constructors, member variables, and methods with implementation.
Interface can only have abstract methods and constants.
A class can implement multiple interfaces but can only inherit from one abstract class.
Example: Abstract class - Animal with abstract method 'eat', Interface - Flyable with method 'fly'.
CMD specifies the default command to run when a container is started, while ENTRYPOINT specifies the executable to run when the container starts.
CMD can be overridden at runtime by passing arguments to docker run command
ENTRYPOINT cannot be overridden at runtime, but arguments can be passed to it using docker run command
CMD is often used for specifying the main application to run in the container
ENTRYPOINT is commonly used for defining the executable that runs the main applic...read more
Q39. What’s the diff b/w comparator and comparable
Comparator is used to compare objects of different classes while Comparable is used to compare objects of the same class.
Comparator is an interface that needs to be implemented to compare objects of different classes.
Comparable is an interface that needs to be implemented to compare objects of the same class.
Comparator uses compare() method while Comparable uses compareTo() method.
Comparator can be used to sort a collection in any order while Comparable can only sort in natur...read more
Q40. What is serialisation and serialisation where actually it used?
Serialisation is the process of converting an object into a format that can be easily stored or transmitted.
Serialisation is used in data storage and transmission, allowing objects to be saved to a file or sent over a network.
It is commonly used in programming languages to convert objects into a byte stream for storage or communication.
Examples include saving an object to a file in JSON or XML format, or sending an object over a network using protocols like HTTP.
Q41. 1.What is primary foreign key 2. Explain ACID properties 3. Return 3 rd maximum salary 4. One SQL query on join 5. IN In SQL 6. Let var const in JS 7. what is proto in JS 8. Explain closure in JS
Answers to interview questions for Software Engineer Trainee
Primary foreign key is a column in a table that is used to link to the primary key of another table
ACID properties are Atomicity, Consistency, Isolation, and Durability which ensure database transactions are reliable
To return 3rd maximum salary, use the LIMIT and OFFSET clauses in SQL
SQL join is used to combine data from two or more tables based on a related column
IN in SQL is used to specify multiple values in a WHE...read more
Q42. what are the locators in selenium? what is the difference between driver.quit and drive.close? What is implicit wait and explicit wait ?
Answers to common Selenium interview questions.
Locators in Selenium are used to identify web elements on a web page. Examples include ID, class name, name, tag name, link text, and partial link text.
driver.quit() closes the entire browser window and ends the WebDriver session, while driver.close() only closes the current window or tab.
Implicit wait is a global wait that applies to all web elements and waits for a specified amount of time before throwing an exception if the el...read more
SOLID principles are a set of five design principles in object-oriented programming to make software designs more understandable, flexible, and maintainable.
S - Single Responsibility Principle: A class should have only one reason to change.
O - Open/Closed Principle: Software entities should be open for extension but closed for modification.
L - Liskov Substitution Principle: Objects of a superclass should be replaceable with objects of its subclasses without affecting the func...read more
Q44. What is globallogic and self introduction
GlobalLogic is a digital product engineering company that provides software development and design services.
GlobalLogic was founded in 2000 and has over 16,000 employees in 30+ locations worldwide.
They work with companies in various industries such as automotive, healthcare, and finance.
Their services include product engineering, digital transformation, and customer experience design.
Some of their clients include Reuters, Philips, and Qualcomm.
As for my self introduction, my ...read more
Q45. Explaination of Interface and Abstract classes.
Interfaces and abstract classes are used for abstraction and defining contracts.
Interfaces are a collection of abstract methods that define a contract for a class to implement.
Abstract classes are classes that cannot be instantiated and can have both abstract and concrete methods.
Interfaces can be implemented by multiple classes, while a class can only inherit from one abstract class.
Interfaces are used for loose coupling and to achieve multiple inheritance-like behavior.
Abst...read more
Lifecycle hooks in Auto Scaling allow you to perform custom actions before instances launch or terminate.
Lifecycle hooks can be used to pause the instance launch process to perform custom actions, such as bootstrapping or configuration setup.
They can also be used to pause the instance termination process to allow for data backup or graceful shutdown.
By using lifecycle hooks, you can ensure that your instances are properly configured and prepared before they become fully opera...read more
Q47. What do you understand by Cash flow statement
Cash flow statement is a financial statement that shows the inflows and outflows of cash in a business over a specific period of time.
It provides information on how well a company manages its cash position.
It consists of three main sections: operating activities, investing activities, and financing activities.
Operating activities include cash received from sales, payments to suppliers, and salaries paid to employees.
Investing activities include cash spent on purchasing assets...read more
Use a common table expression (CTE) with ROW_NUMBER() function to delete duplicates from a table in SQL Server.
Create a CTE with ROW_NUMBER() function to assign a unique row number to each row based on the duplicate column(s)
Use the DELETE statement with the CTE to delete rows where the row number is greater than 1
Q49. image in pop up how would you redirect user to a different website without using events(using setTimeout()) finding 7th highest salary from a table in sql duplicating tables in sql immediately invoked function...
read moreTechnical interview questions for Associate Software Engineer position
To redirect user to a different website without using events, use window.location.replace() method
To find 7th highest salary from a table in SQL, use subquery or join with itself
To duplicate tables in SQL, use CREATE TABLE AS or SELECT INTO statement
Immediately invoked function is a function that is executed as soon as it is defined
To change array element of array defined by const keyword in JavaScript, use...read more
The lifecycle of a Docker container involves creation, running, pausing, stopping, and deletion.
Creation: Docker container is created from an image using 'docker run' command.
Running: Container is started and runs the specified application or service.
Pausing: Container can be paused using 'docker pause' command to temporarily stop its processes.
Stopping: Container can be stopped using 'docker stop' command, which halts its processes.
Deletion: Container is removed using 'docke...read more
Q51. What is Artificial Intelligence
Artificial Intelligence is the simulation of human intelligence in machines.
AI involves creating intelligent machines that can perform tasks without human intervention
It includes machine learning, natural language processing, and robotics
Examples include Siri, Alexa, and self-driving cars
Q52. How to maintain state if code if repeated one.
Maintain state by using a global variable or a state management system.
Use a global variable to store the state and access it whenever needed.
Use a state management system like Redux or MobX to manage the state.
Avoid using local variables or closures to store state as they will be lost when the code is repeated.
Consider using object-oriented programming principles to encapsulate state within objects.
Use functional programming principles to avoid mutating state directly.
Consid...read more
Q53. How to trigger the Job in Jenkins and How to configure
To trigger a job in Jenkins, configure a build trigger and specify the source code repository.
Configure a build trigger such as a schedule or webhook
Specify the source code repository to pull code from
Set up any necessary build steps or scripts
Ensure proper permissions and credentials are set up
Test the job to ensure it runs successfully
ETL process involves extracting data from various sources, transforming it to fit the data warehouse schema, and loading it into the warehouse.
Extract: Data is extracted from different sources such as databases, files, APIs, etc.
Transform: Data is cleaned, filtered, aggregated, and transformed to match the data warehouse schema.
Load: Transformed data is loaded into the data warehouse for analysis and reporting.
Example: Extracting sales data from a CRM system, transforming it ...read more
Virtual functions in C++ allow a function to be overridden in a derived class, enabling polymorphic behavior.
Virtual functions are declared in a base class with the 'virtual' keyword.
They are overridden in derived classes to provide specific implementations.
Virtual functions enable polymorphism, allowing objects of different derived classes to be treated as objects of the base class.
Example: class Animal { virtual void makeSound() { cout << 'Animal sound'; } }; class Dog : pu...read more
Fact Table contains quantitative data and measures, while Dimension Table contains descriptive attributes.
Fact Table contains numerical data that can be aggregated, such as sales revenue or quantity sold
Dimension Table contains descriptive attributes for analysis, such as product name or customer details
Fact Table typically has a many-to-one relationship with Dimension Table
Fact Table is usually normalized, while Dimension Table is denormalized for faster query performance
Q57. Dsa question- move all the zeroes to left and 1s to the right
Move all zeroes to left and ones to right in an array
Iterate through the array from both ends
Swap the elements if left is 1 and right is 0
Stop when left and right pointers meet
Q58. What is full text index?
Full text index is a database index that allows for efficient text-based searching.
Full text index is used to search for specific words or phrases within a large amount of text data.
It is commonly used in search engines, document management systems, and social media platforms.
Full text index can be created on one or more columns of a table in a database.
It uses techniques such as stemming, stop words, and word proximity to improve search accuracy.
Examples of databases that su...read more
Q59. What are lists and its functions?
Lists are a collection of ordered and changeable elements. They have various functions to manipulate the data.
Lists are created using square brackets []
They can contain any data type such as strings, integers, or even other lists
Functions include append(), insert(), remove(), pop(), sort(), and reverse()
Example: my_list = ['apple', 'banana', 'cherry']
Example: my_list.append('orange') adds 'orange' to the end of the list
Q60. How do you migrate code from one language to another
Code migration involves understanding the existing codebase, planning the migration process, translating code to the new language, testing thoroughly, and ensuring compatibility.
Understand the existing codebase thoroughly to identify dependencies, logic, and functionality.
Plan the migration process by breaking it down into smaller tasks, setting timelines, and allocating resources.
Translate the code to the new language by rewriting or using automated tools like transpilers.
Te...read more
Q61. 4. How to delete duplicate rows based on key in a table?
To delete duplicate rows based on key in a table, use the DELETE statement with a subquery.
Identify the key column(s) that define the uniqueness of a row
Use the GROUP BY clause to group the rows by the key column(s)
Use the HAVING clause to filter out the groups that have more than one row
Use the subquery to select the duplicate rows to be deleted
Use the DELETE statement with the subquery to delete the duplicate rows
INNER JOIN returns rows when there is at least one match in both tables, while OUTER JOIN returns all rows from both tables.
INNER JOIN only returns rows that have matching values in both tables
OUTER JOIN returns all rows from both tables, filling in NULLs for unmatched rows
Types of OUTER JOIN include LEFT JOIN, RIGHT JOIN, and FULL JOIN
Example: SELECT * FROM table1 INNER JOIN table2 ON table1.id = table2.id
Example: SELECT * FROM table1 LEFT JOIN table2 ON table1.id = table2.i...read more
Q63. what is Interface and Java 8 feature in Inter face?
An interface is a collection of abstract methods. Java 8 introduced default and static methods in interfaces.
Interface is a blueprint for classes to implement its methods
Java 8 introduced default methods which provide a default implementation for methods in an interface
Static methods can also be defined in interfaces
Example: interface MyInterface { void method1(); default void method2() { //default implementation } static void method3() { //static implementation }}
Git rebase is used to maintain a linear project history, while Git merge is used to combine branches.
Use Git rebase when you want to maintain a clean and linear project history.
Use Git merge when you want to combine branches while preserving the commit history.
Rebasing is useful for keeping feature branches up to date with the main branch.
Merging is useful for integrating changes from multiple branches into a single branch.
Rebasing can lead to a cleaner history but can cause ...read more
Q65. Difference between Compile Time Polymorphism and Runtime Polymorphism
Compile time polymorphism is achieved through function overloading and operator overloading, while runtime polymorphism is achieved through function overriding using virtual functions.
Compile time polymorphism is resolved during compile time based on the number and types of arguments passed to a function.
Runtime polymorphism is resolved during runtime based on the actual object being referred to by a base class pointer or reference.
Compile time polymorphism is also known as s...read more
Q66. Write Java Program to Reverse given String. By sharing Screen.
Java program to reverse a given string using StringBuilder
Create a StringBuilder object with the given string
Use the reverse() method of StringBuilder to reverse the string
Convert the reversed StringBuilder object back to a string
Q67. What is POM and implementation in project?
POM stands for Page Object Model. It is a design pattern used in automation testing to create object repositories for web UI elements.
POM separates the UI elements and the test scripts, making the code more modular and maintainable.
It helps in reducing code duplication and improves code reusability.
POM also makes it easier to update the UI elements in case of any changes in the application.
Implementation of POM involves creating a separate class for each web page, defining th...read more
Q68. Give me some examples for AI
AI refers to the simulation of human intelligence in machines that are programmed to think and learn.
Virtual personal assistants like Siri and Alexa
Recommendation systems like Netflix and Amazon
Autonomous vehicles like self-driving cars
Natural language processing used in chatbots
Image recognition and computer vision technologies
Fraud detection systems in banking
AI-powered medical diagnosis and treatment systems
Q69. difference between php 5 and php 7?
PHP 7 is faster, more secure and has new features compared to PHP 5.
PHP 7 has improved performance with up to 2x faster execution
PHP 7 has better error handling and type declarations
PHP 7 has new operators and functions like spaceship operator and null coalescing operator
PHP 7 has removed deprecated features like mysql extension
PHP 7 has improved support for Unicode
PHP 7 requires 64-bit architecture
PHP 7 has improved memory usage
PHP 7 has improved support for anonymous classe...read more
Q70. Use of pointer in C Storage class in C Memory layout in C little and big endian program how find Com stack and COM-SM
Pointers in C are used to store memory addresses, storage classes determine the scope and lifetime of variables, memory layout refers to how data is organized in memory, endianness refers to byte order, COM stack is a communication protocol.
Pointers in C are used to store memory addresses of variables.
Storage classes in C determine the scope and lifetime of variables.
Memory layout in C refers to how data is organized in memory.
Endianness in C refers to the byte order of multi...read more
Q71. API testing using rest assured and types of assertion.
Rest assured is a Java library used for API testing. Types of assertion include status code, response body, and header.
Rest assured is a popular Java library used for API testing
It simplifies the process of sending HTTP requests and verifying the response
Types of assertion include status code, response body, and header
Status code assertion checks if the response code is as expected
Response body assertion checks if the response body contains expected values
Header assertion che...read more
Amazon EC2 is a web service that provides resizable compute capacity in the cloud.
Amazon EC2 stands for Elastic Compute Cloud
It allows users to rent virtual servers on which to run their own applications
Users can choose from a variety of instance types with different CPU, memory, storage, and networking capacities
EC2 instances can be easily scaled up or down based on demand
Users only pay for the compute capacity they actually use
Q73. Write a program to print the duplicate character in a string?
Program to print duplicate characters in a string
Create a map to store characters and their counts
Iterate through the string and update the map
Print characters with count > 1 as duplicates
Git stash is a command in Git that temporarily shelves changes you've made to your working directory.
Git stash is used to save changes that are not ready to be committed yet.
It allows you to switch branches without committing changes.
You can apply the stashed changes later on using 'git stash apply'.
You can list all stashed changes with 'git stash list'.
You can remove stashed changes with 'git stash drop'.
Q75. What is SLA, Incident, Service request. Incident and Problem Management.
Q76. Memory leakage, how to avoid and identify
Memory leakage can cause app crashes and slow performance. It can be avoided by proper memory management and identifying the root cause.
Avoid creating unnecessary objects
Release unused resources
Use memory profiling tools like Android Profiler
Avoid static references to objects
Use weak references when necessary
Q77. what is diff b/w HTML5 vs HTML?
HTML5 is the latest version of HTML with new features and improvements.
HTML5 supports new elements like <header>, <footer>, <nav>, <article>, <section> etc.
HTML5 introduces new APIs like Geolocation API, Drag and Drop API, Canvas API, Web Storage API, etc.
HTML5 supports multimedia elements like <audio> and <video> without the need for plugins.
HTML5 has improved semantics, accessibility, and performance compared to HTML.
HTML5 supports offline web applications through the use o...read more
Q78. GIT commands and how to create project in git?
GIT commands and project creation in GIT
GIT commands: add, commit, push, pull, clone, branch, merge
To create a project in GIT: initialize a repository, add files, commit changes, create a remote repository, push changes to remote repository
Example: git init, git add ., git commit -m 'initial commit', create a repository on GitHub, git remote add origin
, git push -u origin master
Q79. What is sql definition and uses?
SQL is a programming language used for managing and manipulating relational databases.
SQL stands for Structured Query Language.
It is used to communicate with and manipulate databases.
SQL can be used to retrieve data, update data, insert data, and delete data from databases.
Common SQL commands include SELECT, INSERT, UPDATE, DELETE.
Examples of SQL database systems include MySQL, PostgreSQL, Oracle, SQL Server.
Q80. Count number of occurences of characters in a string
Count occurrences of characters in a string
Iterate through the string and use a hashmap to store character counts
Handle both uppercase and lowercase characters separately
Consider using ASCII values for efficient counting
Q81. Oops Analytical program any from array or string Garbage collection Use of Static and private class and members
Answering questions on analytical programs, garbage collection, and use of static and private class and members.
Analytical programs can manipulate arrays and strings to extract useful information.
Garbage collection is an automatic process of freeing up memory used by objects that are no longer needed.
Static and private class and members are used to control access to certain variables and methods within a class.
Static members are shared across all instances of a class, while p...read more
Q82. What is AI and examples
AI stands for Artificial Intelligence, which refers to the simulation of human intelligence in machines.
AI is used in various fields such as healthcare, finance, transportation, and entertainment.
Examples of AI include virtual assistants like Siri and Alexa, self-driving cars, facial recognition technology, and chatbots.
AI can be categorized into three types: narrow or weak AI, general AI, and super AI.
AI technologies include machine learning, natural language processing, and...read more
Q83. What is difference between fall fast and fall safe.
Fall fast refers to failing quickly and early in the development process, while fall safe refers to implementing safety measures to prevent failures.
Fall fast involves identifying and addressing issues early on in the development cycle.
Fall safe involves implementing safety measures such as error handling and redundancy to prevent failures.
An example of fall fast is using automated testing to catch bugs early in the development process.
An example of fall safe is implementing ...read more
Q84. How will you improve performance of legacy app which has to work with your latest microservice.
Improve legacy app performance by optimizing code, implementing caching, and scaling resources.
Optimize code by identifying and removing bottlenecks
Implement caching to reduce database calls and improve response time
Scale resources by using containers or serverless architecture
Use asynchronous processing for long-running tasks
Upgrade hardware or infrastructure if necessary
Q85. How to handle alerts and capture the screenshots?
Alerts can be handled using automation tools and screenshots can be captured using built-in functions or third-party libraries.
Use automation tools like Selenium or Appium to handle alerts in web or mobile applications respectively.
For capturing screenshots, use built-in functions like 'screenshot' in Selenium or third-party libraries like 'Puppeteer' in Node.js.
Save the screenshots with appropriate names and in a designated folder for easy access and reference.
Include the ca...read more
Q86. Given a scenario what techniques you would apply to resolve and how do you convey bad results to client
Utilize problem-solving techniques and communicate bad results professionally to clients.
Analyze the scenario to identify root causes
Develop a plan of action to address the issue
Communicate openly and honestly with the client
Provide alternative solutions if possible
Offer support and assistance in implementing the resolution
Follow up with the client to ensure satisfaction
Q87. Load Balancer types , difference between application load balancer and network load balancer
Application Load Balancer and Network Load Balancer are two types of load balancers used in cloud computing.
Application Load Balancer operates at the application layer and is used to distribute traffic to multiple targets based on the content of the request.
Network Load Balancer operates at the transport layer and is used to distribute traffic to multiple targets based on IP protocol data.
Application Load Balancer supports HTTP/HTTPS protocols and can route traffic based on U...read more
Q88. Docker Files. Difference between CMD and ENTRYPOINT ,ADD and COPY instructions
CMD and ENTRYPOINT are used to define the default command to run in a container. ADD and COPY are used to add files to a container.
CMD is used to specify the default command to run when a container is started. It can be overridden by passing a command to docker run.
ENTRYPOINT is similar to CMD, but it is not overridden by passing a command to docker run. It is used to define the main command that should be run in the container.
ADD and COPY are used to add files to a container...read more
Q89. 5. What are the differences between fact and dimension?
Fact and dimension are two types of data in a data warehouse.
Fact is a measurable event that can be analyzed, while dimension provides context to the fact.
Fact is quantitative, while dimension is qualitative.
Fact is stored in a fact table, while dimension is stored in a dimension table.
Examples of fact include sales, revenue, and profit, while examples of dimension include time, location, and product.
Fact and dimension are used in data modeling to create a star schema or snow...read more
Q90. 3.How to implement SCDs and different between them?
SCDs are used to track changes in data over time. There are three types: Type 1, Type 2, and Type 3.
Type 1 SCDs overwrite old data with new data.
Type 2 SCDs add a new row for each change, with a start and end date.
Type 3 SCDs add columns to the existing row to track changes.
SCDs are commonly used in data warehousing and business intelligence.
The choice of SCD type depends on the specific use case and data requirements.
A degenerate dimension is a dimension that consists of only one attribute or column.
It is typically used when a dimension table has only one column and no other attributes.
It is often denormalized and included directly in the fact table.
Example: a date dimension with only a date column can be considered a degenerate dimension.
OLAP is used for analyzing historical data for decision-making, while OLTP is used for managing real-time transactional data.
OLAP stands for Online Analytical Processing, used for complex queries and data analysis.
OLTP stands for Online Transaction Processing, used for managing real-time transactional data.
OLAP databases are optimized for read-heavy workloads, while OLTP databases are optimized for write-heavy workloads.
OLAP databases typically have denormalized data structur...read more
Piping in Unix/Linux allows output of one command to be used as input for another command.
Piping is done using the | symbol in Unix/Linux.
It allows for the output of one command to be directly used as input for another command.
Piping can be used to chain multiple commands together to perform complex operations.
Example: ls -l | grep 'txt' - This command lists files in long format and then filters for files with 'txt' in their name.
Q94. What is quick sort in data structure?
Quick sort is a sorting algorithm that uses divide and conquer approach to sort an array or list.
It selects a pivot element and partitions the other elements into two sub-arrays, according to whether they are less than or greater than the pivot.
It then recursively sorts the sub-arrays.
It is a very efficient sorting algorithm with an average time complexity of O(n log n).
Q95. Whats a knowledge box?
A knowledge box is a tool used to organize and store information for easy access and retrieval.
It can be physical or digital
It can contain information on a specific topic or subject
It can be used for personal or professional purposes
Examples include a file cabinet, a computer folder, or a wiki page
Q96. What is java and explain it's concepts.
Java is a high-level programming language known for its portability, security, and object-oriented features.
Java is platform-independent, meaning it can run on any device with a Java Virtual Machine (JVM).
It is object-oriented, allowing for the creation of reusable code through classes and objects.
Java is known for its security features, such as sandboxing and encryption.
It supports multithreading, allowing for concurrent execution of multiple tasks.
Java has a rich standard l...read more
Q97. 2.How to differentiate outer and inner joins with sample data?
Outer join returns all records from one table and matching records from another, while inner join returns only matching records.
Outer join uses the (+) symbol in Oracle and LEFT/RIGHT OUTER JOIN in SQL Server
Inner join uses INNER JOIN keyword in SQL
Sample data: Table A has 5 records, Table B has 3 records, Outer join returns 8 records while Inner join returns 3 records
Q98. Tell me about special variables used in Shell Scripting ?
Special variables in Shell Scripting
Special variables are predefined variables in shell scripts
They provide information about the script and its environment
Examples include $0 (name of the script), $1-$9 (arguments passed to the script), and $# (number of arguments)
Other special variables include $?, $$ (process ID of the script), and $! (process ID of the last background command)
Q99. Name the google application you know
Google Maps - a web mapping service developed by Google
Provides satellite imagery, street maps, panoramic views, and route planning
Used for navigation, finding local businesses, and exploring new places
Available on desktop and mobile devices
Q100. How to handle dropdown using selenium?
Dropdowns can be handled using Select class in Selenium.
Locate the dropdown element using any of the locators available in Selenium
Create an object of Select class and pass the dropdown element as argument
Use selectByVisibleText(), selectByValue() or selectByIndex() methods to select an option
Use getOptions() method to get all the options in the dropdown
Use isMultiple() method to check if the dropdown allows multiple selections
Top HR Questions asked in FinIQ Consulting
Interview Process at FinIQ Consulting
Top Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month