GlobalLogic
300+ Interview Questions and Answers
Q101. Name the google application you know
Google Maps - a web mapping service developed by Google
Provides satellite imagery, street maps, panoramic views, and route planning
Used for navigation, finding local businesses, and exploring new places
Available on desktop and mobile devices
Q102. How to handle dropdown using selenium?
Dropdowns can be handled using Select class in Selenium.
Locate the dropdown element using any of the locators available in Selenium
Create an object of Select class and pass the dropdown element as argument
Use selectByVisibleText(), selectByValue() or selectByIndex() methods to select an option
Use getOptions() method to get all the options in the dropdown
Use isMultiple() method to check if the dropdown allows multiple selections
Q103. Who has invented java language.
James Gosling, Mike Sheridan, and Patrick Naughton invented the Java language.
Invented by James Gosling, Mike Sheridan, and Patrick Naughton at Sun Microsystems in the early 1990s.
Java was originally developed to be used in consumer electronic devices like set-top boxes.
Released in 1995 as a core component of Sun Microsystems' Java platform.
Known for its platform independence, allowing code to run on any device that has a Java Virtual Machine (JVM).
Explain Amazon EC2 in brief.
Q105. what are different keys in sql
Different keys in SQL include primary key, foreign key, unique key, and composite key.
Primary key uniquely identifies each record in a table
Foreign key establishes a relationship between two tables
Unique key ensures that all values in a column are unique
Composite key is a combination of multiple columns to uniquely identify a record
Q106. What is the difference between TDD and BDD?
TDD focuses on testing the functionality of individual units of code, while BDD focuses on testing the behavior of the system as a whole.
TDD stands for Test-Driven Development, where tests are written before the code is implemented to drive the development process.
BDD stands for Behavior-Driven Development, where tests are written in a human-readable format to describe the behavior of the system.
TDD is more focused on the technical aspects of the code, ensuring that individua...read more
Q107. Difference between function and stored procedure
Function is a reusable block of code that returns a value, while stored procedure is a group of SQL statements that can be executed together.
Functions return a single value, while stored procedures can return multiple values.
Functions are called in SQL queries, while stored procedures are called using EXECUTE statement.
Functions cannot modify database state, while stored procedures can.
Functions are easier to test and debug compared to stored procedures.
Example: Function to c...read more
Q109. Name of the google products
Google offers a wide range of products and services including search engine, email, cloud storage, productivity tools, and more.
Google Search
Gmail
Google Drive
Google Docs
Google Sheets
Google Slides
Google Calendar
Google Maps
Google Photos
Google Translate
Google Chrome
Google Ads
Google Analytics
Google Cloud Platform
Google Meet
Google Classroom
Google Assistant
Google Play Store
Q110. 1. Implement Fibonacci using dynamic programming 2. Strength and weakness
Implement Fibonacci using dynamic programming and discuss strengths and weaknesses.
Dynamic programming uses memoization to store previously calculated values
Fibonacci sequence is a classic example of dynamic programming
Strengths: efficient, reduces redundant calculations, improves performance
Weaknesses: requires additional memory, may not be suitable for small problems
Example: fib(n) = fib(n-1) + fib(n-2), with base cases fib(0) = 0 and fib(1) = 1
Q111. Write a program to store the characters of a string in arraylist and print the arraylist.
Program to store characters of a string in an arraylist and print it.
Create an ArrayList to store characters
Iterate through the string and add each character to the ArrayList
Print the ArrayList
Q112. MAP vs HASHMAP and difference between the Collection vs Collections.
MAP is an interface while HASHMAP is a class implementing it. Collection is an interface while Collections is a utility class.
MAP is used to store key-value pairs while HASHMAP is a class implementing it.
MAP is an interface while HASHMAP is a class implementing it.
Collection is used to store a group of objects while Collections is a utility class providing various methods to manipulate collections.
Collection is an interface while Collections is a utility class.
Q113. Implementation of HashMap , LinkedList, HashSet, Heap?
HashMap, LinkedList, HashSet, and Heap are data structures commonly used in Java for storing and organizing data.
HashMap: key-value pairs, uses hashing to store and retrieve elements efficiently (e.g. HashMap
) LinkedList: linear data structure, elements are stored in nodes with pointers to the next node (e.g. LinkedList
) HashSet: collection of unique elements, uses hashing to ensure uniqueness (e.g. HashSet
) Heap: binary tree-based data structure, used for priority queue operati...read more
Q114. What is linked list in data structure
A linked list is a linear data structure where each element is a separate object with a pointer to the next element.
Consists of nodes that contain data and a pointer to the next node
Can be singly linked or doubly linked
Allows for efficient insertion and deletion operations
Example: Linked list can be used to implement a stack or queue
Q115. what is state management?
State management is the process of managing the state of an application, including data flow, user interface updates, and user interactions.
State management involves storing and updating the current state of an application.
It helps in managing data flow between different components of the application.
State management is crucial for ensuring that user interface updates reflect the most recent data.
Examples of state management tools include Redux, MobX, and Context API in React...read more
Q116. Activity call backs while doing the confiuration changes.
Activity call backs are used to handle configuration changes in software.
Activity call backs are methods that are called when certain events occur in an activity's lifecycle.
They are commonly used to handle configuration changes such as screen rotation or language changes.
By implementing activity call backs, developers can save and restore important data or update the UI accordingly.
Examples of activity call backs include onCreate(), onPause(), onResume(), etc.
Q117. Count the frequency of the charcters in a word
To count the frequency of characters in a word, iterate through the word and store the count of each character in a data structure.
Create a map or dictionary to store the count of each character
Iterate through the word and update the count of each character in the map
Return the map with character frequencies
Q118. What is Java and what is OOPS Concept
Java is a popular programming language known for its portability and OOPS is a programming paradigm based on objects and classes.
Java is a high-level, class-based, object-oriented programming language.
OOPS (Object-Oriented Programming) is a programming paradigm based on the concept of objects, which can contain data in the form of fields and code in the form of procedures.
OOPS concepts include Inheritance, Encapsulation, Polymorphism, and Abstraction.
Example: In Java, you can...read more
Q119. Flowcharts of If and Nested If Scenarios
Understanding flowcharts for If and Nested If scenarios in software engineering.
Flowcharts visually represent the logic of a program using symbols and arrows.
If statements are represented by a diamond shape with a condition inside.
Nested If scenarios involve multiple levels of If statements within each other.
Each branch in a flowchart represents a possible path the program can take based on conditions.
Example: If x > 5, do A. If x < 5, do B. If y > 10, do C.
Example: If x > 5,...read more
Q120. client wants to complete a task in one week. what is approach
To complete the task in one week, prioritize tasks, allocate resources efficiently, set clear milestones, and communicate effectively with the client.
Prioritize tasks based on importance and urgency
Allocate resources effectively to ensure timely completion
Set clear milestones and deadlines to track progress
Communicate regularly with the client to provide updates and address any issues
Consider using project management tools to streamline the process
Q121. Write programming logic for Await and Sync
Await and Sync are programming concepts used for managing asynchronous operations in code execution.
Await is used to pause the execution of a function until a Promise is settled, returning the result.
Sync is used to synchronize multiple threads or processes to ensure they are executed in a specific order.
Example: await fetch('https://api.example.com/data')
Example: sync.Mutex.Lock()
Both Await and Sync are important for handling concurrency and improving performance in software...read more
Q122. 7.What do you understand by degenerate dimension?
Degenerate dimension refers to a dimension with only one value.
A degenerate dimension is a dimension table with only one column and one row.
It is used to join fact tables with different granularity levels.
For example, a time dimension with only one value can be used to join a sales fact table with daily granularity and a returns fact table with hourly granularity.
Q123. What did you know about multiple tabs in Laptop
Multiple tabs in a laptop refer to the ability to have multiple web pages or applications open simultaneously in separate tabs within a web browser or software program.
Multiple tabs allow for multitasking and easy navigation between different websites or tasks.
Each tab functions independently, allowing users to switch between them without closing or losing any information.
Tabs can be opened, closed, rearranged, and organized according to the user's preferences.
Examples includ...read more
Difference between Fact Table and Dimension Table
Q125. What is MVC architecture
MVC architecture is a software design pattern that separates an application into three main components: Model, View, and Controller.
Model represents the data and business logic of the application
View is responsible for displaying the data to the user
Controller acts as an intermediary between Model and View, handling user input and updating the Model accordingly
Example: In a web application, the Model could be a database, the View could be the HTML/CSS for the user interface, ...read more
Q126. What are the steps to connect to a database?
Steps to connect to a database involve specifying the database type, providing credentials, and establishing a connection.
Specify the type of database you want to connect to (e.g. MySQL, PostgreSQL, MongoDB).
Provide the necessary credentials such as username and password.
Establish a connection using a programming language or tool like JDBC, ODBC, or ORM frameworks.
Q127. Program to check if string is palindrome or not
Program to check if a string is a palindrome or not
Create a function that takes a string as input
Remove all non-alphanumeric characters and convert to lowercase
Compare the original string with its reverse to check if it's a palindrome
Return true if it's a palindrome, false otherwise
Q128. Display the character and it's frequency in a string.
Display the character and it's frequency in a string.
Iterate through the string and count the frequency of each character using a dictionary or hashmap.
Print the character and its frequency for each unique character in the string.
Handle edge cases such as empty string or non-alphabetic characters.
Q129. Number of Matches among teams given team names using sql?
Using SQL, count the number of matches among teams given team names.
Create a table for teams and another for matches
Use JOIN to match teams in the matches table
Use COUNT to get the number of matches for each team
Normalization forms.
Entity relational model
Q131. Definitions and example code of OOPS Concepts
OOPS Concepts are fundamental principles of Object-Oriented Programming.
Encapsulation - bundling of data and methods that operate on that data
Inheritance - ability of a class to inherit properties and methods from its parent class
Polymorphism - ability of objects to take on multiple forms
Abstraction - hiding of complex implementation details from the user
Example code: class Car { private String make; public void setMake(String make) { this.make = make; } }
Q132. How would you plan the steps to create a user manual for a product?
To create a user manual for a product, plan the steps by understanding the product, identifying the target audience, outlining the content, creating a structure, writing and editing the manual, and conducting usability testing.
Understand the product and its features thoroughly
Identify the target audience and their level of expertise
Outline the content to be included in the manual
Create a logical structure and organize the information
Write the manual using clear and concise la...read more
Difference b/w INNER JOIN and OUTER JOIN in SQL.
Q134. What is the role of maps in our current generation?
Q135. What do know about financial statement
Financial statements are reports that show the financial performance and position of a company.
Financial statements include the income statement, balance sheet, and cash flow statement.
They provide information on revenue, expenses, assets, liabilities, and equity.
Investors, analysts, and regulators use financial statements to assess the financial health of a company.
Examples of financial statements include annual reports, quarterly reports, and SEC filings.
Q136. What is TestNG, Difference between WebElement and WebElements, fially and final, types of Exceptions in selenium, how to handel frams
TestNG is a testing framework for Java. WebElement represents a single element on a web page, while WebElements represents a collection of elements. 'finally' is a keyword used in exception handling. There are different types of exceptions in Selenium. To handle frames in Selenium, we can use the switchTo() method.
TestNG is a testing framework for Java
WebElement represents a single element on a web page
WebElements represents a collection of elements
'finally' is a keyword used...read more
Q137. how can you create automated reports
Automated reports can be created using tools like Microsoft Excel, Google Sheets, or business intelligence software.
Use tools like Microsoft Excel or Google Sheets to create automated reports by setting up formulas and macros.
Utilize business intelligence software like Tableau or Power BI to automate data extraction, transformation, and visualization for reports.
Schedule automated reports to run at specific times using tools like Microsoft Power Automate or Google Apps Script...read more
Q138. what are indexes and their types
Indexes are data structures used to improve the speed of data retrieval in databases. They help in quickly locating data without having to scan the entire database.
Indexes are created on columns in a database table to speed up the retrieval of rows that match a certain condition.
Types of indexes include clustered indexes, non-clustered indexes, unique indexes, and composite indexes.
Clustered indexes determine the physical order of data in a table, while non-clustered indexes ...read more
Q139. Feature and benefits of Spring boot ?
Spring Boot is a framework that simplifies the development of Java applications.
Provides a pre-configured environment for building production-grade applications
Reduces boilerplate code and configuration
Supports a wide range of data sources and integrations
Enables easy deployment and scaling of applications
Offers built-in security features
Example: Spring Boot can be used to quickly create a RESTful API with minimal setup
Q140. Design patterns in android system
Design patterns are reusable solutions to common software problems. Android system uses various design patterns.
MVC (Model-View-Controller) pattern is used in Android to separate UI logic from business logic.
Singleton pattern is used to ensure only one instance of a class is created.
Observer pattern is used to notify changes in data to multiple components.
Builder pattern is used to simplify complex object creation.
Adapter pattern is used to convert the interface of a class in...read more
Q141. Design an elaborate user access control system, with granular control from pages, controls, data, and response masking.
Design a user access control system with granular control for pages, controls, data, and response masking.
Implement role-based access control (RBAC) to assign permissions to users based on their roles.
Utilize attribute-based access control (ABAC) for more fine-grained control over access to specific pages, controls, and data.
Implement data masking techniques to ensure sensitive information is not exposed in responses.
Use a combination of authentication mechanisms such as OAut...read more
Q142. What do you know about content engineering?
Content engineering involves organizing, structuring, and optimizing content for various platforms and audiences.
Content engineering is a process of creating structured content that can be easily reused and repurposed.
It involves analyzing content to identify patterns and relationships, and then organizing it into a structured format.
Content engineering also includes optimizing content for different platforms and audiences, such as mobile devices or social media.
Examples of c...read more
Q143. Explain Jenkins pipeline of your Project
Jenkins pipeline automates the software delivery process by defining a set of steps and actions to be executed.
Pipeline is defined using a Jenkinsfile
Pipeline stages define the steps to be executed
Pipeline can include parallel stages and conditional steps
Pipeline can integrate with other tools like Git, Docker, and Kubernetes
Q144. Difference between Git rebase and Git merge
Git rebase modifies the commit history while Git merge creates a new merge commit.
Git rebase rewrites the commit history by moving the entire feature branch to the tip of the master branch
Git merge creates a new merge commit that combines the changes from both branches
Rebasing is useful for keeping a linear commit history while merging is useful for combining multiple branches
Rebasing can cause conflicts if multiple developers are working on the same branch
Merging can result ...read more
Q145. java program to reverse a string
A Java program to reverse a string.
Convert the string to a character array.
Use two pointers, one at the beginning and one at the end of the array.
Swap the characters at the two pointers and move the pointers towards each other until they meet.
Convert the character array back to a string.
Q146. What are observables in Angular
Observables are a way to handle asynchronous data streams in Angular.
Observables are similar to Promises but can handle multiple values over time.
They can be created using the RxJS library.
They can be used for handling HTTP requests, user input, and other asynchronous events.
Operators can be used to transform, filter, and combine observables.
Subscriptions are used to listen for and handle emitted values from observables.
Q147. Which region of transistor is heavily doped?
The heavily doped region of a transistor is the emitter region.
The emitter region of a transistor is heavily doped to increase its conductivity.
Heavily doping the emitter region allows for efficient injection of majority carriers into the base region.
The heavily doped emitter region helps in achieving a high current gain in a transistor.
Examples of heavily doped materials used in the emitter region include N+ or P+ type materials.
Q148. What is init block in kotlin.
The init block in Kotlin is used to initialize properties or execute code when an object is created.
The init block is defined inside a class and is executed immediately after the primary constructor.
It can be used to initialize properties or perform any other necessary setup.
Multiple init blocks can be defined in a class, and they are executed in the order of their appearance.
The init block is useful when you need to execute code during object creation that cannot be handled ...read more
Q150. What 3 golden rolu of accounting
The 3 golden rules of accounting are the rules of debit and credit, the rule of assets equal liabilities plus equity, and the rule of revenue minus expenses equals profit.
Rule of Debit and Credit: Every transaction has equal debits and credits, ensuring the accounting equation stays balanced.
Rule of Assets equal Liabilities plus Equity: The total assets of a business must equal the total of its liabilities and equity.
Rule of Revenue minus Expenses equals Profit: The differenc...read more
Q151. What do you know about prepaid expense
Prepaid expenses are expenses that have been paid for in advance but have not yet been incurred.
Prepaid expenses are considered assets on a company's balance sheet until they are used up or expire.
Common examples of prepaid expenses include prepaid rent, insurance premiums, and subscriptions.
Prepaid expenses are initially recorded as assets and then gradually expensed over time as they are used up.
Prepaid expenses are typically classified as current assets if they are expecte...read more
Q152. what is cypress ,difference between cypress and selenium
Cypress is a JavaScript-based end-to-end testing framework. It differs from Selenium in terms of architecture, ease of use, and speed.
Cypress is a JavaScript-based testing framework for web applications.
It provides a simple and intuitive API for writing tests.
Cypress runs directly in the browser and can access everything on the page.
Unlike Selenium, Cypress does not use WebDriver and has a different architecture.
Cypress offers automatic waiting for elements and actions, makin...read more
Q153. What is virtual keyword and how virtual functions work internally
The virtual keyword in C++ is used to declare a member function that can be overridden in a derived class. Virtual functions are resolved at runtime.
Virtual keyword is used to achieve runtime polymorphism in C++
Virtual functions are resolved at runtime based on the actual object type
Virtual functions are implemented using virtual function tables (vtables)
Derived classes can override virtual functions to provide specific implementations
Q154. What is the use of RxJS
RxJS is a reactive programming library for JavaScript.
RxJS allows for easier management of asynchronous data streams.
It provides operators for filtering, transforming, and combining data streams.
RxJS can be used in both front-end and back-end development.
Examples of its use include handling user input, making HTTP requests, and managing state in a Redux store.
Q155. What is debouncing technique in swift. what is factorial pattern in swift what is dispatch_wait. Explain bluethooth in iOS. Explain InAppPurchases in iOS.
Debouncing technique in Swift is used to limit the rate at which a function is called, preventing it from being called multiple times in a short period.
Debouncing involves setting a time threshold and only allowing the function to be called after that threshold has passed without any new calls.
It is commonly used in scenarios like search bars or buttons to prevent rapid firing of events.
Example: Implementing a search functionality where the search query is only executed after...read more
Q156. 1.What is the difference between atomic and nonatomic properties. 2.How do you handle memory management in Swift. 3.Difference between classes and struct in Swift. 4. What is Factorial Pattern.
1. Atomic properties ensure that the value is always fully retrieved or set, while nonatomic properties do not guarantee this. 2. Memory management in Swift is handled automatically using Automatic Reference Counting (ARC). 3. Classes are reference types, while structs are value types in Swift. 4. Factorial pattern is a design pattern used to calculate the factorial of a number.
Atomic properties ensure thread safety by ensuring that the value is fully retrieved or set before ...read more
Difference b/w OLAP and OLTP
Q158. how microservices are developed.
Microservices are developed by breaking down a large application into smaller, independent services that communicate with each other through APIs.
Identify the boundaries of each microservice based on business capabilities
Design each microservice to be independent and loosely coupled
Use lightweight protocols like HTTP or messaging queues for communication between microservices
Implement each microservice using the technology stack best suited for its requirements
Deploy microser...read more
Q159. Describe microservices architecture for a wealth management app
Microservices architecture for a wealth management app involves breaking down the application into smaller, independent services.
Each microservice focuses on a specific business function, such as client onboarding, portfolio management, or reporting.
Services communicate through APIs, allowing for flexibility and scalability.
Each microservice can be developed, deployed, and scaled independently, leading to faster development cycles and easier maintenance.
Microservices architec...read more
Q160. what is Selenium webdriver?
Selenium WebDriver is a tool used for automating web application testing.
Selenium WebDriver is a popular automation tool for testing web applications.
It supports multiple programming languages such as Java, Python, C#, etc.
WebDriver interacts with the web browser to simulate user actions like clicking buttons, entering text, etc.
It can run tests on different browsers like Chrome, Firefox, Safari, etc.
WebDriver can handle complex scenarios like handling pop-ups, alerts, frames...read more
Q161. Can you draw Linux Architecture ?
Linux architecture consists of kernel, system libraries, user space programs and file system.
Linux architecture is based on a monolithic kernel.
The kernel provides low-level hardware interaction and manages system resources.
System libraries provide higher-level functionality to user space programs.
User space programs are applications that run on top of the kernel.
The file system organizes and stores data on the system.
Examples of Linux distributions include Ubuntu, Debian, an...read more
Q162. What are OOPS concepts
OOPS concepts refer to Object-Oriented Programming principles such as inheritance, encapsulation, polymorphism, and abstraction.
Inheritance: Allows a class to inherit properties and behavior from another class.
Encapsulation: Bundling data and methods that operate on the data into a single unit.
Polymorphism: Ability to present the same interface for different data types.
Abstraction: Hiding the complex implementation details and showing only the necessary features.
Q163. What is Agile methodology
Agile methodology is a project management approach that emphasizes flexibility, collaboration, and incremental development.
Agile focuses on delivering working software in short, iterative cycles called sprints.
It values customer collaboration, responding to change, and continuous improvement.
Key principles include individuals and interactions over processes and tools, working software over comprehensive documentation, customer collaboration over contract negotiation, and resp...read more
Q164. How to store memory?
Memory can be stored in various ways such as RAM, ROM, hard drives, and cloud storage.
Memory can be stored in Random Access Memory (RAM) for quick access by the CPU.
Read-Only Memory (ROM) stores permanent data that cannot be modified.
Hard drives store data magnetically on spinning disks or solid-state drives.
Cloud storage allows data to be stored remotely on servers accessed over the internet.
Q165. Explain branching statergy, deployment process and IAC
Branching strategy is a way to manage code changes, deployment process is a set of steps to release code, and IAC is a method to automate infrastructure.
Branching strategy determines how code changes are managed and merged into the main codebase.
Deployment process involves steps like building, testing, and releasing code to production.
IAC (Infrastructure as Code) is a method to automate infrastructure management using code.
Tools like Git, Jenkins, and Terraform are commonly u...read more
Q166. Perquisite to release app on play store
Perquisites for releasing an app on Play Store
Creating a developer account on Google Play Console
Complying with Google Play policies and guidelines
Providing accurate app information and metadata
Ensuring app compatibility with target devices
Testing app thoroughly for bugs and crashes
Publishing app with appropriate content rating
Setting up monetization options and pricing
Providing customer support and responding to user feedback
Q167. Write a program to add a node to the end of the linkedlist
Program to add a node to the end of a linked list
Create a new node with the data to be added
Traverse the linked list to reach the last node
Update the next pointer of the last node to point to the new node
Q168. Write a program to check if a number is palindrome or not.
Program to check if a number is palindrome or not.
Convert the number to a string for easier comparison
Reverse the string and compare it with the original string
If they are the same, the number is a palindrome
Q169. What are the tech stacks used in project?
The tech stacks used in the project include Java, Spring Boot, Angular, and MySQL.
Java
Spring Boot
Angular
MySQL
Q170. What is CTE ? And Write a Sample Query ?
CTE stands for Common Table Expressions, used to create temporary result sets within a SQL query.
CTE is defined using the WITH keyword in SQL.
It helps in simplifying complex queries by breaking them into smaller, more manageable parts.
CTEs can reference themselves recursively, making them useful for hierarchical data.
Example: WITH cte AS (SELECT * FROM table_name) SELECT * FROM cte;
Q171. Automate a login page and explain it? Synchronisation handling and exception handling
Automate a login page using Selenium WebDriver in Java with synchronization and exception handling.
Use Selenium WebDriver to locate the username and password fields, enter valid credentials, and click the login button.
Implement explicit and implicit waits for synchronization to handle dynamic elements and page loading.
Use try-catch blocks for exception handling to capture and handle any errors during the login process.
Handle common exceptions like ElementNotVisibleException, ...read more
Q172. What type of cursors did you use
I have used both implicit and explicit cursors in PL/SQL development.
Implicit cursors are used for single-row queries while explicit cursors are used for multi-row queries.
I have used explicit cursors with parameters to make the query more dynamic.
I have also used cursor variables to pass cursors as parameters to procedures and functions.
Examples of cursor types I have used include FOR LOOP, FETCH, and UPDATE cursors.
Q173. When is double linked list used.?
Double linked lists are used when there is a need to traverse the list in both directions efficiently.
Allows for traversal in both directions
Insertions and deletions can be done in constant time
Used in implementations of undo functionality in text editors
Q174. What is unique key?
A unique key is a field or combination of fields in a database table that uniquely identifies each record in the table.
A unique key ensures that no two records in a table have the same values for the specified key fields.
It can be a single field or a combination of multiple fields.
Unique keys are used to enforce data integrity and prevent duplicate entries.
Q175. Explain about CAN protocol Details?
CAN protocol is a communication protocol used in automotive and industrial applications for high-speed data transmission.
CAN stands for Controller Area Network
It is a message-based protocol used for communication between electronic control units (ECUs) in vehicles
CAN uses a two-wire bus for communication - CAN High and CAN Low
Messages in CAN protocol are prioritized based on their identifier
CAN supports two message formats - Standard CAN and Extended CAN
Error detection and fa...read more
Q176. System design - high level on designing youtube
Designing a high-level system for YouTube
Use a distributed system architecture to handle large amounts of data and traffic
Implement a content delivery network (CDN) to efficiently deliver video content to users worldwide
Utilize a recommendation algorithm to suggest personalized content to users based on their viewing history
Incorporate a robust user authentication and authorization system to protect user data and prevent unauthorized access
Q177. What do you understand by Deamons?
Daemons are background processes that run continuously on a computer system.
Daemons are usually started at system boot time
They perform tasks such as handling requests from other programs or monitoring system activity
Examples include web servers, email servers, and print spoolers
Q178. prime number 1 to 100 and sql query for 3rd highest salary
Prime numbers 1 to 100 and SQL query for 3rd highest salary.
Prime numbers from 1 to 100: 2, 3, 5, 7, 11, 13, 17, 19, 23, 29, 31, 37, 41, 43, 47, 53, 59, 61, 67, 71, 73, 79, 83, 89, 97
SQL query for 3rd highest salary: SELECT salary FROM employees ORDER BY salary DESC LIMIT 2, 1
Q179. What is Collections?
Collections are classes that group similar objects together and provide methods to operate on them.
Collections are used to store and manipulate groups of objects
They provide methods to add, remove, and access elements in the collection
Examples include ArrayList, LinkedList, HashSet, and TreeMap
Q180. Scrum methodology and types of meetings.
Scrum methodology involves various meetings such as daily stand-up, sprint planning, review, and retrospective.
Daily stand-up meetings are held to discuss progress and plan for the day.
Sprint planning meetings are held at the beginning of each sprint to plan the work to be done.
Sprint review meetings are held at the end of each sprint to review the work done and get feedback.
Retrospective meetings are held at the end of each sprint to reflect on the process and identify areas...read more
Q181. 1. What is ETL and DWH?
ETL stands for Extract, Transform, Load and DWH stands for Data Warehouse.
ETL is a process of extracting data from various sources, transforming it into a format suitable for analysis, and loading it into a target system.
DWH is a system used for storing and managing data from various sources for business intelligence purposes.
ETL is a crucial step in populating a DWH with data.
ETL involves data extraction, data transformation, and data loading.
DWH is designed to support decis...read more
Q182. what are promises
Promises are a feature in JavaScript that allow asynchronous operations to be handled in a more organized and readable way.
Promises are objects that represent the eventual completion or failure of an asynchronous operation.
They are used to handle asynchronous code and avoid callback hell.
Promises have three states: pending, fulfilled, or rejected.
They can be chained together using methods like .then() and .catch().
Promises can be created using the Promise constructor or by us...read more
Q183. what is event loop
Event loop is a mechanism that allows a program to efficiently handle and respond to multiple events or tasks concurrently.
Event loop is commonly used in asynchronous programming.
It manages the execution of tasks or events in a non-blocking manner.
Event loop continuously checks for events or tasks and executes them when they are ready.
It helps prevent blocking and allows for efficient utilization of system resources.
Examples of event loop implementations include Node.js event...read more
Q184. Define transformer and why use transformer
A transformer is an electrical device that transfers electrical energy from one circuit to another through electromagnetic induction.
Transformers are used to increase or decrease the voltage of an alternating current (AC) power supply.
They are used in power distribution systems to step up the voltage for long-distance transmission and step it down for local distribution.
Transformers are also used in electronic devices to isolate circuits, match impedances, and provide galvani...read more
Q185. SDLC and STLC Difference Test case of Pen Smoke Testing and Sanity Testing Difference
SDLC is the process of software development while STLC is the process of software testing. Smoke testing is a subset of sanity testing.
SDLC is the process of developing software while STLC is the process of testing software.
SDLC includes planning, designing, coding, testing, and maintenance while STLC includes test planning, test case development, test execution, and test closure.
Smoke testing is a type of testing that checks if the basic functionalities of the software are w...read more
Q186. Write any select query
Select query to retrieve employee details from a database
Use SELECT statement
Specify the columns to retrieve
Specify the table name
Optional: Use WHERE clause for filtering
Q187. Second highest salary using sql ?
To find the second highest salary using SQL, we can use the ORDER BY and LIMIT clauses.
Sort the salaries in descending order using ORDER BY clause
Use LIMIT clause to select the second highest salary
Example: SELECT salary FROM employees ORDER BY salary DESC LIMIT 1,1
Q188. What is most difficult part in your software testing journey
The most difficult part in my software testing journey has been dealing with constantly changing requirements and tight deadlines.
Adapting to frequent changes in project scope
Managing time effectively to meet tight deadlines
Communicating effectively with developers and stakeholders
Prioritizing testing tasks based on project needs
Q189. What is dom,pom, different types of locater
DOM stands for Document Object Model, POM stands for Page Object Model. Different types of locators are ID, Name, Class, Tag Name, Link Text, Partial Link Text, CSS Selector and XPath.
DOM is a programming interface for web documents. It represents the page so that programs can change the document structure, style, and content.
POM is a design pattern that helps to create an object repository for web UI elements. It separates the web UI and test scripts, making the code more re...read more
Q190. 8.Difference between OLTP and OLAP systems.
OLTP is a transactional system for day-to-day operations, while OLAP is analytical system for decision-making.
OLTP deals with real-time data processing, while OLAP deals with historical data analysis.
OLTP is optimized for write operations, while OLAP is optimized for read operations.
OLTP is used for operational tasks like order processing, while OLAP is used for strategic tasks like sales forecasting.
OLTP databases are normalized, while OLAP databases are denormalized.
Example...read more
Q191. Write a program for inheritance and polymorphism?
Inheritance allows a class to inherit properties and methods from another class, while polymorphism allows objects of different classes to be treated as objects of a common superclass.
Create a base class with common properties and methods
Create derived classes that inherit from the base class and add their own unique properties and methods
Use virtual functions in the base class and override them in the derived classes to achieve polymorphism
Q192. Speak anything you want in 5 minutes.
I will talk about my passion for data analysis and how I have used it to solve complex problems in previous projects.
I have always been fascinated by the power of data analysis in uncovering insights and driving decision-making.
In my previous role, I used data analysis to identify trends and patterns in customer behavior, leading to a 10% increase in sales.
I am proficient in various data analysis tools such as Excel, SQL, and Python, and have a strong foundation in statistica...read more
Q193. What are the cancellation types of the insurance policy?
Q194. How would you optimize the sparse array access.
Optimizing sparse array access involves using data structures like hash maps or trees to efficiently store and retrieve values.
Use a hash map to store only non-null values and their corresponding indices.
Implement a tree-based data structure like a binary search tree or a trie for faster access to sparse array elements.
Consider using a compressed sparse row (CSR) format for large sparse arrays to reduce memory usage and improve access times.
Q195. 6.Can you join different fact tables ?
Yes, fact tables can be joined together in a data warehouse to combine related information.
Fact tables contain quantitative data and are typically joined using common dimensions.
Joining fact tables allows for more comprehensive analysis and reporting.
For example, joining a sales fact table with a customer fact table can provide insights on customer behavior and purchasing patterns.
Q196. What will you do to improve bottom quartile
To improve bottom quartile, I will focus on identifying areas of improvement, providing targeted training, setting clear goals, and regularly monitoring progress.
Identify specific areas where the bottom quartile is lacking and develop targeted improvement plans.
Provide additional training and resources to help employees in the bottom quartile improve their skills and performance.
Set clear and achievable goals for employees in the bottom quartile to work towards.
Regularly moni...read more
Q197. What is react router dom
React Router DOM is a popular routing library for React applications.
Used for handling routing in React applications
Allows for declarative routing using components like BrowserRouter, Route, Switch, etc.
Enables navigation between different components without full page reloads
Q198. Print Numbers between 1 to 20 , even/odd numbers
Print even and odd numbers between 1 to 20.
Iterate from 1 to 20 and check if the number is even or odd.
Use a conditional statement to determine if the number is even or odd.
Print the number along with its type (even or odd).
Q199. What are Cucumber hooks?
Cucumber hooks are blocks of code that run before or after each scenario in Cucumber tests.
Cucumber hooks allow for setup and teardown actions before and after scenarios
They can be used to perform actions like opening a browser before a scenario and closing it after
Hooks can be defined at different levels such as global, scenario, or feature level
Q200. Types of wait in selenium and syntax.
Types of wait in Selenium and their syntax.
Implicit Wait: driver.manage().timeouts().implicitlyWait(10, TimeUnit.SECONDS)
Explicit Wait: WebDriverWait wait = new WebDriverWait(driver, 10); wait.until(ExpectedConditions.visibilityOfElementLocated(By.id("elementId")));
Fluent Wait: Wait wait = new FluentWait(driver).withTimeout(Duration.ofSeconds(10)).pollingEvery(Duration.ofSeconds(2)).ignoring(NoSuchElementException.class);
Top HR Questions asked in null
Interview Process at null
Top Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month