Add office photos
Engaged Employer

GlobalLogic

3.7
based on 4.2k Reviews
Filter interviews by

300+ Interview Questions and Answers

Updated 16 Dec 2024
Popular Designations

Q101. Name the google application you know

Ans.

Google Maps - a web mapping service developed by Google

  • Provides satellite imagery, street maps, panoramic views, and route planning

  • Used for navigation, finding local businesses, and exploring new places

  • Available on desktop and mobile devices

Add your answer

Q102. How to handle dropdown using selenium?

Ans.

Dropdowns can be handled using Select class in Selenium.

  • Locate the dropdown element using any of the locators available in Selenium

  • Create an object of Select class and pass the dropdown element as argument

  • Use selectByVisibleText(), selectByValue() or selectByIndex() methods to select an option

  • Use getOptions() method to get all the options in the dropdown

  • Use isMultiple() method to check if the dropdown allows multiple selections

Add your answer

Q103. Who has invented java language.

Ans.

James Gosling, Mike Sheridan, and Patrick Naughton invented the Java language.

  • Invented by James Gosling, Mike Sheridan, and Patrick Naughton at Sun Microsystems in the early 1990s.

  • Java was originally developed to be used in consumer electronic devices like set-top boxes.

  • Released in 1995 as a core component of Sun Microsystems' Java platform.

  • Known for its platform independence, allowing code to run on any device that has a Java Virtual Machine (JVM).

Add your answer
Q104. AWS Question

Explain Amazon EC2 in brief.

Add your answer
Discover null interview dos and don'ts from real experiences

Q105. what are different keys in sql

Ans.

Different keys in SQL include primary key, foreign key, unique key, and composite key.

  • Primary key uniquely identifies each record in a table

  • Foreign key establishes a relationship between two tables

  • Unique key ensures that all values in a column are unique

  • Composite key is a combination of multiple columns to uniquely identify a record

Add your answer

Q106. What is the difference between TDD and BDD?

Ans.

TDD focuses on testing the functionality of individual units of code, while BDD focuses on testing the behavior of the system as a whole.

  • TDD stands for Test-Driven Development, where tests are written before the code is implemented to drive the development process.

  • BDD stands for Behavior-Driven Development, where tests are written in a human-readable format to describe the behavior of the system.

  • TDD is more focused on the technical aspects of the code, ensuring that individua...read more

Add your answer
Are these interview questions helpful?

Q107. Difference between function and stored procedure

Ans.

Function is a reusable block of code that returns a value, while stored procedure is a group of SQL statements that can be executed together.

  • Functions return a single value, while stored procedures can return multiple values.

  • Functions are called in SQL queries, while stored procedures are called using EXECUTE statement.

  • Functions cannot modify database state, while stored procedures can.

  • Functions are easier to test and debug compared to stored procedures.

  • Example: Function to c...read more

Add your answer
Q108. AWS Question

What is Auto Scaling?

Add your answer
Share interview questions and help millions of jobseekers 🌟

Q109. Name of the google products

Ans.

Google offers a wide range of products and services including search engine, email, cloud storage, productivity tools, and more.

  • Google Search

  • Gmail

  • Google Drive

  • Google Docs

  • Google Sheets

  • Google Slides

  • Google Calendar

  • Google Maps

  • Google Photos

  • Google Translate

  • Google Chrome

  • Google Ads

  • Google Analytics

  • Google Cloud Platform

  • Google Meet

  • Google Classroom

  • Google Assistant

  • Google Play Store

View 3 more answers

Q110. 1. Implement Fibonacci using dynamic programming 2. Strength and weakness

Ans.

Implement Fibonacci using dynamic programming and discuss strengths and weaknesses.

  • Dynamic programming uses memoization to store previously calculated values

  • Fibonacci sequence is a classic example of dynamic programming

  • Strengths: efficient, reduces redundant calculations, improves performance

  • Weaknesses: requires additional memory, may not be suitable for small problems

  • Example: fib(n) = fib(n-1) + fib(n-2), with base cases fib(0) = 0 and fib(1) = 1

Add your answer

Q111. Write a program to store the characters of a string in arraylist and print the arraylist.

Ans.

Program to store characters of a string in an arraylist and print it.

  • Create an ArrayList to store characters

  • Iterate through the string and add each character to the ArrayList

  • Print the ArrayList

Add your answer

Q112. MAP vs HASHMAP and difference between the Collection vs Collections.

Ans.

MAP is an interface while HASHMAP is a class implementing it. Collection is an interface while Collections is a utility class.

  • MAP is used to store key-value pairs while HASHMAP is a class implementing it.

  • MAP is an interface while HASHMAP is a class implementing it.

  • Collection is used to store a group of objects while Collections is a utility class providing various methods to manipulate collections.

  • Collection is an interface while Collections is a utility class.

Add your answer

Q113. Implementation of HashMap , LinkedList, HashSet, Heap?

Ans.

HashMap, LinkedList, HashSet, and Heap are data structures commonly used in Java for storing and organizing data.

  • HashMap: key-value pairs, uses hashing to store and retrieve elements efficiently (e.g. HashMap)

  • LinkedList: linear data structure, elements are stored in nodes with pointers to the next node (e.g. LinkedList)

  • HashSet: collection of unique elements, uses hashing to ensure uniqueness (e.g. HashSet)

  • Heap: binary tree-based data structure, used for priority queue operati...read more

Add your answer

Q114. What is linked list in data structure

Ans.

A linked list is a linear data structure where each element is a separate object with a pointer to the next element.

  • Consists of nodes that contain data and a pointer to the next node

  • Can be singly linked or doubly linked

  • Allows for efficient insertion and deletion operations

  • Example: Linked list can be used to implement a stack or queue

Add your answer

Q115. what is state management?

Ans.

State management is the process of managing the state of an application, including data flow, user interface updates, and user interactions.

  • State management involves storing and updating the current state of an application.

  • It helps in managing data flow between different components of the application.

  • State management is crucial for ensuring that user interface updates reflect the most recent data.

  • Examples of state management tools include Redux, MobX, and Context API in React...read more

Add your answer

Q116. Activity call backs while doing the confiuration changes.

Ans.

Activity call backs are used to handle configuration changes in software.

  • Activity call backs are methods that are called when certain events occur in an activity's lifecycle.

  • They are commonly used to handle configuration changes such as screen rotation or language changes.

  • By implementing activity call backs, developers can save and restore important data or update the UI accordingly.

  • Examples of activity call backs include onCreate(), onPause(), onResume(), etc.

Add your answer

Q117. Count the frequency of the charcters in a word

Ans.

To count the frequency of characters in a word, iterate through the word and store the count of each character in a data structure.

  • Create a map or dictionary to store the count of each character

  • Iterate through the word and update the count of each character in the map

  • Return the map with character frequencies

Add your answer

Q118. What is Java and what is OOPS Concept

Ans.

Java is a popular programming language known for its portability and OOPS is a programming paradigm based on objects and classes.

  • Java is a high-level, class-based, object-oriented programming language.

  • OOPS (Object-Oriented Programming) is a programming paradigm based on the concept of objects, which can contain data in the form of fields and code in the form of procedures.

  • OOPS concepts include Inheritance, Encapsulation, Polymorphism, and Abstraction.

  • Example: In Java, you can...read more

Add your answer

Q119. Flowcharts of If and Nested If Scenarios

Ans.

Understanding flowcharts for If and Nested If scenarios in software engineering.

  • Flowcharts visually represent the logic of a program using symbols and arrows.

  • If statements are represented by a diamond shape with a condition inside.

  • Nested If scenarios involve multiple levels of If statements within each other.

  • Each branch in a flowchart represents a possible path the program can take based on conditions.

  • Example: If x > 5, do A. If x < 5, do B. If y > 10, do C.

  • Example: If x > 5,...read more

Add your answer

Q120. client wants to complete a task in one week. what is approach

Ans.

To complete the task in one week, prioritize tasks, allocate resources efficiently, set clear milestones, and communicate effectively with the client.

  • Prioritize tasks based on importance and urgency

  • Allocate resources effectively to ensure timely completion

  • Set clear milestones and deadlines to track progress

  • Communicate regularly with the client to provide updates and address any issues

  • Consider using project management tools to streamline the process

Add your answer

Q121. Write programming logic for Await and Sync

Ans.

Await and Sync are programming concepts used for managing asynchronous operations in code execution.

  • Await is used to pause the execution of a function until a Promise is settled, returning the result.

  • Sync is used to synchronize multiple threads or processes to ensure they are executed in a specific order.

  • Example: await fetch('https://api.example.com/data')

  • Example: sync.Mutex.Lock()

  • Both Await and Sync are important for handling concurrency and improving performance in software...read more

Add your answer

Q122. 7.What do you understand by degenerate dimension?

Ans.

Degenerate dimension refers to a dimension with only one value.

  • A degenerate dimension is a dimension table with only one column and one row.

  • It is used to join fact tables with different granularity levels.

  • For example, a time dimension with only one value can be used to join a sales fact table with daily granularity and a returns fact table with hourly granularity.

Add your answer

Q123. What did you know about multiple tabs in Laptop

Ans.

Multiple tabs in a laptop refer to the ability to have multiple web pages or applications open simultaneously in separate tabs within a web browser or software program.

  • Multiple tabs allow for multitasking and easy navigation between different websites or tasks.

  • Each tab functions independently, allowing users to switch between them without closing or losing any information.

  • Tabs can be opened, closed, rearranged, and organized according to the user's preferences.

  • Examples includ...read more

Add your answer
Q124. Data Warehouse Question

Difference between Fact Table and Dimension Table

Add your answer

Q125. What is MVC architecture

Ans.

MVC architecture is a software design pattern that separates an application into three main components: Model, View, and Controller.

  • Model represents the data and business logic of the application

  • View is responsible for displaying the data to the user

  • Controller acts as an intermediary between Model and View, handling user input and updating the Model accordingly

  • Example: In a web application, the Model could be a database, the View could be the HTML/CSS for the user interface, ...read more

Add your answer

Q126. What are the steps to connect to a database?

Ans.

Steps to connect to a database involve specifying the database type, providing credentials, and establishing a connection.

  • Specify the type of database you want to connect to (e.g. MySQL, PostgreSQL, MongoDB).

  • Provide the necessary credentials such as username and password.

  • Establish a connection using a programming language or tool like JDBC, ODBC, or ORM frameworks.

Add your answer

Q127. Program to check if string is palindrome or not

Ans.

Program to check if a string is a palindrome or not

  • Create a function that takes a string as input

  • Remove all non-alphanumeric characters and convert to lowercase

  • Compare the original string with its reverse to check if it's a palindrome

  • Return true if it's a palindrome, false otherwise

Add your answer

Q128. Display the character and it's frequency in a string.

Ans.

Display the character and it's frequency in a string.

  • Iterate through the string and count the frequency of each character using a dictionary or hashmap.

  • Print the character and its frequency for each unique character in the string.

  • Handle edge cases such as empty string or non-alphabetic characters.

Add your answer

Q129. Number of Matches among teams given team names using sql?

Ans.

Using SQL, count the number of matches among teams given team names.

  • Create a table for teams and another for matches

  • Use JOIN to match teams in the matches table

  • Use COUNT to get the number of matches for each team

Add your answer
Q130. DBMS Questions

Normalization forms.
Entity relational model

Add your answer

Q131. Definitions and example code of OOPS Concepts

Ans.

OOPS Concepts are fundamental principles of Object-Oriented Programming.

  • Encapsulation - bundling of data and methods that operate on that data

  • Inheritance - ability of a class to inherit properties and methods from its parent class

  • Polymorphism - ability of objects to take on multiple forms

  • Abstraction - hiding of complex implementation details from the user

  • Example code: class Car { private String make; public void setMake(String make) { this.make = make; } }

Add your answer

Q132. How would you plan the steps to create a user manual for a product?

Ans.

To create a user manual for a product, plan the steps by understanding the product, identifying the target audience, outlining the content, creating a structure, writing and editing the manual, and conducting usability testing.

  • Understand the product and its features thoroughly

  • Identify the target audience and their level of expertise

  • Outline the content to be included in the manual

  • Create a logical structure and organize the information

  • Write the manual using clear and concise la...read more

Add your answer
Q133. DBMS Question

Difference b/w INNER JOIN and OUTER JOIN in SQL.

Add your answer

Q134. What is the role of maps in our current generation?

Add your answer

Q135. What do know about financial statement

Ans.

Financial statements are reports that show the financial performance and position of a company.

  • Financial statements include the income statement, balance sheet, and cash flow statement.

  • They provide information on revenue, expenses, assets, liabilities, and equity.

  • Investors, analysts, and regulators use financial statements to assess the financial health of a company.

  • Examples of financial statements include annual reports, quarterly reports, and SEC filings.

Add your answer

Q136. What is TestNG, Difference between WebElement and WebElements, fially and final, types of Exceptions in selenium, how to handel frams

Ans.

TestNG is a testing framework for Java. WebElement represents a single element on a web page, while WebElements represents a collection of elements. 'finally' is a keyword used in exception handling. There are different types of exceptions in Selenium. To handle frames in Selenium, we can use the switchTo() method.

  • TestNG is a testing framework for Java

  • WebElement represents a single element on a web page

  • WebElements represents a collection of elements

  • 'finally' is a keyword used...read more

Add your answer

Q137. how can you create automated reports

Ans.

Automated reports can be created using tools like Microsoft Excel, Google Sheets, or business intelligence software.

  • Use tools like Microsoft Excel or Google Sheets to create automated reports by setting up formulas and macros.

  • Utilize business intelligence software like Tableau or Power BI to automate data extraction, transformation, and visualization for reports.

  • Schedule automated reports to run at specific times using tools like Microsoft Power Automate or Google Apps Script...read more

Add your answer

Q138. what are indexes and their types

Ans.

Indexes are data structures used to improve the speed of data retrieval in databases. They help in quickly locating data without having to scan the entire database.

  • Indexes are created on columns in a database table to speed up the retrieval of rows that match a certain condition.

  • Types of indexes include clustered indexes, non-clustered indexes, unique indexes, and composite indexes.

  • Clustered indexes determine the physical order of data in a table, while non-clustered indexes ...read more

Add your answer

Q139. Feature and benefits of Spring boot ?

Ans.

Spring Boot is a framework that simplifies the development of Java applications.

  • Provides a pre-configured environment for building production-grade applications

  • Reduces boilerplate code and configuration

  • Supports a wide range of data sources and integrations

  • Enables easy deployment and scaling of applications

  • Offers built-in security features

  • Example: Spring Boot can be used to quickly create a RESTful API with minimal setup

Add your answer

Q140. Design patterns in android system

Ans.

Design patterns are reusable solutions to common software problems. Android system uses various design patterns.

  • MVC (Model-View-Controller) pattern is used in Android to separate UI logic from business logic.

  • Singleton pattern is used to ensure only one instance of a class is created.

  • Observer pattern is used to notify changes in data to multiple components.

  • Builder pattern is used to simplify complex object creation.

  • Adapter pattern is used to convert the interface of a class in...read more

Add your answer

Q141. Design an elaborate user access control system, with granular control from pages, controls, data, and response masking.

Ans.

Design a user access control system with granular control for pages, controls, data, and response masking.

  • Implement role-based access control (RBAC) to assign permissions to users based on their roles.

  • Utilize attribute-based access control (ABAC) for more fine-grained control over access to specific pages, controls, and data.

  • Implement data masking techniques to ensure sensitive information is not exposed in responses.

  • Use a combination of authentication mechanisms such as OAut...read more

Add your answer

Q142. What do you know about content engineering?

Ans.

Content engineering involves organizing, structuring, and optimizing content for various platforms and audiences.

  • Content engineering is a process of creating structured content that can be easily reused and repurposed.

  • It involves analyzing content to identify patterns and relationships, and then organizing it into a structured format.

  • Content engineering also includes optimizing content for different platforms and audiences, such as mobile devices or social media.

  • Examples of c...read more

Add your answer

Q143. Explain Jenkins pipeline of your Project

Ans.

Jenkins pipeline automates the software delivery process by defining a set of steps and actions to be executed.

  • Pipeline is defined using a Jenkinsfile

  • Pipeline stages define the steps to be executed

  • Pipeline can include parallel stages and conditional steps

  • Pipeline can integrate with other tools like Git, Docker, and Kubernetes

Add your answer

Q144. Difference between Git rebase and Git merge

Ans.

Git rebase modifies the commit history while Git merge creates a new merge commit.

  • Git rebase rewrites the commit history by moving the entire feature branch to the tip of the master branch

  • Git merge creates a new merge commit that combines the changes from both branches

  • Rebasing is useful for keeping a linear commit history while merging is useful for combining multiple branches

  • Rebasing can cause conflicts if multiple developers are working on the same branch

  • Merging can result ...read more

Add your answer

Q145. java program to reverse a string

Ans.

A Java program to reverse a string.

  • Convert the string to a character array.

  • Use two pointers, one at the beginning and one at the end of the array.

  • Swap the characters at the two pointers and move the pointers towards each other until they meet.

  • Convert the character array back to a string.

View 2 more answers

Q146. What are observables in Angular

Ans.

Observables are a way to handle asynchronous data streams in Angular.

  • Observables are similar to Promises but can handle multiple values over time.

  • They can be created using the RxJS library.

  • They can be used for handling HTTP requests, user input, and other asynchronous events.

  • Operators can be used to transform, filter, and combine observables.

  • Subscriptions are used to listen for and handle emitted values from observables.

Add your answer

Q147. Which region of transistor is heavily doped?

Ans.

The heavily doped region of a transistor is the emitter region.

  • The emitter region of a transistor is heavily doped to increase its conductivity.

  • Heavily doping the emitter region allows for efficient injection of majority carriers into the base region.

  • The heavily doped emitter region helps in achieving a high current gain in a transistor.

  • Examples of heavily doped materials used in the emitter region include N+ or P+ type materials.

Add your answer

Q148. What is init block in kotlin.

Ans.

The init block in Kotlin is used to initialize properties or execute code when an object is created.

  • The init block is defined inside a class and is executed immediately after the primary constructor.

  • It can be used to initialize properties or perform any other necessary setup.

  • Multiple init blocks can be defined in a class, and they are executed in the order of their appearance.

  • The init block is useful when you need to execute code during object creation that cannot be handled ...read more

View 1 answer
Q149. OS Question

Explain Piping in Unix/Linux

Add your answer

Q150. What 3 golden rolu of accounting

Ans.

The 3 golden rules of accounting are the rules of debit and credit, the rule of assets equal liabilities plus equity, and the rule of revenue minus expenses equals profit.

  • Rule of Debit and Credit: Every transaction has equal debits and credits, ensuring the accounting equation stays balanced.

  • Rule of Assets equal Liabilities plus Equity: The total assets of a business must equal the total of its liabilities and equity.

  • Rule of Revenue minus Expenses equals Profit: The differenc...read more

Add your answer

Q151. What do you know about prepaid expense

Ans.

Prepaid expenses are expenses that have been paid for in advance but have not yet been incurred.

  • Prepaid expenses are considered assets on a company's balance sheet until they are used up or expire.

  • Common examples of prepaid expenses include prepaid rent, insurance premiums, and subscriptions.

  • Prepaid expenses are initially recorded as assets and then gradually expensed over time as they are used up.

  • Prepaid expenses are typically classified as current assets if they are expecte...read more

Add your answer

Q152. what is cypress ,difference between cypress and selenium

Ans.

Cypress is a JavaScript-based end-to-end testing framework. It differs from Selenium in terms of architecture, ease of use, and speed.

  • Cypress is a JavaScript-based testing framework for web applications.

  • It provides a simple and intuitive API for writing tests.

  • Cypress runs directly in the browser and can access everything on the page.

  • Unlike Selenium, Cypress does not use WebDriver and has a different architecture.

  • Cypress offers automatic waiting for elements and actions, makin...read more

Add your answer

Q153. What is virtual keyword and how virtual functions work internally

Ans.

The virtual keyword in C++ is used to declare a member function that can be overridden in a derived class. Virtual functions are resolved at runtime.

  • Virtual keyword is used to achieve runtime polymorphism in C++

  • Virtual functions are resolved at runtime based on the actual object type

  • Virtual functions are implemented using virtual function tables (vtables)

  • Derived classes can override virtual functions to provide specific implementations

Add your answer

Q154. What is the use of RxJS

Ans.

RxJS is a reactive programming library for JavaScript.

  • RxJS allows for easier management of asynchronous data streams.

  • It provides operators for filtering, transforming, and combining data streams.

  • RxJS can be used in both front-end and back-end development.

  • Examples of its use include handling user input, making HTTP requests, and managing state in a Redux store.

Add your answer

Q155. What is debouncing technique in swift. what is factorial pattern in swift what is dispatch_wait. Explain bluethooth in iOS. Explain InAppPurchases in iOS.

Ans.

Debouncing technique in Swift is used to limit the rate at which a function is called, preventing it from being called multiple times in a short period.

  • Debouncing involves setting a time threshold and only allowing the function to be called after that threshold has passed without any new calls.

  • It is commonly used in scenarios like search bars or buttons to prevent rapid firing of events.

  • Example: Implementing a search functionality where the search query is only executed after...read more

Add your answer

Q156. 1.What is the difference between atomic and nonatomic properties. 2.How do you handle memory management in Swift. 3.Difference between classes and struct in Swift. 4. What is Factorial Pattern.

Ans.

1. Atomic properties ensure that the value is always fully retrieved or set, while nonatomic properties do not guarantee this. 2. Memory management in Swift is handled automatically using Automatic Reference Counting (ARC). 3. Classes are reference types, while structs are value types in Swift. 4. Factorial pattern is a design pattern used to calculate the factorial of a number.

  • Atomic properties ensure thread safety by ensuring that the value is fully retrieved or set before ...read more

Add your answer
Q157. DBMS Question

Difference b/w OLAP and OLTP

Add your answer

Q158. how microservices are developed.

Ans.

Microservices are developed by breaking down a large application into smaller, independent services that communicate with each other through APIs.

  • Identify the boundaries of each microservice based on business capabilities

  • Design each microservice to be independent and loosely coupled

  • Use lightweight protocols like HTTP or messaging queues for communication between microservices

  • Implement each microservice using the technology stack best suited for its requirements

  • Deploy microser...read more

Add your answer

Q159. Describe microservices architecture for a wealth management app

Ans.

Microservices architecture for a wealth management app involves breaking down the application into smaller, independent services.

  • Each microservice focuses on a specific business function, such as client onboarding, portfolio management, or reporting.

  • Services communicate through APIs, allowing for flexibility and scalability.

  • Each microservice can be developed, deployed, and scaled independently, leading to faster development cycles and easier maintenance.

  • Microservices architec...read more

Add your answer

Q160. what is Selenium webdriver?

Ans.

Selenium WebDriver is a tool used for automating web application testing.

  • Selenium WebDriver is a popular automation tool for testing web applications.

  • It supports multiple programming languages such as Java, Python, C#, etc.

  • WebDriver interacts with the web browser to simulate user actions like clicking buttons, entering text, etc.

  • It can run tests on different browsers like Chrome, Firefox, Safari, etc.

  • WebDriver can handle complex scenarios like handling pop-ups, alerts, frames...read more

Add your answer

Q161. Can you draw Linux Architecture ?

Ans.

Linux architecture consists of kernel, system libraries, user space programs and file system.

  • Linux architecture is based on a monolithic kernel.

  • The kernel provides low-level hardware interaction and manages system resources.

  • System libraries provide higher-level functionality to user space programs.

  • User space programs are applications that run on top of the kernel.

  • The file system organizes and stores data on the system.

  • Examples of Linux distributions include Ubuntu, Debian, an...read more

Add your answer

Q162. What are OOPS concepts

Ans.

OOPS concepts refer to Object-Oriented Programming principles such as inheritance, encapsulation, polymorphism, and abstraction.

  • Inheritance: Allows a class to inherit properties and behavior from another class.

  • Encapsulation: Bundling data and methods that operate on the data into a single unit.

  • Polymorphism: Ability to present the same interface for different data types.

  • Abstraction: Hiding the complex implementation details and showing only the necessary features.

Add your answer

Q163. What is Agile methodology

Ans.

Agile methodology is a project management approach that emphasizes flexibility, collaboration, and incremental development.

  • Agile focuses on delivering working software in short, iterative cycles called sprints.

  • It values customer collaboration, responding to change, and continuous improvement.

  • Key principles include individuals and interactions over processes and tools, working software over comprehensive documentation, customer collaboration over contract negotiation, and resp...read more

Add your answer

Q164. How to store memory?

Ans.

Memory can be stored in various ways such as RAM, ROM, hard drives, and cloud storage.

  • Memory can be stored in Random Access Memory (RAM) for quick access by the CPU.

  • Read-Only Memory (ROM) stores permanent data that cannot be modified.

  • Hard drives store data magnetically on spinning disks or solid-state drives.

  • Cloud storage allows data to be stored remotely on servers accessed over the internet.

Add your answer

Q165. Explain branching statergy, deployment process and IAC

Ans.

Branching strategy is a way to manage code changes, deployment process is a set of steps to release code, and IAC is a method to automate infrastructure.

  • Branching strategy determines how code changes are managed and merged into the main codebase.

  • Deployment process involves steps like building, testing, and releasing code to production.

  • IAC (Infrastructure as Code) is a method to automate infrastructure management using code.

  • Tools like Git, Jenkins, and Terraform are commonly u...read more

Add your answer

Q166. Perquisite to release app on play store

Ans.

Perquisites for releasing an app on Play Store

  • Creating a developer account on Google Play Console

  • Complying with Google Play policies and guidelines

  • Providing accurate app information and metadata

  • Ensuring app compatibility with target devices

  • Testing app thoroughly for bugs and crashes

  • Publishing app with appropriate content rating

  • Setting up monetization options and pricing

  • Providing customer support and responding to user feedback

Add your answer

Q167. Write a program to add a node to the end of the linkedlist

Ans.

Program to add a node to the end of a linked list

  • Create a new node with the data to be added

  • Traverse the linked list to reach the last node

  • Update the next pointer of the last node to point to the new node

Add your answer

Q168. Write a program to check if a number is palindrome or not.

Ans.

Program to check if a number is palindrome or not.

  • Convert the number to a string for easier comparison

  • Reverse the string and compare it with the original string

  • If they are the same, the number is a palindrome

Add your answer

Q169. What are the tech stacks used in project?

Ans.

The tech stacks used in the project include Java, Spring Boot, Angular, and MySQL.

  • Java

  • Spring Boot

  • Angular

  • MySQL

Add your answer

Q170. What is CTE ? And Write a Sample Query ?

Ans.

CTE stands for Common Table Expressions, used to create temporary result sets within a SQL query.

  • CTE is defined using the WITH keyword in SQL.

  • It helps in simplifying complex queries by breaking them into smaller, more manageable parts.

  • CTEs can reference themselves recursively, making them useful for hierarchical data.

  • Example: WITH cte AS (SELECT * FROM table_name) SELECT * FROM cte;

Add your answer

Q171. Automate a login page and explain it? Synchronisation handling and exception handling

Ans.

Automate a login page using Selenium WebDriver in Java with synchronization and exception handling.

  • Use Selenium WebDriver to locate the username and password fields, enter valid credentials, and click the login button.

  • Implement explicit and implicit waits for synchronization to handle dynamic elements and page loading.

  • Use try-catch blocks for exception handling to capture and handle any errors during the login process.

  • Handle common exceptions like ElementNotVisibleException, ...read more

Add your answer

Q172. What type of cursors did you use

Ans.

I have used both implicit and explicit cursors in PL/SQL development.

  • Implicit cursors are used for single-row queries while explicit cursors are used for multi-row queries.

  • I have used explicit cursors with parameters to make the query more dynamic.

  • I have also used cursor variables to pass cursors as parameters to procedures and functions.

  • Examples of cursor types I have used include FOR LOOP, FETCH, and UPDATE cursors.

Add your answer

Q173. When is double linked list used.?

Ans.

Double linked lists are used when there is a need to traverse the list in both directions efficiently.

  • Allows for traversal in both directions

  • Insertions and deletions can be done in constant time

  • Used in implementations of undo functionality in text editors

Add your answer

Q174. What is unique key?

Ans.

A unique key is a field or combination of fields in a database table that uniquely identifies each record in the table.

  • A unique key ensures that no two records in a table have the same values for the specified key fields.

  • It can be a single field or a combination of multiple fields.

  • Unique keys are used to enforce data integrity and prevent duplicate entries.

Add your answer

Q175. Explain about CAN protocol Details?

Ans.

CAN protocol is a communication protocol used in automotive and industrial applications for high-speed data transmission.

  • CAN stands for Controller Area Network

  • It is a message-based protocol used for communication between electronic control units (ECUs) in vehicles

  • CAN uses a two-wire bus for communication - CAN High and CAN Low

  • Messages in CAN protocol are prioritized based on their identifier

  • CAN supports two message formats - Standard CAN and Extended CAN

  • Error detection and fa...read more

Add your answer

Q176. System design - high level on designing youtube

Ans.

Designing a high-level system for YouTube

  • Use a distributed system architecture to handle large amounts of data and traffic

  • Implement a content delivery network (CDN) to efficiently deliver video content to users worldwide

  • Utilize a recommendation algorithm to suggest personalized content to users based on their viewing history

  • Incorporate a robust user authentication and authorization system to protect user data and prevent unauthorized access

Add your answer

Q177. What do you understand by Deamons?

Ans.

Daemons are background processes that run continuously on a computer system.

  • Daemons are usually started at system boot time

  • They perform tasks such as handling requests from other programs or monitoring system activity

  • Examples include web servers, email servers, and print spoolers

Add your answer

Q178. prime number 1 to 100 and sql query for 3rd highest salary

Ans.

Prime numbers 1 to 100 and SQL query for 3rd highest salary.

  • Prime numbers from 1 to 100: 2, 3, 5, 7, 11, 13, 17, 19, 23, 29, 31, 37, 41, 43, 47, 53, 59, 61, 67, 71, 73, 79, 83, 89, 97

  • SQL query for 3rd highest salary: SELECT salary FROM employees ORDER BY salary DESC LIMIT 2, 1

Add your answer

Q179. What is Collections?

Ans.

Collections are classes that group similar objects together and provide methods to operate on them.

  • Collections are used to store and manipulate groups of objects

  • They provide methods to add, remove, and access elements in the collection

  • Examples include ArrayList, LinkedList, HashSet, and TreeMap

Add your answer

Q180. Scrum methodology and types of meetings.

Ans.

Scrum methodology involves various meetings such as daily stand-up, sprint planning, review, and retrospective.

  • Daily stand-up meetings are held to discuss progress and plan for the day.

  • Sprint planning meetings are held at the beginning of each sprint to plan the work to be done.

  • Sprint review meetings are held at the end of each sprint to review the work done and get feedback.

  • Retrospective meetings are held at the end of each sprint to reflect on the process and identify areas...read more

Add your answer

Q181. 1. What is ETL and DWH?

Ans.

ETL stands for Extract, Transform, Load and DWH stands for Data Warehouse.

  • ETL is a process of extracting data from various sources, transforming it into a format suitable for analysis, and loading it into a target system.

  • DWH is a system used for storing and managing data from various sources for business intelligence purposes.

  • ETL is a crucial step in populating a DWH with data.

  • ETL involves data extraction, data transformation, and data loading.

  • DWH is designed to support decis...read more

Add your answer

Q182. what are promises

Ans.

Promises are a feature in JavaScript that allow asynchronous operations to be handled in a more organized and readable way.

  • Promises are objects that represent the eventual completion or failure of an asynchronous operation.

  • They are used to handle asynchronous code and avoid callback hell.

  • Promises have three states: pending, fulfilled, or rejected.

  • They can be chained together using methods like .then() and .catch().

  • Promises can be created using the Promise constructor or by us...read more

Add your answer

Q183. what is event loop

Ans.

Event loop is a mechanism that allows a program to efficiently handle and respond to multiple events or tasks concurrently.

  • Event loop is commonly used in asynchronous programming.

  • It manages the execution of tasks or events in a non-blocking manner.

  • Event loop continuously checks for events or tasks and executes them when they are ready.

  • It helps prevent blocking and allows for efficient utilization of system resources.

  • Examples of event loop implementations include Node.js event...read more

Add your answer

Q184. Define transformer and why use transformer

Ans.

A transformer is an electrical device that transfers electrical energy from one circuit to another through electromagnetic induction.

  • Transformers are used to increase or decrease the voltage of an alternating current (AC) power supply.

  • They are used in power distribution systems to step up the voltage for long-distance transmission and step it down for local distribution.

  • Transformers are also used in electronic devices to isolate circuits, match impedances, and provide galvani...read more

Add your answer

Q185. SDLC and STLC Difference Test case of Pen Smoke Testing and Sanity Testing Difference

Ans.

SDLC is the process of software development while STLC is the process of software testing. Smoke testing is a subset of sanity testing.

  • SDLC is the process of developing software while STLC is the process of testing software.

  • SDLC includes planning, designing, coding, testing, and maintenance while STLC includes test planning, test case development, test execution, and test closure.

  • Smoke testing is a type of testing that checks if the basic functionalities of the software are w...read more

Add your answer

Q186. Write any select query

Ans.

Select query to retrieve employee details from a database

  • Use SELECT statement

  • Specify the columns to retrieve

  • Specify the table name

  • Optional: Use WHERE clause for filtering

Add your answer

Q187. Second highest salary using sql ?

Ans.

To find the second highest salary using SQL, we can use the ORDER BY and LIMIT clauses.

  • Sort the salaries in descending order using ORDER BY clause

  • Use LIMIT clause to select the second highest salary

  • Example: SELECT salary FROM employees ORDER BY salary DESC LIMIT 1,1

Add your answer

Q188. What is most difficult part in your software testing journey

Ans.

The most difficult part in my software testing journey has been dealing with constantly changing requirements and tight deadlines.

  • Adapting to frequent changes in project scope

  • Managing time effectively to meet tight deadlines

  • Communicating effectively with developers and stakeholders

  • Prioritizing testing tasks based on project needs

Add your answer

Q189. What is dom,pom, different types of locater

Ans.

DOM stands for Document Object Model, POM stands for Page Object Model. Different types of locators are ID, Name, Class, Tag Name, Link Text, Partial Link Text, CSS Selector and XPath.

  • DOM is a programming interface for web documents. It represents the page so that programs can change the document structure, style, and content.

  • POM is a design pattern that helps to create an object repository for web UI elements. It separates the web UI and test scripts, making the code more re...read more

Add your answer

Q190. 8.Difference between OLTP and OLAP systems.

Ans.

OLTP is a transactional system for day-to-day operations, while OLAP is analytical system for decision-making.

  • OLTP deals with real-time data processing, while OLAP deals with historical data analysis.

  • OLTP is optimized for write operations, while OLAP is optimized for read operations.

  • OLTP is used for operational tasks like order processing, while OLAP is used for strategic tasks like sales forecasting.

  • OLTP databases are normalized, while OLAP databases are denormalized.

  • Example...read more

Add your answer

Q191. Write a program for inheritance and polymorphism?

Ans.

Inheritance allows a class to inherit properties and methods from another class, while polymorphism allows objects of different classes to be treated as objects of a common superclass.

  • Create a base class with common properties and methods

  • Create derived classes that inherit from the base class and add their own unique properties and methods

  • Use virtual functions in the base class and override them in the derived classes to achieve polymorphism

Add your answer

Q192. Speak anything you want in 5 minutes.

Ans.

I will talk about my passion for data analysis and how I have used it to solve complex problems in previous projects.

  • I have always been fascinated by the power of data analysis in uncovering insights and driving decision-making.

  • In my previous role, I used data analysis to identify trends and patterns in customer behavior, leading to a 10% increase in sales.

  • I am proficient in various data analysis tools such as Excel, SQL, and Python, and have a strong foundation in statistica...read more

Add your answer

Q193. What are the cancellation types of the insurance policy?

Add your answer

Q194. How would you optimize the sparse array access.

Ans.

Optimizing sparse array access involves using data structures like hash maps or trees to efficiently store and retrieve values.

  • Use a hash map to store only non-null values and their corresponding indices.

  • Implement a tree-based data structure like a binary search tree or a trie for faster access to sparse array elements.

  • Consider using a compressed sparse row (CSR) format for large sparse arrays to reduce memory usage and improve access times.

Add your answer

Q195. 6.Can you join different fact tables ?

Ans.

Yes, fact tables can be joined together in a data warehouse to combine related information.

  • Fact tables contain quantitative data and are typically joined using common dimensions.

  • Joining fact tables allows for more comprehensive analysis and reporting.

  • For example, joining a sales fact table with a customer fact table can provide insights on customer behavior and purchasing patterns.

View 1 answer

Q196. What will you do to improve bottom quartile

Ans.

To improve bottom quartile, I will focus on identifying areas of improvement, providing targeted training, setting clear goals, and regularly monitoring progress.

  • Identify specific areas where the bottom quartile is lacking and develop targeted improvement plans.

  • Provide additional training and resources to help employees in the bottom quartile improve their skills and performance.

  • Set clear and achievable goals for employees in the bottom quartile to work towards.

  • Regularly moni...read more

Add your answer

Q197. What is react router dom

Ans.

React Router DOM is a popular routing library for React applications.

  • Used for handling routing in React applications

  • Allows for declarative routing using components like BrowserRouter, Route, Switch, etc.

  • Enables navigation between different components without full page reloads

Add your answer

Q198. Print Numbers between 1 to 20 , even/odd numbers

Ans.

Print even and odd numbers between 1 to 20.

  • Iterate from 1 to 20 and check if the number is even or odd.

  • Use a conditional statement to determine if the number is even or odd.

  • Print the number along with its type (even or odd).

Add your answer

Q199. What are Cucumber hooks?

Ans.

Cucumber hooks are blocks of code that run before or after each scenario in Cucumber tests.

  • Cucumber hooks allow for setup and teardown actions before and after scenarios

  • They can be used to perform actions like opening a browser before a scenario and closing it after

  • Hooks can be defined at different levels such as global, scenario, or feature level

Add your answer

Q200. Types of wait in selenium and syntax.

Ans.

Types of wait in Selenium and their syntax.

  • Implicit Wait: driver.manage().timeouts().implicitlyWait(10, TimeUnit.SECONDS)

  • Explicit Wait: WebDriverWait wait = new WebDriverWait(driver, 10); wait.until(ExpectedConditions.visibilityOfElementLocated(By.id("elementId")));

  • Fluent Wait: Wait wait = new FluentWait(driver).withTimeout(Duration.ofSeconds(10)).pollingEvery(Duration.ofSeconds(2)).ignoring(NoSuchElementException.class);

Add your answer
1
2
3
4
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos

Interview Process at null

based on 250 interviews in the last 1 year
Interview experience
3.9
Good
View more
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Interview Questions from Similar Companies

4.2
 • 630 Interview Questions
3.4
 • 486 Interview Questions
4.0
 • 384 Interview Questions
4.1
 • 359 Interview Questions
4.1
 • 153 Interview Questions
3.8
 • 129 Interview Questions
View all
Top GlobalLogic Interview Questions And Answers
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
70 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions
Get AmbitionBox app

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter