Add office photos
GlobalLogic logo
Engaged Employer

GlobalLogic

Verified
3.6
based on 4.5k Reviews
Video summary
Filter interviews by

300+ GlobalLogic Interview Questions and Answers

Updated 10 Mar 2025
Popular Designations

Q101. How to handle dropdown using selenium?

Ans.

Dropdowns can be handled using Select class in Selenium.

  • Locate the dropdown element using any of the locators available in Selenium

  • Create an object of Select class and pass the dropdown element as argument

  • Use selectByVisibleText(), selectByValue() or selectByIndex() methods to select an option

  • Use getOptions() method to get all the options in the dropdown

  • Use isMultiple() method to check if the dropdown allows multiple selections

Add your answer
right arrow

Q102. what are different keys in sql

Ans.

Different keys in SQL include primary key, foreign key, unique key, and composite key.

  • Primary key uniquely identifies each record in a table

  • Foreign key establishes a relationship between two tables

  • Unique key ensures that all values in a column are unique

  • Composite key is a combination of multiple columns to uniquely identify a record

Add your answer
right arrow
GlobalLogic Interview Questions and Answers for Freshers
illustration image

Q103. Who has invented java language.

Ans.

James Gosling, Mike Sheridan, and Patrick Naughton invented the Java language.

  • Invented by James Gosling, Mike Sheridan, and Patrick Naughton at Sun Microsystems in the early 1990s.

  • Java was originally developed to be used in consumer electronic devices like set-top boxes.

  • Released in 1995 as a core component of Sun Microsystems' Java platform.

  • Known for its platform independence, allowing code to run on any device that has a Java Virtual Machine (JVM).

Add your answer
right arrow

Q104. What is the difference between TDD and BDD?

Ans.

TDD focuses on testing the functionality of individual units of code, while BDD focuses on testing the behavior of the system as a whole.

  • TDD stands for Test-Driven Development, where tests are written before the code is implemented to drive the development process.

  • BDD stands for Behavior-Driven Development, where tests are written in a human-readable format to describe the behavior of the system.

  • TDD is more focused on the technical aspects of the code, ensuring that individua...read more

Add your answer
right arrow
Discover GlobalLogic interview dos and don'ts from real experiences

Q105. Difference between function and stored procedure

Ans.

Function is a reusable block of code that returns a value, while stored procedure is a group of SQL statements that can be executed together.

  • Functions return a single value, while stored procedures can return multiple values.

  • Functions are called in SQL queries, while stored procedures are called using EXECUTE statement.

  • Functions cannot modify database state, while stored procedures can.

  • Functions are easier to test and debug compared to stored procedures.

  • Example: Function to c...read more

Add your answer
right arrow

Q106. Loadrunner scripting, execution and reports issue faced and how to process?

Ans.

Issues faced in Loadrunner scripting, execution, and reports

  • Scripting: faced issues with correlation, parameterization, and dynamic data handling

  • Execution: encountered problems with test environment setup, resource constraints, and test data management

  • Reports: struggled with result analysis, performance bottlenecks identification, and report customization

Add your answer
right arrow
Are these interview questions helpful?

Q107. 1. Implement Fibonacci using dynamic programming 2. Strength and weakness

Ans.

Implement Fibonacci using dynamic programming and discuss strengths and weaknesses.

  • Dynamic programming uses memoization to store previously calculated values

  • Fibonacci sequence is a classic example of dynamic programming

  • Strengths: efficient, reduces redundant calculations, improves performance

  • Weaknesses: requires additional memory, may not be suitable for small problems

  • Example: fib(n) = fib(n-1) + fib(n-2), with base cases fib(0) = 0 and fib(1) = 1

Add your answer
right arrow

Q108. Name of the google products

Ans.

Google offers a wide range of products and services including search engine, email, cloud storage, productivity tools, and more.

  • Google Search

  • Gmail

  • Google Drive

  • Google Docs

  • Google Sheets

  • Google Slides

  • Google Calendar

  • Google Maps

  • Google Photos

  • Google Translate

  • Google Chrome

  • Google Ads

  • Google Analytics

  • Google Cloud Platform

  • Google Meet

  • Google Classroom

  • Google Assistant

  • Google Play Store

View 3 more answers
right arrow
Share interview questions and help millions of jobseekers 🌟
man with laptop

Q109. What is the JavaScript code to find duplicates in an array?

Add your answer
right arrow

Q110. What are the differences between primitive and non-primitive data types in JavaScript?

Add your answer
right arrow

Q111. What is the angle between the hour and minute hands of a clock at 7:45? - Logical Reasoning

Ans.

Calculate the angle between clock hands at 7:45 using degrees per minute and hour.

  • Each hour on a clock represents 30 degrees (360 degrees / 12 hours).

  • At 7:00, the hour hand is at 210 degrees (7 * 30).

  • The minute hand moves 6 degrees per minute (360 degrees / 60 minutes).

  • At 45 minutes, the minute hand is at 270 degrees (45 * 6).

  • The angle between the hands is |270 - 210| = 60 degrees.

Add your answer
right arrow

Q112. MAP vs HASHMAP and difference between the Collection vs Collections.

Ans.

MAP is an interface while HASHMAP is a class implementing it. Collection is an interface while Collections is a utility class.

  • MAP is used to store key-value pairs while HASHMAP is a class implementing it.

  • MAP is an interface while HASHMAP is a class implementing it.

  • Collection is used to store a group of objects while Collections is a utility class providing various methods to manipulate collections.

  • Collection is an interface while Collections is a utility class.

Add your answer
right arrow

Q113. Write a program to store the characters of a string in arraylist and print the arraylist.

Ans.

Program to store characters of a string in an arraylist and print it.

  • Create an ArrayList to store characters

  • Iterate through the string and add each character to the ArrayList

  • Print the ArrayList

Add your answer
right arrow

Q114. What is linked list in data structure

Ans.

A linked list is a linear data structure where each element is a separate object with a pointer to the next element.

  • Consists of nodes that contain data and a pointer to the next node

  • Can be singly linked or doubly linked

  • Allows for efficient insertion and deletion operations

  • Example: Linked list can be used to implement a stack or queue

Add your answer
right arrow

Q115. what is state management?

Ans.

State management is the process of managing the state of an application, including data flow, user interface updates, and user interactions.

  • State management involves storing and updating the current state of an application.

  • It helps in managing data flow between different components of the application.

  • State management is crucial for ensuring that user interface updates reflect the most recent data.

  • Examples of state management tools include Redux, MobX, and Context API in React...read more

Add your answer
right arrow

Q116. Implementation of HashMap , LinkedList, HashSet, Heap?

Ans.

HashMap, LinkedList, HashSet, and Heap are data structures commonly used in Java for storing and organizing data.

  • HashMap: key-value pairs, uses hashing to store and retrieve elements efficiently (e.g. HashMap)

  • LinkedList: linear data structure, elements are stored in nodes with pointers to the next node (e.g. LinkedList)

  • HashSet: collection of unique elements, uses hashing to ensure uniqueness (e.g. HashSet)

  • Heap: binary tree-based data structure, used for priority queue operati...read more

Add your answer
right arrow
Q117. What is Auto Scaling in AWS?
Ans.

Auto Scaling in AWS is a feature that automatically adjusts the number of compute resources in response to changes in demand.

  • Automatically adjusts the number of EC2 instances based on traffic or performance metrics

  • Helps maintain application availability and reduce costs by scaling up or down as needed

  • Can be configured to scale based on CPU utilization, network traffic, or custom metrics

  • Example: Auto Scaling group can be set up to add more instances during peak hours and remov...read more

Add your answer
right arrow

Q118. Activity call backs while doing the confiuration changes.

Ans.

Activity call backs are used to handle configuration changes in software.

  • Activity call backs are methods that are called when certain events occur in an activity's lifecycle.

  • They are commonly used to handle configuration changes such as screen rotation or language changes.

  • By implementing activity call backs, developers can save and restore important data or update the UI accordingly.

  • Examples of activity call backs include onCreate(), onPause(), onResume(), etc.

Add your answer
right arrow

Q119. Count the frequency of the charcters in a word

Ans.

To count the frequency of characters in a word, iterate through the word and store the count of each character in a data structure.

  • Create a map or dictionary to store the count of each character

  • Iterate through the word and update the count of each character in the map

  • Return the map with character frequencies

Add your answer
right arrow

Q120. Flowcharts of If and Nested If Scenarios

Ans.

Understanding flowcharts for If and Nested If scenarios in software engineering.

  • Flowcharts visually represent the logic of a program using symbols and arrows.

  • If statements are represented by a diamond shape with a condition inside.

  • Nested If scenarios involve multiple levels of If statements within each other.

  • Each branch in a flowchart represents a possible path the program can take based on conditions.

  • Example: If x > 5, do A. If x < 5, do B. If y > 10, do C.

  • Example: If x > 5,...read more

Add your answer
right arrow

Q121. client wants to complete a task in one week. what is approach

Ans.

To complete the task in one week, prioritize tasks, allocate resources efficiently, set clear milestones, and communicate effectively with the client.

  • Prioritize tasks based on importance and urgency

  • Allocate resources effectively to ensure timely completion

  • Set clear milestones and deadlines to track progress

  • Communicate regularly with the client to provide updates and address any issues

  • Consider using project management tools to streamline the process

Add your answer
right arrow

Q122. What is Java and what is OOPS Concept

Ans.

Java is a popular programming language known for its portability and OOPS is a programming paradigm based on objects and classes.

  • Java is a high-level, class-based, object-oriented programming language.

  • OOPS (Object-Oriented Programming) is a programming paradigm based on the concept of objects, which can contain data in the form of fields and code in the form of procedures.

  • OOPS concepts include Inheritance, Encapsulation, Polymorphism, and Abstraction.

  • Example: In Java, you can...read more

Add your answer
right arrow

Q123. Write programming logic for Await and Sync

Ans.

Await and Sync are programming concepts used for managing asynchronous operations in code execution.

  • Await is used to pause the execution of a function until a Promise is settled, returning the result.

  • Sync is used to synchronize multiple threads or processes to ensure they are executed in a specific order.

  • Example: await fetch('https://api.example.com/data')

  • Example: sync.Mutex.Lock()

  • Both Await and Sync are important for handling concurrency and improving performance in software...read more

Add your answer
right arrow

Q124. 7.What do you understand by degenerate dimension?

Ans.

Degenerate dimension refers to a dimension with only one value.

  • A degenerate dimension is a dimension table with only one column and one row.

  • It is used to join fact tables with different granularity levels.

  • For example, a time dimension with only one value can be used to join a sales fact table with daily granularity and a returns fact table with hourly granularity.

Add your answer
right arrow

Q125. What did you know about multiple tabs in Laptop

Ans.

Multiple tabs in a laptop refer to the ability to have multiple web pages or applications open simultaneously in separate tabs within a web browser or software program.

  • Multiple tabs allow for multitasking and easy navigation between different websites or tasks.

  • Each tab functions independently, allowing users to switch between them without closing or losing any information.

  • Tabs can be opened, closed, rearranged, and organized according to the user's preferences.

  • Examples includ...read more

Add your answer
right arrow

Q126. What is the difference between var and let in JavaScript?

Ans.

var is function-scoped, while let is block-scoped, leading to different behaviors in variable accessibility.

  • Scope: 'var' is function-scoped; 'let' is block-scoped.

  • Hoisting: Both are hoisted, but 'let' is not initialized until its declaration.

  • Re-declaration: 'var' allows re-declaration; 'let' does not.

  • Example of 'var': function test() { var x = 1; if (true) { var x = 2; } console.log(x); } // Outputs 2

  • Example of 'let': function test() { let x = 1; if (true) { let x = 2; } cons...read more

Add your answer
right arrow
Q127. What are Docker images?
Ans.

Docker images are lightweight, standalone, executable packages that contain everything needed to run a piece of software.

  • Docker images are built from Dockerfiles, which specify the environment and dependencies needed for the software to run.

  • Images can be stored in Docker registries like Docker Hub for easy sharing and distribution.

  • Containers are created from Docker images and run as isolated processes on a host machine.

  • Docker images are layered, meaning they can be built on t...read more

Add your answer
right arrow

Q128. How would you spend 1 crore rupees if provided

Ans.

I would invest in a diversified portfolio, donate to charity, and save for future expenses.

  • Invest a portion in a diversified portfolio to generate long-term returns

  • Donate to charity to give back to the community

  • Save a portion for future expenses such as education or emergencies

Add your answer
right arrow
Q129. What is dependency injection?
Ans.

Dependency injection is a design pattern in which components are given their dependencies rather than creating them internally.

  • Dependency injection helps in achieving loose coupling between classes.

  • It allows for easier testing by providing a way to mock dependencies.

  • There are three types of dependency injection - constructor injection, setter injection, and interface injection.

  • Example: In a Java application, a service class can be injected with a DAO interface implementation ...read more

Add your answer
right arrow

Q130. What is MVC architecture

Ans.

MVC architecture is a software design pattern that separates an application into three main components: Model, View, and Controller.

  • Model represents the data and business logic of the application

  • View is responsible for displaying the data to the user

  • Controller acts as an intermediary between Model and View, handling user input and updating the Model accordingly

  • Example: In a web application, the Model could be a database, the View could be the HTML/CSS for the user interface, ...read more

Add your answer
right arrow

Q131. Program to check if string is palindrome or not

Ans.

Program to check if a string is a palindrome or not

  • Create a function that takes a string as input

  • Remove all non-alphanumeric characters and convert to lowercase

  • Compare the original string with its reverse to check if it's a palindrome

  • Return true if it's a palindrome, false otherwise

Add your answer
right arrow
Q132. What are Docker Namespaces?
Ans.

Docker Namespaces are a feature in Docker that isolates containers from each other and the host system.

  • Namespaces provide a way to isolate processes, network, and filesystem for containers.

  • Examples of namespaces include PID (process IDs), NET (networking), and MNT (mount points).

  • Each container runs in its own set of namespaces, providing a level of isolation and security.

Add your answer
right arrow

Q133. Display the character and it's frequency in a string.

Ans.

Display the character and it's frequency in a string.

  • Iterate through the string and count the frequency of each character using a dictionary or hashmap.

  • Print the character and its frequency for each unique character in the string.

  • Handle edge cases such as empty string or non-alphabetic characters.

Add your answer
right arrow

Q134. Number of Matches among teams given team names using sql?

Ans.

Using SQL, count the number of matches among teams given team names.

  • Create a table for teams and another for matches

  • Use JOIN to match teams in the matches table

  • Use COUNT to get the number of matches for each team

Add your answer
right arrow

Q135. What are the steps to connect to a database?

Ans.

Steps to connect to a database involve specifying the database type, providing credentials, and establishing a connection.

  • Specify the type of database you want to connect to (e.g. MySQL, PostgreSQL, MongoDB).

  • Provide the necessary credentials such as username and password.

  • Establish a connection using a programming language or tool like JDBC, ODBC, or ORM frameworks.

Add your answer
right arrow

Q136. Definitions and example code of OOPS Concepts

Ans.

OOPS Concepts are fundamental principles of Object-Oriented Programming.

  • Encapsulation - bundling of data and methods that operate on that data

  • Inheritance - ability of a class to inherit properties and methods from its parent class

  • Polymorphism - ability of objects to take on multiple forms

  • Abstraction - hiding of complex implementation details from the user

  • Example code: class Car { private String make; public void setMake(String make) { this.make = make; } }

Add your answer
right arrow

Q137. What is the role of maps in our current generation?

Add your answer
right arrow

Q138. How would you plan the steps to create a user manual for a product?

Ans.

To create a user manual for a product, plan the steps by understanding the product, identifying the target audience, outlining the content, creating a structure, writing and editing the manual, and conducting usability testing.

  • Understand the product and its features thoroughly

  • Identify the target audience and their level of expertise

  • Outline the content to be included in the manual

  • Create a logical structure and organize the information

  • Write the manual using clear and concise la...read more

Add your answer
right arrow

Q139. What do know about financial statement

Ans.

Financial statements are reports that show the financial performance and position of a company.

  • Financial statements include the income statement, balance sheet, and cash flow statement.

  • They provide information on revenue, expenses, assets, liabilities, and equity.

  • Investors, analysts, and regulators use financial statements to assess the financial health of a company.

  • Examples of financial statements include annual reports, quarterly reports, and SEC filings.

Add your answer
right arrow

Q140. how can you create automated reports

Ans.

Automated reports can be created using tools like Microsoft Excel, Google Sheets, or business intelligence software.

  • Use tools like Microsoft Excel or Google Sheets to create automated reports by setting up formulas and macros.

  • Utilize business intelligence software like Tableau or Power BI to automate data extraction, transformation, and visualization for reports.

  • Schedule automated reports to run at specific times using tools like Microsoft Power Automate or Google Apps Script...read more

Add your answer
right arrow

Q141. what are indexes and their types

Ans.

Indexes are data structures used to improve the speed of data retrieval in databases. They help in quickly locating data without having to scan the entire database.

  • Indexes are created on columns in a database table to speed up the retrieval of rows that match a certain condition.

  • Types of indexes include clustered indexes, non-clustered indexes, unique indexes, and composite indexes.

  • Clustered indexes determine the physical order of data in a table, while non-clustered indexes ...read more

Add your answer
right arrow

Q142. What is TestNG, Difference between WebElement and WebElements, fially and final, types of Exceptions in selenium, how to handel frams

Ans.

TestNG is a testing framework for Java. WebElement represents a single element on a web page, while WebElements represents a collection of elements. 'finally' is a keyword used in exception handling. There are different types of exceptions in Selenium. To handle frames in Selenium, we can use the switchTo() method.

  • TestNG is a testing framework for Java

  • WebElement represents a single element on a web page

  • WebElements represents a collection of elements

  • 'finally' is a keyword used...read more

Add your answer
right arrow

Q143. Feature and benefits of Spring boot ?

Ans.

Spring Boot is a framework that simplifies the development of Java applications.

  • Provides a pre-configured environment for building production-grade applications

  • Reduces boilerplate code and configuration

  • Supports a wide range of data sources and integrations

  • Enables easy deployment and scaling of applications

  • Offers built-in security features

  • Example: Spring Boot can be used to quickly create a RESTful API with minimal setup

Add your answer
right arrow

Q144. Design patterns in android system

Ans.

Design patterns are reusable solutions to common software problems. Android system uses various design patterns.

  • MVC (Model-View-Controller) pattern is used in Android to separate UI logic from business logic.

  • Singleton pattern is used to ensure only one instance of a class is created.

  • Observer pattern is used to notify changes in data to multiple components.

  • Builder pattern is used to simplify complex object creation.

  • Adapter pattern is used to convert the interface of a class in...read more

Add your answer
right arrow

Q145. What do you know about content engineering?

Ans.

Content engineering involves organizing, structuring, and optimizing content for various platforms and audiences.

  • Content engineering is a process of creating structured content that can be easily reused and repurposed.

  • It involves analyzing content to identify patterns and relationships, and then organizing it into a structured format.

  • Content engineering also includes optimizing content for different platforms and audiences, such as mobile devices or social media.

  • Examples of c...read more

Add your answer
right arrow

Q146. Explain Jenkins pipeline of your Project

Ans.

Jenkins pipeline automates the software delivery process by defining a set of steps and actions to be executed.

  • Pipeline is defined using a Jenkinsfile

  • Pipeline stages define the steps to be executed

  • Pipeline can include parallel stages and conditional steps

  • Pipeline can integrate with other tools like Git, Docker, and Kubernetes

Add your answer
right arrow

Q147. Difference between Git rebase and Git merge

Ans.

Git rebase modifies the commit history while Git merge creates a new merge commit.

  • Git rebase rewrites the commit history by moving the entire feature branch to the tip of the master branch

  • Git merge creates a new merge commit that combines the changes from both branches

  • Rebasing is useful for keeping a linear commit history while merging is useful for combining multiple branches

  • Rebasing can cause conflicts if multiple developers are working on the same branch

  • Merging can result ...read more

Add your answer
right arrow

Q148. Design an elaborate user access control system, with granular control from pages, controls, data, and response masking.

Ans.

Design a user access control system with granular control for pages, controls, data, and response masking.

  • Implement role-based access control (RBAC) to assign permissions to users based on their roles.

  • Utilize attribute-based access control (ABAC) for more fine-grained control over access to specific pages, controls, and data.

  • Implement data masking techniques to ensure sensitive information is not exposed in responses.

  • Use a combination of authentication mechanisms such as OAut...read more

Add your answer
right arrow

Q149. java program to reverse a string

Ans.

A Java program to reverse a string.

  • Convert the string to a character array.

  • Use two pointers, one at the beginning and one at the end of the array.

  • Swap the characters at the two pointers and move the pointers towards each other until they meet.

  • Convert the character array back to a string.

View 2 more answers
right arrow

Q150. What are observables in Angular

Ans.

Observables are a way to handle asynchronous data streams in Angular.

  • Observables are similar to Promises but can handle multiple values over time.

  • They can be created using the RxJS library.

  • They can be used for handling HTTP requests, user input, and other asynchronous events.

  • Operators can be used to transform, filter, and combine observables.

  • Subscriptions are used to listen for and handle emitted values from observables.

Add your answer
right arrow

Q151. Which region of transistor is heavily doped?

Ans.

The heavily doped region of a transistor is the emitter region.

  • The emitter region of a transistor is heavily doped to increase its conductivity.

  • Heavily doping the emitter region allows for efficient injection of majority carriers into the base region.

  • The heavily doped emitter region helps in achieving a high current gain in a transistor.

  • Examples of heavily doped materials used in the emitter region include N+ or P+ type materials.

Add your answer
right arrow

Q152. What is init block in kotlin.

Ans.

The init block in Kotlin is used to initialize properties or execute code when an object is created.

  • The init block is defined inside a class and is executed immediately after the primary constructor.

  • It can be used to initialize properties or perform any other necessary setup.

  • Multiple init blocks can be defined in a class, and they are executed in the order of their appearance.

  • The init block is useful when you need to execute code during object creation that cannot be handled ...read more

View 1 answer
right arrow

Q153. What 3 golden rolu of accounting

Ans.

The 3 golden rules of accounting are the rules of debit and credit, the rule of assets equal liabilities plus equity, and the rule of revenue minus expenses equals profit.

  • Rule of Debit and Credit: Every transaction has equal debits and credits, ensuring the accounting equation stays balanced.

  • Rule of Assets equal Liabilities plus Equity: The total assets of a business must equal the total of its liabilities and equity.

  • Rule of Revenue minus Expenses equals Profit: The differenc...read more

Add your answer
right arrow

Q154. What do you know about prepaid expense

Ans.

Prepaid expenses are expenses that have been paid for in advance but have not yet been incurred.

  • Prepaid expenses are considered assets on a company's balance sheet until they are used up or expire.

  • Common examples of prepaid expenses include prepaid rent, insurance premiums, and subscriptions.

  • Prepaid expenses are initially recorded as assets and then gradually expensed over time as they are used up.

  • Prepaid expenses are typically classified as current assets if they are expecte...read more

Add your answer
right arrow

Q155. what is cypress ,difference between cypress and selenium

Ans.

Cypress is a JavaScript-based end-to-end testing framework. It differs from Selenium in terms of architecture, ease of use, and speed.

  • Cypress is a JavaScript-based testing framework for web applications.

  • It provides a simple and intuitive API for writing tests.

  • Cypress runs directly in the browser and can access everything on the page.

  • Unlike Selenium, Cypress does not use WebDriver and has a different architecture.

  • Cypress offers automatic waiting for elements and actions, makin...read more

Add your answer
right arrow

Q156. What is virtual keyword and how virtual functions work internally

Ans.

The virtual keyword in C++ is used to declare a member function that can be overridden in a derived class. Virtual functions are resolved at runtime.

  • Virtual keyword is used to achieve runtime polymorphism in C++

  • Virtual functions are resolved at runtime based on the actual object type

  • Virtual functions are implemented using virtual function tables (vtables)

  • Derived classes can override virtual functions to provide specific implementations

Add your answer
right arrow

Q157. What is the use of RxJS

Ans.

RxJS is a reactive programming library for JavaScript.

  • RxJS allows for easier management of asynchronous data streams.

  • It provides operators for filtering, transforming, and combining data streams.

  • RxJS can be used in both front-end and back-end development.

  • Examples of its use include handling user input, making HTTP requests, and managing state in a Redux store.

Add your answer
right arrow

Q158. What is debouncing technique in swift. what is factorial pattern in swift what is dispatch_wait. Explain bluethooth in iOS. Explain InAppPurchases in iOS.

Ans.

Debouncing technique in Swift is used to limit the rate at which a function is called, preventing it from being called multiple times in a short period.

  • Debouncing involves setting a time threshold and only allowing the function to be called after that threshold has passed without any new calls.

  • It is commonly used in scenarios like search bars or buttons to prevent rapid firing of events.

  • Example: Implementing a search functionality where the search query is only executed after...read more

Add your answer
right arrow

Q159. 1.What is the difference between atomic and nonatomic properties. 2.How do you handle memory management in Swift. 3.Difference between classes and struct in Swift. 4. What is Factorial Pattern.

Ans.

1. Atomic properties ensure that the value is always fully retrieved or set, while nonatomic properties do not guarantee this. 2. Memory management in Swift is handled automatically using Automatic Reference Counting (ARC). 3. Classes are reference types, while structs are value types in Swift. 4. Factorial pattern is a design pattern used to calculate the factorial of a number.

  • Atomic properties ensure thread safety by ensuring that the value is fully retrieved or set before ...read more

Add your answer
right arrow

Q160. how microservices are developed.

Ans.

Microservices are developed by breaking down a large application into smaller, independent services that communicate with each other through APIs.

  • Identify the boundaries of each microservice based on business capabilities

  • Design each microservice to be independent and loosely coupled

  • Use lightweight protocols like HTTP or messaging queues for communication between microservices

  • Implement each microservice using the technology stack best suited for its requirements

  • Deploy microser...read more

Add your answer
right arrow

Q161. Describe microservices architecture for a wealth management app

Ans.

Microservices architecture for a wealth management app involves breaking down the application into smaller, independent services.

  • Each microservice focuses on a specific business function, such as client onboarding, portfolio management, or reporting.

  • Services communicate through APIs, allowing for flexibility and scalability.

  • Each microservice can be developed, deployed, and scaled independently, leading to faster development cycles and easier maintenance.

  • Microservices architec...read more

Add your answer
right arrow

Q162. Can you draw Linux Architecture ?

Ans.

Linux architecture consists of kernel, system libraries, user space programs and file system.

  • Linux architecture is based on a monolithic kernel.

  • The kernel provides low-level hardware interaction and manages system resources.

  • System libraries provide higher-level functionality to user space programs.

  • User space programs are applications that run on top of the kernel.

  • The file system organizes and stores data on the system.

  • Examples of Linux distributions include Ubuntu, Debian, an...read more

Add your answer
right arrow

Q163. what is Selenium webdriver?

Ans.

Selenium WebDriver is a tool used for automating web application testing.

  • Selenium WebDriver is a popular automation tool for testing web applications.

  • It supports multiple programming languages such as Java, Python, C#, etc.

  • WebDriver interacts with the web browser to simulate user actions like clicking buttons, entering text, etc.

  • It can run tests on different browsers like Chrome, Firefox, Safari, etc.

  • WebDriver can handle complex scenarios like handling pop-ups, alerts, frames...read more

Add your answer
right arrow

Q164. What are OOPS concepts

Ans.

OOPS concepts refer to Object-Oriented Programming principles such as inheritance, encapsulation, polymorphism, and abstraction.

  • Inheritance: Allows a class to inherit properties and behavior from another class.

  • Encapsulation: Bundling data and methods that operate on the data into a single unit.

  • Polymorphism: Ability to present the same interface for different data types.

  • Abstraction: Hiding the complex implementation details and showing only the necessary features.

Add your answer
right arrow

Q165. What is Agile methodology

Ans.

Agile methodology is a project management approach that emphasizes flexibility, collaboration, and incremental development.

  • Agile focuses on delivering working software in short, iterative cycles called sprints.

  • It values customer collaboration, responding to change, and continuous improvement.

  • Key principles include individuals and interactions over processes and tools, working software over comprehensive documentation, customer collaboration over contract negotiation, and resp...read more

Add your answer
right arrow

Q166. How to store memory?

Ans.

Memory can be stored in various ways such as RAM, ROM, hard drives, and cloud storage.

  • Memory can be stored in Random Access Memory (RAM) for quick access by the CPU.

  • Read-Only Memory (ROM) stores permanent data that cannot be modified.

  • Hard drives store data magnetically on spinning disks or solid-state drives.

  • Cloud storage allows data to be stored remotely on servers accessed over the internet.

Add your answer
right arrow

Q167. Explain branching statergy, deployment process and IAC

Ans.

Branching strategy is a way to manage code changes, deployment process is a set of steps to release code, and IAC is a method to automate infrastructure.

  • Branching strategy determines how code changes are managed and merged into the main codebase.

  • Deployment process involves steps like building, testing, and releasing code to production.

  • IAC (Infrastructure as Code) is a method to automate infrastructure management using code.

  • Tools like Git, Jenkins, and Terraform are commonly u...read more

Add your answer
right arrow

Q168. Perquisite to release app on play store

Ans.

Perquisites for releasing an app on Play Store

  • Creating a developer account on Google Play Console

  • Complying with Google Play policies and guidelines

  • Providing accurate app information and metadata

  • Ensuring app compatibility with target devices

  • Testing app thoroughly for bugs and crashes

  • Publishing app with appropriate content rating

  • Setting up monetization options and pricing

  • Providing customer support and responding to user feedback

Add your answer
right arrow

Q169. Write a program to add a node to the end of the linkedlist

Ans.

Program to add a node to the end of a linked list

  • Create a new node with the data to be added

  • Traverse the linked list to reach the last node

  • Update the next pointer of the last node to point to the new node

Add your answer
right arrow

Q170. Write a program to check if a number is palindrome or not.

Ans.

Program to check if a number is palindrome or not.

  • Convert the number to a string for easier comparison

  • Reverse the string and compare it with the original string

  • If they are the same, the number is a palindrome

Add your answer
right arrow

Q171. What is CTE ? And Write a Sample Query ?

Ans.

CTE stands for Common Table Expressions, used to create temporary result sets within a SQL query.

  • CTE is defined using the WITH keyword in SQL.

  • It helps in simplifying complex queries by breaking them into smaller, more manageable parts.

  • CTEs can reference themselves recursively, making them useful for hierarchical data.

  • Example: WITH cte AS (SELECT * FROM table_name) SELECT * FROM cte;

Add your answer
right arrow

Q172. What are the tech stacks used in project?

Ans.

The tech stacks used in the project include Java, Spring Boot, Angular, and MySQL.

  • Java

  • Spring Boot

  • Angular

  • MySQL

Add your answer
right arrow

Q173. What type of cursors did you use

Ans.

I have used both implicit and explicit cursors in PL/SQL development.

  • Implicit cursors are used for single-row queries while explicit cursors are used for multi-row queries.

  • I have used explicit cursors with parameters to make the query more dynamic.

  • I have also used cursor variables to pass cursors as parameters to procedures and functions.

  • Examples of cursor types I have used include FOR LOOP, FETCH, and UPDATE cursors.

Add your answer
right arrow

Q174. Automate a login page and explain it? Synchronisation handling and exception handling

Ans.

Automate a login page using Selenium WebDriver in Java with synchronization and exception handling.

  • Use Selenium WebDriver to locate the username and password fields, enter valid credentials, and click the login button.

  • Implement explicit and implicit waits for synchronization to handle dynamic elements and page loading.

  • Use try-catch blocks for exception handling to capture and handle any errors during the login process.

  • Handle common exceptions like ElementNotVisibleException, ...read more

Add your answer
right arrow

Q175. What is unique key?

Ans.

A unique key is a field or combination of fields in a database table that uniquely identifies each record in the table.

  • A unique key ensures that no two records in a table have the same values for the specified key fields.

  • It can be a single field or a combination of multiple fields.

  • Unique keys are used to enforce data integrity and prevent duplicate entries.

Add your answer
right arrow

Q176. When is double linked list used.?

Ans.

Double linked lists are used when there is a need to traverse the list in both directions efficiently.

  • Allows for traversal in both directions

  • Insertions and deletions can be done in constant time

  • Used in implementations of undo functionality in text editors

Add your answer
right arrow

Q177. Explain about CAN protocol Details?

Ans.

CAN protocol is a communication protocol used in automotive and industrial applications for high-speed data transmission.

  • CAN stands for Controller Area Network

  • It is a message-based protocol used for communication between electronic control units (ECUs) in vehicles

  • CAN uses a two-wire bus for communication - CAN High and CAN Low

  • Messages in CAN protocol are prioritized based on their identifier

  • CAN supports two message formats - Standard CAN and Extended CAN

  • Error detection and fa...read more

Add your answer
right arrow

Q178. What do you understand by Deamons?

Ans.

Daemons are background processes that run continuously on a computer system.

  • Daemons are usually started at system boot time

  • They perform tasks such as handling requests from other programs or monitoring system activity

  • Examples include web servers, email servers, and print spoolers

Add your answer
right arrow

Q179. System design - high level on designing youtube

Ans.

Designing a high-level system for YouTube

  • Use a distributed system architecture to handle large amounts of data and traffic

  • Implement a content delivery network (CDN) to efficiently deliver video content to users worldwide

  • Utilize a recommendation algorithm to suggest personalized content to users based on their viewing history

  • Incorporate a robust user authentication and authorization system to protect user data and prevent unauthorized access

Add your answer
right arrow

Q180. What is Collections?

Ans.

Collections are classes that group similar objects together and provide methods to operate on them.

  • Collections are used to store and manipulate groups of objects

  • They provide methods to add, remove, and access elements in the collection

  • Examples include ArrayList, LinkedList, HashSet, and TreeMap

Add your answer
right arrow

Q181. prime number 1 to 100 and sql query for 3rd highest salary

Ans.

Prime numbers 1 to 100 and SQL query for 3rd highest salary.

  • Prime numbers from 1 to 100: 2, 3, 5, 7, 11, 13, 17, 19, 23, 29, 31, 37, 41, 43, 47, 53, 59, 61, 67, 71, 73, 79, 83, 89, 97

  • SQL query for 3rd highest salary: SELECT salary FROM employees ORDER BY salary DESC LIMIT 2, 1

Add your answer
right arrow

Q182. Scrum methodology and types of meetings.

Ans.

Scrum methodology involves various meetings such as daily stand-up, sprint planning, review, and retrospective.

  • Daily stand-up meetings are held to discuss progress and plan for the day.

  • Sprint planning meetings are held at the beginning of each sprint to plan the work to be done.

  • Sprint review meetings are held at the end of each sprint to review the work done and get feedback.

  • Retrospective meetings are held at the end of each sprint to reflect on the process and identify areas...read more

Add your answer
right arrow

Q183. 1. What is ETL and DWH?

Ans.

ETL stands for Extract, Transform, Load and DWH stands for Data Warehouse.

  • ETL is a process of extracting data from various sources, transforming it into a format suitable for analysis, and loading it into a target system.

  • DWH is a system used for storing and managing data from various sources for business intelligence purposes.

  • ETL is a crucial step in populating a DWH with data.

  • ETL involves data extraction, data transformation, and data loading.

  • DWH is designed to support decis...read more

Add your answer
right arrow

Q184. what are promises

Ans.

Promises are a feature in JavaScript that allow asynchronous operations to be handled in a more organized and readable way.

  • Promises are objects that represent the eventual completion or failure of an asynchronous operation.

  • They are used to handle asynchronous code and avoid callback hell.

  • Promises have three states: pending, fulfilled, or rejected.

  • They can be chained together using methods like .then() and .catch().

  • Promises can be created using the Promise constructor or by us...read more

Add your answer
right arrow

Q185. what is event loop

Ans.

Event loop is a mechanism that allows a program to efficiently handle and respond to multiple events or tasks concurrently.

  • Event loop is commonly used in asynchronous programming.

  • It manages the execution of tasks or events in a non-blocking manner.

  • Event loop continuously checks for events or tasks and executes them when they are ready.

  • It helps prevent blocking and allows for efficient utilization of system resources.

  • Examples of event loop implementations include Node.js event...read more

Add your answer
right arrow

Q186. Define transformer and why use transformer

Ans.

A transformer is an electrical device that transfers electrical energy from one circuit to another through electromagnetic induction.

  • Transformers are used to increase or decrease the voltage of an alternating current (AC) power supply.

  • They are used in power distribution systems to step up the voltage for long-distance transmission and step it down for local distribution.

  • Transformers are also used in electronic devices to isolate circuits, match impedances, and provide galvani...read more

Add your answer
right arrow

Q187. SDLC and STLC Difference Test case of Pen Smoke Testing and Sanity Testing Difference

Ans.

SDLC is the process of software development while STLC is the process of software testing. Smoke testing is a subset of sanity testing.

  • SDLC is the process of developing software while STLC is the process of testing software.

  • SDLC includes planning, designing, coding, testing, and maintenance while STLC includes test planning, test case development, test execution, and test closure.

  • Smoke testing is a type of testing that checks if the basic functionalities of the software are w...read more

Add your answer
right arrow

Q188. Second highest salary using sql ?

Ans.

To find the second highest salary using SQL, we can use the ORDER BY and LIMIT clauses.

  • Sort the salaries in descending order using ORDER BY clause

  • Use LIMIT clause to select the second highest salary

  • Example: SELECT salary FROM employees ORDER BY salary DESC LIMIT 1,1

Add your answer
right arrow

Q189. Write any select query

Ans.

Select query to retrieve employee details from a database

  • Use SELECT statement

  • Specify the columns to retrieve

  • Specify the table name

  • Optional: Use WHERE clause for filtering

Add your answer
right arrow

Q190. What is most difficult part in your software testing journey

Ans.

The most difficult part in my software testing journey has been dealing with constantly changing requirements and tight deadlines.

  • Adapting to frequent changes in project scope

  • Managing time effectively to meet tight deadlines

  • Communicating effectively with developers and stakeholders

  • Prioritizing testing tasks based on project needs

Add your answer
right arrow

Q191. What is dom,pom, different types of locater

Ans.

DOM stands for Document Object Model, POM stands for Page Object Model. Different types of locators are ID, Name, Class, Tag Name, Link Text, Partial Link Text, CSS Selector and XPath.

  • DOM is a programming interface for web documents. It represents the page so that programs can change the document structure, style, and content.

  • POM is a design pattern that helps to create an object repository for web UI elements. It separates the web UI and test scripts, making the code more re...read more

Add your answer
right arrow

Q192. 8.Difference between OLTP and OLAP systems.

Ans.

OLTP is a transactional system for day-to-day operations, while OLAP is analytical system for decision-making.

  • OLTP deals with real-time data processing, while OLAP deals with historical data analysis.

  • OLTP is optimized for write operations, while OLAP is optimized for read operations.

  • OLTP is used for operational tasks like order processing, while OLAP is used for strategic tasks like sales forecasting.

  • OLTP databases are normalized, while OLAP databases are denormalized.

  • Example...read more

Add your answer
right arrow

Q193. Write a program for inheritance and polymorphism?

Ans.

Inheritance allows a class to inherit properties and methods from another class, while polymorphism allows objects of different classes to be treated as objects of a common superclass.

  • Create a base class with common properties and methods

  • Create derived classes that inherit from the base class and add their own unique properties and methods

  • Use virtual functions in the base class and override them in the derived classes to achieve polymorphism

Add your answer
right arrow

Q194. How would you optimize the sparse array access.

Ans.

Optimizing sparse array access involves using data structures like hash maps or trees to efficiently store and retrieve values.

  • Use a hash map to store only non-null values and their corresponding indices.

  • Implement a tree-based data structure like a binary search tree or a trie for faster access to sparse array elements.

  • Consider using a compressed sparse row (CSR) format for large sparse arrays to reduce memory usage and improve access times.

Add your answer
right arrow

Q195. Speak anything you want in 5 minutes.

Ans.

I will talk about my passion for data analysis and how I have used it to solve complex problems in previous projects.

  • I have always been fascinated by the power of data analysis in uncovering insights and driving decision-making.

  • In my previous role, I used data analysis to identify trends and patterns in customer behavior, leading to a 10% increase in sales.

  • I am proficient in various data analysis tools such as Excel, SQL, and Python, and have a strong foundation in statistica...read more

Add your answer
right arrow

Q196. 6.Can you join different fact tables ?

Ans.

Yes, fact tables can be joined together in a data warehouse to combine related information.

  • Fact tables contain quantitative data and are typically joined using common dimensions.

  • Joining fact tables allows for more comprehensive analysis and reporting.

  • For example, joining a sales fact table with a customer fact table can provide insights on customer behavior and purchasing patterns.

View 1 answer
right arrow

Q197. What will you do to improve bottom quartile

Ans.

To improve bottom quartile, I will focus on identifying areas of improvement, providing targeted training, setting clear goals, and regularly monitoring progress.

  • Identify specific areas where the bottom quartile is lacking and develop targeted improvement plans.

  • Provide additional training and resources to help employees in the bottom quartile improve their skills and performance.

  • Set clear and achievable goals for employees in the bottom quartile to work towards.

  • Regularly moni...read more

Add your answer
right arrow

Q198. What are the cancellation types of the insurance policy?

Add your answer
right arrow

Q199. What is react router dom

Ans.

React Router DOM is a popular routing library for React applications.

  • Used for handling routing in React applications

  • Allows for declarative routing using components like BrowserRouter, Route, Switch, etc.

  • Enables navigation between different components without full page reloads

Add your answer
right arrow

Q200. What is correlation and parameterization?

Ans.

Correlation is the process of extracting dynamic values from server responses and passing them to subsequent requests. Parameterization is the process of replacing hard-coded values in scripts with variables.

  • Correlation involves identifying and capturing dynamic values like session IDs or tokens from server responses.

  • Parameterization involves replacing hard-coded values in scripts with variables to make them reusable and dynamic.

  • Correlation is essential for maintaining sessio...read more

Add your answer
right arrow
Previous
1
2
3
4
Next
Contribute & help others!
Write a review
Write a review
Share interview
Share interview
Contribute salary
Contribute salary
Add office photos
Add office photos

Interview Process at GlobalLogic

based on 530 interviews
Interview experience
4.0
Good
View more
interview tips and stories logo
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Interview Questions from Similar Companies

Accenture Logo
3.8
 • 4k Interview Questions
Aarti Industries Logo
4.1
 • 225 Interview Questions
Johnson Controls Logo
3.6
 • 192 Interview Questions
HDFC Life Logo
4.0
 • 173 Interview Questions
Standard Chartered Logo
3.7
 • 169 Interview Questions
Xyz Company Logo
3.8
 • 138 Interview Questions
View all
Top GlobalLogic Interview Questions And Answers
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
75 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter