Add office photos
Engaged Employer

GlobalLogic

3.6
based on 4.7k Reviews
Video summary
Filter interviews by

300+ Digi Hotels Interview Questions and Answers

Updated 25 Mar 2025
Popular Designations

Q201. What are the cancellation types of the insurance policy?

Add your answer

Q202. What is react router dom

Ans.

React Router DOM is a popular routing library for React applications.

  • Used for handling routing in React applications

  • Allows for declarative routing using components like BrowserRouter, Route, Switch, etc.

  • Enables navigation between different components without full page reloads

Add your answer

Q203. What is correlation and parameterization?

Ans.

Correlation is the process of extracting dynamic values from server responses and passing them to subsequent requests. Parameterization is the process of replacing hard-coded values in scripts with variables.

  • Correlation involves identifying and capturing dynamic values like session IDs or tokens from server responses.

  • Parameterization involves replacing hard-coded values in scripts with variables to make them reusable and dynamic.

  • Correlation is essential for maintaining sessio...read more

Add your answer

Q204. Print Numbers between 1 to 20 , even/odd numbers

Ans.

Print even and odd numbers between 1 to 20.

  • Iterate from 1 to 20 and check if the number is even or odd.

  • Use a conditional statement to determine if the number is even or odd.

  • Print the number along with its type (even or odd).

Add your answer
Discover Digi Hotels interview dos and don'ts from real experiences

Q205. Give data classifications with scrubbing techniques.

Ans.

Data classifications with scrubbing techniques

  • Sensitive data: remove or mask personally identifiable information (PII)

  • Outliers: remove or correct data points that are significantly different from the rest

  • Duplicate data: remove or merge identical data points

  • Inconsistent data: correct or remove data points that do not fit the expected pattern

  • Invalid data: remove or correct data points that do not make sense or violate constraints

Add your answer

Q206. Types of wait in selenium and syntax.

Ans.

Types of wait in Selenium and their syntax.

  • Implicit Wait: driver.manage().timeouts().implicitlyWait(10, TimeUnit.SECONDS)

  • Explicit Wait: WebDriverWait wait = new WebDriverWait(driver, 10); wait.until(ExpectedConditions.visibilityOfElementLocated(By.id("elementId")));

  • Fluent Wait: Wait wait = new FluentWait(driver).withTimeout(Duration.ofSeconds(10)).pollingEvery(Duration.ofSeconds(2)).ignoring(NoSuchElementException.class);

Add your answer
Are these interview questions helpful?

Q207. What are Cucumber hooks?

Ans.

Cucumber hooks are blocks of code that run before or after each scenario in Cucumber tests.

  • Cucumber hooks allow for setup and teardown actions before and after scenarios

  • They can be used to perform actions like opening a browser before a scenario and closing it after

  • Hooks can be defined at different levels such as global, scenario, or feature level

Add your answer

Q208. String reverse program

Ans.

A program to reverse a given string.

  • Use a loop to iterate through the characters of the string.

  • Create a new string and append each character from the original string in reverse order.

  • Return the reversed string.

Add your answer
Share interview questions and help millions of jobseekers 🌟

Q209. Difference between Overloading and overriding

Ans.

Overloading is having multiple methods with the same name but different parameters. Overriding is having a method in child class with the same name and signature as in parent class.

  • Overloading is compile-time polymorphism while overriding is runtime polymorphism.

  • Overloading is done in the same class while overriding is done in different classes.

  • Overloading is used to add more functionality to a method while overriding is used to provide a different implementation of a method....read more

Add your answer

Q210. Agile methodology and its uses.

Ans.

Agile methodology is an iterative approach to software development that emphasizes flexibility and customer satisfaction.

  • Agile focuses on delivering working software in short iterations

  • It values collaboration between team members and with stakeholders

  • It emphasizes adapting to change and continuous improvement

  • Examples of Agile methodologies include Scrum, Kanban, and Extreme Programming (XP)

Add your answer

Q211. What is primary key and unique key

Ans.

Primary key uniquely identifies a record in a table, while unique key ensures uniqueness of a column or set of columns.

  • Primary key is a column or set of columns that uniquely identifies each record in a table

  • Unique key ensures that a column or set of columns have unique values

  • Primary key cannot have null values, while unique key can have null values

  • A table can have only one primary key, but multiple unique keys

Add your answer

Q212. What do you know about machine learning

Ans.

Machine learning is a subset of artificial intelligence that involves training algorithms to make predictions or decisions based on data.

  • Machine learning algorithms can be supervised, unsupervised, or semi-supervised

  • Examples of machine learning include image recognition, natural language processing, and recommendation systems

  • Machine learning is used in various industries such as healthcare, finance, and e-commerce

Add your answer

Q213. what is java ? why globalogiv etc

Ans.

Java is a popular programming language used for developing a wide range of applications.

  • Java is an object-oriented language known for its platform independence.

  • It is used for developing web applications, mobile apps, enterprise software, and more.

  • Java is widely used in the industry due to its robustness, security, and scalability.

  • Globalogiv is likely a typo or a specific term related to a particular project or company.

  • Java has a large community of developers and extensive lib...read more

Add your answer

Q214. What is idiom in english

Ans.

An idiom is a phrase or expression that has a figurative meaning different from the literal meaning of the words.

  • Idioms are commonly used in everyday language and may not make sense if taken literally.

  • They often convey a cultural or social meaning that is understood by native speakers.

  • Examples include 'kick the bucket' meaning to die, 'hit the nail on the head' meaning to do or say something exactly right.

Add your answer

Q215. Is selenium webdriver or a class

Ans.

Selenium WebDriver is a class used for automating web application testing.

  • Selenium WebDriver is a tool used for automating web browsers.

  • It provides a programming interface to create and execute test cases.

  • It is not a standalone class but a collection of classes and interfaces.

  • Examples of Selenium WebDriver classes include ChromeDriver, FirefoxDriver, etc.

Add your answer

Q216. Diffrence between Normal and Arrow Fuction and its example

Ans.

Arrow functions are concise syntax for writing functions in JavaScript, compared to normal functions.

  • Arrow functions do not have their own 'this' keyword, they inherit it from the parent scope.

  • Arrow functions do not have 'arguments' object.

  • Arrow functions cannot be used as constructors.

  • Arrow functions are more concise and easier to read compared to normal functions.

Add your answer

Q217. How would you make a chatbot? Explain with a flow

Ans.

To make a chatbot, you need to design the conversation flow, integrate natural language processing, and train the bot with relevant data.

  • Design the conversation flow with a clear structure and user-friendly interface

  • Integrate natural language processing to understand user inputs and generate appropriate responses

  • Train the chatbot with relevant data to improve accuracy and effectiveness

  • Implement features like sentiment analysis, entity recognition, and context awareness for be...read more

Add your answer

Q218. Do you know artificial intelligence let explain

Add your answer

Q219. What is a P - N Junction?

Ans.

A P-N junction is a boundary between a P-type and N-type semiconductor material.

  • It is a fundamental building block of many electronic devices.

  • It is formed by doping one side of a semiconductor crystal with impurities of a different type.

  • It allows the flow of current in only one direction.

  • It is used in diodes, transistors, solar cells, and LEDs.

  • The depletion region is formed at the junction due to the diffusion of charge carriers.

View 1 answer

Q220. how much time you take to build a complete website

Ans.

The time taken to build a complete website varies depending on the complexity and requirements of the project.

  • The time can range from a few days for a simple website to several months for a complex e-commerce platform.

  • Factors such as design complexity, functionality, integration of third-party services, and testing can impact the development time.

  • Using frameworks like Laravel or Symfony can speed up development process compared to building from scratch.

  • Collaboration with a te...read more

Add your answer

Q221. How traffic flows over internet.

Ans.

Traffic flows over the internet through a complex network of routers and switches.

  • Data is broken down into packets and sent through the network.

  • Each packet is routed through various nodes to reach its destination.

  • Routing protocols determine the best path for each packet.

  • Traffic can be affected by congestion, network failures, and security measures.

  • Content delivery networks (CDNs) can help improve traffic flow by caching content closer to users.

Add your answer

Q222. find 2 numbers occurring once while others occurring twice

Ans.

To find 2 unique numbers in an array with others occurring twice.

  • Iterate through the array and use a hash table to count the occurrences of each number.

  • Iterate through the hash table and find the two numbers with a count of 1.

  • Return the two unique numbers as an array of strings.

Add your answer

Q223. height of the binary tree, factorial code in python

Ans.

Calculate the height of a binary tree and implement factorial code in Python.

  • To calculate the height of a binary tree, you can use a recursive approach where you find the height of the left and right subtrees and return the maximum height plus one.

  • For factorial code in Python, you can use a recursive function that multiplies the current number with the factorial of the previous number until reaching 1.

  • Example for calculating the height of a binary tree: def height(node): if n...read more

Add your answer

Q224. LG calculation and workload modelling process?

Ans.

LG calculation and workload modelling process involves determining the number of Load Generators required and creating a realistic simulation of user behavior.

  • Calculate the number of Load Generators needed based on expected user load and performance goals.

  • Create workload models by analyzing user behavior patterns, transaction volumes, and system usage.

  • Consider factors like peak load times, user distribution, and transaction mix in workload modelling.

  • Use tools like LoadRunner,...read more

Add your answer

Q225. Tell me about one randam topic

Ans.

The topic of artificial intelligence and its impact on society

  • AI is revolutionizing industries such as healthcare, finance, and transportation

  • Ethical concerns surrounding AI development and use are being debated

  • AI has the potential to improve efficiency and productivity in various sectors

View 2 more answers

Q226. What is Automation and advantages

Ans.

Automation is the use of technology to perform tasks without human intervention.

  • Increases efficiency and productivity

  • Reduces errors and improves accuracy

  • Saves time and money

  • Allows for 24/7 operation

  • Enables scalability and consistency

  • Examples include robotic process automation, industrial automation, and test automation

Add your answer

Q227. Difference between delete, drop and truncate

Ans.

Delete removes rows from a table, drop removes the entire table, and truncate removes all rows from a table.

  • Delete is a DML operation and can be rolled back, but it is slower than truncate.

  • Drop is a DDL operation and cannot be rolled back. It removes the table and all associated objects.

  • Truncate is a DDL operation and cannot be rolled back. It removes all rows from the table but keeps the table structure.

  • Delete and truncate can be used with a WHERE clause to specify which row...read more

Add your answer

Q228. Lambda expression for map?

Ans.

Lambda expression for map applies a function to each element of a list and returns a new list.

  • Syntax: list(map(lambda x: function(x), list_name))

  • Example: list(map(lambda x: x*2, [1, 2, 3])) returns [2, 4, 6]

  • Lambda expression can also be replaced with a named function

Add your answer

Q229. What is an energy band?

Ans.

An energy band is a range of allowed energy levels for electrons in a solid material.

  • Energy bands are formed due to the arrangement of atoms in a solid material.

  • There are two types of energy bands: valence band and conduction band.

  • Valence band is the band of energy levels occupied by electrons in their ground state.

  • Conduction band is the band of energy levels above the valence band that electrons can move into.

  • The energy gap between the valence band and conduction band determ...read more

View 1 answer

Q230. Example to show where you have failed

Ans.

Failed to meet project deadline due to underestimating complexity

  • Underestimated time required for a project

  • Did not allocate enough resources

  • Learned to better assess project requirements and plan accordingly

Add your answer

Q231. what is artificial inteligence

Ans.

Artificial intelligence is the simulation of human intelligence processes by machines, especially computer systems.

  • AI involves machines learning from data, recognizing patterns, and making decisions.

  • Examples include virtual assistants like Siri and Alexa, self-driving cars, and recommendation systems like Netflix.

  • AI can be categorized into narrow AI (specific tasks) and general AI (human-like intelligence).

Add your answer

Q232. How will you deployed app on AWS cloud?

Ans.

I would deploy the app on AWS cloud using services like EC2, S3, and Elastic Beanstalk.

  • Create an EC2 instance to host the application

  • Store static files in S3 bucket

  • Use Elastic Beanstalk for easy deployment and scaling

  • Set up security groups and IAM roles for access control

Add your answer

Q233. 4 pillers of oops

Ans.

The 4 pillars of OOP are encapsulation, inheritance, polymorphism, and abstraction.

  • Encapsulation: Bundling data and methods that operate on the data into a single unit.

  • Inheritance: Ability of a class to inherit properties and behavior from another class.

  • Polymorphism: Ability to present the same interface for different data types.

  • Abstraction: Hiding the complex implementation details and showing only the necessary features.

Add your answer

Q234. explain spark internal flow from end to end

Ans.

Spark internal flow involves job submission, DAG creation, task scheduling, and execution.

  • Job submission: User submits a Spark job to the SparkContext.

  • DAG creation: SparkContext creates a Directed Acyclic Graph (DAG) of the job.

  • Task scheduling: DAGScheduler breaks the DAG into stages and tasks, which are scheduled by TaskScheduler.

  • Task execution: Executors execute the tasks and return results to the driver.

  • Result fetching: Driver collects the results and presents them to the ...read more

Add your answer

Q235. Examples of Linux commands : SED, AWK

Ans.

SED and AWK are Linux commands used for text processing and manipulation.

  • SED stands for Stream Editor and is used for performing basic text transformations on an input stream

  • AWK is a programming language used for text processing and data extraction

  • SED can be used for tasks such as search and replace, inserting or deleting lines, and more

  • AWK can be used for tasks such as filtering and sorting data, performing calculations, and more

  • Both commands are commonly used in shell scrip...read more

Add your answer

Q236. What is dry run?

Ans.

A dry run is a rehearsal or practice of a process or procedure to ensure it works correctly without actually executing it.

  • Dry run is a simulation of a process or procedure to identify any potential issues before actual execution.

  • It helps in testing the logic and flow of a program without actually running it.

  • Commonly used in software testing to ensure the code functions as expected.

  • Can also be used in manufacturing to test production processes before full-scale implementation.

Add your answer

Q237. Mysql query for 3rd highest salary

Ans.

Use a subquery to find the third highest salary from the employees table in MySQL.

  • Use a subquery to select distinct salaries from the employees table.

  • Order the salaries in descending order and use LIMIT to get the third highest salary.

  • Example: SELECT DISTINCT salary FROM employees ORDER BY salary DESC LIMIT 2, 1;

Add your answer

Q238. Train platform problem statement

Ans.

Optimizing train platform allocation to minimize waiting time and congestion

  • Analyze train schedules and passenger flow to determine optimal platform allocation

  • Consider factors such as train frequency, arrival and departure times, and passenger volume

  • Implement strategies like staggered arrival times or dedicated platforms for specific train routes

  • Use simulation models to test different platform allocation scenarios

  • Monitor and adjust platform assignments in real-time based on a...read more

Add your answer

Q239. Explain ACID properties and Normalization

Ans.

ACID properties ensure database transactions are reliable. Normalization reduces data redundancy.

  • ACID stands for Atomicity, Consistency, Isolation, and Durability.

  • Atomicity ensures that a transaction is treated as a single unit of work.

  • Consistency ensures that a transaction brings the database from one valid state to another.

  • Isolation ensures that concurrent transactions do not interfere with each other.

  • Durability ensures that once a transaction is committed, it will remain c...read more

Add your answer

Q240. cypress folder structure and and its assertions

Ans.

Cypress folder structure and its assertions

  • Cypress follows a specific folder structure for organizing test files

  • The 'fixtures' folder contains static data used in tests

  • The 'integration' folder contains the actual test files

  • The 'plugins' folder contains custom plugins and tasks

  • The 'support' folder contains reusable functions and commands

  • Cypress provides various assertions for validating test results

  • Common assertions include 'should', 'expect', and 'assert'

  • Assertions can be use...read more

Add your answer

Q241. Write a program for palindrome

Ans.

Program to check if a given string is a palindrome

  • Create a function that takes a string as input

  • Remove all non-alphanumeric characters and convert to lowercase

  • Compare the string with its reverse to check if it is a palindrome

Add your answer

Q242. write a code for finding length of string

Ans.

Code to find the length of a string in an array of strings

  • Iterate through each string in the array and use the length property to find the length of each string

  • Store the length of each string in a separate array or print it out directly

Add your answer

Q243. what is stack with an example

Ans.

A stack is a data structure that follows the Last In First Out (LIFO) principle.

  • Elements are added and removed from the top of the stack.

  • Common operations include push (add element) and pop (remove element).

  • Example: Undo functionality in a text editor.

Add your answer

Q244. what is php and api integration

Ans.

PHP is a server-side scripting language used for web development, while API integration involves connecting different software systems through APIs.

  • PHP is a popular server-side scripting language used for creating dynamic web pages.

  • API integration involves connecting different software systems by using APIs to allow them to communicate with each other.

  • API integration in PHP allows developers to access and interact with external services or data sources, such as social media p...read more

Add your answer

Q245. what is bias variance trade off

Ans.

Bias-variance tradeoff is the balance between underfitting and overfitting in machine learning models.

  • Bias refers to error from erroneous assumptions in the learning algorithm, leading to underfitting.

  • Variance refers to error from sensitivity to fluctuations in the training data, leading to overfitting.

  • The tradeoff involves finding the right level of model complexity to minimize both bias and variance.

  • Regularization techniques like Lasso and Ridge regression can help in manag...read more

Add your answer

Q246. In how many ways can create an object

Ans.

An object can be created in Java using new keyword, clone method, newInstance method, and deserialization.

  • Using new keyword: ClassName obj = new ClassName();

  • Using clone method: ClassName obj2 = (ClassName) obj1.clone();

  • Using newInstance method: ClassName obj3 = (ClassName) Class.forName("ClassName").newInstance();

  • Using deserialization: ObjectInputStream in = new ObjectInputStream(new FileInputStream("file.ser")); ClassName obj4 = (ClassName) in.readObject();

Add your answer

Q247. Oops concepts explanation

Ans.

Oops concepts are fundamental principles of object-oriented programming such as inheritance, polymorphism, encapsulation, and abstraction.

  • Inheritance: Allows a class to inherit properties and behavior from another class.

  • Polymorphism: Allows objects to be treated as instances of their parent class or as instances of their own class.

  • Encapsulation: Bundling data and methods that operate on the data into a single unit.

  • Abstraction: Hiding the implementation details and showing onl...read more

Add your answer

Q248. Why do you want to a software tester

Ans.

I enjoy finding bugs and ensuring software quality to improve user experience.

  • I have a keen eye for detail and enjoy problem-solving.

  • I like the challenge of testing different scenarios and ensuring the software functions as expected.

  • I find satisfaction in improving the overall quality of a product by identifying and fixing bugs.

  • I believe software testing is crucial in delivering a reliable and user-friendly product to customers.

Add your answer

Q249. Describe 5 non functional requirements

Ans.

Non functional requirements are criteria that specify how a system should behave, rather than what it should do.

  • Performance - system should respond within 2 seconds for all user interactions

  • Scalability - system should be able to handle 1000 concurrent users

  • Reliability - system should have a 99.99% uptime

  • Security - system should encrypt all sensitive data

  • Usability - system should have a user-friendly interface

Add your answer

Q250. Explain security in microservices

Ans.

Security in microservices involves implementing authentication, authorization, encryption, and monitoring to protect data and services.

  • Implement authentication and authorization mechanisms to control access to microservices.

  • Use encryption to secure communication between microservices and external clients.

  • Implement monitoring and logging to detect and respond to security incidents.

  • Consider using API gateways for centralized security control and enforcement.

  • Regularly update and...read more

Add your answer

Q251. difference between comparator and comparison

Ans.

Comparator is an interface used to compare objects, while comparison is the act of comparing two or more objects.

  • Comparator is an interface in Java used to define custom sorting logic for objects.

  • Comparison is the process of evaluating the similarities and differences between two or more objects.

  • Comparator is used in sorting algorithms like Collections.sort() to define the sorting order.

  • Comparison is a general term used in various contexts to determine the relationship betwee...read more

Add your answer

Q252. What is default value of map

Ans.

The default value of a map in most programming languages is null or an empty map.

  • Default value of map in Java is null

  • Default value of map in Python is an empty map {}

  • Default value of map in C++ is an empty map std::map<>()

Add your answer

Q253. prog to check for prime numbers

Ans.

A program to check for prime numbers

  • Iterate through numbers up to the given number

  • Check if the number is divisible by any number other than 1 and itself

  • If not divisible, it is a prime number

Add your answer

Q254. Difference between table and view

Ans.

Table stores data in a structured format while view is a virtual table created from a query.

  • Table is a physical object while view is a logical object.

  • Table can be modified while view cannot be modified directly.

  • Table can have indexes while view cannot have indexes.

  • Table can have constraints while view cannot have constraints.

  • View can be used to simplify complex queries by joining multiple tables.

  • View can be used to restrict access to sensitive data by showing only selected co...read more

Add your answer

Q255. What is Ip address DHCP Outlook configuration DNS

Ans.

IP address is a unique numerical label assigned to each device connected to a computer network, DHCP is a protocol that assigns IP addresses automatically, Outlook configuration involves setting up email accounts, DNS translates domain names to IP addresses.

  • IP address is a unique identifier for devices on a network (e.g. 192.168.1.1)

  • DHCP is a protocol that automatically assigns IP addresses to devices on a network

  • Outlook configuration involves setting up email accounts, serve...read more

Add your answer

Q256. How will you optimize cost ?

Ans.

Optimizing cost in DevOps involves efficient resource utilization and automation.

  • Implementing infrastructure as code to automate provisioning and scaling of resources

  • Utilizing cloud cost management tools to monitor and optimize spending

  • Implementing containerization to improve resource utilization and reduce costs

  • Optimizing CI/CD pipelines to reduce build and deployment times, saving on compute costs

Add your answer

Q257. Build a MEAN stack app

Ans.

MEAN stack app development involves using MongoDB, Express.js, Angular, and Node.js

  • Use MongoDB as the database to store data

  • Utilize Express.js for building the backend API

  • Develop the frontend using Angular framework

  • Use Node.js for server-side scripting and handling requests

Add your answer

Q258. OOPS concept with practical examples

Ans.

OOPS concept refers to Object-Oriented Programming principles like Inheritance, Encapsulation, Polymorphism, and Abstraction.

  • Inheritance: Allows a class to inherit properties and behavior from another class. Example: Animal class can inherit from Mammal class.

  • Encapsulation: Bundling data and methods that operate on the data into a single unit. Example: Using private variables in a class.

  • Polymorphism: Ability to present the same interface for different data types. Example: Ove...read more

Add your answer

Q259. explain details of hive meta store

Ans.

Hive meta store stores metadata about Hive tables, partitions, columns, and storage location.

  • Hive meta store is a central repository that stores metadata information about Hive tables, partitions, columns, and storage location.

  • It stores this metadata in a relational database like MySQL, Derby, or PostgreSQL.

  • The metadata includes information such as table names, column names, data types, file formats, and storage location.

  • Hive uses the meta store to retrieve metadata informati...read more

Add your answer

Q260. write sql query for some simple tables

Ans.

SQL query for simple tables

  • Use SELECT statement to retrieve data

  • Specify the columns you want to select

  • Use FROM clause to specify the tables you are querying from

  • Add WHERE clause to filter the results if needed

Add your answer

Q261. What is plc and advantages

Ans.

PLC stands for Programmable Logic Controller. It is an industrial computer used to automate processes and control machinery.

  • PLCs are highly reliable and can operate in harsh environments

  • They can be easily programmed and reprogrammed to accommodate changes in the manufacturing process

  • PLCs can communicate with other devices and systems, allowing for seamless integration

  • They can improve efficiency and productivity while reducing costs

  • Examples of PLC applications include assembly...read more

Add your answer

Q262. What is a rectifier?

Ans.

A rectifier is an electronic device that converts AC to DC.

  • Rectifiers are used in power supplies to convert AC voltage to DC voltage.

  • They are commonly used in electronic devices such as radios, televisions, and computers.

  • There are two types of rectifiers: half-wave and full-wave.

  • Half-wave rectifiers only allow half of the AC waveform to pass through, while full-wave rectifiers allow the entire waveform to pass through.

  • Examples of rectifiers include diodes, vacuum tubes, and s...read more

View 1 answer

Q263. What is CMMR?

Ans.

CMMR stands for Common Mode Rejection Ratio.

  • CMMR is a measure of how well a differential amplifier rejects common-mode signals.

  • It indicates the ability of an amplifier to suppress unwanted noise or interference.

  • A higher CMMR value indicates better rejection of common-mode signals.

  • CMMR is expressed in decibels (dB).

  • For example, an amplifier with a CMMR of 80 dB can reject common-mode signals 100,000 times smaller than the differential-mode signal.

View 1 answer

Q264. Route 53 routing policies

Ans.

Route 53 routing policies determine how traffic is routed to your resources.

  • There are several routing policies available in Route 53, including simple, weighted, latency-based, geolocation-based, and failover.

  • Simple routing policy sends traffic to a single resource.

  • Weighted routing policy distributes traffic based on weights assigned to each resource.

  • Latency-based routing policy sends traffic to the resource with the lowest latency.

  • Geolocation-based routing policy sends traff...read more

Add your answer

Q265. Write a program for fibonacchi series?

Ans.

Program to generate Fibonacci series using iterative approach.

  • Initialize variables for first two numbers in series

  • Use a loop to calculate and print next numbers in series

  • Repeat until desired number of terms is reached

Add your answer

Q266. Problems faced in the project etc

Ans.

In the project, we faced challenges with integrating third-party APIs and managing dependencies.

  • Difficulty in understanding and implementing complex API documentation

  • Issues with compatibility and versioning of different APIs

  • Troubleshooting errors and bugs caused by API interactions

Add your answer

Q267. box modelling in css, css pre processors

Ans.

Box model in CSS refers to the way elements are rendered in a web page. CSS preprocessors like SASS or LESS help streamline CSS development.

  • Box model in CSS includes content, padding, border, and margin.

  • CSS preprocessors like SASS or LESS allow for variables, nesting, and mixins to be used in CSS.

  • Example: box-sizing: border-box; in CSS changes the box model to include padding and border in the element's total width and height.

Add your answer

Q268. how do you calculate capacity

Ans.

Capacity can be calculated by determining the maximum amount of work that can be completed in a given time period.

  • Calculate the total number of hours available for work in a specific time period

  • Determine the average amount of work that can be completed in one hour

  • Multiply the total hours available by the average amount of work per hour to get the capacity

  • Capacity = Total hours available * Average work completed per hour

Add your answer

Q269. Write an example for the closure

Ans.

A closure is a function that has access to its own scope, as well as the outer scope in which it was defined.

  • A closure can access variables from its outer function even after the outer function has finished executing.

  • Closures are commonly used in event handlers, callbacks, and asynchronous code.

  • Example: const outerFunction = () => { const outerVar = 'I am outer'; return () => { console.log(outerVar); }; }; const innerFunction = outerFunction(); innerFunction(); // Output: 'I ...read more

Add your answer

Q270. What is instrumentation

Ans.

Instrumentation refers to the use of instruments or devices to measure, control, or monitor a process or system.

  • Instruments are used to gather data about a process or system

  • Data is then used to control or monitor the process or system

  • Examples include sensors, gauges, and meters

  • Instrumentation is used in various industries such as manufacturing, energy, and transportation

Add your answer

Q271. Difference between Product Roadmap and PRD

Ans.

Product Roadmap outlines high-level goals and timelines, while PRD details specific features and requirements.

  • Product Roadmap focuses on overall strategy and goals

  • PRD specifies detailed features, functionalities, and requirements

  • Product Roadmap is more high-level and strategic, while PRD is more detailed and tactical

  • Product Roadmap helps in communicating the vision and direction to stakeholders

  • PRD helps in guiding the development team in building the product

Add your answer

Q272. how to resolve merge conflicts.

Ans.

Merge conflicts can be resolved by pulling the latest changes, resolving conflicts locally, and then pushing the changes.

  • Pull the latest changes from the remote repository

  • Resolve conflicts locally by editing the conflicting files

  • Add the resolved files to the staging area

  • Commit the changes with a message explaining the resolution

  • Push the changes to the remote repository

Add your answer

Q273. what is INVEST and SMART

Ans.

INVEST and SMART are frameworks for defining effective user stories and goals in product management.

  • INVEST stands for Independent, Negotiable, Valuable, Estimable, Small, and Testable. Example: A user story like 'As a user, I want to reset my password' is independent and valuable.

  • SMART stands for Specific, Measurable, Achievable, Relevant, and Time-bound. Example: 'Increase user sign-ups by 20% in the next quarter' is specific and measurable.

  • Both frameworks help ensure clarit...read more

Add your answer

Q274. what are the agile ceremonies

Ans.

Agile ceremonies are structured meetings that facilitate collaboration and progress in Agile project management.

  • Sprint Planning: Teams define the work to be completed in the upcoming sprint. Example: Prioritizing user stories for the next two weeks.

  • Daily Stand-up: A quick daily meeting for team members to share updates and obstacles. Example: Each member shares what they did yesterday, what they'll do today, and any blockers.

  • Sprint Review: A meeting at the end of the sprint t...read more

Add your answer

Q275. Circuit Breaker Design Pattern

Ans.

The Circuit Breaker Design Pattern is used to handle faults and failures in distributed systems.

  • It is used to prevent cascading failures in a system.

  • It acts as a safety net by monitoring the availability of a service or resource.

  • When the service or resource fails, the circuit breaker trips and subsequent requests are short-circuited.

  • It provides a fallback mechanism to handle failures gracefully.

  • Once the service or resource is back online, the circuit breaker allows requests t...read more

Add your answer

Q276. Explain load, stress, all testing?

Ans.

Load testing is to test the system under normal and peak load conditions, stress testing is to test the system beyond its limits, and all testing is a combination of both.

  • Load testing checks the system's ability to handle expected load levels, ensuring performance under normal conditions.

  • Stress testing pushes the system beyond its limits to identify breaking points and measure performance degradation.

  • All testing combines load and stress testing to ensure the system can handle...read more

Add your answer

Q277. speak about given topic for 2 mins

Ans.

Discuss the impact of artificial intelligence on the future of work

  • AI is expected to automate routine tasks, leading to job displacement

  • AI can also create new job opportunities in fields like data science and machine learning

  • There are concerns about AI bias and ethical implications in the workplace

Add your answer

Q278. Do you know mapping process

Ans.

Mapping process involves creating visual representations of data relationships.

  • Mapping process involves creating visual representations of data relationships

  • It helps in understanding complex data structures and identifying patterns

  • Examples include mind maps, flowcharts, and network diagrams

Add your answer

Q279. What is node affinity?

Ans.

Node affinity is a feature in Kubernetes that allows pods to be scheduled onto nodes based on labels assigned to nodes.

  • Node affinity is used to ensure that pods are scheduled onto nodes that meet certain criteria specified in the pod's affinity rules.

  • There are two types of node affinity: requiredDuringSchedulingIgnoredDuringExecution and preferredDuringSchedulingIgnoredDuringExecution.

  • Node affinity rules can be based on node labels, node taints, or a combination of both.

  • Examp...read more

Add your answer

Q280. What is security groups?

Ans.

Security groups are virtual firewalls that control inbound and outbound traffic for instances in a cloud network.

  • Security groups are used to control traffic at the instance level.

  • They act as virtual firewalls for instances in a cloud network.

  • They allow you to specify which traffic is allowed to reach your instances.

  • You can define rules for inbound and outbound traffic based on protocols, ports, and IP addresses.

  • Security groups are stateful, meaning if you allow inbound traffi...read more

Add your answer

Q281. Methods of Rest Apis

Ans.

Methods of Rest Apis

  • GET: Retrieve data from a server

  • POST: Send data to a server to create a new resource

  • PUT: Update an existing resource on a server

  • DELETE: Remove a resource from a server

  • PATCH: Partially update an existing resource on a server

Add your answer

Q282. implement run time polymorphism

Ans.

Run time polymorphism is achieved in object-oriented programming by using virtual functions and pointers.

  • Use base class with virtual functions

  • Create derived classes that override the virtual functions

  • Use pointers of base class type to store objects of derived classes

  • Call the virtual functions through the base class pointers to achieve polymorphism

Add your answer

Q283. difference in put and post command

Ans.

PUT is used to update or replace an existing resource, while POST is used to create a new resource.

  • PUT is idempotent, meaning multiple identical requests will have the same effect as a single request.

  • POST is not idempotent, meaning multiple identical requests may have different effects.

  • PUT requests are typically used for updating existing data, like updating a user's profile information.

  • POST requests are typically used for creating new data, like adding a new user to a databa...read more

Add your answer

Q284. Code : string reversal

Ans.

Code to reverse a given string.

  • Iterate through the string from end to start and append each character to a new string.

  • Use built-in functions like reverse() in Python or StringBuilder.reverse() in Java.

  • Convert the string to an array, reverse the array, and then convert it back to a string.

Add your answer

Q285. How to implement Singleton

Ans.

Singleton is a design pattern that restricts the instantiation of a class to one object.

  • Create a private static instance variable of the class.

  • Create a private constructor to prevent instantiation from outside the class.

  • Provide a public static method to access the instance.

Add your answer

Q286. Technology worked on

Ans.

I have worked on various technologies including Java, Python, SQL, and AWS.

  • Proficient in Java programming language and its related frameworks such as Spring and Hibernate

  • Experience in developing Python scripts for automation and data analysis

  • Strong understanding of SQL and relational databases

  • Familiarity with AWS services such as EC2, S3, and Lambda

  • Knowledge of web development technologies such as HTML, CSS, and JavaScript

Add your answer

Q287. Programs with real project examples

Ans.

I have experience testing programs in various industries including finance, healthcare, and e-commerce.

  • Tested a financial software application that processed credit card transactions for a major bank

  • Tested a healthcare software application that managed patient records for a hospital

  • Tested an e-commerce website that sold clothing and accessories for a popular fashion brand

Add your answer

Q288. Js code remove the duplicate from array.

Ans.

Use Set to remove duplicates from array of strings in JavaScript.

  • Create a Set from the array to automatically remove duplicates.

  • Convert the Set back to an array to get the unique values.

  • Example: const array = ['apple', 'banana', 'apple']; const uniqueArray = [...new Set(array)];

Add your answer

Q289. Develop an ui for food applications

Ans.

An UI for food applications should be user-friendly, visually appealing, and easy to navigate.

  • Include high-quality images of food items

  • Use a simple and intuitive layout

  • Allow users to easily search for specific foods or restaurants

  • Include filters for dietary restrictions or preferences

  • Provide clear and concise information about each food item, including ingredients and nutritional information

Add your answer

Q290. Sql queries used in your project.

Add your answer

Q291. Explain react life cycle components

Ans.

React life cycle components are methods that are automatically called at different stages of a component's life cycle.

  • Mounting: constructor, render, componentDidMount

  • Updating: render, componentDidUpdate

  • Unmounting: componentWillUnmount

Add your answer

Q292. React application with custom hooks

Ans.

Custom hooks in React allow for reusable logic across components.

  • Custom hooks are functions that use React hooks internally and can be reused across multiple components.

  • They can encapsulate complex logic and state management, making components more modular and easier to maintain.

  • Example: A custom hook for fetching data from an API and handling loading and error states can be used in multiple components.

  • Example: A custom hook for managing form state and validation can be reuse...read more

Add your answer
Asked in
SDE Interview

Q293. what is inheritance, its types

Ans.

Inheritance is a concept in object-oriented programming where a class inherits properties and behaviors from another class.

  • Types of inheritance include single inheritance, where a class inherits from only one parent class, and multiple inheritance, where a class inherits from multiple parent classes.

  • Inheritance allows for code reusability and promotes the concept of hierarchical classification.

  • Example: Class B inheriting from Class A - B extends A.

Add your answer

Q294. How do you install cypress

Ans.

Cypress can be installed using npm package manager.

  • Install Node.js if not already installed

  • Open terminal and run 'npm install cypress'

  • Once installation is complete, run 'npx cypress open' to open Cypress Test Runner

Add your answer

Q295. Sliding window problem

Ans.

Sliding window technique is used to solve problems involving subarrays or substrings by creating a window that can expand and contract based on certain conditions.

  • Maintain start and end indices to represent current window

  • Adjust indices based on problem constraints

  • Minimize number of elements processed for optimized performance

Add your answer

Q296. What are storage class

Ans.

Storage classes in C specify the scope and lifetime of variables.

  • Storage classes include auto, register, static, and extern.

  • Auto variables are local to a block and have automatic storage duration.

  • Register variables are stored in CPU registers for faster access.

  • Static variables retain their value between function calls.

  • Extern variables are declared in one file and can be used in another file.

Add your answer

Q297. What is meschina learning

Ans.

Meschina learning is a type of machine learning algorithm that focuses on predicting outcomes based on historical data.

  • Meschina learning uses historical data to make predictions about future outcomes.

  • It is a subset of machine learning that focuses on pattern recognition and predictive modeling.

  • Examples include regression analysis, decision trees, and neural networks.

Add your answer

Q298. what is table tag

Ans.

The table tag is an HTML element used to create a table structure on a web page.

  • The table tag is used to define the start and end of a table.

  • It is typically used in conjunction with the tr (table row) and td (table data/cell) tags.

  • Tables can be used to display tabular data, such as a list of items or a grid of information.

  • Table tags can also include attributes like border, cellpadding, cellspacing, etc.

  • Example:

    Cell 1Cell 2

Add your answer

Q299. Did you know mapping process

Ans.

Yes, I am familiar with the mapping process.

  • Mapping process involves creating a visual representation of data relationships.

  • It helps in understanding how different data points are connected or related to each other.

  • Examples include creating entity-relationship diagrams, process flowcharts, or geographic maps.

Add your answer

Q300. Explain the image

Ans.

The image shows a graph with fluctuating trends over time.

  • The graph appears to show data points changing over a period of time

  • There are multiple lines on the graph, indicating different variables or categories

  • The x-axis likely represents time while the y-axis represents the values being measured

Add your answer
1
2
3
4
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos

Interview Process at Digi Hotels

based on 541 interviews
Interview experience
4.0
Good
View more
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Interview Questions from Similar Companies

4.0
 • 480 Interview Questions
3.9
 • 385 Interview Questions
3.5
 • 348 Interview Questions
3.8
 • 261 Interview Questions
4.4
 • 218 Interview Questions
3.3
 • 147 Interview Questions
View all
Top GlobalLogic Interview Questions And Answers
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
75 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter