GlobalLogic
300+ Digi Hotels Interview Questions and Answers
Q201. What are the cancellation types of the insurance policy?
Q202. What is react router dom
React Router DOM is a popular routing library for React applications.
Used for handling routing in React applications
Allows for declarative routing using components like BrowserRouter, Route, Switch, etc.
Enables navigation between different components without full page reloads
Q203. What is correlation and parameterization?
Correlation is the process of extracting dynamic values from server responses and passing them to subsequent requests. Parameterization is the process of replacing hard-coded values in scripts with variables.
Correlation involves identifying and capturing dynamic values like session IDs or tokens from server responses.
Parameterization involves replacing hard-coded values in scripts with variables to make them reusable and dynamic.
Correlation is essential for maintaining sessio...read more
Q204. Print Numbers between 1 to 20 , even/odd numbers
Print even and odd numbers between 1 to 20.
Iterate from 1 to 20 and check if the number is even or odd.
Use a conditional statement to determine if the number is even or odd.
Print the number along with its type (even or odd).
Q205. Give data classifications with scrubbing techniques.
Data classifications with scrubbing techniques
Sensitive data: remove or mask personally identifiable information (PII)
Outliers: remove or correct data points that are significantly different from the rest
Duplicate data: remove or merge identical data points
Inconsistent data: correct or remove data points that do not fit the expected pattern
Invalid data: remove or correct data points that do not make sense or violate constraints
Q206. Types of wait in selenium and syntax.
Types of wait in Selenium and their syntax.
Implicit Wait: driver.manage().timeouts().implicitlyWait(10, TimeUnit.SECONDS)
Explicit Wait: WebDriverWait wait = new WebDriverWait(driver, 10); wait.until(ExpectedConditions.visibilityOfElementLocated(By.id("elementId")));
Fluent Wait: Wait wait = new FluentWait(driver).withTimeout(Duration.ofSeconds(10)).pollingEvery(Duration.ofSeconds(2)).ignoring(NoSuchElementException.class);
Q207. What are Cucumber hooks?
Cucumber hooks are blocks of code that run before or after each scenario in Cucumber tests.
Cucumber hooks allow for setup and teardown actions before and after scenarios
They can be used to perform actions like opening a browser before a scenario and closing it after
Hooks can be defined at different levels such as global, scenario, or feature level
Q208. String reverse program
A program to reverse a given string.
Use a loop to iterate through the characters of the string.
Create a new string and append each character from the original string in reverse order.
Return the reversed string.
Q209. Difference between Overloading and overriding
Overloading is having multiple methods with the same name but different parameters. Overriding is having a method in child class with the same name and signature as in parent class.
Overloading is compile-time polymorphism while overriding is runtime polymorphism.
Overloading is done in the same class while overriding is done in different classes.
Overloading is used to add more functionality to a method while overriding is used to provide a different implementation of a method....read more
Q210. Agile methodology and its uses.
Agile methodology is an iterative approach to software development that emphasizes flexibility and customer satisfaction.
Agile focuses on delivering working software in short iterations
It values collaboration between team members and with stakeholders
It emphasizes adapting to change and continuous improvement
Examples of Agile methodologies include Scrum, Kanban, and Extreme Programming (XP)
Q211. What is primary key and unique key
Primary key uniquely identifies a record in a table, while unique key ensures uniqueness of a column or set of columns.
Primary key is a column or set of columns that uniquely identifies each record in a table
Unique key ensures that a column or set of columns have unique values
Primary key cannot have null values, while unique key can have null values
A table can have only one primary key, but multiple unique keys
Q212. What do you know about machine learning
Machine learning is a subset of artificial intelligence that involves training algorithms to make predictions or decisions based on data.
Machine learning algorithms can be supervised, unsupervised, or semi-supervised
Examples of machine learning include image recognition, natural language processing, and recommendation systems
Machine learning is used in various industries such as healthcare, finance, and e-commerce
Q213. what is java ? why globalogiv etc
Java is a popular programming language used for developing a wide range of applications.
Java is an object-oriented language known for its platform independence.
It is used for developing web applications, mobile apps, enterprise software, and more.
Java is widely used in the industry due to its robustness, security, and scalability.
Globalogiv is likely a typo or a specific term related to a particular project or company.
Java has a large community of developers and extensive lib...read more
Q214. What is idiom in english
An idiom is a phrase or expression that has a figurative meaning different from the literal meaning of the words.
Idioms are commonly used in everyday language and may not make sense if taken literally.
They often convey a cultural or social meaning that is understood by native speakers.
Examples include 'kick the bucket' meaning to die, 'hit the nail on the head' meaning to do or say something exactly right.
Q215. Is selenium webdriver or a class
Selenium WebDriver is a class used for automating web application testing.
Selenium WebDriver is a tool used for automating web browsers.
It provides a programming interface to create and execute test cases.
It is not a standalone class but a collection of classes and interfaces.
Examples of Selenium WebDriver classes include ChromeDriver, FirefoxDriver, etc.
Q216. Diffrence between Normal and Arrow Fuction and its example
Arrow functions are concise syntax for writing functions in JavaScript, compared to normal functions.
Arrow functions do not have their own 'this' keyword, they inherit it from the parent scope.
Arrow functions do not have 'arguments' object.
Arrow functions cannot be used as constructors.
Arrow functions are more concise and easier to read compared to normal functions.
Q217. How would you make a chatbot? Explain with a flow
To make a chatbot, you need to design the conversation flow, integrate natural language processing, and train the bot with relevant data.
Design the conversation flow with a clear structure and user-friendly interface
Integrate natural language processing to understand user inputs and generate appropriate responses
Train the chatbot with relevant data to improve accuracy and effectiveness
Implement features like sentiment analysis, entity recognition, and context awareness for be...read more
Q218. Do you know artificial intelligence let explain
Q219. What is a P - N Junction?
A P-N junction is a boundary between a P-type and N-type semiconductor material.
It is a fundamental building block of many electronic devices.
It is formed by doping one side of a semiconductor crystal with impurities of a different type.
It allows the flow of current in only one direction.
It is used in diodes, transistors, solar cells, and LEDs.
The depletion region is formed at the junction due to the diffusion of charge carriers.
Q220. how much time you take to build a complete website
The time taken to build a complete website varies depending on the complexity and requirements of the project.
The time can range from a few days for a simple website to several months for a complex e-commerce platform.
Factors such as design complexity, functionality, integration of third-party services, and testing can impact the development time.
Using frameworks like Laravel or Symfony can speed up development process compared to building from scratch.
Collaboration with a te...read more
Q221. How traffic flows over internet.
Traffic flows over the internet through a complex network of routers and switches.
Data is broken down into packets and sent through the network.
Each packet is routed through various nodes to reach its destination.
Routing protocols determine the best path for each packet.
Traffic can be affected by congestion, network failures, and security measures.
Content delivery networks (CDNs) can help improve traffic flow by caching content closer to users.
Q222. find 2 numbers occurring once while others occurring twice
To find 2 unique numbers in an array with others occurring twice.
Iterate through the array and use a hash table to count the occurrences of each number.
Iterate through the hash table and find the two numbers with a count of 1.
Return the two unique numbers as an array of strings.
Q223. height of the binary tree, factorial code in python
Calculate the height of a binary tree and implement factorial code in Python.
To calculate the height of a binary tree, you can use a recursive approach where you find the height of the left and right subtrees and return the maximum height plus one.
For factorial code in Python, you can use a recursive function that multiplies the current number with the factorial of the previous number until reaching 1.
Example for calculating the height of a binary tree: def height(node): if n...read more
Q224. LG calculation and workload modelling process?
LG calculation and workload modelling process involves determining the number of Load Generators required and creating a realistic simulation of user behavior.
Calculate the number of Load Generators needed based on expected user load and performance goals.
Create workload models by analyzing user behavior patterns, transaction volumes, and system usage.
Consider factors like peak load times, user distribution, and transaction mix in workload modelling.
Use tools like LoadRunner,...read more
Q225. Tell me about one randam topic
The topic of artificial intelligence and its impact on society
AI is revolutionizing industries such as healthcare, finance, and transportation
Ethical concerns surrounding AI development and use are being debated
AI has the potential to improve efficiency and productivity in various sectors
Q226. What is Automation and advantages
Automation is the use of technology to perform tasks without human intervention.
Increases efficiency and productivity
Reduces errors and improves accuracy
Saves time and money
Allows for 24/7 operation
Enables scalability and consistency
Examples include robotic process automation, industrial automation, and test automation
Q227. Difference between delete, drop and truncate
Delete removes rows from a table, drop removes the entire table, and truncate removes all rows from a table.
Delete is a DML operation and can be rolled back, but it is slower than truncate.
Drop is a DDL operation and cannot be rolled back. It removes the table and all associated objects.
Truncate is a DDL operation and cannot be rolled back. It removes all rows from the table but keeps the table structure.
Delete and truncate can be used with a WHERE clause to specify which row...read more
Q228. Lambda expression for map?
Lambda expression for map applies a function to each element of a list and returns a new list.
Syntax: list(map(lambda x: function(x), list_name))
Example: list(map(lambda x: x*2, [1, 2, 3])) returns [2, 4, 6]
Lambda expression can also be replaced with a named function
Q229. What is an energy band?
An energy band is a range of allowed energy levels for electrons in a solid material.
Energy bands are formed due to the arrangement of atoms in a solid material.
There are two types of energy bands: valence band and conduction band.
Valence band is the band of energy levels occupied by electrons in their ground state.
Conduction band is the band of energy levels above the valence band that electrons can move into.
The energy gap between the valence band and conduction band determ...read more
Q230. Example to show where you have failed
Failed to meet project deadline due to underestimating complexity
Underestimated time required for a project
Did not allocate enough resources
Learned to better assess project requirements and plan accordingly
Q231. what is artificial inteligence
Artificial intelligence is the simulation of human intelligence processes by machines, especially computer systems.
AI involves machines learning from data, recognizing patterns, and making decisions.
Examples include virtual assistants like Siri and Alexa, self-driving cars, and recommendation systems like Netflix.
AI can be categorized into narrow AI (specific tasks) and general AI (human-like intelligence).
Q232. How will you deployed app on AWS cloud?
I would deploy the app on AWS cloud using services like EC2, S3, and Elastic Beanstalk.
Create an EC2 instance to host the application
Store static files in S3 bucket
Use Elastic Beanstalk for easy deployment and scaling
Set up security groups and IAM roles for access control
Q233. 4 pillers of oops
The 4 pillars of OOP are encapsulation, inheritance, polymorphism, and abstraction.
Encapsulation: Bundling data and methods that operate on the data into a single unit.
Inheritance: Ability of a class to inherit properties and behavior from another class.
Polymorphism: Ability to present the same interface for different data types.
Abstraction: Hiding the complex implementation details and showing only the necessary features.
Q234. explain spark internal flow from end to end
Spark internal flow involves job submission, DAG creation, task scheduling, and execution.
Job submission: User submits a Spark job to the SparkContext.
DAG creation: SparkContext creates a Directed Acyclic Graph (DAG) of the job.
Task scheduling: DAGScheduler breaks the DAG into stages and tasks, which are scheduled by TaskScheduler.
Task execution: Executors execute the tasks and return results to the driver.
Result fetching: Driver collects the results and presents them to the ...read more
Q235. Examples of Linux commands : SED, AWK
SED and AWK are Linux commands used for text processing and manipulation.
SED stands for Stream Editor and is used for performing basic text transformations on an input stream
AWK is a programming language used for text processing and data extraction
SED can be used for tasks such as search and replace, inserting or deleting lines, and more
AWK can be used for tasks such as filtering and sorting data, performing calculations, and more
Both commands are commonly used in shell scrip...read more
Q236. What is dry run?
A dry run is a rehearsal or practice of a process or procedure to ensure it works correctly without actually executing it.
Dry run is a simulation of a process or procedure to identify any potential issues before actual execution.
It helps in testing the logic and flow of a program without actually running it.
Commonly used in software testing to ensure the code functions as expected.
Can also be used in manufacturing to test production processes before full-scale implementation.
Q237. Mysql query for 3rd highest salary
Use a subquery to find the third highest salary from the employees table in MySQL.
Use a subquery to select distinct salaries from the employees table.
Order the salaries in descending order and use LIMIT to get the third highest salary.
Example: SELECT DISTINCT salary FROM employees ORDER BY salary DESC LIMIT 2, 1;
Q238. Train platform problem statement
Optimizing train platform allocation to minimize waiting time and congestion
Analyze train schedules and passenger flow to determine optimal platform allocation
Consider factors such as train frequency, arrival and departure times, and passenger volume
Implement strategies like staggered arrival times or dedicated platforms for specific train routes
Use simulation models to test different platform allocation scenarios
Monitor and adjust platform assignments in real-time based on a...read more
Q239. Explain ACID properties and Normalization
ACID properties ensure database transactions are reliable. Normalization reduces data redundancy.
ACID stands for Atomicity, Consistency, Isolation, and Durability.
Atomicity ensures that a transaction is treated as a single unit of work.
Consistency ensures that a transaction brings the database from one valid state to another.
Isolation ensures that concurrent transactions do not interfere with each other.
Durability ensures that once a transaction is committed, it will remain c...read more
Q240. cypress folder structure and and its assertions
Cypress folder structure and its assertions
Cypress follows a specific folder structure for organizing test files
The 'fixtures' folder contains static data used in tests
The 'integration' folder contains the actual test files
The 'plugins' folder contains custom plugins and tasks
The 'support' folder contains reusable functions and commands
Cypress provides various assertions for validating test results
Common assertions include 'should', 'expect', and 'assert'
Assertions can be use...read more
Q241. Write a program for palindrome
Program to check if a given string is a palindrome
Create a function that takes a string as input
Remove all non-alphanumeric characters and convert to lowercase
Compare the string with its reverse to check if it is a palindrome
Q242. write a code for finding length of string
Code to find the length of a string in an array of strings
Iterate through each string in the array and use the length property to find the length of each string
Store the length of each string in a separate array or print it out directly
Q243. what is stack with an example
A stack is a data structure that follows the Last In First Out (LIFO) principle.
Elements are added and removed from the top of the stack.
Common operations include push (add element) and pop (remove element).
Example: Undo functionality in a text editor.
Q244. what is php and api integration
PHP is a server-side scripting language used for web development, while API integration involves connecting different software systems through APIs.
PHP is a popular server-side scripting language used for creating dynamic web pages.
API integration involves connecting different software systems by using APIs to allow them to communicate with each other.
API integration in PHP allows developers to access and interact with external services or data sources, such as social media p...read more
Q245. what is bias variance trade off
Bias-variance tradeoff is the balance between underfitting and overfitting in machine learning models.
Bias refers to error from erroneous assumptions in the learning algorithm, leading to underfitting.
Variance refers to error from sensitivity to fluctuations in the training data, leading to overfitting.
The tradeoff involves finding the right level of model complexity to minimize both bias and variance.
Regularization techniques like Lasso and Ridge regression can help in manag...read more
Q246. In how many ways can create an object
An object can be created in Java using new keyword, clone method, newInstance method, and deserialization.
Using new keyword: ClassName obj = new ClassName();
Using clone method: ClassName obj2 = (ClassName) obj1.clone();
Using newInstance method: ClassName obj3 = (ClassName) Class.forName("ClassName").newInstance();
Using deserialization: ObjectInputStream in = new ObjectInputStream(new FileInputStream("file.ser")); ClassName obj4 = (ClassName) in.readObject();
Q247. Oops concepts explanation
Oops concepts are fundamental principles of object-oriented programming such as inheritance, polymorphism, encapsulation, and abstraction.
Inheritance: Allows a class to inherit properties and behavior from another class.
Polymorphism: Allows objects to be treated as instances of their parent class or as instances of their own class.
Encapsulation: Bundling data and methods that operate on the data into a single unit.
Abstraction: Hiding the implementation details and showing onl...read more
Q248. Why do you want to a software tester
I enjoy finding bugs and ensuring software quality to improve user experience.
I have a keen eye for detail and enjoy problem-solving.
I like the challenge of testing different scenarios and ensuring the software functions as expected.
I find satisfaction in improving the overall quality of a product by identifying and fixing bugs.
I believe software testing is crucial in delivering a reliable and user-friendly product to customers.
Q249. Describe 5 non functional requirements
Non functional requirements are criteria that specify how a system should behave, rather than what it should do.
Performance - system should respond within 2 seconds for all user interactions
Scalability - system should be able to handle 1000 concurrent users
Reliability - system should have a 99.99% uptime
Security - system should encrypt all sensitive data
Usability - system should have a user-friendly interface
Q250. Explain security in microservices
Security in microservices involves implementing authentication, authorization, encryption, and monitoring to protect data and services.
Implement authentication and authorization mechanisms to control access to microservices.
Use encryption to secure communication between microservices and external clients.
Implement monitoring and logging to detect and respond to security incidents.
Consider using API gateways for centralized security control and enforcement.
Regularly update and...read more
Q251. difference between comparator and comparison
Comparator is an interface used to compare objects, while comparison is the act of comparing two or more objects.
Comparator is an interface in Java used to define custom sorting logic for objects.
Comparison is the process of evaluating the similarities and differences between two or more objects.
Comparator is used in sorting algorithms like Collections.sort() to define the sorting order.
Comparison is a general term used in various contexts to determine the relationship betwee...read more
Q252. What is default value of map
The default value of a map in most programming languages is null or an empty map.
Default value of map in Java is null
Default value of map in Python is an empty map {}
Default value of map in C++ is an empty map std::map<>()
Q253. prog to check for prime numbers
A program to check for prime numbers
Iterate through numbers up to the given number
Check if the number is divisible by any number other than 1 and itself
If not divisible, it is a prime number
Q254. Difference between table and view
Table stores data in a structured format while view is a virtual table created from a query.
Table is a physical object while view is a logical object.
Table can be modified while view cannot be modified directly.
Table can have indexes while view cannot have indexes.
Table can have constraints while view cannot have constraints.
View can be used to simplify complex queries by joining multiple tables.
View can be used to restrict access to sensitive data by showing only selected co...read more
Q255. What is Ip address DHCP Outlook configuration DNS
IP address is a unique numerical label assigned to each device connected to a computer network, DHCP is a protocol that assigns IP addresses automatically, Outlook configuration involves setting up email accounts, DNS translates domain names to IP addresses.
IP address is a unique identifier for devices on a network (e.g. 192.168.1.1)
DHCP is a protocol that automatically assigns IP addresses to devices on a network
Outlook configuration involves setting up email accounts, serve...read more
Q256. How will you optimize cost ?
Optimizing cost in DevOps involves efficient resource utilization and automation.
Implementing infrastructure as code to automate provisioning and scaling of resources
Utilizing cloud cost management tools to monitor and optimize spending
Implementing containerization to improve resource utilization and reduce costs
Optimizing CI/CD pipelines to reduce build and deployment times, saving on compute costs
Q257. Build a MEAN stack app
MEAN stack app development involves using MongoDB, Express.js, Angular, and Node.js
Use MongoDB as the database to store data
Utilize Express.js for building the backend API
Develop the frontend using Angular framework
Use Node.js for server-side scripting and handling requests
Q258. OOPS concept with practical examples
OOPS concept refers to Object-Oriented Programming principles like Inheritance, Encapsulation, Polymorphism, and Abstraction.
Inheritance: Allows a class to inherit properties and behavior from another class. Example: Animal class can inherit from Mammal class.
Encapsulation: Bundling data and methods that operate on the data into a single unit. Example: Using private variables in a class.
Polymorphism: Ability to present the same interface for different data types. Example: Ove...read more
Q259. explain details of hive meta store
Hive meta store stores metadata about Hive tables, partitions, columns, and storage location.
Hive meta store is a central repository that stores metadata information about Hive tables, partitions, columns, and storage location.
It stores this metadata in a relational database like MySQL, Derby, or PostgreSQL.
The metadata includes information such as table names, column names, data types, file formats, and storage location.
Hive uses the meta store to retrieve metadata informati...read more
Q260. write sql query for some simple tables
SQL query for simple tables
Use SELECT statement to retrieve data
Specify the columns you want to select
Use FROM clause to specify the tables you are querying from
Add WHERE clause to filter the results if needed
Q261. What is plc and advantages
PLC stands for Programmable Logic Controller. It is an industrial computer used to automate processes and control machinery.
PLCs are highly reliable and can operate in harsh environments
They can be easily programmed and reprogrammed to accommodate changes in the manufacturing process
PLCs can communicate with other devices and systems, allowing for seamless integration
They can improve efficiency and productivity while reducing costs
Examples of PLC applications include assembly...read more
Q262. What is a rectifier?
A rectifier is an electronic device that converts AC to DC.
Rectifiers are used in power supplies to convert AC voltage to DC voltage.
They are commonly used in electronic devices such as radios, televisions, and computers.
There are two types of rectifiers: half-wave and full-wave.
Half-wave rectifiers only allow half of the AC waveform to pass through, while full-wave rectifiers allow the entire waveform to pass through.
Examples of rectifiers include diodes, vacuum tubes, and s...read more
Q263. What is CMMR?
CMMR stands for Common Mode Rejection Ratio.
CMMR is a measure of how well a differential amplifier rejects common-mode signals.
It indicates the ability of an amplifier to suppress unwanted noise or interference.
A higher CMMR value indicates better rejection of common-mode signals.
CMMR is expressed in decibels (dB).
For example, an amplifier with a CMMR of 80 dB can reject common-mode signals 100,000 times smaller than the differential-mode signal.
Q264. Route 53 routing policies
Route 53 routing policies determine how traffic is routed to your resources.
There are several routing policies available in Route 53, including simple, weighted, latency-based, geolocation-based, and failover.
Simple routing policy sends traffic to a single resource.
Weighted routing policy distributes traffic based on weights assigned to each resource.
Latency-based routing policy sends traffic to the resource with the lowest latency.
Geolocation-based routing policy sends traff...read more
Q265. Write a program for fibonacchi series?
Program to generate Fibonacci series using iterative approach.
Initialize variables for first two numbers in series
Use a loop to calculate and print next numbers in series
Repeat until desired number of terms is reached
Q266. Problems faced in the project etc
In the project, we faced challenges with integrating third-party APIs and managing dependencies.
Difficulty in understanding and implementing complex API documentation
Issues with compatibility and versioning of different APIs
Troubleshooting errors and bugs caused by API interactions
Q267. box modelling in css, css pre processors
Box model in CSS refers to the way elements are rendered in a web page. CSS preprocessors like SASS or LESS help streamline CSS development.
Box model in CSS includes content, padding, border, and margin.
CSS preprocessors like SASS or LESS allow for variables, nesting, and mixins to be used in CSS.
Example: box-sizing: border-box; in CSS changes the box model to include padding and border in the element's total width and height.
Q268. how do you calculate capacity
Capacity can be calculated by determining the maximum amount of work that can be completed in a given time period.
Calculate the total number of hours available for work in a specific time period
Determine the average amount of work that can be completed in one hour
Multiply the total hours available by the average amount of work per hour to get the capacity
Capacity = Total hours available * Average work completed per hour
Q269. Write an example for the closure
A closure is a function that has access to its own scope, as well as the outer scope in which it was defined.
A closure can access variables from its outer function even after the outer function has finished executing.
Closures are commonly used in event handlers, callbacks, and asynchronous code.
Example: const outerFunction = () => { const outerVar = 'I am outer'; return () => { console.log(outerVar); }; }; const innerFunction = outerFunction(); innerFunction(); // Output: 'I ...read more
Q270. What is instrumentation
Instrumentation refers to the use of instruments or devices to measure, control, or monitor a process or system.
Instruments are used to gather data about a process or system
Data is then used to control or monitor the process or system
Examples include sensors, gauges, and meters
Instrumentation is used in various industries such as manufacturing, energy, and transportation
Q271. Difference between Product Roadmap and PRD
Product Roadmap outlines high-level goals and timelines, while PRD details specific features and requirements.
Product Roadmap focuses on overall strategy and goals
PRD specifies detailed features, functionalities, and requirements
Product Roadmap is more high-level and strategic, while PRD is more detailed and tactical
Product Roadmap helps in communicating the vision and direction to stakeholders
PRD helps in guiding the development team in building the product
Q272. how to resolve merge conflicts.
Merge conflicts can be resolved by pulling the latest changes, resolving conflicts locally, and then pushing the changes.
Pull the latest changes from the remote repository
Resolve conflicts locally by editing the conflicting files
Add the resolved files to the staging area
Commit the changes with a message explaining the resolution
Push the changes to the remote repository
Q273. what is INVEST and SMART
INVEST and SMART are frameworks for defining effective user stories and goals in product management.
INVEST stands for Independent, Negotiable, Valuable, Estimable, Small, and Testable. Example: A user story like 'As a user, I want to reset my password' is independent and valuable.
SMART stands for Specific, Measurable, Achievable, Relevant, and Time-bound. Example: 'Increase user sign-ups by 20% in the next quarter' is specific and measurable.
Both frameworks help ensure clarit...read more
Q274. what are the agile ceremonies
Agile ceremonies are structured meetings that facilitate collaboration and progress in Agile project management.
Sprint Planning: Teams define the work to be completed in the upcoming sprint. Example: Prioritizing user stories for the next two weeks.
Daily Stand-up: A quick daily meeting for team members to share updates and obstacles. Example: Each member shares what they did yesterday, what they'll do today, and any blockers.
Sprint Review: A meeting at the end of the sprint t...read more
Q275. Circuit Breaker Design Pattern
The Circuit Breaker Design Pattern is used to handle faults and failures in distributed systems.
It is used to prevent cascading failures in a system.
It acts as a safety net by monitoring the availability of a service or resource.
When the service or resource fails, the circuit breaker trips and subsequent requests are short-circuited.
It provides a fallback mechanism to handle failures gracefully.
Once the service or resource is back online, the circuit breaker allows requests t...read more
Q276. Explain load, stress, all testing?
Load testing is to test the system under normal and peak load conditions, stress testing is to test the system beyond its limits, and all testing is a combination of both.
Load testing checks the system's ability to handle expected load levels, ensuring performance under normal conditions.
Stress testing pushes the system beyond its limits to identify breaking points and measure performance degradation.
All testing combines load and stress testing to ensure the system can handle...read more
Q277. speak about given topic for 2 mins
Discuss the impact of artificial intelligence on the future of work
AI is expected to automate routine tasks, leading to job displacement
AI can also create new job opportunities in fields like data science and machine learning
There are concerns about AI bias and ethical implications in the workplace
Q278. Do you know mapping process
Mapping process involves creating visual representations of data relationships.
Mapping process involves creating visual representations of data relationships
It helps in understanding complex data structures and identifying patterns
Examples include mind maps, flowcharts, and network diagrams
Q279. What is node affinity?
Node affinity is a feature in Kubernetes that allows pods to be scheduled onto nodes based on labels assigned to nodes.
Node affinity is used to ensure that pods are scheduled onto nodes that meet certain criteria specified in the pod's affinity rules.
There are two types of node affinity: requiredDuringSchedulingIgnoredDuringExecution and preferredDuringSchedulingIgnoredDuringExecution.
Node affinity rules can be based on node labels, node taints, or a combination of both.
Examp...read more
Q280. What is security groups?
Security groups are virtual firewalls that control inbound and outbound traffic for instances in a cloud network.
Security groups are used to control traffic at the instance level.
They act as virtual firewalls for instances in a cloud network.
They allow you to specify which traffic is allowed to reach your instances.
You can define rules for inbound and outbound traffic based on protocols, ports, and IP addresses.
Security groups are stateful, meaning if you allow inbound traffi...read more
Q281. Methods of Rest Apis
Methods of Rest Apis
GET: Retrieve data from a server
POST: Send data to a server to create a new resource
PUT: Update an existing resource on a server
DELETE: Remove a resource from a server
PATCH: Partially update an existing resource on a server
Q282. implement run time polymorphism
Run time polymorphism is achieved in object-oriented programming by using virtual functions and pointers.
Use base class with virtual functions
Create derived classes that override the virtual functions
Use pointers of base class type to store objects of derived classes
Call the virtual functions through the base class pointers to achieve polymorphism
Q283. difference in put and post command
PUT is used to update or replace an existing resource, while POST is used to create a new resource.
PUT is idempotent, meaning multiple identical requests will have the same effect as a single request.
POST is not idempotent, meaning multiple identical requests may have different effects.
PUT requests are typically used for updating existing data, like updating a user's profile information.
POST requests are typically used for creating new data, like adding a new user to a databa...read more
Q284. Code : string reversal
Code to reverse a given string.
Iterate through the string from end to start and append each character to a new string.
Use built-in functions like reverse() in Python or StringBuilder.reverse() in Java.
Convert the string to an array, reverse the array, and then convert it back to a string.
Q285. How to implement Singleton
Singleton is a design pattern that restricts the instantiation of a class to one object.
Create a private static instance variable of the class.
Create a private constructor to prevent instantiation from outside the class.
Provide a public static method to access the instance.
Q286. Technology worked on
I have worked on various technologies including Java, Python, SQL, and AWS.
Proficient in Java programming language and its related frameworks such as Spring and Hibernate
Experience in developing Python scripts for automation and data analysis
Strong understanding of SQL and relational databases
Familiarity with AWS services such as EC2, S3, and Lambda
Knowledge of web development technologies such as HTML, CSS, and JavaScript
Q287. Programs with real project examples
I have experience testing programs in various industries including finance, healthcare, and e-commerce.
Tested a financial software application that processed credit card transactions for a major bank
Tested a healthcare software application that managed patient records for a hospital
Tested an e-commerce website that sold clothing and accessories for a popular fashion brand
Q288. Js code remove the duplicate from array.
Use Set to remove duplicates from array of strings in JavaScript.
Create a Set from the array to automatically remove duplicates.
Convert the Set back to an array to get the unique values.
Example: const array = ['apple', 'banana', 'apple']; const uniqueArray = [...new Set(array)];
Q289. Develop an ui for food applications
An UI for food applications should be user-friendly, visually appealing, and easy to navigate.
Include high-quality images of food items
Use a simple and intuitive layout
Allow users to easily search for specific foods or restaurants
Include filters for dietary restrictions or preferences
Provide clear and concise information about each food item, including ingredients and nutritional information
Q290. Sql queries used in your project.
Q291. Explain react life cycle components
React life cycle components are methods that are automatically called at different stages of a component's life cycle.
Mounting: constructor, render, componentDidMount
Updating: render, componentDidUpdate
Unmounting: componentWillUnmount
Q292. React application with custom hooks
Custom hooks in React allow for reusable logic across components.
Custom hooks are functions that use React hooks internally and can be reused across multiple components.
They can encapsulate complex logic and state management, making components more modular and easier to maintain.
Example: A custom hook for fetching data from an API and handling loading and error states can be used in multiple components.
Example: A custom hook for managing form state and validation can be reuse...read more
Q293. what is inheritance, its types
Inheritance is a concept in object-oriented programming where a class inherits properties and behaviors from another class.
Types of inheritance include single inheritance, where a class inherits from only one parent class, and multiple inheritance, where a class inherits from multiple parent classes.
Inheritance allows for code reusability and promotes the concept of hierarchical classification.
Example: Class B inheriting from Class A - B extends A.
Q294. How do you install cypress
Cypress can be installed using npm package manager.
Install Node.js if not already installed
Open terminal and run 'npm install cypress'
Once installation is complete, run 'npx cypress open' to open Cypress Test Runner
Q295. Sliding window problem
Sliding window technique is used to solve problems involving subarrays or substrings by creating a window that can expand and contract based on certain conditions.
Maintain start and end indices to represent current window
Adjust indices based on problem constraints
Minimize number of elements processed for optimized performance
Q296. What are storage class
Storage classes in C specify the scope and lifetime of variables.
Storage classes include auto, register, static, and extern.
Auto variables are local to a block and have automatic storage duration.
Register variables are stored in CPU registers for faster access.
Static variables retain their value between function calls.
Extern variables are declared in one file and can be used in another file.
Q297. What is meschina learning
Meschina learning is a type of machine learning algorithm that focuses on predicting outcomes based on historical data.
Meschina learning uses historical data to make predictions about future outcomes.
It is a subset of machine learning that focuses on pattern recognition and predictive modeling.
Examples include regression analysis, decision trees, and neural networks.
Q298. what is table tag
The table tag is an HTML element used to create a table structure on a web page.
The table tag is used to define the start and end of a table.
It is typically used in conjunction with the tr (table row) and td (table data/cell) tags.
Tables can be used to display tabular data, such as a list of items or a grid of information.
Table tags can also include attributes like border, cellpadding, cellspacing, etc.
Example:
Cell 1 Cell 2
Q299. Did you know mapping process
Yes, I am familiar with the mapping process.
Mapping process involves creating a visual representation of data relationships.
It helps in understanding how different data points are connected or related to each other.
Examples include creating entity-relationship diagrams, process flowcharts, or geographic maps.
Q300. Explain the image
The image shows a graph with fluctuating trends over time.
The graph appears to show data points changing over a period of time
There are multiple lines on the graph, indicating different variables or categories
The x-axis likely represents time while the y-axis represents the values being measured
Top HR Questions asked in Digi Hotels
Interview Process at Digi Hotels
Top Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month