Add office photos
Employer?
Claim Account for FREE

GS Lab

3.8
based on 386 Reviews
Filter interviews by

50+ Interview Questions and Answers

Updated 30 Sep 2024
Popular Designations

Q1. write a program to find loop in linked list and find the strating node of linked list where loop is strating

Ans.

Program to find loop in linked list and starting node of the loop

  • Use Floyd's cycle detection algorithm to find the loop

  • Once loop is detected, use two pointers to find the starting node of the loop

  • One pointer starts from the head and the other starts from the meeting point of the two pointers in the loop

  • Move both pointers one node at a time until they meet again, which is the starting node of the loop

Add your answer

Q2. write a sql query to give a list in decending order according to country name and ascending order according to date

Ans.

SQL query to list in descending order by country name and ascending order by date.

  • Use ORDER BY clause with two columns, one in descending order and the other in ascending order

  • Syntax: SELECT column1, column2 FROM table_name ORDER BY column1 DESC, column2 ASC

  • Example: SELECT name, date FROM table_name ORDER BY name DESC, date ASC

Add your answer

Q3. Difference in TCP & UDP? Which is used in which case?

Ans.

TCP is a connection-oriented protocol while UDP is connectionless. TCP is used for reliable data transfer while UDP is used for real-time applications.

  • TCP provides reliable, ordered, and error-checked delivery of data while UDP does not guarantee any of these

  • TCP is used for applications that require high reliability and transmission speed, such as email, file transfer, and web browsing

  • UDP is used for real-time applications such as online gaming, video conferencing, and live s...read more

Add your answer

Q4. What do you know about GS Lab?

Ans.

GS Lab is a software engineering company specializing in product development and digital transformation.

  • GS Lab is known for its expertise in software product development and digital transformation solutions.

  • They have a strong focus on innovation and use cutting-edge technologies to deliver high-quality software solutions.

  • GS Lab works with clients across various industries, including healthcare, finance, and technology.

  • They offer services such as software development, cloud co...read more

Add your answer
Discover null interview dos and don'ts from real experiences

Q5. what is your favourite OOPS concept. explain it in detail

Ans.

My favorite OOPS concept is inheritance.

  • Inheritance allows a class to inherit properties and methods from another class.

  • It promotes code reusability and saves time and effort in coding.

  • There are different types of inheritance such as single, multiple, multilevel, and hierarchical.

  • For example, a class 'Car' can inherit properties and methods from a class 'Vehicle'.

Add your answer

Q6. What is difference between final finally

Ans.

final is a keyword used to declare a constant value, while finally is a block of code that is always executed in a try-catch-finally block.

  • final is used to declare a constant value that cannot be changed, while finally is a block of code that is always executed after a try block, whether an exception is thrown or not.

  • final is used in variable declarations, method parameters, and method declarations to make them unchangeable, while finally is used in exception handling to ensu...read more

Add your answer
Are these interview questions helpful?

Q7. Prototypes of socket, bind, listen, accept & connect and their functionality

Ans.

Prototypes and functionality of socket, bind, listen, accept & connect

  • socket() - creates a new socket

  • bind() - assigns a local address to a socket

  • listen() - puts a socket in a passive mode

  • accept() - accepts a connection on a socket

  • connect() - initiates a connection on a socket

Add your answer

Q8. 2) which is the best software model. explain it.

Ans.

Agile is the best software model due to its flexibility and adaptability.

  • Agile allows for continuous feedback and improvement

  • It prioritizes customer satisfaction and collaboration

  • It is adaptable to changing requirements and needs

  • Examples include Scrum, Kanban, and Extreme Programming

Add your answer
Share interview questions and help millions of jobseekers 🌟

Q9. write a program to convert lowercase into upercase and vice versa and swap digits in a string

Ans.

Program to convert case and swap digits in a string

  • Use a loop to iterate through each character in the string

  • Check if the character is a letter or a digit

  • If it's a letter, use the built-in functions to convert case

  • If it's a digit, swap it with the adjacent digit using a temporary variable

Add your answer

Q10. 1)what is software reengineering

Ans.

Software reengineering is the process of modifying and improving existing software systems.

  • It involves analyzing the existing software system and identifying areas for improvement.

  • The goal is to enhance the system's functionality, performance, and maintainability.

  • Reengineering can involve reverse engineering, restructuring, and forward engineering.

  • Examples include updating legacy systems, migrating to new platforms, and improving software architecture.

Add your answer

Q11. diff between hashtable and concurrent hash map

Ans.

Hashtable is not thread-safe while ConcurrentHashmap is thread-safe.

  • Hashtable is a legacy class while ConcurrentHashmap is a modern class.

  • Hashtable uses synchronized methods while ConcurrentHashmap uses lock striping.

  • ConcurrentHashmap allows multiple threads to read and write concurrently.

  • Hashtable is slower than ConcurrentHashmap in multi-threaded environments.

Add your answer

Q12. write a program to find non common characters in teo string

Ans.

Program to find non common characters in two strings

  • Iterate through each character in both strings

  • Compare each character and add non-common characters to a new string

  • Return the new string with non-common characters

Add your answer

Q13. Coding questions - implement find function for a string in c++.

Ans.

Implement find function for a string in C++.

  • Use the find() function from the string class in C++ to search for a substring within a string.

  • The find() function returns the position of the first occurrence of the substring, or string::npos if not found.

  • Example: string str = 'hello world'; int pos = str.find('world');

Add your answer

Q14. write a program to convert binary into decimal values

Ans.

Program to convert binary to decimal values

  • Take input as binary string

  • Iterate over each digit and multiply with 2 raised to power of position

  • Add all the values obtained in previous step to get decimal value

Add your answer

Q15. What is opps and explain

Ans.

OOPs stands for Object-Oriented Programming. It is a programming paradigm based on the concept of objects.

  • OOPs focuses on creating objects that contain both data and methods to manipulate that data.

  • It emphasizes concepts like encapsulation, inheritance, polymorphism, and abstraction.

  • Examples of OOP languages include Java, C++, and Python.

Add your answer

Q16. what is normalization in database?and its types with examples?

Ans.

Normalization is the process of organizing data in a database to reduce redundancy and dependency.

  • Normalization helps in improving data consistency and accuracy.

  • There are different types of normalization such as 1NF, 2NF, 3NF, BCNF, and 4NF.

  • 1NF ensures that each column in a table contains atomic values.

  • 2NF eliminates partial dependencies by creating separate tables for related data.

  • 3NF eliminates transitive dependencies by creating separate tables for non-key attributes.

  • BCNF ...read more

Add your answer

Q17. Handshaking mechanism in TCP communication

Ans.

Handshaking mechanism in TCP communication is a process of establishing and terminating a connection between two devices.

  • TCP uses a three-way handshake mechanism to establish a connection.

  • The three steps involved in the handshake are SYN, SYN-ACK, and ACK.

  • During the handshake, the devices exchange information about the initial sequence numbers, window sizes, and other parameters.

  • The handshake ensures that both devices are ready to communicate and establishes a reliable connec...read more

Add your answer

Q18. Scenario based questions Realtime example of Oops

Ans.

Realtime example of OOPs is modeling a car as an object with properties and methods.

  • Create a Car class with properties like make, model, year, and methods like start, accelerate, brake.

  • Instantiate multiple Car objects with different properties and call their methods.

  • Demonstrate inheritance by creating a subclass ElectricCar with additional properties and methods.

Add your answer

Q19. How does communication occur between 2 processes in OS(Interprocess communication)

Ans.

Interprocess communication in OS allows processes to exchange data and synchronize their actions.

  • Shared memory

  • Message passing

  • Sockets

  • Pipes

  • Signals

Add your answer

Q20. What are manufacturing processes like IQ, OQ and PQ

Ans.

IQ, OQ, and PQ are manufacturing processes used to ensure equipment and processes are qualified and validated for use.

  • IQ stands for Installation Qualification and ensures that equipment is installed correctly and meets specifications.

  • OQ stands for Operational Qualification and ensures that equipment operates as intended in its environment.

  • PQ stands for Performance Qualification and ensures that equipment consistently performs within specified parameters.

  • These processes are co...read more

Add your answer

Q21. Find minimum path from one city to other city

Ans.

To find minimum path from one city to other city

  • Use Dijkstra's algorithm or A* algorithm to find the shortest path

  • Create a graph with cities as nodes and distances as edges

  • Implement the algorithm in code to get the minimum path

  • Consider factors like traffic, tolls, and road conditions if applicable

Add your answer

Q22. Puzzles. (Finding the defected weights out of the corrected one in minimum checks)

Ans.

Using binary search approach, divide the weights into groups and check each group to find the defected weights.

  • Divide the weights into two groups and weigh them against each other.

  • If the weights are equal, the defected weight is in the other group.

  • If the weights are unequal, the defected weight is in that group.

  • Repeat the process with the group containing the defected weight until it is found.

  • Example: If there are 8 weights, divide them into two groups of 4 and weigh them aga...read more

Add your answer

Q23. diff bet Sorting and ordering

Ans.

Sorting is arranging data in a specific order based on a criteria, while ordering is arranging data in ascending or descending order.

  • Sorting involves arranging data based on a specific criteria such as alphabetical order, numerical order, or date order.

  • Ordering involves arranging data in either ascending or descending order based on a default criteria such as alphabetical order or numerical order.

  • Sorting can be customized to meet specific needs, while ordering is usually a de...read more

Add your answer

Q24. What is your background in medical device domain?

Ans.

I have 5 years of experience in writing technical documentation for medical devices.

  • Worked with a medical device company for 3 years

  • Familiar with FDA regulations and guidelines

  • Created user manuals, installation guides, and service manuals for various medical devices

  • Collaborated with cross-functional teams including engineers, product managers, and regulatory affairs

  • Reviewed and edited technical documents for accuracy and clarity

Add your answer

Q25. 3) Explain TCP/IP model

Ans.

TCP/IP model is a networking protocol used for communication between devices on the internet.

  • TCP/IP model stands for Transmission Control Protocol/Internet Protocol model.

  • It consists of four layers: Application, Transport, Internet, and Network Access.

  • Each layer has its own set of protocols and functions.

  • The Application layer deals with user interfaces and data exchange.

  • The Transport layer ensures reliable data transfer between devices.

  • The Internet layer handles the addressin...read more

Add your answer

Q26. Process of ISO 13485.Different stages and understanding

Ans.

ISO 13485 is a quality management system standard for medical devices.

  • ISO 13485 outlines requirements for the design, development, production, and distribution of medical devices.

  • The standard has several stages, including planning, implementation, and monitoring and measurement.

  • Understanding of the standard is important for ensuring compliance and maintaining quality in the medical device industry.

  • ISO 13485 certification can be obtained through a certification body.

  • The standa...read more

Add your answer

Q27. How to use map in javascript and extract the duplicate occurrence character count

Ans.

Using map in JavaScript to extract duplicate occurrence character count

  • Use the map function to iterate over the array of strings

  • Create an object to store the character counts

  • Increment the count for each character in the object

  • Filter the object to only include characters with count greater than 1

Add your answer

Q28. what makes java platform independent?

Ans.

Java code is compiled into bytecode which can run on any platform with a JVM installed.

  • Java code is compiled into bytecode which is platform-independent

  • Bytecode can be executed on any platform with a JVM installed

  • JVM provides a layer of abstraction between the code and the underlying hardware

  • Java libraries are also platform-independent

Add your answer

Q29. What is Inheritance Difference between comparator and comparable What are the oops concept in detail What is hashcode What is arraylist, hashmap etc

Ans.

Questions related to Java programming concepts and data structures.

  • Inheritance is a mechanism in which one class acquires the properties and behaviors of another class.

  • Comparable is used to define the natural ordering of objects while Comparator is used to define custom ordering of objects.

  • OOPs concepts include Abstraction, Encapsulation, Inheritance, and Polymorphism.

  • HashCode is a unique identifier generated by Java for each object.

  • ArrayList is a dynamic array that can grow ...read more

Add your answer

Q30. write the code for any sorting algorithm?

Ans.

Code for any sorting algorithm

  • Choose a sorting algorithm based on the requirements

  • Common sorting algorithms include bubble sort, insertion sort, selection sort, merge sort, quick sort

  • Implement the chosen algorithm in the programming language of choice

  • Test the algorithm with sample input data to ensure correctness

Add your answer

Q31. Implementation of queue and stack using linked list

Ans.

Queue and stack can be implemented using linked list by defining appropriate operations.

  • For queue, we can define operations like enqueue and dequeue.

  • For stack, we can define operations like push and pop.

  • In both cases, we need to maintain a pointer to the head of the linked list.

Add your answer

Q32. What is the ETCD and how to upgrade if need

Ans.

ETCD is a distributed key-value store used for shared configuration and service discovery in distributed systems.

  • ETCD is a consistent and highly-available key value store used by Kubernetes to store all of its data.

  • To upgrade ETCD, you can follow the official documentation provided by the ETCD project.

  • Before upgrading, make sure to backup the existing data to prevent any data loss.

  • Upgrade ETCD one version at a time, testing each version in a non-production environment before ...read more

Add your answer

Q33. How to iterate over iframes and select one object?

Ans.

To iterate over iframes and select one object, we can use Selenium's switchTo() method.

  • Use driver.switchTo().frame() method to switch to each iframe

  • Use driver.switchTo().defaultContent() method to switch back to main content

  • Use driver.findElement() method to locate the desired object within the iframe

Add your answer

Q34. write the code for tic-tac-toe?

Ans.

Code for tic-tac-toe game using array of strings.

  • Create a 3x3 array of strings to represent the game board

  • Use a loop to alternate between players and prompt for input

  • Check for win conditions after each move

  • Display the final board and winner or tie message

Add your answer

Q35. What are joins in sql databases??

Ans.

Joins are used to combine data from two or more tables based on a related column.

  • Joins are used to retrieve data from multiple tables in a single query.

  • They are performed using the JOIN keyword followed by the name of the table to be joined.

  • Common types of joins include INNER JOIN, LEFT JOIN, RIGHT JOIN, and FULL OUTER JOIN.

  • Joins are based on a related column between the tables, known as the join condition.

  • The result of a join is a new table that combines the columns from bot...read more

Add your answer

Q36. How to create process, end it

Ans.

To create a process, use a programming language or software. To end it, use task manager or command line.

  • To create a process, use a programming language like Java or Python

  • To create a process, use software like Visual Studio or Eclipse

  • To end a process, use task manager on Windows or activity monitor on Mac

  • To end a process, use command line with 'kill' command on Unix-based systems

Add your answer

Q37. what is synchronization in OS?

Ans.

Synchronization in OS refers to the coordination of multiple processes or threads to ensure data consistency and avoid conflicts.

  • Synchronization is necessary when multiple processes or threads access shared resources.

  • It involves the use of synchronization primitives such as locks, semaphores, and monitors.

  • Synchronization can prevent issues such as race conditions, deadlocks, and livelocks.

  • Examples of synchronization include mutual exclusion, message passing, and synchronizati...read more

Add your answer

Q38. What is the component of control plan

Ans.

Control plan components include process flow, control points, and monitoring methods.

  • Process flow outlines the steps in the process and identifies critical control points.

  • Control points are specific points in the process where monitoring and control measures are applied.

  • Monitoring methods involve regular checks and measurements to ensure the process is within control limits.

Add your answer

Q39. How a Kernel is compiled?

Ans.

Kernel is compiled using a toolchain that includes a compiler, linker, and other tools.

  • Kernel source code is written in C language

  • The toolchain compiles the source code into object files

  • The linker links the object files to create a kernel image

  • The kernel image is loaded into memory during boot process

  • Various configuration options can be set during compilation

Add your answer

Q40. Oops Features and their practical application

Ans.

Oops features are used to improve code reusability and maintainability.

  • Encapsulation: Hiding implementation details of a class

  • Inheritance: Creating a new class from an existing class

  • Polymorphism: Ability of objects to take on multiple forms

  • Abstraction: Focusing on essential features of an object

  • Examples: Creating a subclass from a superclass, using interfaces to implement multiple inheritance

Add your answer

Q41. Write code for Reader Writer problem

Ans.

Solution for the Reader Writer problem

  • Use semaphores to control access to shared resources

  • Readers can access the resource simultaneously

  • Writers must have exclusive access to the resource

  • Prefer readers over writers to avoid starvation

  • Implement a queue to manage access requests

Add your answer

Q42. Comparison between different searching algorithm

Ans.

Different searching algorithms have different time and space complexities.

  • Linear search has O(n) time complexity

  • Binary search has O(log n) time complexity

  • Hashing has O(1) time complexity

  • Depth-first search and breadth-first search are used in graph traversal

  • A* search algorithm is used in pathfinding

  • Uniform-cost search is used in finding the shortest path in a weighted graph

Add your answer

Q43. What is Virtualization, Cloud?

Ans.

Virtualization is the creation of a virtual version of something, such as an operating system, a server, a storage device, or network resources. Cloud computing is the delivery of computing services—including servers, storage, databases, networking, software, analytics, and intelligence—over the Internet (the cloud) to offer faster innovation, flexible resources, and economies of scale.

  • Virtualization creates a virtual version of something

  • Cloud computing delivers computing ser...read more

Add your answer

Q44. Difference between process and thread

Ans.

Process is an instance of a program while thread is a subset of a process.

  • Process is a program in execution while thread is a subset of a process that can execute independently.

  • Processes are heavyweight while threads are lightweight.

  • Processes have their own memory space while threads share the same memory space.

  • Examples of processes are web browsers, text editors, etc. while examples of threads are GUI thread, network thread, etc.

Add your answer

Q45. What is oops concepts??

Ans.

OOPs concepts are the fundamental principles of Object-Oriented Programming.

  • Encapsulation - binding data and functions that manipulate them

  • Inheritance - creating new classes from existing ones

  • Polymorphism - ability of objects to take on multiple forms

  • Abstraction - hiding implementation details and showing only functionality

  • Examples: class, object, inheritance, encapsulation, polymorphism, abstraction

Add your answer

Q46. Various DLL operation

Ans.

DLL operations are used to share code and resources between multiple programs.

  • DLLs can be loaded at runtime using LoadLibrary() function.

  • Functions from a DLL can be accessed using GetProcAddress() function.

  • DLLs can be unloaded using FreeLibrary() function.

  • DLLs can be used to implement plugins in software applications.

  • DLLs can be used to share resources such as icons, images, and sound files.

Add your answer

Q47. Explain cicd and and write Jenkins file

Ans.

CI/CD stands for Continuous Integration/Continuous Deployment. It is a software development practice where code changes are automatically built, tested, and deployed.

  • CI/CD automates the process of integrating code changes into a shared repository and deploying them to production.

  • Jenkins is a popular CI/CD tool that helps automate the software development process.

  • A Jenkinsfile is a text file that contains the definition of a Jenkins Pipeline and is written in Groovy syntax.

  • An ...read more

Add your answer

Q48. Internal working of Hashmap

Ans.

Hashmap is a data structure that stores key-value pairs and uses hashing to quickly retrieve values based on keys.

  • Hashmap internally uses an array to store key-value pairs.

  • It uses a hash function to map keys to indices in the array.

  • Collision resolution techniques like chaining or open addressing are used to handle collisions.

  • Hashmap provides O(1) average time complexity for insertion, deletion, and lookup operations.

Add your answer

Q49. Write code for the same

Ans.

Code to print the first 10 even numbers starting from 2

  • Use a loop to iterate through the numbers

  • Check if the number is even using the modulo operator

  • Print the number if it is even and increment the count

  • Stop the loop once 10 even numbers have been printed

Add your answer

Q50. Whai is normalization??

Ans.

Normalization is the process of organizing data in a database to reduce redundancy and improve data integrity.

  • Normalization involves breaking down a database into smaller, more manageable tables.

  • Each table should have a primary key and only contain data that is related to that key.

  • Normalization helps to prevent data inconsistencies and anomalies.

  • There are different levels of normalization, with each level building on the previous one.

  • Examples of normalization include converti...read more

Add your answer

Q51. What is kubernets

Ans.

Kubernetes is an open-source container orchestration platform for automating deployment, scaling, and management of containerized applications.

  • Kubernetes helps in automating the deployment, scaling, and management of containerized applications.

  • It allows for easy scaling of applications by adding or removing containers based on demand.

  • Kubernetes provides features like service discovery, load balancing, and self-healing capabilities.

  • It simplifies the management of containers by...read more

Add your answer

Q52. Lifecycle hook of Angular

Ans.

Lifecycle hooks in Angular are methods that allow you to tap into the lifecycle of a component, directive, or service.

  • Lifecycle hooks include ngOnInit, ngOnChanges, ngDoCheck, ngOnDestroy, etc.

  • ngOnInit is used for initialization logic, ngOnChanges is used for reacting to input changes, ngOnDestroy is used for cleanup tasks, etc.

  • Lifecycle hooks allow you to perform actions at specific points in the component's lifecycle.

Add your answer
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos

Interview Process at null

based on 22 interviews in the last 1 year
Interview experience
4.1
Good
View more
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Interview Questions from Similar Companies

3.8
 • 399 Interview Questions
4.1
 • 359 Interview Questions
3.8
 • 209 Interview Questions
3.8
 • 208 Interview Questions
4.0
 • 206 Interview Questions
4.1
 • 153 Interview Questions
View all
Top GS Lab Interview Questions And Answers
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
70 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions
Get AmbitionBox app

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter