HARMAN
100+ Interview Questions and Answers
Q1. Write a method for deletion of a node from a Linked List.
Method for deleting a node from a Linked List
Find the node to be deleted
Update the previous node's next pointer to skip the deleted node
Free the memory occupied by the deleted node
Q2. Which programming language do you use regular in work
I regularly use Python in my work.
Python is a versatile and powerful programming language.
It is widely used for web development, data analysis, and automation.
Python has a large and active community, making it easy to find support and resources.
Some popular Python frameworks and libraries include Django, Flask, and NumPy.
Q3. What step do you take to ensure accurate estimates for project
To ensure accurate estimates for a project, I follow these steps:
Thoroughly analyze project requirements and scope
Break down the project into smaller tasks
Consider past project data and historical performance
Consult with team members and stakeholders
Use estimation techniques like bottom-up or top-down
Factor in potential risks and uncertainties
Regularly review and update estimates as the project progresses
Q4. Write a code to check if two strings are anagrams of each other.
Code to check if two strings are anagrams of each other.
Create two character arrays from the strings
Sort the arrays
Compare the sorted arrays
Q5. How to make a custom immutable class in java?
Creating a custom immutable class in Java
Make the class final
Make all fields private and final
Do not provide any setter methods
Provide a constructor to initialize all fields
Override equals() and hashCode() methods
Prevent modification of mutable objects passed in constructor
Q6. Activity launch modes Activity lifecycle Program to find second largest number in an array Singleton implementation
Activity launch modes, activity lifecycle, finding second largest number in an array, and singleton implementation.
Activity launch modes determine how a new activity is placed in the task stack.
Activity lifecycle consists of several states like onCreate, onStart, onResume, etc.
To find the second largest number in an array, sort the array in descending order and return the element at index 1.
Singleton is a design pattern that restricts the instantiation of a class to a single ...read more
Q7. why is string immutable
String is immutable because it ensures data integrity and allows for efficient memory management.
Immutable strings prevent accidental modification of data.
Immutable strings can be easily shared and reused, improving memory efficiency.
Immutable strings enable efficient string interning and caching.
Immutable strings support thread safety in concurrent environments.
Q8. What is copy constructor? Write Syntax? Why there's const and & in the syntax of copy constructor.
Copy constructor creates a new object by copying an existing object.
Copy constructor is used to create a new object by copying an existing object.
Syntax: ClassName(const ClassName& obj)
The const keyword ensures that the original object is not modified.
The & symbol is used to pass the object by reference, which is more efficient than passing by value.
Copy constructor is automatically called when a new object is created from an existing object.
Q9. How many programming language do you know
I know multiple programming languages.
I am proficient in Java, Python, and C++.
I have experience with web development languages such as HTML, CSS, and JavaScript.
I am familiar with scripting languages like Ruby and Perl.
I have worked with database query languages like SQL.
I am constantly learning and exploring new programming languages.
Q10. Any Design patterns explaination if used in previous project
Yes, I have used the Factory and Singleton design patterns in my previous project.
I used the Factory pattern to create objects of different classes based on a common interface.
This helped in reducing the coupling between the client code and the implementation classes.
I used the Singleton pattern to ensure that only one instance of a class is created and used throughout the application.
This helped in reducing the memory footprint and ensured that the state of the object was co...read more
Q11. How do you mange computing priorities or request
Managing computing priorities involves prioritizing requests based on urgency, importance, and available resources.
Assess the urgency and importance of each request
Consider the impact on business goals and objectives
Evaluate the available resources and capacity
Communicate with stakeholders to understand their needs
Establish a prioritization framework or criteria
Regularly review and adjust priorities as needed
Q12. Write Docker file structure for nginx image,How to resolve Git conflicts.
Docker file structure for nginx image and resolving Git conflicts
Dockerfile structure for nginx image: FROM nginx, COPY index.html /usr/share/nginx/html, EXPOSE 80
To resolve Git conflicts: git status, git pull, git add
, git commit -m 'Resolved conflict', git push
Q13. Time complexity of linked lists operations
Time complexity of linked list operations is O(n) for traversal, insertion and deletion.
Traversal, insertion and deletion in linked lists take linear time.
Insertion and deletion at the beginning of the list is faster than at the end.
Doubly linked lists have slightly higher time complexity due to maintaining two pointers.
Q14. 1- Project explain 2- How was structure independent or independent 3- Any challenges
I led a project to develop a new mobile app, ensuring the code structure was independent and scalable. Faced challenges with tight deadlines and changing requirements.
Led project to develop mobile app
Ensured code structure was independent and scalable
Challenges with tight deadlines and changing requirements
Q15. do @requestparam has default value
Yes, @RequestParam has a default value if not specified.
If a @RequestParam is not provided in the request, it will use its default value.
The default value can be set using the 'defaultValue' attribute of @RequestParam annotation.
If no default value is specified, the parameter will be considered as required and an exception will be thrown if not provided.
Q16. Fft vs dft , usage of cimsis dsp
FFT is a faster algorithm for calculating DFT. CMSIS DSP is a library for signal processing on ARM Cortex-M processors.
FFT is a more efficient algorithm for calculating the Discrete Fourier Transform (DFT).
CMSIS DSP is a library provided by ARM for signal processing on Cortex-M processors.
CMSIS DSP provides optimized functions for common signal processing tasks like filtering, FFT, and matrix operations.
Q17. What can do for run apex class ? what is get precaution ?
To run an Apex class, we need to create an instance of the class and call its methods. Precautions include testing and avoiding governor limits.
Create an instance of the class using the 'new' keyword
Call the methods using dot notation
Test the class thoroughly before deploying to production
Avoid hitting governor limits by optimizing code and limiting queries
Q18. A sequence of number is given, Find one of the given number by providing optimum solution? You need to ask the interviewer if the it is sorted or not and then discussion on different types of sorts.
Ask if the sequence is sorted and discuss different types of sorts to find the given number.
Ask if the sequence is sorted to determine the best approach.
Discuss different types of sorts like bubble sort, selection sort, insertion sort, merge sort, quick sort, etc.
Choose the most efficient sorting algorithm based on the size of the sequence and the given number.
Q19. Doubly linked list complete implementation
Doubly linked list is a data structure with nodes having pointers to both previous and next nodes.
Each node has a 'prev' and 'next' pointer
Insertion and deletion can be done at any position
Traversal can be done in both directions
Q20. What are the Design PAtterns wou have used with explanation ?
Design patterns are reusable solutions to common problems in software design. Some commonly used patterns include Singleton, Factory, Observer, and Strategy.
Singleton pattern ensures a class has only one instance and provides a global point of access to it.
Factory pattern creates objects without specifying the exact class of object that will be created.
Observer pattern defines a one-to-many dependency between objects so that when one object changes state, all its dependents a...read more
Q21. 1. How mutex works 2. Howe do you share information between threads? 3. Questions inCompletableFuture? 4. Write a program to show the deadlock condition? 5.
Technical Lead interview questions on mutex, thread communication, CompletableFuture, and deadlock
Mutex is a synchronization mechanism to prevent multiple threads from accessing shared resources simultaneously
Thread communication can be achieved through shared memory, message passing, or synchronization primitives like semaphores
CompletableFuture is a Java class that represents a future result of an asynchronous computation and provides methods to chain and combine them
Deadlo...read more
Q22. What platform you worked on? Linux, Windows? System configuration?
I have worked on both Linux and Windows platforms with various system configurations.
Proficient in Linux command line interface and shell scripting
Experience in Windows Server administration and Active Directory management
Familiarity with virtualization technologies such as VMware and VirtualBox
Knowledge of system configuration management tools like Ansible and Puppet
Q23. Casting Operators in C++, dynamic_cast when it is used?
dynamic_cast is used in C++ to perform safe downcasting of polymorphic types.
dynamic_cast is used to convert a pointer/reference of a base class to a pointer/reference of a derived class.
It is used when we want to access a derived class member function or variable using a base class pointer/reference.
If the conversion is not possible, dynamic_cast returns a null pointer for pointers or throws a bad_cast exception for references.
Q24. What are SOLID principles in OOP languages?
SOLID principles are a set of five design principles that help in creating maintainable and scalable software applications.
S - Single Responsibility Principle (SRP)
O - Open-Closed Principle (OCP)
L - Liskov Substitution Principle (LSP)
I - Interface Segregation Principle (ISP)
D - Dependency Inversion Principle (DIP)
Q25. WAP to check Power of 2
Check if a given number is a power of 2
Check if the number is greater than 0
Use bitwise AND operation to check if only one bit is set in the binary representation of the number
If the result is 0, then the number is a power of 2
Q26. What are the port numbers of various Protocols - DHCP,SMTP
DHCP uses port 67 and 68, SMTP uses port 25.
DHCP uses port 67 and 68 for server and client communication respectively.
SMTP uses port 25 for email transmission.
Q27. What is your opinion if you want to increase the sales of a company?
To increase sales, a company should focus on improving product quality, expanding customer base, and effective marketing strategies.
Improve product quality to increase customer satisfaction and loyalty
Expand customer base through targeted advertising and promotions
Develop effective marketing strategies to reach new customers and retain existing ones
Offer competitive pricing and discounts to attract price-sensitive customers
Provide excellent customer service to build a positiv...read more
Q28. Connect statement in Qt qnd it's parameters? MOC compiler in Qt?
Connect statement is used to connect signals and slots in Qt. MOC compiler generates meta-object code for Qt classes.
Connect statement connects a signal to a slot or a signal to another signal.
Parameters of connect statement include sender object, signal name, receiver object, slot name, and optional connection type.
MOC compiler generates meta-object code for Qt classes which enables features like signals and slots, introspection, and dynamic properties.
Q29. Oops concepts and use in real time project
Oops concepts are fundamental to software engineering and are used in real-time projects for better code organization and maintenance.
Encapsulation: Hiding implementation details and exposing only necessary information.
Inheritance: Reusing code and creating a hierarchy of classes.
Polymorphism: Using a single interface to represent multiple types of objects.
Abstraction: Focusing on essential features and ignoring implementation details.
Examples: Using inheritance to create a b...read more
Q30. What is ticketing tool? Describe that??
A ticketing tool is a software used to manage and track customer support requests or incidents.
It allows users to submit tickets or requests for assistance.
It assigns tickets to appropriate support staff for resolution.
It tracks the status and progress of each ticket until it is resolved.
It provides reporting and analytics on ticket volume, resolution time, and customer satisfaction.
Examples include ServiceNow, JIRA Service Desk, and Zendesk.
Q31. How do you plan to grow your territory in coming 1 year ?
I plan to grow my territory by expanding my network, identifying new opportunities, and providing excellent customer service.
Identify potential clients and reach out to them through various channels
Attend industry events and conferences to network and generate leads
Collaborate with existing clients to identify new business opportunities
Provide exceptional customer service to retain current clients and generate referrals
Analyze market trends and adjust sales strategies accordi...read more
Q32. Can we using old method for data update ?
No, using old methods for data update is not recommended.
Old methods may not be compatible with new systems
Old methods may not have the necessary security measures
Using old methods can lead to data corruption or loss
Q33. why abstract class is required
Abstract classes are required to provide a common interface and share code among related classes.
Abstract classes allow for code reusability and promote modular design.
They provide a common interface for a group of related classes.
Abstract classes can define abstract methods that must be implemented by subclasses.
They can also provide default implementations for common methods.
Abstract classes cannot be instantiated, but can be used as a reference type.
Q34. What is functional Testing and provide some test scenarios of any web application?
Functional testing is a type of software testing where the system is tested against the functional requirements/specifications.
Test scenarios for a web application could include testing user authentication functionality
Testing search functionality to ensure accurate results are returned
Testing form submissions to verify data is being saved correctly
Testing navigation links to ensure they lead to the correct pages
Q35. Write a program to find the greatest from the list of elements within a window range, where window size is 3.
Q36. What is DNS and why do we use it
DNS stands for Domain Name System. It is used to translate domain names into IP addresses.
DNS is like a phonebook for the internet
It helps to identify and locate websites
DNS servers store information about domain names and their corresponding IP addresses
Without DNS, we would have to remember IP addresses to access websites
DNS can also be used for load balancing and security purposes
Q37. 1. How would you do an estimation of a given scenario
Estimating a given scenario involves breaking it down, considering variables, and using past data.
Break down the scenario into smaller tasks
Consider variables such as complexity, dependencies, and resources
Use past data or similar scenarios to make an educated guess
Involve team members for input and validation
Adjust estimation based on feedback and new information
Q38. 1. How did you develop a test automation framework and what is the technology used
I developed a test automation framework using Java and Selenium WebDriver
Researched best practices for test automation frameworks
Designed a modular framework architecture for reusability
Implemented using Java programming language
Utilized Selenium WebDriver for web application testing
Integrated with Jenkins for continuous integration
Q39. What is governor limit ? why is it there ?
Governor limits are limits enforced by Salesforce to ensure efficient use of shared resources.
Governor limits are enforced on Apex code, SOQL queries, DML statements, and other operations.
They prevent runaway code from monopolizing shared resources and causing performance issues.
Examples of governor limits include limits on CPU time, heap size, and database queries.
Developers must design their code to work within these limits to ensure efficient use of resources.
Governor limi...read more
Q40. What is subnet?? What is subnet of 120?
A subnet is a smaller network within a larger network. The subnet of 120 depends on the subnet mask.
Subnet is a way to divide a larger network into smaller ones
Subnet mask determines the size of the subnet
Subnetting helps in efficient use of IP addresses
The subnet of 120 depends on the subnet mask used
Q41. Design a test automation frmaework to which is Hardware Agnostic.
Design a test automation framework that is hardware agnostic.
Use a modular architecture to separate hardware-specific code from test logic.
Implement a driver layer to abstract hardware interactions.
Leverage industry-standard communication protocols like USB, Bluetooth, or Wi-Fi.
Utilize virtualization or emulation techniques to simulate hardware environments.
Ensure compatibility with different operating systems and platforms.
Provide configuration options to easily switch betwe...read more
Q42. What is lightning data services ?
Lightning Data Service is a framework that allows developers to easily access and manipulate data in Salesforce.
It provides a standard interface for data manipulation
It automatically handles data caching and synchronization
It supports CRUD operations on records and fields
It can be used with Lightning Components and Apex controllers
Q43. Singleton pattern and example for singleton class Find the frequency of chars in given strings
Singleton pattern is a design pattern that restricts the instantiation of a class to one object. Frequency of chars can be found using a hashmap.
Singleton pattern ensures that only one instance of a class is created and provides a global point of access to it.
Example of singleton class is java.lang.Runtime, which represents the runtime environment of the current application.
To find frequency of chars in a string, we can use a hashmap to store the count of each character in th...read more
Q44. Major Pillar of OOPS, Abstraction vs Encapsulation
Abstraction and Encapsulation are two major pillars of OOPS.
Abstraction is the process of hiding complex implementation details and showing only the necessary information to the user.
Encapsulation is the process of wrapping data and methods into a single unit and restricting access to the data from outside the unit.
Abstraction is achieved through abstract classes and interfaces.
Encapsulation is achieved through access modifiers like public, private, and protected.
Abstraction ...read more
Q45. what is broadcast receiver
Broadcast receiver is a component in Android that allows the system to deliver events to the app.
Component in Android system
Receives and handles broadcast messages
Used to respond to system-wide events
Registered in the AndroidManifest.xml file
Q46. what is intent service
IntentService is a class in Android that performs long-running operations in the background without blocking the main thread.
IntentService is a subclass of Service that handles asynchronous requests (expressed as Intents) on demand.
It is typically used for tasks like downloading files, syncing data, or performing any other background task.
IntentService runs on a separate worker thread, so it does not interfere with the main UI thread.
Once the task is completed, the IntentServ...read more
Q47. What do you know about MVVM ?
MVVM stands for Model-View-ViewModel, an architectural pattern used in software development.
MVVM separates the user interface from the business logic and data access layers.
Model represents the data and business logic, View represents the UI, and ViewModel acts as a mediator between the two.
ViewModel exposes data and commands to the View, and communicates with the Model to retrieve and save data.
MVVM is commonly used in Android development with frameworks like Android Archite...read more
Q48. what is trigger new & old ?
New and old are trigger context variables in Salesforce that store the new and old versions of a record being processed.
New stores the updated version of the record being processed in a trigger.
Old stores the previous version of the record being processed in a trigger.
New and old are used to compare changes made to a record in a trigger.
New and old are only available in before and after triggers, not in validation or workflow rules.
Q49. What is diff between SOQL & SOSL ?
SOQL is used to query records from a single object, while SOSL is used to search for records across multiple objects.
SOQL is used to retrieve data from a single object based on conditions
SOSL is used to search for data across multiple objects based on search terms
SOQL supports aggregate functions, while SOSL does not
SOQL is case-sensitive, while SOSL is not
SOQL queries are limited to 100 records, while SOSL can return up to 2000 records
Q50. escalation management and how its executed
Escalation management involves identifying, prioritizing, and resolving issues that require higher-level intervention.
Escalation management is a process of identifying issues that cannot be resolved at lower levels and escalating them to higher authorities.
It involves setting clear criteria for when an issue should be escalated, such as severity, impact, or time sensitivity.
Effective communication is key in escalation management to ensure all stakeholders are informed of the ...read more
Q51. Linux basic commands usage
Linux basic commands are essential for any software engineer. They include commands for file management, system monitoring, and networking.
File management commands: ls, cd, mkdir, rm, cp, mv
System monitoring commands: top, ps, df, free, uptime
Networking commands: ping, traceroute, netstat, ifconfig
Other useful commands: grep, tar, ssh, chmod, chown
It's important to understand the syntax and options for each command.
Examples: ls -l (list files in long format), ps aux (list all...read more
Q52. What is Q_Object Macro in Qt?
Q_Object Macro is a Qt macro used to declare a class as a QObject.
Q_Object Macro is used to enable signals and slots mechanism in a class.
It is used to declare a class as a QObject and to inherit from QObject.
It is used to enable the use of Qt's meta-object system in a class.
It is used to enable dynamic properties and object names in a class.
Q53. what is using namespace std; ?
using namespace std; is a directive in C++ that allows the programmer to use all elements of the standard C++ library without specifying the std:: prefix.
It is used to avoid having to write std:: before standard library elements.
It should be used with caution as it can lead to naming conflicts.
Example: cout << 'Hello, World!'; instead of std::cout << 'Hello, World!';
Q54. What process did you follow for data preprocessing
I followed a systematic approach for data preprocessing including data cleaning, normalization, encoding, and feature scaling.
Performed data cleaning to handle missing values and outliers
Normalized numerical features to bring them to a similar scale
Encoded categorical variables using techniques like one-hot encoding
Applied feature scaling to ensure all features contribute equally to the model
Q55. Discussion on previous technologies used ?
Discussed previous technologies used in product development including CAD software, simulation tools, and prototyping methods.
Utilized CAD software such as SolidWorks for 3D modeling and design
Employed simulation tools like ANSYS for analyzing structural integrity and performance
Utilized rapid prototyping methods such as 3D printing to create physical prototypes for testing
Q56. what is closure? what is hoisting?. find the second largest number without sorting.
Closure is a function that has access to its own scope, as well as the scope of its outer function.
Closure allows a function to access variables from its outer function even after the outer function has finished executing.
Example: function outerFunction() { let outerVar = 'I am outer'; return function innerFunction() { console.log(outerVar); }; }
Hoisting is a JavaScript mechanism where variables and function declarations are moved to the top of their containing scope before c...read more
Q57. What is Android Framework?
Android Framework is a set of APIs and tools provided by Android to develop applications for Android devices.
It provides a set of pre-built components for building mobile applications.
It includes libraries for UI design, data storage, networking, and more.
Developers can use Android Framework to create apps for smartphones, tablets, wearables, and other devices.
Examples of Android Framework components include Activities, Fragments, Services, Content Providers, and Broadcast Re...read more
Q58. Difference between lift boundaries and right
Lift boundaries refer to the maximum and minimum values of a lift, while right refers to the direction of movement.
Lift boundaries are the physical limits of how high or low a lift can go.
Right refers to the direction in which the lift is moving, either up or down.
For example, if a lift has a maximum boundary of 10 floors, it cannot go higher than that.
If the lift is moving in the right direction, it is going up towards higher floors.
Q59. What is Closure?What is Hoisting?
Closure is a function that has access to variables in its outer scope. Hoisting is the behavior of moving declarations to the top of the scope.
Closure allows for private variables and functions in JavaScript.
Hoisting can lead to unexpected behavior when variables are declared after they are used.
Example of closure: function outer() { let x = 10; function inner() { console.log(x); } return inner; }
Example of hoisting: console.log(x); var x = 5; // outputs undefined
Q60. How DLP works? Day to day roles and responsibilities?
Q61. Write test cases on water bottle.
Test cases for water bottle
Check for leaks when filled with water
Test the durability of the bottle by dropping it from different heights
Check if the cap is tight enough to prevent spills
Test the temperature retention capabilities of the bottle
Check if the bottle is easy to clean and maintain
Q62. How to reverse a string?
To reverse a string, iterate through the string and append each character to a new string in reverse order.
Create an empty string to store the reversed string
Iterate through the original string from the end to the beginning
Append each character to the new string
Return the new string
Q63. What is the performance testing
Performance testing is the process of testing the speed, responsiveness, and stability of a software application under various conditions.
Measures the speed, responsiveness, and stability of an application
Helps identify bottlenecks and areas for improvement
Involves simulating real-world usage scenarios
Can include load testing, stress testing, and scalability testing
Ensures the application meets performance requirements
Q64. what is polymorphism ?
Polymorphism is the ability of a function or method to behave differently based on the object it is acting upon.
Polymorphism allows objects of different classes to be treated as objects of a common superclass.
There are two types of polymorphism: compile-time (method overloading) and runtime (method overriding).
Example: Animal class with methods like eat() can be inherited by classes like Dog and Cat, which can override the eat() method.
Q65. How to check the IP of windows machine?
To check the IP of a Windows machine, you can use the command prompt or the network and sharing center.
Open Command Prompt and type 'ipconfig' to view the IP address of the machine.
Alternatively, go to Control Panel > Network and Sharing Center > Change adapter settings > Right-click on the network connection > Status > Details to find the IP address.
You can also use the 'ipconfig /all' command in Command Prompt to view more detailed network information.
Q66. Do you know anything about patching?
Patching is the process of updating or fixing software to address security vulnerabilities or bugs.
Patching involves applying updates or fixes to software to improve functionality or security.
Patch management is important to ensure systems are up to date and secure.
Examples of patching include installing Windows updates or updating antivirus definitions.
Q67. Cloud architecture on Iaas, Paas and agentless services.
Cloud architecture involves IaaS, PaaS, and agentless services for efficient and scalable solutions.
IaaS (Infrastructure as a Service) provides virtualized computing resources over the internet.
PaaS (Platform as a Service) offers a platform allowing customers to develop, run, and manage applications without dealing with infrastructure.
Agentless services do not require the installation of agents on the target systems, reducing complexity and overhead.
Examples: AWS (IaaS), Goog...read more
Q68. How many materics we are you use
I use a variety of metrics to track production efficiency and quality.
I use metrics such as OEE (Overall Equipment Efficiency), cycle time, downtime, scrap rate, and yield.
These metrics help me identify areas for improvement and track the success of implemented changes.
For example, I may use OEE to measure the overall effectiveness of a production line, while cycle time helps me understand the time it takes to complete a specific task.
Q69. How to open Active directory using cmd
You can open Active Directory using cmd by running the 'dsa.msc' command.
Open Command Prompt as an administrator
Type 'dsa.msc' and press Enter
Active Directory Users and Computers window will open
Q70. What is DHCP,DNS?
DHCP is a protocol that assigns IP addresses to devices on a network. DNS is a system that translates domain names to IP addresses.
DHCP stands for Dynamic Host Configuration Protocol
DHCP assigns IP addresses to devices on a network
DNS stands for Domain Name System
DNS translates domain names to IP addresses
DNS is used to access websites and other resources on the internet
Q71. Difference between Domain and workgroup???
Domain is a centralized network where computers are managed by a server, while workgroup is a decentralized network where computers are managed individually.
Domain is managed by a domain controller server, while workgroup has no centralized server.
Domain allows for centralized management of user accounts, security policies, and resources, while workgroup does not.
Domain allows for easier scalability and security, while workgroup is more suitable for small networks with fewer ...read more
Q72. Explain the Design Patters you worked
I have worked with several design patterns including Singleton, Factory, Observer, and Decorator.
Implemented Singleton pattern to ensure only one instance of a class is created.
Used Factory pattern to create objects without exposing the instantiation logic to the client.
Implemented Observer pattern to notify dependent objects of any state changes.
Used Decorator pattern to add functionality to an object dynamically without changing its structure.
Q73. Write a pyspark code to create dataframe from multiple list.
Q74. 1. Check all the permutations of palindrome in an array
Find all permutations of palindromes in an array of strings.
Iterate through each string in the array.
For each string, generate all possible permutations.
Check if each permutation is a palindrome.
Return the list of palindromic permutations.
Q75. What is Neural Network.
Neural network is a type of machine learning algorithm inspired by the human brain, consisting of interconnected nodes that process information.
Neural network is composed of layers of nodes, each connected to nodes in the next layer.
Nodes in a neural network perform mathematical operations on input data and pass the result to the next layer.
Neural networks are trained using labeled data to adjust the weights of connections between nodes.
Common types of neural networks include...read more
Q76. Explain the ASP.Net Core Middleware
ASP.Net Core Middleware is a pipeline that handles requests and responses.
Middleware is a series of components that handle requests and responses in a pipeline
Each middleware component can modify the request or response
Middleware can be added to the pipeline using the Use() method
Examples of middleware include authentication, logging, and routing
Q77. why we need ood ?
OOD (Object-Oriented Design) is essential for creating modular, reusable, and maintainable software systems.
OOD helps in organizing code into manageable components
Encourages code reusability through inheritance and polymorphism
Facilitates easier maintenance and updates
Promotes scalability and flexibility in software development
Enables better collaboration among team members
Q78. How you manage new startup?
I manage new startups by creating a clear plan, setting achievable goals, and providing support and guidance to the team.
Develop a comprehensive business plan
Set realistic goals and milestones
Provide support and guidance to the team
Monitor progress and adjust strategies as needed
Build strong relationships with customers and partners
Stay up-to-date with industry trends and best practices
Q79. Deep technical level of troubleshooting on cloud.
Deep technical troubleshooting on cloud involves identifying and resolving complex issues within cloud infrastructure.
Understand the architecture and components of the cloud platform being used
Utilize monitoring and logging tools to identify issues
Analyze system performance metrics to pinpoint potential bottlenecks
Use debugging tools and techniques to troubleshoot code or configuration issues
Collaborate with cross-functional teams to resolve complex issues
Q80. What are kotlin scope functions?
Kotlin scope functions are functions that allow concise code block execution on an object.
Kotlin scope functions include let, run, with, apply, and also.
They are used to simplify code and avoid repetitive variable references.
For example, 'with' can be used to execute multiple operations on an object without repeating its name.
Similarly, 'apply' can be used to initialize an object's properties without repeating its name.
Each function has a specific use case and can be chosen b...read more
Q81. Program - Convert integer into structure.
Convert integer into structure in C programming.
Define a structure with the required fields.
Create a variable of the structure type.
Assign the integer value to the appropriate field of the structure.
Q82. Explain the Solid Design Pattern
Solid Design Pattern is a set of principles for writing maintainable and scalable code.
S - Single Responsibility Principle
O - Open/Closed Principle
L - Liskov Substitution Principle
I - Interface Segregation Principle
D - Dependency Inversion Principle
Q83. How does Dns and DHCP work
DNS translates domain names to IP addresses, while DHCP assigns IP addresses to devices on a network.
DNS resolves domain names to IP addresses through a process of querying authoritative name servers.
DHCP dynamically assigns IP addresses to devices on a network, along with other network configuration parameters.
DNS uses a hierarchical system of domain name servers to efficiently resolve domain names.
DHCP servers lease IP addresses to devices for a specific period of time, ens...read more
Q84. Explain Room Persistence Library.
Room is an abstraction layer over SQLite to allow for more robust database access while harnessing the full power of SQLite.
Room is a part of Android Architecture Components.
It provides compile-time verification of SQL queries.
It simplifies database operations by eliminating boilerplate code.
It supports LiveData and RxJava for reactive programming.
It allows for easy migration of database schema.
It provides a clean API for database transactions.
It supports relationships betwee...read more
Q85. write sorting algorithm ?
A sorting algorithm is a method used to arrange elements in a specific order.
Common sorting algorithms include Bubble Sort, Selection Sort, Insertion Sort, Merge Sort, Quick Sort, and Heap Sort.
Bubble Sort compares adjacent elements and swaps them if they are in the wrong order.
Merge Sort divides the array into two halves, sorts them separately, and then merges them back together.
Quick Sort picks a pivot element and partitions the array around the pivot.
Heap Sort builds a max...read more
Q86. Difference between 32bit and 64 bit?
32-bit and 64-bit refer to the size of the data types that a processor can handle.
32-bit processors can handle data in 32-bit chunks, while 64-bit processors can handle data in 64-bit chunks.
64-bit processors can access more memory than 32-bit processors (up to 18.4 million TB compared to 4 GB).
64-bit processors can perform more calculations per second than 32-bit processors.
64-bit processors are more efficient for handling large datasets and complex calculations.
Most modern ...read more
Q87. How to add image in image tag
To add an image in an image tag, use the 'src' attribute and provide the image file path.
Use the tag to display an image on a web page
Add the 'src' attribute to specify the image file path
Optionally, add the 'alt' attribute to provide alternative text for the image
Example:
Q88. Write a code print triangle pattern
Print triangle pattern using nested loops
Use nested loops to iterate through rows and columns
Incrementally increase the number of stars printed in each row
Example: for a triangle with 5 rows, the pattern would be like: ['*', '**', '***', '****', '*****']
Q89. Explain about point to point VPN
Point to point VPN is a secure connection between two devices or networks over the internet.
Point to point VPN creates a secure tunnel between two specific endpoints.
It encrypts data to ensure privacy and security during transmission.
Common examples include site-to-site VPNs connecting branch offices and remote access VPNs for individual users.
Point to point VPNs are commonly used in businesses to securely connect remote offices or employees.
They provide a secure way to acces...read more
Q90. What is react and benifit?
React is a JavaScript library for building user interfaces.
React allows for reusable UI components
It uses a virtual DOM for efficient updates
React is declarative, making it easier to understand and debug code
It has a large and active community with many resources available
React can be used for both web and mobile app development
Q91. What is linked list
A linked list is a data structure where each element points to the next element in the sequence.
Consists of nodes where each node contains data and a reference to the next node
Can be singly linked (each node points to the next) or doubly linked (each node points to the next and previous)
Allows for dynamic size and efficient insertion/deletion operations
Example: 1 -> 2 -> 3 -> null
Q92. Write a Builder class.
A Builder class is used to create objects with a large number of optional parameters.
Builder class is a creational design pattern.
It separates the construction of a complex object from its representation.
It allows you to create different variations of an object while avoiding constructor pollution.
It has a fluent interface that allows you to chain method calls together.
Example: StringBuilder in Java.
Q93. Explain - Coroutin, RxJava
Coroutines and RxJava are both used for asynchronous programming in Android development.
Coroutines are a lightweight solution for asynchronous programming that allow for easy cancellation and error handling.
RxJava is a reactive programming library that uses Observables and Observers to handle asynchronous events.
Both Coroutines and RxJava can be used to simplify complex asynchronous code and improve app performance.
Coroutines are built into Kotlin, while RxJava requires an ad...read more
Q94. Architecture of the application
The application follows a microservices architecture with a front-end layer, API layer, and multiple backend services.
The front-end layer is built using React and communicates with the API layer through RESTful APIs.
The API layer is built using Node.js and Express.js and acts as a gateway for all the backend services.
The backend services are built using different technologies like Java, Python, and Go and communicate with each other through message queues.
The application uses...read more
Q95. explain types of normalization ?
Normalization is a process used to organize a database into tables and columns to reduce redundancy and improve data integrity.
1. First Normal Form (1NF) - Eliminates duplicate data by ensuring each column contains atomic values.
2. Second Normal Form (2NF) - Requires 1NF and ensures that non-key attributes are fully functional dependent on the primary key.
3. Third Normal Form (3NF) - Requires 2NF and eliminates transitive dependencies by removing columns that are not dependen...read more
Q96. What is accrual accounting ?
Accrual accounting is a method of accounting where revenues and expenses are recorded when they are earned or incurred, regardless of when cash is exchanged.
Revenue is recognized when it is earned, not necessarily when cash is received
Expenses are recorded when they are incurred, not necessarily when they are paid
Accrual accounting provides a more accurate picture of a company's financial position and performance over time
It follows the matching principle, where revenues are ...read more
Q97. What you treat prepayment ?
Prepayment is an advance payment made for goods or services before they are received or delivered.
Prepayment is recorded as an asset on the balance sheet until the goods or services are received or delivered.
Once the goods or services are received or delivered, the prepayment is then recognized as an expense on the income statement.
Examples of prepayments include rent paid in advance, insurance premiums, and subscription fees.
Q98. What is framework?
A framework is a software platform that provides a foundation for developing applications.
A framework is a reusable set of libraries, tools, and components that help developers build applications more efficiently.
It provides a structure and guidelines for developing software, including predefined functions and classes.
Frameworks often include features like data handling, user interface components, and integration with other systems.
Examples of popular frameworks include Angul...read more
Q99. 3. Swap numbers using bit operators
Swapping numbers using bit operators.
Use XOR operator to swap two numbers without using a temporary variable
XORing a number with itself results in 0
Example: a = 5, b = 7. a ^= b; b ^= a; a ^= b; // a = 7, b = 5
Q100. Tell your stength and weakness
Strength: Strong leadership skills, Weakness: Difficulty delegating tasks
Strength: Ability to motivate and inspire team members
Strength: Excellent problem-solving skills
Weakness: Tendency to take on too much responsibility
Weakness: Struggle to trust others to complete tasks to my standards
More about working at HARMAN
Top HR Questions asked in null
Interview Process at null
Top Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month