Add office photos
Employer?
Claim Account for FREE

HARMAN

3.8
based on 2.6k Reviews
Filter interviews by

100+ Interview Questions and Answers

Updated 16 Dec 2024
Popular Designations

Q1. Write a method for deletion of a node from a Linked List.

Ans.

Method for deleting a node from a Linked List

  • Find the node to be deleted

  • Update the previous node's next pointer to skip the deleted node

  • Free the memory occupied by the deleted node

View 1 answer

Q2. Which programming language do you use regular in work

Ans.

I regularly use Python in my work.

  • Python is a versatile and powerful programming language.

  • It is widely used for web development, data analysis, and automation.

  • Python has a large and active community, making it easy to find support and resources.

  • Some popular Python frameworks and libraries include Django, Flask, and NumPy.

View 1 answer

Q3. What step do you take to ensure accurate estimates for project

Ans.

To ensure accurate estimates for a project, I follow these steps:

  • Thoroughly analyze project requirements and scope

  • Break down the project into smaller tasks

  • Consider past project data and historical performance

  • Consult with team members and stakeholders

  • Use estimation techniques like bottom-up or top-down

  • Factor in potential risks and uncertainties

  • Regularly review and update estimates as the project progresses

View 1 answer

Q4. Write a code to check if two strings are anagrams of each other.

Ans.

Code to check if two strings are anagrams of each other.

  • Create two character arrays from the strings

  • Sort the arrays

  • Compare the sorted arrays

Add your answer
Discover null interview dos and don'ts from real experiences

Q5. How to make a custom immutable class in java?

Ans.

Creating a custom immutable class in Java

  • Make the class final

  • Make all fields private and final

  • Do not provide any setter methods

  • Provide a constructor to initialize all fields

  • Override equals() and hashCode() methods

  • Prevent modification of mutable objects passed in constructor

Add your answer

Q6. Activity launch modes Activity lifecycle Program to find second largest number in an array Singleton implementation

Ans.

Activity launch modes, activity lifecycle, finding second largest number in an array, and singleton implementation.

  • Activity launch modes determine how a new activity is placed in the task stack.

  • Activity lifecycle consists of several states like onCreate, onStart, onResume, etc.

  • To find the second largest number in an array, sort the array in descending order and return the element at index 1.

  • Singleton is a design pattern that restricts the instantiation of a class to a single ...read more

Add your answer
Are these interview questions helpful?

Q7. why is string immutable

Ans.

String is immutable because it ensures data integrity and allows for efficient memory management.

  • Immutable strings prevent accidental modification of data.

  • Immutable strings can be easily shared and reused, improving memory efficiency.

  • Immutable strings enable efficient string interning and caching.

  • Immutable strings support thread safety in concurrent environments.

View 1 answer

Q8. What is copy constructor? Write Syntax? Why there's const and & in the syntax of copy constructor.

Ans.

Copy constructor creates a new object by copying an existing object.

  • Copy constructor is used to create a new object by copying an existing object.

  • Syntax: ClassName(const ClassName& obj)

  • The const keyword ensures that the original object is not modified.

  • The & symbol is used to pass the object by reference, which is more efficient than passing by value.

  • Copy constructor is automatically called when a new object is created from an existing object.

Add your answer
Share interview questions and help millions of jobseekers 🌟

Q9. How many programming language do you know

Ans.

I know multiple programming languages.

  • I am proficient in Java, Python, and C++.

  • I have experience with web development languages such as HTML, CSS, and JavaScript.

  • I am familiar with scripting languages like Ruby and Perl.

  • I have worked with database query languages like SQL.

  • I am constantly learning and exploring new programming languages.

View 1 answer

Q10. Any Design patterns explaination if used in previous project

Ans.

Yes, I have used the Factory and Singleton design patterns in my previous project.

  • I used the Factory pattern to create objects of different classes based on a common interface.

  • This helped in reducing the coupling between the client code and the implementation classes.

  • I used the Singleton pattern to ensure that only one instance of a class is created and used throughout the application.

  • This helped in reducing the memory footprint and ensured that the state of the object was co...read more

Add your answer

Q11. How do you mange computing priorities or request

Ans.

Managing computing priorities involves prioritizing requests based on urgency, importance, and available resources.

  • Assess the urgency and importance of each request

  • Consider the impact on business goals and objectives

  • Evaluate the available resources and capacity

  • Communicate with stakeholders to understand their needs

  • Establish a prioritization framework or criteria

  • Regularly review and adjust priorities as needed

View 1 answer

Q12. Write Docker file structure for nginx image,How to resolve Git conflicts.

Ans.

Docker file structure for nginx image and resolving Git conflicts

  • Dockerfile structure for nginx image: FROM nginx, COPY index.html /usr/share/nginx/html, EXPOSE 80

  • To resolve Git conflicts: git status, git pull, git add , git commit -m 'Resolved conflict', git push

Add your answer

Q13. Time complexity of linked lists operations

Ans.

Time complexity of linked list operations is O(n) for traversal, insertion and deletion.

  • Traversal, insertion and deletion in linked lists take linear time.

  • Insertion and deletion at the beginning of the list is faster than at the end.

  • Doubly linked lists have slightly higher time complexity due to maintaining two pointers.

Add your answer

Q14. 1- Project explain 2- How was structure independent or independent 3- Any challenges

Ans.

I led a project to develop a new mobile app, ensuring the code structure was independent and scalable. Faced challenges with tight deadlines and changing requirements.

  • Led project to develop mobile app

  • Ensured code structure was independent and scalable

  • Challenges with tight deadlines and changing requirements

Add your answer

Q15. do @requestparam has default value

Ans.

Yes, @RequestParam has a default value if not specified.

  • If a @RequestParam is not provided in the request, it will use its default value.

  • The default value can be set using the 'defaultValue' attribute of @RequestParam annotation.

  • If no default value is specified, the parameter will be considered as required and an exception will be thrown if not provided.

Add your answer

Q16. Fft vs dft , usage of cimsis dsp

Ans.

FFT is a faster algorithm for calculating DFT. CMSIS DSP is a library for signal processing on ARM Cortex-M processors.

  • FFT is a more efficient algorithm for calculating the Discrete Fourier Transform (DFT).

  • CMSIS DSP is a library provided by ARM for signal processing on Cortex-M processors.

  • CMSIS DSP provides optimized functions for common signal processing tasks like filtering, FFT, and matrix operations.

Add your answer

Q17. What can do for run apex class ? what is get precaution ?

Ans.

To run an Apex class, we need to create an instance of the class and call its methods. Precautions include testing and avoiding governor limits.

  • Create an instance of the class using the 'new' keyword

  • Call the methods using dot notation

  • Test the class thoroughly before deploying to production

  • Avoid hitting governor limits by optimizing code and limiting queries

Add your answer

Q18. A sequence of number is given, Find one of the given number by providing optimum solution? You need to ask the interviewer if the it is sorted or not and then discussion on different types of sorts.

Ans.

Ask if the sequence is sorted and discuss different types of sorts to find the given number.

  • Ask if the sequence is sorted to determine the best approach.

  • Discuss different types of sorts like bubble sort, selection sort, insertion sort, merge sort, quick sort, etc.

  • Choose the most efficient sorting algorithm based on the size of the sequence and the given number.

Add your answer

Q19. Doubly linked list complete implementation

Ans.

Doubly linked list is a data structure with nodes having pointers to both previous and next nodes.

  • Each node has a 'prev' and 'next' pointer

  • Insertion and deletion can be done at any position

  • Traversal can be done in both directions

Add your answer

Q20. What are the Design PAtterns wou have used with explanation ?

Ans.

Design patterns are reusable solutions to common problems in software design. Some commonly used patterns include Singleton, Factory, Observer, and Strategy.

  • Singleton pattern ensures a class has only one instance and provides a global point of access to it.

  • Factory pattern creates objects without specifying the exact class of object that will be created.

  • Observer pattern defines a one-to-many dependency between objects so that when one object changes state, all its dependents a...read more

Add your answer

Q21. 1. How mutex works 2. Howe do you share information between threads? 3. Questions inCompletableFuture? 4. Write a program to show the deadlock condition? 5.

Ans.

Technical Lead interview questions on mutex, thread communication, CompletableFuture, and deadlock

  • Mutex is a synchronization mechanism to prevent multiple threads from accessing shared resources simultaneously

  • Thread communication can be achieved through shared memory, message passing, or synchronization primitives like semaphores

  • CompletableFuture is a Java class that represents a future result of an asynchronous computation and provides methods to chain and combine them

  • Deadlo...read more

Add your answer

Q22. What platform you worked on? Linux, Windows? System configuration?

Ans.

I have worked on both Linux and Windows platforms with various system configurations.

  • Proficient in Linux command line interface and shell scripting

  • Experience in Windows Server administration and Active Directory management

  • Familiarity with virtualization technologies such as VMware and VirtualBox

  • Knowledge of system configuration management tools like Ansible and Puppet

Add your answer

Q23. Casting Operators in C++, dynamic_cast when it is used?

Ans.

dynamic_cast is used in C++ to perform safe downcasting of polymorphic types.

  • dynamic_cast is used to convert a pointer/reference of a base class to a pointer/reference of a derived class.

  • It is used when we want to access a derived class member function or variable using a base class pointer/reference.

  • If the conversion is not possible, dynamic_cast returns a null pointer for pointers or throws a bad_cast exception for references.

Add your answer

Q24. What are SOLID principles in OOP languages?

Ans.

SOLID principles are a set of five design principles that help in creating maintainable and scalable software applications.

  • S - Single Responsibility Principle (SRP)

  • O - Open-Closed Principle (OCP)

  • L - Liskov Substitution Principle (LSP)

  • I - Interface Segregation Principle (ISP)

  • D - Dependency Inversion Principle (DIP)

Add your answer

Q25. WAP to check Power of 2

Ans.

Check if a given number is a power of 2

  • Check if the number is greater than 0

  • Use bitwise AND operation to check if only one bit is set in the binary representation of the number

  • If the result is 0, then the number is a power of 2

Add your answer

Q26. What are the port numbers of various Protocols - DHCP,SMTP

Ans.

DHCP uses port 67 and 68, SMTP uses port 25.

  • DHCP uses port 67 and 68 for server and client communication respectively.

  • SMTP uses port 25 for email transmission.

Add your answer

Q27. What is your opinion if you want to increase the sales of a company?

Ans.

To increase sales, a company should focus on improving product quality, expanding customer base, and effective marketing strategies.

  • Improve product quality to increase customer satisfaction and loyalty

  • Expand customer base through targeted advertising and promotions

  • Develop effective marketing strategies to reach new customers and retain existing ones

  • Offer competitive pricing and discounts to attract price-sensitive customers

  • Provide excellent customer service to build a positiv...read more

Add your answer

Q28. Connect statement in Qt qnd it's parameters? MOC compiler in Qt?

Ans.

Connect statement is used to connect signals and slots in Qt. MOC compiler generates meta-object code for Qt classes.

  • Connect statement connects a signal to a slot or a signal to another signal.

  • Parameters of connect statement include sender object, signal name, receiver object, slot name, and optional connection type.

  • MOC compiler generates meta-object code for Qt classes which enables features like signals and slots, introspection, and dynamic properties.

Add your answer

Q29. Oops concepts and use in real time project

Ans.

Oops concepts are fundamental to software engineering and are used in real-time projects for better code organization and maintenance.

  • Encapsulation: Hiding implementation details and exposing only necessary information.

  • Inheritance: Reusing code and creating a hierarchy of classes.

  • Polymorphism: Using a single interface to represent multiple types of objects.

  • Abstraction: Focusing on essential features and ignoring implementation details.

  • Examples: Using inheritance to create a b...read more

Add your answer

Q30. What is ticketing tool? Describe that??

Ans.

A ticketing tool is a software used to manage and track customer support requests or incidents.

  • It allows users to submit tickets or requests for assistance.

  • It assigns tickets to appropriate support staff for resolution.

  • It tracks the status and progress of each ticket until it is resolved.

  • It provides reporting and analytics on ticket volume, resolution time, and customer satisfaction.

  • Examples include ServiceNow, JIRA Service Desk, and Zendesk.

Add your answer

Q31. How do you plan to grow your territory in coming 1 year ?

Ans.

I plan to grow my territory by expanding my network, identifying new opportunities, and providing excellent customer service.

  • Identify potential clients and reach out to them through various channels

  • Attend industry events and conferences to network and generate leads

  • Collaborate with existing clients to identify new business opportunities

  • Provide exceptional customer service to retain current clients and generate referrals

  • Analyze market trends and adjust sales strategies accordi...read more

Add your answer

Q32. Can we using old method for data update ?

Ans.

No, using old methods for data update is not recommended.

  • Old methods may not be compatible with new systems

  • Old methods may not have the necessary security measures

  • Using old methods can lead to data corruption or loss

Add your answer

Q33. why abstract class is required

Ans.

Abstract classes are required to provide a common interface and share code among related classes.

  • Abstract classes allow for code reusability and promote modular design.

  • They provide a common interface for a group of related classes.

  • Abstract classes can define abstract methods that must be implemented by subclasses.

  • They can also provide default implementations for common methods.

  • Abstract classes cannot be instantiated, but can be used as a reference type.

Add your answer

Q34. What is functional Testing and provide some test scenarios of any web application?

Ans.

Functional testing is a type of software testing where the system is tested against the functional requirements/specifications.

  • Test scenarios for a web application could include testing user authentication functionality

  • Testing search functionality to ensure accurate results are returned

  • Testing form submissions to verify data is being saved correctly

  • Testing navigation links to ensure they lead to the correct pages

Add your answer

Q35. Write a program to find the greatest from the list of elements within a window range, where window size is 3.

Add your answer

Q36. What is DNS and why do we use it

Ans.

DNS stands for Domain Name System. It is used to translate domain names into IP addresses.

  • DNS is like a phonebook for the internet

  • It helps to identify and locate websites

  • DNS servers store information about domain names and their corresponding IP addresses

  • Without DNS, we would have to remember IP addresses to access websites

  • DNS can also be used for load balancing and security purposes

Add your answer

Q37. 1. How would you do an estimation of a given scenario

Ans.

Estimating a given scenario involves breaking it down, considering variables, and using past data.

  • Break down the scenario into smaller tasks

  • Consider variables such as complexity, dependencies, and resources

  • Use past data or similar scenarios to make an educated guess

  • Involve team members for input and validation

  • Adjust estimation based on feedback and new information

Add your answer

Q38. 1. How did you develop a test automation framework and what is the technology used

Ans.

I developed a test automation framework using Java and Selenium WebDriver

  • Researched best practices for test automation frameworks

  • Designed a modular framework architecture for reusability

  • Implemented using Java programming language

  • Utilized Selenium WebDriver for web application testing

  • Integrated with Jenkins for continuous integration

Add your answer

Q39. What is governor limit ? why is it there ?

Ans.

Governor limits are limits enforced by Salesforce to ensure efficient use of shared resources.

  • Governor limits are enforced on Apex code, SOQL queries, DML statements, and other operations.

  • They prevent runaway code from monopolizing shared resources and causing performance issues.

  • Examples of governor limits include limits on CPU time, heap size, and database queries.

  • Developers must design their code to work within these limits to ensure efficient use of resources.

  • Governor limi...read more

Add your answer

Q40. What is subnet?? What is subnet of 120?

Ans.

A subnet is a smaller network within a larger network. The subnet of 120 depends on the subnet mask.

  • Subnet is a way to divide a larger network into smaller ones

  • Subnet mask determines the size of the subnet

  • Subnetting helps in efficient use of IP addresses

  • The subnet of 120 depends on the subnet mask used

Add your answer

Q41. Design a test automation frmaework to which is Hardware Agnostic.

Ans.

Design a test automation framework that is hardware agnostic.

  • Use a modular architecture to separate hardware-specific code from test logic.

  • Implement a driver layer to abstract hardware interactions.

  • Leverage industry-standard communication protocols like USB, Bluetooth, or Wi-Fi.

  • Utilize virtualization or emulation techniques to simulate hardware environments.

  • Ensure compatibility with different operating systems and platforms.

  • Provide configuration options to easily switch betwe...read more

Add your answer

Q42. What is lightning data services ?

Ans.

Lightning Data Service is a framework that allows developers to easily access and manipulate data in Salesforce.

  • It provides a standard interface for data manipulation

  • It automatically handles data caching and synchronization

  • It supports CRUD operations on records and fields

  • It can be used with Lightning Components and Apex controllers

Add your answer

Q43. Singleton pattern and example for singleton class Find the frequency of chars in given strings

Ans.

Singleton pattern is a design pattern that restricts the instantiation of a class to one object. Frequency of chars can be found using a hashmap.

  • Singleton pattern ensures that only one instance of a class is created and provides a global point of access to it.

  • Example of singleton class is java.lang.Runtime, which represents the runtime environment of the current application.

  • To find frequency of chars in a string, we can use a hashmap to store the count of each character in th...read more

Add your answer

Q44. Major Pillar of OOPS, Abstraction vs Encapsulation

Ans.

Abstraction and Encapsulation are two major pillars of OOPS.

  • Abstraction is the process of hiding complex implementation details and showing only the necessary information to the user.

  • Encapsulation is the process of wrapping data and methods into a single unit and restricting access to the data from outside the unit.

  • Abstraction is achieved through abstract classes and interfaces.

  • Encapsulation is achieved through access modifiers like public, private, and protected.

  • Abstraction ...read more

Add your answer

Q45. what is broadcast receiver

Ans.

Broadcast receiver is a component in Android that allows the system to deliver events to the app.

  • Component in Android system

  • Receives and handles broadcast messages

  • Used to respond to system-wide events

  • Registered in the AndroidManifest.xml file

Add your answer

Q46. what is intent service

Ans.

IntentService is a class in Android that performs long-running operations in the background without blocking the main thread.

  • IntentService is a subclass of Service that handles asynchronous requests (expressed as Intents) on demand.

  • It is typically used for tasks like downloading files, syncing data, or performing any other background task.

  • IntentService runs on a separate worker thread, so it does not interfere with the main UI thread.

  • Once the task is completed, the IntentServ...read more

Add your answer

Q47. What do you know about MVVM ?

Ans.

MVVM stands for Model-View-ViewModel, an architectural pattern used in software development.

  • MVVM separates the user interface from the business logic and data access layers.

  • Model represents the data and business logic, View represents the UI, and ViewModel acts as a mediator between the two.

  • ViewModel exposes data and commands to the View, and communicates with the Model to retrieve and save data.

  • MVVM is commonly used in Android development with frameworks like Android Archite...read more

Add your answer

Q48. what is trigger new & old ?

Ans.

New and old are trigger context variables in Salesforce that store the new and old versions of a record being processed.

  • New stores the updated version of the record being processed in a trigger.

  • Old stores the previous version of the record being processed in a trigger.

  • New and old are used to compare changes made to a record in a trigger.

  • New and old are only available in before and after triggers, not in validation or workflow rules.

Add your answer

Q49. What is diff between SOQL & SOSL ?

Ans.

SOQL is used to query records from a single object, while SOSL is used to search for records across multiple objects.

  • SOQL is used to retrieve data from a single object based on conditions

  • SOSL is used to search for data across multiple objects based on search terms

  • SOQL supports aggregate functions, while SOSL does not

  • SOQL is case-sensitive, while SOSL is not

  • SOQL queries are limited to 100 records, while SOSL can return up to 2000 records

Add your answer

Q50. escalation management and how its executed

Ans.

Escalation management involves identifying, prioritizing, and resolving issues that require higher-level intervention.

  • Escalation management is a process of identifying issues that cannot be resolved at lower levels and escalating them to higher authorities.

  • It involves setting clear criteria for when an issue should be escalated, such as severity, impact, or time sensitivity.

  • Effective communication is key in escalation management to ensure all stakeholders are informed of the ...read more

Add your answer

Q51. Linux basic commands usage

Ans.

Linux basic commands are essential for any software engineer. They include commands for file management, system monitoring, and networking.

  • File management commands: ls, cd, mkdir, rm, cp, mv

  • System monitoring commands: top, ps, df, free, uptime

  • Networking commands: ping, traceroute, netstat, ifconfig

  • Other useful commands: grep, tar, ssh, chmod, chown

  • It's important to understand the syntax and options for each command.

  • Examples: ls -l (list files in long format), ps aux (list all...read more

Add your answer

Q52. What is Q_Object Macro in Qt?

Ans.

Q_Object Macro is a Qt macro used to declare a class as a QObject.

  • Q_Object Macro is used to enable signals and slots mechanism in a class.

  • It is used to declare a class as a QObject and to inherit from QObject.

  • It is used to enable the use of Qt's meta-object system in a class.

  • It is used to enable dynamic properties and object names in a class.

Add your answer

Q53. what is using namespace std; ?

Ans.

using namespace std; is a directive in C++ that allows the programmer to use all elements of the standard C++ library without specifying the std:: prefix.

  • It is used to avoid having to write std:: before standard library elements.

  • It should be used with caution as it can lead to naming conflicts.

  • Example: cout << 'Hello, World!'; instead of std::cout << 'Hello, World!';

Add your answer

Q54. What process did you follow for data preprocessing

Ans.

I followed a systematic approach for data preprocessing including data cleaning, normalization, encoding, and feature scaling.

  • Performed data cleaning to handle missing values and outliers

  • Normalized numerical features to bring them to a similar scale

  • Encoded categorical variables using techniques like one-hot encoding

  • Applied feature scaling to ensure all features contribute equally to the model

Add your answer

Q55. Discussion on previous technologies used ?

Ans.

Discussed previous technologies used in product development including CAD software, simulation tools, and prototyping methods.

  • Utilized CAD software such as SolidWorks for 3D modeling and design

  • Employed simulation tools like ANSYS for analyzing structural integrity and performance

  • Utilized rapid prototyping methods such as 3D printing to create physical prototypes for testing

Add your answer

Q56. what is closure? what is hoisting?. find the second largest number without sorting.

Ans.

Closure is a function that has access to its own scope, as well as the scope of its outer function.

  • Closure allows a function to access variables from its outer function even after the outer function has finished executing.

  • Example: function outerFunction() { let outerVar = 'I am outer'; return function innerFunction() { console.log(outerVar); }; }

  • Hoisting is a JavaScript mechanism where variables and function declarations are moved to the top of their containing scope before c...read more

Add your answer

Q57. What is Android Framework?

Ans.

Android Framework is a set of APIs and tools provided by Android to develop applications for Android devices.

  • It provides a set of pre-built components for building mobile applications.

  • It includes libraries for UI design, data storage, networking, and more.

  • Developers can use Android Framework to create apps for smartphones, tablets, wearables, and other devices.

  • Examples of Android Framework components include Activities, Fragments, Services, Content Providers, and Broadcast Re...read more

Add your answer

Q58. Difference between lift boundaries and right

Ans.

Lift boundaries refer to the maximum and minimum values of a lift, while right refers to the direction of movement.

  • Lift boundaries are the physical limits of how high or low a lift can go.

  • Right refers to the direction in which the lift is moving, either up or down.

  • For example, if a lift has a maximum boundary of 10 floors, it cannot go higher than that.

  • If the lift is moving in the right direction, it is going up towards higher floors.

Add your answer

Q59. What is Closure?What is Hoisting?

Ans.

Closure is a function that has access to variables in its outer scope. Hoisting is the behavior of moving declarations to the top of the scope.

  • Closure allows for private variables and functions in JavaScript.

  • Hoisting can lead to unexpected behavior when variables are declared after they are used.

  • Example of closure: function outer() { let x = 10; function inner() { console.log(x); } return inner; }

  • Example of hoisting: console.log(x); var x = 5; // outputs undefined

Add your answer

Q60. How DLP works? Day to day roles and responsibilities?

Add your answer

Q61. Write test cases on water bottle.

Ans.

Test cases for water bottle

  • Check for leaks when filled with water

  • Test the durability of the bottle by dropping it from different heights

  • Check if the cap is tight enough to prevent spills

  • Test the temperature retention capabilities of the bottle

  • Check if the bottle is easy to clean and maintain

Add your answer

Q62. How to reverse a string?

Ans.

To reverse a string, iterate through the string and append each character to a new string in reverse order.

  • Create an empty string to store the reversed string

  • Iterate through the original string from the end to the beginning

  • Append each character to the new string

  • Return the new string

Add your answer

Q63. What is the performance testing

Ans.

Performance testing is the process of testing the speed, responsiveness, and stability of a software application under various conditions.

  • Measures the speed, responsiveness, and stability of an application

  • Helps identify bottlenecks and areas for improvement

  • Involves simulating real-world usage scenarios

  • Can include load testing, stress testing, and scalability testing

  • Ensures the application meets performance requirements

Add your answer

Q64. what is polymorphism ?

Ans.

Polymorphism is the ability of a function or method to behave differently based on the object it is acting upon.

  • Polymorphism allows objects of different classes to be treated as objects of a common superclass.

  • There are two types of polymorphism: compile-time (method overloading) and runtime (method overriding).

  • Example: Animal class with methods like eat() can be inherited by classes like Dog and Cat, which can override the eat() method.

Add your answer

Q65. How to check the IP of windows machine?

Ans.

To check the IP of a Windows machine, you can use the command prompt or the network and sharing center.

  • Open Command Prompt and type 'ipconfig' to view the IP address of the machine.

  • Alternatively, go to Control Panel > Network and Sharing Center > Change adapter settings > Right-click on the network connection > Status > Details to find the IP address.

  • You can also use the 'ipconfig /all' command in Command Prompt to view more detailed network information.

Add your answer

Q66. Do you know anything about patching?

Ans.

Patching is the process of updating or fixing software to address security vulnerabilities or bugs.

  • Patching involves applying updates or fixes to software to improve functionality or security.

  • Patch management is important to ensure systems are up to date and secure.

  • Examples of patching include installing Windows updates or updating antivirus definitions.

Add your answer

Q67. Cloud architecture on Iaas, Paas and agentless services.

Ans.

Cloud architecture involves IaaS, PaaS, and agentless services for efficient and scalable solutions.

  • IaaS (Infrastructure as a Service) provides virtualized computing resources over the internet.

  • PaaS (Platform as a Service) offers a platform allowing customers to develop, run, and manage applications without dealing with infrastructure.

  • Agentless services do not require the installation of agents on the target systems, reducing complexity and overhead.

  • Examples: AWS (IaaS), Goog...read more

Add your answer

Q68. How many materics we are you use

Ans.

I use a variety of metrics to track production efficiency and quality.

  • I use metrics such as OEE (Overall Equipment Efficiency), cycle time, downtime, scrap rate, and yield.

  • These metrics help me identify areas for improvement and track the success of implemented changes.

  • For example, I may use OEE to measure the overall effectiveness of a production line, while cycle time helps me understand the time it takes to complete a specific task.

Add your answer

Q69. How to open Active directory using cmd

Ans.

You can open Active Directory using cmd by running the 'dsa.msc' command.

  • Open Command Prompt as an administrator

  • Type 'dsa.msc' and press Enter

  • Active Directory Users and Computers window will open

Add your answer

Q70. What is DHCP,DNS?

Ans.

DHCP is a protocol that assigns IP addresses to devices on a network. DNS is a system that translates domain names to IP addresses.

  • DHCP stands for Dynamic Host Configuration Protocol

  • DHCP assigns IP addresses to devices on a network

  • DNS stands for Domain Name System

  • DNS translates domain names to IP addresses

  • DNS is used to access websites and other resources on the internet

Add your answer

Q71. Difference between Domain and workgroup???

Ans.

Domain is a centralized network where computers are managed by a server, while workgroup is a decentralized network where computers are managed individually.

  • Domain is managed by a domain controller server, while workgroup has no centralized server.

  • Domain allows for centralized management of user accounts, security policies, and resources, while workgroup does not.

  • Domain allows for easier scalability and security, while workgroup is more suitable for small networks with fewer ...read more

Add your answer

Q72. Explain the Design Patters you worked

Ans.

I have worked with several design patterns including Singleton, Factory, Observer, and Decorator.

  • Implemented Singleton pattern to ensure only one instance of a class is created.

  • Used Factory pattern to create objects without exposing the instantiation logic to the client.

  • Implemented Observer pattern to notify dependent objects of any state changes.

  • Used Decorator pattern to add functionality to an object dynamically without changing its structure.

Add your answer

Q73. Write a pyspark code to create dataframe from multiple list.

Add your answer

Q74. 1. Check all the permutations of palindrome in an array

Ans.

Find all permutations of palindromes in an array of strings.

  • Iterate through each string in the array.

  • For each string, generate all possible permutations.

  • Check if each permutation is a palindrome.

  • Return the list of palindromic permutations.

Add your answer

Q75. What is Neural Network.

Ans.

Neural network is a type of machine learning algorithm inspired by the human brain, consisting of interconnected nodes that process information.

  • Neural network is composed of layers of nodes, each connected to nodes in the next layer.

  • Nodes in a neural network perform mathematical operations on input data and pass the result to the next layer.

  • Neural networks are trained using labeled data to adjust the weights of connections between nodes.

  • Common types of neural networks include...read more

Add your answer

Q76. Explain the ASP.Net Core Middleware

Ans.

ASP.Net Core Middleware is a pipeline that handles requests and responses.

  • Middleware is a series of components that handle requests and responses in a pipeline

  • Each middleware component can modify the request or response

  • Middleware can be added to the pipeline using the Use() method

  • Examples of middleware include authentication, logging, and routing

Add your answer

Q77. why we need ood ?

Ans.

OOD (Object-Oriented Design) is essential for creating modular, reusable, and maintainable software systems.

  • OOD helps in organizing code into manageable components

  • Encourages code reusability through inheritance and polymorphism

  • Facilitates easier maintenance and updates

  • Promotes scalability and flexibility in software development

  • Enables better collaboration among team members

Add your answer

Q78. How you manage new startup?

Ans.

I manage new startups by creating a clear plan, setting achievable goals, and providing support and guidance to the team.

  • Develop a comprehensive business plan

  • Set realistic goals and milestones

  • Provide support and guidance to the team

  • Monitor progress and adjust strategies as needed

  • Build strong relationships with customers and partners

  • Stay up-to-date with industry trends and best practices

Add your answer

Q79. Deep technical level of troubleshooting on cloud.

Ans.

Deep technical troubleshooting on cloud involves identifying and resolving complex issues within cloud infrastructure.

  • Understand the architecture and components of the cloud platform being used

  • Utilize monitoring and logging tools to identify issues

  • Analyze system performance metrics to pinpoint potential bottlenecks

  • Use debugging tools and techniques to troubleshoot code or configuration issues

  • Collaborate with cross-functional teams to resolve complex issues

Add your answer

Q80. What are kotlin scope functions?

Ans.

Kotlin scope functions are functions that allow concise code block execution on an object.

  • Kotlin scope functions include let, run, with, apply, and also.

  • They are used to simplify code and avoid repetitive variable references.

  • For example, 'with' can be used to execute multiple operations on an object without repeating its name.

  • Similarly, 'apply' can be used to initialize an object's properties without repeating its name.

  • Each function has a specific use case and can be chosen b...read more

Add your answer

Q81. Program - Convert integer into structure.

Ans.

Convert integer into structure in C programming.

  • Define a structure with the required fields.

  • Create a variable of the structure type.

  • Assign the integer value to the appropriate field of the structure.

Add your answer

Q82. Explain the Solid Design Pattern

Ans.

Solid Design Pattern is a set of principles for writing maintainable and scalable code.

  • S - Single Responsibility Principle

  • O - Open/Closed Principle

  • L - Liskov Substitution Principle

  • I - Interface Segregation Principle

  • D - Dependency Inversion Principle

Add your answer

Q83. How does Dns and DHCP work

Ans.

DNS translates domain names to IP addresses, while DHCP assigns IP addresses to devices on a network.

  • DNS resolves domain names to IP addresses through a process of querying authoritative name servers.

  • DHCP dynamically assigns IP addresses to devices on a network, along with other network configuration parameters.

  • DNS uses a hierarchical system of domain name servers to efficiently resolve domain names.

  • DHCP servers lease IP addresses to devices for a specific period of time, ens...read more

Add your answer

Q84. Explain Room Persistence Library.

Ans.

Room is an abstraction layer over SQLite to allow for more robust database access while harnessing the full power of SQLite.

  • Room is a part of Android Architecture Components.

  • It provides compile-time verification of SQL queries.

  • It simplifies database operations by eliminating boilerplate code.

  • It supports LiveData and RxJava for reactive programming.

  • It allows for easy migration of database schema.

  • It provides a clean API for database transactions.

  • It supports relationships betwee...read more

Add your answer

Q85. write sorting algorithm ?

Ans.

A sorting algorithm is a method used to arrange elements in a specific order.

  • Common sorting algorithms include Bubble Sort, Selection Sort, Insertion Sort, Merge Sort, Quick Sort, and Heap Sort.

  • Bubble Sort compares adjacent elements and swaps them if they are in the wrong order.

  • Merge Sort divides the array into two halves, sorts them separately, and then merges them back together.

  • Quick Sort picks a pivot element and partitions the array around the pivot.

  • Heap Sort builds a max...read more

Add your answer

Q86. Difference between 32bit and 64 bit?

Ans.

32-bit and 64-bit refer to the size of the data types that a processor can handle.

  • 32-bit processors can handle data in 32-bit chunks, while 64-bit processors can handle data in 64-bit chunks.

  • 64-bit processors can access more memory than 32-bit processors (up to 18.4 million TB compared to 4 GB).

  • 64-bit processors can perform more calculations per second than 32-bit processors.

  • 64-bit processors are more efficient for handling large datasets and complex calculations.

  • Most modern ...read more

Add your answer

Q87. How to add image in image tag

Ans.

To add an image in an image tag, use the 'src' attribute and provide the image file path.

  • Use the tag to display an image on a web page

  • Add the 'src' attribute to specify the image file path

  • Optionally, add the 'alt' attribute to provide alternative text for the image

  • Example: A beautiful sunset

Add your answer

Q88. Write a code print triangle pattern

Ans.

Print triangle pattern using nested loops

  • Use nested loops to iterate through rows and columns

  • Incrementally increase the number of stars printed in each row

  • Example: for a triangle with 5 rows, the pattern would be like: ['*', '**', '***', '****', '*****']

Add your answer

Q89. Explain about point to point VPN

Ans.

Point to point VPN is a secure connection between two devices or networks over the internet.

  • Point to point VPN creates a secure tunnel between two specific endpoints.

  • It encrypts data to ensure privacy and security during transmission.

  • Common examples include site-to-site VPNs connecting branch offices and remote access VPNs for individual users.

  • Point to point VPNs are commonly used in businesses to securely connect remote offices or employees.

  • They provide a secure way to acces...read more

Add your answer

Q90. What is react and benifit?

Ans.

React is a JavaScript library for building user interfaces.

  • React allows for reusable UI components

  • It uses a virtual DOM for efficient updates

  • React is declarative, making it easier to understand and debug code

  • It has a large and active community with many resources available

  • React can be used for both web and mobile app development

Add your answer

Q91. What is linked list

Ans.

A linked list is a data structure where each element points to the next element in the sequence.

  • Consists of nodes where each node contains data and a reference to the next node

  • Can be singly linked (each node points to the next) or doubly linked (each node points to the next and previous)

  • Allows for dynamic size and efficient insertion/deletion operations

  • Example: 1 -> 2 -> 3 -> null

Add your answer

Q92. Write a Builder class.

Ans.

A Builder class is used to create objects with a large number of optional parameters.

  • Builder class is a creational design pattern.

  • It separates the construction of a complex object from its representation.

  • It allows you to create different variations of an object while avoiding constructor pollution.

  • It has a fluent interface that allows you to chain method calls together.

  • Example: StringBuilder in Java.

Add your answer

Q93. Explain - Coroutin, RxJava

Ans.

Coroutines and RxJava are both used for asynchronous programming in Android development.

  • Coroutines are a lightweight solution for asynchronous programming that allow for easy cancellation and error handling.

  • RxJava is a reactive programming library that uses Observables and Observers to handle asynchronous events.

  • Both Coroutines and RxJava can be used to simplify complex asynchronous code and improve app performance.

  • Coroutines are built into Kotlin, while RxJava requires an ad...read more

Add your answer

Q94. Architecture of the application

Ans.

The application follows a microservices architecture with a front-end layer, API layer, and multiple backend services.

  • The front-end layer is built using React and communicates with the API layer through RESTful APIs.

  • The API layer is built using Node.js and Express.js and acts as a gateway for all the backend services.

  • The backend services are built using different technologies like Java, Python, and Go and communicate with each other through message queues.

  • The application uses...read more

Add your answer

Q95. explain types of normalization ?

Ans.

Normalization is a process used to organize a database into tables and columns to reduce redundancy and improve data integrity.

  • 1. First Normal Form (1NF) - Eliminates duplicate data by ensuring each column contains atomic values.

  • 2. Second Normal Form (2NF) - Requires 1NF and ensures that non-key attributes are fully functional dependent on the primary key.

  • 3. Third Normal Form (3NF) - Requires 2NF and eliminates transitive dependencies by removing columns that are not dependen...read more

Add your answer

Q96. What is accrual accounting ?

Ans.

Accrual accounting is a method of accounting where revenues and expenses are recorded when they are earned or incurred, regardless of when cash is exchanged.

  • Revenue is recognized when it is earned, not necessarily when cash is received

  • Expenses are recorded when they are incurred, not necessarily when they are paid

  • Accrual accounting provides a more accurate picture of a company's financial position and performance over time

  • It follows the matching principle, where revenues are ...read more

Add your answer

Q97. What you treat prepayment ?

Ans.

Prepayment is an advance payment made for goods or services before they are received or delivered.

  • Prepayment is recorded as an asset on the balance sheet until the goods or services are received or delivered.

  • Once the goods or services are received or delivered, the prepayment is then recognized as an expense on the income statement.

  • Examples of prepayments include rent paid in advance, insurance premiums, and subscription fees.

Add your answer

Q98. What is framework?

Ans.

A framework is a software platform that provides a foundation for developing applications.

  • A framework is a reusable set of libraries, tools, and components that help developers build applications more efficiently.

  • It provides a structure and guidelines for developing software, including predefined functions and classes.

  • Frameworks often include features like data handling, user interface components, and integration with other systems.

  • Examples of popular frameworks include Angul...read more

View 1 answer

Q99. 3. Swap numbers using bit operators

Ans.

Swapping numbers using bit operators.

  • Use XOR operator to swap two numbers without using a temporary variable

  • XORing a number with itself results in 0

  • Example: a = 5, b = 7. a ^= b; b ^= a; a ^= b; // a = 7, b = 5

Add your answer

Q100. Tell your stength and weakness

Ans.

Strength: Strong leadership skills, Weakness: Difficulty delegating tasks

  • Strength: Ability to motivate and inspire team members

  • Strength: Excellent problem-solving skills

  • Weakness: Tendency to take on too much responsibility

  • Weakness: Struggle to trust others to complete tasks to my standards

Add your answer
1
2
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos

Interview Process at null

based on 98 interviews in the last 1 year
Interview experience
3.9
Good
View more
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Interview Questions from Similar Companies

3.8
 • 386 Interview Questions
4.0
 • 384 Interview Questions
4.0
 • 242 Interview Questions
4.2
 • 149 Interview Questions
4.1
 • 137 Interview Questions
4.3
 • 131 Interview Questions
View all
Top HARMAN Interview Questions And Answers
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
70 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions
Get AmbitionBox app

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter