HCL Group
200+ PayPal Interview Questions and Answers
Q1. Monitoring tools and what metrics we capture during or after testing
Monitoring tools and metrics for testing
We use tools like Nagios, Zabbix, and Prometheus for monitoring
Metrics captured include response time, error rate, CPU usage, memory usage, and network traffic
We also capture user behavior metrics like click-through rate and conversion rate
Monitoring helps us identify issues and optimize performance
Q2. As Tomcat is the default server in Spring Boot, how would you add a new server?
To add a new server in Spring Boot, you need to exclude the default Tomcat dependency and add the desired server dependency.
Exclude the Tomcat dependency in the pom.xml file
Add the desired server dependency in the pom.xml file
Configure the server properties in the application.properties or application.yml file
Q3. Convert following for loop into while loop for (i=0; i>n; i++) { …. ….. } ?
Q4. The data drive D : on a Windows server 2016 is running short on disk space? What is an unique feature to this server that allows the drive to retain disk space?
The unique feature is Data Deduplication.
Data Deduplication is a feature in Windows Server 2016 that identifies and eliminates duplicate data on a volume.
It helps to optimize storage utilization by storing only one copy of identical data.
This feature can significantly reduce the amount of disk space used by the data drive.
For example, if there are multiple copies of the same file on the drive, Data Deduplication will store only one copy and create pointers to it.
This allows t...read more
Q5. How can you check if a string is not null without string != null?
Checking if a string is not null without using string != null.
Use string.IsNullOrEmpty() method
Use string.IsNullOrWhiteSpace() method
Use string.Compare() method to compare with an empty string
Use string.Length property to check if length is greater than 0
Q6. What is the difference between Pure pipe and impure pipe?
Pure pipes are stateless and only depend on input data, while impure pipes have internal state and can have side effects.
Pure pipes are faster and more efficient than impure pipes.
Pure pipes are used for simple transformations of data, while impure pipes are used for more complex transformations.
Examples of pure pipes include currency and date formatting, while examples of impure pipes include filtering and sorting.
To mark a pipe as pure, add the @Pipe({pure: true}) decorator...read more
Q7. What is the run time setting parameters?
Run time setting parameters are values that can be set during test execution to control the behavior of the test.
Run time setting parameters are used to modify the behavior of the test during execution.
They can be used to simulate different user loads, network conditions, and other variables.
Examples include setting the number of virtual users, the duration of the test, and the think time between requests.
Q8. Operator overloading happens at run time or compilation time (and compilation) ?
Operator overloading happens at compilation time.
Operator overloading is a compile-time feature in programming languages.
It allows operators to be redefined for user-defined types.
The compiler resolves the overloaded operator at compile time based on the types involved.
The implementation of the operator is determined during compilation.
The compiled code then uses the appropriate operator implementation at runtime.
Q9. What is transformer and transformer effect
A transformer is an electrical device that transfers electrical energy from one circuit to another through electromagnetic induction.
Transformers are used to increase or decrease the voltage of an alternating current (AC) power supply.
They consist of two coils of wire, called the primary and secondary coils, wrapped around a magnetic core.
When an AC voltage is applied to the primary coil, it creates a magnetic field that induces a voltage in the secondary coil.
The transformer...read more
Q10. What is the difference between a disk and an image in VM roles w.r.t MS Azure?
A disk in VM roles is a storage device used to store data, while an image is a template used to create virtual machines.
A disk is a block-level storage device that can be attached to a virtual machine to store data.
An image is a template that contains the operating system and other software configurations used to create virtual machines.
Disks can be created from images or used as a standalone storage device.
Images are used to create multiple virtual machines with the same con...read more
Q11. Do you know about conjur, CCP, ASAP, CP implementaiton?
Yes, I am familiar with conjur, CCP, ASAP, and CP implementation in the context of consulting.
Conjur is a security service that provides centralized authentication and authorization for applications and services.
CCP stands for Cloud Control Plane, which is a centralized platform for managing cloud resources.
ASAP refers to As Soon As Possible, which may indicate a sense of urgency in project implementation.
CP implementation could refer to Continuous Process Improvement, a meth...read more
Q12. How the oracle type accounts can be configured in CPM?
Oracle type accounts can be configured in CPM by setting up the necessary permissions and access controls.
Create a new user account in Oracle with the appropriate permissions for CPM access
Assign the user account to the CPM application role
Configure the user account settings in CPM to define access levels and restrictions
Q13. how to check logs perticular time and send report client
To check logs at a particular time and send a report to the client, use the 'grep' command and a cron job.
Use the 'grep' command to search for logs at a specific time.
Create a cron job to run the 'grep' command at the desired time.
Use a script to format the log data and send it to the client.
Consider using a tool like Logwatch or Logrotate for automated log management.
Q14. What is the different between Think time and Pacing
Think time is the time taken by a user to think and perform an action, while pacing is the time interval between two consecutive user actions.
Think time is the time taken by a user to read and understand the content on the screen before performing an action.
Pacing is the time interval between two consecutive user actions, which is used to simulate real-world user behavior.
Think time is used to simulate the time taken by a user to think and perform an action, while pacing is u...read more
Q15. What the process of Non functional testing ? Process?
Non-functional testing is the process of testing the performance, reliability, and usability of a system.
Identify the non-functional requirements
Design test scenarios and test cases
Execute tests and collect data
Analyze the results and report findings
Repeat the process until the system meets the non-functional requirements
Q16. What is DSP (Demand Side Platform) and SSP ( Sell side platform?
DSP is a platform used by advertisers to purchase ad inventory, while SSP is a platform used by publishers to sell ad space.
DSP allows advertisers to manage and optimize their ad campaigns across multiple ad exchanges and networks.
SSP helps publishers maximize their revenue by connecting with multiple ad networks and demand sources.
DSPs use data and algorithms to target specific audiences, while SSPs help publishers manage and sell their ad inventory.
Examples of DSPs include ...read more
Q17. What's Ad Operations and what is digital ad Operations?
Ad Operations involves managing the process of delivering online advertisements to target audiences.
Ad Operations involves tasks such as ad trafficking, campaign optimization, and reporting.
Digital Ad Operations specifically refers to the management of online advertising campaigns across various digital platforms.
It includes tasks like setting up ad campaigns, monitoring performance metrics, and troubleshooting technical issues.
Ad Operations professionals work closely with ad...read more
Q18. What is the diff btwn static tile and dynamic tile?
Static tiles are fixed and display static content while dynamic tiles display real-time data.
Static tiles are pre-defined and do not change their content unless manually updated
Dynamic tiles display real-time data and can be configured to refresh at specific intervals
Static tiles are useful for displaying static information like company logo or contact details
Dynamic tiles are useful for displaying real-time data like stock prices or weather updates
Q19. What the different b/w Test plan and RTM?
Test plan is a document that outlines the testing strategy while RTM is a document that maps requirements to test cases.
Test plan outlines the scope, objectives, resources, and schedule of testing.
RTM maps the requirements to test cases to ensure all requirements are covered.
Test plan is created before testing begins while RTM is created during testing.
Test plan is a high-level document while RTM is a detailed document.
Test plan is used to guide the testing process while RTM ...read more
Q20. What is the challenge your facing while scripting?
The challenge I am facing while scripting is identifying and handling dynamic elements.
Dynamic elements such as timestamps and session IDs require unique handling
Identifying and correlating dynamic values across multiple requests can be time-consuming
Using regular expressions and functions can help in handling dynamic elements
Q21. 1. What is resolvers in angular 2. Difference between canActivated and CanGuard route guards in angular 3. How to create custom decorators 4. what is use of ngOnInit 3. How to make asynchronous method to synchr...
read moreResolvers in Angular are used to fetch data before the component is loaded, canActivate guards control access to routes, custom decorators can be created using @Decorator syntax, ngOnInit is a lifecycle hook in Angular, asynchronous methods can be made synchronous using async/await, cancellation tokens are used to cancel asynchronous operations.
Resolvers in Angular are used to fetch data before the component is loaded, ensuring that the component has the necessary data when i...read more
Q22. Share the screen and show how to implement DIP in .net core
Implementing DIP in .NET Core
Create an interface for the dependency
Implement the interface in a separate class
Inject the dependency into the consuming class
Use dependency injection container to resolve dependencies
Q23. data demo; set demo1; where age<14; where weight>80; run: what is the mistake in this code? kind of this question not the same one
The code has two 'where' statements which is not allowed in SAS.
Remove one of the 'where' statements to correct the code.
Combine the conditions using 'and' or 'or' operators if both conditions need to be applied.
Q24. What is the difference between Observable and promise ?
Observables are streams of data that can be subscribed to, while promises are a one-time operation that returns a single value.
Observables can emit multiple values over time, while promises only return a single value.
Observables can be cancelled, while promises cannot.
Observables are lazy, meaning they only execute when subscribed to, while promises execute immediately.
Observables have operators that can transform, filter, and combine data, while promises do not.
Observables a...read more
Q25. How to add list of employees using stream and using Lambda expression
Adding list of employees using stream and Lambda expression
Create a list of employees as an array of strings
Use the stream() method to convert the array into a stream
Use the forEach() method to iterate through the stream and add each employee to the list
Use a Lambda expression to add each employee to the list
Q26. 1. Explain cloud 2. Have you performed any activity in the cloud 3. How many public cloud players are there
Cloud is a network of remote servers that store, manage, and process data.
Cloud computing allows users to access data and applications from anywhere with an internet connection
Examples of cloud services include AWS, Azure, Google Cloud, and Dropbox
Cloud architecture involves designing and managing cloud infrastructure for optimal performance and security
Q27. Have you heard about DoubleClick for Publishers and Ad Exchange?
Yes, DoubleClick for Publishers (DFP) is an ad server platform for managing digital ad campaigns, while Ad Exchange is a real-time marketplace for buying and selling ad space.
DFP is used by publishers to manage and optimize their ad inventory
Ad Exchange allows advertisers to bid on ad space in real-time auctions
Both platforms are owned by Google and are commonly used in digital advertising
Q28. Is DoubleClick for Publisher an example of SSP or DSP?
DoubleClick for Publisher is an example of SSP (Supply-Side Platform).
DoubleClick for Publisher is a tool used by publishers to manage and optimize their ad inventory.
SSPs (Supply-Side Platforms) help publishers maximize their ad revenue by connecting them with multiple ad networks and exchanges.
DSPs (Demand-Side Platforms) are used by advertisers to purchase ad inventory from publishers.
Examples of SSPs include Google Ad Manager (formerly DoubleClick for Publishers), Rubicon...read more
Q29. Details of DCM and DEM modules of AUTOSAR
DCM and DEM are modules in AUTOSAR for diagnostic communication and error management.
DCM (Diagnostic Communication Manager) module handles communication between the diagnostic tester and the vehicle's ECUs.
DCM provides services for diagnostic communication such as reading and clearing diagnostic trouble codes (DTCs), accessing ECU data, and performing diagnostic routines.
DEM (Diagnostic Event Manager) module manages and reports diagnostic events and errors within the vehicle'...read more
Q30. What are the supervisory functions why would we call them as supervisory function
Supervisory functions are tasks related to managing and overseeing the work of others in a team or organization.
Supervisory functions include planning, organizing, staffing, directing, and controlling.
These functions are called supervisory because they involve overseeing and managing the work of subordinates.
Examples of supervisory functions in a clinical SAS programming role include assigning tasks to team members, monitoring progress, and providing guidance and feedback.
Sup...read more
Q31. In DM what kind of information will stored and what are the variables we have in DM
In DM, information related to study subjects, visits, assessments, and other clinical trial data is stored. Variables include subject ID, visit number, date/time, and results.
DM stands for Data Management in clinical trials
Information stored includes subject demographics, study visits, lab results, adverse events, etc.
Variables in DM can include subject ID, visit number, date/time, results, treatment group, etc.
Example: Subject ID - 001, Visit Number - 1, Date - 01/01/2022, L...read more
Q32. What is the use of Interceptor in angular?
Interceptors are used to intercept HTTP requests and responses to perform transformations or error handling.
Interceptors can be used to add headers to outgoing requests or handle errors in incoming responses.
They can also be used to modify the request or response before it is sent or received.
Interceptors can be global or specific to a certain request or response.
They are useful for implementing authentication, caching, or logging in an application.
Example: Adding an authoriz...read more
Q33. Code test- Find within an array of numbers a pair of numbers which equals a passed target number
Code test to find a pair of numbers in an array that equals a target number.
Loop through the array and check if the difference between the target and current number exists in the array.
Use a hash table to store the numbers and their indices for faster lookup.
Sort the array and use two pointers to find the pair.
Q34. Explain about the fouls and rules of the sport
The question is not related to the medical field.
Fouls and rules vary depending on the sport being referred to.
Common fouls include tripping, holding, and illegal contact.
Rules are in place to ensure fair play and safety of the participants.
Examples of sport-specific fouls and rules can be provided if the sport is specified.
Q35. Challenges in performance testing
Performance testing challenges include identifying bottlenecks, simulating real-world scenarios, and analyzing results.
Identifying bottlenecks in the system
Simulating real-world scenarios to accurately test performance
Analyzing results to identify areas for improvement
Ensuring test environment is representative of production environment
Managing test data and test scripts
Dealing with network latency and other external factors
Ensuring tests are repeatable and consistent
Balancin...read more
Q36. What are the parameter in result table?
Parameters in result table are the values that are measured during performance testing.
Parameters can include response time, throughput, error rate, and resource utilization.
These values are used to analyze the performance of the system under test.
They can be compared against performance requirements or industry benchmarks.
Parameter values can be displayed in graphs or charts for easy analysis.
Examples of parameter values include average response time, maximum throughput, and...read more
Q37. What is the threshold for suspens account of your current company
The threshold for suspending accounts varies based on the severity of the violation.
Suspension threshold depends on violation severity
No fixed threshold
Examples: fraud, harassment, repeated policy violations
Q38. What GD and T What are material you are taking Kind of weldments Mmc and lmc Cad test must Earlier experience related questions mostly Basic calculations for weldments Sheet metals related
Geometric Dimensioning and Tolerancing (GD&T) is a system for defining and communicating engineering tolerances. It is essential for design engineers to understand GD&T for accurate manufacturing.
GD&T is used to specify the allowable variations in form, size, and orientation of features on a part.
Materials selection is crucial for design engineers to ensure the desired mechanical properties, corrosion resistance, and cost-effectiveness of the final product.
Different types of ...read more
Q39. Where to list down the Open Action Items for a specific project.
Open Action Items for a specific project can be listed down in a project management tool or software.
Use project management software like Asana, Trello, or Jira to list down Open Action Items.
Create a specific section or board within the software dedicated to Open Action Items for the project.
Assign responsible team members to each Action Item and set deadlines for completion.
Regularly update and track the progress of each Action Item to ensure timely completion.
Q40. What is class and can we assign multiple classes to functional locations
Classes are used to group similar objects together. Yes, multiple classes can be assigned to functional locations.
Classes are used to categorize objects based on their characteristics
Multiple classes can be assigned to functional locations to group them based on different criteria
Classes can be used for reporting and analysis purposes
Examples of classes for functional locations could be based on location, equipment type, or maintenance requirements
Q41. Convert a List of employees into a Map of Employees with ID as the key.
Convert a List of employees into a Map of Employees with ID as the key.
Create an empty Map
Iterate through the List of employees
For each employee, add a key-value pair to the Map with ID as key and employee object as value
Q42. How to make database in secondary node of always on as Readable
To make a database in the secondary node of Always On as Readable, you need to configure it for read-only access.
Configure the secondary database for read-only access in the Always On Availability Group settings
Set the secondary database to read-only mode using T-SQL commands
Ensure that the secondary replica is synchronized with the primary replica for data consistency
Q43. How will you find the issue and fix if it's in production server
To find and fix issues in production server, I would follow a systematic approach.
Start by gathering information about the issue, such as error logs, user reports, and system metrics.
Reproduce the issue in a controlled environment to understand its root cause.
Analyze the codebase and review recent changes to identify potential causes.
Implement temporary fixes or workarounds to mitigate the impact on users.
Test the fixes thoroughly in a staging environment before deploying to ...read more
Q44. What are links tell me about linux linux permission
Links are pointers to files or directories. Linux permissions control access to files and directories.
Links can be hard links or symbolic links
Hard links point directly to the file's inode
Symbolic links point to the file's path
Linux permissions are divided into three categories: owner, group, and others
Each category has three types of permissions: read, write, and execute
Permissions can be set using chmod command
Q45. How the replication done in DR?
Replication in DR involves copying data from primary site to secondary site for disaster recovery purposes.
Replication can be synchronous or asynchronous
Data is typically replicated using technologies like storage replication, database replication, or log shipping
Replication ensures data consistency and availability in case of a disaster
Examples include using tools like Veeam, Zerto, or native database replication features
Q46. What is difference between Historical Metrics and real time metrics?
Historical metrics are data collected over a period of time, while real-time metrics are collected and displayed instantly.
Historical metrics are used for trend analysis and long-term planning.
Real-time metrics are used for immediate monitoring and decision-making.
Examples: Historical metrics could include monthly sales data, while real-time metrics could include website traffic in the last hour.
Q47. How to show whole table in SQL?
Use SELECT * FROM table_name to show whole table in SQL.
Use SELECT * FROM table_name to retrieve all columns and rows from a table.
Replace table_name with the actual name of the table you want to display.
Make sure you have the necessary permissions to access the table.
Q48. what is linux and what is difference between unix and linux
Linux is an open-source operating system based on Unix. Unix is a family of multitasking, multiuser computer operating systems.
Linux is open-source and free to use, while Unix is proprietary and usually requires a license.
Linux has a larger community and more distributions (e.g. Ubuntu, CentOS), while Unix has fewer variations (e.g. Solaris, AIX).
Linux is more customizable and can run on a wider range of hardware, while Unix is more stable and secure.
Linux uses the GNU Genera...read more
Q49. usecase of OOPS in programing and define OOPS pillars
OOPS is a programming paradigm that uses objects and classes to design and build applications.
Encapsulation: Bundling data and methods that operate on the data into a single unit (class)
Inheritance: Ability to create new classes based on existing classes, promoting code reusability
Polymorphism: Ability for objects to be treated as instances of their parent class, allowing for flexibility in method implementation
Q50. SQL to find second highest salary
SQL query to find the second highest salary.
Use the SELECT statement to retrieve the salary column from the employee table.
Use the ORDER BY clause to sort the salaries in descending order.
Use the LIMIT clause to limit the result set to the second row.
Use the OFFSET clause to skip the first row.
Combine all the clauses to get the second highest salary.
Q51. What are compile and run time polymorphism
Compile time polymorphism is achieved through function overloading and templates, while run time polymorphism is achieved through virtual functions and inheritance.
Compile time polymorphism is resolved at compile time, while run time polymorphism is resolved at run time.
Function overloading is an example of compile time polymorphism, where multiple functions with the same name but different parameters are defined.
Templates are another example of compile time polymorphism, whe...read more
Q52. Ikev1 vs ikev2 and where will you use ikev1 over ikev2
IKEv1 is an older version of the Internet Key Exchange protocol, while IKEv2 is a newer version with improved security features.
IKEv1 is less secure compared to IKEv2 due to its outdated encryption algorithms.
IKEv2 supports more secure encryption algorithms and has built-in support for mobility and multi-homing.
IKEv1 may be used in legacy systems or environments where compatibility with older devices is required.
IKEv2 is recommended for modern networks and VPN deployments for...read more
Q53. What is the process of Agile?
Agile is an iterative and incremental approach to software development that emphasizes flexibility and customer satisfaction.
Agile involves breaking down the project into smaller, manageable chunks called sprints.
Each sprint involves planning, designing, coding, testing, and reviewing the work done.
The team works closely with the customer to ensure that the product meets their needs.
Agile encourages collaboration, communication, and continuous improvement.
Popular Agile method...read more
Q54. How to reverse string without using strRev
Reverse a string without using strRev function.
Create an empty string to store the reversed string.
Loop through the original string from the end to the beginning.
Append each character to the empty string.
Return the reversed string.
Alternatively, convert the string to an array of characters, reverse the array, and then join the characters back into a string.
Q55. x=1+.+2+7 y=sum(1,.,2,7) have to explain what the difference is above two codes working
The first code calculates the sum of 1, 2, and 7 separately, while the second code calculates the sum of 1, 2, and 7 as a whole.
Code x=1+.+2+7 calculates the sum of individual numbers (1, 2, 7) separately.
Code y=sum(1,.,2,7) calculates the sum of all numbers (1, 2, 7) together.
The first code will result in x=1+2+7=10, while the second code will result in y=1+2+7=10.
Q56. How many telecommunication products are here in these room
There are three telecommunication products in the room.
Three telecommunication products are present in the room
Examples include smartphones, landline phones, and routers
Q57. Tell me about Architecture of Tableau?
Tableau follows a client-server architecture with a three-tier structure.
Tableau Desktop is the client application used for creating and publishing content.
Tableau Server is the central server that manages user authentication, data sources, and content distribution.
Tableau Online is a cloud-based version of Tableau Server.
Tableau's three-tier structure includes the data source, the VizQL server, and the application server.
Tableau's architecture allows for scalability and flex...read more
Q58. difference between interface and abstract class?
Interface is a contract that defines the methods a class must implement, while abstract class can have both abstract and concrete methods.
Interface can only have abstract methods and constants, while abstract class can have abstract and concrete methods.
A class can implement multiple interfaces but can only inherit from one abstract class.
Interfaces are used to achieve multiple inheritance in Java, while abstract classes are used to provide a common base for subclasses.
Exampl...read more
Q59. I. Why was need a company a data entry operator? 2 what is responsibility of data entry operator? 3. Which filed required data entry work?
Data entry operators are needed by companies to accurately input and manage large amounts of data.
Data entry operators are responsible for accurately inputting data into computer systems.
They may also be responsible for verifying the accuracy of data entered.
Fields such as healthcare, finance, retail, and logistics often require data entry work.
Data entry operators may also be responsible for organizing and maintaining databases.
Attention to detail and strong typing skills ar...read more
Q60. 3.Difference between viewbag,viewdata,tempdata
Difference between viewbag, viewdata, tempdata
ViewBag is a dynamic object used to pass data from controller to view
ViewData is a dictionary object used to pass data from controller to view
TempData is used to store data temporarily between two consecutive requests
ViewBag and ViewData are used for one-way communication while TempData is used for two-way communication
TempData is used to store data for redirection scenarios
Q61. What is cicd, what is different between container and pods
CI/CD stands for Continuous Integration/Continuous Deployment. Containers and pods are different concepts in containerization.
CI/CD is a software development practice that involves frequently integrating code changes and deploying them to production.
Containers are lightweight, isolated environments that package an application and its dependencies, providing consistency across different environments.
Pods are a higher-level concept in containerization that consist of one or mor...read more
Q62. What is the diff btwn == and ===?
The difference between == and === in JavaScript
The == operator compares values after type coercion
The === operator compares values without type coercion
Use === for strict equality checks
Use == for loose equality checks
Q63. What is Dependency Injection in Angular?
Dependency Injection is a design pattern used in Angular to inject dependencies into a component or service.
It allows for easier testing and maintenance of code
Dependencies are injected through the constructor of a component or service
Angular has its own Dependency Injection system built-in
Services can be shared across multiple components through Dependency Injection
Q64. What is synchronous motor
A synchronous motor is an AC motor that operates at a constant speed determined by the frequency of the power supply.
Synchronous motors have a rotor that rotates at the same speed as the rotating magnetic field in the stator.
They are commonly used in applications that require constant speed, such as industrial machinery and power generation.
Synchronous motors are more efficient than induction motors at full load.
They are often used in synchronous condensers to improve power f...read more
Q65. 1. "Java" == new String("Java") 2. What are extensions and extension points ? 3. What is the cause of OutOfMemoryException 4. What is complie time error and runtime error ?
Q66. What is linux what are the components of linux
Linux is an open-source operating system based on Unix. Its components include kernel, shell, GUI, utilities, and applications.
Kernel: manages hardware resources and provides services to other system components
Shell: provides a command-line interface for users to interact with the system
GUI: provides a graphical interface for users to interact with the system
Utilities: perform various system tasks such as file management, networking, and security
Applications: software program...read more
Q67. Types of LifeTime Scopes of Depedendy Injection Principle and UseCases
There are three types of LifeTime Scopes in Dependency Injection: Transient, Scoped, and Singleton.
Transient: Objects are created each time they are requested.
Scoped: Objects are created once per request.
Singleton: Objects are created only once and shared across the application.
Q68. What is indicator and advantages
An indicator is a device that shows the status or level of something. It has advantages like easy monitoring and quick identification of problems.
Indicators provide real-time information about the status or level of a process or system.
They help in monitoring and controlling the process or system.
Indicators can quickly identify problems or deviations from the desired level.
They are easy to use and require minimal training.
Examples of indicators include temperature gauges, fue...read more
Q69. How tech savy are you ? Do you know what is Microsoft authenticatie
Microsoft authentication is a security mechanism used to verify the identity of users accessing Microsoft services.
Microsoft authentication is used for accessing various Microsoft services such as Office 365, Azure, and Dynamics CRM.
It uses various authentication methods such as username and password, multi-factor authentication, and OAuth.
Microsoft authentication also supports integration with third-party identity providers such as Google and Facebook.
It provides a secure an...read more
Q70. Query to result second highest salary from Employee table
Query to find second highest salary from Employee table
Use ORDER BY and LIMIT to get the second highest salary
SELECT salary FROM Employee ORDER BY salary DESC LIMIT 1,1
If there are ties for the highest salary, this query will return the next distinct salary
Q71. Tell about Human resource management
Human resource management involves managing and developing employees to achieve organizational goals.
Recruiting and hiring employees
Training and development
Performance management
Compensation and benefits
Employee relations
Compliance with employment laws and regulations
Q72. How to connect to database using uft
Database connection in UFT can be established using ADO or ODBC.
Use ADO or ODBC connection string to connect to the database
Create a connection object and open the connection
Execute SQL queries using the connection object
Close the connection after use
Q73. What are compile and run time polytechnic
Compile time polymorphism is method overloading while runtime polymorphism is method overriding.
Compile time polymorphism is resolved at compile time while runtime polymorphism is resolved at runtime.
Method overloading is an example of compile time polymorphism where multiple methods have the same name but different parameters.
Method overriding is an example of runtime polymorphism where a subclass provides its own implementation of a method that is already defined in its sup...read more
Q74. what are different filters in tableau?
Different filters in Tableau include dimension filters, measure filters, top N filters, wildcard filters, and context filters.
Dimension filters allow users to filter data based on categorical variables.
Measure filters allow users to filter data based on numerical variables.
Top N filters allow users to filter data based on the top or bottom N values.
Wildcard filters allow users to filter data based on patterns or partial matches.
Context filters allow users to create a temporar...read more
Q75. How interface is implemented in java
Interfaces in Java are implemented using the 'implements' keyword, allowing classes to provide specific implementations for methods defined in the interface.
Interfaces in Java define a contract for classes to implement, specifying method signatures without implementations.
A class can implement multiple interfaces by separating them with commas.
Classes implementing an interface must provide concrete implementations for all methods defined in the interface.
Interfaces can also c...read more
Q76. React virtual dom, how it works
React virtual DOM is a lightweight copy of the actual DOM, which allows React to efficiently update and render components.
React creates a virtual DOM tree that mirrors the actual DOM.
When changes occur, React compares the virtual DOM with the previous version to identify the minimal updates needed.
React then updates the virtual DOM and efficiently applies the changes to the actual DOM.
This process helps in optimizing performance by reducing the number of direct manipulations ...read more
Q77. what is roolback patching
Rollback patching is a process of reverting a patch or update to a previous version.
Rollback patching is useful when a patch or update causes issues or conflicts with the system.
It involves undoing the changes made by the patch or update and restoring the system to its previous state.
Rollback patching can be done manually or automatically depending on the system and the patching process.
Examples of rollback patching tools include Windows System Restore and Linux's yum history...read more
Q78. what is cloud
Cloud is a network of remote servers that store, manage, and process data, accessible via the internet.
Cloud computing allows users to access and use computing resources on-demand.
Data is stored and processed on remote servers instead of local devices.
Examples of cloud services include Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform.
Q79. Which services you are using in AWS.
We are using multiple services in AWS.
We are using EC2 for hosting our application servers.
We are using S3 for storing our static files and backups.
We are using RDS for our database needs.
We are using CloudFront for content delivery.
We are using Lambda for serverless computing.
We are using Route 53 for DNS management.
We are using CloudWatch for monitoring and logging.
We are using IAM for access management.
We are using SES for email sending.
We are using SNS for push notificati...read more
Q80. What is geofencing? what is an API Integration?
Geofencing is a location-based service that uses GPS or RFID technology to create a virtual boundary around a physical location.
Geofencing is used to trigger actions or notifications when a device enters or exits a defined area.
API Integration is the process of connecting two or more applications to share data and functionality.
API Integration allows for seamless communication between different software systems.
Examples of API Integration include integrating a payment gateway...read more
Q81. What are the 7 functions of HR?
The 7 functions of HR include recruitment, training, performance management, employee relations, compensation and benefits, compliance, and HR strategy.
Recruitment: Attracting and hiring qualified candidates for open positions.
Training: Providing employees with the necessary skills and knowledge to perform their jobs effectively.
Performance management: Evaluating and improving employee performance through feedback and goal setting.
Employee relations: Managing relationships be...read more
Q82. How to read text from Excel file
To read text from Excel file, use a library like Apache POI or OpenCSV.
Use a library like Apache POI or OpenCSV to read Excel files
Identify the sheet and cell containing the text to be read
Extract the text using the appropriate method
Store the text in an array of strings
Q83. What is cloud computing What is sql And many more
Cloud computing is the delivery of computing services over the internet, including storage, databases, networking, software, and more.
Cloud computing allows users to access and use resources on-demand without the need for physical infrastructure.
Examples of cloud computing services include Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform.
SQL (Structured Query Language) is a programming language used to manage and manipulate relational databases.
SQL allows...read more
Q84. How directives are different from component
Directives are used to add behavior to existing DOM elements, while components are used to create new custom elements.
Directives are used to manipulate the behavior of existing DOM elements, such as changing their appearance or adding event listeners.
Components are used to create custom elements with their own templates, styles, and behavior.
Directives can be structural (like ngIf and ngFor) or attribute-based (like ngStyle and ngClass).
Components are always associated with a...read more
Q85. How to connect multiple database in spring boot ?
Use Spring Boot's support for multiple data sources to connect to multiple databases.
Define multiple DataSource beans in your configuration class.
Use @Primary annotation to specify the primary data source.
Use @Qualifier annotation to specify the secondary data source.
Configure the properties for each data source in application.properties file.
Use @EnableTransactionManagement annotation to enable transaction management for multiple data sources.
Q86. how to create repository
To create a repository, you need to choose a package manager and create a configuration file.
Choose a package manager like YUM or APT
Create a configuration file with repository details
Add packages to the repository
Sign the repository to ensure package integrity
Publish the repository for others to use
Q87. Difference between arraylist and linked list
ArrayList is resizable array implementation, LinkedList is doubly linked list implementation.
ArrayList uses dynamic array to store elements, LinkedList uses doubly linked list.
ArrayList is faster for accessing elements by index, LinkedList is faster for adding/removing elements.
Example: ArrayList
arrList = new ArrayList<>(); LinkedList linkedList = new LinkedList<>();
Q88. Troubleshooting steps for framework genesys
Troubleshooting steps for Genesys framework
Check if all required components are installed and configured properly
Verify if there are any errors or warnings in the logs
Check if the latest version of the framework is being used
Try restarting the framework and related services
If the issue persists, escalate to the vendor or community support for assistance
Q89. 2.State management techniques in asp.net
State management techniques in asp.net
ViewState - stores page-specific data in hidden fields
Session state - stores user-specific data on the server
Application state - stores application-wide data on the server
Cookies - stores small amounts of data on the client-side
Query strings - stores data in the URL
Cache - stores frequently accessed data on the server for faster access
Q90. Difference between ABstact Classes and Interface
Abstract classes can have both abstract and non-abstract methods, while interfaces can only have abstract methods.
Abstract classes can have constructors, fields, and methods, while interfaces cannot.
A class can only extend one abstract class, but it can implement multiple interfaces.
Abstract classes are used to define a common behavior for subclasses, while interfaces are used to define a contract for classes to implement.
An abstract class can have method implementations, whi...read more
Q91. Difference between project initiation phase and planning phase.
Project initiation phase focuses on defining the project at a high level, while planning phase involves detailed planning and scheduling.
Initiation phase involves identifying project objectives, stakeholders, and high-level scope.
Planning phase includes creating a detailed project plan, defining tasks, resources, and timelines.
Initiation phase sets the foundation for the project, while planning phase lays out the roadmap for execution.
Initiation phase may involve creating a p...read more
Q92. Sort a following array without array operation
Sort an array without using array operation
Use a sorting algorithm like bubble sort, insertion sort, or selection sort
Implement the algorithm using loops and conditional statements
Make sure to compare and swap elements in the array to sort it correctly
Q93. What is motor and working
A motor is a device that converts electrical energy into mechanical energy to produce motion.
Motors are used in various applications such as electric vehicles, industrial machinery, and household appliances.
They work on the principle of electromagnetic induction or the interaction between magnetic fields and electric currents.
The basic components of a motor include a rotor, stator, and commutator or brushes.
There are different types of motors such as DC motors, AC motors, ste...read more
Q94. Tell me errors in material extend
Errors in material extend can include incorrect data entry, missing information, duplicate entries, and system errors.
Incorrect data entry such as wrong material number or description
Missing information like unit of measure or pricing details
Duplicate entries for the same material
System errors causing inconsistencies in material extend data
Q95. Which language i have used?
I have used multiple programming languages including Java, Python, and C++.
Java
Python
C++
Q96. What is compile and runtime polymorphism
Compile-time polymorphism is method overloading while runtime polymorphism is method overriding.
Compile-time polymorphism is resolved at compile-time while runtime polymorphism is resolved at runtime.
Method overloading is an example of compile-time polymorphism where multiple methods have the same name but different parameters.
Method overriding is an example of runtime polymorphism where a subclass provides its own implementation of a method already defined in its superclass....read more
Q97. What are smartforms in ABAP?
Smartforms in ABAP are a tool used for creating and maintaining forms in SAP systems.
Smartforms are used to design and generate forms like invoices, purchase orders, etc.
They are created using a graphical design tool in SAP system.
Smartforms can be integrated with ABAP programs to generate and print forms.
They offer more flexibility and features compared to SAPscript forms.
Q98. What is data structures
Data structures are ways of organizing and storing data in a computer so that it can be accessed and used efficiently.
Data structures are used to manage large amounts of data efficiently
They can be implemented using arrays, linked lists, trees, graphs, and other methods
Examples include stacks, queues, hash tables, and binary search trees
Q99. Tell about Tableau dash boards.
Tableau dashboards are interactive visualizations that help users analyze and understand data.
Dashboards are made up of multiple worksheets and can include filters, parameters, and actions.
They allow users to explore data and answer questions in real-time.
Dashboards can be shared with others and embedded in websites or other applications.
Examples of dashboards include sales performance dashboards, marketing campaign dashboards, and financial analysis dashboards.
Q100. Explain method overloading?
Method overloading is the ability to define multiple methods with the same name but different parameters.
Method overloading allows a class to have multiple methods with the same name but different parameters.
The methods must have different parameter types or different number of parameters.
The compiler determines which method to call based on the arguments passed during the method call.
Method overloading helps in code reusability and improves readability.
Example: public void c...read more
More about working at HCL Group
Top HR Questions asked in PayPal
Interview Process at PayPal
Top Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month