Premium Employer

HCLTech

3.5
based on 36.2k Reviews
Filter interviews by

100+ Swarna Fasteners Interview Questions and Answers

Updated 14 Feb 2025
Popular Designations

Q1. what's difference between server.transfer and Response.redirect

Ans.

Difference between server.transfer and Response.redirect

  • Server.Transfer transfers control to another page on the server without the client knowing

  • Response.Redirect sends a message to the client to redirect to another page

  • Server.Transfer is faster and more efficient than Response.Redirect

  • Server.Transfer can only be used within the same application, while Response.Redirect can be used to redirect to any URL

View 5 more answers

Q2. 1) Advantage of springboot over spring 2) Tell me all the anotations you know in spring 3) What are CRUD operations, write controller layer and use validating annotations like @NotNull, @valid etc. how to valid...

read more
Ans.

The interview questions cover various topics related to Spring framework, REST vs SOAP, JPA repository, Feign client, circuit breaker, and Spring Security.

  • Spring Boot provides a simpler and faster way to set up and run Spring applications compared to traditional Spring.

  • Common annotations in Spring include @Controller, @Service, @Repository, @Autowired, @Component, @RequestMapping, @GetMapping, @PostMapping, @PutMapping, @DeleteMapping, @Valid, @NotNull, etc.

  • CRUD operations re...read more

Add your answer

Q3. 1) OOPS in java, and told to explain abstraction, encapsulation, inheritance with practical code 2) Exception handling(globally), Authentication and authorization 3) SOLID principles and factory design pattern...

read more
Ans.

Interview questions for Software Engineer position covering OOPS concepts, exception handling, SOLID principles, Java 8 features, and Streams.

  • Abstraction in OOPS: Hiding implementation details. Example: Abstract class Shape with method draw().

  • Encapsulation in OOPS: Bundling data and methods that operate on the data. Example: Class Employee with private fields and public getters/setters.

  • Inheritance in OOPS: Reusing code and extending functionality. Example: Class Dog extends A...read more

Add your answer

Q4. What string pool in java and why string is immutable

Ans.

String pool is a cache of string literals in Java. String is immutable to ensure security and efficiency.

  • String pool is a collection of unique string literals stored in heap memory.

  • When a new string is created, JVM checks if it already exists in the pool. If yes, it returns the reference to the existing object.

  • String immutability ensures that once a string is created, its value cannot be changed. This ensures security and efficiency.

  • For example, if a password is stored as a s...read more

View 1 answer
Discover Swarna Fasteners interview dos and don'ts from real experiences

Q5. What is difference between if else and switch ?

Ans.

if else is used for conditional statements with multiple conditions while switch is used for multiple conditions with same variable.

  • if else can handle multiple conditions with different outcomes

  • switch can handle multiple conditions with same outcome

  • if else is more flexible and can handle complex conditions

  • switch is faster and easier to read for simple conditions

  • example of if else: if (x > 5) {do something} else if (x < 5) {do something else} else {do something else}

  • example of...read more

View 3 more answers

Q6. What is executor in multithreading and what is thread pool

Ans.

Executor is an interface that executes submitted tasks in a separate thread. Thread pool is a collection of threads that can be reused.

  • Executor provides a way to decouple task submission from task execution.

  • Thread pool manages a fixed number of threads and assigns tasks to them.

  • Executor framework provides a way to manage thread pools.

  • Example: Executors.newFixedThreadPool(10) creates a thread pool with 10 threads.

  • Example: Executor.execute(Runnable task) submits a task to the e...read more

Add your answer
Are these interview questions helpful?

Q7. What are jagged array

Ans.

Jagged arrays are arrays of arrays with different lengths.

  • Jagged arrays are also known as ragged arrays.

  • They are useful when the number of elements in each row is not fixed.

  • Example: int[][] jaggedArray = new int[3][]; jaggedArray[0] = new int[2]; jaggedArray[1] = new int[4]; jaggedArray[2] = new int[3];

  • Accessing elements in a jagged array requires two sets of square brackets.

  • Jagged arrays can be used to represent irregularly shaped data, such as a matrix with missing values.

View 1 answer

Q8. What do you mean by oops concept

Ans.

OOPs (Object-Oriented Programming) is a programming paradigm based on the concept of 'objects', which can contain data and code.

  • OOPs focuses on the use of classes and objects to organize and structure code

  • Encapsulation, inheritance, and polymorphism are key concepts in OOPs

  • Examples of OOPs languages include Java, C++, and Python

Add your answer
Share interview questions and help millions of jobseekers 🌟

Q9. What are the type if data structure.

Ans.

Data structures are ways of organizing and storing data in a computer so that it can be accessed and used efficiently.

  • There are two main types of data structures: primitive and non-primitive

  • Primitive data structures include integers, floats, characters, and booleans

  • Non-primitive data structures include arrays, linked lists, stacks, queues, trees, and graphs

  • Each data structure has its own advantages and disadvantages depending on the use case

Add your answer

Q10. What do you mean by 64bit and 32bit .

Ans.

64bit and 32bit refer to the size of data that a processor can handle.

  • 64bit processors can handle larger amounts of memory and perform faster than 32bit processors.

  • 64bit processors are more efficient in handling complex calculations and running multiple applications simultaneously.

  • 32bit processors are limited to 4GB of RAM and can only handle 32bit software.

  • Most modern computers and operating systems are 64bit.

  • Examples of 64bit processors include Intel Core i5 and i7, AMD Ryz...read more

Add your answer

Q11. What do you mean by control structure.

Ans.

Control structure refers to the way a program is organized and executed based on certain conditions.

  • Control structures are used to control the flow of a program.

  • They include if-else statements, loops, and switch statements.

  • If-else statements allow for conditional execution of code.

  • Loops allow for repeated execution of code.

  • Switch statements allow for multiple possible outcomes based on a single variable.

  • Proper use of control structures can improve program efficiency and reada...read more

Add your answer

Q12. Difference between while loop and do while loop.

Ans.

While loop executes only if the condition is true, do while loop executes at least once before checking the condition.

  • While loop checks the condition first, then executes the code block

  • Do while loop executes the code block first, then checks the condition

  • While loop may not execute at all if the condition is false initially

  • Do while loop always executes at least once

  • While loop is a pre-test loop, do while loop is a post-test loop

Add your answer

Q13. 1.Oops concepts 2.what is list and tuples 3.write code to sort the string

Ans.

Interview questions for Software Engineer on OOPs concepts, list and tuples, and sorting strings.

  • OOPs concepts include inheritance, polymorphism, encapsulation, and abstraction.

  • Lists and tuples are data structures in Python. Lists are mutable while tuples are immutable.

  • To sort a string in Python, use the sorted() function or the sort() method.

Add your answer

Q14. Explain the data structures like linked list, dfs and bfs.

Ans.

Linked list is a linear data structure. DFS and BFS are graph traversal algorithms.

  • Linked list is a collection of nodes where each node points to the next node.

  • DFS (Depth First Search) is a traversal algorithm that explores as far as possible along each branch before backtracking.

  • BFS (Breadth First Search) is a traversal algorithm that explores all the vertices of a graph in breadth-first order.

  • Example of linked list: 1->2->3->4->5

  • Example of DFS: starting from node A, explore...read more

Add your answer

Q15. What are oops concepts and describe each?

Ans.

OOPs concepts are the fundamental principles of object-oriented programming.

  • Abstraction: Hiding implementation details and showing only necessary information.

  • Encapsulation: Binding data and functions together in a single unit.

  • Inheritance: Acquiring properties and behavior of a parent class by a child class.

  • Polymorphism: Ability of an object to take many forms or have multiple behaviors.

  • Association: Relationship between two objects.

  • Aggregation: A special form of association wh...read more

Add your answer

Q16. What is singleton class in java

Ans.

Singleton class is a class that can have only one instance and provides a global point of access to it.

  • Singleton class is used when we need to ensure that only one instance of a class is created throughout the application.

  • It is implemented by making the constructor private and providing a static method to get the instance of the class.

  • Example: java.lang.Runtime is a singleton class that provides access to the runtime environment of the current Java application.

  • Singleton patte...read more

Add your answer

Q17. What do you mean by network.

Ans.

A network is a group of interconnected devices that can communicate and share resources.

  • A network can be wired or wireless.

  • Devices on a network can share files, printers, and internet access.

  • Networks can be local (LAN) or wide area (WAN).

  • Examples of networks include the internet, home Wi-Fi, and corporate intranets.

Add your answer

Q18. What is array and linked list.

Ans.

Array is a collection of elements of same data type. Linked list is a data structure where each element points to the next one.

  • Arrays have fixed size, linked lists can grow dynamically

  • Arrays have constant time access, linked lists have linear time access

  • Arrays are stored in contiguous memory, linked lists are stored in non-contiguous memory

  • Example of array: int[] arr = {1, 2, 3, 4, 5}

  • Example of linked list: Node head = new Node(1); head.next = new Node(2);

Add your answer

Q19. How we make a class immutable in java

Ans.

To make a class immutable in Java, we need to follow certain rules.

  • Make the class final so that it cannot be extended

  • Make all the fields private and final

  • Do not provide any setter methods

  • If the class has mutable fields, return a copy of the field instead of the original in getter methods

  • Ensure that any mutable objects passed to the constructor are not modified outside the class

  • Override equals() and hashCode() methods to ensure that objects can be compared properly

Add your answer

Q20. What is encapsulation

Ans.

Encapsulation is the process of hiding implementation details and providing a public interface for accessing the functionality.

  • Encapsulation helps in achieving data abstraction and information hiding

  • It prevents unauthorized access to the internal details of an object

  • It allows for easy modification of implementation without affecting the external code

  • Example: A class with private variables and public methods

  • Example: A bank account class with methods for deposit and withdraw, b...read more

View 3 more answers

Q21. Make a nested array to flat array using customised method

Ans.

Convert nested array to flat array using custom method

  • Create a recursive function to flatten the nested array

  • Use Array.isArray() to check if an element is an array

  • Concatenate arrays using Array.concat() method

Add your answer

Q22. What is operating system.

Ans.

An operating system is a software that manages computer hardware and software resources.

  • It acts as an interface between the user and the computer hardware.

  • It provides services to applications and manages system resources.

  • Examples include Windows, macOS, Linux, Android, iOS.

  • It controls the allocation of memory, processing power, and input/output devices.

  • It provides security and protection to the system and user data.

Add your answer

Q23. Different type of testing and testing tools?

Ans.

Different types of testing include unit, integration, system, acceptance, and regression testing. Testing tools include Selenium, JUnit, and TestNG.

  • Unit testing: testing individual units or components of code

  • Integration testing: testing how different units or components work together

  • System testing: testing the entire system as a whole

  • Acceptance testing: testing to ensure the system meets the requirements of the stakeholders

  • Regression testing: testing to ensure changes to the ...read more

Add your answer

Q24. Differentiate between DBMS &amp; RDBMS

Ans.

DBMS is a software to manage databases while RDBMS is a type of DBMS that uses a relational model.

  • DBMS stands for Database Management System while RDBMS stands for Relational Database Management System.

  • DBMS can manage any type of database while RDBMS uses a relational model to manage data.

  • DBMS does not enforce any specific data model while RDBMS enforces a tabular data model.

  • Examples of DBMS include MongoDB and Cassandra while examples of RDBMS include MySQL and Oracle.

Add your answer

Q25. How many types of loops.

Ans.

There are three types of loops in programming.

  • The three types of loops are: for loop, while loop, and do-while loop.

  • For loop is used when the number of iterations is known beforehand.

  • While loop is used when the number of iterations is not known beforehand.

  • Do-while loop is similar to while loop, but it executes at least once before checking the condition.

Add your answer

Q26. Optimize the given program from O(n2) to O(log n)

Ans.

Optimize O(n2) program to O(log n)

  • Use binary search instead of linear search

  • Divide and conquer approach can be used

  • Implement efficient data structures like heap, AVL tree, etc.

  • Reduce unnecessary iterations and comparisons

  • Use memoization to avoid redundant calculations

Add your answer

Q27. Given a string remove the unwanted spaces

Ans.

Remove unwanted spaces from a given string

  • Use string manipulation functions to remove extra spaces

  • Iterate through the string and remove any consecutive spaces

  • Trim the string to remove leading and trailing spaces

Add your answer

Q28. Explain types of network.

Ans.

Types of network include LAN, WAN, MAN, WLAN, VPN, PAN, SAN, CAN, and GAN.

  • LAN (Local Area Network) connects devices within a small area

  • WAN (Wide Area Network) connects devices across a large geographical area

  • MAN (Metropolitan Area Network) connects devices within a city or metropolitan area

  • WLAN (Wireless Local Area Network) uses wireless technology to connect devices within a small area

  • VPN (Virtual Private Network) allows secure remote access to a private network

  • PAN (Personal...read more

Add your answer

Q29. What is a pointer to pointer

Ans.

A pointer to pointer is a variable that stores the memory address of another pointer.

  • It is used to store the address of a pointer variable.

  • It allows indirect access to a memory location.

  • Commonly used in dynamic memory allocation and multi-dimensional arrays.

Add your answer

Q30. inheritance and its types

Ans.

Inheritance is a mechanism in object-oriented programming where a class inherits properties and behaviors from another class.

  • Inheritance allows code reuse and promotes code organization.

  • There are different types of inheritance: single, multiple, multilevel, hierarchical, and hybrid.

  • Single inheritance involves a class inheriting from a single base class.

  • Multiple inheritance involves a class inheriting from multiple base classes.

  • Multilevel inheritance involves a class inheritin...read more

View 2 more answers

Q31. Which compiler we are using in c C data types

Ans.

The choice of compiler in C depends on the platform and the specific needs of the project.

  • Different platforms may have different default compilers, such as GCC on Linux and Clang on macOS.

  • Some projects may require a specific compiler for compatibility or performance reasons.

  • C compilers include GCC, Clang, Microsoft Visual C++, and Intel C++ Compiler, among others.

Add your answer

Q32. Thread and its types

Ans.

Thread is a lightweight process that can run concurrently with other threads in a program.

  • There are two types of threads: user-level threads and kernel-level threads.

  • User-level threads are managed by the application and are faster to create and switch between, but can't take advantage of multiple processors.

  • Kernel-level threads are managed by the operating system and can take advantage of multiple processors, but are slower to create and switch between.

  • Examples of thread libr...read more

Add your answer

Q33. Polymorphism and its types

Ans.

Polymorphism is the ability of an object to take on many forms. It has two types: compile-time and runtime polymorphism.

  • Compile-time polymorphism is achieved through function overloading and operator overloading.

  • Runtime polymorphism is achieved through virtual functions and function overriding.

  • Polymorphism allows for code reusability and flexibility in object-oriented programming.

  • Example of compile-time polymorphism: function overloading - multiple functions with the same nam...read more

Add your answer

Q34. What is a pointer

Ans.

A pointer is a variable that stores the memory address of another variable.

  • Pointers are used to indirectly access and manipulate data in memory.

  • They are commonly used in programming languages like C and C++.

  • Example: int *ptr; // declares a pointer to an integer variable

Add your answer

Q35. Difference between Groupby and Orderby.

Ans.

Groupby is used to group data based on a specific column, while Orderby is used to sort data based on a specific column.

  • Groupby is used to create groups of data based on a specific column.

  • Orderby is used to sort data based on a specific column in ascending or descending order.

  • Groupby is often used in combination with aggregate functions like sum, count, etc.

  • Orderby can be used to sort data in ascending or descending order.

  • Groupby is commonly used in SQL queries, while Orderby...read more

Add your answer

Q36. Difference b/w delete, truncate, drop

Ans.

Delete removes specific rows from a table, truncate removes all rows, and drop removes the entire table.

  • Delete is a DML operation, while truncate and drop are DDL operations.

  • Delete can be rolled back, while truncate and drop cannot be rolled back.

  • Delete operation maintains the transaction log, while truncate and drop do not.

  • Delete operation is slower compared to truncate and drop.

  • Example: DELETE FROM table_name WHERE condition;

  • Example: TRUNCATE TABLE table_name;

  • Example: DROP ...read more

Add your answer

Q37. Difference between ++x and x++

Ans.

++x increments the value of x and then returns the incremented value, while x++ returns the current value of x and then increments it.

  • ++x is a pre-increment operator, it increments the value of x and then returns the incremented value

  • x++ is a post-increment operator, it returns the current value of x and then increments it

  • Example: int x = 5; int y = ++x; // x is now 6, y is 6

  • Example: int x = 5; int y = x++; // x is now 6, y is 5

Add your answer

Q38. Find the second highest number by using Java Stream, What are the new changes in Java 8 from Java 7. HashMap and HashSet internal implementation.

Ans.

Using Java Stream to find the second highest number, Java 8 changes, HashMap and HashSet internal implementation.

  • Use Java Stream to sort the numbers in descending order and skip the first element to get the second highest number.

  • Java 8 introduced lambda expressions, functional interfaces, Stream API, default methods in interfaces, and new Date and Time API.

  • HashMap uses buckets to store key-value pairs, while HashSet uses HashMap internally to store unique elements.

  • HashMap all...read more

Add your answer

Q39. 1. How many ways to create resource on Azure? 2. What's horizontal scaling and vertical scaling? 3. What is kubernetes? 4. Types of linux OS flavour. 5. Five basic commands of Unix.

Ans.

Azure resources can be created through Azure portal, Azure CLI, Azure PowerShell, ARM templates, and Azure Resource Manager.

  • Azure portal: User-friendly interface for creating and managing Azure resources.

  • Azure CLI: Command-line tool for managing Azure resources.

  • Azure PowerShell: PowerShell cmdlets for Azure resource management.

  • ARM templates: Infrastructure as code for defining Azure resources.

  • Azure Resource Manager: Service for managing resources in Azure.

Add your answer

Q40. How is Azure, AWS, GCP different from each other and what are the similarities?

Ans.

Azure, AWS, and GCP are cloud computing platforms with differences in services, pricing, and market share.

  • Azure is developed by Microsoft and is known for its strong integration with Windows-based systems.

  • AWS is the oldest and most widely used cloud platform, offering a wide range of services and a pay-as-you-go pricing model.

  • GCP, developed by Google, is known for its strong data analytics and machine learning capabilities.

  • All three platforms offer similar services such as vi...read more

Add your answer

Q41. check given string is Anagram string or not .

Ans.

An Anagram string is a string that can be formed by rearranging the letters of another string.

  • Check if both strings have the same length.

  • Sort the characters of both strings and compare them.

  • Alternatively, use a hashmap to count the frequency of characters in both strings.

Add your answer

Q42. What is derivatives, corporate action, Nav, money market, capital market

Ans.

Derivatives are financial contracts that derive their value from an underlying asset. Corporate actions are events that affect a company's stock. NAV is the net asset value of a mutual fund. Money market deals with short-term borrowing and lending. Capital market deals with long-term borrowing and lending.

  • Derivatives are contracts between two parties that derive their value from an underlying asset, such as stocks, bonds, or commodities.

  • Corporate actions are events that affec...read more

Add your answer

Q43. Able to relocate anywhere in India

Ans.

Yes, willing to relocate anywhere in India for the right opportunity.

  • Open to relocating for career growth and new experiences

  • Excited about the prospect of exploring different cities and cultures

  • Flexible and adaptable to new environments

  • Examples: Relocated for previous job opportunities, willing to move for the right role

Add your answer

Q44. Matrix elements rotation of 90 degree

Ans.

Rotate the elements of a matrix by 90 degrees clockwise

  • Transpose the matrix

  • Reverse each row of the transposed matrix

Add your answer

Q45. What's CLI? Can we create Load balancer using CLI?

Ans.

CLI stands for Command Line Interface. Yes, we can create a Load balancer using CLI.

  • CLI is a text-based interface used to interact with a computer system.

  • It allows users to input commands to perform tasks without the need for a graphical user interface.

  • Load balancers can be created using CLI commands in cloud platforms like AWS or Azure.

  • For example, in AWS, you can use the AWS CLI to create a load balancer using the 'create-load-balancer' command.

Add your answer

Q46. C++, OOPS, STL, Find Error in Code Snippet

Ans.

The question tests knowledge of C++, OOPS, and STL by asking to find errors in a code snippet.

  • Check for syntax errors, such as missing semicolons or incorrect variable declarations.

  • Look for logical errors, like incorrect usage of OOPS concepts or STL functions.

  • Ensure proper memory management and error handling in the code snippet.

Add your answer

Q47. 1. How to repair outlook and how to command for outlook safe mode?

Ans.

Repairing Outlook involves troubleshooting common issues and running in safe mode for diagnosing problems.

  • To repair Outlook, try restarting the application, repairing Office installation, or creating a new Outlook profile.

  • To run Outlook in safe mode, use the command 'outlook.exe /safe' in the Run dialog box.

  • Safe mode disables add-ins and extensions, helping to identify if they are causing issues.

  • Common issues that can be resolved by repairing Outlook include freezing, crashin...read more

Add your answer

Q48. Difference between array list and linked list..where do we use ?

Ans.

Array list stores elements in contiguous memory locations, while linked list stores elements in nodes with pointers to the next node.

  • Array list allows fast access to elements using index, while linked list allows for fast insertion and deletion of elements.

  • Array list is ideal for scenarios where random access is required, while linked list is suitable for scenarios where frequent insertion and deletion operations are needed.

  • Example: Array list is used in scenarios where eleme...read more

Add your answer

Q49. What is VPN? What is SLA and tell me about ticketing tool

Ans.

VPN stands for Virtual Private Network, which allows users to securely access a private network over a public network.

  • VPN creates a secure connection between a user and a private network, encrypting data to ensure privacy and security.

  • It is commonly used by remote workers to access company resources securely.

  • VPN can also be used to bypass geo-restrictions and access region-locked content.

  • Popular VPN services include NordVPN, ExpressVPN, and CyberGhost.

Add your answer

Q50. Write a code to find out which pairs in the array list will give the sum as 8

Ans.

Code to find pairs in array list with sum 8

  • Iterate through array and check if pair sum is 8

  • Use a hashmap to store elements and their complements

  • Time complexity O(n)

Add your answer

Q51. How to communicate two api’s in springboot.Explain the implementation

Ans.

To communicate two APIs in Spring Boot, you can use RestTemplate or WebClient to make HTTP requests.

  • Use RestTemplate to make synchronous HTTP requests between APIs

  • Use WebClient to make asynchronous HTTP requests between APIs

  • Implement error handling and exception handling for robust communication

  • Consider using Feign client for declarative REST client

  • Ensure proper authentication and authorization mechanisms are in place

Add your answer

Q52. What is the restcontroller and controller annotation

Ans.

RestController and Controller annotations are used in Spring framework to define classes as controllers for handling HTTP requests.

  • RestController annotation is used to define a class as a RESTful web service controller, which returns data in JSON or XML format.

  • Controller annotation is used to define a class as a traditional Spring MVC controller, which returns a view to the client.

  • Both annotations are used to handle HTTP requests and map them to specific methods in the contro...read more

Add your answer

Q53. What is meant by @data annotation and @value annotation

Ans.

The @Data annotation is used in Java to declare a class as a data class, while the @Value annotation is used in Spring to create immutable objects.

  • The @Data annotation in Java is used to generate getters, setters, toString, equals, and hashCode methods for a class.

  • The @Value annotation in Spring is used to create immutable objects with final fields that are initialized through constructor injection.

  • Both annotations help in reducing boilerplate code and improving code readabil...read more

Add your answer

Q54. How to read the values from application properties file

Ans.

To read values from application properties file, use a properties file reader in the programming language being used.

  • Use a properties file reader class in the programming language being used (e.g. Properties class in Java).

  • Load the properties file using the reader class.

  • Access the values using keys specified in the properties file.

Add your answer

Q55. How to troubleshoot internet not working issue

Ans.

Troubleshooting internet not working issue

  • Check if the internet connection is properly plugged in

  • Restart the router and modem

  • Check for any service outages in the area

  • Reset network settings on the device

  • Try connecting to a different network to isolate the issue

Add your answer

Q56. What is meant by @qualifier and @autowired

Ans.

Annotations used in Spring framework for dependency injection

  • Used in Spring framework to inject dependencies

  • Qualifier is used to specify which bean to autowire when multiple beans of the same type exist

  • Autowired is used to automatically inject the dependency

Add your answer

Q57. Write a code to print the even numbers as well as the squares of it in java8

Ans.

Code to print even numbers and their squares in Java8

  • Use Java8 Stream API to generate even numbers

  • Map each even number to its square using map() function

  • Print the even numbers and their squares using forEach() function

Add your answer

Q58. How to make a specific

Ans.

To make a specific what? Please provide more context.

  • Please provide more information about what needs to be made specific

  • Clarify the scope and purpose of the specific thing

  • Consider using clear and concise language to define the specific thing

Add your answer

Q59. What is meant by @configuration annotation

Ans.

Annotation used in Spring framework to indicate that a class declares one or more @Bean methods

  • Used in Spring framework to define configuration classes

  • Indicates that a class should be considered as a source of bean definitions

  • Helps Spring to understand the configuration and create beans accordingly

Add your answer

Q60. What are the intermediate operations in java8

Ans.

Intermediate operations in Java 8 are used to process the stream elements and produce a new stream as output.

  • Intermediate operations are lazy and do not start processing the stream until a terminal operation is invoked.

  • Examples of intermediate operations include filter, map, sorted, distinct, limit, and skip.

  • Intermediate operations can be chained together to form a pipeline of operations on a stream.

Add your answer

Q61. What is Financial market

Ans.

Financial market is a platform where buyers and sellers trade financial securities, commodities, and other fungible items.

  • Financial markets facilitate the exchange of assets such as stocks, bonds, currencies, and derivatives.

  • They provide a platform for companies to raise capital through issuing stocks and bonds.

  • Financial markets can be categorized into stock markets, bond markets, commodity markets, and currency markets.

  • Examples include the New York Stock Exchange (NYSE), Lon...read more

Add your answer

Q62. Short term and long term goal

Ans.

Short term goal is to excel in current role, long term goal is to become a team lead.

  • Short term goal: Master current responsibilities, improve skills, and contribute to team success

  • Long term goal: Develop leadership skills, mentor junior analysts, and lead projects

  • Example: Short term - Complete all assigned tasks ahead of schedule. Long term - Lead a successful project team

Add your answer

Q63. What is the usage of method reference

Ans.

Method reference is a shorthand syntax for lambda expressions to call a method.

  • Method reference can be used to refer to static methods, instance methods, and constructors.

  • It helps in improving code readability and conciseness.

  • Example: list.forEach(System.out::println) is equivalent to list.forEach(item -> System.out.println(item)).

Add your answer

Q64. What is the use of static class

Ans.

Static class is used to create classes that cannot be instantiated and can only have static members.

  • Static class cannot be instantiated, meaning you cannot create an object of a static class.

  • Static class can only have static members such as static fields, methods, properties, and events.

  • Static classes are commonly used for utility classes where all members are static and do not require an instance to be accessed.

Add your answer

Q65. Do you know about Azure?

Ans.

Azure is a cloud computing platform by Microsoft.

  • Azure is a cloud computing service provided by Microsoft.

  • It offers a wide range of services including virtual computing, storage, networking, and analytics.

  • Azure allows users to build, deploy, and manage applications through Microsoft's data centers.

  • Popular Azure services include Azure Virtual Machines, Azure Blob Storage, and Azure SQL Database.

Add your answer

Q66. Write a sample code using @functional annotation

Ans.

Sample code using @functional annotation

  • Use @FunctionalInterface annotation to declare a functional interface in Java

  • Functional interfaces have exactly one abstract method

  • Example: @FunctionalInterface interface MyFunctionalInterface { void myMethod(); }

Add your answer

Q67. What are the features of java8

Ans.

Java 8 introduced several new features including lambda expressions, functional interfaces, streams, and the new date and time API.

  • Lambda expressions allow you to write code in a more concise and readable way.

  • Functional interfaces provide a way to define interfaces with a single abstract method.

  • Streams allow for processing sequences of elements in a functional style.

  • The new date and time API provides improved date and time handling capabilities.

Add your answer

Q68. What is stream in java8

Ans.

Streams in Java 8 are sequences of elements that support functional-style operations.

  • Streams allow for processing sequences of elements in a functional way

  • They can be created from collections, arrays, or I/O resources

  • Common operations on streams include map, filter, reduce, and collect

Add your answer

Q69. What is your strength programming language?

Ans.

My strength programming language is C++. I have extensive experience in developing software and solving complex problems using C++.

  • Proficient in object-oriented programming with C++

  • Strong knowledge of data structures and algorithms

  • Experience in developing efficient and scalable code

  • Familiarity with C++ libraries and frameworks

  • Ability to debug and optimize code for performance

  • Experience in multi-threading and parallel programming

  • Knowledge of C++ best practices and coding stand...read more

Add your answer

Q70. What is immutable class

Ans.

Immutable class is a class whose instances cannot be modified after creation.

  • Immutable class instances have all fields as final and private.

  • Immutable classes have no setter methods, only getter methods.

  • Examples of immutable classes in Java are String, Integer, and LocalDate.

Add your answer

Q71. What is parallel stream

Ans.

Parallel stream is a feature in Java that allows processing elements of a stream concurrently.

  • Parallel stream can be created from a regular stream using parallel() method.

  • It utilizes multiple threads to process elements in parallel, improving performance for large datasets.

  • However, parallel stream may not always be faster than sequential stream due to overhead of managing multiple threads.

  • Example: List list = Arrays.asList("apple", "banana", "cherry"); list.parallelStream().f...read more

Add your answer

Q72. Difference between map and flatmap

Ans.

Map applies a function to each element in a collection and returns a new collection. FlatMap applies a function that returns a collection for each element and flattens the result into a single collection.

  • Map transforms each element of a collection using a function and returns a new collection of the same size.

  • FlatMap transforms each element of a collection using a function that returns a collection, then flattens the result into a single collection.

  • Example: map([1, 2, 3], x =...read more

Add your answer

Q73. Can you tell me about the Golden rule of accounting?

Ans.

The Golden rule of accounting is to debit the receiver and credit the giver.

  • It is a fundamental principle of accounting.

  • It is used to record transactions in the correct way.

  • It ensures that the accounting equation remains balanced.

  • For example, when a company receives cash, it debits cash and credits the account that provided the cash.

  • It is also known as the principle of reciprocity.

View 1 answer

Q74. What is singleton

Ans.

Singleton is a design pattern that restricts the instantiation of a class to one object.

  • Ensures a class has only one instance and provides a global point of access to it

  • Commonly used in scenarios where only a single instance of a class is needed, such as database connections or configuration settings

  • Implemented by creating a static method that returns the same instance of the class every time it is called

Add your answer

Q75. Steps of ISO implementation.

Ans.

Steps of ISO implementation involve planning, documentation, training, implementation, audit, and certification.

  • Develop an implementation plan outlining goals, resources, and timeline.

  • Document processes and procedures to meet ISO standards.

  • Provide training to employees on ISO requirements and procedures.

  • Implement the documented processes and procedures in the organization.

  • Conduct internal audits to ensure compliance with ISO standards.

  • Seek certification from an accredited cer...read more

Add your answer

Q76. 1. What is a SMTP and how it's being used 2. What is ITIL and it's version 3. What were the troubleshooting for Internet disconnected? 4.What is BSOD? 5. What is the use of IPconfing command?

Ans.

Answers to common IT-related questions for Service Desk Analyst position

  • SMTP is a protocol used for sending email messages between servers

  • ITIL is a framework for IT service management, with versions including ITIL v3 and ITIL 4

  • Troubleshooting for Internet disconnected includes checking cables, resetting the router, and checking network settings

  • BSOD stands for Blue Screen of Death, a critical error in Windows operating systems

  • IPconfig is a command used to display and manage ne...read more

Add your answer

Q77. What is X path? What is absolute xpath and relative xpath?

Ans.

XPath is a language used to navigate through XML documents. Absolute XPath specifies the complete path from the root element, while relative XPath specifies the path from the current element.

  • XPath is used to locate elements in an XML document

  • Absolute XPath starts with a single forward slash and specifies the complete path from the root element

  • Relative XPath starts with a double forward slash and specifies the path from the current element

  • Example of Absolute XPath: /html/body/...read more

Add your answer

Q78. What kind of situations have you encountered during bulk load or complex mapping and what did you do to make the job more efficient. How do you enhance your job?

Add your answer

Q79. You know any computer skills

Ans.

Yes, I have a strong foundation in computer skills including programming languages, databases, and software development tools.

  • Proficient in programming languages such as Java, Python, and C++

  • Experience with databases like MySQL and MongoDB

  • Familiarity with software development tools like Git and Jira

Add your answer

Q80. What is network,DHCP, SWITCH, ROUTER AND IP.

Ans.

Network is a collection of interconnected devices that communicate with each other using protocols.

  • DHCP (Dynamic Host Configuration Protocol) is a network protocol that automatically assigns IP addresses to devices on a network.

  • A switch is a networking device that connects devices on a local area network (LAN) and forwards data packets between them.

  • A router is a networking device that connects multiple networks and forwards data packets between them.

  • IP (Internet Protocol) is ...read more

Add your answer

Q81. What are techniques? If use one motor or any electrical how to implement that which item to use that motor and how can control &amp;start

Ans.

Techniques refer to methods or procedures used to achieve a specific goal or outcome.

  • When using a motor or electrical item, it is important to select the appropriate motor or item for the task at hand.

  • Control and starting mechanisms will depend on the specific motor or electrical item being used.

  • Examples of techniques in healthcare include surgical techniques, diagnostic techniques, and therapeutic techniques.

  • Proper training and education are essential for mastering technique...read more

Add your answer

Q82. What is function module and where we use it?

Ans.

Function module is a reusable subroutine in SAP ABAP used for specific functionality.

  • Function modules are standalone functions that can be called from any ABAP program.

  • They are used to encapsulate specific business logic or calculations.

  • Function modules can be called remotely from other systems using Remote Function Call (RFC).

  • Examples include function modules for currency conversion, date calculations, or data validation.

Add your answer

Q83. Have you worked on flat files, how have you used it?

Add your answer

Q84. Microservice project architecture and flow in current project, Microservice design patterns etc..

Ans.

Explained microservice project architecture and design patterns.

  • Our microservice project follows a domain-driven design approach.

  • We use API Gateway pattern to handle requests and route them to appropriate microservices.

  • We also use Circuit Breaker pattern to handle failures and prevent cascading failures.

  • Each microservice has its own database and communicates with other microservices through REST APIs.

  • We use containerization with Docker and orchestration with Kubernetes for de...read more

Add your answer

Q85. How to change input parameters in reports

Ans.

Input parameters in reports can be changed by modifying the selection screen fields in the ABAP program.

  • Modify the selection screen fields in the ABAP program to change input parameters

  • Use PARAMETERS or SELECT-OPTIONS statements to define input fields

  • Update the logic in the report program to process the new input parameters

Add your answer

Q86. Internal workings of HashMap

Ans.

HashMap is a data structure that stores key-value pairs and uses hashing to efficiently retrieve values.

  • HashMap uses an array of linked lists to store key-value pairs.

  • The key is hashed to determine the index in the array where the value will be stored.

  • If multiple keys hash to the same index, a linked list is used to handle collisions.

  • HashMap allows one null key and multiple null values.

  • Example: HashMap map = new HashMap<>();

Add your answer

Q87. Linked list vs array list

Ans.

Linked list is dynamic in size, allows for efficient insertion/deletion. Array list is fixed in size, allows for random access.

  • Linked list is efficient for insertion/deletion due to dynamic size.

  • Array list is efficient for random access due to fixed size.

  • Linked list uses pointers to connect elements, while array list uses indexes.

  • Example: Linked list is used in applications where frequent insertions/deletions are required. Array list is used when random access is needed.

Add your answer

Q88. Overriding vs Overloading

Ans.

Overriding is when a subclass provides a specific implementation of a method in its superclass, while overloading is when multiple methods have the same name but different parameters.

  • Overriding involves changing the behavior of a method in a subclass, while overloading involves creating multiple methods with the same name but different parameters.

  • Overriding is used for runtime polymorphism, while overloading is used for compile-time polymorphism.

  • Example of overriding: supercl...read more

Add your answer

Q89. There is a string input that is email address. You have to print the email id such that before @ few letters should be replaced with star.

Ans.

Replace few letters before @ in email id with star and print the email id.

  • Identify the position of @ in the email address

  • Replace few letters before @ with *

  • Print the modified email id

Add your answer

Q90. What is the process for obtaining a loan?

Ans.

The process for obtaining a loan involves application, verification, approval, and disbursement of funds.

  • 1. Fill out a loan application form with personal and financial details.

  • 2. Submit necessary documents such as income proof, identity proof, and address proof.

  • 3. The lender will verify the information provided and assess your creditworthiness.

  • 4. If approved, the terms and conditions of the loan will be communicated to you.

  • 5. Upon acceptance, the funds will be disbursed to y...read more

Add your answer

Q91. How can you work and make changes on a DF loaded in Central repository?

Add your answer

Q92. What is pivot table and what's the use cases?

Ans.

A pivot table is a data summarization tool used in spreadsheet programs to analyze, summarize, and present data in a tabular format.

  • Pivot tables allow users to reorganize and summarize selected columns and rows of data to obtain desired insights.

  • They can be used to analyze trends, patterns, and relationships within a dataset.

  • Pivot tables are commonly used in business and finance for financial analysis, sales reporting, and budgeting.

  • They can also be used in data analysis and ...read more

Add your answer

Q93. Libraries of python and how to add python with database.

Ans.

Python has libraries like SQLAlchemy, psycopg2 for database connectivity. Use these libraries to connect Python with databases.

  • Use SQLAlchemy library for ORM (Object Relational Mapping) to interact with databases.

  • Use psycopg2 library for direct interaction with PostgreSQL database.

  • Install the required libraries using pip install .

  • Establish connection to the database using appropriate credentials.

  • Execute SQL queries using Python code to interact with the database.

Add your answer

Q94. What Kind function have you used in Query transformation?

Add your answer

Q95. Have you used idoc(Explanation of the complete df using idoc)

Add your answer

Q96. what is ur project ? and then wts is ur role in this project ? and core java oops concepts ...

Ans.

I worked on a project that involved developing a web application using Java and Spring framework.

  • Developed RESTful APIs using Spring Boot

  • Implemented user authentication and authorization using Spring Security

  • Used Hibernate for database operations

  • Implemented caching using Redis

  • My role was to develop and maintain the backend of the application

Add your answer

Q97. Which version of html is getting at thid time and why?

Ans.

The latest version of HTML is HTML5, which is widely adopted for its improved functionality and features.

  • HTML5 is the current version of HTML being used

  • It offers new features like <video>, <audio>, <canvas>, and <svg> elements

  • HTML5 provides better support for multimedia and interactive content

Add your answer

Q98. What is the shortcut key for paste special

Ans.

Ctrl + Alt + V

  • Press Ctrl + Alt + V to open the Paste Special dialog box

  • Then use the arrow keys to select the desired option (e.g. values, formats, formulas)

  • Press Enter to paste the selected option

Add your answer

Q99. Tell me about vlookup function and its formula

Ans.

VLOOKUP is a function in Excel used to search for a value in a table and return a corresponding value.

  • VLOOKUP stands for 'Vertical Lookup'

  • It searches for a value in the first column of a table and returns a value in the same row from a specified column

  • The formula for VLOOKUP is =VLOOKUP(lookup_value, table_array, col_index_num, [range_lookup])

  • Example: =VLOOKUP(A2, B2:D10, 3, FALSE) - searches for the value in cell A2 in the range B2:D10 and returns the value in the 3rd column...read more

Add your answer

Q100. What are usecase of slave and master

Ans.

Slaves and masters are used in distributed systems for load balancing and fault tolerance.

  • In a distributed system, the master node controls and coordinates the work of the slave nodes.

  • Slaves perform tasks assigned by the master and report back their results.

  • Masters can be used for load balancing, where they distribute tasks evenly among slaves.

  • Masters can also be used for fault tolerance, where they can detect when a slave node fails and reassign its tasks to other slaves.

  • Exa...read more

Add your answer
1
2
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos

Interview Process at Swarna Fasteners

based on 205 interviews
Interview experience
3.9
Good
View more
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Interview Questions from Similar Companies

4.1
 • 2.2k Interview Questions
3.9
 • 364 Interview Questions
4.0
 • 245 Interview Questions
3.5
 • 192 Interview Questions
3.9
 • 176 Interview Questions
4.1
 • 166 Interview Questions
View all
Top HCLTech Interview Questions And Answers
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
70 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter