Premium Employer

HCLTech

3.5
based on 35.9k Reviews
Filter interviews by

90+ Google Interview Questions and Answers

Updated 21 Jan 2025
Popular Designations

Q1. What is the purpose of react and it's latest hooks?

Ans.

React is a JavaScript library for building user interfaces. React Hooks are a feature introduced in React 16.8 to manage state and lifecycle in functional components.

  • React is used for creating reusable UI components

  • React allows for efficient rendering and updating of components

  • React Hooks provide a way to use state and other React features in functional components

  • Hooks like useState and useEffect are commonly used in React applications

View 1 answer

Q2. How would you design service layer for highly scalable application?

Ans.

Designing a service layer for a highly scalable application requires careful consideration of architecture and technology choices.

  • Use a microservices architecture to break down the application into smaller, more manageable components.

  • Implement load balancing and auto-scaling to ensure that the service layer can handle high traffic volumes.

  • Choose a technology stack that is well-suited to the specific needs of the application, such as high throughput or low latency.

  • Implement ca...read more

Add your answer

Q3. What happens if there is finally block inside an exception block?

Ans.

Finally block will always execute, even if an exception is thrown in the try or catch block.

  • Finally block is used to execute code that must always run, regardless of whether an exception was thrown or not.

  • If an exception is thrown in the try or catch block, the finally block will still execute.

  • Finally block is often used to release resources like file handles, database connections, etc.

Add your answer

Q4. What are different types of joins

Ans.

Different types of joins are Inner Join, Left Join, Right Join, and Full Outer Join.

  • Inner Join returns only the matching rows from both tables.

  • Left Join returns all the rows from the left table and matching rows from the right table.

  • Right Join returns all the rows from the right table and matching rows from the left table.

  • Full Outer Join returns all the rows from both tables, with NULL values in the columns where there is no match.

  • Join types can be combined with other SQL cla...read more

View 1 answer
Discover Google interview dos and don'ts from real experiences

Q5. Write a program to find the names of students against a subject using stream API.

Ans.

Program to find student names against a subject using stream API

  • Create a list of students with their subjects

  • Use stream API to filter the list based on the subject

  • Map the filtered list to get only the names of students

  • Collect the names in a list or any other data structure

  • Return the list of names

Add your answer

Q6. What are the different types of controller in SAP CRM webui?

Ans.

The different types of controllers in SAP CRM webui include Component Controller, View Controller, Context Controller, and Custom Controller.

  • Component Controller: Controls the entire component and manages the context data.

  • View Controller: Controls the layout and rendering of the UI elements.

  • Context Controller: Manages the context data and communication between controllers.

  • Custom Controller: Allows for custom logic and functionality to be implemented.

Add your answer
Are these interview questions helpful?

Q7. How to test a printer for checking performance

Ans.

To test printer performance, check print speed, quality, and connectivity.

  • Print a test page to check for print speed and quality.

  • Print a large document to test for any potential jams or errors.

  • Test connectivity by printing from different devices and checking for any connection issues.

  • Check ink or toner levels and replace if necessary.

  • Test different paper types and sizes to ensure compatibility.

  • Check for any software updates or driver issues.

  • Perform regular maintenance such as...read more

Add your answer

Q8. Real life scenario for food delivery company For delayed food delivery

Ans.

In case of delayed food delivery, the food delivery company should take prompt actions to rectify the situation and compensate the customer.

  • Apologize to the customer for the delay and inconvenience caused.

  • Offer a discount or a free meal to the customer as compensation.

  • Ensure that the food is delivered as soon as possible and in good condition.

  • Investigate the cause of the delay and take measures to prevent it from happening again.

  • Maintain good communication with the customer t...read more

Add your answer
Share interview questions and help millions of jobseekers 🌟

Q9. Different ways to implement and break Singleton pattern.

Ans.

Different ways to implement and break Singleton pattern.

  • Implement: Eager initialization, Lazy initialization, Thread-safe initialization, Bill Pugh Singleton Implementation

  • Break: Reflection, Serialization/Deserialization, Cloning, Multithreading

  • Example: Eager initialization - private static final Singleton instance = new Singleton();

  • Example: Reflection - Constructor constructor = Singleton.class.getDeclaredConstructor(); constructor.setAccessible(true); Singleton instance2 = ...read more

Add your answer

Q10. What is Redux and Redux purpose?

Ans.

Redux is a predictable state container for JavaScript apps.

  • Redux is a library for managing application state

  • It provides a predictable state container by enforcing a strict unidirectional data flow

  • Redux can be used with any UI library or framework

  • It is commonly used with React to manage state in complex applications

  • Redux allows for easy debugging and testing of state changes

  • Actions are dispatched to update the state, and reducers handle the updates

  • Selectors can be used to retr...read more

Add your answer

Q11. What is intern() method of String?

Ans.

intern() method of String returns a canonical representation of the string object.

  • The intern() method returns a string that has the same contents as the original string, but is guaranteed to be from a pool of unique strings.

  • This method is useful when comparing strings for equality as it compares the references instead of the contents.

  • Example: String s1 = new String("hello"); String s2 = s1.intern(); // s2 will be from the string pool

Add your answer

Q12. What would you do if there is a defect leakage ?

Ans.

Defect leakage is a serious issue. I would take immediate action to identify the root cause and implement corrective measures.

  • Analyze the defect leakage data to identify the root cause

  • Implement corrective measures to fix the issue

  • Conduct a thorough review of the testing process to prevent future leakage

  • Communicate the issue and resolution to stakeholders

  • Track and monitor the effectiveness of the corrective measures

Add your answer

Q13. How did you handled performance testing end to end?

Ans.

I handled performance testing end to end by conducting thorough analysis, creating test plans, executing tests, analyzing results, and implementing optimizations.

  • Conducted thorough analysis to identify key performance metrics and testing requirements

  • Created detailed test plans outlining scenarios, tools, and success criteria

  • Executed tests using appropriate tools and techniques, monitoring system behavior and performance

  • Analyzed test results to identify bottlenecks, performanc...read more

Add your answer

Q14. How we can fetch data into view from another view?

Ans.

Data can be fetched into a view from another view by passing data through a shared ViewModel or using LiveData.

  • Use a shared ViewModel to hold the data and access it from both views

  • Use LiveData to observe changes in the data and update the view accordingly

  • Pass data between views using Intent extras or Bundle

Add your answer

Q15. What is the main purpose of using CRM system?

Ans.

The main purpose of using CRM system is to manage and analyze customer interactions and data throughout the customer lifecycle.

  • Centralize customer data for easy access and analysis

  • Improve customer relationships and satisfaction

  • Increase sales and marketing effectiveness

  • Automate repetitive tasks and streamline processes

  • Track customer interactions and communication history

Add your answer

Q16. Check string nullability using optional class

Ans.

To check string nullability using optional class, use optional binding to safely unwrap the optional string.

  • Use if let or guard let statements to safely unwrap the optional string.

  • If the optional string is nil, the code inside the if or guard statement will not execute.

  • Example: if let myString = optionalString { //code to execute }

  • Example: guard let myString = optionalString else { return } //code to execute if optionalString is nil

Add your answer

Q17. Java code to print all the zeros at the end of the array

Ans.

Java code to print all the zeros at the end of the array

  • Iterate through the array from the end

  • Check if the element is '0'

  • Print the element if it is '0'

Add your answer

Q18. Java code to print the repeated words in the given sentence

Ans.

Java code to print the repeated words in a sentence

  • Split the sentence into words using split() method

  • Create a HashMap to store word frequency

  • Iterate through the words and update the frequency in the HashMap

  • Print the words with frequency greater than 1

Add your answer

Q19. Java code to print the repeated letters in the given name/words

Ans.

Java code to print the repeated letters in a given name/words

  • Iterate through each character in the input string

  • Use a HashMap to store the count of each character

  • Print the characters with count greater than 1

Add your answer

Q20. How to access variables in multi threaded application.

Ans.

Use synchronization mechanisms like locks, semaphores, or monitors to access variables in multi-threaded applications.

  • Use synchronized keyword in Java to ensure only one thread can access the variable at a time.

  • Use locks and mutexes in C++ to protect shared resources.

  • Use atomic variables in C# to ensure thread safety.

  • Use thread-safe data structures like ConcurrentHashMap in Java.

  • Avoid using global variables in multi-threaded applications.

  • Use thread-local storage to store thre...read more

Add your answer

Q21. What is call ID and CSequence

Ans.

Call ID and CSequence are used in SIP protocol for identifying and sequencing SIP messages.

  • Call ID is a unique identifier for a SIP call and is used to match requests and responses.

  • CSequence is a sequence number for a SIP message and is used to ensure proper sequencing of messages.

  • Both Call ID and CSequence are important for reliable communication in SIP protocol.

  • Example: Call ID: 1234567890, CSequence: 1

Add your answer

Q22. What is normalization

Ans.

Normalization is the process of organizing data in a database to reduce redundancy and improve data integrity.

  • Normalization involves breaking down a table into smaller tables and defining relationships between them.

  • It helps to eliminate data redundancy and inconsistencies.

  • Normalization is achieved through a series of normal forms, such as first normal form (1NF), second normal form (2NF), and so on.

  • Each normal form has a set of rules that must be followed to ensure data is pr...read more

Add your answer

Q23. Tell me about complete product life cycle with examply

Ans.

The product life cycle consists of several stages including ideation, development, launch, growth, maturity, and decline.

  • Ideation: Generating ideas for a new product or improvement.

  • Development: Designing and creating the product.

  • Launch: Introducing the product to the market.

  • Growth: Increasing sales and market share.

  • Maturity: Product reaches its peak and sales stabilize.

  • Decline: Sales decline due to market saturation or obsolescence.

Add your answer

Q24. What is the internal working of a HashMap?

Ans.

HashMap is a data structure that stores key-value pairs and uses hashing to quickly retrieve values based on keys.

  • HashMap internally uses an array of linked lists to store key-value pairs.

  • When a key-value pair is added, the key is hashed to determine the index in the array where it will be stored.

  • If multiple keys hash to the same index, a linked list is used to handle collisions.

  • To retrieve a value, the key is hashed again to find the corresponding index and then the linked l...read more

Add your answer

Q25. What is reliability testing

Ans.

Reliability testing is a type of testing that checks the ability of a system to perform consistently under different conditions.

  • It involves subjecting the system to various stress tests to identify potential failures

  • It helps in identifying and fixing issues before they occur in real-world scenarios

  • Examples include load testing, performance testing, and stress testing

  • Reliability testing is important for ensuring customer satisfaction and avoiding costly downtime

  • It is often use...read more

Add your answer

Q26. Hashmap vs ConcurrentHashMap Vs SynchronizedMap.

Ans.

Comparison of HashMap, ConcurrentHashMap, and SynchronizedMap.

  • HashMap is not thread-safe, ConcurrentHashMap is thread-safe and faster than SynchronizedMap.

  • ConcurrentHashMap uses a different locking mechanism than SynchronizedMap.

  • SynchronizedMap uses a single lock for all operations, while ConcurrentHashMap uses multiple locks.

  • ConcurrentHashMap is suitable for high-concurrency environments.

  • SynchronizedMap is suitable for low-concurrency environments.

  • HashMap is suitable for sin...read more

Add your answer

Q27. Difference between ingress and load balancer in Kubernetes

Ans.

Ingress manages external access to services, while load balancer distributes traffic within the cluster.

  • Ingress is an API object that manages external access to services in a cluster.

  • Ingress typically provides HTTP and HTTPS routing.

  • Load balancer is a service that distributes incoming network traffic across multiple backend services.

  • Load balancer ensures that no single service is overwhelmed with traffic.

  • In Kubernetes, LoadBalancer service type provisions a load balancer for ...read more

Add your answer

Q28. What are the components in my working application.

Ans.

The components in the working application are the frontend, backend, database, and any third-party integrations.

  • The frontend is responsible for the user interface and user experience.

  • The backend handles the business logic and communicates with the database.

  • The database stores and retrieves data.

  • Third-party integrations may include APIs, libraries, or services used by the application.

  • Examples of third-party integrations include payment gateways, social media APIs, and analytic...read more

Add your answer

Q29. Previous job oriented technical and current job description.

Ans.

Previous job: Software Engineer at XYZ. Current job: Technical Lead at ABC.

  • Previous job involved developing and maintaining web applications using Java and Spring framework.

  • Current job involves leading a team of developers, designing and implementing software solutions, and ensuring project deadlines are met.

  • Both jobs require strong technical skills, problem-solving abilities, and effective communication with team members and stakeholders.

Add your answer

Q30. What is difference between agile and SAFe

Ans.

Agile is a set of principles and values for software development, while SAFe is a framework for scaling agile practices across an organization.

  • Agile focuses on individuals and interactions over processes and tools, while SAFe emphasizes alignment, collaboration, and delivery at scale.

  • Agile promotes flexibility and adaptability in responding to change, whereas SAFe provides a structured approach for implementing agile practices in large organizations.

  • Agile encourages self-orga...read more

Add your answer

Q31. Tell me about product life cycle with example

Ans.

Product life cycle refers to the stages a product goes through from its introduction to its decline.

  • Introduction: The product is launched in the market.

  • Growth: Sales and market share increase as more customers adopt the product.

  • Maturity: Sales stabilize as the product reaches its peak market penetration.

  • Decline: Sales decline due to market saturation or the introduction of newer products.

  • Example: The iPhone product life cycle - introduced in 2007, experienced rapid growth, re...read more

Add your answer

Q32. How to create thread in linux ?

Ans.

To create a thread in Linux, use the pthread_create() function.

  • Include the pthread.h header file

  • Declare a pthread_t variable to hold the thread ID

  • Call pthread_create() function with the thread ID, attributes, start routine, and arguments

  • Example: pthread_t tid; pthread_create(&tid, NULL, start_routine, NULL);

Add your answer

Q33. How to hande load failures in Snowflake

Ans.

Load failures in Snowflake can be handled by monitoring the load process, identifying the root cause, and taking appropriate actions.

  • Monitor the load process regularly to identify any failures

  • Check the error messages and logs to determine the root cause of the failure

  • Retry the load operation after fixing the issue, such as data format errors or network connectivity problems

  • Consider using Snowflake's automatic retry feature for transient errors

  • Utilize Snowflake's error handlin...read more

Add your answer

Q34. How do you create a Spring boot application

Ans.

To create a Spring Boot application, use Spring Initializr and configure dependencies and properties.

  • Go to start.spring.io and select the required dependencies and properties

  • Download the generated project and import it into your IDE

  • Add your code and run the application

Add your answer

Q35. Describe different scenarios in managing a large scale database

Ans.

Managing a large scale database involves optimizing performance, ensuring data integrity, and implementing disaster recovery plans.

  • Implementing proper indexing to improve query performance

  • Regularly monitoring and tuning database performance

  • Utilizing sharding or partitioning to distribute data across multiple servers

  • Implementing backup and recovery strategies to prevent data loss

  • Ensuring data security and compliance with regulations

  • Scaling the database infrastructure as needed...read more

Add your answer

Q36. Different kinds of databases and their uses.

Ans.

Different types of databases serve different purposes, such as relational databases for structured data and NoSQL databases for unstructured data.

  • Relational databases: used for structured data and follow a tabular format (e.g. MySQL, PostgreSQL)

  • NoSQL databases: used for unstructured data and provide flexibility in data storage (e.g. MongoDB, Cassandra)

  • Graph databases: used for data with complex relationships (e.g. Neo4j)

  • In-memory databases: store data in main memory for faste...read more

Add your answer

Q37. Tech clarification to determine our tech stuff.

Ans.

Please provide more specific details about the tech requirements for the position.

  • Ask for clarification on the specific technologies and tools required for the role

  • Determine the level of expertise needed for each technology

  • Discuss any potential challenges or limitations with the current tech stack

  • Explore opportunities for implementing new technologies or improving existing ones

Add your answer

Q38. What is the pipes in angular?

Ans.

Pipes in Angular are used for transforming data before displaying it in the view.

  • Pipes are used to format data in Angular templates.

  • They can be used for currency, date, uppercase/lowercase transformations, etc.

  • Custom pipes can also be created for specific data transformations.

  • Pipes are applied using the '|' symbol in template expressions.

Add your answer

Q39. How do microservices communicate?

Ans.

Microservices communicate through lightweight protocols like HTTP, messaging queues, and RPC.

  • HTTP: RESTful APIs are commonly used for communication between microservices.

  • Messaging queues: Services can communicate asynchronously through message brokers like RabbitMQ or Kafka.

  • RPC (Remote Procedure Call): Services can make direct calls to each other using protocols like gRPC.

Add your answer

Q40. Collection vs Collections Interface vs abstract

Ans.

Collection is a single object that groups multiple elements, while Collections is a utility class in Java for working with collections. Interface defines a contract for classes to implement, while abstract class can have both abstract and concrete methods.

  • Collection is a single object that represents a group of objects, like List, Set, Queue, etc.

  • Collections is a utility class in Java that provides static methods for working with collections, like sorting, searching, etc.

  • Inte...read more

Add your answer

Q41. Tell me about different datatypes

Ans.

Different datatypes are used to represent different types of data in programming, such as integers, strings, and booleans.

  • Integers: used to represent whole numbers, such as 1, 2, -5

  • Strings: used to represent text, such as 'hello world'

  • Booleans: used to represent true or false values, such as true or false

Add your answer

Q42. What has to be for a clean code

Ans.

Clean code is readable, maintainable, and follows best practices.

  • Follows consistent naming conventions

  • Has proper indentation and formatting

  • Avoids duplication and unnecessary complexity

  • Has clear and concise comments

  • Follows SOLID principles

  • Has unit tests for critical functionality

Add your answer

Q43. Explain git work flow

Ans.

Git workflow is a process of managing and tracking changes in codebase.

  • Git workflow involves creating branches for new features or bug fixes

  • Changes are made in the branch and then merged back to the main branch

  • Pull requests are used for code review and approval before merging

  • Common workflows include Gitflow, GitHub flow, and GitLab flow

Add your answer

Q44. Write a program about multithreading in java

Ans.

A program demonstrating multithreading in Java

  • Create a class that extends Thread or implements Runnable interface

  • Use the start() method to begin execution of a thread

  • Synchronize shared resources to avoid race conditions

Add your answer

Q45. What is java Hibernate Jpa Jdbc Spring boot

Ans.

Java Hibernate, JPA, JDBC, and Spring Boot are commonly used technologies in Java development for database interaction and application development.

  • Java is a popular programming language used for developing various applications.

  • Hibernate is an ORM (Object-Relational Mapping) framework that simplifies database interactions in Java.

  • JPA (Java Persistence API) is a specification for managing relational data in Java applications.

  • JDBC (Java Database Connectivity) is an API for conne...read more

Add your answer

Q46. What is collections in java?

Ans.

Collections in Java are classes and interfaces that provide a way to store and manipulate groups of objects.

  • Collections framework includes interfaces like List, Set, and Map, along with classes like ArrayList, HashSet, and HashMap.

  • Collections provide methods for adding, removing, and accessing elements in a group.

  • Collections also provide algorithms for sorting, searching, and manipulating groups of objects.

  • Example: List names = new ArrayList<>(); names.add("Alice"); names.add...read more

Add your answer

Q47. What is functional interface?

Ans.

A functional interface is an interface with only one abstract method, used in Java to enable lambda expressions.

  • Functional interfaces can have multiple default or static methods, but only one abstract method.

  • They are used in Java to enable the use of lambda expressions.

  • Examples of functional interfaces in Java include Runnable, Callable, and ActionListener.

Add your answer

Q48. What is method reference?

Ans.

Method reference is a shorthand syntax for lambda expressions to call a method.

  • Method reference is used to refer to a method without invoking it.

  • It can be used to make the code more concise and readable.

  • There are four types of method references: static, instance, constructor, and array constructor references.

Add your answer

Q49. what is you expectation?

Ans.

To lead a team of technical professionals, set clear expectations, provide guidance and support, and ensure successful project delivery.

  • Set clear goals and objectives for the team

  • Communicate expectations clearly and regularly

  • Provide guidance and support to team members

  • Ensure project deadlines are met

  • Encourage collaboration and teamwork

  • Lead by example

Add your answer

Q50. Difference between promise and observables

Ans.

Promises are used for asynchronous operations and return a single value while observables can return multiple values over time.

  • Promises are eager and execute immediately upon creation while observables are lazy and only execute when subscribed to.

  • Promises can only return a single value or an error while observables can return multiple values over time.

  • Observables can be cancelled while promises cannot be cancelled once they are created.

  • Observables have operators that can tran...read more

Add your answer

Q51. What is method overriding

Ans.

Method overriding is a feature in object-oriented programming where a subclass provides a specific implementation of a method that is already provided by its parent class.

  • Occurs in inheritance when a subclass provides a specific implementation of a method that is already provided by its parent class

  • The method in the subclass must have the same name, return type, and parameters as the method in the parent class

  • Allows for polymorphism, where a subclass can define its own unique...read more

Add your answer

Q52. What is filter in spring

Ans.

A filter in Spring is a component that intercepts incoming requests and outgoing responses, allowing for pre-processing and post-processing.

  • Filters are used for tasks such as logging, authentication, authorization, and more

  • Filters can be configured in the Spring application context

  • Examples of filters in Spring include CharacterEncodingFilter, HiddenHttpMethodFilter, and CorsFilter

Add your answer

Q53. Design pattern of all creation pattern

Ans.

Abstract Factory pattern is a design pattern that provides an interface for creating families of related or dependent objects without specifying their concrete classes.

  • Provides an interface to create families of related objects

  • Decouples the client code from the actual implementation classes

  • Promotes code reusability and flexibility

  • Examples: GUI libraries where different components like buttons, text fields, etc. are created using a factory

Add your answer

Q54. default and static method are induced

Ans.

Default and static methods are introduced in Java 8 to provide additional functionality in interfaces.

  • Default methods allow interfaces to have method implementations, reducing the need for abstract classes.

  • Static methods in interfaces can be called using the interface name, similar to static methods in classes.

  • Default methods can be overridden in implementing classes, while static methods cannot be overridden.

  • Example: interface MyInterface { default void myMethod() { System.o...read more

Add your answer

Q55. what is devops and aws

Ans.

DevOps is a software development approach that combines development and operations, while AWS is a cloud computing platform provided by Amazon.

  • DevOps is a cultural and technical approach that aims to bridge the gap between development and operations teams.

  • It emphasizes collaboration, automation, and continuous integration and delivery.

  • AWS (Amazon Web Services) is a comprehensive cloud computing platform that offers a wide range of services like computing power, storage, datab...read more

Add your answer

Q56. Explain internal architecture of hashmap.

Ans.

HashMap is a data structure that stores key-value pairs and uses hashing to efficiently retrieve values.

  • HashMap is implemented using an array of linked lists, where each element in the array is a bucket that can store multiple key-value pairs.

  • When a key-value pair is added to the HashMap, the key is hashed to determine the index in the array where the pair will be stored.

  • If multiple keys hash to the same index, a collision occurs and the key-value pairs are stored in a linked...read more

Add your answer

Q57. What is the expected CTC?

Ans.

The expected CTC depends on various factors such as experience, skills, industry, location, and company size.

  • CTC can vary based on the candidate's level of experience and expertise.

  • Industry standards and company policies also play a significant role in determining the expected CTC.

  • Location can impact the CTC due to cost of living differences.

  • Company size and financial stability may influence the salary offered.

  • Negotiation skills can also affect the final CTC package.

  • For examp...read more

Add your answer

Q58. Difference between List and Tuple?

Ans.

List is mutable, Tuple is immutable in Python.

  • List can be modified after creation, Tuple cannot be modified.

  • List uses square brackets [], Tuple uses parentheses ().

  • List is used for collections of items that may need to be changed, Tuple is used for fixed collections of items.

  • Example: list_example = [1, 2, 3], tuple_example = (4, 5, 6)

Add your answer

Q59. What is CQRS Pattern?

Ans.

CQRS Pattern separates read and write operations in an application.

  • CQRS stands for Command Query Responsibility Segregation.

  • It separates the read and write operations of an application into two different models.

  • Commands are used for write operations, while queries are used for read operations.

  • CQRS helps in achieving better scalability, performance, and maintainability.

  • Example: Using CQRS, an e-commerce application can have separate models for placing orders (write) and viewin...read more

Add your answer

Q60. Explain the Cucumber BDD framework

Ans.

Cucumber is a BDD framework that allows writing test cases in simple English sentences.

  • Uses Gherkin syntax to write feature files in plain English

  • Supports automation testing for behavior-driven development

  • Integrates with various programming languages like Java, Ruby, etc.

  • Helps in collaboration between technical and non-technical team members

Add your answer

Q61. Example: protocols, block diagram

Ans.

Protocols and block diagrams are essential in designing and implementing complex systems.

  • Protocols are a set of rules that govern the communication between different components of a system.

  • Block diagrams are graphical representations of a system that show the flow of information and the relationships between different components.

  • Protocols and block diagrams are used in various fields such as networking, electronics, and software engineering.

  • Examples of protocols include TCP/I...read more

Add your answer

Q62. Different types OOPs and definition

Ans.

Object-Oriented Programming (OOP) is a programming paradigm based on the concept of objects, which can contain data and code.

  • Encapsulation: bundling data and methods that operate on the data into a single unit (object)

  • Inheritance: allows a class to inherit properties and behavior from another class

  • Polymorphism: the ability to present the same interface for different data types

Add your answer

Q63. What is Decorator?

Ans.

Decorator is a design pattern in object-oriented programming that allows behavior to be added to individual objects, either statically or dynamically.

  • Decorator pattern involves a set of decorator classes that are used to wrap concrete components.

  • It allows behavior to be added to individual objects without affecting the behavior of other objects from the same class.

  • Decorators provide a flexible alternative to subclassing for extending functionality.

  • Example: Adding borders, col...read more

Add your answer

Q64. React js hooks and their usage

Ans.

React hooks are functions that allow functional components to use state and lifecycle methods.

  • useState() hook is used to manage state in functional components

  • useEffect() hook is used to manage lifecycle methods in functional components

  • useContext() hook is used to access context in functional components

  • useReducer() hook is used to manage complex state in functional components

  • useCallback() and useMemo() hooks are used for performance optimization

  • Examples: useState() - const [co...read more

Add your answer

Q65. Explain microservice architecture

Ans.

Microservice architecture is an architectural style that structures an application as a collection of loosely coupled services.

  • Each service is self-contained and can be developed, deployed, and scaled independently

  • Services communicate with each other over lightweight protocols like HTTP or messaging queues

  • Each service is responsible for a specific business function

  • Microservices allow for better scalability, flexibility, and resilience compared to monolithic architectures

Add your answer

Q66. Explain about OSPF packet fields

Ans.

OSPF packet fields include source and destination IP addresses, packet type, area ID, checksum, and authentication.

  • OSPF packets are sent using IP protocol 89.

  • The source and destination IP addresses indicate the routers sending and receiving the packet.

  • Packet types include hello, database description, link state request, link state update, and link state acknowledgment.

  • The area ID identifies the OSPF area the packet belongs to.

  • The checksum is used to verify the integrity of th...read more

Add your answer

Q67. What is polymorphism

Ans.

Polymorphism is the ability of a function or method to behave differently based on the object it is acting upon.

  • Polymorphism allows objects of different classes to be treated as objects of a common superclass.

  • It enables a single interface to be used for different data types or classes.

  • Examples include method overloading and method overriding in object-oriented programming.

Add your answer

Q68. What is interceptor

Ans.

An interceptor is a design pattern commonly used in software development to capture and manipulate incoming and outgoing requests.

  • Interceptors can be used for logging, authentication, authorization, error handling, and more

  • In Angular, interceptors can be used to modify HTTP requests before they are sent to the server

  • In Spring framework, interceptors can be used to intercept client requests and server responses

Add your answer

Q69. Best practice and Configuration

Ans.

Best practices and configurations for technical leads

  • Follow industry standards and guidelines

  • Regularly review and update configurations

  • Document configurations and best practices

  • Implement automation for configuration management

  • Ensure security measures are in place

  • Collaborate with team members for input and feedback

Add your answer

Q70. Architecture of the last project.

Ans.

Microservices architecture using Docker containers and Kubernetes for scalability and flexibility.

  • Utilized Docker containers for easy deployment and scaling of services

  • Implemented microservices architecture to break down the application into smaller, manageable components

  • Used Kubernetes for container orchestration and management

  • Ensured high availability and fault tolerance through load balancing and auto-scaling

  • Separated concerns by dividing functionality into separate servic...read more

Add your answer

Q71. Diff between constant and readonly

Ans.

Constants are compile-time constants, while readonly variables can be assigned a value at runtime but cannot be changed after initialization.

  • Constants are declared using the 'const' keyword, while readonly variables are declared using the 'readonly' keyword.

  • Constants are evaluated at compile time, while readonly variables are evaluated at runtime.

  • Constants can only be assigned a value at declaration, while readonly variables can be assigned a value in the constructor.

  • Constant...read more

Add your answer

Q72. Medical writing experience

Ans.

Yes, I have extensive medical writing experience.

  • I have written clinical study reports, protocols, and regulatory documents for pharmaceutical companies.

  • I am familiar with medical terminology and have experience translating complex scientific data into clear and concise language.

  • I have also written patient education materials and articles for medical journals.

  • I am comfortable working with cross-functional teams and collaborating with subject matter experts.

  • Examples of my work...read more

Add your answer

Q73. Streams and task in SNowflake

Ans.

Streams and tasks in Snowflake are used for real-time data processing and scheduling automated tasks.

  • Streams in Snowflake capture changes to data in a table and can be used for real-time data processing

  • Tasks in Snowflake are used for scheduling automated tasks like data loading, data transformation, etc.

  • Streams can be used in combination with tasks to create real-time data pipelines

  • Example: Using a stream to capture changes in a table and a task to load the changed data into ...read more

Add your answer

Q74. Explain Solid principle

Ans.

SOLID is a set of five design principles that help make software designs more understandable, flexible, and maintainable.

  • S - Single Responsibility Principle: A class should have only one reason to change.

  • O - Open/Closed Principle: Software entities should be open for extension but closed for modification.

  • L - Liskov Substitution Principle: Objects of a superclass should be replaceable with objects of its subclasses without affecting the functionality.

  • I - Interface Segregation ...read more

Add your answer

Q75. util class vs interface

Ans.

Util class is a class that contains static methods for common utility functions, while an interface is a contract that defines a set of methods that a class must implement.

  • Util class is used for grouping related static methods together, while an interface is used for defining a contract that classes must adhere to.

  • Util class cannot be instantiated or extended, while an interface can be implemented by multiple classes.

  • Util class is used for code organization and reusability, w...read more

Add your answer

Q76. Explain about IP header

Ans.

IP header is a part of the network layer protocol that contains information about the source and destination of data packets.

  • IP header is added to the beginning of each packet in the network layer.

  • It contains information such as source and destination IP addresses, protocol version, time to live, and checksum.

  • The header length can vary depending on the options included.

  • IP header is used by routers to forward packets to their destination.

  • It is an essential component of the Int...read more

Add your answer

Q77. Hana and ECC difference

Ans.

Hana is an in-memory database while ECC is a traditional database used in SAP systems.

  • Hana is faster than ECC due to its in-memory technology

  • Hana can handle larger amounts of data than ECC

  • Hana has a different data modeling approach than ECC

  • Hana has a different licensing model than ECC

  • Hana is a newer technology than ECC

Add your answer

Q78. Adverse events information

Ans.

Adverse events information refers to the collection and analysis of data related to negative outcomes associated with a particular product or service.

  • Adverse events can include side effects, complications, and injuries.

  • This information is important for identifying potential safety concerns and improving product or service quality.

  • Examples of adverse events include allergic reactions to medication, complications from surgery, and injuries from defective products.

Add your answer

Q79. Internal working of hashmap

Ans.

HashMap is a data structure that stores key-value pairs and uses hashing to quickly retrieve values based on keys.

  • HashMap internally uses an array of linked lists to store key-value pairs.

  • When a key-value pair is added, the key is hashed to determine the index in the array where it will be stored.

  • If multiple keys hash to the same index, a linked list is used to handle collisions.

  • Retrieving a value involves hashing the key to find the correct index and then traversing the link...read more

Add your answer

Q80. open to location change

Ans.

Yes, I am open to location change.

  • I am willing to relocate for the right opportunity.

  • I have experience working in different locations.

  • I am open to exploring new cities and cultures.

Add your answer

Q81. Explain Solid principles

Ans.

SOLID principles are a set of five design principles that help in creating maintainable and scalable software applications.

  • S - Single Responsibility Principle: A class should have only one reason to change.

  • O - Open-Closed Principle: A class should be open for extension but closed for modification.

  • L - Liskov Substitution Principle: Subtypes should be substitutable for their base types.

  • I - Interface Segregation Principle: A client should not be forced to implement interfaces th...read more

Add your answer

Q82. String vs string builder

Ans.

String is immutable while StringBuilder is mutable.

  • String is a final class and cannot be modified once created.

  • StringBuilder is a mutable class and can be modified without creating a new object.

  • String concatenation creates a new String object each time, while StringBuilder is more efficient for frequent modifications.

  • Use String for small, infrequent modifications and StringBuilder for large, frequent modifications.

Add your answer

Q83. diff between str.equals and ==

Ans.

str.equals compares the content of two strings, while == compares the memory address of the strings.

  • str.equals compares the actual content of two strings, while == compares the memory address of the strings.

  • str.equals is a method of the String class in Java, while == is an operator for comparison.

  • Example: String str1 = 'hello'; String str2 = 'hello'; str1.equals(str2) will return true, but str1 == str2 will return false.

Add your answer

Q84. Google cloud dataflow details

Ans.

Google Cloud Dataflow is a fully managed service for stream and batch processing of data.

  • Fully managed service for processing data in real-time or batch mode

  • Supports Apache Beam for defining data processing pipelines

  • Automatically scales resources based on workload

  • Integrates with other Google Cloud services like BigQuery and Pub/Sub

Add your answer

Q85. Apache beam SDK description

Ans.

Apache Beam SDK is a unified programming model for both batch and streaming data processing.

  • Apache Beam SDK allows for defining data processing pipelines in a language-agnostic way.

  • It supports multiple execution engines such as Apache Flink, Apache Spark, and Google Cloud Dataflow.

  • The SDK provides a set of high-level APIs for building data processing pipelines.

  • It enables parallel execution of data processing tasks for efficient and scalable processing.

  • Apache Beam SDK supports...read more

Add your answer

Q86. Ienumerable vs IQuyerable

Ans.

IEnumerable is a simple interface for iterating over a collection, while IQueryable is used for querying data from a data source.

  • IEnumerable is in-memory data manipulation, while IQueryable is for querying data from a database.

  • IEnumerable is suitable for LINQ to Objects, while IQueryable is suitable for LINQ to SQL.

  • IEnumerable is evaluated on the client-side, while IQueryable is evaluated on the database server.

  • IEnumerable is more flexible but less efficient, while IQueryable...read more

Add your answer

Q87. experience in semi conductors

Ans.

I have extensive experience in the semiconductor industry, including design, fabrication, and testing of semiconductor devices.

  • Designed and tested semiconductor devices for various applications

  • Worked on process development and optimization for semiconductor fabrication

  • Experience in semiconductor packaging and assembly

  • Familiarity with industry standards and regulations

  • Collaborated with cross-functional teams to ensure project success

Add your answer

Q88. Write a Sql query

Ans.

Query to retrieve all employees from a table

  • Use SELECT * FROM employees;

  • Replace 'employees' with the actual table name

  • Make sure to include the semicolon at the end

Add your answer

Q89. Detect loop in linked list

Ans.

Use Floyd's Tortoise and Hare algorithm to detect loop in a linked list.

  • Initialize two pointers, slow and fast, at the head of the linked list.

  • Move slow pointer by one step and fast pointer by two steps.

  • If they meet at any point, there is a loop in the linked list.

Add your answer

Q90. Path attributes in bgp

Ans.

Path attributes in BGP are used to provide information about the path a route has taken.

  • Path attributes include AS path, next hop, origin, local preference, etc.

  • AS path shows the AS numbers the route has traversed.

  • Next hop is the IP address to reach the next router.

  • Origin indicates how the route was originated (IGP, EGP, or incomplete).

  • Local preference is used to influence outbound traffic.

  • Other attributes include MED, community, and atomic aggregate.

Add your answer

Q91. Handelling of pipes

Ans.

Handling of pipes involves managing the flow of data between processes in a Unix-based system.

  • Pipes are used to transfer the output of one command as input to another command

  • They are represented by the | symbol in Unix commands

  • Pipes allow for communication between processes without the need for temporary files

  • Example: ls | grep 'file'

  • Example: cat file.txt | grep 'keyword' | wc -l

Add your answer

Q92. Program on String

Ans.

Program to manipulate strings in an array

  • Use loops to iterate through each string in the array

  • Use string methods like split, join, substring, etc. to manipulate the strings

  • Consider edge cases like empty strings or null values in the array

Add your answer
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos

Interview Process at Google

based on 157 interviews
5 Interview rounds
Technical Round - 1
Technical Round - 2
HR Round - 1
HR Round - 2
Personal Interview1 Round
View more
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Technical Lead Interview Questions from Similar Companies

3.8
 • 28 Interview Questions
3.7
 • 20 Interview Questions
3.8
 • 18 Interview Questions
3.8
 • 17 Interview Questions
3.7
 • 17 Interview Questions
3.4
 • 10 Interview Questions
View all
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
70 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter