HCLTech
90+ Google Interview Questions and Answers
Q1. What is the purpose of react and it's latest hooks?
React is a JavaScript library for building user interfaces. React Hooks are a feature introduced in React 16.8 to manage state and lifecycle in functional components.
React is used for creating reusable UI components
React allows for efficient rendering and updating of components
React Hooks provide a way to use state and other React features in functional components
Hooks like useState and useEffect are commonly used in React applications
Q2. How would you design service layer for highly scalable application?
Designing a service layer for a highly scalable application requires careful consideration of architecture and technology choices.
Use a microservices architecture to break down the application into smaller, more manageable components.
Implement load balancing and auto-scaling to ensure that the service layer can handle high traffic volumes.
Choose a technology stack that is well-suited to the specific needs of the application, such as high throughput or low latency.
Implement ca...read more
Q3. What happens if there is finally block inside an exception block?
Finally block will always execute, even if an exception is thrown in the try or catch block.
Finally block is used to execute code that must always run, regardless of whether an exception was thrown or not.
If an exception is thrown in the try or catch block, the finally block will still execute.
Finally block is often used to release resources like file handles, database connections, etc.
Q4. What are different types of joins
Different types of joins are Inner Join, Left Join, Right Join, and Full Outer Join.
Inner Join returns only the matching rows from both tables.
Left Join returns all the rows from the left table and matching rows from the right table.
Right Join returns all the rows from the right table and matching rows from the left table.
Full Outer Join returns all the rows from both tables, with NULL values in the columns where there is no match.
Join types can be combined with other SQL cla...read more
Q5. Write a program to find the names of students against a subject using stream API.
Program to find student names against a subject using stream API
Create a list of students with their subjects
Use stream API to filter the list based on the subject
Map the filtered list to get only the names of students
Collect the names in a list or any other data structure
Return the list of names
Q6. What are the different types of controller in SAP CRM webui?
The different types of controllers in SAP CRM webui include Component Controller, View Controller, Context Controller, and Custom Controller.
Component Controller: Controls the entire component and manages the context data.
View Controller: Controls the layout and rendering of the UI elements.
Context Controller: Manages the context data and communication between controllers.
Custom Controller: Allows for custom logic and functionality to be implemented.
Q7. How to test a printer for checking performance
To test printer performance, check print speed, quality, and connectivity.
Print a test page to check for print speed and quality.
Print a large document to test for any potential jams or errors.
Test connectivity by printing from different devices and checking for any connection issues.
Check ink or toner levels and replace if necessary.
Test different paper types and sizes to ensure compatibility.
Check for any software updates or driver issues.
Perform regular maintenance such as...read more
Q8. Real life scenario for food delivery company For delayed food delivery
In case of delayed food delivery, the food delivery company should take prompt actions to rectify the situation and compensate the customer.
Apologize to the customer for the delay and inconvenience caused.
Offer a discount or a free meal to the customer as compensation.
Ensure that the food is delivered as soon as possible and in good condition.
Investigate the cause of the delay and take measures to prevent it from happening again.
Maintain good communication with the customer t...read more
Q9. Different ways to implement and break Singleton pattern.
Different ways to implement and break Singleton pattern.
Implement: Eager initialization, Lazy initialization, Thread-safe initialization, Bill Pugh Singleton Implementation
Break: Reflection, Serialization/Deserialization, Cloning, Multithreading
Example: Eager initialization - private static final Singleton instance = new Singleton();
Example: Reflection - Constructor
constructor = Singleton.class.getDeclaredConstructor(); constructor.setAccessible(true); Singleton instance2 = ...read more
Q10. What is Redux and Redux purpose?
Redux is a predictable state container for JavaScript apps.
Redux is a library for managing application state
It provides a predictable state container by enforcing a strict unidirectional data flow
Redux can be used with any UI library or framework
It is commonly used with React to manage state in complex applications
Redux allows for easy debugging and testing of state changes
Actions are dispatched to update the state, and reducers handle the updates
Selectors can be used to retr...read more
Q11. What is intern() method of String?
intern() method of String returns a canonical representation of the string object.
The intern() method returns a string that has the same contents as the original string, but is guaranteed to be from a pool of unique strings.
This method is useful when comparing strings for equality as it compares the references instead of the contents.
Example: String s1 = new String("hello"); String s2 = s1.intern(); // s2 will be from the string pool
Q12. What would you do if there is a defect leakage ?
Defect leakage is a serious issue. I would take immediate action to identify the root cause and implement corrective measures.
Analyze the defect leakage data to identify the root cause
Implement corrective measures to fix the issue
Conduct a thorough review of the testing process to prevent future leakage
Communicate the issue and resolution to stakeholders
Track and monitor the effectiveness of the corrective measures
Q13. How did you handled performance testing end to end?
I handled performance testing end to end by conducting thorough analysis, creating test plans, executing tests, analyzing results, and implementing optimizations.
Conducted thorough analysis to identify key performance metrics and testing requirements
Created detailed test plans outlining scenarios, tools, and success criteria
Executed tests using appropriate tools and techniques, monitoring system behavior and performance
Analyzed test results to identify bottlenecks, performanc...read more
Q14. How we can fetch data into view from another view?
Data can be fetched into a view from another view by passing data through a shared ViewModel or using LiveData.
Use a shared ViewModel to hold the data and access it from both views
Use LiveData to observe changes in the data and update the view accordingly
Pass data between views using Intent extras or Bundle
Q15. What is the main purpose of using CRM system?
The main purpose of using CRM system is to manage and analyze customer interactions and data throughout the customer lifecycle.
Centralize customer data for easy access and analysis
Improve customer relationships and satisfaction
Increase sales and marketing effectiveness
Automate repetitive tasks and streamline processes
Track customer interactions and communication history
Q16. Check string nullability using optional class
To check string nullability using optional class, use optional binding to safely unwrap the optional string.
Use if let or guard let statements to safely unwrap the optional string.
If the optional string is nil, the code inside the if or guard statement will not execute.
Example: if let myString = optionalString { //code to execute }
Example: guard let myString = optionalString else { return } //code to execute if optionalString is nil
Q17. Java code to print all the zeros at the end of the array
Java code to print all the zeros at the end of the array
Iterate through the array from the end
Check if the element is '0'
Print the element if it is '0'
Q18. Java code to print the repeated words in the given sentence
Java code to print the repeated words in a sentence
Split the sentence into words using split() method
Create a HashMap to store word frequency
Iterate through the words and update the frequency in the HashMap
Print the words with frequency greater than 1
Q19. Java code to print the repeated letters in the given name/words
Java code to print the repeated letters in a given name/words
Iterate through each character in the input string
Use a HashMap to store the count of each character
Print the characters with count greater than 1
Q20. How to access variables in multi threaded application.
Use synchronization mechanisms like locks, semaphores, or monitors to access variables in multi-threaded applications.
Use synchronized keyword in Java to ensure only one thread can access the variable at a time.
Use locks and mutexes in C++ to protect shared resources.
Use atomic variables in C# to ensure thread safety.
Use thread-safe data structures like ConcurrentHashMap in Java.
Avoid using global variables in multi-threaded applications.
Use thread-local storage to store thre...read more
Q21. What is call ID and CSequence
Call ID and CSequence are used in SIP protocol for identifying and sequencing SIP messages.
Call ID is a unique identifier for a SIP call and is used to match requests and responses.
CSequence is a sequence number for a SIP message and is used to ensure proper sequencing of messages.
Both Call ID and CSequence are important for reliable communication in SIP protocol.
Example: Call ID: 1234567890, CSequence: 1
Q22. What is normalization
Normalization is the process of organizing data in a database to reduce redundancy and improve data integrity.
Normalization involves breaking down a table into smaller tables and defining relationships between them.
It helps to eliminate data redundancy and inconsistencies.
Normalization is achieved through a series of normal forms, such as first normal form (1NF), second normal form (2NF), and so on.
Each normal form has a set of rules that must be followed to ensure data is pr...read more
Q23. Tell me about complete product life cycle with examply
The product life cycle consists of several stages including ideation, development, launch, growth, maturity, and decline.
Ideation: Generating ideas for a new product or improvement.
Development: Designing and creating the product.
Launch: Introducing the product to the market.
Growth: Increasing sales and market share.
Maturity: Product reaches its peak and sales stabilize.
Decline: Sales decline due to market saturation or obsolescence.
Q24. What is the internal working of a HashMap?
HashMap is a data structure that stores key-value pairs and uses hashing to quickly retrieve values based on keys.
HashMap internally uses an array of linked lists to store key-value pairs.
When a key-value pair is added, the key is hashed to determine the index in the array where it will be stored.
If multiple keys hash to the same index, a linked list is used to handle collisions.
To retrieve a value, the key is hashed again to find the corresponding index and then the linked l...read more
Q25. What is reliability testing
Reliability testing is a type of testing that checks the ability of a system to perform consistently under different conditions.
It involves subjecting the system to various stress tests to identify potential failures
It helps in identifying and fixing issues before they occur in real-world scenarios
Examples include load testing, performance testing, and stress testing
Reliability testing is important for ensuring customer satisfaction and avoiding costly downtime
It is often use...read more
Q26. Hashmap vs ConcurrentHashMap Vs SynchronizedMap.
Comparison of HashMap, ConcurrentHashMap, and SynchronizedMap.
HashMap is not thread-safe, ConcurrentHashMap is thread-safe and faster than SynchronizedMap.
ConcurrentHashMap uses a different locking mechanism than SynchronizedMap.
SynchronizedMap uses a single lock for all operations, while ConcurrentHashMap uses multiple locks.
ConcurrentHashMap is suitable for high-concurrency environments.
SynchronizedMap is suitable for low-concurrency environments.
HashMap is suitable for sin...read more
Q27. Difference between ingress and load balancer in Kubernetes
Ingress manages external access to services, while load balancer distributes traffic within the cluster.
Ingress is an API object that manages external access to services in a cluster.
Ingress typically provides HTTP and HTTPS routing.
Load balancer is a service that distributes incoming network traffic across multiple backend services.
Load balancer ensures that no single service is overwhelmed with traffic.
In Kubernetes, LoadBalancer service type provisions a load balancer for ...read more
Q28. What are the components in my working application.
The components in the working application are the frontend, backend, database, and any third-party integrations.
The frontend is responsible for the user interface and user experience.
The backend handles the business logic and communicates with the database.
The database stores and retrieves data.
Third-party integrations may include APIs, libraries, or services used by the application.
Examples of third-party integrations include payment gateways, social media APIs, and analytic...read more
Q29. Previous job oriented technical and current job description.
Previous job: Software Engineer at XYZ. Current job: Technical Lead at ABC.
Previous job involved developing and maintaining web applications using Java and Spring framework.
Current job involves leading a team of developers, designing and implementing software solutions, and ensuring project deadlines are met.
Both jobs require strong technical skills, problem-solving abilities, and effective communication with team members and stakeholders.
Q30. What is difference between agile and SAFe
Agile is a set of principles and values for software development, while SAFe is a framework for scaling agile practices across an organization.
Agile focuses on individuals and interactions over processes and tools, while SAFe emphasizes alignment, collaboration, and delivery at scale.
Agile promotes flexibility and adaptability in responding to change, whereas SAFe provides a structured approach for implementing agile practices in large organizations.
Agile encourages self-orga...read more
Q31. Tell me about product life cycle with example
Product life cycle refers to the stages a product goes through from its introduction to its decline.
Introduction: The product is launched in the market.
Growth: Sales and market share increase as more customers adopt the product.
Maturity: Sales stabilize as the product reaches its peak market penetration.
Decline: Sales decline due to market saturation or the introduction of newer products.
Example: The iPhone product life cycle - introduced in 2007, experienced rapid growth, re...read more
Q32. How to create thread in linux ?
To create a thread in Linux, use the pthread_create() function.
Include the pthread.h header file
Declare a pthread_t variable to hold the thread ID
Call pthread_create() function with the thread ID, attributes, start routine, and arguments
Example: pthread_t tid; pthread_create(&tid, NULL, start_routine, NULL);
Q33. How to hande load failures in Snowflake
Load failures in Snowflake can be handled by monitoring the load process, identifying the root cause, and taking appropriate actions.
Monitor the load process regularly to identify any failures
Check the error messages and logs to determine the root cause of the failure
Retry the load operation after fixing the issue, such as data format errors or network connectivity problems
Consider using Snowflake's automatic retry feature for transient errors
Utilize Snowflake's error handlin...read more
Q34. How do you create a Spring boot application
To create a Spring Boot application, use Spring Initializr and configure dependencies and properties.
Go to start.spring.io and select the required dependencies and properties
Download the generated project and import it into your IDE
Add your code and run the application
Q35. Describe different scenarios in managing a large scale database
Managing a large scale database involves optimizing performance, ensuring data integrity, and implementing disaster recovery plans.
Implementing proper indexing to improve query performance
Regularly monitoring and tuning database performance
Utilizing sharding or partitioning to distribute data across multiple servers
Implementing backup and recovery strategies to prevent data loss
Ensuring data security and compliance with regulations
Scaling the database infrastructure as needed...read more
Q36. Different kinds of databases and their uses.
Different types of databases serve different purposes, such as relational databases for structured data and NoSQL databases for unstructured data.
Relational databases: used for structured data and follow a tabular format (e.g. MySQL, PostgreSQL)
NoSQL databases: used for unstructured data and provide flexibility in data storage (e.g. MongoDB, Cassandra)
Graph databases: used for data with complex relationships (e.g. Neo4j)
In-memory databases: store data in main memory for faste...read more
Q37. Tech clarification to determine our tech stuff.
Please provide more specific details about the tech requirements for the position.
Ask for clarification on the specific technologies and tools required for the role
Determine the level of expertise needed for each technology
Discuss any potential challenges or limitations with the current tech stack
Explore opportunities for implementing new technologies or improving existing ones
Q38. What is the pipes in angular?
Pipes in Angular are used for transforming data before displaying it in the view.
Pipes are used to format data in Angular templates.
They can be used for currency, date, uppercase/lowercase transformations, etc.
Custom pipes can also be created for specific data transformations.
Pipes are applied using the '|' symbol in template expressions.
Q39. How do microservices communicate?
Microservices communicate through lightweight protocols like HTTP, messaging queues, and RPC.
HTTP: RESTful APIs are commonly used for communication between microservices.
Messaging queues: Services can communicate asynchronously through message brokers like RabbitMQ or Kafka.
RPC (Remote Procedure Call): Services can make direct calls to each other using protocols like gRPC.
Q40. Collection vs Collections Interface vs abstract
Collection is a single object that groups multiple elements, while Collections is a utility class in Java for working with collections. Interface defines a contract for classes to implement, while abstract class can have both abstract and concrete methods.
Collection is a single object that represents a group of objects, like List, Set, Queue, etc.
Collections is a utility class in Java that provides static methods for working with collections, like sorting, searching, etc.
Inte...read more
Q41. Tell me about different datatypes
Different datatypes are used to represent different types of data in programming, such as integers, strings, and booleans.
Integers: used to represent whole numbers, such as 1, 2, -5
Strings: used to represent text, such as 'hello world'
Booleans: used to represent true or false values, such as true or false
Q42. What has to be for a clean code
Clean code is readable, maintainable, and follows best practices.
Follows consistent naming conventions
Has proper indentation and formatting
Avoids duplication and unnecessary complexity
Has clear and concise comments
Follows SOLID principles
Has unit tests for critical functionality
Q43. Explain git work flow
Git workflow is a process of managing and tracking changes in codebase.
Git workflow involves creating branches for new features or bug fixes
Changes are made in the branch and then merged back to the main branch
Pull requests are used for code review and approval before merging
Common workflows include Gitflow, GitHub flow, and GitLab flow
Q44. Write a program about multithreading in java
A program demonstrating multithreading in Java
Create a class that extends Thread or implements Runnable interface
Use the start() method to begin execution of a thread
Synchronize shared resources to avoid race conditions
Q45. What is java Hibernate Jpa Jdbc Spring boot
Java Hibernate, JPA, JDBC, and Spring Boot are commonly used technologies in Java development for database interaction and application development.
Java is a popular programming language used for developing various applications.
Hibernate is an ORM (Object-Relational Mapping) framework that simplifies database interactions in Java.
JPA (Java Persistence API) is a specification for managing relational data in Java applications.
JDBC (Java Database Connectivity) is an API for conne...read more
Q46. What is collections in java?
Collections in Java are classes and interfaces that provide a way to store and manipulate groups of objects.
Collections framework includes interfaces like List, Set, and Map, along with classes like ArrayList, HashSet, and HashMap.
Collections provide methods for adding, removing, and accessing elements in a group.
Collections also provide algorithms for sorting, searching, and manipulating groups of objects.
Example: List
names = new ArrayList<>(); names.add("Alice"); names.add...read more
Q47. What is functional interface?
A functional interface is an interface with only one abstract method, used in Java to enable lambda expressions.
Functional interfaces can have multiple default or static methods, but only one abstract method.
They are used in Java to enable the use of lambda expressions.
Examples of functional interfaces in Java include Runnable, Callable, and ActionListener.
Q48. What is method reference?
Method reference is a shorthand syntax for lambda expressions to call a method.
Method reference is used to refer to a method without invoking it.
It can be used to make the code more concise and readable.
There are four types of method references: static, instance, constructor, and array constructor references.
Q49. what is you expectation?
To lead a team of technical professionals, set clear expectations, provide guidance and support, and ensure successful project delivery.
Set clear goals and objectives for the team
Communicate expectations clearly and regularly
Provide guidance and support to team members
Ensure project deadlines are met
Encourage collaboration and teamwork
Lead by example
Q50. Difference between promise and observables
Promises are used for asynchronous operations and return a single value while observables can return multiple values over time.
Promises are eager and execute immediately upon creation while observables are lazy and only execute when subscribed to.
Promises can only return a single value or an error while observables can return multiple values over time.
Observables can be cancelled while promises cannot be cancelled once they are created.
Observables have operators that can tran...read more
Q51. What is method overriding
Method overriding is a feature in object-oriented programming where a subclass provides a specific implementation of a method that is already provided by its parent class.
Occurs in inheritance when a subclass provides a specific implementation of a method that is already provided by its parent class
The method in the subclass must have the same name, return type, and parameters as the method in the parent class
Allows for polymorphism, where a subclass can define its own unique...read more
Q52. What is filter in spring
A filter in Spring is a component that intercepts incoming requests and outgoing responses, allowing for pre-processing and post-processing.
Filters are used for tasks such as logging, authentication, authorization, and more
Filters can be configured in the Spring application context
Examples of filters in Spring include CharacterEncodingFilter, HiddenHttpMethodFilter, and CorsFilter
Q53. Design pattern of all creation pattern
Abstract Factory pattern is a design pattern that provides an interface for creating families of related or dependent objects without specifying their concrete classes.
Provides an interface to create families of related objects
Decouples the client code from the actual implementation classes
Promotes code reusability and flexibility
Examples: GUI libraries where different components like buttons, text fields, etc. are created using a factory
Q54. default and static method are induced
Default and static methods are introduced in Java 8 to provide additional functionality in interfaces.
Default methods allow interfaces to have method implementations, reducing the need for abstract classes.
Static methods in interfaces can be called using the interface name, similar to static methods in classes.
Default methods can be overridden in implementing classes, while static methods cannot be overridden.
Example: interface MyInterface { default void myMethod() { System.o...read more
Q55. what is devops and aws
DevOps is a software development approach that combines development and operations, while AWS is a cloud computing platform provided by Amazon.
DevOps is a cultural and technical approach that aims to bridge the gap between development and operations teams.
It emphasizes collaboration, automation, and continuous integration and delivery.
AWS (Amazon Web Services) is a comprehensive cloud computing platform that offers a wide range of services like computing power, storage, datab...read more
Q56. Explain internal architecture of hashmap.
HashMap is a data structure that stores key-value pairs and uses hashing to efficiently retrieve values.
HashMap is implemented using an array of linked lists, where each element in the array is a bucket that can store multiple key-value pairs.
When a key-value pair is added to the HashMap, the key is hashed to determine the index in the array where the pair will be stored.
If multiple keys hash to the same index, a collision occurs and the key-value pairs are stored in a linked...read more
Q57. What is the expected CTC?
The expected CTC depends on various factors such as experience, skills, industry, location, and company size.
CTC can vary based on the candidate's level of experience and expertise.
Industry standards and company policies also play a significant role in determining the expected CTC.
Location can impact the CTC due to cost of living differences.
Company size and financial stability may influence the salary offered.
Negotiation skills can also affect the final CTC package.
For examp...read more
Q58. Difference between List and Tuple?
List is mutable, Tuple is immutable in Python.
List can be modified after creation, Tuple cannot be modified.
List uses square brackets [], Tuple uses parentheses ().
List is used for collections of items that may need to be changed, Tuple is used for fixed collections of items.
Example: list_example = [1, 2, 3], tuple_example = (4, 5, 6)
Q59. What is CQRS Pattern?
CQRS Pattern separates read and write operations in an application.
CQRS stands for Command Query Responsibility Segregation.
It separates the read and write operations of an application into two different models.
Commands are used for write operations, while queries are used for read operations.
CQRS helps in achieving better scalability, performance, and maintainability.
Example: Using CQRS, an e-commerce application can have separate models for placing orders (write) and viewin...read more
Q60. Explain the Cucumber BDD framework
Cucumber is a BDD framework that allows writing test cases in simple English sentences.
Uses Gherkin syntax to write feature files in plain English
Supports automation testing for behavior-driven development
Integrates with various programming languages like Java, Ruby, etc.
Helps in collaboration between technical and non-technical team members
Q61. Example: protocols, block diagram
Protocols and block diagrams are essential in designing and implementing complex systems.
Protocols are a set of rules that govern the communication between different components of a system.
Block diagrams are graphical representations of a system that show the flow of information and the relationships between different components.
Protocols and block diagrams are used in various fields such as networking, electronics, and software engineering.
Examples of protocols include TCP/I...read more
Q62. Different types OOPs and definition
Object-Oriented Programming (OOP) is a programming paradigm based on the concept of objects, which can contain data and code.
Encapsulation: bundling data and methods that operate on the data into a single unit (object)
Inheritance: allows a class to inherit properties and behavior from another class
Polymorphism: the ability to present the same interface for different data types
Q63. What is Decorator?
Decorator is a design pattern in object-oriented programming that allows behavior to be added to individual objects, either statically or dynamically.
Decorator pattern involves a set of decorator classes that are used to wrap concrete components.
It allows behavior to be added to individual objects without affecting the behavior of other objects from the same class.
Decorators provide a flexible alternative to subclassing for extending functionality.
Example: Adding borders, col...read more
Q64. React js hooks and their usage
React hooks are functions that allow functional components to use state and lifecycle methods.
useState() hook is used to manage state in functional components
useEffect() hook is used to manage lifecycle methods in functional components
useContext() hook is used to access context in functional components
useReducer() hook is used to manage complex state in functional components
useCallback() and useMemo() hooks are used for performance optimization
Examples: useState() - const [co...read more
Q65. Explain microservice architecture
Microservice architecture is an architectural style that structures an application as a collection of loosely coupled services.
Each service is self-contained and can be developed, deployed, and scaled independently
Services communicate with each other over lightweight protocols like HTTP or messaging queues
Each service is responsible for a specific business function
Microservices allow for better scalability, flexibility, and resilience compared to monolithic architectures
Q66. Explain about OSPF packet fields
OSPF packet fields include source and destination IP addresses, packet type, area ID, checksum, and authentication.
OSPF packets are sent using IP protocol 89.
The source and destination IP addresses indicate the routers sending and receiving the packet.
Packet types include hello, database description, link state request, link state update, and link state acknowledgment.
The area ID identifies the OSPF area the packet belongs to.
The checksum is used to verify the integrity of th...read more
Q67. What is polymorphism
Polymorphism is the ability of a function or method to behave differently based on the object it is acting upon.
Polymorphism allows objects of different classes to be treated as objects of a common superclass.
It enables a single interface to be used for different data types or classes.
Examples include method overloading and method overriding in object-oriented programming.
Q68. What is interceptor
An interceptor is a design pattern commonly used in software development to capture and manipulate incoming and outgoing requests.
Interceptors can be used for logging, authentication, authorization, error handling, and more
In Angular, interceptors can be used to modify HTTP requests before they are sent to the server
In Spring framework, interceptors can be used to intercept client requests and server responses
Q69. Best practice and Configuration
Best practices and configurations for technical leads
Follow industry standards and guidelines
Regularly review and update configurations
Document configurations and best practices
Implement automation for configuration management
Ensure security measures are in place
Collaborate with team members for input and feedback
Q70. Architecture of the last project.
Microservices architecture using Docker containers and Kubernetes for scalability and flexibility.
Utilized Docker containers for easy deployment and scaling of services
Implemented microservices architecture to break down the application into smaller, manageable components
Used Kubernetes for container orchestration and management
Ensured high availability and fault tolerance through load balancing and auto-scaling
Separated concerns by dividing functionality into separate servic...read more
Q71. Diff between constant and readonly
Constants are compile-time constants, while readonly variables can be assigned a value at runtime but cannot be changed after initialization.
Constants are declared using the 'const' keyword, while readonly variables are declared using the 'readonly' keyword.
Constants are evaluated at compile time, while readonly variables are evaluated at runtime.
Constants can only be assigned a value at declaration, while readonly variables can be assigned a value in the constructor.
Constant...read more
Q72. Medical writing experience
Yes, I have extensive medical writing experience.
I have written clinical study reports, protocols, and regulatory documents for pharmaceutical companies.
I am familiar with medical terminology and have experience translating complex scientific data into clear and concise language.
I have also written patient education materials and articles for medical journals.
I am comfortable working with cross-functional teams and collaborating with subject matter experts.
Examples of my work...read more
Q73. Streams and task in SNowflake
Streams and tasks in Snowflake are used for real-time data processing and scheduling automated tasks.
Streams in Snowflake capture changes to data in a table and can be used for real-time data processing
Tasks in Snowflake are used for scheduling automated tasks like data loading, data transformation, etc.
Streams can be used in combination with tasks to create real-time data pipelines
Example: Using a stream to capture changes in a table and a task to load the changed data into ...read more
Q74. Explain Solid principle
SOLID is a set of five design principles that help make software designs more understandable, flexible, and maintainable.
S - Single Responsibility Principle: A class should have only one reason to change.
O - Open/Closed Principle: Software entities should be open for extension but closed for modification.
L - Liskov Substitution Principle: Objects of a superclass should be replaceable with objects of its subclasses without affecting the functionality.
I - Interface Segregation ...read more
Q75. util class vs interface
Util class is a class that contains static methods for common utility functions, while an interface is a contract that defines a set of methods that a class must implement.
Util class is used for grouping related static methods together, while an interface is used for defining a contract that classes must adhere to.
Util class cannot be instantiated or extended, while an interface can be implemented by multiple classes.
Util class is used for code organization and reusability, w...read more
Q76. Explain about IP header
IP header is a part of the network layer protocol that contains information about the source and destination of data packets.
IP header is added to the beginning of each packet in the network layer.
It contains information such as source and destination IP addresses, protocol version, time to live, and checksum.
The header length can vary depending on the options included.
IP header is used by routers to forward packets to their destination.
It is an essential component of the Int...read more
Q77. Hana and ECC difference
Hana is an in-memory database while ECC is a traditional database used in SAP systems.
Hana is faster than ECC due to its in-memory technology
Hana can handle larger amounts of data than ECC
Hana has a different data modeling approach than ECC
Hana has a different licensing model than ECC
Hana is a newer technology than ECC
Q78. Adverse events information
Adverse events information refers to the collection and analysis of data related to negative outcomes associated with a particular product or service.
Adverse events can include side effects, complications, and injuries.
This information is important for identifying potential safety concerns and improving product or service quality.
Examples of adverse events include allergic reactions to medication, complications from surgery, and injuries from defective products.
Q79. Internal working of hashmap
HashMap is a data structure that stores key-value pairs and uses hashing to quickly retrieve values based on keys.
HashMap internally uses an array of linked lists to store key-value pairs.
When a key-value pair is added, the key is hashed to determine the index in the array where it will be stored.
If multiple keys hash to the same index, a linked list is used to handle collisions.
Retrieving a value involves hashing the key to find the correct index and then traversing the link...read more
Q80. open to location change
Yes, I am open to location change.
I am willing to relocate for the right opportunity.
I have experience working in different locations.
I am open to exploring new cities and cultures.
Q81. Explain Solid principles
SOLID principles are a set of five design principles that help in creating maintainable and scalable software applications.
S - Single Responsibility Principle: A class should have only one reason to change.
O - Open-Closed Principle: A class should be open for extension but closed for modification.
L - Liskov Substitution Principle: Subtypes should be substitutable for their base types.
I - Interface Segregation Principle: A client should not be forced to implement interfaces th...read more
Q82. String vs string builder
String is immutable while StringBuilder is mutable.
String is a final class and cannot be modified once created.
StringBuilder is a mutable class and can be modified without creating a new object.
String concatenation creates a new String object each time, while StringBuilder is more efficient for frequent modifications.
Use String for small, infrequent modifications and StringBuilder for large, frequent modifications.
Q83. diff between str.equals and ==
str.equals compares the content of two strings, while == compares the memory address of the strings.
str.equals compares the actual content of two strings, while == compares the memory address of the strings.
str.equals is a method of the String class in Java, while == is an operator for comparison.
Example: String str1 = 'hello'; String str2 = 'hello'; str1.equals(str2) will return true, but str1 == str2 will return false.
Q84. Google cloud dataflow details
Google Cloud Dataflow is a fully managed service for stream and batch processing of data.
Fully managed service for processing data in real-time or batch mode
Supports Apache Beam for defining data processing pipelines
Automatically scales resources based on workload
Integrates with other Google Cloud services like BigQuery and Pub/Sub
Q85. Apache beam SDK description
Apache Beam SDK is a unified programming model for both batch and streaming data processing.
Apache Beam SDK allows for defining data processing pipelines in a language-agnostic way.
It supports multiple execution engines such as Apache Flink, Apache Spark, and Google Cloud Dataflow.
The SDK provides a set of high-level APIs for building data processing pipelines.
It enables parallel execution of data processing tasks for efficient and scalable processing.
Apache Beam SDK supports...read more
Q86. Ienumerable vs IQuyerable
IEnumerable is a simple interface for iterating over a collection, while IQueryable is used for querying data from a data source.
IEnumerable is in-memory data manipulation, while IQueryable is for querying data from a database.
IEnumerable is suitable for LINQ to Objects, while IQueryable is suitable for LINQ to SQL.
IEnumerable is evaluated on the client-side, while IQueryable is evaluated on the database server.
IEnumerable is more flexible but less efficient, while IQueryable...read more
Q87. experience in semi conductors
I have extensive experience in the semiconductor industry, including design, fabrication, and testing of semiconductor devices.
Designed and tested semiconductor devices for various applications
Worked on process development and optimization for semiconductor fabrication
Experience in semiconductor packaging and assembly
Familiarity with industry standards and regulations
Collaborated with cross-functional teams to ensure project success
Q88. Write a Sql query
Query to retrieve all employees from a table
Use SELECT * FROM employees;
Replace 'employees' with the actual table name
Make sure to include the semicolon at the end
Q89. Detect loop in linked list
Use Floyd's Tortoise and Hare algorithm to detect loop in a linked list.
Initialize two pointers, slow and fast, at the head of the linked list.
Move slow pointer by one step and fast pointer by two steps.
If they meet at any point, there is a loop in the linked list.
Q90. Path attributes in bgp
Path attributes in BGP are used to provide information about the path a route has taken.
Path attributes include AS path, next hop, origin, local preference, etc.
AS path shows the AS numbers the route has traversed.
Next hop is the IP address to reach the next router.
Origin indicates how the route was originated (IGP, EGP, or incomplete).
Local preference is used to influence outbound traffic.
Other attributes include MED, community, and atomic aggregate.
Q91. Handelling of pipes
Handling of pipes involves managing the flow of data between processes in a Unix-based system.
Pipes are used to transfer the output of one command as input to another command
They are represented by the | symbol in Unix commands
Pipes allow for communication between processes without the need for temporary files
Example: ls | grep 'file'
Example: cat file.txt | grep 'keyword' | wc -l
Q92. Program on String
Program to manipulate strings in an array
Use loops to iterate through each string in the array
Use string methods like split, join, substring, etc. to manipulate the strings
Consider edge cases like empty strings or null values in the array
Top HR Questions asked in Google
Interview Process at Google
Top Technical Lead Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month