HCLTech
1500+ Interview Questions and Answers
Q1. What is IP address and how many classes are there in IPv4 addressing mode and what are there ranges?
IP address is a unique identifier assigned to devices on a network. There are 4 classes in IPv4 addressing mode with different ranges.
IP address is a numerical label assigned to each device on a network
IPv4 addressing mode has 4 classes: A, B, C, and D
Class A ranges from 1.0.0.0 to 126.0.0.0
Class B ranges from 128.0.0.0 to 191.255.0.0
Class C ranges from 192.0.0.0 to 223.255.255.0
Class D is reserved for multicast addresses
Q2. Have you heard about OSI reference model? How many layers are there in OSI model? Explain any 3 layers.
Answering about OSI reference model and its layers
OSI reference model has 7 layers
Physical layer deals with physical transmission of data
Data link layer provides error-free transfer of data
Network layer handles routing and logical addressing
Q3. What is APIPA? WHAT IS SUBNETMASK? DIFFERENCE BETWEEB IPv4 and IPv6. How many types of os installation? What is BIOS AND what is use of CMOS BATTARY? WHST IS HDD and how many types of HDD? How to shot SMPS AND ...
read moreA set of technical questions related to desktop support engineering.
APIPA is Automatic Private IP Addressing used when DHCP server is not available.
Subnet mask is used to divide an IP address into network and host portions.
IPv4 uses 32-bit addresses while IPv6 uses 128-bit addresses.
There are two types of OS installation: clean installation and upgrade installation.
BIOS is a firmware that initializes hardware during bootup. CMOS battery is used to power the BIOS settings.
HDD ...read more
Nth term of Fibonacci series F(n), where F(n) is a function, is calculated using the following formula -
F(n) = F(n-1) + F(n-2), Where, F(1) = F(2) = 1
Provided N you have to find out the ...read more
You are given a string (STR) of length N, consisting of only the lower case English alphabet.
Your task is to remove all the duplicate occurrences of characters in the string.
For E...read more
Given an array with N elements, the task is to reverse all the array elements and print the reversed array.
Input Format:
The first line contains an integer N representing the size of the array...read more
Q7. Why you choose Machine Learning (during Workshop) ?
I chose Machine Learning during the workshop because of its potential to solve complex problems and make predictions.
I was fascinated by the idea of training machines to learn from data and make predictions
I saw the potential of Machine Learning in solving complex problems that traditional programming couldn't
I was impressed by the real-world applications of Machine Learning, such as image recognition and natural language processing
Q8. Diffrence between router and switch? Differnce between TCP AND UDP? what is port no. Of SMTP AND POP3? What is Printer? How to add new printer? What is BSOD? HOW to fix it? How to take backup of data in outlook...
read moreQuestions related to networking and technical support.
Router connects multiple networks and switches connect devices within a network.
TCP is a connection-oriented protocol while UDP is connectionless.
SMTP uses port number 25 and POP3 uses port number 110.
Printer is a device that produces a hard copy of digital documents.
To add a new printer, go to Control Panel > Devices and Printers > Add a Printer.
BSOD (Blue Screen of Death) is an error screen displayed on Windows systems.
T...read more
You are given a 2-dimensional array/list having N rows and M columns, which is filled with ones(1) and zeroes(0). 1 signifies land, and 0 signifies water.
A cell is said to be connected to...read more
Q10. What is ITIL? What is difference between Incident and service request?
ITIL is a framework for IT service management. Incident is an unplanned interruption while service request is a planned request.
ITIL stands for Information Technology Infrastructure Library
It is a framework for IT service management
It provides guidelines for delivering IT services efficiently and effectively
Incident is an unplanned interruption to an IT service or a reduction in the quality of an IT service
Service request is a formal request from a user for something to be pr...read more
Q11. What is final keyword? Differentiate between final and static.
The final keyword is used in Java to indicate that a variable, method, or class cannot be changed or overridden.
Final variables cannot be reassigned once initialized.
Final methods cannot be overridden in subclasses.
Final classes cannot be extended by other classes.
Static variables are shared among all instances of a class.
Static methods can be called without creating an instance of the class.
Q12. what's difference between server.transfer and Response.redirect
Difference between server.transfer and Response.redirect
Server.Transfer transfers control to another page on the server without the client knowing
Response.Redirect sends a message to the client to redirect to another page
Server.Transfer is faster and more efficient than Response.Redirect
Server.Transfer can only be used within the same application, while Response.Redirect can be used to redirect to any URL
Q13. What is the purpose of react and it's latest hooks?
React is a JavaScript library for building user interfaces. React Hooks are a feature introduced in React 16.8 to manage state and lifecycle in functional components.
React is used for creating reusable UI components
React allows for efficient rendering and updating of components
React Hooks provide a way to use state and other React features in functional components
Hooks like useState and useEffect are commonly used in React applications
Q14. Do you know what is BSOD and how to resolve it?
BSOD stands for Blue Screen of Death. It is an error screen displayed on Windows operating systems when a critical system error occurs.
BSOD is a stop error screen that appears when the Windows operating system encounters a fatal system error.
It is usually caused by hardware or driver issues, software conflicts, or system file corruption.
To resolve BSOD, one can try restarting the computer, updating drivers, running hardware diagnostics, or performing a system restore.
Examples...read more
Q15. Oops Difference between classes and interfaces, use of getter and setters, instance variable vs local variable, encapsulation, do multiple catch block exist, use of final keyword, stringbuffer vs stringbuilder,...
read moreA software engineer interview question covering various Java concepts.
Classes are blueprints for objects, while interfaces define a set of methods that a class must implement.
Getter and setter methods are used to access and modify the values of instance variables.
Instance variables are declared within a class and are accessible throughout the class, while local variables are declared within a method and are only accessible within that method.
Encapsulation is the practice of h...read more
Q16. What is Active Directory and What are its uses?
Active Directory is a directory service that stores information about network resources and enables centralized management.
Active Directory is used to manage and organize users, computers, and other network resources in a Windows domain.
It provides authentication and authorization services, allowing users to access resources based on their permissions.
Active Directory enables single sign-on, where users can log in once and access multiple resources without re-authentication.
I...read more
Q17. What is the difference between Abstarct Class and Interface ?
Abstract class can have implementation while interface cannot. A class can implement multiple interfaces but can extend only one abstract class.
Abstract class can have constructors while interface cannot.
Abstract class can have instance variables while interface cannot.
Abstract class can have non-abstract methods while interface cannot.
A class implementing an interface must implement all its methods while it can choose to implement only some methods of an abstract class.
An ab...read more
What motivates you?
What are your hobbies? or What are you passionate about?
What are your biggest achievements till date?
Q19. What is JDK JRE JVM ? Java8 features
JDK is Java Development Kit, JRE is Java Runtime Environment, and JVM is Java Virtual Machine. Java8 features include lambda expressions, streams, and default methods.
JDK is a software development kit that provides tools for developing, debugging, and monitoring Java applications.
JRE is a runtime environment that allows running Java applications. It includes JVM and necessary libraries.
JVM is a virtual machine that executes Java bytecode. It provides platform independence and...read more
Q20. What is the difference between C,Java?
C is a procedural language while Java is an object-oriented language.
C is a low-level language while Java is a high-level language.
C requires manual memory management while Java has automatic garbage collection.
Java is platform-independent while C is platform-dependent.
Java has built-in support for multithreading while C does not.
Java has a larger standard library compared to C.
C is commonly used for system programming while Java is commonly used for web and mobile applicatio...read more
Q21. What is outlook?, how to configure outlook?
Outlook is a personal information manager from Microsoft used for email, calendar, contacts, and tasks.
Open Outlook and click on File > Add Account
Enter your email address and password
Follow the prompts to complete the setup
Configure server settings if necessary
Test the account to ensure it is working properly
Q22. Do you know about ticketing tools?
Yes, I am familiar with ticketing tools.
I have experience using ticketing tools such as ServiceNow and JIRA.
I understand how to create, update, and close tickets.
I am able to prioritize tickets based on urgency and impact.
I am familiar with using ticketing tools to track and report on service desk metrics.
Q23. Written: (Data structures) 1. write a c pgm to insert a node at the end, at the begning, in the middle of a linked list 2. write a c pgm to delete a node from the end, from the begining and from the middle of t...
read moreInterview questions for Senior Engineer position on data structures and memory management.
Write C programs to insert and delete nodes at the beginning, end, and middle of a linked list.
Understand the differences between singly and doubly linked lists.
Explain what segmentation fault is and how it occurs.
Differentiate between malloc and calloc functions.
Define memory leak and how it can be prevented.
Understand the XOR logic and its applications in linked lists.
Explain null and ...read more
Q24. What is best link of OMP route Internet or MPLS?
The best link of OMP route depends on the specific needs and requirements of the network.
Internet may be a better option for cost-effectiveness and flexibility, but MPLS may offer better reliability and security.
Consider factors such as bandwidth, latency, traffic volume, and application requirements.
Evaluate the pros and cons of each option before making a decision.
For example, if the network requires low latency and high reliability, MPLS may be the better choice.
On the oth...read more
Q25. What is Active Directory? How do we manage role from active directory
Active Directory is a Microsoft service that manages network resources and user access.
Active Directory is used to manage user accounts, computers, and other network resources.
It allows for centralized authentication and authorization for users and computers in a network.
Roles can be managed through Active Directory by assigning users to specific groups with corresponding permissions.
Examples of roles that can be managed through Active Directory include domain administrators,...read more
Q26. Name and Explain types of Network?
Types of networks include LAN, WAN, MAN, WLAN, PAN, SAN, CAN, and VPN.
LAN (Local Area Network) - a network that connects devices within a limited area
WAN (Wide Area Network) - a network that connects devices over a large geographical area
MAN (Metropolitan Area Network) - a network that connects devices within a city or metropolitan area
WLAN (Wireless Local Area Network) - a LAN that uses wireless connections
PAN (Personal Area Network) - a network that connects devices within ...read more
Q27. How SharePoint search is working and how we can define search architecture?
SharePoint search is a powerful tool that allows users to find information within SharePoint sites.
SharePoint search uses a combination of crawling, indexing, and querying to retrieve search results.
The search architecture in SharePoint can be defined by configuring search components such as crawl components, content sources, and search scopes.
Crawling is the process of gathering information from content sources, such as SharePoint sites, file shares, or external websites.
Ind...read more
Q28. How we can find IP address of a system?
To find the IP address of a system, use the command prompt or network settings.
Open command prompt and type 'ipconfig' to see the IP address
Go to network settings and click on 'Properties' to see the IP address
Use a network scanner tool to find IP addresses of all devices on the network
Q29. Which BGP path attributes are used to manipulate the ingress traffic and how traffic is transit from one AS to another AS via 3rd AS?
BGP path attributes used to manipulate ingress traffic and transit via 3rd AS.
AS Path attribute is used to manipulate ingress traffic by adding or removing AS numbers.
Local Preference attribute is used to influence the path selection within the same AS.
MED (Multi-Exit Discriminator) attribute is used to influence the path selection between different ASes.
Communities attribute is used to tag routes and influence the path selection in a specific way.
Transit traffic via 3rd AS c...read more
Q30. 5. In certain condition you are not able to achieve the target of your company within timeline for which project is getting planned what will you do?
If unable to achieve company target within timeline, I will take corrective actions and communicate with stakeholders.
Analyze the reasons for not achieving the target
Identify the corrective actions required
Communicate with stakeholders about the situation and the plan of action
Re-plan the project timeline if necessary
Ensure that the revised plan is achievable and realistic
Q31. Do you how to create and manage Users and Groups?
Yes, I know how to create and manage Users and Groups.
To create a user, use the appropriate command or tool provided by the operating system or directory service.
To manage users, you can modify their properties, reset passwords, enable or disable accounts, and assign permissions.
To create a group, use the command or tool provided by the operating system or directory service.
To manage groups, you can add or remove members, assign permissions, and modify group properties.
Exampl...read more
Q32. What is Active Directory? Difference between MDM and MAM. What do you know about Microsoft Intune? How does Azure Active directory work? What is Exchange Active Sync
Active Directory is a Microsoft service that manages user accounts and permissions. MDM and MAM are mobile device management and mobile application management. Microsoft Intune is a cloud-based MDM/MAM solution. Azure Active Directory is a cloud-based identity and access management service. Exchange Active Sync is a protocol used to synchronize email, contacts, and calendar data between servers and mobile devices.
Active Directory manages user accounts and permissions
MDM manag...read more
Q33. What are the features of Solar wind which you are aware of?
Solar wind is a stream of charged particles released from the upper atmosphere of the Sun.
Solar wind is composed of electrons, protons, and alpha particles.
It can have speeds ranging from 250 to 800 km/s.
Solar wind can cause auroras and geomagnetic storms on Earth.
It can also affect satellite and spacecraft operations.
Solar wind is influenced by the Sun's magnetic field and can vary in intensity.
It is a key factor in space weather and space exploration.
Q34. What is difference between microcontroller and microprocessor?
Microcontroller is a single chip computer with on-chip memory and peripherals, while microprocessor is a CPU only.
Microcontroller has on-chip memory and peripherals, while microprocessor requires external memory and peripherals.
Microcontroller is used in embedded systems, while microprocessor is used in general-purpose computing.
Examples of microcontrollers include Arduino, PIC, and AVR, while examples of microprocessors include Intel Pentium, AMD Ryzen, and ARM Cortex.
Microc...read more
Q35. How did you manage the software release and deployment
I managed software release and deployment by following a structured process and ensuring clear communication with all stakeholders.
Created a detailed release plan with timelines and milestones
Conducted thorough testing and quality assurance before deployment
Coordinated with development, operations, and support teams
Communicated progress and any issues to stakeholders
Implemented rollback procedures in case of any issues
Ensured proper documentation and knowledge transfer
Continu...read more
Q36. Spring boot: Various Annotations, Difference b/w @RestController vs @Controller , @Bean vs @Component, @RequestMapping vs @GetMapping,
Explaining various Spring Boot annotations and their differences.
RestController vs Controller: RestController is used for RESTful web services while Controller is used for traditional web applications.
Bean vs Component: Bean is used to define a single object while Component is used to define a class as a Spring-managed component.
RequestMapping vs GetMapping: RequestMapping is used to map HTTP requests while GetMapping is used specifically for GET requests.
Q37. 3. How to enter if and else at the same time
It is not possible to enter if and else at the same time in a programming language.
If and else are conditional statements that are mutually exclusive.
They are used to execute different blocks of code based on a condition.
To execute multiple blocks of code simultaneously, you can use nested if-else statements or logical operators.
Q38. What is the advantages of Data validation and why we use it?
Data validation ensures accuracy and completeness of data. It helps in preventing errors and improving data quality.
Data validation ensures that the data entered is accurate and complete.
It helps in preventing errors and improving data quality.
It ensures that the data is consistent and conforms to predefined standards.
It helps in identifying and correcting errors before they cause problems.
Examples of data validation include checking for valid email addresses, phone numbers, ...read more
Q39. How you can manage if someone say you to work for 24 hours in a day?
I would explain the importance of work-life balance and propose alternative solutions.
Explain the importance of work-life balance and the negative effects of working excessively
Propose alternative solutions such as delegating tasks, setting priorities, and implementing efficient processes
Highlight the benefits of a well-rested and balanced support engineer, including improved productivity and customer satisfaction
Q40. What are differences betweeen BGP and IBGP
BGP is used for routing between different autonomous systems, while IBGP is used for routing within the same autonomous system.
BGP (Border Gateway Protocol) is an exterior gateway protocol used for routing between different autonomous systems.
IBGP (Internal Border Gateway Protocol) is used for routing within the same autonomous system.
BGP is used to exchange routing information between different autonomous systems (ASes) on the internet.
IBGP is used to distribute routing info...read more
Q41. Difference Between classic folder and Modern folder?
Classic folders are traditional file storage structures, while modern folders are enhanced with additional features and capabilities.
Classic folders follow a hierarchical structure, with subfolders and files organized in a tree-like format.
Modern folders often include metadata, tags, and other attributes to enhance search and organization.
Classic folders rely on manual organization and navigation, while modern folders offer automated organization and intelligent search.
Modern...read more
Q42. 1) Advantage of springboot over spring 2) Tell me all the anotations you know in spring 3) What are CRUD operations, write controller layer and use validating annotations like @NotNull, @valid etc. how to valid...
read moreThe interview questions cover various topics related to Spring framework, REST vs SOAP, JPA repository, Feign client, circuit breaker, and Spring Security.
Spring Boot provides a simpler and faster way to set up and run Spring applications compared to traditional Spring.
Common annotations in Spring include @Controller, @Service, @Repository, @Autowired, @Component, @RequestMapping, @GetMapping, @PostMapping, @PutMapping, @DeleteMapping, @Valid, @NotNull, etc.
CRUD operations re...read more
Q43. what is difference between controller and rest controller?
A controller is a component that handles incoming requests and returns a response, while a REST controller specifically handles RESTful requests.
A controller is responsible for handling various types of requests, such as HTTP, WebSocket, etc.
A REST controller is a type of controller that specifically handles RESTful requests, which follow the principles of Representational State Transfer (REST).
REST controllers typically use annotations like @RestController and @RequestMappin...read more
Q44. Do you know how to configure Outlook?
Yes, I know how to configure Outlook.
I am familiar with setting up email accounts in Outlook
I can configure email settings such as incoming and outgoing servers
I can troubleshoot common issues such as connection problems or syncing errors
I am knowledgeable about setting up rules and filters for organizing emails
I can assist users with importing and exporting data from Outlook
Q45. What's copy constructor why it is needed to pass by reference
Copy constructor creates a new object by copying an existing object.
Copy constructor is used to create a new object with the same values as an existing object.
It is needed to pass by reference to avoid creating a copy of the object, which can be expensive.
Passing by reference allows the new object to share the same memory as the original object.
Copy constructor is automatically called when a new object is created from an existing object.
Q46. What are the addon that can be added with spring boot ? What is the spring boot ? What are the ways of configuring a bean in spring? And core java realted stuff.
Answering questions related to Spring Boot and core Java
Spring Boot addons include Spring Security, Spring Data, and Spring Cloud
Spring Boot is a framework for building standalone, production-grade Spring-based applications
Ways of configuring a bean in Spring include XML configuration, Java-based configuration, and annotation-based configuration
Core Java topics include OOP concepts, collections, multithreading, and exception handling
Q47. String builder and string buffer When we create Arrays and when we create linked lists Treeset in Java Java 8 features Static keyword Dynamic method dispatch How to make a immutable class in Java Marker Interfa...
read moreQuestions related to Java programming language concepts and features.
StringBuilder and StringBuffer are used for efficient string manipulation.
Arrays are fixed in size while linked lists can grow dynamically.
TreeSet is a sorted set implementation in Java.
Java 8 introduced lambda expressions, streams, and functional interfaces.
Static keyword is used to create class-level variables and methods.
Dynamic method dispatch is the mechanism by which a call to an overridden method is r...read more
Q48. What is oops? Explain about oops? What is .net framework? What is page lifecycle? What is mvc?. Explain about mvc patterns?. Explain table, store procedure, views, functions in SQL?
Questions related to software engineering concepts and SQL
OOPs stands for Object-Oriented Programming which is a programming paradigm based on the concept of objects
.NET Framework is a software framework developed by Microsoft that provides a programming model for building applications
Page lifecycle refers to the stages that a web page goes through from creation to destruction
MVC stands for Model-View-Controller which is a software design pattern for developing web applicatio...read more
Q49. How to check logs for pods and containers in kubernets ?
To check logs for pods and containers in Kubernetes, you can use the kubectl command-line tool.
Use the 'kubectl logs' command to view logs for a specific pod or container.
Specify the pod or container name along with the appropriate flags.
You can also use selectors to filter logs based on labels or namespaces.
To follow logs in real-time, use the '-f' flag.
To limit the number of lines displayed, use the '--tail' flag.
To view logs from multiple containers in a pod, use the '--co...read more
Q50. What is your strength programming language?
My strength programming language is C++. I have extensive experience in developing software and solving complex problems using C++.
Proficient in object-oriented programming with C++
Strong knowledge of data structures and algorithms
Experience in developing efficient and scalable code
Familiarity with C++ libraries and frameworks
Ability to debug and optimize code for performance
Experience in multi-threading and parallel programming
Knowledge of C++ best practices and coding stand...read more
Q51. What is VTep? Explain the VLan data encapsulated with VXLAN header and fields used in it?
VTep is a virtual tunnel endpoint used in VXLAN to extend Layer 2 networks over Layer 3 networks.
VTep is a software-based endpoint that terminates VXLAN tunnels.
It is used to extend Layer 2 networks over Layer 3 networks.
VXLAN header encapsulates the original Ethernet frame and adds a 24-bit VXLAN Network Identifier (VNI) to identify the virtual network.
The VLAN data is encapsulated with VXLAN header and fields like VNI, flags, and reserved bits are used in it.
Q52. Which Linux commands you have used on daily basis??
I have used various Linux commands on a daily basis.
ls - to list files and directories
cd - to change directories
grep - to search for specific text in files
tail - to view the end of a file
ps - to view running processes
kill - to terminate a process
chmod - to change file permissions
ssh - to connect to remote servers
scp - to transfer files between servers
tar - to archive and compress files
Q53. Issues faced in troubleshooting your applications and how you overcome it.
Troubleshooting application issues requires thorough analysis, communication, and collaboration.
Identifying the root cause of the issue by analyzing logs, code, and system configurations.
Communicating effectively with team members to gather information and brainstorm solutions.
Collaborating with other teams such as DevOps or QA to investigate potential infrastructure or testing issues.
Utilizing debugging tools and techniques to isolate and fix the problem.
Documenting the trou...read more
Q54. Diffence between P&L statement and PP reports, what comes in assets and liabilities in the finance statement
P&L statement shows revenue, expenses, and profit/loss. Balance sheet shows assets and liabilities.
P&L statement shows revenue, expenses, and profit/loss over a period of time
PP reports are production reports that show the quantity and quality of goods produced
Balance sheet shows assets and liabilities at a specific point in time
Assets include cash, accounts receivable, inventory, property, and equipment
Liabilities include accounts payable, loans, and accrued expenses
Q55. How many cycles microprocessor run in MOV A,B?
The number of cycles a microprocessor runs in MOV A,B depends on the specific microprocessor architecture.
The number of cycles can vary depending on the microprocessor architecture and its implementation.
In general, MOV A,B is a simple instruction that moves the value in register B to register A.
The number of cycles required for this instruction can range from 1 to multiple cycles.
Factors such as the microprocessor's pipeline, cache, and instruction set architecture can affec...read more
Q56. How would you design service layer for highly scalable application?
Designing a service layer for a highly scalable application requires careful consideration of architecture and technology choices.
Use a microservices architecture to break down the application into smaller, more manageable components.
Implement load balancing and auto-scaling to ensure that the service layer can handle high traffic volumes.
Choose a technology stack that is well-suited to the specific needs of the application, such as high throughput or low latency.
Implement ca...read more
Q57. 1) OOPS in java, and told to explain abstraction, encapsulation, inheritance with practical code 2) Exception handling(globally), Authentication and authorization 3) SOLID principles and factory design pattern ...
read moreInterview questions for Software Engineer position covering OOPS concepts, exception handling, SOLID principles, Java 8 features, and Streams.
Abstraction in OOPS: Hiding implementation details. Example: Abstract class Shape with method draw().
Encapsulation in OOPS: Bundling data and methods that operate on the data. Example: Class Employee with private fields and public getters/setters.
Inheritance in OOPS: Reusing code and extending functionality. Example: Class Dog extends A...read more
Q58. How useful is it to create a class public and private in Java ? And which one to prefer for whom?
Creating public and private classes in Java is useful for encapsulation and access control.
Creating a class as public allows it to be accessed from any other class.
Creating a class as private restricts its access to only within the same class.
Public classes are typically used for classes that need to be accessed by other classes or modules.
Private classes are typically used for helper classes or internal implementation details.
The choice between public and private depends on ...read more
Q59. Problem about virtual function and explain it with vtable and vptr how it will work how it will work when child is pointing to base class
Explaining virtual function problem with vtable and vptr
Virtual functions allow polymorphism by allowing child classes to override base class functions
Vtable is a table of function pointers that maps virtual functions to their implementations
Vptr is a pointer to the vtable of an object
When a child class object is pointing to a base class object, the vptr points to the base class vtable
This can cause issues if the child class has overridden a virtual function, as the base clas...read more
Q60. What is the minimum clearance for DDR Data group signals Routing?
The minimum clearance for DDR Data group signals Routing is 6 mils.
DDR Data group signals Routing requires a minimum clearance of 6 mils to avoid crosstalk and interference.
The clearance may vary depending on the specific DDR standard being used.
It is important to follow the recommended guidelines provided by the DDR manufacturer.
Failure to meet the minimum clearance requirements can result in signal integrity issues and data corruption.
Examples of DDR standards include DDR2,...read more
Q61. Recently which business portal is getting added under ministry of new and reneawable energy?
The business portal added under ministry of new and renewable energy is SAMPADA.
SAMPADA stands for System for Assessment, Awareness and Training for Renewable Energy Applications
It is a web-based platform for promoting and creating awareness about renewable energy technologies
It provides information on various renewable energy technologies, their applications, and financial incentives available for their adoption
It also offers online training and certification courses on rene...read more
Q62. What will you do if you buy a hardware system that does not contain any software in it. And you have no money to buy a software. What will you do in a situation like that?
If I buy a hardware system without software and have no money to buy software, I would explore free and open-source software options.
Research and identify free and open-source software alternatives
Utilize online resources and communities to find suitable software
Consider using trial versions or limited functionality software
Explore cloud-based solutions or online tools
Reach out to friends, colleagues, or online forums for potential software options
Consider learning programmin...read more
Q63. In 5 programs without effecting one by one how can you debug a particular program and how can you know tha program is calling in debug
To debug a particular program without affecting others, use breakpoints and step through the code.
Set a breakpoint in the program you want to debug
Step through the code using a debugger to identify the issue
Use logging statements to track the flow of the program
Check the call stack to see which functions are being called
Use conditional breakpoints to stop the program at specific points
Q64. What is difference between Auto-Pilot and Co-management?
Auto-Pilot is a fully automated management solution while Co-management is a shared management solution.
Auto-Pilot is a cloud-based solution that automates device deployment, configuration, and management.
Co-management allows organizations to manage devices using both Configuration Manager and Intune.
Auto-Pilot is designed for modern devices running Windows 10 while Co-management is designed for legacy devices.
Auto-Pilot is a fully automated solution while Co-management is a ...read more
Q65. what is second level cache?How to implement second level cache?How to optimize sql query?what are solid principles?
Second level cache is a caching mechanism used to improve performance by storing frequently accessed data in memory.
Second level cache is implemented at the application level and can be configured using frameworks like Hibernate.
To optimize SQL queries, one can use indexes, avoid using SELECT *, and use JOINs instead of subqueries.
SOLID principles are a set of design principles for writing maintainable and scalable code.
SOLID stands for Single Responsibility, Open-Closed, Lis...read more
Q66. Can we create SVI in L2 switch? IF not why
No, SVIs cannot be created in L2 switches.
SVI stands for Switched Virtual Interface.
It is a virtual interface that represents a VLAN on a Layer 3 switch.
L2 switches operate at Layer 2 of the OSI model and do not support routing or Layer 3 functionality.
SVIs are used for routing between VLANs, which is a Layer 3 function.
L2 switches can only create VLANs and assign ports to them for Layer 2 switching.
To enable Layer 3 functionality, a Layer 3 switch or a router is required.
Q67. How to manage teams and assign task
Managing teams involves clear communication, delegation, and accountability.
Establish clear goals and expectations for each team member
Communicate regularly to ensure everyone is on the same page
Delegate tasks based on individual strengths and workload
Provide support and resources to help team members succeed
Hold team members accountable for their work and deadlines
Encourage collaboration and open communication within the team
Recognize and reward team members for their contri...read more
Q68. what is stored procedure, what are the web api http verbs
Stored procedure is a precompiled SQL code, web API HTTP verbs are GET, POST, PUT, DELETE.
Stored procedure is a set of SQL statements that are precompiled and stored in the database for reuse.
Web API HTTP verbs are GET, POST, PUT, DELETE used for communication between client and server.
GET is used to retrieve data, POST is used to create data, PUT is used to update data, DELETE is used to delete data.
Examples of web API HTTP verbs are GET https://api.example.com/users, POST h...read more
Q69. What is VSL in Vss, explain the mechanism and role in VSS?
VSL is the voltage at which the substrate current becomes zero in VSS.
VSL is the voltage at which the substrate current becomes zero in VSS.
It is the minimum voltage required to maintain a zero substrate current.
VSL is important in VSS as it helps in reducing the leakage current.
It is achieved by applying a negative voltage to the substrate.
VSL is typically set to -0.5V or -1.0V in modern CMOS processes.
Q70. What string pool in java and why string is immutable
String pool is a cache of string literals in Java. String is immutable to ensure security and efficiency.
String pool is a collection of unique string literals stored in heap memory.
When a new string is created, JVM checks if it already exists in the pool. If yes, it returns the reference to the existing object.
String immutability ensures that once a string is created, its value cannot be changed. This ensures security and efficiency.
For example, if a password is stored as a s...read more
Q71. What is difference between if else and switch ?
if else is used for conditional statements with multiple conditions while switch is used for multiple conditions with same variable.
if else can handle multiple conditions with different outcomes
switch can handle multiple conditions with same outcome
if else is more flexible and can handle complex conditions
switch is faster and easier to read for simple conditions
example of if else: if (x > 5) {do something} else if (x < 5) {do something else} else {do something else}
example of...read more
Q72. 2. What is the difference between object oriented programming language and procedure oriented programming language?
Object oriented programming focuses on objects and their interactions, while procedure oriented programming focuses on functions and procedures.
Object oriented programming uses classes and objects to encapsulate data and behavior, while procedure oriented programming uses functions to manipulate data.
In OOP, inheritance and polymorphism are key concepts, while in POP, modularity and reusability are emphasized.
Examples of OOP languages include Java and Python, while examples o...read more
Q73. What is difference between structure and array?
Structure is a user-defined data type that can hold variables of different data types. Array is a collection of similar data types.
Structures can have variables of different data types while arrays can only have variables of the same data type.
Structures can also have functions while arrays cannot.
Example: struct student {int id; char name[20]; float marks;}; int marksArray[5];
Q74. Find the second highest number by using Java Stream, What are the new changes in Java 8 from Java 7. HashMap and HashSet internal implementation.
Using Java Stream to find the second highest number, Java 8 changes, HashMap and HashSet internal implementation.
Use Java Stream to sort the numbers in descending order and skip the first element to get the second highest number.
Java 8 introduced lambda expressions, functional interfaces, Stream API, default methods in interfaces, and new Date and Time API.
HashMap uses buckets to store key-value pairs, while HashSet uses HashMap internally to store unique elements.
HashMap all...read more
Q75. What was pointer to a pointer in C language?
A pointer to a pointer is a variable that stores the memory address of another pointer variable.
It is used to modify the value of a pointer indirectly.
It is denoted by ** in C language.
It is commonly used in dynamic memory allocation.
Example: int **ptr; // pointer to a pointer to an integer
Q76. What is dbms ?what is data module?what is difference file structure and storage structure?operations on stack?built in types in python?
DBMS is a software system that manages databases. Data module is a component of DBMS. File structure and storage structure differ in their organization of data. Stack operations include push and pop. Python has built-in types like int, float, and str.
DBMS manages databases, while data module is a component of DBMS.
File structure and storage structure differ in their organization of data.
Stack operations include push and pop.
Python has built-in types like int, float, and str.
Q77. What is the difference between workflow and approval process.?
Workflow automates standard internal procedures and processes to save time across the organization. Approval process automates the approval of records.
Workflow automates standard internal procedures and processes
Approval process automates the approval of records
Workflow can update fields, send email alerts, create tasks, etc.
Approval process involves submitting records for approval and defining approval steps
Workflow can be triggered by specific criteria or time-based events
A...read more
Q78. Which route will be priority ospf or ebgp? If we wish ospf as best route how can this achieved?
OSPF should be priority over eBGP. Achieve this by manipulating administrative distance or metric.
OSPF should be preferred over eBGP as it is an interior gateway protocol while eBGP is an exterior gateway protocol
Manipulate administrative distance to make OSPF preferred over eBGP
Manipulate metric to make OSPF preferred over eBGP
Use route maps to manipulate the preference of OSPF over eBGP
Example: set the administrative distance of OSPF to a lower value than eBGP
Example: incre...read more
Q79. What is difference between left join and right join, Also implement the same.
Left join returns all records from left table and matching records from right table, right join returns all records from right table and matching records from left table.
Left join keeps all records from left table and matching records from right table
Right join keeps all records from right table and matching records from left table
Use ON keyword to specify the join condition
Example: SELECT * FROM table1 LEFT JOIN table2 ON table1.id = table2.id
Example: SELECT * FROM table1 RI...read more
Q80. How can you acheive the same result as FULL JOIN without using the Keyword FULL JOIN in your query
Achieve the same result as FULL JOIN without using the keyword FULL JOIN in your query.
Use a combination of LEFT JOIN and RIGHT JOIN to achieve the same result as FULL JOIN.
Combine the results of both LEFT JOIN and RIGHT JOIN using UNION operator.
Use COALESCE function to handle NULL values in the resulting table.
Example: SELECT * FROM table1 LEFT JOIN table2 ON table1.id = table2.id UNION SELECT * FROM table1 RIGHT JOIN table2 ON table1.id = table2.id WHERE table1.id IS NULL ...read more
Q81. How make the current in transformer?
The current in a transformer is made by inducing voltage across the primary coil.
The primary coil of a transformer is connected to an alternating current (AC) source.
The alternating current in the primary coil creates a changing magnetic field.
This changing magnetic field induces a voltage across the secondary coil.
The induced voltage in the secondary coil causes a current to flow through it.
The current in the secondary coil is proportional to the current in the primary coil,...read more
Q82. How to create reports by pivot table?
Pivot tables are used to create reports by summarizing and analyzing data.
Select the data range that you want to analyze
Go to the 'Insert' tab and click on 'PivotTable'
Choose the location where you want to place the pivot table
Drag and drop the fields you want to analyze into the 'Rows' and 'Columns' areas
Add any additional fields to the 'Values' area to calculate summaries
Customize the pivot table by applying filters, sorting, and formatting
Refresh the pivot table if the sou...read more
Q83. 1. what are the considerations while selecting engineering materials for specific applications? 2. How would you calculate sheer strength of a round cross section metal bar? 3. Explain your project work.
Considerations for selecting engineering materials, calculating sheer strength of a metal bar, and explaining project work.
Consider factors like strength, durability, cost, and availability when selecting materials for specific applications.
Calculate sheer strength of a round cross section metal bar using the formula: Sheer Strength = (0.5 * Ultimate Tensile Strength)
In project work, explain the objectives, methodology, results, and any challenges faced.
Q84. What is TLOC is Viptela SDWAN, why it is used
TLOC in Viptela SDWAN stands for Transport Locator and is used to identify the physical or virtual location of a device in the network.
TLOC is a unique identifier assigned to each device in the SDWAN network.
It helps in determining the optimal path for traffic routing.
TLOCs can be based on various parameters such as interface, IP address, or VPN.
They are used to define the connectivity between different sites in the network.
TLOCs enable efficient traffic steering and load bal...read more
Q85. If a company suffers in a loss so what can you do for decreasing the loss ?
To decrease the loss in a company, HR Business Partner can implement cost-cutting measures, improve operational efficiency, and enhance revenue generation.
Identify areas of excessive spending and implement cost-cutting measures such as reducing non-essential expenses, renegotiating contracts, or implementing energy-saving initiatives.
Analyze and streamline business processes to improve operational efficiency, eliminate waste, and optimize resource allocation.
Develop and imple...read more
Q86. How to remove duplicate from excel data ?
To remove duplicates from Excel data, use the Remove Duplicates feature under the Data tab.
Select the range of cells that contain the data you want to remove duplicates from.
Click on the Data tab and select Remove Duplicates.
Choose the columns that you want to check for duplicates and click OK.
The duplicates will be removed and a message will appear showing how many duplicates were removed.
You can also use the COUNTIF function to identify and remove duplicates.
Example: =IF(CO...read more
Q87. 1. How many ways to create resource on Azure? 2. What's horizontal scaling and vertical scaling? 3. What is kubernetes? 4. Types of linux OS flavour. 5. Five basic commands of Unix.
Azure resources can be created through Azure portal, Azure CLI, Azure PowerShell, ARM templates, and Azure Resource Manager.
Azure portal: User-friendly interface for creating and managing Azure resources.
Azure CLI: Command-line tool for managing Azure resources.
Azure PowerShell: PowerShell cmdlets for Azure resource management.
ARM templates: Infrastructure as code for defining Azure resources.
Azure Resource Manager: Service for managing resources in Azure.
Q88. End to end OTC domain process, where my core responsibility falls in.
OTC domain process involves end to end sales cycle from order placement to delivery, where my core responsibility lies.
My core responsibility is to lead the team in ensuring smooth functioning of the entire OTC process.
I need to ensure timely order placement, accurate order processing, and timely delivery of products.
I need to monitor inventory levels and ensure that products are available for sale.
I need to ensure that customer queries and complaints are addressed promptly a...read more
Q89. How is Azure, AWS, GCP different from each other and what are the similarities?
Azure, AWS, and GCP are cloud computing platforms with differences in services, pricing, and market share.
Azure is developed by Microsoft and is known for its strong integration with Windows-based systems.
AWS is the oldest and most widely used cloud platform, offering a wide range of services and a pay-as-you-go pricing model.
GCP, developed by Google, is known for its strong data analytics and machine learning capabilities.
All three platforms offer similar services such as vi...read more
Q90. What is VDC? relationship between Supervisor and VDC?
VDC stands for Virtual Design and Construction. Supervisor oversees VDC process.
VDC is a process of creating a digital model of a construction project before it is built.
It helps in identifying and resolving potential issues before construction begins.
Supervisor oversees the VDC process to ensure that the digital model is accurate and meets the project requirements.
VDC can also help in improving communication and collaboration among different stakeholders involved in the proj...read more
Q91. Which protocol we are using for monitoring network devices?
SNMP is the protocol used for monitoring network devices.
SNMP stands for Simple Network Management Protocol
It is used to manage and monitor network devices such as routers, switches, servers, etc.
SNMP allows network administrators to collect information about network performance, usage, and errors.
Examples of SNMP monitoring tools include Nagios, Zabbix, and PRTG Network Monitor.
Q92. What are the optimization technique can be taken to improve the performance of any React Application?
Some optimization techniques for improving React Application performance.
Code splitting to reduce initial load time
Memoization for optimizing re-renders
Using virtualized lists for rendering large amounts of data
Minifying and compressing assets for faster loading
Implementing server-side rendering for faster initial page load
Q93. 1) Java features 2) Access Modifiers 3) Arraylist 4) explain private and Default access modifiers 5) What is collection And explain Arraylist. 6) what is exception handling what it use in java. 7)Throw and thro...
read moreJava features, access modifiers, ArrayList, exception handling, and throw/throws in Java.
Java features include platform independence, object-oriented programming, and automatic memory management.
Access modifiers in Java are public, private, protected, and default. They control the visibility and accessibility of classes, methods, and variables.
ArrayList is a dynamic array in Java that can grow or shrink in size. It is part of the Java Collections Framework.
Private access modi...read more
Q94. What happens if there is finally block inside an exception block?
Finally block will always execute, even if an exception is thrown in the try or catch block.
Finally block is used to execute code that must always run, regardless of whether an exception was thrown or not.
If an exception is thrown in the try or catch block, the finally block will still execute.
Finally block is often used to release resources like file handles, database connections, etc.
Q95. What is the difference between functional and non functional testing?
Functional testing focuses on the behavior of the software, while non-functional testing evaluates its performance and other quality attributes.
Functional testing verifies if the software meets the specified functional requirements.
Non-functional testing checks the performance, reliability, usability, and other non-functional aspects of the software.
Functional testing is concerned with what the software does, while non-functional testing is concerned with how well it does it....read more
Q96. What exact code to be written when there are two field in selection screen if one field is filled the display second field and in which event it need to be written.
Use AT SELECTION-SCREEN OUTPUT event to display second field based on first field input.
Use AT SELECTION-SCREEN OUTPUT event to check if first field is filled.
If first field is filled, display the second field using the statement 'SET PF-STATUS'.
Example: AT SELECTION-SCREEN OUTPUT. IF sy-abcde = 'X'. SET PF-STATUS 'SECOND_FIELD'. ENDIF.
Q97. 1. What is HANA replication? 2. What is fencing? 3. What is near zero downtime technique, how to plan? 4. Migration process? 5. What are sum tool phases and role of standard configuration, High level configurat...
read moreTechnical Specialist interview questions on HANA replication, fencing, migration, minimizing downtime, and export/import files.
HANA replication is the process of copying data from one HANA system to another.
Fencing is a mechanism to prevent split-brain scenarios in a high-availability setup.
Near zero downtime technique involves careful planning and execution to minimize downtime during system upgrades or migrations.
Migration process involves moving data from one system to ano...read more
Q98. What is SEPA and the role of the project related to SEPA implementation?
SEPA is the Single Euro Payments Area, a project aimed at harmonizing electronic payments in Europe.
SEPA is a European Union initiative to simplify and standardize electronic payments across Europe.
It allows individuals and businesses to make cross-border payments in euros as easily as domestic payments.
SEPA implementation involves adopting common payment instruments, formats, and technical standards.
The project aims to enhance efficiency, reduce costs, and increase competiti...read more
Q99. What is difference between family ipv6 route-target and default-route-target in Nokia 7750 bgp configuration ?
Family ipv6 route-target and default-route-target in Nokia 7750 bgp configuration.
Family ipv6 route-target is used to import/export ipv6 routes within a VRF family
Default-route-target is used to import/export ipv4 routes within a VRF family
Family ipv6 route-target is configured under VRF family while default-route-target is configured under VRF
Family ipv6 route-target is used for VPNv6 while default-route-target is used for VPNv4
Q100. 1. How to connect 2 DBs from spring boot application
To connect 2 DBs from a Spring Boot application, configure multiple data sources and use JdbcTemplate or EntityManager for each DB.
Configure multiple data sources in the application.properties file
Create separate configuration classes for each data source
Use JdbcTemplate or EntityManager to interact with each DB
Specify the appropriate data source in the repository or service classes
Top HR Questions asked in null
Interview Process at null
Top Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month