HCLTech
1000+ DSP Mutual Fund Interview Questions and Answers
Q1. What is IP address and how many classes are there in IPv4 addressing mode and what are there ranges?
IP address is a unique identifier assigned to devices on a network. There are 4 classes in IPv4 addressing mode with different ranges.
IP address is a numerical label assigned to each device on a network
IPv4 addressing mode has 4 classes: A, B, C, and D
Class A ranges from 1.0.0.0 to 126.0.0.0
Class B ranges from 128.0.0.0 to 191.255.0.0
Class C ranges from 192.0.0.0 to 223.255.255.0
Class D is reserved for multicast addresses
Q2. Nth Fibonacci Number Problem Statement
Calculate the Nth term in the Fibonacci sequence, where the sequence is defined as follows: F(n) = F(n-1) + F(n-2)
, with initial conditions F(1) = F(2) = 1
.
Input:
The inp...read more
Calculate the Nth Fibonacci number efficiently using dynamic programming.
Use dynamic programming to store previously calculated Fibonacci numbers to avoid redundant calculations.
Start with base cases F(1) and F(2) as 1, then iterate to calculate subsequent Fibonacci numbers.
Return the Nth Fibonacci number as the final result.
Q3. Reverse Array Elements
Given an array containing 'N' elements, the task is to reverse the order of all array elements and display the reversed array.
Explanation:
The elements of the given array need to be rear...read more
Reverse the order of elements in an array and display the reversed array.
Create a function that takes an array as input
Use a loop to iterate through the array and swap elements at opposite ends
Return the reversed array
Q4. Have you heard about OSI reference model? How many layers are there in OSI model? Explain any 3 layers.
Answering about OSI reference model and its layers
OSI reference model has 7 layers
Physical layer deals with physical transmission of data
Data link layer provides error-free transfer of data
Network layer handles routing and logical addressing
Q5. What is the purpose of react and it's latest hooks?
React is a JavaScript library for building user interfaces. React Hooks are a feature introduced in React 16.8 to manage state and lifecycle in functional components.
React is used for creating reusable UI components
React allows for efficient rendering and updating of components
React Hooks provide a way to use state and other React features in functional components
Hooks like useState and useEffect are commonly used in React applications
Q6. Oops Difference between classes and interfaces, use of getter and setters, instance variable vs local variable, encapsulation, do multiple catch block exist, use of final keyword, stringbuffer vs stringbuilder,...
read moreA software engineer interview question covering various Java concepts.
Classes are blueprints for objects, while interfaces define a set of methods that a class must implement.
Getter and setter methods are used to access and modify the values of instance variables.
Instance variables are declared within a class and are accessible throughout the class, while local variables are declared within a method and are only accessible within that method.
Encapsulation is the practice of h...read more
Q7. What is JDK JRE JVM ? Java8 features
JDK is Java Development Kit, JRE is Java Runtime Environment, and JVM is Java Virtual Machine. Java8 features include lambda expressions, streams, and default methods.
JDK is a software development kit that provides tools for developing, debugging, and monitoring Java applications.
JRE is a runtime environment that allows running Java applications. It includes JVM and necessary libraries.
JVM is a virtual machine that executes Java bytecode. It provides platform independence and...read more
Q8. What is ITIL? What is difference between Incident and service request?
ITIL is a framework for IT service management. Incident is an unplanned interruption while service request is a planned request.
ITIL stands for Information Technology Infrastructure Library
It is a framework for IT service management
It provides guidelines for delivering IT services efficiently and effectively
Incident is an unplanned interruption to an IT service or a reduction in the quality of an IT service
Service request is a formal request from a user for something to be pr...read more
Q9. Do you know what is BSOD and how to resolve it?
BSOD stands for Blue Screen of Death. It is an error screen displayed on Windows operating systems when a critical system error occurs.
BSOD is a stop error screen that appears when the Windows operating system encounters a fatal system error.
It is usually caused by hardware or driver issues, software conflicts, or system file corruption.
To resolve BSOD, one can try restarting the computer, updating drivers, running hardware diagnostics, or performing a system restore.
Examples...read more
Q10. Which BGP path attributes are used to manipulate the ingress traffic and how traffic is transit from one AS to another AS via 3rd AS?
BGP path attributes used to manipulate ingress traffic and transit via 3rd AS.
AS Path attribute is used to manipulate ingress traffic by adding or removing AS numbers.
Local Preference attribute is used to influence the path selection within the same AS.
MED (Multi-Exit Discriminator) attribute is used to influence the path selection between different ASes.
Communities attribute is used to tag routes and influence the path selection in a specific way.
Transit traffic via 3rd AS c...read more
Q11. What is Active Directory and What are its uses?
Active Directory is a directory service that stores information about network resources and enables centralized management.
Active Directory is used to manage and organize users, computers, and other network resources in a Windows domain.
It provides authentication and authorization services, allowing users to access resources based on their permissions.
Active Directory enables single sign-on, where users can log in once and access multiple resources without re-authentication.
I...read more
Q12. What is Active Directory? How do we manage role from active directory
Active Directory is a Microsoft service that manages network resources and user access.
Active Directory is used to manage user accounts, computers, and other network resources.
It allows for centralized authentication and authorization for users and computers in a network.
Roles can be managed through Active Directory by assigning users to specific groups with corresponding permissions.
Examples of roles that can be managed through Active Directory include domain administrators,...read more
Q13. Spring boot: Various Annotations, Difference b/w @RestController vs @Controller , @Bean vs @Component, @RequestMapping vs @GetMapping,
Explaining various Spring Boot annotations and their differences.
RestController vs Controller: RestController is used for RESTful web services while Controller is used for traditional web applications.
Bean vs Component: Bean is used to define a single object while Component is used to define a class as a Spring-managed component.
RequestMapping vs GetMapping: RequestMapping is used to map HTTP requests while GetMapping is used specifically for GET requests.
Q14. Do you know about ticketing tools?
Yes, I am familiar with ticketing tools.
I have experience using ticketing tools such as ServiceNow and JIRA.
I understand how to create, update, and close tickets.
I am able to prioritize tickets based on urgency and impact.
I am familiar with using ticketing tools to track and report on service desk metrics.
Q15. What is Active Directory? Difference between MDM and MAM. What do you know about Microsoft Intune? How does Azure Active directory work? What is Exchange Active Sync
Active Directory is a Microsoft service that manages user accounts and permissions. MDM and MAM are mobile device management and mobile application management. Microsoft Intune is a cloud-based MDM/MAM solution. Azure Active Directory is a cloud-based identity and access management service. Exchange Active Sync is a protocol used to synchronize email, contacts, and calendar data between servers and mobile devices.
Active Directory manages user accounts and permissions
MDM manag...read more
Q16. What are the features of Solar wind which you are aware of?
Solar wind is a stream of charged particles released from the upper atmosphere of the Sun.
Solar wind is composed of electrons, protons, and alpha particles.
It can have speeds ranging from 250 to 800 km/s.
Solar wind can cause auroras and geomagnetic storms on Earth.
It can also affect satellite and spacecraft operations.
Solar wind is influenced by the Sun's magnetic field and can vary in intensity.
It is a key factor in space weather and space exploration.
Q17. String builder and string buffer When we create Arrays and when we create linked lists Treeset in Java Java 8 features Static keyword Dynamic method dispatch How to make a immutable class in Java Marker Interfa...
read moreQuestions related to Java programming language concepts and features.
StringBuilder and StringBuffer are used for efficient string manipulation.
Arrays are fixed in size while linked lists can grow dynamically.
TreeSet is a sorted set implementation in Java.
Java 8 introduced lambda expressions, streams, and functional interfaces.
Static keyword is used to create class-level variables and methods.
Dynamic method dispatch is the mechanism by which a call to an overridden method is r...read more
Q18. What is oops? Explain about oops? What is .net framework? What is page lifecycle? What is mvc?. Explain about mvc patterns?. Explain table, store procedure, views, functions in SQL?
Questions related to software engineering concepts and SQL
OOPs stands for Object-Oriented Programming which is a programming paradigm based on the concept of objects
.NET Framework is a software framework developed by Microsoft that provides a programming model for building applications
Page lifecycle refers to the stages that a web page goes through from creation to destruction
MVC stands for Model-View-Controller which is a software design pattern for developing web applicatio...read more
Q19. What is VTep? Explain the VLan data encapsulated with VXLAN header and fields used in it?
VTep is a virtual tunnel endpoint used in VXLAN to extend Layer 2 networks over Layer 3 networks.
VTep is a software-based endpoint that terminates VXLAN tunnels.
It is used to extend Layer 2 networks over Layer 3 networks.
VXLAN header encapsulates the original Ethernet frame and adds a 24-bit VXLAN Network Identifier (VNI) to identify the virtual network.
The VLAN data is encapsulated with VXLAN header and fields like VNI, flags, and reserved bits are used in it.
Q20. what is difference between controller and rest controller?
A controller is a component that handles incoming requests and returns a response, while a REST controller specifically handles RESTful requests.
A controller is responsible for handling various types of requests, such as HTTP, WebSocket, etc.
A REST controller is a type of controller that specifically handles RESTful requests, which follow the principles of Representational State Transfer (REST).
REST controllers typically use annotations like @RestController and @RequestMappin...read more
Q21. Name and Explain types of Network?
Types of networks include LAN, WAN, MAN, WLAN, PAN, SAN, CAN, and VPN.
LAN (Local Area Network) - a network that connects devices within a limited area
WAN (Wide Area Network) - a network that connects devices over a large geographical area
MAN (Metropolitan Area Network) - a network that connects devices within a city or metropolitan area
WLAN (Wireless Local Area Network) - a LAN that uses wireless connections
PAN (Personal Area Network) - a network that connects devices within ...read more
Q22. How would you design service layer for highly scalable application?
Designing a service layer for a highly scalable application requires careful consideration of architecture and technology choices.
Use a microservices architecture to break down the application into smaller, more manageable components.
Implement load balancing and auto-scaling to ensure that the service layer can handle high traffic volumes.
Choose a technology stack that is well-suited to the specific needs of the application, such as high throughput or low latency.
Implement ca...read more
Q23. How SharePoint search is working and how we can define search architecture?
SharePoint search is a powerful tool that allows users to find information within SharePoint sites.
SharePoint search uses a combination of crawling, indexing, and querying to retrieve search results.
The search architecture in SharePoint can be defined by configuring search components such as crawl components, content sources, and search scopes.
Crawling is the process of gathering information from content sources, such as SharePoint sites, file shares, or external websites.
Ind...read more
Q24. How we can find IP address of a system?
To find the IP address of a system, use the command prompt or network settings.
Open command prompt and type 'ipconfig' to see the IP address
Go to network settings and click on 'Properties' to see the IP address
Use a network scanner tool to find IP addresses of all devices on the network
Q25. In 5 programs without effecting one by one how can you debug a particular program and how can you know tha program is calling in debug
To debug a particular program without affecting others, use breakpoints and step through the code.
Set a breakpoint in the program you want to debug
Step through the code using a debugger to identify the issue
Use logging statements to track the flow of the program
Check the call stack to see which functions are being called
Use conditional breakpoints to stop the program at specific points
Q26. what is second level cache?How to implement second level cache?How to optimize sql query?what are solid principles?
Second level cache is a caching mechanism used to improve performance by storing frequently accessed data in memory.
Second level cache is implemented at the application level and can be configured using frameworks like Hibernate.
To optimize SQL queries, one can use indexes, avoid using SELECT *, and use JOINs instead of subqueries.
SOLID principles are a set of design principles for writing maintainable and scalable code.
SOLID stands for Single Responsibility, Open-Closed, Lis...read more
Q27. What is VSL in Vss, explain the mechanism and role in VSS?
VSL is the voltage at which the substrate current becomes zero in VSS.
VSL is the voltage at which the substrate current becomes zero in VSS.
It is the minimum voltage required to maintain a zero substrate current.
VSL is important in VSS as it helps in reducing the leakage current.
It is achieved by applying a negative voltage to the substrate.
VSL is typically set to -0.5V or -1.0V in modern CMOS processes.
Q28. Do you how to create and manage Users and Groups?
Yes, I know how to create and manage Users and Groups.
To create a user, use the appropriate command or tool provided by the operating system or directory service.
To manage users, you can modify their properties, reset passwords, enable or disable accounts, and assign permissions.
To create a group, use the command or tool provided by the operating system or directory service.
To manage groups, you can add or remove members, assign permissions, and modify group properties.
Exampl...read more
Q29. What are the addon that can be added with spring boot ? What is the spring boot ? What are the ways of configuring a bean in spring? And core java realted stuff.
Answering questions related to Spring Boot and core Java
Spring Boot addons include Spring Security, Spring Data, and Spring Cloud
Spring Boot is a framework for building standalone, production-grade Spring-based applications
Ways of configuring a bean in Spring include XML configuration, Java-based configuration, and annotation-based configuration
Core Java topics include OOP concepts, collections, multithreading, and exception handling
Q30. 5. In certain condition you are not able to achieve the target of your company within timeline for which project is getting planned what will you do?
If unable to achieve company target within timeline, I will take corrective actions and communicate with stakeholders.
Analyze the reasons for not achieving the target
Identify the corrective actions required
Communicate with stakeholders about the situation and the plan of action
Re-plan the project timeline if necessary
Ensure that the revised plan is achievable and realistic
Q31. What was pointer to a pointer in C language?
A pointer to a pointer is a variable that stores the memory address of another pointer variable.
It is used to modify the value of a pointer indirectly.
It is denoted by ** in C language.
It is commonly used in dynamic memory allocation.
Example: int **ptr; // pointer to a pointer to an integer
Q32. Which route will be priority ospf or ebgp? If we wish ospf as best route how can this achieved?
OSPF should be priority over eBGP. Achieve this by manipulating administrative distance or metric.
OSPF should be preferred over eBGP as it is an interior gateway protocol while eBGP is an exterior gateway protocol
Manipulate administrative distance to make OSPF preferred over eBGP
Manipulate metric to make OSPF preferred over eBGP
Use route maps to manipulate the preference of OSPF over eBGP
Example: set the administrative distance of OSPF to a lower value than eBGP
Example: incre...read more
Q33. Issues faced in troubleshooting your applications and how you overcome it.
Troubleshooting application issues requires thorough analysis, communication, and collaboration.
Identifying the root cause of the issue by analyzing logs, code, and system configurations.
Communicating effectively with team members to gather information and brainstorm solutions.
Collaborating with other teams such as DevOps or QA to investigate potential infrastructure or testing issues.
Utilizing debugging tools and techniques to isolate and fix the problem.
Documenting the trou...read more
Q34. How to remove duplicate from excel data ?
To remove duplicates from Excel data, use the Remove Duplicates feature under the Data tab.
Select the range of cells that contain the data you want to remove duplicates from.
Click on the Data tab and select Remove Duplicates.
Choose the columns that you want to check for duplicates and click OK.
The duplicates will be removed and a message will appear showing how many duplicates were removed.
You can also use the COUNTIF function to identify and remove duplicates.
Example: =IF(CO...read more
Q35. What is the advantages of Data validation and why we use it?
Data validation ensures accuracy and completeness of data. It helps in preventing errors and improving data quality.
Data validation ensures that the data entered is accurate and complete.
It helps in preventing errors and improving data quality.
It ensures that the data is consistent and conforms to predefined standards.
It helps in identifying and correcting errors before they cause problems.
Examples of data validation include checking for valid email addresses, phone numbers, ...read more
Q36. What is VDC? relationship between Supervisor and VDC?
VDC stands for Virtual Design and Construction. Supervisor oversees VDC process.
VDC is a process of creating a digital model of a construction project before it is built.
It helps in identifying and resolving potential issues before construction begins.
Supervisor oversees the VDC process to ensure that the digital model is accurate and meets the project requirements.
VDC can also help in improving communication and collaboration among different stakeholders involved in the proj...read more
Q37. what is stored procedure, what are the web api http verbs
Stored procedure is a precompiled SQL code, web API HTTP verbs are GET, POST, PUT, DELETE.
Stored procedure is a set of SQL statements that are precompiled and stored in the database for reuse.
Web API HTTP verbs are GET, POST, PUT, DELETE used for communication between client and server.
GET is used to retrieve data, POST is used to create data, PUT is used to update data, DELETE is used to delete data.
Examples of web API HTTP verbs are GET https://api.example.com/users, POST h...read more
Q38. How you can manage if someone say you to work for 24 hours in a day?
I would explain the importance of work-life balance and propose alternative solutions.
Explain the importance of work-life balance and the negative effects of working excessively
Propose alternative solutions such as delegating tasks, setting priorities, and implementing efficient processes
Highlight the benefits of a well-rested and balanced support engineer, including improved productivity and customer satisfaction
Q39. 1) Java features 2) Access Modifiers 3) Arraylist 4) explain private and Default access modifiers 5) What is collection And explain Arraylist. 6) what is exception handling what it use in java. 7)Throw and thro...
read moreJava features, access modifiers, ArrayList, exception handling, and throw/throws in Java.
Java features include platform independence, object-oriented programming, and automatic memory management.
Access modifiers in Java are public, private, protected, and default. They control the visibility and accessibility of classes, methods, and variables.
ArrayList is a dynamic array in Java that can grow or shrink in size. It is part of the Java Collections Framework.
Private access modi...read more
Q40. What happens if there is finally block inside an exception block?
Finally block will always execute, even if an exception is thrown in the try or catch block.
Finally block is used to execute code that must always run, regardless of whether an exception was thrown or not.
If an exception is thrown in the try or catch block, the finally block will still execute.
Finally block is often used to release resources like file handles, database connections, etc.
Q41. Difference Between classic folder and Modern folder?
Classic folders are traditional file storage structures, while modern folders are enhanced with additional features and capabilities.
Classic folders follow a hierarchical structure, with subfolders and files organized in a tree-like format.
Modern folders often include metadata, tags, and other attributes to enhance search and organization.
Classic folders rely on manual organization and navigation, while modern folders offer automated organization and intelligent search.
Modern...read more
Q42. Do you know how to configure Outlook?
Yes, I know how to configure Outlook.
I am familiar with setting up email accounts in Outlook
I can configure email settings such as incoming and outgoing servers
I can troubleshoot common issues such as connection problems or syncing errors
I am knowledgeable about setting up rules and filters for organizing emails
I can assist users with importing and exporting data from Outlook
Q43. What os BGP community? What ips role of BGP communities?
BGP community is a way to tag routes with additional information. It helps in controlling the flow of traffic.
BGP community is a 32-bit number that can be attached to a route advertisement.
It is used to tag routes with additional information.
It helps in controlling the flow of traffic by allowing network administrators to manipulate the way BGP routes are propagated and selected.
BGP communities can be used to implement policies such as traffic engineering, route filtering, an...read more
Q44. What are different types of joins
Different types of joins are Inner Join, Left Join, Right Join, and Full Outer Join.
Inner Join returns only the matching rows from both tables.
Left Join returns all the rows from the left table and matching rows from the right table.
Right Join returns all the rows from the right table and matching rows from the left table.
Full Outer Join returns all the rows from both tables, with NULL values in the columns where there is no match.
Join types can be combined with other SQL cla...read more
Q45. What is difference between Auto-Pilot and Co-management?
Auto-Pilot is a fully automated management solution while Co-management is a shared management solution.
Auto-Pilot is a cloud-based solution that automates device deployment, configuration, and management.
Co-management allows organizations to manage devices using both Configuration Manager and Intune.
Auto-Pilot is designed for modern devices running Windows 10 while Co-management is designed for legacy devices.
Auto-Pilot is a fully automated solution while Co-management is a ...read more
Q46. What was a pointer in c language?
A pointer in C language is a variable that stores the memory address of another variable.
Pointers are used to manipulate data directly in memory
They can be used to pass data between functions efficiently
Pointers can be used to create dynamic data structures like linked lists
Example: int *ptr; ptr = # *ptr = 10; //num now has a value of 10
Q47. How to manage teams and assign task
Managing teams involves clear communication, delegation, and accountability.
Establish clear goals and expectations for each team member
Communicate regularly to ensure everyone is on the same page
Delegate tasks based on individual strengths and workload
Provide support and resources to help team members succeed
Hold team members accountable for their work and deadlines
Encourage collaboration and open communication within the team
Recognize and reward team members for their contri...read more
Q48. Write a program to find the names of students against a subject using stream API.
Program to find student names against a subject using stream API
Create a list of students with their subjects
Use stream API to filter the list based on the subject
Map the filtered list to get only the names of students
Collect the names in a list or any other data structure
Return the list of names
Q49. Which protocol we are using for monitoring network devices?
SNMP is the protocol used for monitoring network devices.
SNMP stands for Simple Network Management Protocol
It is used to manage and monitor network devices such as routers, switches, servers, etc.
SNMP allows network administrators to collect information about network performance, usage, and errors.
Examples of SNMP monitoring tools include Nagios, Zabbix, and PRTG Network Monitor.
Q50. Define EPG ? Why contract ios used for EPG communication?
EPG is Electronic Program Guide used for TV listings. Contract iOS is used for EPG communication due to its reliability and security.
EPG is a digital guide that provides information about TV programs and schedules.
Contract iOS is a secure and reliable way to communicate EPG data between devices.
EPG data can be accessed through set-top boxes, smart TVs, and mobile apps.
EPG data includes program titles, descriptions, start and end times, and channel information.
Q51. What are the different types of controller in SAP CRM webui?
The different types of controllers in SAP CRM webui include Component Controller, View Controller, Context Controller, and Custom Controller.
Component Controller: Controls the entire component and manages the context data.
View Controller: Controls the layout and rendering of the UI elements.
Context Controller: Manages the context data and communication between controllers.
Custom Controller: Allows for custom logic and functionality to be implemented.
Q52. How to test a printer for checking performance
To test printer performance, check print speed, quality, and connectivity.
Print a test page to check for print speed and quality.
Print a large document to test for any potential jams or errors.
Test connectivity by printing from different devices and checking for any connection issues.
Check ink or toner levels and replace if necessary.
Test different paper types and sizes to ensure compatibility.
Check for any software updates or driver issues.
Perform regular maintenance such as...read more
Q53. How to check logs for pods and containers in kubernets ?
To check logs for pods and containers in Kubernetes, you can use the kubectl command-line tool.
Use the 'kubectl logs' command to view logs for a specific pod or container.
Specify the pod or container name along with the appropriate flags.
You can also use selectors to filter logs based on labels or namespaces.
To follow logs in real-time, use the '-f' flag.
To limit the number of lines displayed, use the '--tail' flag.
To view logs from multiple containers in a pod, use the '--co...read more
Q54. Do you have experience in java 8 , could u explain some new features
Yes, Java 8 introduced several new features including lambda expressions, streams, and default methods.
Lambda expressions allow for functional programming and simplify code.
Streams provide a way to process collections of data in a functional way.
Default methods allow for adding new methods to interfaces without breaking existing implementations.
Other new features include the Optional class, Date and Time API, and Nashorn JavaScript engine.
Example: Lambda expression - (x, y) -...read more
Q55. Which Linux commands you have used on daily basis??
I have used various Linux commands on a daily basis.
ls - to list files and directories
cd - to change directories
grep - to search for specific text in files
tail - to view the end of a file
ps - to view running processes
kill - to terminate a process
chmod - to change file permissions
ssh - to connect to remote servers
scp - to transfer files between servers
tar - to archive and compress files
Q56. Diffence between P&L statement and PP reports, what comes in assets and liabilities in the finance statement
P&L statement shows revenue, expenses, and profit/loss. Balance sheet shows assets and liabilities.
P&L statement shows revenue, expenses, and profit/loss over a period of time
PP reports are production reports that show the quantity and quality of goods produced
Balance sheet shows assets and liabilities at a specific point in time
Assets include cash, accounts receivable, inventory, property, and equipment
Liabilities include accounts payable, loans, and accrued expenses
Q57. Different ways to implement and break Singleton pattern.
Different ways to implement and break Singleton pattern.
Implement: Eager initialization, Lazy initialization, Thread-safe initialization, Bill Pugh Singleton Implementation
Break: Reflection, Serialization/Deserialization, Cloning, Multithreading
Example: Eager initialization - private static final Singleton instance = new Singleton();
Example: Reflection - Constructor
constructor = Singleton.class.getDeclaredConstructor(); constructor.setAccessible(true); Singleton instance2 = ...read more
Q58. Real life scenario for food delivery company For delayed food delivery
In case of delayed food delivery, the food delivery company should take prompt actions to rectify the situation and compensate the customer.
Apologize to the customer for the delay and inconvenience caused.
Offer a discount or a free meal to the customer as compensation.
Ensure that the food is delivered as soon as possible and in good condition.
Investigate the cause of the delay and take measures to prevent it from happening again.
Maintain good communication with the customer t...read more
Q59. 1. What is HANA replication? 2. What is fencing? 3. What is near zero downtime technique, how to plan? 4. Migration process? 5. What are sum tool phases and role of standard configuration, High level configurat...
read moreTechnical Specialist interview questions on HANA replication, fencing, migration, minimizing downtime, and export/import files.
HANA replication is the process of copying data from one HANA system to another.
Fencing is a mechanism to prevent split-brain scenarios in a high-availability setup.
Near zero downtime technique involves careful planning and execution to minimize downtime during system upgrades or migrations.
Migration process involves moving data from one system to ano...read more
Q60. How many cycles microprocessor run in MOV A,B?
The number of cycles a microprocessor runs in MOV A,B depends on the specific microprocessor architecture.
The number of cycles can vary depending on the microprocessor architecture and its implementation.
In general, MOV A,B is a simple instruction that moves the value in register B to register A.
The number of cycles required for this instruction can range from 1 to multiple cycles.
Factors such as the microprocessor's pipeline, cache, and instruction set architecture can affec...read more
Q61. How useful is it to create a class public and private in Java ? And which one to prefer for whom?
Creating public and private classes in Java is useful for encapsulation and access control.
Creating a class as public allows it to be accessed from any other class.
Creating a class as private restricts its access to only within the same class.
Public classes are typically used for classes that need to be accessed by other classes or modules.
Private classes are typically used for helper classes or internal implementation details.
The choice between public and private depends on ...read more
Q62. What is the minimum clearance for DDR Data group signals Routing?
The minimum clearance for DDR Data group signals Routing is 6 mils.
DDR Data group signals Routing requires a minimum clearance of 6 mils to avoid crosstalk and interference.
The clearance may vary depending on the specific DDR standard being used.
It is important to follow the recommended guidelines provided by the DDR manufacturer.
Failure to meet the minimum clearance requirements can result in signal integrity issues and data corruption.
Examples of DDR standards include DDR2,...read more
Q63. What is the difference between workflow and approval process.?
Workflow automates standard internal procedures and processes to save time across the organization. Approval process automates the approval of records.
Workflow automates standard internal procedures and processes
Approval process automates the approval of records
Workflow can update fields, send email alerts, create tasks, etc.
Approval process involves submitting records for approval and defining approval steps
Workflow can be triggered by specific criteria or time-based events
A...read more
Q64. Recently which business portal is getting added under ministry of new and reneawable energy?
The business portal added under ministry of new and renewable energy is SAMPADA.
SAMPADA stands for System for Assessment, Awareness and Training for Renewable Energy Applications
It is a web-based platform for promoting and creating awareness about renewable energy technologies
It provides information on various renewable energy technologies, their applications, and financial incentives available for their adoption
It also offers online training and certification courses on rene...read more
Q65. What is map and what is collection and all those things
Map and Collection are data structures in programming used to store and manipulate data.
Map is a key-value pair data structure where each value is associated with a unique key.
Collection is a group of objects that can be accessed and manipulated as a single unit.
Examples of collections include lists, sets, and queues.
Maps are commonly used for caching, indexing, and searching data.
Collections are used for storing and manipulating data in various ways such as sorting, filterin...read more
Q66. How many handshakes will be there in a party with 30 members , everyone is required to handshake every person, no repeat handshakes will be there.
The number of handshakes in a party with 30 members where each person shakes hands with every other person once.
Calculate the total number of handshakes using the formula n(n-1)/2, where n is the number of people.
Substitute n=30 in the formula to get the total number of handshakes.
Total handshakes = 30(30-1)/2 = 435 handshakes.
Q67. What is Redux and Redux purpose?
Redux is a predictable state container for JavaScript apps.
Redux is a library for managing application state
It provides a predictable state container by enforcing a strict unidirectional data flow
Redux can be used with any UI library or framework
It is commonly used with React to manage state in complex applications
Redux allows for easy debugging and testing of state changes
Actions are dispatched to update the state, and reducers handle the updates
Selectors can be used to retr...read more
Q68. What is intern() method of String?
intern() method of String returns a canonical representation of the string object.
The intern() method returns a string that has the same contents as the original string, but is guaranteed to be from a pool of unique strings.
This method is useful when comparing strings for equality as it compares the references instead of the contents.
Example: String s1 = new String("hello"); String s2 = s1.intern(); // s2 will be from the string pool
Q69. What is MLAG? Difference between LACP & PAGP?
MLAG is a protocol used for creating a loop-free network topology. LACP and PAGP are link aggregation protocols.
MLAG stands for Multi-Chassis Link Aggregation Group.
It allows multiple switches to appear as a single logical switch to the connected devices.
LACP (Link Aggregation Control Protocol) is an IEEE standard protocol used for link aggregation.
PAGP (Port Aggregation Protocol) is a Cisco proprietary protocol used for link aggregation.
Both LACP and PAGP are used to bundle ...read more
Q70. How to manipulate outbound traffic in bgp
Outbound traffic in BGP can be manipulated using various techniques such as AS path prepending, community strings, and route maps.
AS path prepending involves adding additional AS numbers to the path attribute of a BGP route advertisement to make it less attractive to other BGP routers.
Community strings can be used to tag routes and apply policies to them based on the tags.
Route maps can be used to match specific routes and apply policies to them such as setting local preferen...read more
Q71. What would you do if there is a defect leakage ?
Defect leakage is a serious issue. I would take immediate action to identify the root cause and implement corrective measures.
Analyze the defect leakage data to identify the root cause
Implement corrective measures to fix the issue
Conduct a thorough review of the testing process to prevent future leakage
Communicate the issue and resolution to stakeholders
Track and monitor the effectiveness of the corrective measures
Q72. Find number which repeating first with linear complexity.
Finding repeating number with linear complexity.
Use Floyd's cycle-finding algorithm to detect the cycle in the sequence.
Maintain two pointers, one moving at a rate of one step and the other at a rate of two steps.
When they meet, move one pointer to the start and keep the other pointer at the meeting point.
Move both pointers at a rate of one step until they meet again, which is the start of the cycle.
The number at the start of the cycle is the repeating number.
Q73. What is the complicated issue that you have solved and what is the solution you have provided
Developed a real-time data processing system for a financial institution
Implemented a distributed system using Apache Kafka and Apache Storm
Designed a fault-tolerant architecture with multiple redundancy layers
Optimized the system for high throughput and low latency
Provided real-time monitoring and alerting using Grafana and Prometheus
Q74. Nexus 9K hardware models used in Leaf and spine architecture?
Nexus 9K hardware models used in Leaf and spine architecture.
Nexus 9372PX and 9372TX used as leaf switches
Nexus 9504, 9508, and 9516 used as spine switches
Nexus 93108TC-EX and 93180YC-EX also used as leaf switches
All models support VXLAN and ACI
Highly scalable and flexible architecture
Q75. How to create reports by pivot table?
Pivot tables are used to create reports by summarizing and analyzing data.
Select the data range that you want to analyze
Go to the 'Insert' tab and click on 'PivotTable'
Choose the location where you want to place the pivot table
Drag and drop the fields you want to analyze into the 'Rows' and 'Columns' areas
Add any additional fields to the 'Values' area to calculate summaries
Customize the pivot table by applying filters, sorting, and formatting
Refresh the pivot table if the sou...read more
Q76. 1. How to connect 2 DBs from spring boot application
To connect 2 DBs from a Spring Boot application, configure multiple data sources and use JdbcTemplate or EntityManager for each DB.
Configure multiple data sources in the application.properties file
Create separate configuration classes for each data source
Use JdbcTemplate or EntityManager to interact with each DB
Specify the appropriate data source in the repository or service classes
Q77. how to generate encrypted passwords for user module
Encrypted passwords for user module can be generated using hashing algorithms like bcrypt or PBKDF2.
Choose a strong hashing algorithm like bcrypt or PBKDF2
Generate a random salt for each user
Combine the password and salt, and hash the result using the chosen algorithm
Store the salt and hashed password in the database
When verifying a password, retrieve the salt for the user, combine it with the entered password, and hash the result using the same algorithm. Compare the resulti...read more
Q78. 1. what are the considerations while selecting engineering materials for specific applications? 2. How would you calculate sheer strength of a round cross section metal bar? 3. Explain your project work.
Considerations for selecting engineering materials, calculating sheer strength of a metal bar, and explaining project work.
Consider factors like strength, durability, cost, and availability when selecting materials for specific applications.
Calculate sheer strength of a round cross section metal bar using the formula: Sheer Strength = (0.5 * Ultimate Tensile Strength)
In project work, explain the objectives, methodology, results, and any challenges faced.
Q79. which html control is not programmable in asp.net what does this mean saas,pass,Iaas in technology what is design pattern what is Singleton what is multicast delegates
Answering technical questions related to ASP.NET and design patterns
The HTML control that is not programmable in ASP.NET is the control
SaaS stands for Software as a Service, PaaS stands for Platform as a Service, and IaaS stands for Infrastructure as a Service
Design patterns are reusable solutions to common software development problems
Singleton is a design pattern that restricts the instantiation of a class to one object
Multicast delegates are delegates that can have multip...read more
Q80. What is System.out.println?
System.out.println is a Java statement used to print output to the console.
System is a class in Java's core library.
out is a static member of the System class.
println is a method of the PrintStream class.
It is used to print output to the console.
It adds a newline character at the end of the output.
Q81. What functionalities have you worked as an AEM and java developer?
I have worked on developing custom components, templates, workflows, and integrating third-party systems in AEM. In Java, I have worked on backend development, RESTful services, and database interactions.
Developed custom components and templates in AEM
Implemented workflows for content approval processes
Integrated third-party systems with AEM
Backend development in Java
Created RESTful services
Worked on database interactions
Q82. End to end OTC domain process, where my core responsibility falls in.
OTC domain process involves end to end sales cycle from order placement to delivery, where my core responsibility lies.
My core responsibility is to lead the team in ensuring smooth functioning of the entire OTC process.
I need to ensure timely order placement, accurate order processing, and timely delivery of products.
I need to monitor inventory levels and ensure that products are available for sale.
I need to ensure that customer queries and complaints are addressed promptly a...read more
Q83. What is issue and risk? Have you involved in any Risk practice or not?
Issue and risk are two different concepts in project management. Issues are current problems that need to be resolved, while risks are potential future problems that need to be mitigated.
Issues are current problems that have already occurred and need to be addressed immediately
Risks are potential future problems that may or may not occur, but need to be identified and planned for
Examples of issues include budget overruns, missed deadlines, and scope changes
Examples of risks i...read more
Q84. What is runbook and SOP ? Can we consider SOP as Runbook or not?
Runbook is a set of instructions for IT operations, while SOP is a set of instructions for business processes. They are not the same.
Runbook is a document containing a set of procedures for IT operations, such as troubleshooting steps, maintenance tasks, and disaster recovery processes.
SOP (Standard Operating Procedure) is a document containing a set of instructions for business processes, such as employee onboarding, customer service protocols, and financial reporting proced...read more
Q85. Whether I have knowledge on PLM tools or not?
Yes, I have knowledge on PLM tools.
I have experience working with PLM tools such as Teamcenter and Windchill.
I have used PLM tools to manage product data, collaborate with cross-functional teams, and track project progress.
I am familiar with PLM concepts such as BOM management, change management, and version control.
I have also worked on customizing PLM tools to meet specific business requirements.
Overall, my experience with PLM tools has helped me streamline product developm...read more
Q86. Design the zabbix architecture and share how many servers are you gonna suggest the customer to have?
The number of servers required for Zabbix architecture depends on the size of the environment and the level of monitoring required.
Assess the size of the environment and the number of devices to be monitored
Determine the level of monitoring required, such as real-time monitoring or historical data analysis
Consider the need for high availability and redundancy
Suggest a minimum of 3 servers for a basic setup: 1 for the Zabbix server, 1 for the database, and 1 for the web interf...read more
Q87. whenever restart SQL server one database comes online late what is the reason what are are startup parameters how will you troubleshoot database goes into suspect mode
The reason for a database coming online late after restarting SQL server could be due to various factors such as large database size, heavy transactional activity, or insufficient server resources.
Large database size can result in longer recovery time during startup.
Heavy transactional activity can delay the recovery process.
Insufficient server resources like CPU, memory, or disk I/O can slow down the startup process.
Other factors like network issues or conflicts with other s...read more
Q88. How many matches will occur if there are 20 teams and each match is knock out match.
There will be 19 matches in total in a knock out tournament with 20 teams.
In a knock out tournament, each match eliminates one team.
To determine the number of matches, subtract 1 from the total number of teams.
For 20 teams, there will be 20 - 1 = 19 matches.
Q89. How to reduce/extend size of a lvm partition
To reduce/extend size of a lvm partition, use lvresize command.
Use lvresize command with appropriate options to reduce/extend the size of a lvm partition.
To reduce the size, use the option --resizefs to resize the file system as well.
To extend the size, use the option --resizefs only if the file system supports online resizing.
Example: lvresize --resizefs --size -2G /dev/vg01/lv01 to reduce by 2GB.
Example: lvresize --resizefs --size +2G /dev/vg01/lv01 to extend by 2GB.
Q90. What exact code to be written when there are two field in selection screen if one field is filled the display second field and in which event it need to be written.
Use AT SELECTION-SCREEN OUTPUT event to display second field based on first field input.
Use AT SELECTION-SCREEN OUTPUT event to check if first field is filled.
If first field is filled, display the second field using the statement 'SET PF-STATUS'.
Example: AT SELECTION-SCREEN OUTPUT. IF sy-abcde = 'X'. SET PF-STATUS 'SECOND_FIELD'. ENDIF.
Q91. difference between get and load method in hibernate?
get() method returns null if the object is not found in the cache or database, while load() method throws an exception.
get() method is eager loading while load() method is lazy loading.
get() method returns the object from the database or cache while load() method returns a proxy object.
get() method is slower than load() method.
get() method is used when we are not sure if the object exists in the database or cache while load() method is used when we are sure that the object ex...read more
Q92. How can you handle different exceptionsin in a class
Handle exceptions in a class by using try-catch blocks and throwing custom exceptions.
Use try-catch blocks to catch exceptions and handle them appropriately.
Throw custom exceptions to provide more specific information about the error.
Use multiple catch blocks to handle different types of exceptions.
Implement a finally block to execute code regardless of whether an exception is thrown or not.
Q93. What is SEPA and the role of the project related to SEPA implementation?
SEPA is the Single Euro Payments Area, a project aimed at harmonizing electronic payments in Europe.
SEPA is a European Union initiative to simplify and standardize electronic payments across Europe.
It allows individuals and businesses to make cross-border payments in euros as easily as domestic payments.
SEPA implementation involves adopting common payment instruments, formats, and technical standards.
The project aims to enhance efficiency, reduce costs, and increase competiti...read more
Q94. What is difference between family ipv6 route-target and default-route-target in Nokia 7750 bgp configuration ?
Family ipv6 route-target and default-route-target in Nokia 7750 bgp configuration.
Family ipv6 route-target is used to import/export ipv6 routes within a VRF family
Default-route-target is used to import/export ipv4 routes within a VRF family
Family ipv6 route-target is configured under VRF family while default-route-target is configured under VRF
Family ipv6 route-target is used for VPNv6 while default-route-target is used for VPNv4
Q95. Patch installation procedures and what are the main components required.
Patch installation procedures and main components required.
Patch installation procedures involve planning, testing, and deployment.
Main components required include the patch file, installation package, and documentation.
Procedures may vary depending on the SharePoint version and environment.
Testing should be done in a non-production environment before deployment.
Documentation should include details of the patch, installation steps, and rollback plan.
Q96. What is the difference between AngularJS & angular 10
AngularJS is the first version of Angular, while Angular 10 is the latest version with significant improvements and updates.
AngularJS is based on JavaScript, while Angular 10 is based on TypeScript.
AngularJS uses controllers and $scope for data binding, while Angular 10 uses components and directives.
AngularJS has two-way data binding, while Angular 10 has one-way data binding by default.
AngularJS uses $http for AJAX requests, while Angular 10 uses HttpClient module for the s...read more
Q97. How did you handled performance testing end to end?
I handled performance testing end to end by conducting thorough analysis, creating test plans, executing tests, analyzing results, and implementing optimizations.
Conducted thorough analysis to identify key performance metrics and testing requirements
Created detailed test plans outlining scenarios, tools, and success criteria
Executed tests using appropriate tools and techniques, monitoring system behavior and performance
Analyzed test results to identify bottlenecks, performanc...read more
Q98. How to troubleshoot netbackup 13 backup failure.
To troubleshoot netbackup 13 backup failure, check logs, verify connectivity, and ensure proper configuration.
Check the logs for any error messages or warnings
Verify connectivity between the backup server and the client
Ensure that the backup policy is properly configured
Check for any conflicts with other backup jobs or processes
Verify that the backup media is available and properly configured
Consider running a test backup to isolate the issue
Q99. Technical Writers produce what types of documents?
Technical Writers produce a variety of documents to communicate complex technical information.
User manuals and guides
Technical specifications
API documentation
Training materials
White papers
Online help systems
Release notes
Troubleshooting guides
Q100. What is Stakeholders in Project Management and type?
Stakeholders in project management are individuals or groups who have an interest in the project and can influence or be influenced by its outcome.
Stakeholders can include project sponsors, team members, clients, end users, suppliers, and regulatory bodies.
They can be classified into internal stakeholders (e.g. team members) and external stakeholders (e.g. clients).
Stakeholders can have varying levels of influence and interest in the project, which can impact project success....read more
Top HR Questions asked in DSP Mutual Fund
Interview Process at DSP Mutual Fund
Top Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month