HCLTech
100+ Daksh International School Interview Questions and Answers
Q1. what's difference between server.transfer and Response.redirect
Difference between server.transfer and Response.redirect
Server.Transfer transfers control to another page on the server without the client knowing
Response.Redirect sends a message to the client to redirect to another page
Server.Transfer is faster and more efficient than Response.Redirect
Server.Transfer can only be used within the same application, while Response.Redirect can be used to redirect to any URL
Q2. 1) Advantage of springboot over spring 2) Tell me all the anotations you know in spring 3) What are CRUD operations, write controller layer and use validating annotations like @NotNull, @valid etc. how to valid...
read moreThe interview questions cover various topics related to Spring framework, REST vs SOAP, JPA repository, Feign client, circuit breaker, and Spring Security.
Spring Boot provides a simpler and faster way to set up and run Spring applications compared to traditional Spring.
Common annotations in Spring include @Controller, @Service, @Repository, @Autowired, @Component, @RequestMapping, @GetMapping, @PostMapping, @PutMapping, @DeleteMapping, @Valid, @NotNull, etc.
CRUD operations re...read more
Q3. 1) OOPS in java, and told to explain abstraction, encapsulation, inheritance with practical code 2) Exception handling(globally), Authentication and authorization 3) SOLID principles and factory design pattern...
read moreInterview questions for Software Engineer position covering OOPS concepts, exception handling, SOLID principles, Java 8 features, and Streams.
Abstraction in OOPS: Hiding implementation details. Example: Abstract class Shape with method draw().
Encapsulation in OOPS: Bundling data and methods that operate on the data. Example: Class Employee with private fields and public getters/setters.
Inheritance in OOPS: Reusing code and extending functionality. Example: Class Dog extends A...read more
Q4. What string pool in java and why string is immutable
String pool is a cache of string literals in Java. String is immutable to ensure security and efficiency.
String pool is a collection of unique string literals stored in heap memory.
When a new string is created, JVM checks if it already exists in the pool. If yes, it returns the reference to the existing object.
String immutability ensures that once a string is created, its value cannot be changed. This ensures security and efficiency.
For example, if a password is stored as a s...read more
Q5. What is difference between if else and switch ?
if else is used for conditional statements with multiple conditions while switch is used for multiple conditions with same variable.
if else can handle multiple conditions with different outcomes
switch can handle multiple conditions with same outcome
if else is more flexible and can handle complex conditions
switch is faster and easier to read for simple conditions
example of if else: if (x > 5) {do something} else if (x < 5) {do something else} else {do something else}
example of...read more
Q6. What is executor in multithreading and what is thread pool
Executor is an interface that executes submitted tasks in a separate thread. Thread pool is a collection of threads that can be reused.
Executor provides a way to decouple task submission from task execution.
Thread pool manages a fixed number of threads and assigns tasks to them.
Executor framework provides a way to manage thread pools.
Example: Executors.newFixedThreadPool(10) creates a thread pool with 10 threads.
Example: Executor.execute(Runnable task) submits a task to the e...read more
Q7. What are jagged array
Jagged arrays are arrays of arrays with different lengths.
Jagged arrays are also known as ragged arrays.
They are useful when the number of elements in each row is not fixed.
Example: int[][] jaggedArray = new int[3][]; jaggedArray[0] = new int[2]; jaggedArray[1] = new int[4]; jaggedArray[2] = new int[3];
Accessing elements in a jagged array requires two sets of square brackets.
Jagged arrays can be used to represent irregularly shaped data, such as a matrix with missing values.
Q8. What do you mean by oops concept
OOPs (Object-Oriented Programming) is a programming paradigm based on the concept of 'objects', which can contain data and code.
OOPs focuses on the use of classes and objects to organize and structure code
Encapsulation, inheritance, and polymorphism are key concepts in OOPs
Examples of OOPs languages include Java, C++, and Python
Q9. What are the type if data structure.
Data structures are ways of organizing and storing data in a computer so that it can be accessed and used efficiently.
There are two main types of data structures: primitive and non-primitive
Primitive data structures include integers, floats, characters, and booleans
Non-primitive data structures include arrays, linked lists, stacks, queues, trees, and graphs
Each data structure has its own advantages and disadvantages depending on the use case
Q10. What do you mean by 64bit and 32bit .
64bit and 32bit refer to the size of data that a processor can handle.
64bit processors can handle larger amounts of memory and perform faster than 32bit processors.
64bit processors are more efficient in handling complex calculations and running multiple applications simultaneously.
32bit processors are limited to 4GB of RAM and can only handle 32bit software.
Most modern computers and operating systems are 64bit.
Examples of 64bit processors include Intel Core i5 and i7, AMD Ryz...read more
Q11. What do you mean by control structure.
Control structure refers to the way a program is organized and executed based on certain conditions.
Control structures are used to control the flow of a program.
They include if-else statements, loops, and switch statements.
If-else statements allow for conditional execution of code.
Loops allow for repeated execution of code.
Switch statements allow for multiple possible outcomes based on a single variable.
Proper use of control structures can improve program efficiency and reada...read more
Q12. Difference between while loop and do while loop.
While loop executes only if the condition is true, do while loop executes at least once before checking the condition.
While loop checks the condition first, then executes the code block
Do while loop executes the code block first, then checks the condition
While loop may not execute at all if the condition is false initially
Do while loop always executes at least once
While loop is a pre-test loop, do while loop is a post-test loop
Q13. 1.Oops concepts 2.what is list and tuples 3.write code to sort the string
Interview questions for Software Engineer on OOPs concepts, list and tuples, and sorting strings.
OOPs concepts include inheritance, polymorphism, encapsulation, and abstraction.
Lists and tuples are data structures in Python. Lists are mutable while tuples are immutable.
To sort a string in Python, use the sorted() function or the sort() method.
Q14. Explain the data structures like linked list, dfs and bfs.
Linked list is a linear data structure. DFS and BFS are graph traversal algorithms.
Linked list is a collection of nodes where each node points to the next node.
DFS (Depth First Search) is a traversal algorithm that explores as far as possible along each branch before backtracking.
BFS (Breadth First Search) is a traversal algorithm that explores all the vertices of a graph in breadth-first order.
Example of linked list: 1->2->3->4->5
Example of DFS: starting from node A, explore...read more
Q15. What are oops concepts and describe each?
OOPs concepts are the fundamental principles of object-oriented programming.
Abstraction: Hiding implementation details and showing only necessary information.
Encapsulation: Binding data and functions together in a single unit.
Inheritance: Acquiring properties and behavior of a parent class by a child class.
Polymorphism: Ability of an object to take many forms or have multiple behaviors.
Association: Relationship between two objects.
Aggregation: A special form of association wh...read more
Q16. What is singleton class in java
Singleton class is a class that can have only one instance and provides a global point of access to it.
Singleton class is used when we need to ensure that only one instance of a class is created throughout the application.
It is implemented by making the constructor private and providing a static method to get the instance of the class.
Example: java.lang.Runtime is a singleton class that provides access to the runtime environment of the current Java application.
Singleton patte...read more
Q17. What do you mean by network.
A network is a group of interconnected devices that can communicate and share resources.
A network can be wired or wireless.
Devices on a network can share files, printers, and internet access.
Networks can be local (LAN) or wide area (WAN).
Examples of networks include the internet, home Wi-Fi, and corporate intranets.
Q18. What is array and linked list.
Array is a collection of elements of same data type. Linked list is a data structure where each element points to the next one.
Arrays have fixed size, linked lists can grow dynamically
Arrays have constant time access, linked lists have linear time access
Arrays are stored in contiguous memory, linked lists are stored in non-contiguous memory
Example of array: int[] arr = {1, 2, 3, 4, 5}
Example of linked list: Node head = new Node(1); head.next = new Node(2);
Q19. How we make a class immutable in java
To make a class immutable in Java, we need to follow certain rules.
Make the class final so that it cannot be extended
Make all the fields private and final
Do not provide any setter methods
If the class has mutable fields, return a copy of the field instead of the original in getter methods
Ensure that any mutable objects passed to the constructor are not modified outside the class
Override equals() and hashCode() methods to ensure that objects can be compared properly
Q20. What is encapsulation
Encapsulation is the process of hiding implementation details and providing a public interface for accessing the functionality.
Encapsulation helps in achieving data abstraction and information hiding
It prevents unauthorized access to the internal details of an object
It allows for easy modification of implementation without affecting the external code
Example: A class with private variables and public methods
Example: A bank account class with methods for deposit and withdraw, b...read more
Q21. Make a nested array to flat array using customised method
Convert nested array to flat array using custom method
Create a recursive function to flatten the nested array
Use Array.isArray() to check if an element is an array
Concatenate arrays using Array.concat() method
Q22. What is operating system.
An operating system is a software that manages computer hardware and software resources.
It acts as an interface between the user and the computer hardware.
It provides services to applications and manages system resources.
Examples include Windows, macOS, Linux, Android, iOS.
It controls the allocation of memory, processing power, and input/output devices.
It provides security and protection to the system and user data.
Q23. Different type of testing and testing tools?
Different types of testing include unit, integration, system, acceptance, and regression testing. Testing tools include Selenium, JUnit, and TestNG.
Unit testing: testing individual units or components of code
Integration testing: testing how different units or components work together
System testing: testing the entire system as a whole
Acceptance testing: testing to ensure the system meets the requirements of the stakeholders
Regression testing: testing to ensure changes to the ...read more
Q24. Differentiate between DBMS & RDBMS
DBMS is a software to manage databases while RDBMS is a type of DBMS that uses a relational model.
DBMS stands for Database Management System while RDBMS stands for Relational Database Management System.
DBMS can manage any type of database while RDBMS uses a relational model to manage data.
DBMS does not enforce any specific data model while RDBMS enforces a tabular data model.
Examples of DBMS include MongoDB and Cassandra while examples of RDBMS include MySQL and Oracle.
Q25. How many types of loops.
There are three types of loops in programming.
The three types of loops are: for loop, while loop, and do-while loop.
For loop is used when the number of iterations is known beforehand.
While loop is used when the number of iterations is not known beforehand.
Do-while loop is similar to while loop, but it executes at least once before checking the condition.
Q26. Optimize the given program from O(n2) to O(log n)
Optimize O(n2) program to O(log n)
Use binary search instead of linear search
Divide and conquer approach can be used
Implement efficient data structures like heap, AVL tree, etc.
Reduce unnecessary iterations and comparisons
Use memoization to avoid redundant calculations
Q27. Given a string remove the unwanted spaces
Remove unwanted spaces from a given string
Use string manipulation functions to remove extra spaces
Iterate through the string and remove any consecutive spaces
Trim the string to remove leading and trailing spaces
Q28. Explain types of network.
Types of network include LAN, WAN, MAN, WLAN, VPN, PAN, SAN, CAN, and GAN.
LAN (Local Area Network) connects devices within a small area
WAN (Wide Area Network) connects devices across a large geographical area
MAN (Metropolitan Area Network) connects devices within a city or metropolitan area
WLAN (Wireless Local Area Network) uses wireless technology to connect devices within a small area
VPN (Virtual Private Network) allows secure remote access to a private network
PAN (Personal...read more
Q29. What is a pointer to pointer
A pointer to pointer is a variable that stores the memory address of another pointer.
It is used to store the address of a pointer variable.
It allows indirect access to a memory location.
Commonly used in dynamic memory allocation and multi-dimensional arrays.
Q30. inheritance and its types
Inheritance is a mechanism in object-oriented programming where a class inherits properties and behaviors from another class.
Inheritance allows code reuse and promotes code organization.
There are different types of inheritance: single, multiple, multilevel, hierarchical, and hybrid.
Single inheritance involves a class inheriting from a single base class.
Multiple inheritance involves a class inheriting from multiple base classes.
Multilevel inheritance involves a class inheritin...read more
Q31. Which compiler we are using in c C data types
The choice of compiler in C depends on the platform and the specific needs of the project.
Different platforms may have different default compilers, such as GCC on Linux and Clang on macOS.
Some projects may require a specific compiler for compatibility or performance reasons.
C compilers include GCC, Clang, Microsoft Visual C++, and Intel C++ Compiler, among others.
Q32. Thread and its types
Thread is a lightweight process that can run concurrently with other threads in a program.
There are two types of threads: user-level threads and kernel-level threads.
User-level threads are managed by the application and are faster to create and switch between, but can't take advantage of multiple processors.
Kernel-level threads are managed by the operating system and can take advantage of multiple processors, but are slower to create and switch between.
Examples of thread libr...read more
Q33. Polymorphism and its types
Polymorphism is the ability of an object to take on many forms. It has two types: compile-time and runtime polymorphism.
Compile-time polymorphism is achieved through function overloading and operator overloading.
Runtime polymorphism is achieved through virtual functions and function overriding.
Polymorphism allows for code reusability and flexibility in object-oriented programming.
Example of compile-time polymorphism: function overloading - multiple functions with the same nam...read more
Q34. What is a pointer
A pointer is a variable that stores the memory address of another variable.
Pointers are used to indirectly access and manipulate data in memory.
They are commonly used in programming languages like C and C++.
Example: int *ptr; // declares a pointer to an integer variable
Q35. Difference between Groupby and Orderby.
Groupby is used to group data based on a specific column, while Orderby is used to sort data based on a specific column.
Groupby is used to create groups of data based on a specific column.
Orderby is used to sort data based on a specific column in ascending or descending order.
Groupby is often used in combination with aggregate functions like sum, count, etc.
Orderby can be used to sort data in ascending or descending order.
Groupby is commonly used in SQL queries, while Orderby...read more
Q36. Difference b/w delete, truncate, drop
Delete removes specific rows from a table, truncate removes all rows, and drop removes the entire table.
Delete is a DML operation, while truncate and drop are DDL operations.
Delete can be rolled back, while truncate and drop cannot be rolled back.
Delete operation maintains the transaction log, while truncate and drop do not.
Delete operation is slower compared to truncate and drop.
Example: DELETE FROM table_name WHERE condition;
Example: TRUNCATE TABLE table_name;
Example: DROP ...read more
Q37. Difference between ++x and x++
++x increments the value of x and then returns the incremented value, while x++ returns the current value of x and then increments it.
++x is a pre-increment operator, it increments the value of x and then returns the incremented value
x++ is a post-increment operator, it returns the current value of x and then increments it
Example: int x = 5; int y = ++x; // x is now 6, y is 6
Example: int x = 5; int y = x++; // x is now 6, y is 5
Q38. Find the second highest number by using Java Stream, What are the new changes in Java 8 from Java 7. HashMap and HashSet internal implementation.
Using Java Stream to find the second highest number, Java 8 changes, HashMap and HashSet internal implementation.
Use Java Stream to sort the numbers in descending order and skip the first element to get the second highest number.
Java 8 introduced lambda expressions, functional interfaces, Stream API, default methods in interfaces, and new Date and Time API.
HashMap uses buckets to store key-value pairs, while HashSet uses HashMap internally to store unique elements.
HashMap all...read more
Q39. 1. How many ways to create resource on Azure? 2. What's horizontal scaling and vertical scaling? 3. What is kubernetes? 4. Types of linux OS flavour. 5. Five basic commands of Unix.
Azure resources can be created through Azure portal, Azure CLI, Azure PowerShell, ARM templates, and Azure Resource Manager.
Azure portal: User-friendly interface for creating and managing Azure resources.
Azure CLI: Command-line tool for managing Azure resources.
Azure PowerShell: PowerShell cmdlets for Azure resource management.
ARM templates: Infrastructure as code for defining Azure resources.
Azure Resource Manager: Service for managing resources in Azure.
Q40. How is Azure, AWS, GCP different from each other and what are the similarities?
Azure, AWS, and GCP are cloud computing platforms with differences in services, pricing, and market share.
Azure is developed by Microsoft and is known for its strong integration with Windows-based systems.
AWS is the oldest and most widely used cloud platform, offering a wide range of services and a pay-as-you-go pricing model.
GCP, developed by Google, is known for its strong data analytics and machine learning capabilities.
All three platforms offer similar services such as vi...read more
Q41. check given string is Anagram string or not .
An Anagram string is a string that can be formed by rearranging the letters of another string.
Check if both strings have the same length.
Sort the characters of both strings and compare them.
Alternatively, use a hashmap to count the frequency of characters in both strings.
Q42. What is derivatives, corporate action, Nav, money market, capital market
Derivatives are financial contracts that derive their value from an underlying asset. Corporate actions are events that affect a company's stock. NAV is the net asset value of a mutual fund. Money market deals with short-term borrowing and lending. Capital market deals with long-term borrowing and lending.
Derivatives are contracts between two parties that derive their value from an underlying asset, such as stocks, bonds, or commodities.
Corporate actions are events that affec...read more
Q43. Able to relocate anywhere in India
Yes, willing to relocate anywhere in India for the right opportunity.
Open to relocating for career growth and new experiences
Excited about the prospect of exploring different cities and cultures
Flexible and adaptable to new environments
Examples: Relocated for previous job opportunities, willing to move for the right role
Q44. Matrix elements rotation of 90 degree
Rotate the elements of a matrix by 90 degrees clockwise
Transpose the matrix
Reverse each row of the transposed matrix
Q45. What's CLI? Can we create Load balancer using CLI?
CLI stands for Command Line Interface. Yes, we can create a Load balancer using CLI.
CLI is a text-based interface used to interact with a computer system.
It allows users to input commands to perform tasks without the need for a graphical user interface.
Load balancers can be created using CLI commands in cloud platforms like AWS or Azure.
For example, in AWS, you can use the AWS CLI to create a load balancer using the 'create-load-balancer' command.
Q46. C++, OOPS, STL, Find Error in Code Snippet
The question tests knowledge of C++, OOPS, and STL by asking to find errors in a code snippet.
Check for syntax errors, such as missing semicolons or incorrect variable declarations.
Look for logical errors, like incorrect usage of OOPS concepts or STL functions.
Ensure proper memory management and error handling in the code snippet.
Q47. 1. How to repair outlook and how to command for outlook safe mode?
Repairing Outlook involves troubleshooting common issues and running in safe mode for diagnosing problems.
To repair Outlook, try restarting the application, repairing Office installation, or creating a new Outlook profile.
To run Outlook in safe mode, use the command 'outlook.exe /safe' in the Run dialog box.
Safe mode disables add-ins and extensions, helping to identify if they are causing issues.
Common issues that can be resolved by repairing Outlook include freezing, crashin...read more
Q48. Difference between array list and linked list..where do we use ?
Array list stores elements in contiguous memory locations, while linked list stores elements in nodes with pointers to the next node.
Array list allows fast access to elements using index, while linked list allows for fast insertion and deletion of elements.
Array list is ideal for scenarios where random access is required, while linked list is suitable for scenarios where frequent insertion and deletion operations are needed.
Example: Array list is used in scenarios where eleme...read more
Q49. What is VPN? What is SLA and tell me about ticketing tool
VPN stands for Virtual Private Network, which allows users to securely access a private network over a public network.
VPN creates a secure connection between a user and a private network, encrypting data to ensure privacy and security.
It is commonly used by remote workers to access company resources securely.
VPN can also be used to bypass geo-restrictions and access region-locked content.
Popular VPN services include NordVPN, ExpressVPN, and CyberGhost.
Q50. Write a code to find out which pairs in the array list will give the sum as 8
Code to find pairs in array list with sum 8
Iterate through array and check if pair sum is 8
Use a hashmap to store elements and their complements
Time complexity O(n)
Q51. How to communicate two api’s in springboot.Explain the implementation
To communicate two APIs in Spring Boot, you can use RestTemplate or WebClient to make HTTP requests.
Use RestTemplate to make synchronous HTTP requests between APIs
Use WebClient to make asynchronous HTTP requests between APIs
Implement error handling and exception handling for robust communication
Consider using Feign client for declarative REST client
Ensure proper authentication and authorization mechanisms are in place
Q52. What is the restcontroller and controller annotation
RestController and Controller annotations are used in Spring framework to define classes as controllers for handling HTTP requests.
RestController annotation is used to define a class as a RESTful web service controller, which returns data in JSON or XML format.
Controller annotation is used to define a class as a traditional Spring MVC controller, which returns a view to the client.
Both annotations are used to handle HTTP requests and map them to specific methods in the contro...read more
Q53. What is meant by @data annotation and @value annotation
The @Data annotation is used in Java to declare a class as a data class, while the @Value annotation is used in Spring to create immutable objects.
The @Data annotation in Java is used to generate getters, setters, toString, equals, and hashCode methods for a class.
The @Value annotation in Spring is used to create immutable objects with final fields that are initialized through constructor injection.
Both annotations help in reducing boilerplate code and improving code readabil...read more
Q54. How to read the values from application properties file
To read values from application properties file, use a properties file reader in the programming language being used.
Use a properties file reader class in the programming language being used (e.g. Properties class in Java).
Load the properties file using the reader class.
Access the values using keys specified in the properties file.
Q55. How to troubleshoot internet not working issue
Troubleshooting internet not working issue
Check if the internet connection is properly plugged in
Restart the router and modem
Check for any service outages in the area
Reset network settings on the device
Try connecting to a different network to isolate the issue
Q56. What is meant by @qualifier and @autowired
Annotations used in Spring framework for dependency injection
Used in Spring framework to inject dependencies
Qualifier is used to specify which bean to autowire when multiple beans of the same type exist
Autowired is used to automatically inject the dependency
Q57. Write a code to print the even numbers as well as the squares of it in java8
Code to print even numbers and their squares in Java8
Use Java8 Stream API to generate even numbers
Map each even number to its square using map() function
Print the even numbers and their squares using forEach() function
Q58. How to make a specific
To make a specific what? Please provide more context.
Please provide more information about what needs to be made specific
Clarify the scope and purpose of the specific thing
Consider using clear and concise language to define the specific thing
Q59. What is meant by @configuration annotation
Annotation used in Spring framework to indicate that a class declares one or more @Bean methods
Used in Spring framework to define configuration classes
Indicates that a class should be considered as a source of bean definitions
Helps Spring to understand the configuration and create beans accordingly
Q60. What are the intermediate operations in java8
Intermediate operations in Java 8 are used to process the stream elements and produce a new stream as output.
Intermediate operations are lazy and do not start processing the stream until a terminal operation is invoked.
Examples of intermediate operations include filter, map, sorted, distinct, limit, and skip.
Intermediate operations can be chained together to form a pipeline of operations on a stream.
Q61. What is Financial market
Financial market is a platform where buyers and sellers trade financial securities, commodities, and other fungible items.
Financial markets facilitate the exchange of assets such as stocks, bonds, currencies, and derivatives.
They provide a platform for companies to raise capital through issuing stocks and bonds.
Financial markets can be categorized into stock markets, bond markets, commodity markets, and currency markets.
Examples include the New York Stock Exchange (NYSE), Lon...read more
Q62. Short term and long term goal
Short term goal is to excel in current role, long term goal is to become a team lead.
Short term goal: Master current responsibilities, improve skills, and contribute to team success
Long term goal: Develop leadership skills, mentor junior analysts, and lead projects
Example: Short term - Complete all assigned tasks ahead of schedule. Long term - Lead a successful project team
Q63. What is the usage of method reference
Method reference is a shorthand syntax for lambda expressions to call a method.
Method reference can be used to refer to static methods, instance methods, and constructors.
It helps in improving code readability and conciseness.
Example: list.forEach(System.out::println) is equivalent to list.forEach(item -> System.out.println(item)).
Q64. What is the use of static class
Static class is used to create classes that cannot be instantiated and can only have static members.
Static class cannot be instantiated, meaning you cannot create an object of a static class.
Static class can only have static members such as static fields, methods, properties, and events.
Static classes are commonly used for utility classes where all members are static and do not require an instance to be accessed.
Q65. Do you know about Azure?
Azure is a cloud computing platform by Microsoft.
Azure is a cloud computing service provided by Microsoft.
It offers a wide range of services including virtual computing, storage, networking, and analytics.
Azure allows users to build, deploy, and manage applications through Microsoft's data centers.
Popular Azure services include Azure Virtual Machines, Azure Blob Storage, and Azure SQL Database.
Q66. Write a sample code using @functional annotation
Sample code using @functional annotation
Use @FunctionalInterface annotation to declare a functional interface in Java
Functional interfaces have exactly one abstract method
Example: @FunctionalInterface interface MyFunctionalInterface { void myMethod(); }
Q67. What are the features of java8
Java 8 introduced several new features including lambda expressions, functional interfaces, streams, and the new date and time API.
Lambda expressions allow you to write code in a more concise and readable way.
Functional interfaces provide a way to define interfaces with a single abstract method.
Streams allow for processing sequences of elements in a functional style.
The new date and time API provides improved date and time handling capabilities.
Q68. What is stream in java8
Streams in Java 8 are sequences of elements that support functional-style operations.
Streams allow for processing sequences of elements in a functional way
They can be created from collections, arrays, or I/O resources
Common operations on streams include map, filter, reduce, and collect
Q69. What is your strength programming language?
My strength programming language is C++. I have extensive experience in developing software and solving complex problems using C++.
Proficient in object-oriented programming with C++
Strong knowledge of data structures and algorithms
Experience in developing efficient and scalable code
Familiarity with C++ libraries and frameworks
Ability to debug and optimize code for performance
Experience in multi-threading and parallel programming
Knowledge of C++ best practices and coding stand...read more
Q70. What is immutable class
Immutable class is a class whose instances cannot be modified after creation.
Immutable class instances have all fields as final and private.
Immutable classes have no setter methods, only getter methods.
Examples of immutable classes in Java are String, Integer, and LocalDate.
Q71. What is parallel stream
Parallel stream is a feature in Java that allows processing elements of a stream concurrently.
Parallel stream can be created from a regular stream using parallel() method.
It utilizes multiple threads to process elements in parallel, improving performance for large datasets.
However, parallel stream may not always be faster than sequential stream due to overhead of managing multiple threads.
Example: List
list = Arrays.asList("apple", "banana", "cherry"); list.parallelStream().f...read more
Q72. Difference between map and flatmap
Map applies a function to each element in a collection and returns a new collection. FlatMap applies a function that returns a collection for each element and flattens the result into a single collection.
Map transforms each element of a collection using a function and returns a new collection of the same size.
FlatMap transforms each element of a collection using a function that returns a collection, then flattens the result into a single collection.
Example: map([1, 2, 3], x =...read more
Q73. Can you tell me about the Golden rule of accounting?
The Golden rule of accounting is to debit the receiver and credit the giver.
It is a fundamental principle of accounting.
It is used to record transactions in the correct way.
It ensures that the accounting equation remains balanced.
For example, when a company receives cash, it debits cash and credits the account that provided the cash.
It is also known as the principle of reciprocity.
Q74. What is singleton
Singleton is a design pattern that restricts the instantiation of a class to one object.
Ensures a class has only one instance and provides a global point of access to it
Commonly used in scenarios where only a single instance of a class is needed, such as database connections or configuration settings
Implemented by creating a static method that returns the same instance of the class every time it is called
Q75. Steps of ISO implementation.
Steps of ISO implementation involve planning, documentation, training, implementation, audit, and certification.
Develop an implementation plan outlining goals, resources, and timeline.
Document processes and procedures to meet ISO standards.
Provide training to employees on ISO requirements and procedures.
Implement the documented processes and procedures in the organization.
Conduct internal audits to ensure compliance with ISO standards.
Seek certification from an accredited cer...read more
Q76. 1. What is a SMTP and how it's being used 2. What is ITIL and it's version 3. What were the troubleshooting for Internet disconnected? 4.What is BSOD? 5. What is the use of IPconfing command?
Answers to common IT-related questions for Service Desk Analyst position
SMTP is a protocol used for sending email messages between servers
ITIL is a framework for IT service management, with versions including ITIL v3 and ITIL 4
Troubleshooting for Internet disconnected includes checking cables, resetting the router, and checking network settings
BSOD stands for Blue Screen of Death, a critical error in Windows operating systems
IPconfig is a command used to display and manage ne...read more
Q77. What is X path? What is absolute xpath and relative xpath?
XPath is a language used to navigate through XML documents. Absolute XPath specifies the complete path from the root element, while relative XPath specifies the path from the current element.
XPath is used to locate elements in an XML document
Absolute XPath starts with a single forward slash and specifies the complete path from the root element
Relative XPath starts with a double forward slash and specifies the path from the current element
Example of Absolute XPath: /html/body/...read more
Q78. What kind of situations have you encountered during bulk load or complex mapping and what did you do to make the job more efficient. How do you enhance your job?
Q79. You know any computer skills
Yes, I have a strong foundation in computer skills including programming languages, databases, and software development tools.
Proficient in programming languages such as Java, Python, and C++
Experience with databases like MySQL and MongoDB
Familiarity with software development tools like Git and Jira
Q80. What is network,DHCP, SWITCH, ROUTER AND IP.
Network is a collection of interconnected devices that communicate with each other using protocols.
DHCP (Dynamic Host Configuration Protocol) is a network protocol that automatically assigns IP addresses to devices on a network.
A switch is a networking device that connects devices on a local area network (LAN) and forwards data packets between them.
A router is a networking device that connects multiple networks and forwards data packets between them.
IP (Internet Protocol) is ...read more
Q81. What are techniques? If use one motor or any electrical how to implement that which item to use that motor and how can control &start
Techniques refer to methods or procedures used to achieve a specific goal or outcome.
When using a motor or electrical item, it is important to select the appropriate motor or item for the task at hand.
Control and starting mechanisms will depend on the specific motor or electrical item being used.
Examples of techniques in healthcare include surgical techniques, diagnostic techniques, and therapeutic techniques.
Proper training and education are essential for mastering technique...read more
Q82. What is function module and where we use it?
Function module is a reusable subroutine in SAP ABAP used for specific functionality.
Function modules are standalone functions that can be called from any ABAP program.
They are used to encapsulate specific business logic or calculations.
Function modules can be called remotely from other systems using Remote Function Call (RFC).
Examples include function modules for currency conversion, date calculations, or data validation.
Q83. Have you worked on flat files, how have you used it?
Q84. Microservice project architecture and flow in current project, Microservice design patterns etc..
Explained microservice project architecture and design patterns.
Our microservice project follows a domain-driven design approach.
We use API Gateway pattern to handle requests and route them to appropriate microservices.
We also use Circuit Breaker pattern to handle failures and prevent cascading failures.
Each microservice has its own database and communicates with other microservices through REST APIs.
We use containerization with Docker and orchestration with Kubernetes for de...read more
Q85. How to change input parameters in reports
Input parameters in reports can be changed by modifying the selection screen fields in the ABAP program.
Modify the selection screen fields in the ABAP program to change input parameters
Use PARAMETERS or SELECT-OPTIONS statements to define input fields
Update the logic in the report program to process the new input parameters
Q86. Internal workings of HashMap
HashMap is a data structure that stores key-value pairs and uses hashing to efficiently retrieve values.
HashMap uses an array of linked lists to store key-value pairs.
The key is hashed to determine the index in the array where the value will be stored.
If multiple keys hash to the same index, a linked list is used to handle collisions.
HashMap allows one null key and multiple null values.
Example: HashMap
map = new HashMap<>();
Q87. Linked list vs array list
Linked list is dynamic in size, allows for efficient insertion/deletion. Array list is fixed in size, allows for random access.
Linked list is efficient for insertion/deletion due to dynamic size.
Array list is efficient for random access due to fixed size.
Linked list uses pointers to connect elements, while array list uses indexes.
Example: Linked list is used in applications where frequent insertions/deletions are required. Array list is used when random access is needed.
Q88. Overriding vs Overloading
Overriding is when a subclass provides a specific implementation of a method in its superclass, while overloading is when multiple methods have the same name but different parameters.
Overriding involves changing the behavior of a method in a subclass, while overloading involves creating multiple methods with the same name but different parameters.
Overriding is used for runtime polymorphism, while overloading is used for compile-time polymorphism.
Example of overriding: supercl...read more
Q89. There is a string input that is email address. You have to print the email id such that before @ few letters should be replaced with star.
Replace few letters before @ in email id with star and print the email id.
Identify the position of @ in the email address
Replace few letters before @ with *
Print the modified email id
Q90. What is the process for obtaining a loan?
The process for obtaining a loan involves application, verification, approval, and disbursement of funds.
1. Fill out a loan application form with personal and financial details.
2. Submit necessary documents such as income proof, identity proof, and address proof.
3. The lender will verify the information provided and assess your creditworthiness.
4. If approved, the terms and conditions of the loan will be communicated to you.
5. Upon acceptance, the funds will be disbursed to y...read more
Q91. How can you work and make changes on a DF loaded in Central repository?
Q92. What is pivot table and what's the use cases?
A pivot table is a data summarization tool used in spreadsheet programs to analyze, summarize, and present data in a tabular format.
Pivot tables allow users to reorganize and summarize selected columns and rows of data to obtain desired insights.
They can be used to analyze trends, patterns, and relationships within a dataset.
Pivot tables are commonly used in business and finance for financial analysis, sales reporting, and budgeting.
They can also be used in data analysis and ...read more
Q93. Libraries of python and how to add python with database.
Python has libraries like SQLAlchemy, psycopg2 for database connectivity. Use these libraries to connect Python with databases.
Use SQLAlchemy library for ORM (Object Relational Mapping) to interact with databases.
Use psycopg2 library for direct interaction with PostgreSQL database.
Install the required libraries using pip install
. Establish connection to the database using appropriate credentials.
Execute SQL queries using Python code to interact with the database.
Q94. What Kind function have you used in Query transformation?
Q95. Have you used idoc(Explanation of the complete df using idoc)
Q96. what is ur project ? and then wts is ur role in this project ? and core java oops concepts ...
I worked on a project that involved developing a web application using Java and Spring framework.
Developed RESTful APIs using Spring Boot
Implemented user authentication and authorization using Spring Security
Used Hibernate for database operations
Implemented caching using Redis
My role was to develop and maintain the backend of the application
Q97. Which version of html is getting at thid time and why?
The latest version of HTML is HTML5, which is widely adopted for its improved functionality and features.
HTML5 is the current version of HTML being used
It offers new features like <video>, <audio>, <canvas>, and <svg> elements
HTML5 provides better support for multimedia and interactive content
Q98. What is the shortcut key for paste special
Ctrl + Alt + V
Press Ctrl + Alt + V to open the Paste Special dialog box
Then use the arrow keys to select the desired option (e.g. values, formats, formulas)
Press Enter to paste the selected option
Q99. Tell me about vlookup function and its formula
VLOOKUP is a function in Excel used to search for a value in a table and return a corresponding value.
VLOOKUP stands for 'Vertical Lookup'
It searches for a value in the first column of a table and returns a value in the same row from a specified column
The formula for VLOOKUP is =VLOOKUP(lookup_value, table_array, col_index_num, [range_lookup])
Example: =VLOOKUP(A2, B2:D10, 3, FALSE) - searches for the value in cell A2 in the range B2:D10 and returns the value in the 3rd column...read more
Q100. What are usecase of slave and master
Slaves and masters are used in distributed systems for load balancing and fault tolerance.
In a distributed system, the master node controls and coordinates the work of the slave nodes.
Slaves perform tasks assigned by the master and report back their results.
Masters can be used for load balancing, where they distribute tasks evenly among slaves.
Masters can also be used for fault tolerance, where they can detect when a slave node fails and reassign its tasks to other slaves.
Exa...read more
Top HR Questions asked in Daksh International School
Interview Process at Daksh International School
Top Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month