Premium Employer

HCLTech

3.6
based on 33.6k Reviews
Filter interviews by

1500+ Accelerize 360 Interview Questions and Answers

Updated 17 Dec 2024
Popular Designations

Q101. In networking, why two different types of addresses are used namely physical and logical for data transmission to take place between two computers?

Ans.

Physical addresses are used for identifying network devices, while logical addresses are used for identifying network applications.

  • Physical addresses are also known as MAC addresses and are unique identifiers assigned to network interface cards (NICs) by the manufacturer.

  • Logical addresses are also known as IP addresses and are assigned to network applications by the network administrator.

  • Physical addresses are used at the data link layer of the OSI model, while logical addres...read more

Add your answer

Q102. Whay BGP is important in respect of OSPF

Ans.

BGP and OSPF are both routing protocols, but BGP is used for inter-domain routing while OSPF is used for intra-domain routing.

  • BGP is important in respect of OSPF because it allows for communication between different autonomous systems (AS)

  • BGP is used to exchange routing information between different AS, while OSPF is used within a single AS

  • BGP is used to determine the best path for traffic to take between different AS, while OSPF is used to determine the best path within a si...read more

View 2 more answers

Q103. Patch installation procedures and what are the main components required.

Ans.

Patch installation procedures and main components required.

  • Patch installation procedures involve planning, testing, and deployment.

  • Main components required include the patch file, installation package, and documentation.

  • Procedures may vary depending on the SharePoint version and environment.

  • Testing should be done in a non-production environment before deployment.

  • Documentation should include details of the patch, installation steps, and rollback plan.

View 1 answer

Q104. What os BGP community? What ips role of BGP communities?

Ans.

BGP community is a way to tag routes with additional information. It helps in controlling the flow of traffic.

  • BGP community is a 32-bit number that can be attached to a route advertisement.

  • It is used to tag routes with additional information.

  • It helps in controlling the flow of traffic by allowing network administrators to manipulate the way BGP routes are propagated and selected.

  • BGP communities can be used to implement policies such as traffic engineering, route filtering, an...read more

Add your answer
Discover Accelerize 360 interview dos and don'ts from real experiences

Q105. Tell the difference between C++ and Java in terms of OOPS concept?

Ans.

C++ supports multiple inheritance, Java supports single inheritance. C++ has pointers, Java has references.

  • C++ supports multiple inheritance, Java supports single inheritance

  • C++ has pointers, Java has references

  • C++ allows operator overloading, Java does not

  • C++ has destructors, Java has finalizers

Add your answer

Q106. which html control is not programmable in asp.net what does this mean saas,pass,Iaas in technology what is design pattern what is Singleton what is multicast delegates

Ans.

Answering technical questions related to ASP.NET and design patterns

  • The HTML control that is not programmable in ASP.NET is the control

  • SaaS stands for Software as a Service, PaaS stands for Platform as a Service, and IaaS stands for Infrastructure as a Service

  • Design patterns are reusable solutions to common software development problems

  • Singleton is a design pattern that restricts the instantiation of a class to one object

  • Multicast delegates are delegates that can have multip...read more

Add your answer
Are these interview questions helpful?

Q107. What is DHCP AND DNS?

Ans.

DHCP assigns IP addresses to devices on a network. DNS translates domain names to IP addresses.

  • DHCP stands for Dynamic Host Configuration Protocol

  • It automatically assigns IP addresses to devices on a network

  • DNS stands for Domain Name System

  • It translates domain names to IP addresses

  • DNS is used to access websites and other resources on the internet

View 2 more answers

Q108. What are different types of joins

Ans.

Different types of joins are Inner Join, Left Join, Right Join, and Full Outer Join.

  • Inner Join returns only the matching rows from both tables.

  • Left Join returns all the rows from the left table and matching rows from the right table.

  • Right Join returns all the rows from the right table and matching rows from the left table.

  • Full Outer Join returns all the rows from both tables, with NULL values in the columns where there is no match.

  • Join types can be combined with other SQL cla...read more

View 1 answer
Share interview questions and help millions of jobseekers 🌟

Q109. What is System.out.println?

Ans.

System.out.println is a Java statement used to print output to the console.

  • System is a class in Java's core library.

  • out is a static member of the System class.

  • println is a method of the PrintStream class.

  • It is used to print output to the console.

  • It adds a newline character at the end of the output.

View 5 more answers

Q110. What is DFMEA, VAVE etc... and all other design parameters (that was listed in my resume)

Ans.

DFMEA stands for Design Failure Mode and Effects Analysis, VAVE stands for Value Analysis/Value Engineering.

  • DFMEA is a systematic approach to identify and mitigate potential failures in a design.

  • It involves analyzing the potential failure modes, their effects, and the likelihood of occurrence.

  • DFMEA helps in prioritizing and implementing design changes to improve reliability and reduce risks.

  • VAVE is a systematic approach to optimize the value of a product by reducing costs whi...read more

View 3 more answers

Q111. Technical Writers produce what types of documents?

Ans.

Technical Writers produce a variety of documents to communicate complex technical information.

  • User manuals and guides

  • Technical specifications

  • API documentation

  • Training materials

  • White papers

  • Online help systems

  • Release notes

  • Troubleshooting guides

Add your answer

Q112. 1. What is a SMTP and how it's being used 2. What is ITIL and it's version 3. What were the troubleshooting for Internet disconnected? 4.What is BSOD? 5. What is the use of IPconfing command?

Ans.

Answers to common IT-related questions for Service Desk Analyst position

  • SMTP is a protocol used for sending email messages between servers

  • ITIL is a framework for IT service management, with versions including ITIL v3 and ITIL 4

  • Troubleshooting for Internet disconnected includes checking cables, resetting the router, and checking network settings

  • BSOD stands for Blue Screen of Death, a critical error in Windows operating systems

  • IPconfig is a command used to display and manage ne...read more

Add your answer

Q113. what is invoice number and why it is important

Ans.

An invoice number is a unique identifier assigned to each invoice for tracking and reference purposes.

  • Invoice number helps in identifying and tracking the payment status of a particular invoice.

  • It is important for record-keeping and audit purposes.

  • It helps in avoiding duplicate payments and ensures accuracy in accounting.

  • For example, if a company receives multiple invoices from the same vendor, each invoice will have a unique invoice number for easy identification and trackin...read more

View 1 answer

Q114. What is a bpo, what do you know about bpo, could you please explain a conversation between customer and employee for selling fan

Ans.

A BPO is a business process outsourcing company that provides customer service on behalf of other companies.

  • BPO stands for business process outsourcing.

  • BPO companies handle customer service, sales, technical support, and other business processes for their clients.

  • In a conversation between a customer and employee for selling a fan, the employee would highlight the features, benefits, and pricing of the fan.

  • The employee may ask the customer about their needs and preferences to ...read more

Add your answer

Q115. What was a pointer in c language?

Ans.

A pointer in C language is a variable that stores the memory address of another variable.

  • Pointers are used to manipulate data directly in memory

  • They can be used to pass data between functions efficiently

  • Pointers can be used to create dynamic data structures like linked lists

  • Example: int *ptr; ptr = # *ptr = 10; //num now has a value of 10

Add your answer

Q116. What is issue and risk? Have you involved in any Risk practice or not?

Ans.

Issue and risk are two different concepts in project management. Issues are current problems that need to be resolved, while risks are potential future problems that need to be mitigated.

  • Issues are current problems that have already occurred and need to be addressed immediately

  • Risks are potential future problems that may or may not occur, but need to be identified and planned for

  • Examples of issues include budget overruns, missed deadlines, and scope changes

  • Examples of risks i...read more

Add your answer

Q117. What is runbook and SOP ? Can we consider SOP as Runbook or not?

Ans.

Runbook is a set of instructions for IT operations, while SOP is a set of instructions for business processes. They are not the same.

  • Runbook is a document containing a set of procedures for IT operations, such as troubleshooting steps, maintenance tasks, and disaster recovery processes.

  • SOP (Standard Operating Procedure) is a document containing a set of instructions for business processes, such as employee onboarding, customer service protocols, and financial reporting proced...read more

Add your answer

Q118. Explain more about abstraction what are access modifiers

Ans.

Abstraction is the process of hiding implementation details while showing only the necessary information.

  • Abstraction helps in reducing complexity and increasing efficiency.

  • It allows us to focus on what an object does instead of how it does it.

  • For example, a car's driver only needs to know how to drive it, not how the engine works.

  • Access modifiers are keywords in object-oriented programming that determine the accessibility of class members.

  • There are four types of access modifi...read more

Add your answer

Q119. Write a program to find the names of students against a subject using stream API.

Ans.

Program to find student names against a subject using stream API

  • Create a list of students with their subjects

  • Use stream API to filter the list based on the subject

  • Map the filtered list to get only the names of students

  • Collect the names in a list or any other data structure

  • Return the list of names

Add your answer

Q120. Q-1 Define defect life cycle Q-2 Difference between Regression testing and Retesting, with real life scenario. Q-3 few puzzles, Q-4 Find 3rd highest salary from the database Q- 5 what are the specific character...

read more
Ans.

Interview questions for Test Engineer position

  • Defect life cycle includes identification, reporting, prioritization, fixing, retesting, and closure

  • Regression testing is done to ensure that new changes do not affect existing functionality, while retesting is done to verify if a defect has been fixed

  • Examples of testing techniques include black box, white box, and grey box testing

  • Specific characteristics of a tester include attention to detail, analytical skills, communication sk...read more

Add your answer

Q121. What is derivatives, corporate action, Nav, money market, capital market

Ans.

Derivatives are financial contracts that derive their value from an underlying asset. Corporate actions are events that affect a company's stock. NAV is the net asset value of a mutual fund. Money market deals with short-term borrowing and lending. Capital market deals with long-term borrowing and lending.

  • Derivatives are contracts between two parties that derive their value from an underlying asset, such as stocks, bonds, or commodities.

  • Corporate actions are events that affec...read more

Add your answer

Q122. Define EPG ? Why contract ios used for EPG communication?

Ans.

EPG is Electronic Program Guide used for TV listings. Contract iOS is used for EPG communication due to its reliability and security.

  • EPG is a digital guide that provides information about TV programs and schedules.

  • Contract iOS is a secure and reliable way to communicate EPG data between devices.

  • EPG data can be accessed through set-top boxes, smart TVs, and mobile apps.

  • EPG data includes program titles, descriptions, start and end times, and channel information.

Add your answer

Q123. Tell me about mutual funds and it's type?

Ans.

Mutual funds are investment vehicles that pool money from multiple investors to invest in stocks, bonds, or other assets.

  • Mutual funds are managed by professional fund managers

  • They offer diversification and liquidity to investors

  • Types of mutual funds include equity funds, debt funds, balanced funds, and index funds

  • Equity funds invest in stocks, debt funds invest in bonds, balanced funds invest in both, and index funds track a specific market index

  • Investors can choose between o...read more

Add your answer

Q124. What is the difference between quality assurance, quality control, and testing?

Ans.

Quality assurance focuses on preventing defects, quality control focuses on identifying and fixing defects, and testing is a process of evaluating a system or component.

  • Quality assurance is a proactive process that involves establishing and maintaining standards and processes to prevent defects.

  • Quality control is a reactive process that involves inspecting and testing products to identify and fix defects.

  • Testing is a process of evaluating a system or component to determine if...read more

View 1 answer

Q125. Design the zabbix architecture and share how many servers are you gonna suggest the customer to have?

Ans.

The number of servers required for Zabbix architecture depends on the size of the environment and the level of monitoring required.

  • Assess the size of the environment and the number of devices to be monitored

  • Determine the level of monitoring required, such as real-time monitoring or historical data analysis

  • Consider the need for high availability and redundancy

  • Suggest a minimum of 3 servers for a basic setup: 1 for the Zabbix server, 1 for the database, and 1 for the web interf...read more

Add your answer

Q126. How long will it take for you to learn a new programming language?

Ans.

It depends on the complexity of the language and my prior experience with similar languages.

  • I can learn a new language quickly if it is similar to ones I already know.

  • If the language is completely new to me, it may take a few weeks to become proficient.

  • I would need to spend time practicing and working on projects to fully master the language.

  • Learning a new language is an ongoing process, and I would continue to improve my skills over time.

Add your answer

Q127. What is executor in multithreading and what is thread pool

Ans.

Executor is an interface that executes submitted tasks in a separate thread. Thread pool is a collection of threads that can be reused.

  • Executor provides a way to decouple task submission from task execution.

  • Thread pool manages a fixed number of threads and assigns tasks to them.

  • Executor framework provides a way to manage thread pools.

  • Example: Executors.newFixedThreadPool(10) creates a thread pool with 10 threads.

  • Example: Executor.execute(Runnable task) submits a task to the e...read more

Add your answer

Q128. What are the different types of controller in SAP CRM webui?

Ans.

The different types of controllers in SAP CRM webui include Component Controller, View Controller, Context Controller, and Custom Controller.

  • Component Controller: Controls the entire component and manages the context data.

  • View Controller: Controls the layout and rendering of the UI elements.

  • Context Controller: Manages the context data and communication between controllers.

  • Custom Controller: Allows for custom logic and functionality to be implemented.

Add your answer

Q129. How to manipulate outbound traffic in bgp

Ans.

Outbound traffic in BGP can be manipulated using various techniques such as AS path prepending, community strings, and route maps.

  • AS path prepending involves adding additional AS numbers to the path attribute of a BGP route advertisement to make it less attractive to other BGP routers.

  • Community strings can be used to tag routes and apply policies to them based on the tags.

  • Route maps can be used to match specific routes and apply policies to them such as setting local preferen...read more

Add your answer

Q130. How to test a printer for checking performance

Ans.

To test printer performance, check print speed, quality, and connectivity.

  • Print a test page to check for print speed and quality.

  • Print a large document to test for any potential jams or errors.

  • Test connectivity by printing from different devices and checking for any connection issues.

  • Check ink or toner levels and replace if necessary.

  • Test different paper types and sizes to ensure compatibility.

  • Check for any software updates or driver issues.

  • Perform regular maintenance such as...read more

Add your answer

Q131. Difference between mcs nad pvs. Differece about webinterface and storefron. End user troubleshooting.

Ans.

MCS and PVS are Citrix provisioning technologies. Web Interface is an older technology, while StoreFront is the newer and recommended one. End user troubleshooting involves identifying and resolving issues related to user experience.

  • MCS and PVS are both Citrix provisioning technologies, but they differ in how they provision virtual machines.

  • Web Interface is an older technology that provides a web-based interface for accessing Citrix resources.

  • StoreFront is the newer and recom...read more

Add your answer

Q132. Suppose TMG is generated and you have added one field and that field is not reflecting what will you do? and name the TMG events.

Ans.

If a field added to a TMG is not reflecting, check if the field is properly defined in the TMG structure and events are triggered correctly.

  • Check if the field is properly added to the TMG structure using SE11 or SE54.

  • Ensure that the events like INITIALIZATION, AT SELECTION-SCREEN, AT SELECTION-SCREEN OUTPUT, etc., are triggered correctly.

  • Debug the TMG program to see if the field value is being populated and displayed as expected.

View 1 answer

Q133. Can you tell me about the Golden rule of accounting?

Ans.

The Golden rule of accounting is to debit the receiver and credit the giver.

  • It is a fundamental principle of accounting.

  • It is used to record transactions in the correct way.

  • It ensures that the accounting equation remains balanced.

  • For example, when a company receives cash, it debits cash and credits the account that provided the cash.

  • It is also known as the principle of reciprocity.

View 1 answer

Q134. Do you have experience in java 8 , could u explain some new features

Ans.

Yes, Java 8 introduced several new features including lambda expressions, streams, and default methods.

  • Lambda expressions allow for functional programming and simplify code.

  • Streams provide a way to process collections of data in a functional way.

  • Default methods allow for adding new methods to interfaces without breaking existing implementations.

  • Other new features include the Optional class, Date and Time API, and Nashorn JavaScript engine.

  • Example: Lambda expression - (x, y) -...read more

Add your answer

Q135. Implement stack using array in C++ write code

Ans.

Implement stack using array in C++

  • Declare an array and a variable to keep track of top element

  • Push element by incrementing top and assigning value to array[top]

  • Pop element by returning array[top] and decrementing top

  • Check for overflow and underflow conditions

Add your answer

Q136. What is the complicated issue that you have solved and what is the solution you have provided

Ans.

Developed a real-time data processing system for a financial institution

  • Implemented a distributed system using Apache Kafka and Apache Storm

  • Designed a fault-tolerant architecture with multiple redundancy layers

  • Optimized the system for high throughput and low latency

  • Provided real-time monitoring and alerting using Grafana and Prometheus

Add your answer

Q137. While creating BADI implementation, what will get created Class method or interface explain? steps to implement BADI . name the BADI you have implemented.

Ans.

When creating BADI implementation, a class method is created. Steps include creating a class implementing the BADI interface and implementing the required methods.

  • Create a class implementing the BADI interface

  • Implement the required methods in the class

  • Activate the BADI implementation in the system

View 1 answer

Q138. Different ways to implement and break Singleton pattern.

Ans.

Different ways to implement and break Singleton pattern.

  • Implement: Eager initialization, Lazy initialization, Thread-safe initialization, Bill Pugh Singleton Implementation

  • Break: Reflection, Serialization/Deserialization, Cloning, Multithreading

  • Example: Eager initialization - private static final Singleton instance = new Singleton();

  • Example: Reflection - Constructor constructor = Singleton.class.getDeclaredConstructor(); constructor.setAccessible(true); Singleton instance2 = ...read more

Add your answer

Q139. Real life scenario for food delivery company For delayed food delivery

Ans.

In case of delayed food delivery, the food delivery company should take prompt actions to rectify the situation and compensate the customer.

  • Apologize to the customer for the delay and inconvenience caused.

  • Offer a discount or a free meal to the customer as compensation.

  • Ensure that the food is delivered as soon as possible and in good condition.

  • Investigate the cause of the delay and take measures to prevent it from happening again.

  • Maintain good communication with the customer t...read more

Add your answer

Q140. Different types of logging in SharePoint, why it's needed?

Ans.

SharePoint has different types of logging to track and troubleshoot issues.

  • ULS (Unified Logging Service) logs all SharePoint server events

  • Event logs capture system events and errors

  • Usage and Health Data Collection logs usage and health data

  • Developer Dashboard provides real-time performance data

  • Logging is important for troubleshooting and identifying issues

  • Logs can be used to monitor system performance and usage

Add your answer

Q141. Why there is a difference in ascent?

Ans.

The difference in ascent is due to various factors such as altitude, air pressure, temperature, and wind speed.

  • Altitude affects the air pressure and density, which in turn affects the ascent.

  • Temperature affects the air density, which affects the ascent.

  • Wind speed affects the ascent by creating turbulence and changing the direction of the aircraft.

  • Different aircraft have different ascent rates due to their design and engine power.

  • Pilots may also adjust the ascent rate based on...read more

Add your answer

Q142. Tell us about the sales process in Dynamics 365 CRM

Ans.

The sales process in Dynamics 365 CRM involves lead generation, qualification, opportunity management, and closing deals.

  • Leads are generated through various channels such as email campaigns, social media, and website forms.

  • Leads are then qualified based on their interest and fit for the product or service.

  • Opportunities are created for qualified leads and managed through the sales pipeline.

  • Sales reps can track progress, update information, and collaborate with team members.

  • Dea...read more

View 1 answer

Q143. What is function pointer?

Ans.

Function pointer is a variable that stores the address of a function.

  • Function pointers can be used to pass a function as an argument to another function.

  • They can also be used to create callbacks and implement polymorphism.

  • Example: int (*funcPtr)(int, int) = &add; where add is a function that takes two integers and returns their sum.

  • Dereferencing a function pointer calls the function it points to.

View 1 answer

Q144. What is prop drilling in React and How to avoid the same?

Ans.

Prop drilling is passing data through multiple levels of components in React. To avoid it, use Context API or Redux.

  • Prop drilling occurs when passing data from a parent component to a deeply nested child component through intermediate components.

  • To avoid prop drilling, use React's Context API to pass data directly to components without going through intermediary components.

  • Another way to avoid prop drilling is by using Redux, a state management library that allows for central...read more

Add your answer

Q145. What Is Schema And Which schema you used in your project ?

Ans.

Schema is a blueprint that defines the structure of a database. I used the relational schema in my project.

  • Schema is a logical representation of the entire database.

  • It defines the tables, fields, relationships, and constraints.

  • Relational schema is the most commonly used schema in databases.

  • It organizes data into tables with rows and columns.

  • Example: Employee table with columns like ID, Name, Age, Salary.

Add your answer

Q146. What is the use of python in IT

Ans.

Python is widely used in IT for web development, data analysis, artificial intelligence, automation, and scripting.

  • Python is used for web development frameworks like Django and Flask.

  • It is used for data analysis and scientific computing with libraries like NumPy, Pandas, and SciPy.

  • Python is popular for artificial intelligence and machine learning with libraries like TensorFlow and PyTorch.

  • It is used for automation and scripting tasks, making it a versatile language for IT pro...read more

View 9 more answers

Q147. What is Kerberos Authentication, how it works/getting set in SharePoint.

Ans.

Kerberos Authentication is a network authentication protocol that uses tickets to provide secure access to resources.

  • Kerberos is used to authenticate users and services in a network environment.

  • It uses tickets to provide secure access to resources.

  • Kerberos is the default authentication method in SharePoint.

  • To set up Kerberos authentication in SharePoint, you need to configure the server and client computers, and create a service principal name (SPN) for the SharePoint applica...read more

Add your answer

Q148. What kind of situations have you encountered during bulk load or complex mapping and what did you do to make the job more efficient. How do you enhance your job?

Add your answer

Q149. What is Stakeholders in Project Management and type?

Ans.

Stakeholders in project management are individuals or groups who have an interest in the project and can influence or be influenced by its outcome.

  • Stakeholders can include project sponsors, team members, clients, end users, suppliers, and regulatory bodies.

  • They can be classified into internal stakeholders (e.g. team members) and external stakeholders (e.g. clients).

  • Stakeholders can have varying levels of influence and interest in the project, which can impact project success....read more

Add your answer

Q150. What is map and what is collection and all those things

Ans.

Map and Collection are data structures in programming used to store and manipulate data.

  • Map is a key-value pair data structure where each value is associated with a unique key.

  • Collection is a group of objects that can be accessed and manipulated as a single unit.

  • Examples of collections include lists, sets, and queues.

  • Maps are commonly used for caching, indexing, and searching data.

  • Collections are used for storing and manipulating data in various ways such as sorting, filterin...read more

Add your answer

Q151. How many handshakes will be there in a party with 30 members , everyone is required to handshake every person, no repeat handshakes will be there.

Ans.

The number of handshakes in a party with 30 members where each person shakes hands with every other person once.

  • Calculate the total number of handshakes using the formula n(n-1)/2, where n is the number of people.

  • Substitute n=30 in the formula to get the total number of handshakes.

  • Total handshakes = 30(30-1)/2 = 435 handshakes.

Add your answer

Q152. What is Redux and Redux purpose?

Ans.

Redux is a predictable state container for JavaScript apps.

  • Redux is a library for managing application state

  • It provides a predictable state container by enforcing a strict unidirectional data flow

  • Redux can be used with any UI library or framework

  • It is commonly used with React to manage state in complex applications

  • Redux allows for easy debugging and testing of state changes

  • Actions are dispatched to update the state, and reducers handle the updates

  • Selectors can be used to retr...read more

Add your answer

Q153. What % to be use for project planning

Ans.

The percentage to be used for project planning varies depending on the project's complexity and scope.

  • The percentage can range from 5% to 25% of the total project time and budget.

  • The percentage should be determined based on the project's size, complexity, and risk.

  • The percentage should also consider the level of detail required for the project plan.

  • For example, a small project with a clear scope may only require 5% of the total time and budget for planning, while a large, com...read more

Add your answer

Q154. Have you worked on indexes, i.e. , secondary indexes, how will you fetch value using secondary index in select query?

Ans.

Yes, I have worked on secondary indexes in SAP ABAP.

  • Secondary indexes are created to improve the performance of select queries by allowing faster access to data.

  • To fetch values using a secondary index in a select query, you can use the addition 'USING INDEX' followed by the name of the secondary index.

  • For example, SELECT * FROM table_name USING INDEX index_name WHERE condition.

Add your answer

Q155. What is intern() method of String?

Ans.

intern() method of String returns a canonical representation of the string object.

  • The intern() method returns a string that has the same contents as the original string, but is guaranteed to be from a pool of unique strings.

  • This method is useful when comparing strings for equality as it compares the references instead of the contents.

  • Example: String s1 = new String("hello"); String s2 = s1.intern(); // s2 will be from the string pool

Add your answer

Q156. Why we received sngl collisions error on port what's the issue and how we resolved it ?

Ans.

Sngl collisions error on port - issue and resolution

  • Sngl collisions error occurs when two devices transmit data at the same time on the same network segment

  • This can be caused by faulty hardware, network congestion, or incorrect network configurations

  • To resolve, check for faulty hardware, reduce network congestion, and ensure correct network configurations

Add your answer

Q157. What is MLAG? Difference between LACP & PAGP?

Ans.

MLAG is a protocol used for creating a loop-free network topology. LACP and PAGP are link aggregation protocols.

  • MLAG stands for Multi-Chassis Link Aggregation Group.

  • It allows multiple switches to appear as a single logical switch to the connected devices.

  • LACP (Link Aggregation Control Protocol) is an IEEE standard protocol used for link aggregation.

  • PAGP (Port Aggregation Protocol) is a Cisco proprietary protocol used for link aggregation.

  • Both LACP and PAGP are used to bundle ...read more

Add your answer

Q158. whenever restart SQL server one database comes online late what is the reason what are are startup parameters how will you troubleshoot database goes into suspect mode

Ans.

The reason for a database coming online late after restarting SQL server could be due to various factors such as large database size, heavy transactional activity, or insufficient server resources.

  • Large database size can result in longer recovery time during startup.

  • Heavy transactional activity can delay the recovery process.

  • Insufficient server resources like CPU, memory, or disk I/O can slow down the startup process.

  • Other factors like network issues or conflicts with other s...read more

Add your answer

Q159. Explan step to step oracle database migration cross platform? After migration database facing database slowness issues? What solution for this.

Ans.

Steps for cross-platform Oracle DB migration and solution for post-migration slowness issues.

  • Perform a full backup of the source database

  • Create a new database on the target platform

  • Use Oracle Data Pump or Export/Import utilities to export the source database and import it into the target database

  • Perform post-migration testing to ensure data integrity and functionality

  • For slowness issues, analyze the database performance using tools like Oracle Enterprise Manager or AWR report...read more

Add your answer

Q160. What's CLI? Can we create Load balancer using CLI?

Ans.

CLI stands for Command Line Interface. Yes, we can create a Load balancer using CLI.

  • CLI is a text-based interface used to interact with a computer system.

  • It allows users to input commands to perform tasks without the need for a graphical user interface.

  • Load balancers can be created using CLI commands in cloud platforms like AWS or Azure.

  • For example, in AWS, you can use the AWS CLI to create a load balancer using the 'create-load-balancer' command.

Add your answer

Q161. What would you do if there is a defect leakage ?

Ans.

Defect leakage is a serious issue. I would take immediate action to identify the root cause and implement corrective measures.

  • Analyze the defect leakage data to identify the root cause

  • Implement corrective measures to fix the issue

  • Conduct a thorough review of the testing process to prevent future leakage

  • Communicate the issue and resolution to stakeholders

  • Track and monitor the effectiveness of the corrective measures

Add your answer

Q162. What is difference between sleep or wait method?

Ans.

Sleep method pauses the thread for a specified time, while wait method pauses the thread until notified.

  • Sleep method is a static method of Thread class, while wait method is an instance method of Object class.

  • Sleep method does not release the lock on the object, while wait method releases the lock and waits for notification.

  • Sleep method can be interrupted by another thread, while wait method can only be interrupted by a call to notify or notifyAll method.

  • Example: Thread.sleep...read more

View 1 answer

Q163. What all are shared by parent and child processes immediately after parent executes a fork system call? Cross questioned about the 'copy on write' facility and 'dup' system call

Ans.

After a fork system call, parent and child processes share certain resources.

  • Shared resources include open file descriptors, signal handlers, and memory mappings.

  • Copy-on-write (COW) allows both processes to initially share the same memory pages.

  • If either process modifies a shared memory page, a copy is made for that process.

  • The 'dup' system call duplicates a file descriptor, creating a new one that refers to the same open file.

  • This allows both processes to independently read ...read more

Add your answer

Q164. Find number which repeating first with linear complexity.

Ans.

Finding repeating number with linear complexity.

  • Use Floyd's cycle-finding algorithm to detect the cycle in the sequence.

  • Maintain two pointers, one moving at a rate of one step and the other at a rate of two steps.

  • When they meet, move one pointer to the start and keep the other pointer at the meeting point.

  • Move both pointers at a rate of one step until they meet again, which is the start of the cycle.

  • The number at the start of the cycle is the repeating number.

Add your answer

Q165. Difference between statefullset and deployment in kubernets ?

Ans.

StatefulSet is used for managing stateful applications, while Deployment is used for stateless applications.

  • StatefulSet is used for applications that require stable network identities and persistent storage.

  • StatefulSet maintains a unique identity for each pod and ensures ordered deployment and scaling.

  • Deployment is used for stateless applications that can be easily replicated and scaled.

  • Deployment manages a set of identical pods and provides features like rolling updates and ...read more

View 2 more answers

Q166. Write the code and explain how they are storing in the memory?

Ans.

Code and memory storage explanation for array of strings.

  • Declare array variable with data type string

  • Allocate memory for the array

  • Assign values to the array elements

  • Access array elements using index

  • Memory is allocated in contiguous blocks

Add your answer

Q167. What is IDoc? what are the steps use to create field segment in IDOC? suppose you encountered how will you reprocess?

Ans.

IDoc is a data container used to exchange information between SAP systems or between an SAP system and an external system.

  • IDoc stands for Intermediate Document.

  • To create a field segment in IDoc, you need to define the segment structure in the IDoc definition using transaction WE31.

  • For reprocessing, you can use transaction BD87 to reprocess IDocs that have failed during processing.

Add your answer

Q168. How will you load image in Adobe form? How will you convert and Adobe form into Spanish or any other language?

Ans.

To load an image in Adobe form, use the 'Graphic' UI element. To convert an Adobe form into another language, use translation tools like SE63.

  • To load an image in Adobe form, use the 'Graphic' UI element and specify the image path.

  • For language conversion, use translation tools like SE63 to translate the text elements of the form into the desired language.

  • Make sure to maintain language-specific text elements for different languages in the Adobe form template.

Add your answer

Q169. How may types of Transport request are there in SAP? which will be created during report creation? How SO10 objects are transported?

Ans.

There are three types of transport requests in SAP: Workbench request, Customizing request, and Transport of Copies.

  • Workbench request is created for ABAP development objects like programs, function modules, etc.

  • Customizing request is created for customizing objects like table entries, screen modifications, etc.

  • Transport of Copies request is created for transporting copies of objects from one system to another.

  • SO10 objects are transported using the Transport of Copies request ...read more

Add your answer

Q170. How to reduce/extend size of a lvm partition

Ans.

To reduce/extend size of a lvm partition, use lvresize command.

  • Use lvresize command with appropriate options to reduce/extend the size of a lvm partition.

  • To reduce the size, use the option --resizefs to resize the file system as well.

  • To extend the size, use the option --resizefs only if the file system supports online resizing.

  • Example: lvresize --resizefs --size -2G /dev/vg01/lv01 to reduce by 2GB.

  • Example: lvresize --resizefs --size +2G /dev/vg01/lv01 to extend by 2GB.

Add your answer

Q171. What are jagged array

Ans.

Jagged arrays are arrays of arrays with different lengths.

  • Jagged arrays are also known as ragged arrays.

  • They are useful when the number of elements in each row is not fixed.

  • Example: int[][] jaggedArray = new int[3][]; jaggedArray[0] = new int[2]; jaggedArray[1] = new int[4]; jaggedArray[2] = new int[3];

  • Accessing elements in a jagged array requires two sets of square brackets.

  • Jagged arrays can be used to represent irregularly shaped data, such as a matrix with missing values.

View 1 answer

Q172. Explain Basic of OOP pillers

Ans.

The four pillars of OOP are encapsulation, inheritance, polymorphism, and abstraction.

  • Encapsulation: Bundling data and methods together in a class to hide implementation details.

  • Inheritance: Creating new classes from existing ones, inheriting their properties and behaviors.

  • Polymorphism: The ability of objects of different classes to respond to the same method call.

  • Abstraction: Simplifying complex systems by breaking them down into smaller, more manageable parts.

View 2 more answers

Q173. Nexus 9K hardware models used in Leaf and spine architecture?

Ans.

Nexus 9K hardware models used in Leaf and spine architecture.

  • Nexus 9372PX and 9372TX used as leaf switches

  • Nexus 9504, 9508, and 9516 used as spine switches

  • Nexus 93108TC-EX and 93180YC-EX also used as leaf switches

  • All models support VXLAN and ACI

  • Highly scalable and flexible architecture

Add your answer

Q174. difference between get and load method in hibernate?

Ans.

get() method returns null if the object is not found in the cache or database, while load() method throws an exception.

  • get() method is eager loading while load() method is lazy loading.

  • get() method returns the object from the database or cache while load() method returns a proxy object.

  • get() method is slower than load() method.

  • get() method is used when we are not sure if the object exists in the database or cache while load() method is used when we are sure that the object ex...read more

Add your answer

Q175. What are techniques? If use one motor or any electrical how to implement that which item to use that motor and how can control &start

Ans.

Techniques refer to methods or procedures used to achieve a specific goal or outcome.

  • When using a motor or electrical item, it is important to select the appropriate motor or item for the task at hand.

  • Control and starting mechanisms will depend on the specific motor or electrical item being used.

  • Examples of techniques in healthcare include surgical techniques, diagnostic techniques, and therapeutic techniques.

  • Proper training and education are essential for mastering technique...read more

Add your answer

Q176. How to maintain Issue & Risk register

Ans.

Maintain an Issue & Risk register by regularly updating it and assigning ownership.

  • Create a template for the register

  • Assign ownership of each issue and risk

  • Regularly update the register

  • Track progress of each issue and risk

  • Communicate updates to stakeholders

Add your answer

Q177. What does documentation management include?

Ans.

Documentation management includes organizing, creating, updating, and maintaining documents.

  • Organizing documents in a logical and accessible manner

  • Creating new documents or updating existing ones

  • Maintaining document versions and ensuring accuracy

  • Implementing document control processes

  • Collaborating with subject matter experts to gather information

  • Reviewing and editing documents for clarity and consistency

  • Ensuring compliance with style guides and standards

  • Managing document repo...read more

Add your answer

Q178. Q14) Can We write Procedures in String Data JPA? How to handle complex database in Spring Data JPA persistence? using Procedures ---> Ans : Yes

Ans.

Yes, we can write procedures in String Data JPA to handle complex databases in Spring Data JPA persistence.

  • Use @Procedure annotation to call stored procedures in Spring Data JPA.

  • Define the stored procedure in the database and then call it using the @Procedure annotation in the repository interface.

  • Handle complex database operations by writing custom queries or using native queries in Spring Data JPA.

Add your answer

Q179. how to generate encrypted passwords for user module

Ans.

Encrypted passwords for user module can be generated using hashing algorithms like bcrypt or PBKDF2.

  • Choose a strong hashing algorithm like bcrypt or PBKDF2

  • Generate a random salt for each user

  • Combine the password and salt, and hash the result using the chosen algorithm

  • Store the salt and hashed password in the database

  • When verifying a password, retrieve the salt for the user, combine it with the entered password, and hash the result using the same algorithm. Compare the resulti...read more

Add your answer

Q180. What is the difference between AngularJS & angular 10

Ans.

AngularJS is the first version of Angular, while Angular 10 is the latest version with significant improvements and updates.

  • AngularJS is based on JavaScript, while Angular 10 is based on TypeScript.

  • AngularJS uses controllers and $scope for data binding, while Angular 10 uses components and directives.

  • AngularJS has two-way data binding, while Angular 10 has one-way data binding by default.

  • AngularJS uses $http for AJAX requests, while Angular 10 uses HttpClient module for the s...read more

Add your answer

Q181. 1)Compare two string using Java 8 features without comparator and comparable 2) Given an array to print non duplicate in the array 3) Solid principles 4) Stereo type annotations 5) how to make list immutable 6)...

read more
Ans.

The interview questions cover a range of topics related to Java development, including Java 8 features, data structures, annotations, and database triggers.

  • Use Java 8 features like streams and lambda expressions to compare two strings without using comparator or comparable.

  • To print non-duplicate elements in an array, use a HashSet to store unique elements and then iterate through the array to check for duplicates.

  • Solid principles refer to a set of design principles for object...read more

Add your answer

Q182. What is operating frequency of USB Type C?

Ans.

The operating frequency of USB Type C is 10 Gbps.

  • USB Type C has a maximum data transfer rate of 10 Gbps

  • It is also backward compatible with USB 2.0 and 3.0

  • The frequency can vary depending on the device and cable used

Add your answer

Q183. How can you define micro vias in PCB board?

Ans.

Micro vias are small holes drilled in PCBs to connect different layers of the board.

  • Micro vias are typically less than 0.15mm in diameter.

  • They are used to save space on the board and increase routing density.

  • Micro vias can be drilled using lasers or mechanical drills.

  • They are commonly used in high-density interconnect (HDI) PCBs.

  • Micro vias can be filled with conductive or non-conductive materials.

  • They can be blind vias, which connect an outer layer to an inner layer, or burie...read more

Add your answer

Q184. Difference between array list and linked list..where do we use ?

Ans.

Array list stores elements in contiguous memory locations, while linked list stores elements in nodes with pointers to the next node.

  • Array list allows fast access to elements using index, while linked list allows for fast insertion and deletion of elements.

  • Array list is ideal for scenarios where random access is required, while linked list is suitable for scenarios where frequent insertion and deletion operations are needed.

  • Example: Array list is used in scenarios where eleme...read more

Add your answer

Q185. What are joins? Explain difference in Truncate and delete? Explain index in SQL? Explain string builder? Explain rank and dense rank? What is performamce tuning? Explain about SSIS package developement? Explain...

read more
Ans.

Joins are used to combine rows from two or more tables based on a related column between them. Truncate removes all records from a table, while delete removes specific records. Indexes in SQL are used to quickly retrieve data. String builder is a class that helps in creating strings efficiently. Rank and dense rank are functions used to assign a rank to each row in a result set. Performance tuning involves optimizing the performance of a system. SSIS package development invol...read more

Add your answer

Q186. 2. Difference between abstract method implementation and default method

Ans.

Abstract method implementation is mandatory while default method is optional.

  • Abstract method has no implementation in the abstract class and must be implemented by the subclass.

  • Default method has a default implementation in the interface and can be overridden by the implementing class.

  • Abstract method is used to enforce a contract while default method is used to provide a default behavior.

  • Example: abstract method - public abstract void draw(); default method - default void dis...read more

View 1 answer

Q187. How to handle the scenario if the data is deleted in Primary / Foreign key columns, without any issue.

Add your answer

Q188. what is the output of below code class Animal{ Animal(){ System.out.println("animal is created") } class Dog extends Animal{ Dog(){ System.out.println("Dog is created")} class TestSuper4{ public static void mai...

read more
Ans.

The output of the code will be 'animal is created' followed by 'Dog is created'.

  • The code defines a class Animal with a constructor that prints 'animal is created'.

  • It also defines a class Dog that extends Animal, with a constructor that prints 'Dog is created'.

  • In the main method, an instance of Dog is created, which will trigger the constructors of both Animal and Dog classes.

Add your answer

Q189. How to troubleshoot netbackup 13 backup failure.

Ans.

To troubleshoot netbackup 13 backup failure, check logs, verify connectivity, and ensure proper configuration.

  • Check the logs for any error messages or warnings

  • Verify connectivity between the backup server and the client

  • Ensure that the backup policy is properly configured

  • Check for any conflicts with other backup jobs or processes

  • Verify that the backup media is available and properly configured

  • Consider running a test backup to isolate the issue

Add your answer

Q190. What are the IPC Mechanism available? 4. What is structure and union in c?

Ans.

IPC mechanisms in C include pipes, message queues, shared memory, and semaphores. Structure and union are data types in C.

  • IPC mechanisms in C are used for inter-process communication and include pipes, message queues, shared memory, and semaphores.

  • Pipes allow communication between two related processes.

  • Message queues allow communication between unrelated processes.

  • Shared memory allows multiple processes to access the same memory space.

  • Semaphores are used for synchronization b...read more

Add your answer

Q191. What functionalities have you worked as an AEM and java developer?

Ans.

I have worked on developing custom components, templates, workflows, and integrating third-party systems in AEM. In Java, I have worked on backend development, RESTful services, and database interactions.

  • Developed custom components and templates in AEM

  • Implemented workflows for content approval processes

  • Integrated third-party systems with AEM

  • Backend development in Java

  • Created RESTful services

  • Worked on database interactions

Add your answer

Q192. What kind of manufacturing operation process involved to manufacture product

Ans.

The manufacturing operation process depends on the type of product being manufactured.

  • The process can involve various stages such as design, raw material procurement, production, quality control, and packaging.

  • The type of manufacturing process can be batch production, continuous production, or job production.

  • Examples of manufacturing processes include injection molding, casting, machining, and assembly.

  • The process can also involve automation and robotics to increase efficienc...read more

Add your answer

Q193. What is K Factor in Sheet metal Design Explain?

Ans.

K Factor is a constant value used in sheet metal design to calculate the neutral axis and bend allowance.

  • K Factor determines the amount of stretching that occurs during the bending process.

  • It is used to calculate the bend allowance, which is the length of the neutral axis in the bent part.

  • The K Factor value depends on the material being used, thickness, and bending method.

  • Common K Factor values range from 0.3 to 0.5 for most materials.

  • For example, a K Factor of 0.4 means that...read more

View 1 answer

Q194. What do you mean by oops concept

Ans.

OOPs (Object-Oriented Programming) is a programming paradigm based on the concept of 'objects', which can contain data and code.

  • OOPs focuses on the use of classes and objects to organize and structure code

  • Encapsulation, inheritance, and polymorphism are key concepts in OOPs

  • Examples of OOPs languages include Java, C++, and Python

Add your answer

Q195. What are the type if data structure.

Ans.

Data structures are ways of organizing and storing data in a computer so that it can be accessed and used efficiently.

  • There are two main types of data structures: primitive and non-primitive

  • Primitive data structures include integers, floats, characters, and booleans

  • Non-primitive data structures include arrays, linked lists, stacks, queues, trees, and graphs

  • Each data structure has its own advantages and disadvantages depending on the use case

Add your answer

Q196. What do you mean by 64bit and 32bit .

Ans.

64bit and 32bit refer to the size of data that a processor can handle.

  • 64bit processors can handle larger amounts of memory and perform faster than 32bit processors.

  • 64bit processors are more efficient in handling complex calculations and running multiple applications simultaneously.

  • 32bit processors are limited to 4GB of RAM and can only handle 32bit software.

  • Most modern computers and operating systems are 64bit.

  • Examples of 64bit processors include Intel Core i5 and i7, AMD Ryz...read more

Add your answer

Q197. Different between agile and waterfall? Which one is best suited?

Ans.

Agile and waterfall are two project management methodologies. Agile is best suited for dynamic projects while waterfall is best for static projects.

  • Agile is iterative and flexible while waterfall is linear and rigid.

  • Agile focuses on delivering working software in short iterations while waterfall focuses on delivering a complete product at the end of the project.

  • Agile encourages collaboration and adaptability while waterfall relies on detailed planning and documentation.

  • Agile ...read more

View 1 answer

Q198. Have you ever worked on document understanding?

Ans.

Yes, I have worked on document understanding.

  • I have experience with natural language processing (NLP) techniques to extract information from unstructured documents.

  • I have worked on developing algorithms to classify and extract data from documents such as invoices, receipts, and contracts.

  • I have also used machine learning models to improve the accuracy of document understanding.

  • One example of a project I worked on involved extracting key information from medical records to imp...read more

Add your answer

Q199. What is your implementation experience on specific technology?

Add your answer

Q200. how many types you create variable in ui path

Ans.

There are four types of variables in UiPath: Generic, Text, Number, and Boolean.

  • Generic variables can store any type of data

  • Text variables store strings of characters

  • Number variables store numeric values

  • Boolean variables store true/false values

Add your answer
1
2
3
4
5
6
7
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos

Interview Process at Accelerize 360

based on 1.2k interviews in the last 1 year
Interview experience
4.0
Good
View more
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Interview Questions from Similar Companies

3.5
 • 643 Interview Questions
4.2
 • 345 Interview Questions
3.4
 • 289 Interview Questions
3.9
 • 256 Interview Questions
4.1
 • 247 Interview Questions
3.8
 • 129 Interview Questions
View all
Top HCLTech Interview Questions And Answers
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
70 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions
Get AmbitionBox app

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter