HCLTech
1500+ Deutsche Bank Interview Questions and Answers
Q301. Sql side : how optimization, given one sample data set to solve
Optimizing SQL queries for a sample data set
Identify and remove unnecessary joins or subqueries
Use indexes on columns frequently used in WHERE clauses
Avoid using SELECT * and only retrieve necessary columns
Consider using stored procedures for complex queries
Analyze query execution plans to identify bottlenecks
Q302. What is the difference Fetch and Axios in React?
Fetch is built-in browser API, Axios is a third-party library for making HTTP requests in React.
Fetch is built into the browser, while Axios is a third-party library.
Axios has built-in support for handling request and response interceptors.
Axios has better error handling capabilities compared to Fetch.
Axios allows for easy cancellation of requests.
Fetch uses Promises, while Axios uses Promises as well but also supports async/await syntax.
Q303. What are the Life Cycles Method in React?
React has three main life cycle methods: Mounting, Updating, and Unmounting.
Mounting: When a component is being created and inserted into the DOM.
Updating: When a component is being re-rendered as a result of changes to its props or state.
Unmounting: When a component is being removed from the DOM.
Q304. Leaf and spine architecture in Cisco ACI?
Leaf and spine architecture is a network topology used in Cisco ACI for scalable and efficient data center networking.
Leaf switches connect to spine switches, which then connect to the core network.
Leaf switches handle traffic within their own pod, while spine switches handle traffic between pods.
ACI uses a 2-tier spine-leaf architecture for scalability and flexibility.
The spine switches act as the routing backbone, while the leaf switches provide access to endpoints.
ACI allo...read more
Q305. Kafka configuration,how data will be streaming.
Kafka is configured to stream data through topics and partitions.
Kafka uses topics to organize data streams
Each topic is divided into partitions for scalability
Producers write data to topics and consumers read from them
Data is stored in a distributed manner across brokers
Configurations include settings for replication, retention, and compression
Q306. How to access variables in multi threaded application.
Use synchronization mechanisms like locks, semaphores, or monitors to access variables in multi-threaded applications.
Use synchronized keyword in Java to ensure only one thread can access the variable at a time.
Use locks and mutexes in C++ to protect shared resources.
Use atomic variables in C# to ensure thread safety.
Use thread-safe data structures like ConcurrentHashMap in Java.
Avoid using global variables in multi-threaded applications.
Use thread-local storage to store thre...read more
Q307. What Kind function have you used in Query transformation?
Q308. What is polymorphism and how do we achieve it using C++ programming
Polymorphism is the ability of an object to take on many forms. In C++, it is achieved through function overloading and virtual functions.
Polymorphism allows objects of different classes to be treated as objects of a common base class.
Function overloading enables multiple functions with the same name but different parameters.
Virtual functions allow derived classes to override base class functions.
Q309. How to elected DR and BDR in ospf ?
DR and BDR are elected in OSPF based on priority and router ID.
The router with the highest priority becomes the DR, and the second highest becomes the BDR.
If there is a tie in priority, the router with the highest router ID is elected.
DR and BDR are elected only on multi-access networks like Ethernet.
DR and BDR are responsible for exchanging LSAs with other routers and reducing network traffic.
To change the DR or BDR, the priority of the router can be modified.
Q310. Have you used idoc(Explanation of the complete df using idoc)
Q311. What is array and linked list.
Array is a collection of elements of same data type. Linked list is a data structure where each element points to the next one.
Arrays have fixed size, linked lists can grow dynamically
Arrays have constant time access, linked lists have linear time access
Arrays are stored in contiguous memory, linked lists are stored in non-contiguous memory
Example of array: int[] arr = {1, 2, 3, 4, 5}
Example of linked list: Node head = new Node(1); head.next = new Node(2);
Q312. what is (DEP) Device Enrollment Programme?
DEP is a program that allows organizations to easily enroll and manage Apple devices.
DEP streamlines the device setup process for IT administrators
Devices can be pre-configured with settings and apps before being shipped to end-users
DEP also allows for remote management and configuration of devices
Examples of organizations that use DEP include schools, businesses, and government agencies
Q313. What would be a DEP same technology in Android ?
Android's equivalent of DEP technology is called Google Play Protect.
Google Play Protect is a built-in security feature in Android devices.
It scans apps for malware and other harmful content.
It also provides regular security updates to keep devices protected.
Google Play Protect can be accessed and managed through the Google Play Store app.
Q314. What are the IPC Mechanism available? Illustrate with example?
Q315. what is ur project ? and then wts is ur role in this project ? and core java oops concepts ...
I worked on a project that involved developing a web application using Java and Spring framework.
Developed RESTful APIs using Spring Boot
Implemented user authentication and authorization using Spring Security
Used Hibernate for database operations
Implemented caching using Redis
My role was to develop and maintain the backend of the application
Q316. Prepare sets, list and dictionary from a given list.
Creating sets, lists, and dictionaries from a given list.
To create a set, use the set() function.
To create a list, simply use square brackets [] and separate elements with commas.
To create a dictionary, use curly braces {} and separate key-value pairs with colons and commas.
Q317. Explain traffic flow between different network with diagram.
Traffic flow between different networks can be explained using a diagram.
Traffic flows between networks through routers or gateways.
Each network has its own unique IP address range.
Routing protocols are used to determine the best path for traffic to take.
Firewalls can be used to control and filter traffic between networks.
Examples of different networks include LAN, WAN, and the internet.
Q318. How we make a class immutable in java
To make a class immutable in Java, we need to follow certain rules.
Make the class final so that it cannot be extended
Make all the fields private and final
Do not provide any setter methods
If the class has mutable fields, return a copy of the field instead of the original in getter methods
Ensure that any mutable objects passed to the constructor are not modified outside the class
Override equals() and hashCode() methods to ensure that objects can be compared properly
Q319. Tell some test case about messaging application
Test cases for messaging application
Verify if the message is delivered to the intended recipient
Check if the message is displayed in the correct order
Test if the message is sent and received within the expected time frame
Ensure that the message is not sent to the blocked contacts
Test if the message is sent successfully when the network is poor
Q320. Do you know about digital marketing, explain?
Digital marketing is the promotion of products or services using digital technologies.
It includes various channels such as social media, email, search engines, and mobile apps.
Digital marketing aims to reach a targeted audience and drive conversions.
It involves analyzing data and using insights to optimize campaigns.
Examples include Google Ads, Facebook Ads, email marketing, and SEO.
Digital marketing is constantly evolving with new technologies and trends.
Q321. What is normalization
Normalization is the process of organizing data in a database to reduce redundancy and improve data integrity.
Normalization involves breaking down a table into smaller tables and defining relationships between them.
It helps to eliminate data redundancy and inconsistencies.
Normalization is achieved through a series of normal forms, such as first normal form (1NF), second normal form (2NF), and so on.
Each normal form has a set of rules that must be followed to ensure data is pr...read more
Q322. What are business outcomes? Would you focus on outcomes or outputs and why
Business outcomes are the desired results or benefits that a business aims to achieve, as opposed to outputs which are the deliverables or products of a process.
Business outcomes are the ultimate goals that drive the organization forward.
They focus on the value created for the business and its customers.
Outcomes are measurable and have a direct impact on the success of the business.
Focusing on outcomes ensures that the work being done is aligned with the overall goals of the ...read more
Q323. What is meant by @data annotation and @value annotation
The @Data annotation is used in Java to declare a class as a data class, while the @Value annotation is used in Spring to create immutable objects.
The @Data annotation in Java is used to generate getters, setters, toString, equals, and hashCode methods for a class.
The @Value annotation in Spring is used to create immutable objects with final fields that are initialized through constructor injection.
Both annotations help in reducing boilerplate code and improving code readabil...read more
Q324. How to read the values from application properties file
To read values from application properties file, use a properties file reader in the programming language being used.
Use a properties file reader class in the programming language being used (e.g. Properties class in Java).
Load the properties file using the reader class.
Access the values using keys specified in the properties file.
Q325. What is call ID and CSequence
Call ID and CSequence are used in SIP protocol for identifying and sequencing SIP messages.
Call ID is a unique identifier for a SIP call and is used to match requests and responses.
CSequence is a sequence number for a SIP message and is used to ensure proper sequencing of messages.
Both Call ID and CSequence are important for reliable communication in SIP protocol.
Example: Call ID: 1234567890, CSequence: 1
Q326. Explain Latch up, lod, antenna effect, wpe, shielding, short channel effects, finfet structure, matching types.
Explanation of various analog layout design concepts including latch up, lod, antenna effect, wpe, shielding, short channel effects, finfet structure, and matching types.
Latch up is a phenomenon where a parasitic thyristor is formed in a CMOS circuit, causing a high current flow and potentially damaging the circuit.
LOD (Latch-up due to Overvoltage) occurs when the voltage on the power supply pins exceeds the maximum allowed voltage.
Antenna effect is the phenomenon where a met...read more
Q327. Which version of html is getting at thid time and why?
HTML5 is the latest version of HTML.
HTML5 was released in 2014.
It introduced new semantic elements like
, It also introduced new form controls like
, HTML5 supports multimedia elements like
It also has improved support for mobile devices.
HTML5 is backward compatible with older versions of HTML.
Q328. How did you configure the required services?
Q329. how to handle if element xpath is different in ios and android apps
Use platform-specific locators or conditional statements to handle different element xpaths in iOS and Android apps.
Use platform-specific locators like accessibility id for iOS and resource id for Android
Implement conditional statements to switch between different xpaths based on the platform
Utilize Appium's platformName capability to identify the platform and adjust the element xpath accordingly
Q330. What is encapsulation
Encapsulation is the process of hiding implementation details and providing a public interface for accessing the functionality.
Encapsulation helps in achieving data abstraction and information hiding
It prevents unauthorized access to the internal details of an object
It allows for easy modification of implementation without affecting the external code
Example: A class with private variables and public methods
Example: A bank account class with methods for deposit and withdraw, b...read more
Q331. How Active setup works and what is advertised shortcut
Active setup is a mechanism to ensure that software is installed correctly. Advertised shortcut is a shortcut that is created during installation.
Active setup is a registry key that runs a command to ensure that software is installed correctly
It is used to update or repair software installations
Advertised shortcut is a shortcut that is created during installation and points to a specific feature or component of the software
When the shortcut is clicked, it triggers the install...read more
Q332. What is the use of the yield() method in threading?
The yield() method in threading is used to give up the CPU and allow other threads to run.
Allows other threads to run by giving up the CPU temporarily
Useful for preventing one thread from dominating the CPU
Can be used to implement cooperative multitasking
Q333. what is vertical and horizontal scaling in micro services?
Vertical scaling increases the capacity of a single server, while horizontal scaling adds more servers to distribute the load.
Vertical scaling involves increasing the resources of a single server, such as CPU, RAM, or storage.
Horizontal scaling involves adding more servers to distribute the load, often done through containerization or virtualization.
Vertical scaling is limited by the capacity of a single server, while horizontal scaling allows for more flexibility and scalabi...read more
Q334. How the escalation matrix works in case of production defects?
Escalation matrix defines the process for escalating production defects based on severity and impact.
Escalation matrix typically includes levels of escalation, responsible parties at each level, and criteria for escalating defects.
For example, a Level 1 escalation may involve the development team, while a Level 2 escalation may involve senior management.
Criteria for escalation may include severity of the defect, impact on users or business operations, and potential solutions....read more
Q335. is it okay to give the Deliverables under pressure?
Yes, it is okay to give deliverables under pressure as long as quality is not compromised.
Meeting deadlines is important in software development.
Pressure can sometimes lead to increased focus and productivity.
Communication with stakeholders about realistic timelines is key.
Prioritizing tasks and managing time effectively can help in delivering under pressure.
Q336. How are Windows programs different from normal C-programs? What can be the various types of events?
Q337. what IOC and DI in spring?
IOC and DI are design patterns used in Spring framework for loose coupling and dependency injection.
IOC (Inversion of Control) is a design pattern where the control of object creation and lifecycle is handed over to a container or framework.
DI (Dependency Injection) is a design pattern where the dependencies of an object are injected into it by an external entity, rather than the object creating them itself.
Spring framework uses IOC and DI to achieve loose coupling and make t...read more
Q338. What Permission applied on types
Permissions applied on types determine the level of access and actions that can be performed on them.
Permissions can be applied to various types such as files, folders, databases, etc.
Examples of permissions include read, write, execute, delete, modify, etc.
Permissions can be granted to individual users or groups of users.
Permissions can be inherited from parent objects or explicitly set on individual objects.
Q339. what is consigner and consignee
Consigner is the person who sends goods to another person or company, while consignee is the person or company who receives the goods.
Consigner is the sender of goods
Consignee is the receiver of goods
Consigner retains ownership of the goods until they are sold by the consignee
Consignee pays the consigner for the goods sold
Example: A clothing manufacturer sends their products to a retail store for sale. The manufacturer is the consigner and the retail store is the consignee.
Q340. How to make any parameter or field mandatory? Ans: Obligatory
Use the 'Obligatory' keyword to make a parameter or field mandatory in SAP ABAP.
Add 'Obligatory' keyword in the parameter declaration to make it mandatory
If the mandatory parameter is not filled, an error message will be displayed
Example: DATA lv_name TYPE string OBLIGATORY.
Q341. Difference between named user and concurrent user license?
Named user license is assigned to a specific individual while concurrent user license is shared among multiple users.
Named user license is assigned to a specific individual and cannot be shared with others.
Concurrent user license is shared among multiple users and can be used by any user at any time, as long as the maximum number of users is not exceeded.
Named user license is typically more expensive than concurrent user license.
Examples of named user license include Microsof...read more
Q342. Demonstrate . How will you set up KRA/KPO. Attrition management.
To set up KRA/KPO, I will identify key performance indicators and align them with business objectives. For attrition management, I will analyze reasons and implement retention strategies.
Identify business objectives and align KPIs with them
Communicate KRA/KPO to team members and ensure understanding
Regularly monitor and evaluate performance against KPIs
Analyze reasons for attrition and implement retention strategies
Conduct exit interviews and address concerns
Provide growth op...read more
Q343. Tell us about the entity types in Dynamics 365 CRM
Dynamics 365 CRM has four entity types: System, Business, Custom, and Customizable.
System entities are provided by Microsoft and cannot be modified
Business entities are customizable and can be used to store data specific to an organization
Custom entities are created by users to store data specific to their needs
Customizable entities are provided by Microsoft but can be modified by users
Examples of entities include Account, Contact, Lead, Opportunity, and Case
Q344. How to handle clients, How to estimate projects
Handling clients and estimating projects require effective communication, planning, and negotiation skills.
Establish clear communication channels with clients to understand their needs and expectations.
Create a detailed project plan with timelines, milestones, and deliverables.
Use project management tools to track progress and identify potential risks.
Regularly update clients on project status and address any concerns or issues promptly.
Negotiate project scope, budget, and ti...read more
Q345. have you got any experience in sourcing, scheduling?
Yes, I have experience in sourcing and scheduling.
I have sourced candidates through various channels such as job boards, social media, and employee referrals.
I have scheduled interviews and coordinated with hiring managers and candidates to ensure a smooth process.
I have also managed candidate pipelines and provided regular updates to stakeholders.
For example, in my previous role, I sourced and scheduled over 50 candidates for various positions within a 3-month period.
Q346. Have you ever faced synchronization problem ? How did you overcome them ?
Yes, I have faced synchronization problems while automating tests.
Yes, I have encountered synchronization issues when elements load at different speeds on a webpage.
To overcome this, I have used explicit waits in Selenium to wait for specific conditions before proceeding with the test.
I have also used implicit waits to set a default waiting time for the elements to load.
In some cases, I have used Thread.sleep() to pause the execution for a specific time to ensure synchronizat...read more
Q347. What is framework ? Explain the frameworks you worked on in your project?
A framework is a set of guidelines, coding standards, concepts, and practices that provide structure and support for automated testing.
Framework helps in organizing and executing automated tests efficiently.
Common frameworks include Data-Driven, Keyword-Driven, Hybrid, and Behavior-Driven Development (BDD).
In my project, I have worked on a Data-Driven framework where test data is separated from test scripts for easy maintenance.
Q348. What is migration and its type?
Migration is the process of moving from one place to another, typically for work, study, or better living conditions.
Migration can be voluntary or forced.
Types of migration include internal migration (within a country), international migration (between countries), and rural-urban migration.
Examples of migration include people moving from rural areas to cities for better job opportunities, or refugees fleeing conflict in their home country.
Q349. What is OOPS and what are the benefits?
OOPS stands for Object-Oriented Programming System. It is a programming paradigm based on the concept of objects.
Encapsulation: Objects can encapsulate data and behavior within a single unit.
Inheritance: Objects can inherit attributes and methods from other objects.
Polymorphism: Objects can take on different forms or have multiple behaviors.
Reusability: Objects can be reused in different parts of a program.
Modularity: Objects promote modular design and code organization.
Examp...read more
Q350. How many programming languages do you know?
I am proficient in 5 programming languages.
I am proficient in Java, Python, C++, JavaScript, and SQL.
I have experience in developing web applications using JavaScript and Python frameworks.
I have worked on database management using SQL.
I have also developed desktop applications using Java and C++.
I am always eager to learn new programming languages and technologies.
Q351. What is the difference between Service endpoint and Private endpoint?
Service endpoint is a public IP address used to access a service, while Private endpoint is a private IP address within a VNet.
Service endpoint is a public IP address used to access a service over the internet.
Private endpoint is a private IP address within a Virtual Network (VNet) used to access a service privately.
Service endpoint is accessible over the internet, while Private endpoint is only accessible within the VNet.
Private endpoint provides secure access to Azure servi...read more
Q352. What will you do if policy getting failed in checkpoint firewall during installation of policy.
I would troubleshoot the issue by checking the logs, verifying the policy rules, and ensuring proper configuration.
Check the logs to identify the specific error or issue
Verify the policy rules to ensure they are correctly configured
Check for any conflicts or overlapping rules that may be causing the failure
Ensure that the policy installation process was completed successfully
Consult with colleagues or documentation for troubleshooting steps
Q353. Whats the difference between interface and abstract class?
Interface is a contract with no implementation, while abstract class can have some implementation.
Interface cannot have any implementation, only method signatures.
Abstract class can have both abstract methods and concrete methods.
A class can implement multiple interfaces but can only inherit from one abstract class.
Interfaces are used for full abstraction, while abstract classes are used for partial abstraction.
Q354. Q6) What is the ResponseState and ServerState Difference?
ResponseState and ServerState are different states in a software system that represent different aspects of the system's functionality.
ResponseState typically refers to the state of a response object in a software system, indicating whether the response was successful, failed, or pending.
ServerState, on the other hand, refers to the state of the server in a software system, indicating whether the server is running, stopped, or experiencing issues.
ResponseState is more focused...read more
Q355. Q8 ) What is ConcurrentModificationException In Java?
ConcurrentModificationException is thrown when an object is modified concurrently while iterating over it.
Occurs when a collection is modified while being iterated over using an iterator
Can be avoided by using ConcurrentHashMap or CopyOnWriteArrayList
Example: ArrayList being modified while iterating over it
Q356. Q10) What is difference Between @EnableMock and @Spy in Junit5?
The main difference between @EnableMock and @Spy in Junit5 is that @EnableMock creates a mock object while @Spy creates a spy object.
The @EnableMock annotation is used to create a mock object for a class or interface, allowing you to define its behavior using Mockito.
The @Spy annotation is used to create a spy object, which is a real object with some mock behavior. It allows you to mock specific methods while calling the real methods of the object.
Mock objects created with @E...read more
Q357. Q12) What is difference between @PutMapping and @PatchMapping?
The main difference between @PutMapping and @PatchMapping is the level of data that is updated.
PutMapping is used to update an entire resource, while PatchMapping is used to update only specific fields of a resource.
PutMapping replaces the entire resource with the new data provided, while PatchMapping updates only the specified fields.
PutMapping is idempotent, meaning multiple identical requests will have the same effect as a single request, while PatchMapping may not be idem...read more
Q358. Write program to print odd and even number alternatively using 2 threads which contains odd number list and even number list
Program to print odd and even numbers alternatively using 2 threads with separate lists
Create two separate lists for odd and even numbers
Use two threads to print numbers alternatively from each list
Ensure synchronization between threads to avoid race conditions
Q359. What’s Mulesoft ? What’s Munit ? What’s Runtime Manager ? What’s Scaling ? What’s RAML ?
Mulesoft is an integration platform that connects applications, data, and devices.
Munit is a testing framework for Mulesoft applications.
Runtime Manager is a cloud-based platform for managing Mulesoft applications.
Scaling refers to the ability of Mulesoft to handle increased traffic and workload.
RAML is a language used to define APIs in a human-readable format.
Q360. what is modern and classic folder?
Modern and Classic folders are two different types of folders in UiPath Orchestrator.
Modern folders are designed for multi-tenancy and allow for more granular control over permissions and access.
Classic folders are the traditional folders in Orchestrator and are used for single-tenancy.
Modern folders have a different user interface and are organized by tenants, while classic folders are organized by folders and subfolders.
Modern folders also have additional features such as t...read more
Q361. Tell me about complete product life cycle with examply
The product life cycle consists of several stages including ideation, development, launch, growth, maturity, and decline.
Ideation: Generating ideas for a new product or improvement.
Development: Designing and creating the product.
Launch: Introducing the product to the market.
Growth: Increasing sales and market share.
Maturity: Product reaches its peak and sales stabilize.
Decline: Sales decline due to market saturation or obsolescence.
Q362. What is operating frequency of DDR 4
The operating frequency of DDR4 is 2133 MHz to 4266 MHz.
DDR4 operates at higher frequencies than its predecessor DDR3
The operating frequency of DDR4 depends on the specific module and its configuration
DDR4 can operate at frequencies ranging from 2133 MHz to 4266 MHz
Higher frequency modules tend to be more expensive
Q363. What type of PCie connector used in your project
We used PCIe Gen3 x16 connector in our project.
PCIe Gen3 x16 connector provides high-speed data transfer.
It has 16 lanes for data transmission.
It is commonly used in high-performance graphics cards and storage devices.
It has a maximum bandwidth of 32 GB/s.
Examples of devices that use PCIe Gen3 x16 connector are NVIDIA GeForce GTX 1080 Ti and Samsung 970 PRO SSD.
Q364. How do you keep track of the information security and external risks to your organisation
We keep track of information security and external risks through regular risk assessments, monitoring of industry trends, and collaboration with external partners.
Conduct regular risk assessments to identify potential threats and vulnerabilities
Monitor industry trends and news to stay informed of emerging risks
Collaborate with external partners, such as vendors and industry associations, to share information and best practices
Maintain up-to-date policies and procedures to add...read more
Q365. How You Upload A Data From Source To Target ?
Data can be uploaded from source to target using ETL tools or manual data entry.
Extract data from source system
Transform data to match target system requirements
Load data into target system
Use ETL tools like Informatica, Talend, or SSIS
Manual data entry can be done through UI or APIs
Q366. How to report the Bug with Needed Information?
To report a bug with needed information, follow these steps:
Reproduce the bug to ensure it is consistent
Document the steps to reproduce the bug
Include the expected behavior and actual behavior
Provide screenshots or videos if applicable
Include the environment details (operating system, browser, etc.)
Specify the version of the software being used
Include any error messages or logs
Provide additional context or observations
Q367. How to add fitness to process and product?
To add fitness to process and product, focus on incorporating physical activity, healthy practices, and quality control measures.
Encourage employees to engage in physical activity during breaks or provide on-site fitness facilities.
Implement ergonomic practices to promote good posture and reduce the risk of injuries.
Include quality control measures to ensure products meet fitness standards, such as testing for durability or accuracy.
Offer healthy food options in the workplace...read more
Q368. Troubleshooting the issues with SharePoint search, user profile synchronisation
To troubleshoot SharePoint search and user profile synchronization issues, follow these steps:
Check if the search service is running and if the search index is up-to-date
Verify the user profile service is running and the synchronization connections are configured correctly
Check if the search crawl account has the necessary permissions
Review the ULS logs for any errors or warnings related to search or user profile synchronization
Restart the search and user profile synchronizat...read more
Q369. Find the third number if 2 numbers from a Pythagorean triplet are given
To find the third number in a Pythagorean triplet given two numbers.
Use the Pythagorean theorem (a^2 + b^2 = c^2) to solve for the missing number.
Check if the given numbers form a Pythagorean triplet before proceeding.
The third number can be either a or b depending on which two numbers are given.
Q370. What is the shortcut key for paste special
Ctrl + Alt + V
Press Ctrl + Alt + V to open the Paste Special dialog box
Then use the arrow keys to select the desired option (e.g. values, formats, formulas)
Press Enter to paste the selected option
Q371. Tell me about vlookup function and its formula
VLOOKUP is a function in Excel used to search for a value in a table and return a corresponding value.
VLOOKUP stands for 'Vertical Lookup'
It searches for a value in the first column of a table and returns a value in the same row from a specified column
The formula for VLOOKUP is =VLOOKUP(lookup_value, table_array, col_index_num, [range_lookup])
Example: =VLOOKUP(A2, B2:D10, 3, FALSE) - searches for the value in cell A2 in the range B2:D10 and returns the value in the 3rd column...read more
Q372. Managed code vs unmanaged code, count vs any in EF, optional parameter in c#, queries in linq
Questions related to managed vs unmanaged code, EF count vs any, optional parameters in C#, and queries in LINQ.
Managed code is compiled to Intermediate Language (IL) and executed by Common Language Runtime (CLR), while unmanaged code is directly executed by the operating system.
EF's Count() method returns the number of elements in a collection, while Any() returns a boolean indicating whether the collection contains any elements.
Optional parameters in C# allow for default va...read more
Q373. what is 3 way and 4 way match
3 way match compares purchase order, goods receipt and invoice. 4 way match adds payment to the comparison.
3 way match ensures that the quantity and price on the invoice match the purchase order and goods receipt.
4 way match adds the payment to the comparison to ensure that the vendor is paid correctly.
This process helps prevent overpayment or underpayment to vendors.
Example: A company orders 100 units of a product, receives 100 units, and is invoiced for 100 units at the agr...read more
Q374. What else you troubleshoot in data centre?
Apart from network issues, I troubleshoot server hardware, storage, power, cooling, and security in data centre.
Server hardware issues such as failed hard drives, RAM, or CPU
Storage issues such as disk space, RAID failures, or SAN connectivity
Power and cooling issues such as UPS failures, overheating, or HVAC problems
Security issues such as unauthorized access, firewall misconfigurations, or DDoS attacks
Q375. 4. what is static block in apex
Static block is a block of code that runs only once when the class is loaded.
Static block is enclosed in curly braces and starts with the keyword 'static'.
It is used to initialize static variables or to perform any one-time setup for the class.
Static block is executed before the constructor of the class.
Example: static { System.debug('This is a static block'); }
Q376. Tell about the existing scheduling algorithm?
The existing scheduling algorithm is designed to allocate resources and prioritize tasks based on their importance and urgency.
The algorithm uses a priority queue to manage tasks.
Tasks are assigned a priority level based on their importance and urgency.
The algorithm takes into account the availability of resources before assigning tasks.
The algorithm can be customized to suit specific needs and requirements.
Examples of scheduling algorithms include Round Robin, First Come Fir...read more
Q377. What is the significance of friend keyword in C++?
The friend keyword in C++ allows non-member functions or classes to access private and protected members of a class.
Friend functions can be declared inside a class or outside of it.
Friend classes can access all the members of the class they are friends with.
Friendship is not mutual, meaning if class A is a friend of class B, it does not mean that class B is a friend of class A.
The use of friend keyword should be limited as it can break encapsulation and increase coupling betw...read more
Q378. How to add permissions in vb script
To add permissions in VB script, use the SetACL.exe command-line tool.
Download and install SetACL.exe
Use the command SetACL.exe to add permissions to a file or folder
Example: SetACL.exe -on "C:\folder" -ot file -actn ace -ace "n:domain\user;p:full"
Q379. How do you troubleshoot technical issues?
Q380. What is meant by the term of oops
OOPs stands for Object-Oriented Programming. It is a programming paradigm based on the concept of objects.
OOPs is a way of organizing and designing code around objects
It emphasizes on encapsulation, inheritance, and polymorphism
It helps in creating reusable code and reduces code complexity
Examples of OOPs languages are Java, C++, Python, etc.
Q381. What do you under stand by order management briefly explain order life cycle.
Order management involves overseeing the process of receiving, fulfilling, and tracking customer orders.
Order creation: Customer places an order for a product or service.
Order processing: Order is reviewed, approved, and fulfilled.
Order shipping: Product is packaged and shipped to the customer.
Order delivery: Customer receives the product and confirms satisfaction.
Order completion: Payment is processed and order is closed.
Order management systems help automate and streamline ...read more
Q382. Change management flow and how we can change template
Change management flow involves planning, implementing, and monitoring changes to ensure successful adoption.
Identify the need for change and create a change request
Evaluate the impact of the change on stakeholders and systems
Develop a change management plan including communication and training
Implement the change and monitor its progress
Review and assess the change to ensure objectives are met
Update documentation and templates as needed
Example: Changing a software template t...read more
Q383. What is sticky bit in linux and what is soft link and hard link
Sticky bit is a permission bit in Linux that allows only the owner of a file or directory to delete or rename it. Soft link and hard link are two types of links used in Linux file systems.
Sticky bit is denoted by 't' in the permission bits of a file or directory
Soft link is a symbolic link to a file or directory and can be created using the 'ln -s' command
Hard link is a link to a file and shares the same inode as the original file. It can be created using the 'ln' command
Soft...read more
Q384. How can I grant SFTP access exclusively to the user David?
Grant SFTP access exclusively to user David
Create a new group specifically for David, e.g. 'davidgroup'
Set the ChrootDirectory in the SSH configuration file to restrict David's access to a specific directory
Add David to the 'davidgroup' and configure the necessary permissions for SFTP access
Q385. How can a user be locked out after 6 unsuccessful password attempts for a duration of 30 minutes?
To lock a user out after 6 unsuccessful password attempts for 30 minutes, modify the PAM configuration file.
Edit the PAM configuration file (/etc/pam.d/common-auth) to include the 'pam_tally2' module.
Set the 'deny' option in the 'pam_tally2' module to lock the user out after 6 failed attempts.
Specify the 'unlock_time' option in the 'pam_tally2' module to set the duration of the lockout period to 30 minutes.
Example: auth required pam_tally2.so deny=6 unlock_time=1800
Q386. Define IRR Define MIRR What is deferred revenue Define Npv and formula Deffered tax asset and liability
Definition of IRR, MIRR, deferred revenue, NPV and formula, deferred tax asset and liability.
IRR (Internal Rate of Return) is the rate at which the net present value of cash flows equals zero.
MIRR (Modified Internal Rate of Return) is a variation of IRR that assumes cash flows are reinvested at a different rate.
Deferred revenue is a liability that arises when a company receives payment for goods or services that have not yet been delivered.
NPV (Net Present Value) is the diffe...read more
Q387. Write pseudo code to arrange a random list of numbers in Ascending order
Pseudo code to sort a random list of numbers in ascending order
Loop through the list and compare adjacent elements
If the left element is greater than the right element, swap them
Repeat until no swaps are needed
Q388. What are usecase of slave and master
Slaves and masters are used in distributed systems for load balancing and fault tolerance.
In a distributed system, the master node controls and coordinates the work of the slave nodes.
Slaves perform tasks assigned by the master and report back their results.
Masters can be used for load balancing, where they distribute tasks evenly among slaves.
Masters can also be used for fault tolerance, where they can detect when a slave node fails and reassign its tasks to other slaves.
Exa...read more
Q389. Differentiate between private sector and govt sector
Private sector is owned and operated by private individuals or companies, while govt sector is owned and operated by the government.
Private sector is profit-driven, while govt sector is service-driven
Private sector has more flexibility in decision-making, while govt sector has more regulations and bureaucracy
Private sector is more competitive, while govt sector is more stable
Examples of private sector: Apple, Microsoft, Coca-Cola, etc.
Examples of govt sector: NASA, USPS, FBI,...read more
Q390. How to retrieve domain name for the given input email address.
Q391. What is circuit switching and packet switching?
Q392. What is DDL DML DCL?
DDL, DML, and DCL are three types of SQL commands used to manipulate databases.
DDL (Data Definition Language) is used to define the database schema and structure.
DML (Data Manipulation Language) is used to manipulate data within the database.
DCL (Data Control Language) is used to control access to the database.
Examples of DDL commands include CREATE, ALTER, and DROP.
Examples of DML commands include SELECT, INSERT, UPDATE, and DELETE.
Examples of DCL commands include GRANT and ...read more
Q393. What is the difference between System drive and Boot drive
System drive and Boot drive are different in terms of their functionality and purpose.
System drive contains the operating system files and other system-related files.
Boot drive is the drive from which the computer boots up.
System drive can be different from the Boot drive.
For example, in a dual-boot system, each operating system may have its own system and boot drives.
Q394. Microservice project architecture and flow in current project, Microservice design patterns etc..
Explained microservice project architecture and design patterns.
Our microservice project follows a domain-driven design approach.
We use API Gateway pattern to handle requests and route them to appropriate microservices.
We also use Circuit Breaker pattern to handle failures and prevent cascading failures.
Each microservice has its own database and communicates with other microservices through REST APIs.
We use containerization with Docker and orchestration with Kubernetes for de...read more
Q395. What is way of using excel in Ui Path ?
Excel can be used in UiPath for data manipulation and automation.
Use Excel Application Scope activity to open an Excel file
Use Read Range activity to read data from Excel
Use Write Range activity to write data to Excel
Use Filter Data Table activity to filter data in Excel
Use For Each Row activity to loop through rows in Excel
Use Excel activities in UiPath StudioX for easy automation
Example: Use UiPath to extract data from an Excel file and input it into a web form
Example: Use ...read more
Q396. Make a nested array to flat array using customised method
Convert nested array to flat array using custom method
Create a recursive function to flatten the nested array
Use Array.isArray() to check if an element is an array
Concatenate arrays using Array.concat() method
Q397. 1. Explain GKE Architecture 2. Difference between VPC peering and VPC sharing 3. How load balancer works?
GKE Architecture is a managed Kubernetes service provided by Google Cloud Platform.
GKE Architecture consists of master nodes and worker nodes.
Master nodes manage the Kubernetes cluster and worker nodes run the applications.
GKE provides automated scaling, monitoring, and management of the Kubernetes cluster.
GKE integrates with other Google Cloud services for seamless deployment and management.
Q398. Reverse a given string Difference between array and arraylist
Reverse a given string and explain the difference between array and arraylist.
To reverse a string, we can use the built-in reverse() method or loop through the string and append each character in reverse order.
Arrays are fixed in size, while ArrayLists can dynamically grow and shrink.
Arrays can hold primitive data types and objects, while ArrayLists can only hold objects.
Arrays are faster for accessing elements, while ArrayLists are faster for inserting and deleting elements.
Q399. Difference in ordered and unordered map
Ordered map maintains the order of insertion while unordered map does not.
Ordered map is implemented as a balanced tree while unordered map is implemented as a hash table.
Ordered map has slower insertion and deletion but faster searching compared to unordered map.
Unordered map has faster insertion and deletion but slower searching compared to ordered map.
Example: std::map vs std::unordered_map in C++.
Q400. Explain cloud and connectors rules how do we implement them
Cloud and connectors rules are used to manage data flow between different systems in a cloud environment.
Cloud rules define how data is stored, accessed, and secured in the cloud environment
Connectors rules define how different systems communicate and exchange data in the cloud
Implementation involves configuring cloud storage settings, access controls, and data encryption
Examples include setting up AWS S3 bucket policies, Azure AD authentication for connectors
Top HR Questions asked in Deutsche Bank
Interview Process at Deutsche Bank
Top Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month