Premium Employer

HCLTech

3.6
based on 33.7k Reviews
Filter interviews by

1500+ Deutsche Bank Interview Questions and Answers

Updated 20 Dec 2024
Popular Designations

Q301. Sql side : how optimization, given one sample data set to solve

Ans.

Optimizing SQL queries for a sample data set

  • Identify and remove unnecessary joins or subqueries

  • Use indexes on columns frequently used in WHERE clauses

  • Avoid using SELECT * and only retrieve necessary columns

  • Consider using stored procedures for complex queries

  • Analyze query execution plans to identify bottlenecks

Add your answer

Q302. What is the difference Fetch and Axios in React?

Ans.

Fetch is built-in browser API, Axios is a third-party library for making HTTP requests in React.

  • Fetch is built into the browser, while Axios is a third-party library.

  • Axios has built-in support for handling request and response interceptors.

  • Axios has better error handling capabilities compared to Fetch.

  • Axios allows for easy cancellation of requests.

  • Fetch uses Promises, while Axios uses Promises as well but also supports async/await syntax.

Add your answer

Q303. What are the Life Cycles Method in React?

Ans.

React has three main life cycle methods: Mounting, Updating, and Unmounting.

  • Mounting: When a component is being created and inserted into the DOM.

  • Updating: When a component is being re-rendered as a result of changes to its props or state.

  • Unmounting: When a component is being removed from the DOM.

Add your answer

Q304. Leaf and spine architecture in Cisco ACI?

Ans.

Leaf and spine architecture is a network topology used in Cisco ACI for scalable and efficient data center networking.

  • Leaf switches connect to spine switches, which then connect to the core network.

  • Leaf switches handle traffic within their own pod, while spine switches handle traffic between pods.

  • ACI uses a 2-tier spine-leaf architecture for scalability and flexibility.

  • The spine switches act as the routing backbone, while the leaf switches provide access to endpoints.

  • ACI allo...read more

Add your answer
Discover Deutsche Bank interview dos and don'ts from real experiences

Q305. Kafka configuration,how data will be streaming.

Ans.

Kafka is configured to stream data through topics and partitions.

  • Kafka uses topics to organize data streams

  • Each topic is divided into partitions for scalability

  • Producers write data to topics and consumers read from them

  • Data is stored in a distributed manner across brokers

  • Configurations include settings for replication, retention, and compression

Add your answer

Q306. How to access variables in multi threaded application.

Ans.

Use synchronization mechanisms like locks, semaphores, or monitors to access variables in multi-threaded applications.

  • Use synchronized keyword in Java to ensure only one thread can access the variable at a time.

  • Use locks and mutexes in C++ to protect shared resources.

  • Use atomic variables in C# to ensure thread safety.

  • Use thread-safe data structures like ConcurrentHashMap in Java.

  • Avoid using global variables in multi-threaded applications.

  • Use thread-local storage to store thre...read more

Add your answer
Are these interview questions helpful?

Q307. What Kind function have you used in Query transformation?

Add your answer

Q308. What is polymorphism and how do we achieve it using C++ programming

Ans.

Polymorphism is the ability of an object to take on many forms. In C++, it is achieved through function overloading and virtual functions.

  • Polymorphism allows objects of different classes to be treated as objects of a common base class.

  • Function overloading enables multiple functions with the same name but different parameters.

  • Virtual functions allow derived classes to override base class functions.

Add your answer
Share interview questions and help millions of jobseekers 🌟

Q309. How to elected DR and BDR in ospf ?

Ans.

DR and BDR are elected in OSPF based on priority and router ID.

  • The router with the highest priority becomes the DR, and the second highest becomes the BDR.

  • If there is a tie in priority, the router with the highest router ID is elected.

  • DR and BDR are elected only on multi-access networks like Ethernet.

  • DR and BDR are responsible for exchanging LSAs with other routers and reducing network traffic.

  • To change the DR or BDR, the priority of the router can be modified.

Add your answer

Q310. Have you used idoc(Explanation of the complete df using idoc)

Add your answer

Q311. What is array and linked list.

Ans.

Array is a collection of elements of same data type. Linked list is a data structure where each element points to the next one.

  • Arrays have fixed size, linked lists can grow dynamically

  • Arrays have constant time access, linked lists have linear time access

  • Arrays are stored in contiguous memory, linked lists are stored in non-contiguous memory

  • Example of array: int[] arr = {1, 2, 3, 4, 5}

  • Example of linked list: Node head = new Node(1); head.next = new Node(2);

Add your answer

Q312. what is (DEP) Device Enrollment Programme?

Ans.

DEP is a program that allows organizations to easily enroll and manage Apple devices.

  • DEP streamlines the device setup process for IT administrators

  • Devices can be pre-configured with settings and apps before being shipped to end-users

  • DEP also allows for remote management and configuration of devices

  • Examples of organizations that use DEP include schools, businesses, and government agencies

Add your answer

Q313. What would be a DEP same technology in Android ?

Ans.

Android's equivalent of DEP technology is called Google Play Protect.

  • Google Play Protect is a built-in security feature in Android devices.

  • It scans apps for malware and other harmful content.

  • It also provides regular security updates to keep devices protected.

  • Google Play Protect can be accessed and managed through the Google Play Store app.

Add your answer

Q314. What are the IPC Mechanism available? Illustrate with example?

Add your answer

Q315. what is ur project ? and then wts is ur role in this project ? and core java oops concepts ...

Ans.

I worked on a project that involved developing a web application using Java and Spring framework.

  • Developed RESTful APIs using Spring Boot

  • Implemented user authentication and authorization using Spring Security

  • Used Hibernate for database operations

  • Implemented caching using Redis

  • My role was to develop and maintain the backend of the application

Add your answer

Q316. Prepare sets, list and dictionary from a given list.

Ans.

Creating sets, lists, and dictionaries from a given list.

  • To create a set, use the set() function.

  • To create a list, simply use square brackets [] and separate elements with commas.

  • To create a dictionary, use curly braces {} and separate key-value pairs with colons and commas.

Add your answer

Q317. Explain traffic flow between different network with diagram.

Ans.

Traffic flow between different networks can be explained using a diagram.

  • Traffic flows between networks through routers or gateways.

  • Each network has its own unique IP address range.

  • Routing protocols are used to determine the best path for traffic to take.

  • Firewalls can be used to control and filter traffic between networks.

  • Examples of different networks include LAN, WAN, and the internet.

Add your answer

Q318. How we make a class immutable in java

Ans.

To make a class immutable in Java, we need to follow certain rules.

  • Make the class final so that it cannot be extended

  • Make all the fields private and final

  • Do not provide any setter methods

  • If the class has mutable fields, return a copy of the field instead of the original in getter methods

  • Ensure that any mutable objects passed to the constructor are not modified outside the class

  • Override equals() and hashCode() methods to ensure that objects can be compared properly

Add your answer

Q319. Tell some test case about messaging application

Ans.

Test cases for messaging application

  • Verify if the message is delivered to the intended recipient

  • Check if the message is displayed in the correct order

  • Test if the message is sent and received within the expected time frame

  • Ensure that the message is not sent to the blocked contacts

  • Test if the message is sent successfully when the network is poor

Add your answer

Q320. Do you know about digital marketing, explain?

Ans.

Digital marketing is the promotion of products or services using digital technologies.

  • It includes various channels such as social media, email, search engines, and mobile apps.

  • Digital marketing aims to reach a targeted audience and drive conversions.

  • It involves analyzing data and using insights to optimize campaigns.

  • Examples include Google Ads, Facebook Ads, email marketing, and SEO.

  • Digital marketing is constantly evolving with new technologies and trends.

Add your answer

Q321. What is normalization

Ans.

Normalization is the process of organizing data in a database to reduce redundancy and improve data integrity.

  • Normalization involves breaking down a table into smaller tables and defining relationships between them.

  • It helps to eliminate data redundancy and inconsistencies.

  • Normalization is achieved through a series of normal forms, such as first normal form (1NF), second normal form (2NF), and so on.

  • Each normal form has a set of rules that must be followed to ensure data is pr...read more

Add your answer

Q322. What are business outcomes? Would you focus on outcomes or outputs and why

Ans.

Business outcomes are the desired results or benefits that a business aims to achieve, as opposed to outputs which are the deliverables or products of a process.

  • Business outcomes are the ultimate goals that drive the organization forward.

  • They focus on the value created for the business and its customers.

  • Outcomes are measurable and have a direct impact on the success of the business.

  • Focusing on outcomes ensures that the work being done is aligned with the overall goals of the ...read more

Add your answer

Q323. What is meant by @data annotation and @value annotation

Ans.

The @Data annotation is used in Java to declare a class as a data class, while the @Value annotation is used in Spring to create immutable objects.

  • The @Data annotation in Java is used to generate getters, setters, toString, equals, and hashCode methods for a class.

  • The @Value annotation in Spring is used to create immutable objects with final fields that are initialized through constructor injection.

  • Both annotations help in reducing boilerplate code and improving code readabil...read more

Add your answer

Q324. How to read the values from application properties file

Ans.

To read values from application properties file, use a properties file reader in the programming language being used.

  • Use a properties file reader class in the programming language being used (e.g. Properties class in Java).

  • Load the properties file using the reader class.

  • Access the values using keys specified in the properties file.

Add your answer

Q325. What is call ID and CSequence

Ans.

Call ID and CSequence are used in SIP protocol for identifying and sequencing SIP messages.

  • Call ID is a unique identifier for a SIP call and is used to match requests and responses.

  • CSequence is a sequence number for a SIP message and is used to ensure proper sequencing of messages.

  • Both Call ID and CSequence are important for reliable communication in SIP protocol.

  • Example: Call ID: 1234567890, CSequence: 1

Add your answer

Q326. Explain Latch up, lod, antenna effect, wpe, shielding, short channel effects, finfet structure, matching types.

Ans.

Explanation of various analog layout design concepts including latch up, lod, antenna effect, wpe, shielding, short channel effects, finfet structure, and matching types.

  • Latch up is a phenomenon where a parasitic thyristor is formed in a CMOS circuit, causing a high current flow and potentially damaging the circuit.

  • LOD (Latch-up due to Overvoltage) occurs when the voltage on the power supply pins exceeds the maximum allowed voltage.

  • Antenna effect is the phenomenon where a met...read more

Add your answer

Q327. Which version of html is getting at thid time and why?

Ans.

HTML5 is the latest version of HTML.

  • HTML5 was released in 2014.

  • It introduced new semantic elements like

    ,
    ,
  • It also introduced new form controls like ,

  • HTML5 supports multimedia elements like

  • It also has improved support for mobile devices.

  • HTML5 is backward compatible with older versions of HTML.

Add your answer

Q328. How did you configure the required services?

Add your answer

Q329. how to handle if element xpath is different in ios and android apps

Ans.

Use platform-specific locators or conditional statements to handle different element xpaths in iOS and Android apps.

  • Use platform-specific locators like accessibility id for iOS and resource id for Android

  • Implement conditional statements to switch between different xpaths based on the platform

  • Utilize Appium's platformName capability to identify the platform and adjust the element xpath accordingly

Add your answer

Q330. What is encapsulation

Ans.

Encapsulation is the process of hiding implementation details and providing a public interface for accessing the functionality.

  • Encapsulation helps in achieving data abstraction and information hiding

  • It prevents unauthorized access to the internal details of an object

  • It allows for easy modification of implementation without affecting the external code

  • Example: A class with private variables and public methods

  • Example: A bank account class with methods for deposit and withdraw, b...read more

View 3 more answers

Q331. How Active setup works and what is advertised shortcut

Ans.

Active setup is a mechanism to ensure that software is installed correctly. Advertised shortcut is a shortcut that is created during installation.

  • Active setup is a registry key that runs a command to ensure that software is installed correctly

  • It is used to update or repair software installations

  • Advertised shortcut is a shortcut that is created during installation and points to a specific feature or component of the software

  • When the shortcut is clicked, it triggers the install...read more

Add your answer

Q332. What is the use of the yield() method in threading?

Ans.

The yield() method in threading is used to give up the CPU and allow other threads to run.

  • Allows other threads to run by giving up the CPU temporarily

  • Useful for preventing one thread from dominating the CPU

  • Can be used to implement cooperative multitasking

Add your answer

Q333. what is vertical and horizontal scaling in micro services?

Ans.

Vertical scaling increases the capacity of a single server, while horizontal scaling adds more servers to distribute the load.

  • Vertical scaling involves increasing the resources of a single server, such as CPU, RAM, or storage.

  • Horizontal scaling involves adding more servers to distribute the load, often done through containerization or virtualization.

  • Vertical scaling is limited by the capacity of a single server, while horizontal scaling allows for more flexibility and scalabi...read more

Add your answer

Q334. How the escalation matrix works in case of production defects?

Ans.

Escalation matrix defines the process for escalating production defects based on severity and impact.

  • Escalation matrix typically includes levels of escalation, responsible parties at each level, and criteria for escalating defects.

  • For example, a Level 1 escalation may involve the development team, while a Level 2 escalation may involve senior management.

  • Criteria for escalation may include severity of the defect, impact on users or business operations, and potential solutions....read more

Add your answer

Q335. is it okay to give the Deliverables under pressure?

Ans.

Yes, it is okay to give deliverables under pressure as long as quality is not compromised.

  • Meeting deadlines is important in software development.

  • Pressure can sometimes lead to increased focus and productivity.

  • Communication with stakeholders about realistic timelines is key.

  • Prioritizing tasks and managing time effectively can help in delivering under pressure.

Add your answer

Q336. How are Windows programs different from normal C-programs? What can be the various types of events?

Add your answer

Q337. what IOC and DI in spring?

Ans.

IOC and DI are design patterns used in Spring framework for loose coupling and dependency injection.

  • IOC (Inversion of Control) is a design pattern where the control of object creation and lifecycle is handed over to a container or framework.

  • DI (Dependency Injection) is a design pattern where the dependencies of an object are injected into it by an external entity, rather than the object creating them itself.

  • Spring framework uses IOC and DI to achieve loose coupling and make t...read more

Add your answer

Q338. What Permission applied on types

Ans.

Permissions applied on types determine the level of access and actions that can be performed on them.

  • Permissions can be applied to various types such as files, folders, databases, etc.

  • Examples of permissions include read, write, execute, delete, modify, etc.

  • Permissions can be granted to individual users or groups of users.

  • Permissions can be inherited from parent objects or explicitly set on individual objects.

View 1 answer

Q339. what is consigner and consignee

Ans.

Consigner is the person who sends goods to another person or company, while consignee is the person or company who receives the goods.

  • Consigner is the sender of goods

  • Consignee is the receiver of goods

  • Consigner retains ownership of the goods until they are sold by the consignee

  • Consignee pays the consigner for the goods sold

  • Example: A clothing manufacturer sends their products to a retail store for sale. The manufacturer is the consigner and the retail store is the consignee.

View 1 answer

Q340. How to make any parameter or field mandatory? Ans: Obligatory

Ans.

Use the 'Obligatory' keyword to make a parameter or field mandatory in SAP ABAP.

  • Add 'Obligatory' keyword in the parameter declaration to make it mandatory

  • If the mandatory parameter is not filled, an error message will be displayed

  • Example: DATA lv_name TYPE string OBLIGATORY.

Add your answer

Q341. Difference between named user and concurrent user license?

Ans.

Named user license is assigned to a specific individual while concurrent user license is shared among multiple users.

  • Named user license is assigned to a specific individual and cannot be shared with others.

  • Concurrent user license is shared among multiple users and can be used by any user at any time, as long as the maximum number of users is not exceeded.

  • Named user license is typically more expensive than concurrent user license.

  • Examples of named user license include Microsof...read more

Add your answer

Q342. Demonstrate . How will you set up KRA/KPO. Attrition management.

Ans.

To set up KRA/KPO, I will identify key performance indicators and align them with business objectives. For attrition management, I will analyze reasons and implement retention strategies.

  • Identify business objectives and align KPIs with them

  • Communicate KRA/KPO to team members and ensure understanding

  • Regularly monitor and evaluate performance against KPIs

  • Analyze reasons for attrition and implement retention strategies

  • Conduct exit interviews and address concerns

  • Provide growth op...read more

Add your answer

Q343. Tell us about the entity types in Dynamics 365 CRM

Ans.

Dynamics 365 CRM has four entity types: System, Business, Custom, and Customizable.

  • System entities are provided by Microsoft and cannot be modified

  • Business entities are customizable and can be used to store data specific to an organization

  • Custom entities are created by users to store data specific to their needs

  • Customizable entities are provided by Microsoft but can be modified by users

  • Examples of entities include Account, Contact, Lead, Opportunity, and Case

View 1 answer

Q344. How to handle clients, How to estimate projects

Ans.

Handling clients and estimating projects require effective communication, planning, and negotiation skills.

  • Establish clear communication channels with clients to understand their needs and expectations.

  • Create a detailed project plan with timelines, milestones, and deliverables.

  • Use project management tools to track progress and identify potential risks.

  • Regularly update clients on project status and address any concerns or issues promptly.

  • Negotiate project scope, budget, and ti...read more

Add your answer

Q345. have you got any experience in sourcing, scheduling?

Ans.

Yes, I have experience in sourcing and scheduling.

  • I have sourced candidates through various channels such as job boards, social media, and employee referrals.

  • I have scheduled interviews and coordinated with hiring managers and candidates to ensure a smooth process.

  • I have also managed candidate pipelines and provided regular updates to stakeholders.

  • For example, in my previous role, I sourced and scheduled over 50 candidates for various positions within a 3-month period.

Add your answer

Q346. Have you ever faced synchronization problem ? How did you overcome them ?

Ans.

Yes, I have faced synchronization problems while automating tests.

  • Yes, I have encountered synchronization issues when elements load at different speeds on a webpage.

  • To overcome this, I have used explicit waits in Selenium to wait for specific conditions before proceeding with the test.

  • I have also used implicit waits to set a default waiting time for the elements to load.

  • In some cases, I have used Thread.sleep() to pause the execution for a specific time to ensure synchronizat...read more

Add your answer

Q347. What is framework ? Explain the frameworks you worked on in your project?

Ans.

A framework is a set of guidelines, coding standards, concepts, and practices that provide structure and support for automated testing.

  • Framework helps in organizing and executing automated tests efficiently.

  • Common frameworks include Data-Driven, Keyword-Driven, Hybrid, and Behavior-Driven Development (BDD).

  • In my project, I have worked on a Data-Driven framework where test data is separated from test scripts for easy maintenance.

Add your answer

Q348. What is migration and its type?

Ans.

Migration is the process of moving from one place to another, typically for work, study, or better living conditions.

  • Migration can be voluntary or forced.

  • Types of migration include internal migration (within a country), international migration (between countries), and rural-urban migration.

  • Examples of migration include people moving from rural areas to cities for better job opportunities, or refugees fleeing conflict in their home country.

Add your answer

Q349. What is OOPS and what are the benefits?

Ans.

OOPS stands for Object-Oriented Programming System. It is a programming paradigm based on the concept of objects.

  • Encapsulation: Objects can encapsulate data and behavior within a single unit.

  • Inheritance: Objects can inherit attributes and methods from other objects.

  • Polymorphism: Objects can take on different forms or have multiple behaviors.

  • Reusability: Objects can be reused in different parts of a program.

  • Modularity: Objects promote modular design and code organization.

  • Examp...read more

Add your answer

Q350. How many programming languages do you know?

Ans.

I am proficient in 5 programming languages.

  • I am proficient in Java, Python, C++, JavaScript, and SQL.

  • I have experience in developing web applications using JavaScript and Python frameworks.

  • I have worked on database management using SQL.

  • I have also developed desktop applications using Java and C++.

  • I am always eager to learn new programming languages and technologies.

Add your answer

Q351. What is the difference between Service endpoint and Private endpoint?

Ans.

Service endpoint is a public IP address used to access a service, while Private endpoint is a private IP address within a VNet.

  • Service endpoint is a public IP address used to access a service over the internet.

  • Private endpoint is a private IP address within a Virtual Network (VNet) used to access a service privately.

  • Service endpoint is accessible over the internet, while Private endpoint is only accessible within the VNet.

  • Private endpoint provides secure access to Azure servi...read more

Add your answer

Q352. What will you do if policy getting failed in checkpoint firewall during installation of policy.

Ans.

I would troubleshoot the issue by checking the logs, verifying the policy rules, and ensuring proper configuration.

  • Check the logs to identify the specific error or issue

  • Verify the policy rules to ensure they are correctly configured

  • Check for any conflicts or overlapping rules that may be causing the failure

  • Ensure that the policy installation process was completed successfully

  • Consult with colleagues or documentation for troubleshooting steps

Add your answer

Q353. Whats the difference between interface and abstract class?

Ans.

Interface is a contract with no implementation, while abstract class can have some implementation.

  • Interface cannot have any implementation, only method signatures.

  • Abstract class can have both abstract methods and concrete methods.

  • A class can implement multiple interfaces but can only inherit from one abstract class.

  • Interfaces are used for full abstraction, while abstract classes are used for partial abstraction.

Add your answer

Q354. Q6) What is the ResponseState and ServerState Difference?

Ans.

ResponseState and ServerState are different states in a software system that represent different aspects of the system's functionality.

  • ResponseState typically refers to the state of a response object in a software system, indicating whether the response was successful, failed, or pending.

  • ServerState, on the other hand, refers to the state of the server in a software system, indicating whether the server is running, stopped, or experiencing issues.

  • ResponseState is more focused...read more

Add your answer

Q355. Q8 ) What is ConcurrentModificationException In Java?

Ans.

ConcurrentModificationException is thrown when an object is modified concurrently while iterating over it.

  • Occurs when a collection is modified while being iterated over using an iterator

  • Can be avoided by using ConcurrentHashMap or CopyOnWriteArrayList

  • Example: ArrayList being modified while iterating over it

Add your answer

Q356. Q10) What is difference Between @EnableMock and @Spy in Junit5?

Ans.

The main difference between @EnableMock and @Spy in Junit5 is that @EnableMock creates a mock object while @Spy creates a spy object.

  • The @EnableMock annotation is used to create a mock object for a class or interface, allowing you to define its behavior using Mockito.

  • The @Spy annotation is used to create a spy object, which is a real object with some mock behavior. It allows you to mock specific methods while calling the real methods of the object.

  • Mock objects created with @E...read more

Add your answer

Q357. Q12) What is difference between @PutMapping and @PatchMapping?

Ans.

The main difference between @PutMapping and @PatchMapping is the level of data that is updated.

  • PutMapping is used to update an entire resource, while PatchMapping is used to update only specific fields of a resource.

  • PutMapping replaces the entire resource with the new data provided, while PatchMapping updates only the specified fields.

  • PutMapping is idempotent, meaning multiple identical requests will have the same effect as a single request, while PatchMapping may not be idem...read more

Add your answer

Q358. Write program to print odd and even number alternatively using 2 threads which contains odd number list and even number list

Ans.

Program to print odd and even numbers alternatively using 2 threads with separate lists

  • Create two separate lists for odd and even numbers

  • Use two threads to print numbers alternatively from each list

  • Ensure synchronization between threads to avoid race conditions

Add your answer

Q359. What’s Mulesoft ? What’s Munit ? What’s Runtime Manager ? What’s Scaling ? What’s RAML ?

Ans.

Mulesoft is an integration platform that connects applications, data, and devices.

  • Munit is a testing framework for Mulesoft applications.

  • Runtime Manager is a cloud-based platform for managing Mulesoft applications.

  • Scaling refers to the ability of Mulesoft to handle increased traffic and workload.

  • RAML is a language used to define APIs in a human-readable format.

Add your answer

Q360. what is modern and classic folder?

Ans.

Modern and Classic folders are two different types of folders in UiPath Orchestrator.

  • Modern folders are designed for multi-tenancy and allow for more granular control over permissions and access.

  • Classic folders are the traditional folders in Orchestrator and are used for single-tenancy.

  • Modern folders have a different user interface and are organized by tenants, while classic folders are organized by folders and subfolders.

  • Modern folders also have additional features such as t...read more

Add your answer

Q361. Tell me about complete product life cycle with examply

Ans.

The product life cycle consists of several stages including ideation, development, launch, growth, maturity, and decline.

  • Ideation: Generating ideas for a new product or improvement.

  • Development: Designing and creating the product.

  • Launch: Introducing the product to the market.

  • Growth: Increasing sales and market share.

  • Maturity: Product reaches its peak and sales stabilize.

  • Decline: Sales decline due to market saturation or obsolescence.

Add your answer

Q362. What is operating frequency of DDR 4

Ans.

The operating frequency of DDR4 is 2133 MHz to 4266 MHz.

  • DDR4 operates at higher frequencies than its predecessor DDR3

  • The operating frequency of DDR4 depends on the specific module and its configuration

  • DDR4 can operate at frequencies ranging from 2133 MHz to 4266 MHz

  • Higher frequency modules tend to be more expensive

Add your answer

Q363. What type of PCie connector used in your project

Ans.

We used PCIe Gen3 x16 connector in our project.

  • PCIe Gen3 x16 connector provides high-speed data transfer.

  • It has 16 lanes for data transmission.

  • It is commonly used in high-performance graphics cards and storage devices.

  • It has a maximum bandwidth of 32 GB/s.

  • Examples of devices that use PCIe Gen3 x16 connector are NVIDIA GeForce GTX 1080 Ti and Samsung 970 PRO SSD.

Add your answer

Q364. How do you keep track of the information security and external risks to your organisation

Ans.

We keep track of information security and external risks through regular risk assessments, monitoring of industry trends, and collaboration with external partners.

  • Conduct regular risk assessments to identify potential threats and vulnerabilities

  • Monitor industry trends and news to stay informed of emerging risks

  • Collaborate with external partners, such as vendors and industry associations, to share information and best practices

  • Maintain up-to-date policies and procedures to add...read more

Add your answer

Q365. How You Upload A Data From Source To Target ?

Ans.

Data can be uploaded from source to target using ETL tools or manual data entry.

  • Extract data from source system

  • Transform data to match target system requirements

  • Load data into target system

  • Use ETL tools like Informatica, Talend, or SSIS

  • Manual data entry can be done through UI or APIs

Add your answer

Q366. How to report the Bug with Needed Information?

Ans.

To report a bug with needed information, follow these steps:

  • Reproduce the bug to ensure it is consistent

  • Document the steps to reproduce the bug

  • Include the expected behavior and actual behavior

  • Provide screenshots or videos if applicable

  • Include the environment details (operating system, browser, etc.)

  • Specify the version of the software being used

  • Include any error messages or logs

  • Provide additional context or observations

View 1 answer

Q367. How to add fitness to process and product?

Ans.

To add fitness to process and product, focus on incorporating physical activity, healthy practices, and quality control measures.

  • Encourage employees to engage in physical activity during breaks or provide on-site fitness facilities.

  • Implement ergonomic practices to promote good posture and reduce the risk of injuries.

  • Include quality control measures to ensure products meet fitness standards, such as testing for durability or accuracy.

  • Offer healthy food options in the workplace...read more

View 1 answer

Q368. Troubleshooting the issues with SharePoint search, user profile synchronisation

Ans.

To troubleshoot SharePoint search and user profile synchronization issues, follow these steps:

  • Check if the search service is running and if the search index is up-to-date

  • Verify the user profile service is running and the synchronization connections are configured correctly

  • Check if the search crawl account has the necessary permissions

  • Review the ULS logs for any errors or warnings related to search or user profile synchronization

  • Restart the search and user profile synchronizat...read more

Add your answer

Q369. Find the third number if 2 numbers from a Pythagorean triplet are given

Ans.

To find the third number in a Pythagorean triplet given two numbers.

  • Use the Pythagorean theorem (a^2 + b^2 = c^2) to solve for the missing number.

  • Check if the given numbers form a Pythagorean triplet before proceeding.

  • The third number can be either a or b depending on which two numbers are given.

Add your answer

Q370. What is the shortcut key for paste special

Ans.

Ctrl + Alt + V

  • Press Ctrl + Alt + V to open the Paste Special dialog box

  • Then use the arrow keys to select the desired option (e.g. values, formats, formulas)

  • Press Enter to paste the selected option

Add your answer

Q371. Tell me about vlookup function and its formula

Ans.

VLOOKUP is a function in Excel used to search for a value in a table and return a corresponding value.

  • VLOOKUP stands for 'Vertical Lookup'

  • It searches for a value in the first column of a table and returns a value in the same row from a specified column

  • The formula for VLOOKUP is =VLOOKUP(lookup_value, table_array, col_index_num, [range_lookup])

  • Example: =VLOOKUP(A2, B2:D10, 3, FALSE) - searches for the value in cell A2 in the range B2:D10 and returns the value in the 3rd column...read more

Add your answer

Q372. Managed code vs unmanaged code, count vs any in EF, optional parameter in c#, queries in linq

Ans.

Questions related to managed vs unmanaged code, EF count vs any, optional parameters in C#, and queries in LINQ.

  • Managed code is compiled to Intermediate Language (IL) and executed by Common Language Runtime (CLR), while unmanaged code is directly executed by the operating system.

  • EF's Count() method returns the number of elements in a collection, while Any() returns a boolean indicating whether the collection contains any elements.

  • Optional parameters in C# allow for default va...read more

Add your answer

Q373. what is 3 way and 4 way match

Ans.

3 way match compares purchase order, goods receipt and invoice. 4 way match adds payment to the comparison.

  • 3 way match ensures that the quantity and price on the invoice match the purchase order and goods receipt.

  • 4 way match adds the payment to the comparison to ensure that the vendor is paid correctly.

  • This process helps prevent overpayment or underpayment to vendors.

  • Example: A company orders 100 units of a product, receives 100 units, and is invoiced for 100 units at the agr...read more

View 1 answer

Q374. What else you troubleshoot in data centre?

Ans.

Apart from network issues, I troubleshoot server hardware, storage, power, cooling, and security in data centre.

  • Server hardware issues such as failed hard drives, RAM, or CPU

  • Storage issues such as disk space, RAID failures, or SAN connectivity

  • Power and cooling issues such as UPS failures, overheating, or HVAC problems

  • Security issues such as unauthorized access, firewall misconfigurations, or DDoS attacks

Add your answer

Q375. 4. what is static block in apex

Ans.

Static block is a block of code that runs only once when the class is loaded.

  • Static block is enclosed in curly braces and starts with the keyword 'static'.

  • It is used to initialize static variables or to perform any one-time setup for the class.

  • Static block is executed before the constructor of the class.

  • Example: static { System.debug('This is a static block'); }

Add your answer

Q376. Tell about the existing scheduling algorithm?

Ans.

The existing scheduling algorithm is designed to allocate resources and prioritize tasks based on their importance and urgency.

  • The algorithm uses a priority queue to manage tasks.

  • Tasks are assigned a priority level based on their importance and urgency.

  • The algorithm takes into account the availability of resources before assigning tasks.

  • The algorithm can be customized to suit specific needs and requirements.

  • Examples of scheduling algorithms include Round Robin, First Come Fir...read more

Add your answer

Q377. What is the significance of friend keyword in C++?

Ans.

The friend keyword in C++ allows non-member functions or classes to access private and protected members of a class.

  • Friend functions can be declared inside a class or outside of it.

  • Friend classes can access all the members of the class they are friends with.

  • Friendship is not mutual, meaning if class A is a friend of class B, it does not mean that class B is a friend of class A.

  • The use of friend keyword should be limited as it can break encapsulation and increase coupling betw...read more

Add your answer

Q378. How to add permissions in vb script

Ans.

To add permissions in VB script, use the SetACL.exe command-line tool.

  • Download and install SetACL.exe

  • Use the command SetACL.exe to add permissions to a file or folder

  • Example: SetACL.exe -on "C:\folder" -ot file -actn ace -ace "n:domain\user;p:full"

Add your answer

Q379. How do you troubleshoot technical issues?

Add your answer

Q380. What is meant by the term of oops

Ans.

OOPs stands for Object-Oriented Programming. It is a programming paradigm based on the concept of objects.

  • OOPs is a way of organizing and designing code around objects

  • It emphasizes on encapsulation, inheritance, and polymorphism

  • It helps in creating reusable code and reduces code complexity

  • Examples of OOPs languages are Java, C++, Python, etc.

Add your answer

Q381. What do you under stand by order management briefly explain order life cycle.

Ans.

Order management involves overseeing the process of receiving, fulfilling, and tracking customer orders.

  • Order creation: Customer places an order for a product or service.

  • Order processing: Order is reviewed, approved, and fulfilled.

  • Order shipping: Product is packaged and shipped to the customer.

  • Order delivery: Customer receives the product and confirms satisfaction.

  • Order completion: Payment is processed and order is closed.

  • Order management systems help automate and streamline ...read more

Add your answer

Q382. Change management flow and how we can change template

Ans.

Change management flow involves planning, implementing, and monitoring changes to ensure successful adoption.

  • Identify the need for change and create a change request

  • Evaluate the impact of the change on stakeholders and systems

  • Develop a change management plan including communication and training

  • Implement the change and monitor its progress

  • Review and assess the change to ensure objectives are met

  • Update documentation and templates as needed

  • Example: Changing a software template t...read more

Add your answer

Q383. What is sticky bit in linux and what is soft link and hard link

Ans.

Sticky bit is a permission bit in Linux that allows only the owner of a file or directory to delete or rename it. Soft link and hard link are two types of links used in Linux file systems.

  • Sticky bit is denoted by 't' in the permission bits of a file or directory

  • Soft link is a symbolic link to a file or directory and can be created using the 'ln -s' command

  • Hard link is a link to a file and shares the same inode as the original file. It can be created using the 'ln' command

  • Soft...read more

Add your answer

Q384. How can I grant SFTP access exclusively to the user David?

Ans.

Grant SFTP access exclusively to user David

  • Create a new group specifically for David, e.g. 'davidgroup'

  • Set the ChrootDirectory in the SSH configuration file to restrict David's access to a specific directory

  • Add David to the 'davidgroup' and configure the necessary permissions for SFTP access

Add your answer

Q385. How can a user be locked out after 6 unsuccessful password attempts for a duration of 30 minutes?

Ans.

To lock a user out after 6 unsuccessful password attempts for 30 minutes, modify the PAM configuration file.

  • Edit the PAM configuration file (/etc/pam.d/common-auth) to include the 'pam_tally2' module.

  • Set the 'deny' option in the 'pam_tally2' module to lock the user out after 6 failed attempts.

  • Specify the 'unlock_time' option in the 'pam_tally2' module to set the duration of the lockout period to 30 minutes.

  • Example: auth required pam_tally2.so deny=6 unlock_time=1800

Add your answer

Q386. Define IRR Define MIRR What is deferred revenue Define Npv and formula Deffered tax asset and liability

Ans.

Definition of IRR, MIRR, deferred revenue, NPV and formula, deferred tax asset and liability.

  • IRR (Internal Rate of Return) is the rate at which the net present value of cash flows equals zero.

  • MIRR (Modified Internal Rate of Return) is a variation of IRR that assumes cash flows are reinvested at a different rate.

  • Deferred revenue is a liability that arises when a company receives payment for goods or services that have not yet been delivered.

  • NPV (Net Present Value) is the diffe...read more

Add your answer

Q387. Write pseudo code to arrange a random list of numbers in Ascending order

Ans.

Pseudo code to sort a random list of numbers in ascending order

  • Loop through the list and compare adjacent elements

  • If the left element is greater than the right element, swap them

  • Repeat until no swaps are needed

Add your answer

Q388. What are usecase of slave and master

Ans.

Slaves and masters are used in distributed systems for load balancing and fault tolerance.

  • In a distributed system, the master node controls and coordinates the work of the slave nodes.

  • Slaves perform tasks assigned by the master and report back their results.

  • Masters can be used for load balancing, where they distribute tasks evenly among slaves.

  • Masters can also be used for fault tolerance, where they can detect when a slave node fails and reassign its tasks to other slaves.

  • Exa...read more

Add your answer

Q389. Differentiate between private sector and govt sector

Ans.

Private sector is owned and operated by private individuals or companies, while govt sector is owned and operated by the government.

  • Private sector is profit-driven, while govt sector is service-driven

  • Private sector has more flexibility in decision-making, while govt sector has more regulations and bureaucracy

  • Private sector is more competitive, while govt sector is more stable

  • Examples of private sector: Apple, Microsoft, Coca-Cola, etc.

  • Examples of govt sector: NASA, USPS, FBI,...read more

Add your answer

Q390. How to retrieve domain name for the given input email address.

Add your answer

Q391. What is circuit switching and packet switching?

Add your answer

Q392. What is DDL DML DCL?

Ans.

DDL, DML, and DCL are three types of SQL commands used to manipulate databases.

  • DDL (Data Definition Language) is used to define the database schema and structure.

  • DML (Data Manipulation Language) is used to manipulate data within the database.

  • DCL (Data Control Language) is used to control access to the database.

  • Examples of DDL commands include CREATE, ALTER, and DROP.

  • Examples of DML commands include SELECT, INSERT, UPDATE, and DELETE.

  • Examples of DCL commands include GRANT and ...read more

View 2 more answers

Q393. What is the difference between System drive and Boot drive

Ans.

System drive and Boot drive are different in terms of their functionality and purpose.

  • System drive contains the operating system files and other system-related files.

  • Boot drive is the drive from which the computer boots up.

  • System drive can be different from the Boot drive.

  • For example, in a dual-boot system, each operating system may have its own system and boot drives.

View 1 answer

Q394. Microservice project architecture and flow in current project, Microservice design patterns etc..

Ans.

Explained microservice project architecture and design patterns.

  • Our microservice project follows a domain-driven design approach.

  • We use API Gateway pattern to handle requests and route them to appropriate microservices.

  • We also use Circuit Breaker pattern to handle failures and prevent cascading failures.

  • Each microservice has its own database and communicates with other microservices through REST APIs.

  • We use containerization with Docker and orchestration with Kubernetes for de...read more

Add your answer

Q395. What is way of using excel in Ui Path ?

Ans.

Excel can be used in UiPath for data manipulation and automation.

  • Use Excel Application Scope activity to open an Excel file

  • Use Read Range activity to read data from Excel

  • Use Write Range activity to write data to Excel

  • Use Filter Data Table activity to filter data in Excel

  • Use For Each Row activity to loop through rows in Excel

  • Use Excel activities in UiPath StudioX for easy automation

  • Example: Use UiPath to extract data from an Excel file and input it into a web form

  • Example: Use ...read more

Add your answer

Q396. Make a nested array to flat array using customised method

Ans.

Convert nested array to flat array using custom method

  • Create a recursive function to flatten the nested array

  • Use Array.isArray() to check if an element is an array

  • Concatenate arrays using Array.concat() method

Add your answer

Q397. 1. Explain GKE Architecture 2. Difference between VPC peering and VPC sharing 3. How load balancer works?

Ans.

GKE Architecture is a managed Kubernetes service provided by Google Cloud Platform.

  • GKE Architecture consists of master nodes and worker nodes.

  • Master nodes manage the Kubernetes cluster and worker nodes run the applications.

  • GKE provides automated scaling, monitoring, and management of the Kubernetes cluster.

  • GKE integrates with other Google Cloud services for seamless deployment and management.

Add your answer

Q398. Reverse a given string Difference between array and arraylist

Ans.

Reverse a given string and explain the difference between array and arraylist.

  • To reverse a string, we can use the built-in reverse() method or loop through the string and append each character in reverse order.

  • Arrays are fixed in size, while ArrayLists can dynamically grow and shrink.

  • Arrays can hold primitive data types and objects, while ArrayLists can only hold objects.

  • Arrays are faster for accessing elements, while ArrayLists are faster for inserting and deleting elements.

Add your answer

Q399. Difference in ordered and unordered map

Ans.

Ordered map maintains the order of insertion while unordered map does not.

  • Ordered map is implemented as a balanced tree while unordered map is implemented as a hash table.

  • Ordered map has slower insertion and deletion but faster searching compared to unordered map.

  • Unordered map has faster insertion and deletion but slower searching compared to ordered map.

  • Example: std::map vs std::unordered_map in C++.

Add your answer

Q400. Explain cloud and connectors rules how do we implement them

Ans.

Cloud and connectors rules are used to manage data flow between different systems in a cloud environment.

  • Cloud rules define how data is stored, accessed, and secured in the cloud environment

  • Connectors rules define how different systems communicate and exchange data in the cloud

  • Implementation involves configuring cloud storage settings, access controls, and data encryption

  • Examples include setting up AWS S3 bucket policies, Azure AD authentication for connectors

Add your answer
1
2
3
4
5
6
7
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos

Interview Process at Deutsche Bank

based on 1.2k interviews in the last 1 year
Interview experience
4.0
Good
View more
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Interview Questions from Similar Companies

3.9
 • 3.8k Interview Questions
4.2
 • 386 Interview Questions
3.8
 • 328 Interview Questions
4.1
 • 259 Interview Questions
4.2
 • 190 Interview Questions
4.1
 • 152 Interview Questions
View all
Top HCLTech Interview Questions And Answers
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
70 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions
Get AmbitionBox app

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter