Premium Employer

HCLTech

3.5
based on 34k Reviews
Filter interviews by

1500+ Viatris Interview Questions and Answers

Updated 31 Dec 2024
Popular Designations

Q501. How you perform daily task while closing?

Ans.

I prioritize tasks, communicate with team members, and ensure all deadlines are met during the closing process.

  • Prioritize tasks based on urgency and importance

  • Communicate with team members to coordinate efforts and share updates

  • Ensure all deadlines are met by staying organized and focused

  • Review and double-check work to avoid errors

  • Utilize time management techniques to maximize productivity

Add your answer

Q502. what is hash collision and how it can be handled?

Ans.

Hash collision occurs when two different inputs produce the same hash value. It can be handled by using techniques like chaining or open addressing.

  • Hash collision is a common issue in hash tables where different keys produce the same hash value.

  • One way to handle hash collisions is by using chaining, where each bucket in the hash table stores a linked list of key-value pairs with the same hash value.

  • Another way to handle hash collisions is through open addressing, where if a c...read more

Add your answer

Q503. Can you have ability to handle tasks individually?

Ans.

Yes, I have the ability to handle tasks individually.

  • I have a proven track record of successfully completing projects on my own.

  • I am self-motivated and can prioritize tasks effectively.

  • I have strong problem-solving skills which allow me to tackle challenges independently.

Add your answer

Q504. what is your current CTC and expected CTC?

Ans.

My current CTC is $100,000 and my expected CTC is $120,000.

  • Current CTC: $100,000

  • Expected CTC: $120,000

Add your answer
Discover Viatris interview dos and don'ts from real experiences

Q505. What’s routing ? Explain exception handling

Ans.

Routing is the process of selecting a path for network traffic to travel.

  • Routing is used in networking to determine the best path for data to travel between devices.

  • It involves analyzing the network topology and selecting the most efficient path.

  • Routing protocols like OSPF and BGP are used to automate the process.

  • Exception handling is the process of dealing with errors and exceptions in code.

  • It involves catching and handling errors to prevent the program from crashing.

  • Try-cat...read more

Add your answer

Q506. What is function? Difference between list and tuple

Ans.

Function is a block of code that performs a specific task. List and tuple are both data structures in Python, but list is mutable while tuple is immutable.

  • Functions are reusable blocks of code that can be called multiple times

  • Lists are mutable and can be modified after creation

  • Tuples are immutable and cannot be modified after creation

  • Lists are defined using square brackets [] while tuples use parentheses ()

  • Lists are typically used for collections of related items while tuples...read more

Add your answer
Are these interview questions helpful?

Q507. What are test carried out for big appliances products?

Ans.

Various tests are carried out for big appliances products to ensure their safety and performance.

  • Electrical safety tests such as high voltage and insulation resistance tests

  • Performance tests such as energy consumption and cooling capacity tests

  • Durability tests such as drop and vibration tests

  • Environmental tests such as temperature and humidity tests

  • Packaging tests such as compression and drop tests

  • Regulatory compliance tests such as EMC and EMI tests

Add your answer

Q508. What statuses are available in queue.

Ans.

Various statuses can be available in a queue depending on the system.

  • Pending

  • In Progress

  • On Hold

  • Completed

  • Cancelled

Add your answer
Share interview questions and help millions of jobseekers 🌟

Q509. How to delete duplicate records

Ans.

To delete duplicate records, use SQL queries with DISTINCT keyword or create a unique index on the table.

  • Use SQL queries with DISTINCT keyword to select unique records and insert them into a new table

  • Create a unique index on the table to prevent duplicate entries in the future

  • Use DELETE statement with a subquery to remove duplicate records from the table

View 1 answer

Q510. What is vpc and scerious

Ans.

VPC stands for Virtual Private Cloud, a virtual network dedicated to an AWS account. SCERIOUS is not a recognized term in AWS.

  • VPC is used to create isolated virtual networks within AWS

  • It allows users to define their own IP address range, subnets, and route tables

  • VPC provides control over network traffic, security, and connectivity options

View 1 answer

Q511. what errors you have faced and solutions ? optimizations

Ans.

I have faced errors related to data processing and optimization.

  • One error I faced was related to memory allocation while processing large datasets. I optimized the code by using generators instead of lists to reduce memory usage.

  • Another error was related to incorrect data formatting which caused errors in the analysis. I solved this by writing a script to clean and format the data before processing.

  • I also faced errors related to incorrect use of libraries and functions. I sol...read more

Add your answer

Q512. Previous job oriented technical and current job description.

Ans.

Previous job: Software Engineer at XYZ. Current job: Technical Lead at ABC.

  • Previous job involved developing and maintaining web applications using Java and Spring framework.

  • Current job involves leading a team of developers, designing and implementing software solutions, and ensuring project deadlines are met.

  • Both jobs require strong technical skills, problem-solving abilities, and effective communication with team members and stakeholders.

Add your answer

Q513. Swap two number with and without temporary variable

Ans.

Swap two numbers with and without temporary variable

  • Without temporary variable: Use addition and subtraction

  • With temporary variable: Use a third variable to store the value of one of the numbers

  • Example without temporary variable: a=5, b=7; a=a+b; b=a-b; a=a-b;

  • Example with temporary variable: a=5, b=7; temp=a; a=b; b=temp;

Add your answer

Q514. How IIS server works and serves request.

Ans.

IIS server is a web server that processes and serves HTTP requests.

  • IIS stands for Internet Information Services.

  • It is a component of the Windows Server operating system.

  • IIS uses HTTP protocol to communicate with clients and serve web content.

  • It listens for incoming requests on a specified port, usually port 80 for HTTP and port 443 for HTTPS.

  • When a request is received, IIS processes it and returns the appropriate response.

  • IIS can handle various types of requests, including st...read more

View 1 answer

Q515. How data is getting secure in SharePoint

Ans.

SharePoint provides various security features to ensure data protection.

  • SharePoint has role-based access control to restrict access to sensitive data.

  • It also has data loss prevention policies to prevent unauthorized sharing of data.

  • Encryption at rest and in transit ensures data is secure.

  • Multi-factor authentication adds an extra layer of security.

  • Audit logs track user activity and help identify security breaches.

Add your answer

Q516. Do you know about how to calculate utilisation and shrinkage?

Ans.

Utilisation and shrinkage are key metrics in operations management to measure workforce efficiency and productivity.

  • Utilisation is calculated by dividing the total productive hours by the total available hours.

  • Shrinkage is calculated by subtracting the total productive hours from the total available hours.

  • Utilisation rate = (Total productive hours / Total available hours) * 100%

  • Shrinkage rate = (Total available hours - Total productive hours) / Total available hours * 100%

Add your answer

Q517. How Unica works? How to leverage for marketing strategy

Ans.

Unica is a marketing automation software that helps businesses create personalized marketing campaigns and track customer interactions.

  • Unica allows marketers to segment customers based on demographics, behavior, and preferences.

  • It enables businesses to create targeted and personalized marketing campaigns through email, social media, and other channels.

  • Unica provides analytics and reporting tools to track the effectiveness of marketing campaigns and make data-driven decisions....read more

Add your answer

Q518. What is difference between agile and SAFe

Ans.

Agile is a set of principles and values for software development, while SAFe is a framework for scaling agile practices across an organization.

  • Agile focuses on individuals and interactions over processes and tools, while SAFe emphasizes alignment, collaboration, and delivery at scale.

  • Agile promotes flexibility and adaptability in responding to change, whereas SAFe provides a structured approach for implementing agile practices in large organizations.

  • Agile encourages self-orga...read more

Add your answer

Q519. Write a script to develop a well Architect AWS infrastructure in Terrafrom?

Ans.

Develop a well Architect AWS infrastructure in Terraform

  • Define the required AWS resources in Terraform configuration files

  • Use modules to organize and reuse code for different components

  • Leverage Terraform best practices such as state management and variable usage

  • Implement security best practices like IAM roles and policies

  • Utilize Terraform's plan and apply commands to create and update infrastructure

Add your answer

Q520. What is VPN? What is SLA and tell me about ticketing tool

Ans.

VPN stands for Virtual Private Network, which allows users to securely access a private network over a public network.

  • VPN creates a secure connection between a user and a private network, encrypting data to ensure privacy and security.

  • It is commonly used by remote workers to access company resources securely.

  • VPN can also be used to bypass geo-restrictions and access region-locked content.

  • Popular VPN services include NordVPN, ExpressVPN, and CyberGhost.

Add your answer

Q521. How to support if user's machine turned off?

Ans.

Provide remote troubleshooting steps and offer assistance via phone or remote desktop software.

  • Ask the user to check if the machine is plugged in and turned on.

  • Guide the user through troubleshooting steps over the phone or via remote desktop software.

  • Offer to schedule an on-site visit if remote assistance is not possible.

Add your answer

Q522. What is PSTN, MPLS and SD WAN?

Ans.

PSTN stands for Public Switched Telephone Network, MPLS stands for Multiprotocol Label Switching, and SD WAN stands for Software-Defined Wide Area Network.

  • PSTN is a traditional circuit-switched telephone network used for voice communication.

  • MPLS is a protocol for efficient packet forwarding in network communication.

  • SD WAN is a technology that uses software-defined networking to connect enterprise networks over large geographic distances.

Add your answer

Q523. Pneumatic solenoid valve double and single acting working principle

Ans.

Pneumatic solenoid valves control the flow of air in pneumatic systems using electromagnetic principles.

  • Pneumatic solenoid valves are used to control the flow of air in pneumatic systems by opening and closing the valve based on electrical signals.

  • Double-acting solenoid valves use air pressure to both open and close the valve, while single-acting solenoid valves use air pressure to open the valve and a spring to close it.

  • Double-acting solenoid valves are typically faster in r...read more

Add your answer

Q524. Difference between MVVM and VIPER. Advantages of both with real experience.

Ans.

MVVM and VIPER are architectural patterns used in iOS development. MVVM focuses on data binding while VIPER emphasizes modularity.

  • MVVM separates the view, model, and view model layers. It allows for easy testing and maintenance. Example: RxSwift library.

  • VIPER separates the view, interactor, presenter, entity, and router layers. It promotes scalability and flexibility. Example: Uber app.

  • MVVM advantages: easy to understand, maintain, and test. It also allows for reusability of ...read more

Add your answer

Q525. Optimize the given program from O(n2) to O(log n)

Ans.

Optimize O(n2) program to O(log n)

  • Use binary search instead of linear search

  • Divide and conquer approach can be used

  • Implement efficient data structures like heap, AVL tree, etc.

  • Reduce unnecessary iterations and comparisons

  • Use memoization to avoid redundant calculations

Add your answer

Q526. Data binding & communication between components

Ans.

Data binding allows components to communicate and share data in a web application.

  • Data binding is a technique used in web development to synchronize data between the model and view components.

  • Two-way data binding allows changes in the model to be reflected in the view and vice versa.

  • Event binding can be used to trigger actions in response to user interactions.

  • Angular and React are popular frameworks that provide data binding capabilities.

  • Example: Angular's ngModel directive e...read more

Add your answer

Q527. What is DI in .Net Core

Ans.

DI stands for Dependency Injection in .Net Core.

  • DI is a design pattern used to achieve loose coupling between objects.

  • It allows for easier testing and maintenance of code.

  • In .Net Core, DI is implemented through the built-in service container.

  • Services can be registered and injected into classes using constructor injection.

  • Example: services.AddScoped();

  • Example: public MyClass(IMyService myService) { }

Add your answer

Q528. What are the exceptions handled other than NosuchElementException

Ans.

Other exceptions handled in automation testing besides NoSuchElementException

  • ElementNotVisibleException - when element is present in DOM but not visible on the page

  • StaleElementReferenceException - when element is no longer attached to the DOM

  • TimeoutException - when a command does not complete in a specific time frame

  • NoSuchWindowException - when the window target to be switched doesn't exist

  • InvalidElementStateException - when element is in an invalid state for the operation

Add your answer

Q529. What is GRPC? where it is used?

Ans.

gRPC is a high-performance, open-source RPC framework developed by Google.

  • gRPC stands for Google Remote Procedure Call.

  • It uses HTTP/2 for transport, Protocol Buffers for serialization, and supports multiple programming languages.

  • gRPC is commonly used for building efficient and scalable microservices.

  • It allows for bidirectional streaming and authentication features.

  • Examples of companies using gRPC include Google, Netflix, and Square.

Add your answer

Q530. Who can handle any panic section

Ans.

A person who remains calm and composed in high-pressure situations.

  • Someone with strong problem-solving skills

  • Ability to think clearly under pressure

  • Experience in handling emergencies or crises

  • Good communication skills to coordinate with others

  • Examples: Emergency responders, crisis negotiators, experienced software engineers

Add your answer

Q531. What is RBAC? How is access certification done?

Ans.

RBAC stands for Role-Based Access Control. Access certification is done by reviewing and verifying user access rights based on their assigned roles.

  • RBAC is a security model that restricts system access based on the roles assigned to users.

  • Access certification involves reviewing and verifying user access rights to ensure they align with their job responsibilities.

  • Access certification can be done manually or through automated tools.

  • Examples of RBAC include granting a doctor acc...read more

Add your answer

Q532. What is Stress and formula of stress

Ans.

Stress is the force per unit area acting on a material. Formula: Stress = Force/Area

  • Stress is a measure of the internal forces in a material

  • It is calculated by dividing the force applied to the material by its cross-sectional area

  • Stress can be tensile, compressive, or shear

  • Examples of stress include the weight of a book on a table, the force of wind on a building, and the pressure of water on a dam

View 2 more answers

Q533. Libraries of python and how to add python with database.

Ans.

Python has libraries like SQLAlchemy, psycopg2 for database connectivity. Use these libraries to connect Python with databases.

  • Use SQLAlchemy library for ORM (Object Relational Mapping) to interact with databases.

  • Use psycopg2 library for direct interaction with PostgreSQL database.

  • Install the required libraries using pip install .

  • Establish connection to the database using appropriate credentials.

  • Execute SQL queries using Python code to interact with the database.

Add your answer

Q534. Give a scenario where you have updated the PFMEA/DFMEA

Ans.

Updated PFMEA/DFMEA when a new supplier was introduced

  • Identified potential failure modes and effects of the new supplier's components

  • Evaluated the severity, occurrence, and detection of each failure mode

  • Updated the PFMEA/DFMEA with the new information

  • Collaborated with the supplier to implement corrective actions

  • Continuously monitored and updated the PFMEA/DFMEA as necessary

Add your answer

Q535. Tell me about product life cycle with example

Ans.

Product life cycle refers to the stages a product goes through from its introduction to its decline.

  • Introduction: The product is launched in the market.

  • Growth: Sales and market share increase as more customers adopt the product.

  • Maturity: Sales stabilize as the product reaches its peak market penetration.

  • Decline: Sales decline due to market saturation or the introduction of newer products.

  • Example: The iPhone product life cycle - introduced in 2007, experienced rapid growth, re...read more

Add your answer

Q536. how i was sourcing in different portals

Ans.

I have sourced candidates from various portals like LinkedIn, Indeed, and Dice.

  • I have used LinkedIn to search for candidates with specific skills and experience.

  • I have utilized Indeed to find candidates based on location and job title.

  • I have explored Dice to source candidates with specialized IT skills.

  • I have also used other job portals and professional networking sites to expand my candidate pool.

View 2 more answers

Q537. Type oracle oracle rac ip? Why using oracle vip .

Add your answer

Q538. How to provide daily execution report?

Ans.

To provide a daily execution report, gather relevant data, summarize progress, highlight achievements, and communicate it to stakeholders.

  • Collect data on tasks completed, milestones achieved, and any issues encountered.

  • Summarize the progress made towards project goals.

  • Highlight any notable achievements or successes.

  • Include information on any challenges faced and how they were addressed.

  • Communicate the report to stakeholders through a suitable medium (e.g., email, project mana...read more

View 1 answer

Q539. Write a program that contain 8 loops?

Ans.

A program with 8 loops

  • Loops can be of different types like for, while, do-while, foreach, etc.

  • The loops can be nested within each other to create complex logic.

  • The program can perform various operations within the loops like printing, calculating, etc.

View 1 answer

Q540. How can you remove duplicate values from an array in javascript

Ans.

Use Set data structure to remove duplicate values from an array in JavaScript.

  • Create a new Set from the array to automatically remove duplicates.

  • Convert the Set back to an array using the spread operator.

  • Example: const array = ['apple', 'banana', 'apple']; const uniqueArray = [...new Set(array)];

View 1 answer

Q541. How can upgeade citrix infra. Backup of storefront files.

Ans.

To upgrade Citrix infra, backup storefront files first.

  • Ensure all prerequisites are met before upgrading

  • Take a backup of the storefront files and database

  • Upgrade the Delivery Controller first, followed by other components

  • Test the upgraded environment thoroughly before rolling out to production

  • Ensure all users are informed of the upgrade and any changes in functionality

Add your answer

Q542. Manufacturing processes of sheetmeral

Ans.

Sheet metal manufacturing involves cutting, bending, and shaping metal sheets to create various products.

  • Sheet metal can be cut using various methods such as laser cutting, plasma cutting, or waterjet cutting.

  • Bending can be done using press brakes or rollers.

  • Shaping can be achieved through processes like stamping, punching, or deep drawing.

  • Welding is often used to join multiple sheet metal pieces together.

  • Finishing processes like painting, powder coating, or anodizing can be ...read more

Add your answer

Q543. Whats the difficult situations you face while developing a flow??

Ans.

One difficult situation while developing a flow is handling exceptions and errors.

  • Handling unexpected errors and exceptions that may occur during the flow execution.

  • Dealing with complex decision-making logic within the flow.

  • Ensuring the flow is scalable and can handle large volumes of data efficiently.

  • Integrating the flow with other systems and applications seamlessly.

  • Optimizing the flow for performance and resource utilization.

Add your answer

Q544. VR testing how its done and what is the future

Ans.

VR testing involves creating virtual environments to test software and hardware performance. The future of VR testing includes advancements in realism and automation.

  • VR testing involves creating virtual environments to simulate real-world scenarios for testing software and hardware performance.

  • Testers use VR headsets and controllers to interact with the virtual environment and identify any issues or bugs.

  • The future of VR testing includes advancements in realism, such as more ...read more

Add your answer

Q545. what is functional interface?

Ans.

A functional interface is an interface that has only one abstract method.

  • Functional interfaces are used in lambda expressions and method references.

  • They can have default methods and static methods.

  • Examples include Runnable, Comparator, and Function interfaces.

  • Functional interfaces can be annotated with @FunctionalInterface annotation.

Add your answer

Q546. what is exception propagation?

Ans.

Exception propagation is the process of passing an exception up the call stack to be handled by a higher-level method.

  • Exceptions are thrown when an error occurs in a method.

  • If the exception is not caught and handled within the method, it is propagated up the call stack.

  • Each method in the call stack has the option to catch and handle the exception or propagate it further up.

  • If the exception reaches the top of the call stack without being caught, the program will terminate with...read more

Add your answer

Q547. Bitwise manipulation. Finding whether a byte has 0's or 1's?

Ans.

To find if a byte has 0's or 1's, use bitwise AND operator with a byte containing all 1's.

  • Create a byte with all 1's using 0xFF or 0b11111111

  • Perform a bitwise AND operation with the byte to check for 0's or 1's

  • If the result is 0, the byte has all 0's. If it is not 0, it has at least one 1.

Add your answer

Q548. out of 100 testcases how to identify failed test cases only and re run them

Ans.

Identify failed test cases out of 100 and rerun them

  • Analyze test results to identify failed test cases

  • Create a list of failed test cases

  • Rerun only the failed test cases

Add your answer

Q549. What is tap library??

Ans.

A tap library is a collection of pre-built code snippets that can be easily integrated into software applications.

  • Tap libraries can save developers time and effort by providing pre-built code for common functions.

  • Examples of tap libraries include Google's Tap Target Library for Android and the Tapku Library for iOS.

  • Tap libraries can be open source or proprietary, and may be free or require a license fee.

  • Using a tap library can help ensure consistency and quality across differ...read more

Add your answer

Q550. Are you okay with 24×7 support

Ans.

Yes, I am comfortable with 24x7 support as I understand the importance of continuous support in a fast-paced environment.

  • I am willing to work in shifts to provide round-the-clock support

  • I have experience working in a similar role with 24x7 support requirements

  • I understand the importance of timely response and resolution of issues in a 24x7 support setup

View 1 answer
Asked in
SDE Interview

Q551. what is the shortest distance between two farthest vertices in a cubical room

Ans.

The shortest distance between two farthest vertices in a cubical room is the length of the diagonal of the cube.

  • The diagonal of a cube can be calculated using the formula: sqrt(3) * side length

  • In a cube with side length 1 unit, the diagonal length is sqrt(3) units

  • Therefore, the shortest distance between two farthest vertices in a cubical room is sqrt(3) times the side length of the cube

Add your answer

Q552. Please draw the whole Network map of your current company.

Ans.

I am unable to provide the network map of my current company.

  • I am not authorized to share the network map of my current company.

  • The network map contains sensitive information that cannot be disclosed.

  • Sharing the network map could pose a security risk for the company.

Add your answer

Q553. What is structure and union in c?

Ans.

Structure and union are two user-defined data types in C used to store multiple variables of different data types.

  • Structure is a collection of variables of different data types under a single name.

  • Union is a special data type that allows storing different data types in the same memory location.

  • Structures are used to represent a record while unions are used for memory optimization.

  • Structures use the dot operator to access members while unions use the same memory location for a...read more

Add your answer

Q554. Difference between routing protocol and routed protocol

Ans.

Routing protocols are used to determine the best path for data to travel, while routed protocols are used to actually transmit the data.

  • Routing protocols are used by routers to communicate with each other and determine the best path for data to travel.

  • Examples of routing protocols include OSPF, BGP, and EIGRP.

  • Routed protocols are used to actually transmit the data, and include protocols like TCP/IP, IPX/SPX, and AppleTalk.

  • Routed protocols are used by end devices like computer...read more

Add your answer

Q555. How much knowledge in ms word and Excel

Ans.

Proficient in both MS Word and Excel

  • Advanced knowledge of Excel functions such as VLOOKUP, Pivot Tables, and Macros

  • Experience in creating and formatting professional documents in MS Word

  • Ability to analyze and manipulate data in Excel for reporting and decision-making purposes

View 1 answer

Q556. What is a new fetaure available on Server 2016 but not on previous versions?.

Add your answer

Q557. Differences between C and Java?

Ans.

C is a low-level programming language while Java is a high-level object-oriented language.

  • C is a procedural language while Java is an object-oriented language.

  • C has manual memory management while Java has automatic garbage collection.

  • C is platform-dependent while Java is platform-independent.

  • C supports pointers while Java does not.

  • C is typically used for system-level programming while Java is used for application development.

Add your answer

Q558. How to enable script editor from tenant ?

Ans.

To enable script editor from tenant, go to the SharePoint admin center, select settings, and then select classic settings. From there, enable custom scripts.

  • Go to the SharePoint admin center

  • Select settings

  • Select classic settings

  • Enable custom scripts

View 1 answer

Q559. Difference between LINQ and SQL Query

Ans.

LINQ is a language integrated query used to query data from different data sources while SQL is a query language used to query data from relational databases.

  • LINQ is used to query data from different data sources like arrays, collections, XML documents, and databases while SQL is used to query data from relational databases.

  • LINQ queries are written in C# or VB.NET while SQL queries are written in SQL.

  • LINQ queries are executed at runtime while SQL queries are executed at compi...read more

Add your answer

Q560. Tell me about your infrastructure of sepm tool.

Ans.

Our infrastructure for SEPM tool includes a centralized server, multiple clients, and regular updates.

  • We have a dedicated server for SEPM that manages all the clients

  • We regularly update the tool to ensure the latest security features

  • We have multiple clients across different departments and locations

  • We have implemented policies to ensure proper usage and security of the tool

  • We have a backup system in place to prevent data loss in case of any issues

Add your answer

Q561. .net side : ways to generate excel without libs, oops concepts,solid principles

Ans.

To generate Excel without libraries in .NET, utilize Open XML SDK, create XML files with Excel format, and use FileStream to save as .xlsx.

  • Utilize Open XML SDK to programmatically create Excel files

  • Generate XML files with Excel format using C# code

  • Use FileStream to save the XML file as .xlsx format

Add your answer

Q562. What is function module and where we use it?

Ans.

Function module is a reusable subroutine in SAP ABAP used for specific functionality.

  • Function modules are standalone functions that can be called from any ABAP program.

  • They are used to encapsulate specific business logic or calculations.

  • Function modules can be called remotely from other systems using Remote Function Call (RFC).

  • Examples include function modules for currency conversion, date calculations, or data validation.

Add your answer

Q563. P2P Process flow, How to configure additional field in req, po etc

Ans.

The P2P process flow involves the steps from requisition to purchase order and configuring additional fields requires system customization.

  • The P2P process flow typically includes steps such as requisition, approval, purchase order creation, goods receipt, and invoice processing.

  • To configure additional fields in requisitions, purchase orders, etc., system customization is required.

  • This customization can be done through the system's configuration settings or by using custom fie...read more

Add your answer

Q564. What is the new features of new version

Ans.

New version has improved security, performance and automation features.

  • Improved security with new encryption algorithms and secure password management

  • Enhanced performance with in-memory column store and advanced indexing

  • Automation features like automatic data optimization and automatic storage management

  • New features for database management like JSON support and sharding

  • Cloud integration with Oracle Cloud Infrastructure and Autonomous Database

Add your answer

Q565. how o protect our customers

Ans.

We can protect our customers by implementing strong security measures and educating them about potential risks.

  • Implementing two-factor authentication

  • Regularly updating software and security patches

  • Providing education and resources on phishing and other scams

  • Offering secure payment options

  • Ensuring data privacy and confidentiality

  • Monitoring for suspicious activity

  • Having a dedicated customer support team to address security concerns

Add your answer

Q566. How to create thread in linux ?

Ans.

To create a thread in Linux, use the pthread_create() function.

  • Include the pthread.h header file

  • Declare a pthread_t variable to hold the thread ID

  • Call pthread_create() function with the thread ID, attributes, start routine, and arguments

  • Example: pthread_t tid; pthread_create(&tid, NULL, start_routine, NULL);

Add your answer

Q567. How to output in Java programming

Ans.

Output in Java is done using the System.out.println() method.

  • Use System.out.println() to print output to the console

  • Use System.out.print() to print output without a newline character

  • Use System.out.printf() to format output with placeholders

  • Use FileWriter or PrintWriter to output to a file

Add your answer

Q568. What are the different type of classes?

Ans.

Classes in object-oriented programming are of four types: abstract, concrete, final, and static.

  • Abstract classes cannot be instantiated and are used as base classes for other classes.

  • Concrete classes can be instantiated and are used to create objects.

  • Final classes cannot be inherited and are used to prevent further modification.

  • Static classes cannot be instantiated and are used to group related methods and properties.

Add your answer

Q569. Tell me use of static variable with an example.

Ans.

Static variables are used to retain their values between function calls.

  • Static variables are declared inside a function and retain their value even after the function call ends.

  • They are initialized only once and retain their value until the program ends.

  • They are useful in situations where a value needs to be shared between multiple function calls.

  • Example: A function to count the number of times it has been called can use a static variable to retain the count between calls.

Add your answer

Q570. SQL : different between Row_num and rowid , remove duplicates etc etc

Ans.

Difference between Row_num and rowid in SQL and removing duplicates

  • ROW_NUM is a function that assigns a unique number to each row in a result set

  • ROWID is a unique identifier for a row in a table

  • To remove duplicates, use the DISTINCT keyword in a SELECT statement

  • Another way to remove duplicates is to use the GROUP BY clause

  • The HAVING clause can be used to filter out duplicates based on a condition

Add your answer

Q571. Write a program to print 2 nd highest number from array with using sorting?

Ans.

Program to find 2nd highest number in array without sorting.

  • Iterate through array to find highest and second highest numbers

  • Initialize variables to store highest and second highest numbers

  • Compare each element with highest and second highest numbers

Add your answer

Q572. Explain the Latest integration that you have implemented?

Ans.

Implemented integration with a third-party payment gateway for seamless transactions.

  • Researched and selected a suitable payment gateway based on project requirements.

  • Developed API endpoints to communicate with the payment gateway.

  • Implemented secure tokenization for handling sensitive payment information.

  • Tested the integration thoroughly to ensure smooth transactions.

  • Provided documentation for future maintenance and troubleshooting.

Add your answer

Q573. Explain OOPS and how have you used it

Ans.

OOPS stands for Object-Oriented Programming. It is a programming paradigm based on the concept of objects.

  • OOPS focuses on creating objects that contain both data and methods to manipulate that data.

  • Encapsulation, inheritance, and polymorphism are key principles of OOPS.

  • I have used OOPS in projects to create classes and objects, define relationships between them, and implement inheritance and polymorphism.

  • For example, I created a class 'Car' with properties like 'make', 'model...read more

Add your answer

Q574. Given a string remove the unwanted spaces

Ans.

Remove unwanted spaces from a given string

  • Use string manipulation functions to remove extra spaces

  • Iterate through the string and remove any consecutive spaces

  • Trim the string to remove leading and trailing spaces

Add your answer

Q575. Explain types of network.

Ans.

Types of network include LAN, WAN, MAN, WLAN, VPN, PAN, SAN, CAN, and GAN.

  • LAN (Local Area Network) connects devices within a small area

  • WAN (Wide Area Network) connects devices across a large geographical area

  • MAN (Metropolitan Area Network) connects devices within a city or metropolitan area

  • WLAN (Wireless Local Area Network) uses wireless technology to connect devices within a small area

  • VPN (Virtual Private Network) allows secure remote access to a private network

  • PAN (Personal...read more

Add your answer

Q576. What are Banking operations?

Ans.

Banking operations refer to the day-to-day activities of a bank to ensure smooth functioning of financial transactions.

  • Opening and closing of accounts

  • Processing of transactions such as deposits, withdrawals, and transfers

  • Issuing loans and credit cards

  • Managing risk and compliance

  • Customer service and support

  • Investment banking operations

  • Foreign exchange operations

Add your answer

Q577. Given a position write a code to delete a node

Ans.

Code to delete a node from a given position

  • Identify the node to be deleted and its previous node

  • Update the previous node's next pointer to skip the node to be deleted

  • Free the memory occupied by the node to be deleted

Add your answer

Q578. What is session? Wht is the uses of session?

Ans.

Session is a way to store information (variables) on the server to be used across multiple pages.

  • Session is used to maintain user-specific data across multiple pages.

  • It is created when a user logs in and destroyed when the user logs out.

  • Session data can be accessed and manipulated using the $_SESSION superglobal variable.

  • Examples of session data include user ID, username, and shopping cart items.

Add your answer

Q579. What is global container in SAP XI? Transportation process of object from QA to Production?

Ans.

Global container in SAP XI is used to transport objects between different systems.

  • Global container is a repository for objects that need to be transported between different systems in SAP XI.

  • It is used to move objects from development to quality assurance and then to production.

  • Objects can be transported individually or as part of a transport package.

  • The global container can be accessed through the Integration Builder or the Enterprise Services Repository.

  • Examples of objects ...read more

Add your answer

Q580. How to hande load failures in Snowflake

Ans.

Load failures in Snowflake can be handled by monitoring the load process, identifying the root cause, and taking appropriate actions.

  • Monitor the load process regularly to identify any failures

  • Check the error messages and logs to determine the root cause of the failure

  • Retry the load operation after fixing the issue, such as data format errors or network connectivity problems

  • Consider using Snowflake's automatic retry feature for transient errors

  • Utilize Snowflake's error handlin...read more

Add your answer

Q581. Major features used in JAVA 8

Ans.

Major features in JAVA 8 include lambda expressions, functional interfaces, streams, default methods, and method references.

  • Lambda expressions allow for more concise code and enable functional programming.

  • Functional interfaces are interfaces with a single abstract method, used for lambda expressions.

  • Streams provide a way to work with sequences of elements and support parallel processing.

  • Default methods allow interfaces to have method implementations.

  • Method references provide ...read more

View 1 answer

Q582. what is document understanding in Uipath

Ans.

Document understanding in UiPath is the ability to extract data from unstructured documents using AI and machine learning.

  • It involves using OCR to read and extract data from documents such as invoices, receipts, and contracts.

  • The extracted data is then validated and processed using machine learning algorithms.

  • UiPath's Document Understanding framework provides pre-built templates and workflows for common document types.

  • It can be used to automate processes such as invoice proce...read more

Add your answer

Q583. What is oracle database

Ans.

Oracle database is a relational database management system developed by Oracle Corporation.

  • It is a software system used to manage and store data.

  • It uses Structured Query Language (SQL) to manage data.

  • It is widely used in enterprise applications.

  • It provides features like data security, backup and recovery, and scalability.

  • Examples of Oracle database applications include online banking systems, airline reservation systems, and e-commerce websites.

Add your answer

Q584. what you will do if u are not able to GUI console

Ans.

If unable to access GUI console, I would troubleshoot the issue by checking network connectivity, restarting the system, or using command-line interface.

  • Check network connectivity to ensure the GUI console is accessible

  • Restart the system to resolve any temporary issues

  • Use command-line interface as an alternative to GUI console

  • Verify if any firewall or security settings are blocking GUI access

Add your answer

Q585. Who is the first founder of HCL

Ans.

Shiv Nadar is the first founder of HCL.

  • Shiv Nadar founded HCL in 1976.

  • He started the company with an investment of Rs. 187,000.

  • HCL initially focused on selling calculators before transitioning to IT services.

Add your answer

Q586. Find the combained charected in the given testing exmple : " Testing Testing Testing" , cobained text is "te"

Ans.

The combined characters in the given testing example 'Testing Testing Testing' is 'te'.

  • Iterate through the text and check for consecutive characters 'te'.

  • Combine the characters 'te' whenever they are found together.

  • Return the combined text 'te' as the result.

Add your answer

Q587. "Hello world" java program to print the count of letter 'l'

Ans.

A Java program to count the occurrences of the letter 'l' in the string 'Hello world'.

  • Create a Java program with a main method.

  • Initialize a String variable with the value 'Hello world'.

  • Use a loop to iterate through each character in the string and count the occurrences of the letter 'l'.

  • Print the count of 'l' at the end.

Add your answer

Q588. what are the challenges you have faced during order processing?

Ans.

Challenges faced during order processing include system errors, communication issues, and customer demands.

  • System errors causing delays in order processing

  • Communication issues with customers or internal teams leading to misunderstandings

  • Customer demands for expedited orders or special requests

Add your answer

Q589. Difference between windows 10 and 11 BSOD How do you do system scan How do you handle the issues which is pending for a long time

Ans.

Windows 11 has new features like redesigned Start menu, improved multitasking, and better gaming performance compared to Windows 10.

  • Windows 11 has a redesigned Start menu with a centered layout, compared to the left-aligned Start menu in Windows 10.

  • Windows 11 offers improved multitasking features like Snap Layouts and Snap Groups, making it easier to organize and switch between multiple windows.

  • Windows 11 includes DirectStorage technology for faster game load times and better...read more

Add your answer

Q590. Program to sort the input in descending order without using inbuild method/functions

Ans.

Sort input array of strings in descending order without using inbuilt functions

  • Iterate through the array and compare each element with the rest to find the largest element

  • Swap the largest element with the first element, then repeat the process for the remaining elements

  • Continue this process until the array is sorted in descending order

Add your answer

Q591. What is fragmentation? How do overcome?

Ans.

Fragmentation is the splitting of data into smaller pieces. It can be overcome by defragmentation.

  • Fragmentation occurs when data is stored in non-contiguous blocks on a hard drive.

  • This can slow down computer performance and cause errors.

  • Defragmentation rearranges the data so that it is stored in contiguous blocks, improving performance.

  • Fragmentation can also occur in databases, where it can be overcome by rebuilding indexes.

  • Regular maintenance can help prevent fragmentation.

Add your answer

Q592. What is a deadlock? explain it?

Ans.

A deadlock is a situation where two or more processes are unable to continue executing because they are waiting for each other to finish.

  • Deadlocks occur when two or more processes are blocked and unable to proceed.

  • This can happen when each process is waiting for a resource that the other process has locked.

  • Deadlocks can be prevented by using techniques such as resource allocation graphs and deadlock detection algorithms.

  • Examples of resources that can cause deadlocks include s...read more

Add your answer

Q593. what are the difficulties faced during the layout ?

Ans.

Difficulties faced during layout include space constraints, equipment compatibility, and regulatory compliance.

  • Space constraints can limit the placement of equipment and affect workflow.

  • Ensuring equipment compatibility can be challenging when integrating new technologies with existing systems.

  • Meeting regulatory compliance standards adds complexity to the layout design process.

Add your answer

Q594. What is c what is different between Java and js node Rate yourself in n code

Ans.

C is a programming language used for system programming and embedded systems.

  • C is a low-level language with direct access to memory and hardware.

  • Java is a high-level language that runs on a virtual machine, while Node.js is a runtime environment for JavaScript.

  • Rating oneself in n code is subjective and depends on individual experience and skill level.

Add your answer

Q595. advantages of spring boot?

Ans.

Spring Boot provides rapid application development and microservices architecture.

  • Easy configuration and setup

  • Embedded servers for faster development

  • Auto-configuration of dependencies

  • Supports multiple data sources

  • Actuator for monitoring and managing applications

  • Simplifies development of RESTful web services

  • Enables building of microservices architecture

  • Provides a wide range of plugins and extensions

  • Reduces boilerplate code

  • Promotes best practices and standards

View 1 answer

Q596. What you do in Linux environment?

Ans.

I work with Linux servers, managing and troubleshooting them.

  • Install and configure Linux servers

  • Monitor server performance and troubleshoot issues

  • Manage user accounts and permissions

  • Automate tasks with shell scripting

  • Implement security measures

  • Install and configure software applications

  • Maintain backups and disaster recovery plans

Add your answer

Q597. How do you create a Spring boot application

Ans.

To create a Spring Boot application, use Spring Initializr and configure dependencies and properties.

  • Go to start.spring.io and select the required dependencies and properties

  • Download the generated project and import it into your IDE

  • Add your code and run the application

Add your answer

Q598. Agile methodologies, how many projects worked before. Role and responsibilities.

Ans.

I have worked on 3 Agile projects as a Cognos TM1 Developer. My role involved developing and maintaining TM1 models, collaborating with stakeholders, and ensuring project timelines were met.

  • Worked on 3 Agile projects as a Cognos TM1 Developer

  • Developed and maintained TM1 models

  • Collaborated with stakeholders to gather requirements

  • Ensured project timelines were met

Add your answer

Q599. What architectures, apart from 8085, do you know?

Add your answer

Q600. 2. Difference between structure and union

Ans.

Structure is a collection of variables of different data types while union is a collection of variables of same data type.

  • Structure allocates memory for all its variables while union allocates memory for only one variable at a time.

  • Structure is used when we want to store different types of data while union is used when we want to store only one type of data at a time.

  • Structure is accessed using dot (.) operator while union is accessed using arrow (->) operator.

  • Example of stru...read more

Add your answer
3
4
5
6
7
8
9
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos

Interview Process at Viatris

based on 1.2k interviews in the last 1 year
Interview experience
4.0
Good
View more
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Interview Questions from Similar Companies

3.9
 • 1.4k Interview Questions
3.4
 • 393 Interview Questions
3.8
 • 386 Interview Questions
4.0
 • 206 Interview Questions
View all
Top HCLTech Interview Questions And Answers
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
70 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions
Get AmbitionBox app

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter