HCLTech
1500+ Viatris Interview Questions and Answers
Q501. How you perform daily task while closing?
I prioritize tasks, communicate with team members, and ensure all deadlines are met during the closing process.
Prioritize tasks based on urgency and importance
Communicate with team members to coordinate efforts and share updates
Ensure all deadlines are met by staying organized and focused
Review and double-check work to avoid errors
Utilize time management techniques to maximize productivity
Q502. what is hash collision and how it can be handled?
Hash collision occurs when two different inputs produce the same hash value. It can be handled by using techniques like chaining or open addressing.
Hash collision is a common issue in hash tables where different keys produce the same hash value.
One way to handle hash collisions is by using chaining, where each bucket in the hash table stores a linked list of key-value pairs with the same hash value.
Another way to handle hash collisions is through open addressing, where if a c...read more
Q503. Can you have ability to handle tasks individually?
Yes, I have the ability to handle tasks individually.
I have a proven track record of successfully completing projects on my own.
I am self-motivated and can prioritize tasks effectively.
I have strong problem-solving skills which allow me to tackle challenges independently.
Q504. what is your current CTC and expected CTC?
My current CTC is $100,000 and my expected CTC is $120,000.
Current CTC: $100,000
Expected CTC: $120,000
Q505. What’s routing ? Explain exception handling
Routing is the process of selecting a path for network traffic to travel.
Routing is used in networking to determine the best path for data to travel between devices.
It involves analyzing the network topology and selecting the most efficient path.
Routing protocols like OSPF and BGP are used to automate the process.
Exception handling is the process of dealing with errors and exceptions in code.
It involves catching and handling errors to prevent the program from crashing.
Try-cat...read more
Q506. What is function? Difference between list and tuple
Function is a block of code that performs a specific task. List and tuple are both data structures in Python, but list is mutable while tuple is immutable.
Functions are reusable blocks of code that can be called multiple times
Lists are mutable and can be modified after creation
Tuples are immutable and cannot be modified after creation
Lists are defined using square brackets [] while tuples use parentheses ()
Lists are typically used for collections of related items while tuples...read more
Q507. What are test carried out for big appliances products?
Various tests are carried out for big appliances products to ensure their safety and performance.
Electrical safety tests such as high voltage and insulation resistance tests
Performance tests such as energy consumption and cooling capacity tests
Durability tests such as drop and vibration tests
Environmental tests such as temperature and humidity tests
Packaging tests such as compression and drop tests
Regulatory compliance tests such as EMC and EMI tests
Q508. What statuses are available in queue.
Various statuses can be available in a queue depending on the system.
Pending
In Progress
On Hold
Completed
Cancelled
Q509. How to delete duplicate records
To delete duplicate records, use SQL queries with DISTINCT keyword or create a unique index on the table.
Use SQL queries with DISTINCT keyword to select unique records and insert them into a new table
Create a unique index on the table to prevent duplicate entries in the future
Use DELETE statement with a subquery to remove duplicate records from the table
Q510. What is vpc and scerious
VPC stands for Virtual Private Cloud, a virtual network dedicated to an AWS account. SCERIOUS is not a recognized term in AWS.
VPC is used to create isolated virtual networks within AWS
It allows users to define their own IP address range, subnets, and route tables
VPC provides control over network traffic, security, and connectivity options
Q511. what errors you have faced and solutions ? optimizations
I have faced errors related to data processing and optimization.
One error I faced was related to memory allocation while processing large datasets. I optimized the code by using generators instead of lists to reduce memory usage.
Another error was related to incorrect data formatting which caused errors in the analysis. I solved this by writing a script to clean and format the data before processing.
I also faced errors related to incorrect use of libraries and functions. I sol...read more
Q512. Previous job oriented technical and current job description.
Previous job: Software Engineer at XYZ. Current job: Technical Lead at ABC.
Previous job involved developing and maintaining web applications using Java and Spring framework.
Current job involves leading a team of developers, designing and implementing software solutions, and ensuring project deadlines are met.
Both jobs require strong technical skills, problem-solving abilities, and effective communication with team members and stakeholders.
Q513. Swap two number with and without temporary variable
Swap two numbers with and without temporary variable
Without temporary variable: Use addition and subtraction
With temporary variable: Use a third variable to store the value of one of the numbers
Example without temporary variable: a=5, b=7; a=a+b; b=a-b; a=a-b;
Example with temporary variable: a=5, b=7; temp=a; a=b; b=temp;
Q514. How IIS server works and serves request.
IIS server is a web server that processes and serves HTTP requests.
IIS stands for Internet Information Services.
It is a component of the Windows Server operating system.
IIS uses HTTP protocol to communicate with clients and serve web content.
It listens for incoming requests on a specified port, usually port 80 for HTTP and port 443 for HTTPS.
When a request is received, IIS processes it and returns the appropriate response.
IIS can handle various types of requests, including st...read more
Q515. How data is getting secure in SharePoint
SharePoint provides various security features to ensure data protection.
SharePoint has role-based access control to restrict access to sensitive data.
It also has data loss prevention policies to prevent unauthorized sharing of data.
Encryption at rest and in transit ensures data is secure.
Multi-factor authentication adds an extra layer of security.
Audit logs track user activity and help identify security breaches.
Q516. Do you know about how to calculate utilisation and shrinkage?
Utilisation and shrinkage are key metrics in operations management to measure workforce efficiency and productivity.
Utilisation is calculated by dividing the total productive hours by the total available hours.
Shrinkage is calculated by subtracting the total productive hours from the total available hours.
Utilisation rate = (Total productive hours / Total available hours) * 100%
Shrinkage rate = (Total available hours - Total productive hours) / Total available hours * 100%
Q517. How Unica works? How to leverage for marketing strategy
Unica is a marketing automation software that helps businesses create personalized marketing campaigns and track customer interactions.
Unica allows marketers to segment customers based on demographics, behavior, and preferences.
It enables businesses to create targeted and personalized marketing campaigns through email, social media, and other channels.
Unica provides analytics and reporting tools to track the effectiveness of marketing campaigns and make data-driven decisions....read more
Q518. What is difference between agile and SAFe
Agile is a set of principles and values for software development, while SAFe is a framework for scaling agile practices across an organization.
Agile focuses on individuals and interactions over processes and tools, while SAFe emphasizes alignment, collaboration, and delivery at scale.
Agile promotes flexibility and adaptability in responding to change, whereas SAFe provides a structured approach for implementing agile practices in large organizations.
Agile encourages self-orga...read more
Q519. Write a script to develop a well Architect AWS infrastructure in Terrafrom?
Develop a well Architect AWS infrastructure in Terraform
Define the required AWS resources in Terraform configuration files
Use modules to organize and reuse code for different components
Leverage Terraform best practices such as state management and variable usage
Implement security best practices like IAM roles and policies
Utilize Terraform's plan and apply commands to create and update infrastructure
Q520. What is VPN? What is SLA and tell me about ticketing tool
VPN stands for Virtual Private Network, which allows users to securely access a private network over a public network.
VPN creates a secure connection between a user and a private network, encrypting data to ensure privacy and security.
It is commonly used by remote workers to access company resources securely.
VPN can also be used to bypass geo-restrictions and access region-locked content.
Popular VPN services include NordVPN, ExpressVPN, and CyberGhost.
Q521. How to support if user's machine turned off?
Provide remote troubleshooting steps and offer assistance via phone or remote desktop software.
Ask the user to check if the machine is plugged in and turned on.
Guide the user through troubleshooting steps over the phone or via remote desktop software.
Offer to schedule an on-site visit if remote assistance is not possible.
Q522. What is PSTN, MPLS and SD WAN?
PSTN stands for Public Switched Telephone Network, MPLS stands for Multiprotocol Label Switching, and SD WAN stands for Software-Defined Wide Area Network.
PSTN is a traditional circuit-switched telephone network used for voice communication.
MPLS is a protocol for efficient packet forwarding in network communication.
SD WAN is a technology that uses software-defined networking to connect enterprise networks over large geographic distances.
Q523. Pneumatic solenoid valve double and single acting working principle
Pneumatic solenoid valves control the flow of air in pneumatic systems using electromagnetic principles.
Pneumatic solenoid valves are used to control the flow of air in pneumatic systems by opening and closing the valve based on electrical signals.
Double-acting solenoid valves use air pressure to both open and close the valve, while single-acting solenoid valves use air pressure to open the valve and a spring to close it.
Double-acting solenoid valves are typically faster in r...read more
Q524. Difference between MVVM and VIPER. Advantages of both with real experience.
MVVM and VIPER are architectural patterns used in iOS development. MVVM focuses on data binding while VIPER emphasizes modularity.
MVVM separates the view, model, and view model layers. It allows for easy testing and maintenance. Example: RxSwift library.
VIPER separates the view, interactor, presenter, entity, and router layers. It promotes scalability and flexibility. Example: Uber app.
MVVM advantages: easy to understand, maintain, and test. It also allows for reusability of ...read more
Q525. Optimize the given program from O(n2) to O(log n)
Optimize O(n2) program to O(log n)
Use binary search instead of linear search
Divide and conquer approach can be used
Implement efficient data structures like heap, AVL tree, etc.
Reduce unnecessary iterations and comparisons
Use memoization to avoid redundant calculations
Q526. Data binding & communication between components
Data binding allows components to communicate and share data in a web application.
Data binding is a technique used in web development to synchronize data between the model and view components.
Two-way data binding allows changes in the model to be reflected in the view and vice versa.
Event binding can be used to trigger actions in response to user interactions.
Angular and React are popular frameworks that provide data binding capabilities.
Example: Angular's ngModel directive e...read more
Q527. What is DI in .Net Core
DI stands for Dependency Injection in .Net Core.
DI is a design pattern used to achieve loose coupling between objects.
It allows for easier testing and maintenance of code.
In .Net Core, DI is implemented through the built-in service container.
Services can be registered and injected into classes using constructor injection.
Example: services.AddScoped
(); Example: public MyClass(IMyService myService) { }
Q528. What are the exceptions handled other than NosuchElementException
Other exceptions handled in automation testing besides NoSuchElementException
ElementNotVisibleException - when element is present in DOM but not visible on the page
StaleElementReferenceException - when element is no longer attached to the DOM
TimeoutException - when a command does not complete in a specific time frame
NoSuchWindowException - when the window target to be switched doesn't exist
InvalidElementStateException - when element is in an invalid state for the operation
Q529. What is GRPC? where it is used?
gRPC is a high-performance, open-source RPC framework developed by Google.
gRPC stands for Google Remote Procedure Call.
It uses HTTP/2 for transport, Protocol Buffers for serialization, and supports multiple programming languages.
gRPC is commonly used for building efficient and scalable microservices.
It allows for bidirectional streaming and authentication features.
Examples of companies using gRPC include Google, Netflix, and Square.
Q530. Who can handle any panic section
A person who remains calm and composed in high-pressure situations.
Someone with strong problem-solving skills
Ability to think clearly under pressure
Experience in handling emergencies or crises
Good communication skills to coordinate with others
Examples: Emergency responders, crisis negotiators, experienced software engineers
Q531. What is RBAC? How is access certification done?
RBAC stands for Role-Based Access Control. Access certification is done by reviewing and verifying user access rights based on their assigned roles.
RBAC is a security model that restricts system access based on the roles assigned to users.
Access certification involves reviewing and verifying user access rights to ensure they align with their job responsibilities.
Access certification can be done manually or through automated tools.
Examples of RBAC include granting a doctor acc...read more
Q532. What is Stress and formula of stress
Stress is the force per unit area acting on a material. Formula: Stress = Force/Area
Stress is a measure of the internal forces in a material
It is calculated by dividing the force applied to the material by its cross-sectional area
Stress can be tensile, compressive, or shear
Examples of stress include the weight of a book on a table, the force of wind on a building, and the pressure of water on a dam
Q533. Libraries of python and how to add python with database.
Python has libraries like SQLAlchemy, psycopg2 for database connectivity. Use these libraries to connect Python with databases.
Use SQLAlchemy library for ORM (Object Relational Mapping) to interact with databases.
Use psycopg2 library for direct interaction with PostgreSQL database.
Install the required libraries using pip install
. Establish connection to the database using appropriate credentials.
Execute SQL queries using Python code to interact with the database.
Q534. Give a scenario where you have updated the PFMEA/DFMEA
Updated PFMEA/DFMEA when a new supplier was introduced
Identified potential failure modes and effects of the new supplier's components
Evaluated the severity, occurrence, and detection of each failure mode
Updated the PFMEA/DFMEA with the new information
Collaborated with the supplier to implement corrective actions
Continuously monitored and updated the PFMEA/DFMEA as necessary
Q535. Tell me about product life cycle with example
Product life cycle refers to the stages a product goes through from its introduction to its decline.
Introduction: The product is launched in the market.
Growth: Sales and market share increase as more customers adopt the product.
Maturity: Sales stabilize as the product reaches its peak market penetration.
Decline: Sales decline due to market saturation or the introduction of newer products.
Example: The iPhone product life cycle - introduced in 2007, experienced rapid growth, re...read more
Q536. how i was sourcing in different portals
I have sourced candidates from various portals like LinkedIn, Indeed, and Dice.
I have used LinkedIn to search for candidates with specific skills and experience.
I have utilized Indeed to find candidates based on location and job title.
I have explored Dice to source candidates with specialized IT skills.
I have also used other job portals and professional networking sites to expand my candidate pool.
Q537. Type oracle oracle rac ip? Why using oracle vip .
Q538. How to provide daily execution report?
To provide a daily execution report, gather relevant data, summarize progress, highlight achievements, and communicate it to stakeholders.
Collect data on tasks completed, milestones achieved, and any issues encountered.
Summarize the progress made towards project goals.
Highlight any notable achievements or successes.
Include information on any challenges faced and how they were addressed.
Communicate the report to stakeholders through a suitable medium (e.g., email, project mana...read more
Q539. Write a program that contain 8 loops?
A program with 8 loops
Loops can be of different types like for, while, do-while, foreach, etc.
The loops can be nested within each other to create complex logic.
The program can perform various operations within the loops like printing, calculating, etc.
Q540. How can you remove duplicate values from an array in javascript
Use Set data structure to remove duplicate values from an array in JavaScript.
Create a new Set from the array to automatically remove duplicates.
Convert the Set back to an array using the spread operator.
Example: const array = ['apple', 'banana', 'apple']; const uniqueArray = [...new Set(array)];
Q541. How can upgeade citrix infra. Backup of storefront files.
To upgrade Citrix infra, backup storefront files first.
Ensure all prerequisites are met before upgrading
Take a backup of the storefront files and database
Upgrade the Delivery Controller first, followed by other components
Test the upgraded environment thoroughly before rolling out to production
Ensure all users are informed of the upgrade and any changes in functionality
Q542. Manufacturing processes of sheetmeral
Sheet metal manufacturing involves cutting, bending, and shaping metal sheets to create various products.
Sheet metal can be cut using various methods such as laser cutting, plasma cutting, or waterjet cutting.
Bending can be done using press brakes or rollers.
Shaping can be achieved through processes like stamping, punching, or deep drawing.
Welding is often used to join multiple sheet metal pieces together.
Finishing processes like painting, powder coating, or anodizing can be ...read more
Q543. Whats the difficult situations you face while developing a flow??
One difficult situation while developing a flow is handling exceptions and errors.
Handling unexpected errors and exceptions that may occur during the flow execution.
Dealing with complex decision-making logic within the flow.
Ensuring the flow is scalable and can handle large volumes of data efficiently.
Integrating the flow with other systems and applications seamlessly.
Optimizing the flow for performance and resource utilization.
Q544. VR testing how its done and what is the future
VR testing involves creating virtual environments to test software and hardware performance. The future of VR testing includes advancements in realism and automation.
VR testing involves creating virtual environments to simulate real-world scenarios for testing software and hardware performance.
Testers use VR headsets and controllers to interact with the virtual environment and identify any issues or bugs.
The future of VR testing includes advancements in realism, such as more ...read more
Q545. what is functional interface?
A functional interface is an interface that has only one abstract method.
Functional interfaces are used in lambda expressions and method references.
They can have default methods and static methods.
Examples include Runnable, Comparator, and Function interfaces.
Functional interfaces can be annotated with @FunctionalInterface annotation.
Q546. what is exception propagation?
Exception propagation is the process of passing an exception up the call stack to be handled by a higher-level method.
Exceptions are thrown when an error occurs in a method.
If the exception is not caught and handled within the method, it is propagated up the call stack.
Each method in the call stack has the option to catch and handle the exception or propagate it further up.
If the exception reaches the top of the call stack without being caught, the program will terminate with...read more
Q547. Bitwise manipulation. Finding whether a byte has 0's or 1's?
To find if a byte has 0's or 1's, use bitwise AND operator with a byte containing all 1's.
Create a byte with all 1's using 0xFF or 0b11111111
Perform a bitwise AND operation with the byte to check for 0's or 1's
If the result is 0, the byte has all 0's. If it is not 0, it has at least one 1.
Q548. out of 100 testcases how to identify failed test cases only and re run them
Identify failed test cases out of 100 and rerun them
Analyze test results to identify failed test cases
Create a list of failed test cases
Rerun only the failed test cases
Q549. What is tap library??
A tap library is a collection of pre-built code snippets that can be easily integrated into software applications.
Tap libraries can save developers time and effort by providing pre-built code for common functions.
Examples of tap libraries include Google's Tap Target Library for Android and the Tapku Library for iOS.
Tap libraries can be open source or proprietary, and may be free or require a license fee.
Using a tap library can help ensure consistency and quality across differ...read more
Q550. Are you okay with 24×7 support
Yes, I am comfortable with 24x7 support as I understand the importance of continuous support in a fast-paced environment.
I am willing to work in shifts to provide round-the-clock support
I have experience working in a similar role with 24x7 support requirements
I understand the importance of timely response and resolution of issues in a 24x7 support setup
Q551. what is the shortest distance between two farthest vertices in a cubical room
The shortest distance between two farthest vertices in a cubical room is the length of the diagonal of the cube.
The diagonal of a cube can be calculated using the formula: sqrt(3) * side length
In a cube with side length 1 unit, the diagonal length is sqrt(3) units
Therefore, the shortest distance between two farthest vertices in a cubical room is sqrt(3) times the side length of the cube
Q552. Please draw the whole Network map of your current company.
I am unable to provide the network map of my current company.
I am not authorized to share the network map of my current company.
The network map contains sensitive information that cannot be disclosed.
Sharing the network map could pose a security risk for the company.
Q553. What is structure and union in c?
Structure and union are two user-defined data types in C used to store multiple variables of different data types.
Structure is a collection of variables of different data types under a single name.
Union is a special data type that allows storing different data types in the same memory location.
Structures are used to represent a record while unions are used for memory optimization.
Structures use the dot operator to access members while unions use the same memory location for a...read more
Q554. Difference between routing protocol and routed protocol
Routing protocols are used to determine the best path for data to travel, while routed protocols are used to actually transmit the data.
Routing protocols are used by routers to communicate with each other and determine the best path for data to travel.
Examples of routing protocols include OSPF, BGP, and EIGRP.
Routed protocols are used to actually transmit the data, and include protocols like TCP/IP, IPX/SPX, and AppleTalk.
Routed protocols are used by end devices like computer...read more
Q555. How much knowledge in ms word and Excel
Proficient in both MS Word and Excel
Advanced knowledge of Excel functions such as VLOOKUP, Pivot Tables, and Macros
Experience in creating and formatting professional documents in MS Word
Ability to analyze and manipulate data in Excel for reporting and decision-making purposes
Q556. What is a new fetaure available on Server 2016 but not on previous versions?.
Q557. Differences between C and Java?
C is a low-level programming language while Java is a high-level object-oriented language.
C is a procedural language while Java is an object-oriented language.
C has manual memory management while Java has automatic garbage collection.
C is platform-dependent while Java is platform-independent.
C supports pointers while Java does not.
C is typically used for system-level programming while Java is used for application development.
Q558. How to enable script editor from tenant ?
To enable script editor from tenant, go to the SharePoint admin center, select settings, and then select classic settings. From there, enable custom scripts.
Go to the SharePoint admin center
Select settings
Select classic settings
Enable custom scripts
Q559. Difference between LINQ and SQL Query
LINQ is a language integrated query used to query data from different data sources while SQL is a query language used to query data from relational databases.
LINQ is used to query data from different data sources like arrays, collections, XML documents, and databases while SQL is used to query data from relational databases.
LINQ queries are written in C# or VB.NET while SQL queries are written in SQL.
LINQ queries are executed at runtime while SQL queries are executed at compi...read more
Q560. Tell me about your infrastructure of sepm tool.
Our infrastructure for SEPM tool includes a centralized server, multiple clients, and regular updates.
We have a dedicated server for SEPM that manages all the clients
We regularly update the tool to ensure the latest security features
We have multiple clients across different departments and locations
We have implemented policies to ensure proper usage and security of the tool
We have a backup system in place to prevent data loss in case of any issues
Q561. .net side : ways to generate excel without libs, oops concepts,solid principles
To generate Excel without libraries in .NET, utilize Open XML SDK, create XML files with Excel format, and use FileStream to save as .xlsx.
Utilize Open XML SDK to programmatically create Excel files
Generate XML files with Excel format using C# code
Use FileStream to save the XML file as .xlsx format
Q562. What is function module and where we use it?
Function module is a reusable subroutine in SAP ABAP used for specific functionality.
Function modules are standalone functions that can be called from any ABAP program.
They are used to encapsulate specific business logic or calculations.
Function modules can be called remotely from other systems using Remote Function Call (RFC).
Examples include function modules for currency conversion, date calculations, or data validation.
Q563. P2P Process flow, How to configure additional field in req, po etc
The P2P process flow involves the steps from requisition to purchase order and configuring additional fields requires system customization.
The P2P process flow typically includes steps such as requisition, approval, purchase order creation, goods receipt, and invoice processing.
To configure additional fields in requisitions, purchase orders, etc., system customization is required.
This customization can be done through the system's configuration settings or by using custom fie...read more
Q564. What is the new features of new version
New version has improved security, performance and automation features.
Improved security with new encryption algorithms and secure password management
Enhanced performance with in-memory column store and advanced indexing
Automation features like automatic data optimization and automatic storage management
New features for database management like JSON support and sharding
Cloud integration with Oracle Cloud Infrastructure and Autonomous Database
Q565. how o protect our customers
We can protect our customers by implementing strong security measures and educating them about potential risks.
Implementing two-factor authentication
Regularly updating software and security patches
Providing education and resources on phishing and other scams
Offering secure payment options
Ensuring data privacy and confidentiality
Monitoring for suspicious activity
Having a dedicated customer support team to address security concerns
Q566. How to create thread in linux ?
To create a thread in Linux, use the pthread_create() function.
Include the pthread.h header file
Declare a pthread_t variable to hold the thread ID
Call pthread_create() function with the thread ID, attributes, start routine, and arguments
Example: pthread_t tid; pthread_create(&tid, NULL, start_routine, NULL);
Q567. How to output in Java programming
Output in Java is done using the System.out.println() method.
Use System.out.println() to print output to the console
Use System.out.print() to print output without a newline character
Use System.out.printf() to format output with placeholders
Use FileWriter or PrintWriter to output to a file
Q568. What are the different type of classes?
Classes in object-oriented programming are of four types: abstract, concrete, final, and static.
Abstract classes cannot be instantiated and are used as base classes for other classes.
Concrete classes can be instantiated and are used to create objects.
Final classes cannot be inherited and are used to prevent further modification.
Static classes cannot be instantiated and are used to group related methods and properties.
Q569. Tell me use of static variable with an example.
Static variables are used to retain their values between function calls.
Static variables are declared inside a function and retain their value even after the function call ends.
They are initialized only once and retain their value until the program ends.
They are useful in situations where a value needs to be shared between multiple function calls.
Example: A function to count the number of times it has been called can use a static variable to retain the count between calls.
Q570. SQL : different between Row_num and rowid , remove duplicates etc etc
Difference between Row_num and rowid in SQL and removing duplicates
ROW_NUM is a function that assigns a unique number to each row in a result set
ROWID is a unique identifier for a row in a table
To remove duplicates, use the DISTINCT keyword in a SELECT statement
Another way to remove duplicates is to use the GROUP BY clause
The HAVING clause can be used to filter out duplicates based on a condition
Q571. Write a program to print 2 nd highest number from array with using sorting?
Program to find 2nd highest number in array without sorting.
Iterate through array to find highest and second highest numbers
Initialize variables to store highest and second highest numbers
Compare each element with highest and second highest numbers
Q572. Explain the Latest integration that you have implemented?
Implemented integration with a third-party payment gateway for seamless transactions.
Researched and selected a suitable payment gateway based on project requirements.
Developed API endpoints to communicate with the payment gateway.
Implemented secure tokenization for handling sensitive payment information.
Tested the integration thoroughly to ensure smooth transactions.
Provided documentation for future maintenance and troubleshooting.
Q573. Explain OOPS and how have you used it
OOPS stands for Object-Oriented Programming. It is a programming paradigm based on the concept of objects.
OOPS focuses on creating objects that contain both data and methods to manipulate that data.
Encapsulation, inheritance, and polymorphism are key principles of OOPS.
I have used OOPS in projects to create classes and objects, define relationships between them, and implement inheritance and polymorphism.
For example, I created a class 'Car' with properties like 'make', 'model...read more
Q574. Given a string remove the unwanted spaces
Remove unwanted spaces from a given string
Use string manipulation functions to remove extra spaces
Iterate through the string and remove any consecutive spaces
Trim the string to remove leading and trailing spaces
Q575. Explain types of network.
Types of network include LAN, WAN, MAN, WLAN, VPN, PAN, SAN, CAN, and GAN.
LAN (Local Area Network) connects devices within a small area
WAN (Wide Area Network) connects devices across a large geographical area
MAN (Metropolitan Area Network) connects devices within a city or metropolitan area
WLAN (Wireless Local Area Network) uses wireless technology to connect devices within a small area
VPN (Virtual Private Network) allows secure remote access to a private network
PAN (Personal...read more
Q576. What are Banking operations?
Banking operations refer to the day-to-day activities of a bank to ensure smooth functioning of financial transactions.
Opening and closing of accounts
Processing of transactions such as deposits, withdrawals, and transfers
Issuing loans and credit cards
Managing risk and compliance
Customer service and support
Investment banking operations
Foreign exchange operations
Q577. Given a position write a code to delete a node
Code to delete a node from a given position
Identify the node to be deleted and its previous node
Update the previous node's next pointer to skip the node to be deleted
Free the memory occupied by the node to be deleted
Q578. What is session? Wht is the uses of session?
Session is a way to store information (variables) on the server to be used across multiple pages.
Session is used to maintain user-specific data across multiple pages.
It is created when a user logs in and destroyed when the user logs out.
Session data can be accessed and manipulated using the $_SESSION superglobal variable.
Examples of session data include user ID, username, and shopping cart items.
Q579. What is global container in SAP XI? Transportation process of object from QA to Production?
Global container in SAP XI is used to transport objects between different systems.
Global container is a repository for objects that need to be transported between different systems in SAP XI.
It is used to move objects from development to quality assurance and then to production.
Objects can be transported individually or as part of a transport package.
The global container can be accessed through the Integration Builder or the Enterprise Services Repository.
Examples of objects ...read more
Q580. How to hande load failures in Snowflake
Load failures in Snowflake can be handled by monitoring the load process, identifying the root cause, and taking appropriate actions.
Monitor the load process regularly to identify any failures
Check the error messages and logs to determine the root cause of the failure
Retry the load operation after fixing the issue, such as data format errors or network connectivity problems
Consider using Snowflake's automatic retry feature for transient errors
Utilize Snowflake's error handlin...read more
Q581. Major features used in JAVA 8
Major features in JAVA 8 include lambda expressions, functional interfaces, streams, default methods, and method references.
Lambda expressions allow for more concise code and enable functional programming.
Functional interfaces are interfaces with a single abstract method, used for lambda expressions.
Streams provide a way to work with sequences of elements and support parallel processing.
Default methods allow interfaces to have method implementations.
Method references provide ...read more
Q582. what is document understanding in Uipath
Document understanding in UiPath is the ability to extract data from unstructured documents using AI and machine learning.
It involves using OCR to read and extract data from documents such as invoices, receipts, and contracts.
The extracted data is then validated and processed using machine learning algorithms.
UiPath's Document Understanding framework provides pre-built templates and workflows for common document types.
It can be used to automate processes such as invoice proce...read more
Q583. What is oracle database
Oracle database is a relational database management system developed by Oracle Corporation.
It is a software system used to manage and store data.
It uses Structured Query Language (SQL) to manage data.
It is widely used in enterprise applications.
It provides features like data security, backup and recovery, and scalability.
Examples of Oracle database applications include online banking systems, airline reservation systems, and e-commerce websites.
Q584. what you will do if u are not able to GUI console
If unable to access GUI console, I would troubleshoot the issue by checking network connectivity, restarting the system, or using command-line interface.
Check network connectivity to ensure the GUI console is accessible
Restart the system to resolve any temporary issues
Use command-line interface as an alternative to GUI console
Verify if any firewall or security settings are blocking GUI access
Q585. Who is the first founder of HCL
Shiv Nadar is the first founder of HCL.
Shiv Nadar founded HCL in 1976.
He started the company with an investment of Rs. 187,000.
HCL initially focused on selling calculators before transitioning to IT services.
Q586. Find the combained charected in the given testing exmple : " Testing Testing Testing" , cobained text is "te"
The combined characters in the given testing example 'Testing Testing Testing' is 'te'.
Iterate through the text and check for consecutive characters 'te'.
Combine the characters 'te' whenever they are found together.
Return the combined text 'te' as the result.
Q587. "Hello world" java program to print the count of letter 'l'
A Java program to count the occurrences of the letter 'l' in the string 'Hello world'.
Create a Java program with a main method.
Initialize a String variable with the value 'Hello world'.
Use a loop to iterate through each character in the string and count the occurrences of the letter 'l'.
Print the count of 'l' at the end.
Q588. what are the challenges you have faced during order processing?
Challenges faced during order processing include system errors, communication issues, and customer demands.
System errors causing delays in order processing
Communication issues with customers or internal teams leading to misunderstandings
Customer demands for expedited orders or special requests
Q589. Difference between windows 10 and 11 BSOD How do you do system scan How do you handle the issues which is pending for a long time
Windows 11 has new features like redesigned Start menu, improved multitasking, and better gaming performance compared to Windows 10.
Windows 11 has a redesigned Start menu with a centered layout, compared to the left-aligned Start menu in Windows 10.
Windows 11 offers improved multitasking features like Snap Layouts and Snap Groups, making it easier to organize and switch between multiple windows.
Windows 11 includes DirectStorage technology for faster game load times and better...read more
Q590. Program to sort the input in descending order without using inbuild method/functions
Sort input array of strings in descending order without using inbuilt functions
Iterate through the array and compare each element with the rest to find the largest element
Swap the largest element with the first element, then repeat the process for the remaining elements
Continue this process until the array is sorted in descending order
Q591. What is fragmentation? How do overcome?
Fragmentation is the splitting of data into smaller pieces. It can be overcome by defragmentation.
Fragmentation occurs when data is stored in non-contiguous blocks on a hard drive.
This can slow down computer performance and cause errors.
Defragmentation rearranges the data so that it is stored in contiguous blocks, improving performance.
Fragmentation can also occur in databases, where it can be overcome by rebuilding indexes.
Regular maintenance can help prevent fragmentation.
Q592. What is a deadlock? explain it?
A deadlock is a situation where two or more processes are unable to continue executing because they are waiting for each other to finish.
Deadlocks occur when two or more processes are blocked and unable to proceed.
This can happen when each process is waiting for a resource that the other process has locked.
Deadlocks can be prevented by using techniques such as resource allocation graphs and deadlock detection algorithms.
Examples of resources that can cause deadlocks include s...read more
Q593. what are the difficulties faced during the layout ?
Difficulties faced during layout include space constraints, equipment compatibility, and regulatory compliance.
Space constraints can limit the placement of equipment and affect workflow.
Ensuring equipment compatibility can be challenging when integrating new technologies with existing systems.
Meeting regulatory compliance standards adds complexity to the layout design process.
Q594. What is c what is different between Java and js node Rate yourself in n code
C is a programming language used for system programming and embedded systems.
C is a low-level language with direct access to memory and hardware.
Java is a high-level language that runs on a virtual machine, while Node.js is a runtime environment for JavaScript.
Rating oneself in n code is subjective and depends on individual experience and skill level.
Q595. advantages of spring boot?
Spring Boot provides rapid application development and microservices architecture.
Easy configuration and setup
Embedded servers for faster development
Auto-configuration of dependencies
Supports multiple data sources
Actuator for monitoring and managing applications
Simplifies development of RESTful web services
Enables building of microservices architecture
Provides a wide range of plugins and extensions
Reduces boilerplate code
Promotes best practices and standards
Q596. What you do in Linux environment?
I work with Linux servers, managing and troubleshooting them.
Install and configure Linux servers
Monitor server performance and troubleshoot issues
Manage user accounts and permissions
Automate tasks with shell scripting
Implement security measures
Install and configure software applications
Maintain backups and disaster recovery plans
Q597. How do you create a Spring boot application
To create a Spring Boot application, use Spring Initializr and configure dependencies and properties.
Go to start.spring.io and select the required dependencies and properties
Download the generated project and import it into your IDE
Add your code and run the application
Q598. Agile methodologies, how many projects worked before. Role and responsibilities.
I have worked on 3 Agile projects as a Cognos TM1 Developer. My role involved developing and maintaining TM1 models, collaborating with stakeholders, and ensuring project timelines were met.
Worked on 3 Agile projects as a Cognos TM1 Developer
Developed and maintained TM1 models
Collaborated with stakeholders to gather requirements
Ensured project timelines were met
Q599. What architectures, apart from 8085, do you know?
Q600. 2. Difference between structure and union
Structure is a collection of variables of different data types while union is a collection of variables of same data type.
Structure allocates memory for all its variables while union allocates memory for only one variable at a time.
Structure is used when we want to store different types of data while union is used when we want to store only one type of data at a time.
Structure is accessed using dot (.) operator while union is accessed using arrow (->) operator.
Example of stru...read more
Top HR Questions asked in Viatris
Interview Process at Viatris
Top Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month