Add office photos
Engaged Employer

Hughes Systique Corporation

3.9
based on 239 Reviews
Filter interviews by

40+ Quess Interview Questions and Answers

Updated 23 Dec 2024
Popular Designations

Q1. Given 9 ball all of which weigh the same except for one, what is the minimum of weighings necessary to find the ball weighs more (or less)?

Ans.

The minimum number of weighings necessary is 2.

  • Divide the 9 balls into 3 groups of 3.

  • Weigh any two groups against each other.

  • If the two groups weigh the same, the heavier ball is in the third group.

  • If one group is heavier, the heavier ball is in that group.

  • Take the heavier group and weigh any two balls against each other.

  • If they weigh the same, the heavier ball is the remaining one.

  • If one ball is heavier, it is the heavier ball.

View 1 answer

Q2. 1. What are the advantages of Microservices?

Ans.

Microservices offer advantages such as scalability, flexibility, and easier maintenance.

  • Scalability: Microservices allow for individual components to be scaled independently, making it easier to handle high traffic.

  • Flexibility: Microservices can be developed and deployed independently, allowing for faster development and deployment cycles.

  • Easier maintenance: Microservices are smaller and more focused, making it easier to identify and fix issues.

  • Example: Netflix uses microserv...read more

Add your answer

Q3. If a rival company tries to use your code against us what will you do?

Ans.

I will ensure that our code is properly protected by implementing security measures and legal actions if necessary.

  • Implement security measures such as encryption and access control to prevent unauthorized access to our code.

  • Monitor for any suspicious activity and take immediate action if any unauthorized access is detected.

  • If necessary, take legal action against the rival company for intellectual property theft.

  • Collaborate with legal and management teams to ensure that our co...read more

Add your answer

Q4. 5. Write a program to get the middle of the linked list in a single iteration? Ans - Two pointers , slow fast

Ans.

Program to get the middle of a linked list in a single iteration using two pointers.

  • Use two pointers, slow and fast, to traverse the linked list

  • Move slow pointer one step at a time and fast pointer two steps at a time

  • When fast pointer reaches the end, slow pointer will be at the middle node

Add your answer
Discover Quess interview dos and don'ts from real experiences

Q5. 8. Singleton in java . And how singleton can be broken

Ans.

Singleton is a design pattern that restricts the instantiation of a class to one object.

  • Singleton pattern is used when we need to ensure that only one instance of a class is created and used throughout the application.

  • To implement Singleton, we make the constructor private and provide a static method to get the instance of the class.

  • Singleton can be broken by using reflection, serialization, and cloning.

  • Reflection can be used to access the private constructor and create a new...read more

Add your answer

Q6. 12. How to switch from one branch to other in git?

Ans.

To switch from one branch to another in git, use the 'git checkout' command.

  • Use 'git checkout' followed by the name of the branch you want to switch to.

  • Make sure to commit or stash any changes before switching branches.

  • Example: 'git checkout new-branch'

Add your answer
Are these interview questions helpful?

Q7. 2. Difference between Linked List and Tree (where what should be used).

Ans.

Linked list is a linear data structure while tree is a hierarchical data structure.

  • Linked list is used when we need to maintain a sequence of elements and perform operations like insertion and deletion at any position.

  • Tree is used when we need to represent a hierarchical structure and perform operations like searching, insertion, and deletion efficiently.

  • Linked list has a single pointer to the next node while tree has multiple pointers to its child nodes.

  • Linked list has a lin...read more

Add your answer

Q8. 0/1 Knapsack Problem Statement

A thief is planning to rob a store and can carry a maximum weight of 'W' in his knapsack. The store contains 'N' items where the ith item has a weight of 'wi' and a value of 'vi'....read more

Add your answer
Share interview questions and help millions of jobseekers 🌟

Q9. Find Duplicates in an Array

Given an array ARR of size 'N', where each integer is in the range from 0 to N - 1, identify all elements that appear more than once.

Return the duplicate elements in any order. If n...read more

Add your answer

Q10. 11. Why do we need maven clean and install?

Ans.

Maven clean removes target directory and install compiles and packages the project

  • Maven clean removes the target directory and all the compiled classes and resources

  • Maven install compiles and packages the project and installs the resulting artifact into the local repository

  • Maven clean and install together ensure that the project is built from scratch and all dependencies are resolved

  • Useful when there are changes in the project dependencies or configuration

Add your answer

Q11. Longest Subarray Zero Sum Problem Statement

Given an array of integers arr, determine the length of the longest contiguous subarray that sums to zero.

Input:

N (an integer, the length of the array)
arr (list of ...read more
Add your answer

Q12. 1. How do you secure your APIs?

Ans.

APIs can be secured using various methods such as authentication, encryption, rate limiting, and input validation.

  • Implement authentication using OAuth or JWT

  • Use HTTPS encryption to protect data in transit

  • Implement rate limiting to prevent DDoS attacks

  • Validate input data to prevent injection attacks

  • Regularly update and patch software to prevent vulnerabilities

Add your answer

Q13. Reverse the String Problem Statement

You are given a string STR which contains alphabets, numbers, and special characters. Your task is to reverse the string.

Example:

Input:
STR = "abcde"
Output:
"edcba"

Input...read more

Add your answer

Q14. 2. What is deadlock? How to resolve it?

Ans.

Deadlock is a situation where two or more threads are blocked and waiting for each other to release resources.

  • Deadlock occurs when two or more threads are waiting for each other to release resources.

  • It can be resolved by using techniques like resource allocation graph, timeout, and prevention.

  • Prevention can be done by avoiding circular wait, hold and wait, and no preemption.

  • Example: Thread A holds resource X and waits for resource Y, while Thread B holds resource Y and waits ...read more

Add your answer

Q15. 4. What is future object in java?

Ans.

A Future object represents the result of an asynchronous computation in Java.

  • Future objects are used to retrieve the result of an asynchronous computation when it becomes available.

  • They provide a way to check if the computation is complete, cancel the computation, and retrieve the result.

  • They are commonly used in multithreaded programming and in Java's Executor framework.

  • Example: Future future = executor.submit(new Callable() { public Integer call() { return 42; }});

  • Example: ...read more

Add your answer

Q16. 3. How hashmap internally works?

Ans.

HashMap is a data structure that stores key-value pairs and uses hashing to retrieve values quickly.

  • HashMap uses hashing to store and retrieve values quickly

  • It uses an array of buckets to store key-value pairs

  • The hash code of the key is used to determine the bucket where the key-value pair is stored

  • If two keys have the same hash code, they are stored in the same bucket as a linked list

  • When retrieving a value, the hash code of the key is used to find the bucket and then the li...read more

Add your answer

Q17. 4. An array and 2 variables x and y are given, print y sub arrays with x elements.

Ans.

Print y sub arrays with x elements from given array and variables.

  • Use a loop to iterate through the array and create subarrays of x elements.

  • Use another loop to print y number of subarrays.

  • Handle edge cases where x or y is greater than the length of the array.

Add your answer
Q18. ...read more

Implement Stack with Linked List

Your task is to implement a Stack data structure using a Singly Linked List.

Explanation:

Create a class named Stack which supports the following operations, each in O(1) time:

Add your answer

Q19. 2. Find the first non repeating character in a string

Ans.

Find the first non-repeating character in a string.

  • Create a hash table to store the frequency of each character in the string.

  • Iterate through the string and check the frequency of each character.

  • Return the first character with a frequency of 1.

Add your answer

Q20. 3. What is spring filter ?

Ans.

Spring filter is an interface used to intercept HTTP requests and responses.

  • Spring filter is used to perform tasks such as logging, security, and caching.

  • It can be used to modify the request or response before it reaches the controller.

  • Examples of Spring filters include CharacterEncodingFilter, CorsFilter, and CsrfFilter.

Add your answer

Q21. 9. What is @SpringBootApplication?

Ans.

A convenience annotation that combines @Configuration, @EnableAutoConfiguration, and @ComponentScan.

  • Used to bootstrap a Spring Boot application.

  • Automatically configures the Spring application based on the dependencies added to the classpath.

  • Scans the package and its sub-packages for components and services.

  • Example: @SpringBootApplication public class MyApplication { public static void main(String[] args) { SpringApplication.run(MyApplication.class, args); } }

Add your answer

Q22. 2. What are the disadvantages?

Ans.

Disadvantages of what? Please specify.

    Add your answer

    Q23. 6. Save vs Persist in hibernate ?

    Ans.

    Save() method inserts a new record into the database, while persist() method can also be used to update an existing record.

    • save() method is used to insert a new record into the database

    • persist() method can also be used to insert a new record, but it can also be used to update an existing record

    • save() method returns the generated ID immediately, while persist() method does not

    • save() method can be called outside of a transaction, while persist() method must be called within a t...read more

    Add your answer

    Q24. 5. Lifecycle of object in hibernate ?

    Ans.

    Hibernate manages object lifecycle through three states: transient, persistent, and detached.

    • When an object is created, it is in the transient state.

    • When the object is saved using session.save() method, it becomes persistent.

    • When the session is closed or the object is explicitly detached using session.evict() method, it becomes detached.

    • Detached objects can be re-attached to a new session using session.update() or session.merge() methods.

    • Objects can also be deleted using sess...read more

    Add your answer

    Q25. 7. Merge intervals problem in java

    Ans.

    Merge overlapping intervals in Java

    • Sort the intervals based on their start time

    • Iterate through the intervals and merge overlapping ones

    • Use a stack to keep track of merged intervals

    Add your answer

    Q26. 6. Stack peek vs Stack pop?

    Ans.

    Stack peek returns the top element without removing it, while stack pop removes and returns the top element.

    • Stack peek is used to check the top element of the stack without removing it.

    • Stack pop is used to remove and return the top element of the stack.

    • Both methods operate on the top element of the stack.

    Add your answer

    Q27. 7. RequestMapping vs Postmapping?

    Ans.

    RequestMapping is used for all HTTP methods while PostMapping is specifically for POST requests.

    • RequestMapping is a general-purpose annotation for mapping HTTP requests to handler methods.

    • PostMapping is a specialized version of RequestMapping that only maps POST requests.

    • RequestMapping can be used for GET, POST, PUT, DELETE, and other HTTP methods.

    • PostMapping is useful when you want to handle only POST requests and ignore other HTTP methods.

    • Example: @RequestMapping(value = "/...read more

    Add your answer

    Q28. 10. RestController vs Controller?

    Ans.

    RestController is used for RESTful web services while Controller is used for traditional web applications.

    • RestController returns data in JSON or XML format while Controller returns data in HTML format.

    • RestController uses @RestController annotation while Controller uses @Controller annotation.

    • RestController is used for building RESTful web services while Controller is used for building traditional web applications.

    • RestController is a specialized version of Controller in Spring...read more

    Add your answer

    Q29. 1. Explain Trees and Binary Search Trees.

    Ans.

    Trees are data structures that store hierarchical data. Binary Search Trees are a type of tree that maintains sorted order.

    • Trees are composed of nodes that have a parent-child relationship.

    • Binary Search Trees have at most two children per node and the left child is always smaller than the parent while the right child is always larger.

    • Binary Search Trees allow for efficient searching, insertion, and deletion operations.

    • Examples of Binary Search Trees include AVL Trees and Red-...read more

    Add your answer

    Q30. 3. Remove duplicates from an array

    Ans.

    Remove duplicates from an array of strings

    • Create a new empty array

    • Loop through the original array and check if the element already exists in the new array

    • If not, add it to the new array

    • Return the new array

    Add your answer

    Q31. 4.Linked list Vs Arraylist

    Ans.

    Linked list is dynamic and efficient for insertion/deletion, while ArrayList is faster for random access.

    • Linked list uses pointers to connect nodes, while ArrayList uses an underlying array.

    • Linked list is better for frequent insertion/deletion, while ArrayList is better for frequent random access.

    • Linked list has O(1) time complexity for insertion/deletion, while ArrayList has O(n) time complexity.

    • Example: Linked list is used in implementing stacks, queues, and hash tables, wh...read more

    Add your answer

    Q32. 3. A real-life example of Tree.

    Ans.

    A family tree is a real-life example of a tree data structure.

    • A family tree has a root node (the oldest ancestor) and branches out to children, grandchildren, etc.

    • Each node can have multiple child nodes but only one parent node.

    • The tree structure allows for easy visualization of relationships and ancestry.

    • Other examples include file systems, organization charts, and decision trees.

    Add your answer

    Q33. Write code for Insertion in a binary tree.

    Ans.

    Code for insertion in a binary tree

    • Create a new node with the given data

    • If the tree is empty, make the new node as root

    • Else, traverse the tree to find the appropriate position to insert the new node

    • If the data is less than the current node, go to the left subtree

    • If the data is greater than the current node, go to the right subtree

    • Repeat until an appropriate position is found

    • Set the new node as the child of the appropriate parent node

    Add your answer

    Q34. 9. What are Abstract classes

    Ans.

    Abstract classes are classes that cannot be instantiated and are meant to be extended by other classes.

    • Abstract classes are declared using the 'abstract' keyword.

    • They can have abstract and non-abstract methods.

    • Abstract methods are declared without a body and must be implemented by the subclass.

    • Abstract classes can have constructors and instance variables.

    • They are useful for creating a common interface for a group of related classes.

    Add your answer

    Q35. 5. Explain the function pointer.

    Ans.

    A function pointer is a variable that stores the memory address of a function.

    • Function pointers allow passing functions as arguments to other functions.

    • They can be used to implement callbacks and event handlers.

    • Function pointers can be used to implement polymorphism in C.

    • Example: int (*funcPtr)(int, int) = &add; where add is a function that takes two integers and returns their sum.

    • Function pointers can also be used to create function tables and switch statements.

    Add your answer

    Q36. 8. Scopes of bean ?

    Ans.

    Scopes of bean refer to the visibility and lifecycle of a bean in a Spring application.

    • There are four scopes of bean in Spring: singleton, prototype, request, and session.

    • Singleton scope creates only one instance of a bean and is the default scope.

    • Prototype scope creates a new instance of a bean every time it is requested.

    • Request scope creates a new instance of a bean for each HTTP request.

    • Session scope creates a new instance of a bean for each HTTP session.

    • Scopes can be defi...read more

    Add your answer

    Q37. 8. Characteristics of static function

    Ans.

    Static functions belong to the class and not to the instance of the class.

    • Can be called without creating an instance of the class

    • Cannot access non-static members of the class

    • Can access other static members of the class

    • Used for utility functions or helper functions

    Add your answer

    Q38. DSA problem to find the count of characters in a string

    Ans.

    Use a hashmap to count the occurrences of each character in the string.

    • Create a hashmap to store character counts

    • Iterate through the string and update counts in the hashmap

    • Return the hashmap with character counts

    Add your answer

    Q39. How does a cell communicates between 2 sites.

    Ans.

    Cells communicate between 2 sites through various signaling pathways, including direct cell-to-cell contact and chemical signaling.

    • Cells can communicate through direct cell-to-cell contact, such as gap junctions or cell adhesion molecules.

    • Cells can also communicate through chemical signaling, such as paracrine signaling (local signaling) or endocrine signaling (long-distance signaling).

    • Examples include neurotransmitters in the nervous system, hormones in the endocrine system,...read more

    Add your answer

    Q40. 6. Explain copy constructor

    Ans.

    Copy constructor creates a new object by copying an existing object.

    • Used to initialize an object with another object of the same class

    • Takes a reference to an object of the same class as a parameter

    • Creates a new object with the same values as the parameter object

    • Deep copy and shallow copy are two types of copy constructors

    Add your answer
    Q41. Can you provide examples of OOP concepts using code, including coding for all the principles of Object-Oriented Programming?
    Add your answer

    Q42. Live coding of sorting algorithms on online compiler . Reverse a string . Reverse a number .

    Ans.

    Live coding of sorting algorithms and reversing a string and number on an online compiler.

    • Use bubble sort, selection sort, or insertion sort for sorting algorithms.

    • For reversing a string, use a loop to iterate through the string and swap the characters.

    • For reversing a number, convert it to a string, reverse the string, and convert it back to a number.

    Add your answer

    Q43. Write code for quick sort

    Ans.

    Quick sort is a divide-and-conquer algorithm that sorts an array by partitioning it into two sub-arrays.

    • Choose a pivot element from the array

    • Partition the array around the pivot element

    • Recursively apply quick sort to the left and right sub-arrays

    • Combine the sorted sub-arrays to get the final sorted array

    Add your answer

    Q44. How will you sync your distributed systems

    Ans.

    I will use a combination of messaging systems, data replication, and versioning to ensure consistency and availability.

    • Use messaging systems like Kafka or RabbitMQ to ensure reliable communication between systems

    • Implement data replication to ensure that data is available on multiple nodes

    • Use versioning to ensure that all nodes are working with the same data

    • Implement conflict resolution strategies to handle conflicts that may arise

    • Use distributed locking mechanisms to prevent ...read more

    Add your answer

    Q45. Programming in C language

    Ans.

    C language is a powerful and efficient programming language commonly used for system programming and embedded systems.

    • C language is a procedural programming language

    • It is widely used for developing operating systems, compilers, and embedded systems

    • C is known for its efficiency and low-level access to memory

    • Example: Declaring an array in C - int arr[5];

    Add your answer

    Q46. Reverse a linked list

    Ans.

    Reverse a linked list by changing the direction of pointers

    • Start with three pointers: current, previous, and next

    • Iterate through the linked list, updating pointers to reverse the direction

    • Update the head of the linked list to be the last node visited

    Add your answer

    Q47. Backup and recovery for rac db instances

    Ans.

    Backup and recovery for RAC DB instances involves using RMAN for backups and restoring from backups in case of failures.

    • Use RMAN for taking backups of RAC DB instances

    • Implement a backup strategy that includes full, incremental, and archive log backups

    • Test the backups regularly to ensure they can be restored successfully

    • In case of failures, restore the database using RMAN backups

    Add your answer

    Q48. Ins and outs of Network

    Ans.

    Network refers to the interconnection of devices for communication and resource sharing.

    • Network is a collection of computers, servers, mainframes, network devices, and other devices connected to one another for sharing data and resources.

    • Types of networks include LAN (Local Area Network), WAN (Wide Area Network), WLAN (Wireless Local Area Network), and VPN (Virtual Private Network).

    • Network protocols like TCP/IP, HTTP, and FTP govern the communication between devices on a netw...read more

    Add your answer

    Q49. factorial of a number

    Ans.

    Factorial of a number is the product of all positive integers less than or equal to that number.

    • Factorial of 0 is 1 (0! = 1)

    • Factorial of a positive integer n is n * (n-1) * (n-2) * ... * 1

    • Factorial is denoted by the symbol '!'

    Add your answer
    Contribute & help others!
    Write a review
    Share interview
    Contribute salary
    Add office photos

    Interview Process at Quess

    based on 29 interviews
    Interview experience
    4.2
    Good
    View more
    Interview Tips & Stories
    Ace your next interview with expert advice and inspiring stories

    Top Interview Questions from Similar Companies

    3.7
     • 630 Interview Questions
    3.8
     • 400 Interview Questions
    3.7
     • 340 Interview Questions
    4.1
     • 155 Interview Questions
    3.3
     • 142 Interview Questions
    3.8
     • 135 Interview Questions
    View all
    Top Hughes Systique Corporation Interview Questions And Answers
    Share an Interview
    Stay ahead in your career. Get AmbitionBox app
    qr-code
    Helping over 1 Crore job seekers every month in choosing their right fit company
    70 Lakh+

    Reviews

    5 Lakh+

    Interviews

    4 Crore+

    Salaries

    1 Cr+

    Users/Month

    Contribute to help millions

    Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

    Follow us
    • Youtube
    • Instagram
    • LinkedIn
    • Facebook
    • Twitter