IBM
30+ Ariam Door Controls Interview Questions and Answers
Q1. what is comp & comp 3 differance ?
COMP and COMP-3 are data types used in COBOL programming language.
COMP is a binary data type that stores numeric values as binary integers.
COMP-3 is a packed decimal data type that stores numeric values as packed decimal digits.
COMP uses less storage space compared to COMP-3.
COMP-3 is more suitable for decimal arithmetic operations.
COMP-3 values are stored in a packed format, where each digit occupies half a byte.
COMP-3 values can represent both positive and negative numbers.
Q2. we have 2 files eliminate duplicates and send to duplicate files in to another out put file how to achieve it ?
To eliminate duplicates from 2 files and send them to another output file, we can use a combination of file reading, hashing, and file writing.
Read the contents of both files and store them in separate arrays or lists.
Create a hash table or dictionary to keep track of the unique elements in the arrays.
Iterate through the arrays and add each element to the hash table. If the element already exists, skip it.
Write the contents of the hash table to the output file.
If needed, writ...read more
Q3. how to check file is empty or not ?
To check if a file is empty or not, we can use the file's size or read the file and check for any content.
Get the size of the file using file system APIs and check if it is zero.
Read the file and check if it contains any content.
Handle exceptions or errors that may occur during file operations.
Q4. how to check if the server of Facebook is up without opening the browser or app.
Use command line tools like ping or curl to check server status.
Use ping command to check if server is reachable
Use curl command to check if server is responding with HTTP status code 200
Use telnet command to check if server is listening on a specific port
Use monitoring tools like Nagios or Zabbix to automate server status checks
Q5. how many ways data pass jcl to cobol program ?
Data can pass from JCL to COBOL program in multiple ways, such as through input files, system symbols, and program parameters.
Input files: Data can be passed to a COBOL program through input files specified in the JCL.
System symbols: JCL can define system symbols that can be accessed by the COBOL program to retrieve data.
Program parameters: JCL can pass parameters to the COBOL program, which can be used to receive data.
Environment variables: JCL can set environment variables ...read more
Q6. how to data insert or update in table ?
To insert or update data in a table, use SQL statements like INSERT INTO or UPDATE.
For inserting data, use the INSERT INTO statement followed by the table name and column names.
Specify the values to be inserted using the VALUES keyword.
For updating data, use the UPDATE statement followed by the table name.
Set the column values to be updated using the SET keyword.
Use conditions with the WHERE clause to specify which rows to update.
Q7. what is array ? how to load data ?
An array is a data structure that stores a collection of elements of the same type.
Arrays can be used to store and access multiple values using a single variable.
To load data into an array of strings, you can assign values to each element individually or use a loop.
Example: String[] names = {"John", "Jane", "Mike"};
Example: for(int i = 0; i < names.length; i++) { names[i] = "Value" + i; }
Q8. soc 7 abend how to find ? resolve it ?
S0C7 abend is a mainframe error caused by invalid data. It can be resolved by identifying the source of the error and correcting it.
S0C7 abend is caused by invalid data in a numeric field
To resolve it, identify the source of the error and correct it
Common causes include incorrect data types, invalid characters, and overflow
Debugging tools like IBM Debug Tool can help identify the source of the error
Q9. What is the DBMS and What is use of DBMS?
DBMS stands for Database Management System. It is used to manage and organize data in a structured manner.
DBMS is a software system that allows users to define, create, maintain and control access to databases.
It provides a way to store and retrieve data efficiently and effectively.
DBMS helps in maintaining data integrity, security and consistency.
Examples of DBMS include MySQL, Oracle, SQL Server, MongoDB, etc.
Q10. What is network and how many type are ther?
A network is a group of interconnected devices that communicate with each other. There are three types of networks: LAN, WAN, and MAN.
A LAN (Local Area Network) is a network that covers a small area, like a home or office.
A WAN (Wide Area Network) is a network that covers a large area, like a city or country.
A MAN (Metropolitan Area Network) is a network that covers a larger area than a LAN but smaller than a WAN, like a city.
Other types of networks include WLAN (Wireless Loc...read more
Q11. What is the MVC?Describe in brief.
MVC stands for Model-View-Controller. It is a software design pattern used to separate an application's concerns.
Model represents the data and business logic
View displays the data to the user
Controller handles user input and updates the model and view accordingly
MVC promotes separation of concerns and modularity
Examples include Ruby on Rails, ASP.NET MVC, and Spring MVC
Q12. What is turing machine? and what's its use?
Turing machine is a theoretical device that manipulates symbols on a strip of tape according to a table of rules.
Turing machine is a mathematical model of computation that defines the concept of algorithm.
It consists of a tape divided into cells, a read/write head, and a set of rules for transitioning between states.
Turing machines can simulate any algorithmic process, making them a fundamental concept in computer science.
They are used in theoretical computer science to study...read more
Q13. What is c? How it's function work
C is a programming language used for system programming, embedded systems, and game development.
C was developed by Dennis Ritchie at Bell Labs in 1972.
It is a compiled language, meaning that the code is translated into machine-readable instructions before execution.
C is known for its efficiency and low-level control over hardware, making it a popular choice for operating systems and device drivers.
C functions are defined with a return type, name, and parameters, and can be ca...read more
Q14. What is microprocessor and how its work
A microprocessor is a small computer chip that performs arithmetic and logic operations.
Microprocessors are the heart of modern computers and electronic devices.
They are made up of millions of transistors that switch on and off to perform calculations.
Microprocessors fetch instructions from memory, decode them, and execute them.
Examples of microprocessors include Intel's Pentium and AMD's Ryzen processors.
Microprocessors are used in a wide range of applications, from smartpho...read more
Q15. What is micro control and how its work
Micro control is a type of control system that uses microprocessors to control various devices and processes.
Micro control systems are used in various applications such as home automation, industrial automation, and robotics.
They are designed to be compact and efficient, with low power consumption and high processing power.
Micro control systems can be programmed using various programming languages such as C, C++, and assembly language.
They can be used to control various devic...read more
Q16. Embedded systems and how its work
Embedded systems are computer systems designed to perform specific tasks within a larger system.
Embedded systems are often used in devices such as medical equipment, automobiles, and home appliances.
They typically have limited processing power and memory compared to general-purpose computers.
They are designed to be reliable and efficient, often running on low-power processors.
Programming languages commonly used for embedded systems include C and assembly language.
Embedded sys...read more
Q17. What is JWT, describe within 1 minute?
JWT stands for JSON Web Token, a compact and self-contained way to securely transmit information between parties as a JSON object.
JWT is commonly used for authentication and information exchange in web applications.
It consists of three parts: header, payload, and signature.
The header typically consists of the type of token and the signing algorithm.
The payload contains the claims, which are statements about an entity (user) and additional data.
The signature is used to verify ...read more
Q18. what the difference between sql vs nosql
SQL is a relational database management system, while NoSQL is a non-relational database management system.
SQL databases are table-based and have a predefined schema, while NoSQL databases are document-based, key-value pairs, graph databases, or wide-column stores.
SQL databases are good for complex queries and transactions, while NoSQL databases are better for hierarchical data storage and real-time web applications.
Examples of SQL databases include MySQL, Oracle, and Postgre...read more
Q19. microservices with rest api and unit testing
Microservices are a software architecture pattern where applications are broken down into smaller, independent services that communicate over REST APIs. Unit testing is essential for ensuring the functionality of each service.
Microservices architecture involves breaking down applications into smaller, independent services that can be developed, deployed, and scaled independently.
REST APIs are commonly used for communication between microservices, allowing them to interact wit...read more
Q20. What is amplification
Amplification is the process of increasing the magnitude of a signal.
Amplification is commonly used in audio systems to increase the volume of sound.
It can also refer to the process of increasing the power of an electrical signal.
Amplification can be achieved through the use of amplifiers or other electronic devices.
In genetics, amplification refers to the process of making multiple copies of a specific DNA sequence.
Amplification can also occur in natural phenomena, such as t...read more
Q21. Lowest common ancestor of 2 nodes in a tree
The lowest common ancestor of two nodes in a tree is the node that is the closest ancestor to both nodes.
Traverse the tree from the root to find the paths from the root to each node.
Compare the paths to find the last common node between the two paths.
The last common node is the lowest common ancestor.
Q22. Given a number tell me wheather its prime or not
To determine if a number is prime, check if it is divisible by any number other than 1 and itself.
Check if the number is less than 2, if so it is not prime
Loop through numbers from 2 to the square root of the number and check for divisibility
If the number is only divisible by 1 and itself, it is prime
Q23. Find if a string is a palindrome or not.
Check if a string is a palindrome by comparing characters from start and end.
Iterate through the string from start and end simultaneously.
Compare characters at each position, moving towards the center.
If all characters match, the string is a palindrome.
Example: 'racecar' is a palindrome, 'hello' is not.
Q24. What is the use of merge
Merge is used to combine two or more sets of data into a single set.
Merge is commonly used in version control systems to combine different branches of code.
It is also used in databases to combine data from multiple tables.
Merge can be used in sorting algorithms to combine two sorted arrays into a single sorted array.
Q25. What is modulation
Modulation is the process of varying a signal's characteristics to transmit information.
Modulation is used in various communication systems to transmit information over a distance.
It involves varying one or more of the signal's properties such as amplitude, frequency, or phase.
Examples of modulation techniques include amplitude modulation (AM), frequency modulation (FM), and phase modulation (PM).
Q26. lca of given nodes in the tree
LCA (Lowest Common Ancestor) of given nodes in a tree is the node that is the lowest common ancestor of the given nodes.
Traverse the tree to find the paths from the root to each of the given nodes.
Compare the paths to find the last common node, which is the LCA.
If one of the given nodes is the ancestor of the other, return the ancestor node as the LCA.
Q27. What is amplitude
Amplitude is the measure of the height of a wave from its resting position.
Amplitude is the maximum displacement of a wave from its equilibrium position.
It is measured in units of length, such as meters or feet.
In sound waves, amplitude determines the loudness of the sound.
In light waves, amplitude determines the brightness of the light.
Amplitude can be positive or negative, depending on the direction of the displacement.
Q28. Explain defect life cycle
Defect life cycle is the process of identifying, reporting, prioritizing, fixing, and verifying defects in software.
Defect is identified by testing or user feedback
Defect is reported to development team
Defect is prioritized based on severity and impact
Defect is fixed by development team
Defect fix is verified by testing team
Defect is closed if verified or reopened if not fixed properly
Q29. Y use header file gv one eg
Header files are used to declare functions, variables, and constants that are used in multiple source files.
Header files allow for modular programming and code reuse.
They help to avoid code duplication and reduce errors.
Examples of header files include stdio.h, math.h, and string.h.
Header files are included using the #include preprocessor directive.
Q30. What is use
Use is the purpose or function of something.
Use defines the intended purpose of a product or service.
It helps users understand how to utilize the product effectively.
Use can also refer to the act of employing something for a specific task.
For example, the use of a hammer is to drive nails into wood.
Q31. Hoisting and closuer in js
Hoisting is a JavaScript mechanism where variables and function declarations are moved to the top of their containing scope during compilation. Closures are functions that have access to variables from their outer scope even after the outer function has finished executing.
Hoisting moves variable and function declarations to the top of their scope.
Closures allow functions to access variables from their outer scope.
Example of hoisting: console.log(x); var x = 5; // Output: unde...read more
Q32. B.Tech Project Explanation
My B.Tech project was on developing a web-based e-commerce platform.
The platform was built using PHP and MySQL.
It had features like user authentication, product catalog, shopping cart, and payment gateway integration.
I also implemented search and recommendation algorithms to improve user experience.
The project was well-received and got a good grade.
I learned a lot about web development and project management during this project.
Q33. what is sap basis
SAP Basis is the technical foundation for SAP applications, ensuring they run smoothly and efficiently.
SAP Basis includes tasks like system administration, monitoring, performance tuning, and managing interfaces.
It involves configuring and managing the SAP environment, including servers, databases, and security.
SAP Basis professionals are responsible for ensuring the overall health of the SAP system.
Examples of SAP Basis tasks include installing software updates, troubleshoot...read more
Q34. multithreading in java
Multithreading in Java allows multiple threads to execute concurrently, improving performance and responsiveness.
Java provides built-in support for multithreading through the java.lang.Thread class.
Threads can be created by extending the Thread class or implementing the Runnable interface.
Synchronization is important to prevent race conditions and ensure thread safety.
Java also provides high-level concurrency utilities like Executors and Thread Pools.
Example: Creating a new t...read more
Q35. explain design patterns
Design patterns are reusable solutions to common problems in software design.
Design patterns provide a way to create flexible and maintainable software systems.
They help in organizing code, improving code readability, and promoting code reusability.
Examples of design patterns include Singleton, Factory, Observer, and Strategy patterns.
Q36. implement min stack
Implement a stack that supports finding the minimum element in constant time.
Use two stacks - one to store the actual elements and another to store the minimum values at each level.
When pushing an element, compare it with the current minimum and push the smaller value onto the minimum stack.
When popping an element, also pop from the minimum stack if the popped element is the current minimum.
Q37. OOps concept of java
Object-oriented programming concepts in Java focus on classes, objects, inheritance, polymorphism, and encapsulation.
Classes are blueprints for objects
Objects are instances of classes
Inheritance allows a class to inherit properties and behaviors from another class
Polymorphism allows objects to be treated as instances of their parent class
Encapsulation hides the internal state of an object and only exposes necessary functionalities
Q38. Describe Quick sort
Quick sort is a comparison-based sorting algorithm that uses divide and conquer strategy to sort an array.
Divide the array into two sub-arrays based on a pivot element
Recursively sort the sub-arrays
Combine the sorted sub-arrays to get the final sorted array
Example: [3, 6, 8, 10, 1, 2, 1] -> [1, 1, 2, 3, 6, 8, 10]
Q39. Create a linked list
A linked list is a data structure consisting of nodes where each node points to the next node in the sequence.
Create a Node class with data and next pointer
Initialize a head pointer to null
Add nodes by updating next pointers
More about working at IBM
Top HR Questions asked in Ariam Door Controls
Interview Process at Ariam Door Controls
Top Software Engineer Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month