Add office photos
Engaged Employer

IBS Software Services

3.6
based on 595 Reviews
Filter interviews by

60+ Mu Sigma Interview Questions and Answers

Updated 15 Jan 2025
Popular Designations

Q1. There are 10 apples in my hand ,from these apples ,2 of them are much smaller than others .. what are the possibilities to take that smaller apples with easy method ;that means reduce the no of terms maximum .....

read more
Ans.

There are 10 apples in hand, 2 are smaller. How to easily identify them?

  • Look for any visible differences

  • Weigh the apples to find the lighter ones

  • Compare the size of each apple with a known size

  • Use a caliper to measure the size of each apple

Add your answer

Q2. How would you create the user stories for an app that tracks expenses?

Ans.

To create user stories for an expense tracking app, consider the needs of different user roles and prioritize key features.

  • Identify user roles such as individual users, managers, and accountants

  • Prioritize features like capturing receipts, categorizing expenses, generating reports

  • Create user stories for each role and feature, e.g., 'As an individual user, I want to easily capture and categorize my expenses'

  • Include acceptance criteria for each user story, e.g., 'Expense should ...read more

View 1 answer

Q3. How will you develop an application which shows all airports in the country in a map. User needs to login and report any incidents happened in a particular airport

Ans.

Develop an app to show all airports in a country on a map and allow users to report incidents after logging in.

  • Use a map API like Google Maps or Mapbox to display all airports in the country

  • Implement a login system for users to report incidents

  • Create a form for users to report incidents with fields like airport name, incident type, and description

  • Store incident reports in a database for future reference and analysis

Add your answer

Q4. What Java class loaders?

Ans.

Java class loaders are responsible for loading classes during runtime.

  • Java class loaders are responsible for loading classes during runtime.

  • There are three types of class loaders: Bootstrap, Extension, and System.

  • Custom class loaders can also be created to load classes from non-standard sources.

  • Class loaders follow a delegation model where they first check if a class has already been loaded before attempting to load it again.

  • Class loaders can also be used to enforce security ...read more

Add your answer
Discover Mu Sigma interview dos and don'ts from real experiences

Q5. Accrued income and accrued expense under which head it is shown under balance sheet

Ans.

Accrued income is shown under the asset side of the balance sheet, while accrued expenses are shown under the liability side.

  • Accrued income is recorded as a current asset on the balance sheet, representing revenue that has been earned but not yet received.

  • Accrued expenses are recorded as a current liability on the balance sheet, representing expenses that have been incurred but not yet paid.

  • Accrued income increases the total assets of the company, while accrued expenses incre...read more

Add your answer

Q6. What are the positives and negatives of microservice architecture

Ans.

Microservice architecture offers flexibility and scalability but also adds complexity and requires careful management.

  • Positives: flexibility, scalability, fault isolation, independent deployment, technology diversity

  • Negatives: increased complexity, higher operational overhead, potential for communication issues, requires careful management

  • Example: Netflix uses microservices to handle millions of users and provide personalized recommendations

  • Example: Amazon's microservices arc...read more

Add your answer
Are these interview questions helpful?

Q7. Cloud technologies you are familiar with?

Ans.

I am familiar with AWS, Azure, and Google Cloud Platform.

  • Experience with AWS services such as EC2, S3, Lambda, and RDS

  • Familiarity with Azure services like Virtual Machines, Blob Storage, and Functions

  • Knowledge of Google Cloud Platform services such as Compute Engine, Cloud Storage, and Cloud Functions

Add your answer

Q8. How to validate that the URL loaded is correct or not?

Ans.

To validate the correct URL loaded, check the current URL in the browser.

  • Get the current URL from the browser using driver.getCurrentUrl() method in Selenium.

  • Compare the current URL with the expected URL to validate correctness.

  • Use assertions or conditional statements to confirm if the URL is correct.

  • Consider handling any redirects or dynamic URLs that may affect validation.

  • Utilize regular expressions for more flexible URL validation.

Add your answer
Share interview questions and help millions of jobseekers 🌟

Q9. How the job is beneficial to job seekers who has applied for it ?

Ans.

The job of a Business Analyst is beneficial for job seekers as it offers a challenging and rewarding career with opportunities for growth and development.

  • Provides exposure to various industries and domains

  • Opportunities to work with cross-functional teams

  • Develops analytical and problem-solving skills

  • Enhances communication and presentation skills

  • Offers competitive salaries and benefits

  • Potential for career advancement and leadership roles

Add your answer

Q10. Difference between IATA and airline and its relationship?

Ans.

IATA is a trade association for airlines while airlines are companies that operate flights. They have a business relationship.

  • IATA stands for International Air Transport Association and is a trade association for airlines.

  • Airlines are companies that operate flights and provide air transportation services to passengers and cargo.

  • IATA sets standards and regulations for the airline industry and provides services to its members such as training and consulting.

  • Airlines are members...read more

Add your answer

Q11. How to implement spring security in spring boot application

Ans.

Implementing Spring Security in a Spring Boot application involves configuring security settings and adding dependencies.

  • Add spring-boot-starter-security dependency in pom.xml

  • Create a class extending WebSecurityConfigurerAdapter to configure security settings

  • Use @EnableWebSecurity annotation to enable Spring Security

  • Define authentication and authorization rules in configure(HttpSecurity http) method

Add your answer

Q12. What is prepain income and prepaid expenses

Ans.

Prepaid income is income received in advance, while prepaid expenses are expenses paid in advance.

  • Prepaid income is income received before it is earned, such as subscription fees paid in advance.

  • Prepaid expenses are expenses paid for in advance, like insurance premiums or rent.

  • Both prepaid income and prepaid expenses are recorded as assets on the balance sheet until they are earned or used.

Add your answer

Q13. What is going concern concept and matching concept

Ans.

Going concern concept is the assumption that a company will continue to operate in the foreseeable future, while matching concept is the principle of matching expenses with revenues in the same accounting period.

  • Going concern concept assumes that a company will continue to operate for the foreseeable future without the need to liquidate assets or be forced out of business.

  • Matching concept states that expenses should be recognized in the same period as the revenues they help g...read more

Add your answer

Q14. Why should we go for inversion of control?

Ans.

Inversion of control promotes loose coupling and modular design.

  • IoC allows for easier testing and maintenance.

  • It promotes separation of concerns and reduces code duplication.

  • IoC containers can manage object creation and dependencies.

  • Examples include Spring Framework, Unity, and Ninject.

Add your answer

Q15. Tds on purchase of land from an individual for ₹10000000

Ans.

TDS on purchase of land from an individual for ₹10000000 is applicable.

  • TDS rate on purchase of land from an individual is 1% if the value exceeds ₹50 lakhs.

  • In this case, TDS amount would be ₹100000 (1% of ₹10000000).

  • The buyer is required to deduct TDS at the time of making payment to the seller.

  • TDS should be deposited with the government and TDS certificate should be issued to the seller.

Add your answer

Q16. What is the life cycle of cargo ?

Ans.

Cargo life cycle involves various stages from production to delivery.

  • Production of goods

  • Packaging and labeling

  • Loading onto transportation

  • Transportation to destination

  • Unloading and storage

  • Customs clearance

  • Delivery to end customer

Add your answer

Q17. Tell me about Import and export operations

Ans.

Import and export operations involve transferring data or files between different systems or formats.

  • Import operations involve bringing data or files into a system or application.

  • Export operations involve sending data or files out of a system or application.

  • Import and export operations are commonly used in software applications to transfer data between different formats or systems.

  • Examples of import and export operations include importing a CSV file into a database, exporting...read more

View 1 answer

Q18. What are the scopes of a spring bean?

Ans.

Scopes define the lifecycle of a Spring bean.

  • There are 5 scopes in Spring: Singleton, Prototype, Request, Session, and Global Session.

  • Singleton creates only one instance per Spring container.

  • Prototype creates a new instance every time it is requested.

  • Request creates a new instance for each HTTP request.

  • Session creates a new instance for each HTTP session.

  • Global Session creates a new instance for each global HTTP session.

  • Scopes can be defined using the @Scope annotation or in ...read more

Add your answer

Q19. Java Streams question to find the total number of employees that have salary greater than 50000

Ans.

Use Java Streams to find total employees with salary > 50000

  • Filter employees with salary > 50000 using stream.filter()

  • Count the number of employees using stream.count()

Add your answer

Q20. Count occurences of words in a string

Ans.

Count the occurrences of words in a string.

  • Split the string into words using whitespace as a delimiter.

  • Create a dictionary to store the word count.

  • Iterate through the words and increment the count in the dictionary.

  • Return the dictionary.

Add your answer

Q21. Due date of filing income tax return for companies

Ans.

Companies must file their income tax return by the 15th day of the 3rd month after the end of their fiscal year.

  • Companies must file their income tax return by the 15th day of the 3rd month after the end of their fiscal year.

  • For example, if a company's fiscal year ends on December 31st, the income tax return would be due on March 15th.

  • Extensions may be available in certain circumstances, but the initial due date is typically the 15th day of the 3rd month after the fiscal year ...read more

Add your answer

Q22. Difference between ISO 27001 and SOC2 Type 2 audit

Ans.

ISO 27001 focuses on information security management system while SOC2 Type 2 audit focuses on controls related to security, availability, processing integrity, confidentiality, and privacy.

  • ISO 27001 is an international standard that focuses on establishing, implementing, maintaining, and continually improving an information security management system (ISMS).

  • SOC2 Type 2 audit is a report based on the Trust Services Criteria, which focuses on controls related to security, avai...read more

Add your answer

Q23. What are the languages u know?

Ans.

I know multiple programming languages including Java, Python, and C++.

  • Java

  • Python

  • C++

Add your answer

Q24. What is BRS and Income tax due dates

Ans.

BRS stands for Bank Reconciliation Statement. Income tax due dates vary by country and type of taxpayer.

  • BRS is a statement prepared to reconcile the balance as per company's books with the balance as per bank statement.

  • Income tax due dates differ by country and type of taxpayer, usually falling on specific dates throughout the year.

  • For example, in the US, individual income tax returns are due by April 15th each year.

  • In India, the due date for filing income tax returns for ind...read more

Add your answer

Q25. What is the ASM message ?

Ans.

ASM message stands for Application System Message.

  • ASM messages are used to communicate between different software applications.

  • They are used to exchange data and commands.

  • ASM messages can be sent synchronously or asynchronously.

  • They are commonly used in distributed systems.

  • Examples of ASM messages include HTTP requests and responses, SOAP messages, and JMS messages.

Add your answer

Q26. How to read data from an XL file using selenium

Ans.

You can read data from an Excel file using Apache POI library in Selenium.

  • Use Apache POI library to interact with Excel files

  • Create a FileInputStream object to read the Excel file

  • Create a Workbook object to represent the Excel file

  • Get the desired sheet from the Workbook

  • Iterate through rows and cells to read data

Add your answer

Q27. The various annotations used in Springboot @Entity, @RestController etc

Ans.

Annotations in Springboot like @Entity, @RestController are used for defining classes and endpoints respectively.

  • Annotations like @Entity are used to define JPA entities in Springboot.

  • Annotations like @RestController are used to define RESTful web services endpoints.

  • Annotations like @Autowired are used for dependency injection in Springboot.

Add your answer

Q28. What is the difference between cloud and LAN?

Ans.

Cloud is a network of remote servers hosted on the internet to store, manage, and process data, while LAN is a local area network that connects computers in a limited area.

  • Cloud is accessed over the internet, while LAN is a local network within a specific physical location.

  • Cloud allows for scalability and flexibility in terms of resources, while LAN is limited by its physical boundaries.

  • Examples of cloud services include Amazon Web Services (AWS) and Microsoft Azure, while LA...read more

Add your answer

Q29. Readiness to work under pressure and stretched timings

Ans.

I thrive in high-pressure environments and am accustomed to working long hours when necessary.

  • I have experience working in fast-paced environments where deadlines are tight.

  • I am able to prioritize tasks effectively to ensure timely completion.

  • I am adaptable and can handle unexpected challenges with a calm and focused approach.

  • I have successfully managed projects with demanding timelines, such as implementing a new system within a short timeframe.

  • I believe that pressure can br...read more

Add your answer

Q30. Checked and unchecked expections with example

Ans.

Checked exceptions are checked at compile time, while unchecked exceptions are not.

  • Checked exceptions must be either caught or declared in the method signature using 'throws'

  • Unchecked exceptions do not need to be caught or declared

  • Example of checked exception: IOException

  • Example of unchecked exception: NullPointerException

Add your answer

Q31. Reason to change, what you know about IBS etc.

Ans.

IBS is a common digestive disorder. Change due to better understanding of the condition and new treatment options.

  • IBS is short for Irritable Bowel Syndrome

  • It is a chronic condition that affects the large intestine

  • Symptoms include abdominal pain, bloating, and changes in bowel movements

  • Reasons for changing may include new research on the condition, better understanding of triggers, and new treatment options

  • Examples of treatment options include dietary changes, medication, and ...read more

Add your answer

Q32. Swap two strings without third variable

Ans.

Swap two strings without using a third variable

  • Use XOR operation to swap characters of the strings in place

  • Loop through each character of the strings and perform XOR operation

  • Example: strings = ['hello', 'world'], after swapping: strings = ['world', 'hello']

Add your answer

Q33. How the BCMS is implemented

Ans.

BCMS is implemented through a structured approach involving planning, implementation, monitoring, and continual improvement.

  • Develop a BCMS policy outlining objectives and scope

  • Conduct a risk assessment to identify threats and vulnerabilities

  • Implement controls to mitigate risks

  • Train employees on BCMS procedures and protocols

  • Regularly test and evaluate the effectiveness of the BCMS

  • Review and update the BCMS as needed based on changes in the organization or external factors

Add your answer

Q34. Due dates of filing gst return

Ans.

GST returns are typically due on the 20th of the following month.

  • GST returns are usually due on the 20th of the month following the tax period.

  • For example, the GST return for the month of January would typically be due on February 20th.

  • Late filing of GST returns can result in penalties and interest charges.

Add your answer

Q35. add two numbers using microprocessor.

Ans.

To add two numbers using a microprocessor, perform arithmetic operations using the microprocessor's instruction set.

  • Load the two numbers into registers

  • Use the microprocessor's addition instruction to add the numbers

  • Store the result in a register or memory location

Add your answer

Q36. Memory management and garbage collection in general

Ans.

Memory management in Java involves automatic garbage collection to reclaim memory used by objects no longer in use.

  • Java uses automatic garbage collection to reclaim memory used by objects no longer in use

  • Garbage collection is performed by the JVM's garbage collector

  • Memory leaks can occur if objects are not properly dereferenced

  • Java provides the 'finalize()' method for objects to perform cleanup before being garbage collected

Add your answer

Q37. What is the oops conceptv!

Ans.

OOPs is a programming paradigm based on the concept of objects that interact with each other.

  • OOPs stands for Object-Oriented Programming.

  • It focuses on creating objects that have properties and methods.

  • Encapsulation, inheritance, and polymorphism are the main pillars of OOPs.

  • Encapsulation is the process of hiding the internal details of an object from the outside world.

  • Inheritance allows a new class to be based on an existing class.

  • Polymorphism allows objects to take on multip...read more

Add your answer

Q38. sql- different joins with example

Ans.

Different types of SQL joins with examples

  • Inner Join: Returns rows when there is a match in both tables

  • Left Join: Returns all rows from the left table and the matched rows from the right table

  • Right Join: Returns all rows from the right table and the matched rows from the left table

  • Full Outer Join: Returns rows when there is a match in either table

Add your answer

Q39. Write a program to find duplicate items in an int array.

Add your answer

Q40. difference between prdicate & consumer?

Ans.

Predicate is a functional interface that represents a boolean-valued function, while Consumer is a functional interface that represents an operation that accepts a single input argument and returns no result.

  • Predicate is used for filtering elements based on a condition, while Consumer is used for performing actions on elements.

  • Predicate has a test() method to evaluate a condition, while Consumer has an accept() method to perform an action.

  • Example: Predicate isEven = num -> nu...read more

Add your answer

Q41. Palindorme -Reverse a string

Ans.

Reverse a string to check if it is a palindrome.

  • Create a function that takes a string as input

  • Reverse the string using built-in functions or manually

  • Compare the reversed string with the original string to check if it is a palindrome

Add your answer

Q42. AWS services used in my previous project

Ans.

In my previous project, I used AWS services such as EC2, S3, and RDS for hosting, storage, and database management.

  • EC2 for hosting application servers

  • S3 for storing and retrieving files

  • RDS for managing relational databases

Add your answer

Q43. Explain the OOPS concept of Java in detail

Ans.

OOPS concept in Java refers to Object-Oriented Programming principles like Inheritance, Encapsulation, Polymorphism, and Abstraction.

  • Inheritance: Allows a class to inherit properties and behavior from another class. Example: class B extends class A.

  • Encapsulation: Bundling data and methods that operate on the data into a single unit. Example: private variables with public methods.

  • Polymorphism: Ability of a method to do different things based on the object it is acting upon. Ex...read more

Add your answer

Q44. Tds on professional payment

Ans.

TDS on professional payments is a tax deducted at source on payments made to professionals for their services.

  • TDS rate on professional payments is usually 10%.

  • It is applicable when the payment exceeds a certain threshold amount.

  • The person making the payment is responsible for deducting TDS and depositing it with the government.

  • Failure to deduct TDS can lead to penalties and legal consequences.

Add your answer

Q45. Mat and its application

Ans.

MAT stands for Market Access Tool, used in finance for analyzing market trends and making investment decisions.

  • MAT is a software tool that helps finance professionals analyze market data and trends.

  • It can be used to track stock prices, monitor market volatility, and make informed investment decisions.

  • MAT may also include features for risk management and portfolio optimization.

  • Examples of MAT tools include Bloomberg Terminal, Thomson Reuters Eikon, and FactSet.

Add your answer

Q46. How to perform Mouse actions

Ans.

Mouse actions can be performed using Selenium WebDriver by using Actions class

  • Create an instance of Actions class

  • Use methods like moveToElement, click, doubleClick, contextClick, dragAndDrop, etc.

  • Perform the desired action by calling the respective method on the Actions object

Add your answer

Q47. Analyze a SOC2 Report

Ans.

A SOC2 report is an audit report that attests to the controls in place at a service organization relevant to security, availability, processing integrity, confidentiality, and privacy.

  • Review the scope of the report to understand the services covered

  • Examine the auditor's opinion on the effectiveness of controls

  • Look for any exceptions or deficiencies noted in the report

  • Check the date of the report to ensure it is current

  • Assess any remediation plans or follow-up actions recommen...read more

Add your answer

Q48. Difference between interface and abstract

Ans.

Interface defines a contract while abstract class provides partial implementation.

  • Interface only contains method signatures while abstract class can have both abstract and non-abstract methods.

  • A class can implement multiple interfaces but can only inherit from one abstract class.

  • Interfaces are used for achieving multiple inheritance while abstract classes are used for code reusability.

  • An interface cannot have a constructor while an abstract class can have one.

  • An interface can...read more

Add your answer

Q49. Explain OOPs concepts

Ans.

OOPs concepts refer to the principles of Object-Oriented Programming, including encapsulation, inheritance, polymorphism, and abstraction.

  • Encapsulation: Bundling data and methods that operate on the data into a single unit (object).

  • Inheritance: Allowing a new class to inherit properties and behavior from an existing class.

  • Polymorphism: The ability for objects of different classes to respond to the same message in different ways.

  • Abstraction: Hiding the complex implementation d...read more

Add your answer

Q50. Explain Oops concept

Ans.

Oops concept is a programming paradigm that focuses on objects and their interactions to solve complex problems.

  • Oops stands for Object-Oriented Programming

  • It emphasizes the use of classes and objects

  • Encapsulation, inheritance, and polymorphism are key principles of OOP

  • Objects have properties (attributes) and behaviors (methods)

  • Example: In a banking system, a class 'Account' can have attributes like account number and balance, and methods like deposit and withdraw

Add your answer
Asked in
SSE Interview

Q51. Difference between HashMap and HashTable

Ans.

HashMap is non-synchronized and allows null values, while HashTable is synchronized and doesn't allow null values.

  • HashMap is faster than HashTable due to non-synchronization.

  • HashMap allows null values for both key and value.

  • HashTable doesn't allow null values for key or value.

  • HashMap is preferred for single-threaded applications.

  • HashTable is preferred for multi-threaded applications.

  • Both use key-value pairs to store and retrieve data.

Add your answer

Q52. Design pattern used in the project?

Ans.

Singleton design pattern was used in the project.

  • Ensures a class has only one instance and provides a global point of access to it

  • Used when only one instance of a class is needed throughout the system

  • Example: Database connection manager, Logger classes

Add your answer

Q53. Spring IOC containers explain

Ans.

Spring IOC containers are responsible for managing the instantiation of objects and their dependencies in a Spring application.

  • IOC stands for Inversion of Control, which means that the control of object creation is inverted from the application code to the Spring framework.

  • There are two main types of Spring IOC containers: BeanFactory and ApplicationContext.

  • BeanFactory is the simplest container, providing basic support for DI (Dependency Injection) and lifecycle management.

  • Ap...read more

Add your answer

Q54. Explain OOP Concepts with Example.

Ans.

OOP Concepts are fundamental principles in object-oriented programming that help in organizing code efficiently.

  • Encapsulation: Bundling data and methods that operate on the data into a single unit (class). Example: Class Car with properties like make, model, and methods like start(), stop().

  • Inheritance: Allows a class to inherit properties and methods from another class. Example: Class SUV inheriting from class Car.

  • Polymorphism: Ability to present the same interface for diffe...read more

Add your answer

Q55. Explain projects

Ans.

Projects are specific tasks or assignments that require planning, execution, and completion within a set timeframe.

  • Projects involve a defined scope, timeline, and budget.

  • They often require collaboration with team members or stakeholders.

  • Examples include developing a new software application, implementing a website redesign, or creating a marketing campaign.

Add your answer

Q56. Explain Rxjs, observable, subject

Ans.

Rxjs is a library for reactive programming using observables and subjects.

  • Observables are streams of data that can be subscribed to.

  • Subjects are both an observable and an observer, allowing for multicasting.

  • Rxjs provides operators for manipulating and transforming data streams.

  • Reactive programming allows for asynchronous and event-driven programming.

  • Example: An observable can be created from an HTTP request and subscribed to for the response data.

Add your answer

Q57. ERP implementation process

Ans.

The ERP implementation process involves planning, customization, testing, training, and deployment.

  • Planning phase involves defining project scope, goals, and timeline.

  • Customization phase includes configuring the ERP system to meet specific business needs.

  • Testing phase ensures the system functions correctly and meets requirements.

  • Training phase involves educating users on how to use the ERP system effectively.

  • Deployment phase involves rolling out the ERP system to all users an...read more

Add your answer

Q58. Oops Concepts of Java

Ans.

Oops Concepts of Java are fundamental principles of object-oriented programming.

  • Encapsulation: Bundling data and methods that operate on the data into a single unit.

  • Inheritance: Allows a class to inherit properties and behavior from another class.

  • Polymorphism: Ability of a method to do different things based on the object it is acting upon.

  • Abstraction: Hiding the implementation details and showing only the necessary features of an object.

Add your answer

Q59. Alert handling in selenium

Ans.

Alert handling in Selenium involves handling pop-up alerts, confirmation alerts, and prompt alerts.

  • Use driver.switchTo().alert() method to handle alerts

  • To accept an alert, use alert.accept() method

  • To dismiss an alert, use alert.dismiss() method

  • To get text from an alert, use alert.getText() method

  • To send text to a prompt alert, use alert.sendKeys() method

Add your answer

Q60. App Store Release process

Ans.

The App Store release process involves submitting the app for review, ensuring it meets guidelines, and waiting for approval.

  • Submit the app for review through App Store Connect

  • Ensure the app meets Apple's guidelines and requirements

  • Wait for approval from Apple before the app can be published

  • Consider factors like app store optimization (ASO) and marketing strategies for a successful launch

Add your answer

Q61. Metaspace in java

Ans.

Metaspace is a part of the Java HotSpot VM memory where class metadata is stored.

  • Metaspace replaces the permanent generation (PermGen) in Java 8 and later versions.

  • It is used to store class metadata such as class names, method names, field names, annotations, etc.

  • Metaspace is dynamically resized by the JVM based on the application's demand.

  • You can monitor Metaspace usage using tools like JConsole or VisualVM.

Add your answer

Q62. Explain threat lifecycle in java

Ans.

Threat lifecycle in Java involves the stages of identification, prevention, detection, response, and recovery.

  • Identification: Recognizing potential threats and vulnerabilities in the Java application.

  • Prevention: Implementing security measures to mitigate the identified threats.

  • Detection: Monitoring the application for any signs of security breaches or attacks.

  • Response: Taking immediate action to address and mitigate the detected threats.

  • Recovery: Restoring the application's f...read more

Add your answer

Q63. Waits in selenium

Ans.

Waits in Selenium are used to make the automation script wait for a certain condition to be met before proceeding.

  • Implicit Wait: Waits for a certain amount of time before throwing a NoSuchElementException.

  • Explicit Wait: Waits for a certain condition to be met before proceeding.

  • Fluent Wait: Waits for a condition with a defined maximum amount of time.

  • Thread.sleep(): Pauses the execution for a specified amount of time.

Add your answer

Q64. Internal working of hashmap

Ans.

HashMap is a data structure that stores key-value pairs and uses hashing to quickly retrieve values based on keys.

  • HashMap internally uses an array of linked lists to store key-value pairs.

  • When a key-value pair is added, the key is hashed to determine the index in the array where it will be stored.

  • If multiple keys hash to the same index, a linked list is used to handle collisions.

  • To retrieve a value, the key is hashed again to find the corresponding index and then the linked l...read more

Add your answer

Q65. Oops concept in python.

Ans.

Oops concept in Python refers to Object-Oriented Programming principles like inheritance, encapsulation, polymorphism, and abstraction.

  • Python supports object-oriented programming (OOP) concepts like classes, objects, inheritance, encapsulation, and polymorphism.

  • Inheritance allows a class to inherit attributes and methods from another class.

  • Encapsulation restricts access to certain components of an object, preventing direct modification.

  • Polymorphism allows objects to be treate...read more

Add your answer
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos

Interview Process at Mu Sigma

based on 42 interviews in the last 1 year
Interview experience
4.4
Good
View more
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Interview Questions from Similar Companies

3.9
 • 3.9k Interview Questions
4.0
 • 466 Interview Questions
3.6
 • 205 Interview Questions
3.9
 • 191 Interview Questions
3.3
 • 142 Interview Questions
4.2
 • 137 Interview Questions
View all
Top IBS Software Services Interview Questions And Answers
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
70 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions
Get AmbitionBox app

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter