Add office photos
Employer?
Claim Account for FREE

Incedo

3.3
based on 893 Reviews
Filter interviews by

100+ Interview Questions and Answers

Updated 11 Dec 2024
Popular Designations

Q1. DSA - Nth Fibonacci no with memoization, Find duplicate node in Linked list, Binary tree DSA questions, Project based tech questions, OOPS, Puzzle

Ans.

Interview questions for Software Engineer position covering DSA, project-based tech questions, OOPS, and puzzle.

  • Be prepared to answer DSA questions such as finding the Nth Fibonacci number with memoization, finding duplicate nodes in a linked list, and binary tree DSA questions.

  • Expect project-based tech questions that may require you to explain your approach to solving a particular problem.

  • Brush up on OOPS concepts and be ready to apply them to real-world scenarios.

  • Be prepare...read more

View 3 more answers

Q2. Write a query to find out the 2nd largest salary from Employees

Ans.

Query to find 2nd largest salary from Employees

  • Use ORDER BY and LIMIT

  • Exclude the highest salary using subquery

  • Handle cases where there are ties

View 1 answer

Q3. what is shadow DOM? what are synthetic Events? What is UNIT testing?

Ans.

Shadow DOM is a way to encapsulate the styling and structure of a web component, synthetic events are events created by the browser to mimic real events, and unit testing is a method to test individual units or components of a software.

  • Shadow DOM allows for scoped styles and markup within a web component.

  • Synthetic events are events like 'click' or 'change' that are created by the browser to simulate user interactions.

  • Unit testing involves testing individual units or component...read more

Add your answer

Q4. Difference between hashmap and concurrent hashmap?

Ans.

Hashmap is not thread-safe while Concurrent Hashmap is thread-safe.

  • Hashmap is not suitable for multi-threaded environments as it can lead to race conditions and data inconsistencies.

  • Concurrent Hashmap allows multiple threads to access and modify the map concurrently without any data inconsistencies.

  • Concurrent Hashmap uses a technique called lock striping to achieve thread-safety.

  • Concurrent Hashmap is slower than Hashmap due to the overhead of maintaining thread-safety.

  • Use Has...read more

Add your answer
Discover null interview dos and don'ts from real experiences
Asked in
SME Interview

Q5. What is Capital market, define debt securities, are you comfortable working in Night Shifts, what is custodian, and who is broker?

Ans.

Capital market is a platform where companies and governments raise funds through debt and equity securities. Debt securities are loans that investors provide to the issuer.

  • Capital market is a platform for raising funds through securities

  • Debt securities are loans provided by investors to the issuer

  • Working in night shifts is comfortable for me

  • Custodian is a financial institution that holds securities on behalf of clients

  • Broker is a person or firm that buys and sells securities ...read more

View 1 answer

Q6. What do you understand by market capitalisation?

Ans.

Market capitalisation is the total value of a company's outstanding shares.

  • Market cap is calculated by multiplying the current stock price by the total number of outstanding shares.

  • It is used to determine the size of a company and its overall worth.

  • Companies with higher market caps are generally considered more stable and less risky investments.

  • For example, Apple Inc. has a market cap of over $2 trillion as of 2021.

  • Market cap can fluctuate based on changes in stock price and ...read more

View 1 answer
Are these interview questions helpful?

Q7. Difference between Hashtable and hashmap?

Ans.

Hashtable is synchronized while hashmap is not.

  • Hashtable is thread-safe while hashmap is not.

  • Hashtable does not allow null keys or values while hashmap allows one null key and multiple null values.

  • Hashtable is slower than hashmap due to synchronization.

  • Hashtable is a legacy class while hashmap is a newer implementation.

Add your answer

Q8. How to calculate Net Asset Value?

Ans.

Net Asset Value is calculated by subtracting liabilities from assets and dividing by the number of outstanding shares.

  • Calculate the total value of all assets

  • Subtract the total value of all liabilities

  • Divide the result by the number of outstanding shares

  • NAV = (Total Assets - Total Liabilities) / Number of Outstanding Shares

  • Example: If a company has $10 million in assets and $5 million in liabilities, with 1 million outstanding shares, the NAV would be $5 per share.

View 2 more answers
Share interview questions and help millions of jobseekers 🌟

Q9. what is STP, HSRP,FRRP, what is the difference between hsrp and vrrp and why hsrp is better than vrrf

Ans.

STP, HSRP, and FRRP are network protocols used for redundancy and failover. HSRP and VRRP are similar but HSRP is preferred.

  • STP (Spanning Tree Protocol) prevents loops in a network by disabling redundant links

  • HSRP (Hot Standby Router Protocol) and VRRP (Virtual Router Redundancy Protocol) provide redundancy by allowing multiple routers to share a virtual IP address

  • FRRP (Fast Router Redundancy Protocol) is a Cisco proprietary protocol that provides faster failover than HSRP an...read more

Add your answer

Q10. Difference between Private Equity and Public Equity?

Ans.

Private equity involves investing in private companies, while public equity involves investing in publicly traded companies.

  • Private equity firms invest in companies that are not publicly traded

  • Public equity involves buying shares of publicly traded companies

  • Private equity firms typically acquire a controlling stake in the company they invest in

  • Public equity investors do not have control over the company

  • Private equity investments are typically held for a longer period of time ...read more

View 1 answer

Q11. What is Event Loop? and how it works?

Ans.

Event Loop is a mechanism in JavaScript that allows for asynchronous operations to be executed in a non-blocking way.

  • Event Loop is responsible for handling asynchronous operations in JavaScript.

  • It continuously checks the call stack for any functions that need to be executed.

  • If the call stack is empty, it checks the callback queue for any pending tasks.

  • It moves tasks from the callback queue to the call stack for execution.

  • Event Loop ensures that the JavaScript engine is not bl...read more

Add your answer

Q12. Tell me about different opps concepts

Ans.

Object-oriented programming concepts like inheritance, polymorphism, encapsulation, and abstraction.

  • Inheritance: Allows a class to inherit properties and behavior from another class.

  • Polymorphism: Ability for objects to be treated as instances of their parent class.

  • Encapsulation: Bundling data and methods that operate on the data into a single unit.

  • Abstraction: Hiding the complex implementation details and showing only the necessary features.

Add your answer

Q13. Find the second largest number in an array

Ans.

Find the second largest number in an array of strings

  • Convert the array of strings to an array of integers

  • Sort the array in descending order

  • Return the second element in the sorted array

Add your answer

Q14. What is Primary Key in sql

Ans.

Primary key is a unique identifier for a record in a database table.

  • Primary key ensures data integrity and helps in faster data retrieval.

  • It cannot have null values and must be unique for each record.

  • It can be a single column or a combination of columns.

  • Examples: employee_id, order_number, customer_id

Add your answer

Q15. Differentiate Mutual Fund, Hedge Fund, Private Equity

Ans.

Mutual funds pool money from multiple investors to invest in a diversified portfolio of securities. Hedge funds are actively managed investment funds that use a variety of strategies to achieve high returns. Private equity involves investing in privately held companies or buying out public companies to take them private.

  • Mutual funds pool money from multiple investors to invest in a diversified portfolio of securities.

  • Hedge funds are actively managed investment funds that use ...read more

Add your answer

Q16. Difference between General Partner and Limited Partner?

Ans.

General partners have unlimited liability and manage the business, while limited partners have limited liability and do not manage the business.

  • General partners have unlimited liability for the debts and obligations of the business, while limited partners have limited liability and are only liable for the amount of their investment.

  • General partners manage the day-to-day operations of the business, while limited partners do not have a say in management decisions.

  • General partne...read more

Add your answer

Q17. What do you mean by Capital Markets?

Ans.

Capital markets refer to financial markets where long-term securities are traded.

  • Capital markets are where companies and governments raise funds by issuing stocks, bonds, and other securities.

  • These markets are typically for long-term investments and have a lower liquidity than other financial markets.

  • Examples of capital markets include the New York Stock Exchange, NASDAQ, and the bond market.

  • Investors in capital markets are typically institutional investors such as pension fu...read more

Add your answer

Q18. 1. What is a loop in switching? 2. How do you say vlan 200 working on switch? 3. How do you say ethernet frame is tagged or untagged? 4. Regarding project 5. Python string slicing 6. Max vlans allowed on single...

read more
Ans.

Technical questions related to switching, VLANs, and Python string slicing for Lead Engineer position.

  • A loop in switching occurs when a broadcast packet is forwarded endlessly between switches.

  • To say VLAN 200 is working on a switch, you can check the VLAN database or use the show vlan command.

  • An ethernet frame is tagged when it has a VLAN ID added to its header, and untagged when it does not.

  • Regarding the project, provide details on the scope, timeline, and deliverables.

  • Pytho...read more

Add your answer

Q19. How to release, renew IP in CMD?

Ans.

To release and renew IP in CMD, use the commands 'ipconfig /release' and 'ipconfig /renew'.

  • Open Command Prompt

  • Type 'ipconfig /release' and press Enter to release the current IP address

  • Type 'ipconfig /renew' and press Enter to obtain a new IP address

  • You can also use 'ipconfig /all' to view detailed information about network interfaces

View 1 answer

Q20. How your Automation Framework is organized ?

Ans.

Our Automation Framework is organized in a modular and scalable way.

  • We use a Page Object Model design pattern

  • We have separate modules for test data, test scripts, and test reports

  • We use a central configuration file for easy maintenance

  • We have a library of reusable functions

  • We use version control to manage changes

  • We have a clear naming convention for easy identification

Add your answer

Q21. What do you mean by Mutual Funds?

Ans.

Mutual funds are investment vehicles that pool money from multiple investors to invest in stocks, bonds, and other securities.

  • Mutual funds are managed by professional fund managers

  • Investors buy shares in the mutual fund and the value of their investment is determined by the performance of the underlying securities

  • Mutual funds offer diversification and can be a good option for investors who want exposure to a variety of securities

  • Examples of mutual fund companies include Vangu...read more

Add your answer

Q22. what is xlate table in ASA and ipsec tunnel trouble shooting

Ans.

The xlate table in ASA is used to keep track of translations between internal and external IP addresses. It is important for IPsec tunnel troubleshooting.

  • The xlate table is used to map internal IP addresses to external IP addresses

  • It is important for troubleshooting IPsec tunnels because it allows you to see if traffic is being translated correctly

  • You can view the xlate table using the 'show xlate' command in the ASA CLI

  • If there are issues with the xlate table, it can cause I...read more

Add your answer

Q23. What is private equity ? What is limited partners ? What is NAV ? What is IRR ?

Ans.

Private equity is an alternative investment class where investors pool capital to invest in private companies.

  • Limited partners are investors who provide capital to a private equity fund but have limited liability.

  • NAV (Net Asset Value) is the value of a fund's assets minus its liabilities.

  • IRR (Internal Rate of Return) is a metric used to measure the profitability of an investment over time.

  • Private equity firms typically acquire companies, improve their operations, and sell the...read more

View 1 answer

Q24. what is encapsulation and loading process.also write an code for Reverse string

Ans.

Encapsulation is the process of hiding internal details of an object and providing access only through defined methods.

  • Encapsulation helps in achieving data abstraction and data hiding.

  • It allows for better control over the data and prevents direct access to it.

  • Loading process refers to the process of loading a program or data into memory for execution.

  • Reverse string code example: function reverseString(str) { return str.split('').reverse().join(''); }

Add your answer

Q25. what is encapsulation and loading process. Also write an code for reverse string

Ans.

Encapsulation is the process of hiding internal implementation details and providing a public interface. Loading process refers to the steps involved in loading a program or data into memory.

  • Encapsulation helps in achieving data abstraction and information hiding.

  • It allows for better control over data and prevents unauthorized access.

  • Loading process involves steps like parsing, linking, and loading the program or data into memory.

  • Here's an example code for reversing a string:...read more

Add your answer

Q26. 1)What is the props and state 2)what is react 3) what is HoC 4)What is redux 5)class and functional component 6) map,for,forEach,await, 7)reducer 8)all Hooks

Ans.

A set of questions related to software engineering concepts and technologies.

  • Props and state are used in React to manage and pass data between components.

  • React is a JavaScript library used for building user interfaces.

  • Higher-Order Components (HoC) are functions that take a component and return an enhanced version of it.

  • Redux is a predictable state container for JavaScript apps, commonly used with React.

  • Class components and functional components are two ways to define componen...read more

View 1 answer

Q27. What do you understand by Mutual funds?

Ans.

Mutual funds are investment vehicles that pool money from multiple investors to invest in a diversified portfolio of securities.

  • Mutual funds are managed by professional fund managers who make investment decisions on behalf of the investors.

  • Investors can buy shares of mutual funds, which represent their ownership in the fund's portfolio.

  • Mutual funds offer diversification, liquidity, and professional management to investors.

  • There are different types of mutual funds such as equi...read more

Add your answer

Q28. If the user would not get OTP to access the profile?

Ans.

If the user does not receive OTP to access their profile, they should first check their internet connection and then contact customer support.

  • Check internet connection to ensure OTP delivery

  • Contact customer support for assistance

  • Verify contact information for accuracy

  • Consider alternative authentication methods

Add your answer

Q29. What would happened if the user would not be able to use the card?

Ans.

If the user is unable to use the card, they may experience inconvenience, potential financial loss, and may need to contact the card issuer for assistance.

  • User may face inconvenience in making purchases or transactions

  • User may incur financial loss if unable to access funds on the card

  • User may need to contact the card issuer for assistance or to report the issue

Add your answer

Q30. Angle between hands of clock on 10:25? Trains traveling towards eachother give speed where will they collide?

Ans.

Angle between hands of clock at 10:25 is 147.5 degrees. Trains will collide at midpoint of their initial positions.

  • To calculate angle between hands of clock, use formula: |(30*H)-(11/2)*M|

  • For 10:25, H=10 and M=25, so angle = |(30*10)-(11/2)*25| = 147.5 degrees

  • When two trains are traveling towards each other, their relative speed is added to get the collision speed.

  • The collision point is the midpoint of their initial positions along the track.

  • For example, if train A starts at ...read more

Add your answer

Q31. intro sql query to print all unique values from table what are operations of stack data structure.

Ans.

SQL query to print all unique values from a table and operations of stack data structure.

  • For SQL query, use SELECT DISTINCT column_name FROM table_name.

  • Stack data structure operations include push, pop, peek, and isEmpty.

  • Example: SELECT DISTINCT city FROM customers;

  • Example: Pushing an element onto the stack: stack.push(5);

Add your answer

Q32. Intro do one try have two catches?(yes) Merge sort for given example

Ans.

Yes, one try can have two catches in a try-catch block.

  • A try block can have multiple catch blocks to handle different types of exceptions.

  • The catch blocks are executed in the order they are written.

  • If an exception is caught in the first catch block, the subsequent catch blocks are not executed.

  • Example: try { //code } catch (ExceptionType1 e) { //handle exception } catch (ExceptionType2 e) { //handle exception }

Add your answer

Q33. How would i f-identify whether the access was done the member or the scammer

Ans.

To identify whether the access was done by the member or the scammer, analyze login patterns, IP addresses, device information, and behavior.

  • Analyze login patterns - look for unusual login times or frequency

  • Check IP addresses - compare the location of the access to the member's usual locations

  • Review device information - see if the device used for access matches the member's known devices

  • Monitor behavior - look for any suspicious activity or changes in behavior

Add your answer

Q34. polymorphism and explain about virtual polymorphism

Ans.

Polymorphism is the ability of a single function or method to operate on different types of data.

  • Polymorphism allows objects of different classes to be treated as objects of a common superclass.

  • Virtual polymorphism is achieved through virtual functions in C++.

  • Virtual functions allow a function in a base class to be overridden in a derived class.

  • Example: Animal class with virtual function 'makeSound' overridden in Dog and Cat classes.

Add your answer

Q35. How you do forecasting. Which excel functions do you use

Ans.

I use various excel functions for forecasting such as TREND, FORECAST, and GROWTH.

  • I analyze historical data to identify trends and patterns

  • I use functions like TREND to project future values based on historical data

  • I use functions like FORECAST to estimate future values based on existing data

  • I use functions like GROWTH to project future values based on exponential growth

  • I also use other statistical functions like AVERAGE, STDEV, and CORREL to analyze data

  • I ensure accuracy by ...read more

Add your answer

Q36. Explain oops concept with example

Ans.

OOPs concept is a programming paradigm based on the concept of objects, which can contain data in the form of fields and code in the form of procedures.

  • OOPs stands for Object-Oriented Programming

  • Key concepts include Inheritance, Encapsulation, Polymorphism, and Abstraction

  • Example: Inheritance allows a class to inherit properties and behavior from another class

Add your answer

Q37. What is difference between general partner and limited partner

Ans.

General partners have management control and unlimited liability, while limited partners have no management control and limited liability.

  • General partners have unlimited liability for the debts and obligations of the partnership.

  • Limited partners have limited liability, meaning they are only liable up to the amount of their investment.

  • General partners have management control and are actively involved in the day-to-day operations of the business.

  • Limited partners have no managem...read more

Add your answer

Q38. Write code reverse link list ..? Write code to convert digital to binary format ?

Ans.

Code to reverse a linked list and convert digital to binary format.

  • Create a new linked list and traverse the original list, adding each node to the beginning of the new list

  • To convert digital to binary, use the built-in function or write a function to divide the number by 2 and store the remainder in a stack until the quotient is 0, then pop the stack to get the binary representation

Add your answer

Q39. what is java , development of calculator ,development for web page

Ans.

Java is a programming language used for developing various applications including calculators and web pages.

  • Java is an object-oriented language

  • Calculator development involves creating a GUI and implementing mathematical operations

  • Web development involves using Java frameworks like Spring and Hibernate

  • Java is platform-independent and can run on any operating system

Add your answer

Q40. How to fix system hang without restarting

Ans.

To fix system hang without restarting, try these steps.

  • Check for any running processes that may be causing the hang and end them

  • Clear temporary files and cache

  • Update drivers and software

  • Run a virus scan

  • Check for any hardware issues

  • Try a system restore to a previous point

  • Use command prompt to run system file checker (sfc /scannow)

Add your answer

Q41. meaning of subject for which you are applying

Ans.

The subject for which I am applying is the specific area of expertise or focus of the role I am seeking.

  • Explain how your skills and experience align with the subject matter of the role

  • Discuss any relevant projects or achievements related to the subject

  • Highlight any specialized knowledge or training you have in the subject area

Add your answer

Q42. MIDDLE OF LINKED LIST

Ans.

To find the middle element of a linked list

  • Traverse the linked list using two pointers - one moving one node at a time and the other moving two nodes at a time

  • When the faster pointer reaches the end of the list, the slower pointer will be at the middle element

  • If the list has even number of elements, there are two middle elements

Add your answer

Q43. Did you use docker? And how did you build image

Add your answer

Q44. write code for virtual polymorphism and explain

Ans.

Virtual polymorphism allows objects of different classes to be treated as objects of a common superclass.

  • Create a base class with virtual functions

  • Create derived classes that override the virtual functions

  • Use pointers or references of the base class to call the overridden functions

Add your answer

Q45. Analysis of Financial statements

Ans.

Analysis of financial statements involves reviewing and interpreting a company's financial data to assess its performance and make informed decisions.

  • Review income statement, balance sheet, and cash flow statement to understand financial health

  • Calculate key financial ratios like profitability, liquidity, and solvency ratios

  • Compare current financial data with historical data and industry benchmarks

  • Identify trends, strengths, weaknesses, and areas for improvement

  • Use financial a...read more

Add your answer

Q46. Limited Partner vs General Partner

Ans.

Limited partners are passive investors with limited liability, while general partners are actively involved in managing the business with unlimited liability.

  • Limited partners have limited liability and are not involved in the day-to-day operations of the business.

  • General partners have unlimited liability and are actively involved in managing the business.

  • Limited partners typically contribute capital to the business but do not have a say in its management.

  • General partners are ...read more

Add your answer

Q47. Nav calculation capital of call distribution notice

Ans.

NAV calculation capital of call distribution notice

  • NAV (Net Asset Value) calculation involves determining the value of a fund's assets minus its liabilities

  • Capital call is a request for additional funds from investors in a private equity fund

  • Distribution notice is a document sent to investors detailing the distribution of profits or income from an investment

Add your answer

Q48. What is the function of custodian bank

Ans.

Custodian banks are financial institutions responsible for safeguarding assets, such as securities and cash, on behalf of institutional clients.

  • Provide safekeeping of assets

  • Settle trades on behalf of clients

  • Collect income on assets

  • Process corporate actions

  • Provide reporting and other administrative services

  • Act as a liaison between the client and the investment manager

Add your answer

Q49. When should we go for redux and context api

Ans.

Redux for complex state management, Context API for simpler state sharing

  • Use Redux for complex state management with multiple components needing access to the same state

  • Context API is suitable for simpler state sharing between parent and child components

  • Redux is more suitable for larger applications with a lot of state changes and actions

  • Context API is easier to set up and use for smaller applications or components

Add your answer

Q50. What are the Linux commands you have used

Add your answer

Q51. Understanding of investment banking?

Ans.

Investment banking involves providing financial services to corporations, governments, and other institutions, including raising capital, mergers and acquisitions, and advisory services.

  • Facilitates capital raising for corporations through issuing stocks and bonds

  • Assists in mergers and acquisitions by advising on deals and facilitating transactions

  • Provides financial advisory services to clients on various strategic matters

  • Involves underwriting securities offerings and trading ...read more

Add your answer

Q52. Palindrome number program in c++

Ans.

Palindrome number program in C++

  • A palindrome number is a number that remains the same when its digits are reversed

  • To check if a number is palindrome, we can compare the original number with its reverse

  • We can use a loop to reverse the number and then compare it with the original number

Add your answer

Q53. what is ssl offloading in f5

Ans.

SSL offloading is a process of removing SSL encryption from incoming traffic and decrypting it before sending it to the backend servers.

  • SSL offloading is performed by a load balancer like F5 to reduce the processing load on backend servers.

  • It improves server performance and reduces latency by offloading SSL processing to a dedicated hardware or software.

  • F5 SSL offloading can be configured to support multiple SSL certificates and protocols like TLS 1.3.

  • It can also perform SSL ...read more

Add your answer

Q54. REVERSE THE ARRAY

Ans.

Reverse the array of strings

  • Create a new array and iterate through the original array in reverse order

  • Use a for loop or array.reverse() method to reverse the array

  • Ensure the original array remains unchanged

Add your answer

Q55. have you worked on integration ?

Ans.

Yes, I have worked on integration in Salesforce development.

  • I have experience integrating Salesforce with external systems using REST and SOAP APIs.

  • I have worked on integrating Salesforce with third-party applications like MailChimp and DocuSign.

  • I have implemented custom integrations using tools like Salesforce Connect and MuleSoft.

  • I have experience with data mapping, transformation, and synchronization during integration projects.

Add your answer

Q56. Definition of IRR, NPV, NAV

Ans.

IRR, NPV, and NAV are financial metrics used to evaluate the profitability and value of investments.

  • IRR (Internal Rate of Return) is the discount rate that makes the net present value of all cash flows from a particular investment equal to zero.

  • NPV (Net Present Value) is the difference between the present value of cash inflows and outflows of an investment.

  • NAV (Net Asset Value) is the value of a fund's assets minus its liabilities, divided by the number of shares outstanding....read more

Add your answer

Q57. What do you know about private equity

Ans.

Private equity involves investing in privately held companies to acquire ownership stakes and drive growth.

  • Private equity firms raise capital from investors to acquire ownership stakes in private companies

  • They aim to drive growth and improve operations to increase the value of their investments

  • Private equity investments are typically held for a number of years before being sold or taken public

  • Private equity firms often use leverage to finance acquisitions, which can increase ...read more

Add your answer

Q58. Simple xpath without using Index reverse strings with words separately

Ans.

Reverse strings with words separately using simple xpath without using index

  • Use XPath function to split the string into words

  • Reverse each word individually using XPath function

  • Concatenate the reversed words back together

Add your answer

Q59. Write a code to reverse the string

Ans.

Code to reverse a string

  • Use a loop to iterate through the characters of the string

  • Swap the characters from start to end of the string

  • Continue swapping until you reach the middle of the string

Add your answer

Q60. Write a code to swap two number

Ans.

Swapping two numbers using a temporary variable

  • Create a temporary variable to store one of the numbers

  • Assign the value of the first number to the second number

  • Assign the value of the temporary variable to the first number

Add your answer

Q61. General rules of accounting?

Ans.

General rules of accounting include consistency, relevance, reliability, and comparability.

  • Consistency: Accounting methods should be applied consistently from one period to another.

  • Relevance: Financial information should be relevant to the decision-making needs of users.

  • Reliability: Financial information should be reliable and free from bias or error.

  • Comparability: Financial information should be comparable across different companies or periods.

  • Example: Using the same depreci...read more

Add your answer

Q62. What is polymorphism

Ans.

Polymorphism is the ability of an object to take on many forms.

  • Polymorphism allows objects of different classes to be treated as if they are of the same class.

  • It can be achieved through method overloading or method overriding.

  • Example: A shape class can have different subclasses like circle, square, etc. and all can be treated as shapes.

  • Polymorphism helps in achieving code reusability and flexibility.

Add your answer

Q63. What is abstraction

Ans.

Abstraction is the process of hiding complex implementation details and exposing only necessary information.

  • Abstraction allows us to focus on the essential features of an object or system.

  • It helps in reducing complexity and increasing efficiency.

  • Examples of abstraction include encapsulation, inheritance, and interfaces in object-oriented programming.

  • Abstraction is used in various fields such as software engineering, mathematics, and art.

Add your answer

Q64. Write a program to reverse even words in string?

Ans.

Program to reverse even words in a string

  • Split the string into words

  • Iterate through the words and reverse the even-indexed words

  • Join the words back into a string

Add your answer

Q65. What is ur 5year goal

Ans.

My 5-year goal is to become a lead software developer in a reputable tech company, leading a team of developers and working on cutting-edge projects.

  • Advance my technical skills by learning new programming languages and technologies

  • Gain experience in project management and leadership roles

  • Contribute to open-source projects and attend tech conferences to network and stay updated with industry trends

Add your answer

Q66. Expertise in which technology

Ans.

My expertise lies in Java and related technologies.

  • Proficient in Java programming language and its frameworks like Spring and Hibernate

  • Experience in developing web applications using HTML, CSS, JavaScript, and AngularJS

  • Familiarity with database technologies like MySQL and Oracle

  • Knowledge of software development methodologies like Agile and Scrum

  • Experience in leading and mentoring a team of developers

Add your answer

Q67. what all exceptions you know ?

Ans.

Some common exceptions in Salesforce development include DMLException, QueryException, and LimitException.

  • DMLException: Thrown when an error occurs while performing DML operations like insert, update, delete.

  • QueryException: Thrown when an error occurs while querying data from the database.

  • LimitException: Thrown when governor limits are exceeded, such as SOQL query limit or CPU time limit.

Add your answer

Q68. Possible mirror Substring from the given string

Ans.

Find possible mirror substrings in a given string

  • Iterate through the string and check for mirror substrings

  • Use two pointers to check for mirror substrings

  • Examples: 'abcddcba' -> ['abcddcba', 'cddc', 'dd']

Add your answer

Q69. How did you deploy your models

Add your answer

Q70. Why governor limits ?

Ans.

Governor limits are in place to ensure efficient use of resources and prevent abuse in Salesforce platform.

  • Governor limits help in maintaining system performance and preventing monopolization of resources.

  • They ensure fair usage of resources among all users on the platform.

  • Examples include limits on number of records retrieved in a single query, number of SOQL queries executed, and CPU time consumed.

  • Governor limits also help in preventing infinite loops and runaway code that c...read more

Add your answer

Q71. Guesstimate about number of flights in India

Ans.

There are approximately 2.5 million flights in India annually.

  • India is one of the fastest growing aviation markets in the world.

  • Major airports like Delhi, Mumbai, Bangalore, and Chennai handle a large number of flights daily.

  • Airlines like IndiGo, SpiceJet, and Air India operate numerous domestic and international flights.

  • The number of flights has been increasing steadily over the years due to growing demand for air travel.

Add your answer

Q72. Skills in my resule

Ans.

My skills include programming languages like Java, Python, and C++, as well as experience with databases and problem-solving.

  • Proficient in Java, Python, and C++ programming languages

  • Experience with databases such as MySQL and MongoDB

  • Strong problem-solving skills demonstrated through projects and coding challenges

Add your answer

Q73. What is wealth management ?

Ans.

Wealth management involves financial planning, investment management, and other financial services to help individuals and families grow and protect their wealth.

  • Involves creating a personalized financial plan based on individual goals and risk tolerance

  • Includes investment management to grow wealth through various asset classes

  • Provides services such as retirement planning, tax planning, estate planning, and risk management

  • Often offered by financial advisors, wealth managers, ...read more

Add your answer

Q74. What is derivative market?

Ans.

Derivative market is a financial market where financial instruments derive their value from an underlying asset.

  • Derivatives are contracts between two parties that derive their value from an underlying asset such as stocks, bonds, commodities, currencies, or interest rates.

  • Common types of derivatives include futures, options, swaps, and forwards.

  • Derivative markets are used for hedging, speculation, and arbitrage.

  • Participants in derivative markets include institutional investor...read more

Add your answer

Q75. Difference between ArrayList and LinkedList?

Ans.

ArrayList is implemented as a resizable array, while LinkedList is implemented as a doubly linked list.

  • ArrayList provides fast random access, LinkedList provides fast insertion and deletion.

  • ArrayList uses more memory as it needs to allocate a fixed size array, LinkedList uses more memory for storing references to the next and previous elements.

  • Example: ArrayList is better for scenarios where random access is required, while LinkedList is better for scenarios where frequent in...read more

Add your answer

Q76. Difference between HashMap and HashTable?

Ans.

HashMap is non-synchronized and allows null values, while HashTable is synchronized and does not allow null values.

  • HashMap is non-synchronized, meaning it is not thread-safe, while HashTable is synchronized and thread-safe.

  • HashMap allows null values for both keys and values, while HashTable does not allow null keys or values.

  • HashMap is faster than HashTable as it is non-synchronized, but HashTable is preferred in multi-threaded environments for its thread-safety.

  • Example: Hash...read more

Add your answer

Q77. Regression testing and sanity difference

Ans.

Regression testing is retesting of previously tested functionality, while sanity testing is a quick check to ensure basic functionality is working.

  • Regression testing is performed to ensure that changes or fixes in the software do not introduce new defects or impact existing functionality.

  • It involves retesting of the entire application or a specific set of test cases.

  • Regression testing is usually performed after major changes or enhancements to the software.

  • Sanity testing is a...read more

Add your answer

Q78. What is nav describe

Ans.

NAV stands for Net Asset Value, which represents the per-share value of a mutual fund or exchange-traded fund (ETF).

  • NAV is calculated by subtracting a fund's liabilities from its assets and dividing by the number of shares outstanding.

  • It is used to determine the price at which investors can buy or sell shares of the fund.

  • NAV is typically calculated at the end of each trading day.

  • For example, if a mutual fund has assets worth $100 million and liabilities worth $10 million, and...read more

Add your answer

Q79. what is case management?

Ans.

Case management is the process of managing and coordinating the various aspects of a case or project.

  • It involves identifying and assessing the needs of the case or project

  • Developing a plan of action to address those needs

  • Assigning tasks and responsibilities to team members

  • Monitoring progress and making adjustments as necessary

  • Ensuring that all stakeholders are informed and involved in the process

  • Examples include legal case management, project management, and healthcare case m...read more

Add your answer

Q80. What is docker, what is DevOps

Ans.

Docker is a containerization platform that allows applications to be packaged and run in isolated environments. DevOps is a software development methodology that focuses on collaboration, automation, and integration between development and operations teams.

  • Docker is a tool designed to make it easier to create, deploy, and run applications by using containers.

  • Containers allow a developer to package up an application with all parts it needs, such as libraries and other dependen...read more

Add your answer

Q81. Write C code and C++ code

Ans.

Providing C and C++ code for Senior Software Engineer position

  • For C code, demonstrate knowledge of pointers, memory allocation, and basic data structures

  • For C++ code, showcase understanding of object-oriented programming, inheritance, and polymorphism

  • Provide clear and concise code with proper commenting and formatting

Add your answer

Q82. what is SNAT in f5

Ans.

SNAT stands for Secure Network Address Translation and is a feature in F5 that allows for the translation of IP addresses.

  • SNAT is used to translate the source IP address of outgoing traffic to a different IP address.

  • This can be useful in scenarios where multiple devices are sharing a single public IP address.

  • SNAT can also be used to improve security by hiding the actual IP address of a device from the public internet.

  • F5 offers a variety of SNAT options, including automap SNAT...read more

Add your answer

Q83. Explain day to day activity as Pm

Ans.

As a Project Manager, day to day activities include overseeing project progress, communicating with team members and stakeholders, resolving issues, and tracking deadlines.

  • Communicating with team members and stakeholders to provide updates and gather feedback

  • Monitoring project progress and ensuring tasks are completed on time

  • Identifying and resolving any issues or roadblocks that may arise

  • Tracking deadlines and ensuring project stays on schedule

  • Conducting regular meetings to ...read more

Add your answer

Q84. Difference between git and sub git

Ans.

Git is a version control system used for tracking changes in source code, while Subversion (SVN) is another version control system with similar features.

  • Git is distributed, allowing for offline work and faster branching and merging.

  • Subversion is centralized, requiring a network connection for most operations.

  • Git uses a staging area for changes before committing, while Subversion commits changes directly to the repository.

  • Git has a more complex branching and merging model comp...read more

Add your answer

Q85. what is LMS ?

Ans.

LMS stands for Learning Management System, a software application for the administration, documentation, tracking, reporting, and delivery of educational courses or training programs.

  • LMS helps organizations deliver online courses and training programs to employees or students.

  • It allows for the creation and management of courses, assessments, and learning materials.

  • LMS can track learner progress, generate reports, and provide analytics on course performance.

  • Popular LMS platfor...read more

Add your answer

Q86. What is database and scaling

Ans.

Database is a structured collection of data, scaling refers to increasing capacity to handle more data or users.

  • Database is a structured collection of data organized for easy access, retrieval, and management

  • Scaling refers to the ability of a system to handle increased workload or growth

  • Scaling can involve adding more servers, increasing storage capacity, or optimizing performance

  • Examples of scaling in databases include sharding, replication, and vertical or horizontal scalin...read more

Add your answer

Q87. What is hedge fund?

Ans.

A hedge fund is an investment fund that pools capital from accredited individuals or institutional investors and invests in a variety of assets.

  • Hedge funds are typically only accessible to high-net-worth individuals or institutional investors.

  • They often use leverage and derivatives to amplify returns.

  • Hedge funds can invest in a wide range of assets including stocks, bonds, commodities, and currencies.

  • They aim to generate high returns for their investors, often through active ...read more

Add your answer

Q88. What are bad debts

Ans.

Bad debts are debts that are unlikely to be recovered by a company or individual.

  • Bad debts are typically the result of customers failing to pay their debts on time or at all.

  • Companies often write off bad debts as a loss on their financial statements.

  • Bad debts can negatively impact a company's cash flow and profitability.

  • Examples of bad debts include unpaid invoices, defaulted loans, and credit card debt that is not repaid.

Add your answer

Q89. What is hege fund

Ans.

A hedge fund is an investment fund that pools capital from accredited individuals or institutional investors and invests in a variety of assets.

  • Hedge funds typically use a variety of strategies to achieve high returns, including leverage, short selling, and derivatives trading.

  • They are known for their flexibility in investment strategies and ability to generate high returns, but also come with higher fees and risks.

  • Hedge funds are usually only available to accredited investor...read more

Add your answer

Q90. Explain Rest assured automation

Ans.

Rest Assured is a Java library used for API automation testing, specifically for testing RESTful APIs.

  • Rest Assured is an open-source Java library that provides a domain-specific language for writing powerful API tests.

  • It simplifies the process of sending HTTP requests and validating responses in API automation.

  • Rest Assured supports various authentication methods, request and response specifications, and assertion capabilities.

  • It can be integrated with popular testing framewor...read more

Add your answer

Q91. Why choose .Net core

Ans.

High performance, cross-platform compatibility, open-source, modern development features

  • Cross-platform compatibility allows for deployment on various operating systems

  • High performance due to optimized runtime and just-in-time compilation

  • Open-source community support for continuous improvement and updates

  • Modern development features like dependency injection, modular architecture, and improved performance monitoring

  • Example: .Net Core allows for easy migration of existing .Net a...read more

Add your answer

Q92. What is shadow DOM

Ans.

Shadow DOM is a way to encapsulate the styling and structure of a web component, preventing styles from leaking out or clashing with the rest of the page.

  • Shadow DOM allows for creating self-contained components with their own styles and markup

  • It helps in preventing styles from the main document affecting the component and vice versa

  • Shadow DOM can be created using the 'shadowRoot' property of an element

Add your answer

Q93. Merge 2 list using linked list

Ans.

Merge two linked lists into one

  • Create a new linked list to store the merged list

  • Iterate through both input linked lists and add nodes to the new list in sorted order

  • Update the next pointers accordingly

Add your answer

Q94. Explain OSI model

Ans.

The OSI model is a conceptual framework used to describe the communication functions of a network.

  • The model has 7 layers, each with a specific function.

  • The layers are: Physical, Data Link, Network, Transport, Session, Presentation, and Application.

  • Each layer communicates with the layer above and below it.

  • The model helps ensure interoperability between different network devices and software.

  • Example: When you visit a website, the Application layer sends a request to the Transpo...read more

Add your answer

Q95. Diff b/w interface and abstract

Ans.

Interface is a contract that defines the methods a class must implement, while abstract class can have both implemented and abstract methods.

  • Interface can only have abstract methods and constants, while abstract class can have both abstract and non-abstract methods.

  • A class can implement multiple interfaces but can only inherit from one abstract class.

  • Interfaces are used to achieve multiple inheritance in Java, while abstract classes are used to provide a common base for subcl...read more

Add your answer

Q96. Performance tunning in react

Ans.

Performance tuning in React involves optimizing code for faster rendering and improved user experience.

  • Identify and eliminate unnecessary re-renders by using shouldComponentUpdate or React.memo

  • Use PureComponent or memo to prevent unnecessary re-renders of components

  • Avoid using inline functions in render methods to prevent unnecessary re-renders

  • Optimize component rendering by splitting large components into smaller ones

  • Use React DevTools to analyze component performance and id...read more

Add your answer

Q97. IR Response for P1 ticket

Ans.

IR Response for P1 ticket involves immediate investigation, containment, and resolution of critical security incidents.

  • Immediately triage the incident to determine severity and impact

  • Contain the incident to prevent further damage or data loss

  • Gather evidence and conduct forensic analysis to identify root cause

  • Coordinate with relevant teams for remediation and recovery

  • Document all actions taken and lessons learned for future incidents

View 1 answer

Q98. Core concepts of Reactjs

Ans.

Reactjs is a JavaScript library for building user interfaces.

  • Component-based architecture

  • Virtual DOM for efficient updates

  • JSX for writing HTML in JavaScript

  • State management with setState()

  • Lifecycle methods like componentDidMount()

Add your answer

Q99. code to write in java

Ans.

Write a Java code to reverse a string

  • Use StringBuilder to reverse the string

  • Convert the string to StringBuilder, call reverse() method, and convert back to string

  • Handle null or empty string cases

Add your answer

Q100. ArrayList vs LinkedList

Ans.

ArrayList is better for random access and LinkedList is better for frequent insertions and deletions.

  • ArrayList uses dynamic array to store elements, allowing fast random access but slower insertions and deletions.

  • LinkedList uses doubly linked list to store elements, allowing fast insertions and deletions but slower random access.

  • Example: Use ArrayList when you need to frequently access elements by index. Use LinkedList when you need to frequently add or remove elements.

Add your answer
1
2
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos

Interview Process at null

based on 86 interviews in the last 1 year
Interview experience
4.0
Good
View more
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Interview Questions from Similar Companies

3.8
 • 399 Interview Questions
3.9
 • 318 Interview Questions
3.8
 • 261 Interview Questions
4.1
 • 162 Interview Questions
3.8
 • 151 Interview Questions
View all
Top Incedo Interview Questions And Answers
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
70 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions
Get AmbitionBox app

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter