
Infinite Computer Solutions

80+ Infinite Computer Solutions Interview Questions and Answers
Q1. Which library do you use to automate tasks in aws?
I use boto3 library to automate tasks in aws.
Boto3 is the Amazon Web Services (AWS) Software Development Kit (SDK) for Python.
It allows Python developers to write software that makes use of services like Amazon S3 and Amazon EC2.
Boto3 makes it easy to integrate your Python application, library, or script with AWS services.
Example: boto3.client('s3') to create a client for Amazon S3 service.
Q2. in which layer the Ip address is working on if it working on L3 so how can we assisgn an Ip address on Layer 2 Switch descibe in the details ?
The IP address works at Layer 3 of the OSI model. Assigning an IP address on a Layer 2 switch is not possible.
IP addresses are used for network layer communication (Layer 3)
Layer 2 switches operate at the data link layer (Layer 2)
Layer 2 switches use MAC addresses for communication within a local network
IP addresses are assigned to devices connected to Layer 2 switches, not to the switch itself
Q3. what is the OSI model and describe about the each and every layer of that layer function and functionality?
The OSI model is a conceptual framework that standardizes the functions of a communication system into seven layers.
Layer 1 (Physical): Deals with the physical transmission of data over the network.
Layer 2 (Data Link): Provides error-free transmission of data frames between nodes on the same network.
Layer 3 (Network): Handles routing and logical addressing to enable data transfer between different networks.
Layer 4 (Transport): Ensures reliable delivery of data by segmenting a...read more
Q4. What is the main function of the Root bridge switch ?
The main function of the Root bridge switch is to control the flow of data traffic in a spanning tree network.
The Root bridge switch is elected as the central point of the spanning tree network.
It determines the shortest path for data traffic to reach all other switches in the network.
The Root bridge switch sends Bridge Protocol Data Units (BPDUs) to other switches to exchange information and maintain the spanning tree topology.
It helps prevent loops and ensures a loop-free n...read more
Q5. What are the differences and similarities between Java and Python, and which one is considered the best?
Java and Python are both popular programming languages, with Java being statically typed and Python being dynamically typed.
Java is statically typed, while Python is dynamically typed
Java requires explicit declaration of data types, while Python does not
Java is compiled into bytecode which runs on the Java Virtual Machine, while Python is interpreted at runtime
Java is commonly used for enterprise applications and Android development, while Python is popular for web developmen...read more
Q6. what is the ssh port number and why we used the ssh service ?
SSH port number is 22. SSH service is used for secure remote access and secure file transfer.
SSH port number is 22 by default
SSH stands for Secure Shell
SSH service provides secure remote access to servers
It encrypts the data transmitted over the network
SSH service is used for secure file transfer (SFTP) and remote command execution
It provides authentication and encryption for secure communication
Q7. what is the tcp/ip model and why we used this model in current scenario?
The TCP/IP model is a network protocol suite that defines how data is transmitted over the internet.
The TCP/IP model consists of four layers: Network Interface, Internet, Transport, and Application.
It is used in the current scenario because it provides a standardized framework for communication between devices on a network.
The TCP/IP model allows for reliable and efficient data transmission, ensuring that data packets are delivered accurately and in the correct order.
It is wi...read more
Q8. which series you have worked on router device and the vendors?
I have worked on various router devices and vendors.
Cisco routers (e.g. Cisco 2900 series)
Juniper routers (e.g. Juniper MX series)
Huawei routers (e.g. Huawei NE series)
MikroTik routers (e.g. MikroTik RB series)
Q9. What is the function of global keyword
Global keyword is used to define a variable as global, which can be accessed from any part of the program.
Global keyword is used to declare a variable outside of a function, making it accessible from any part of the program.
It is useful when a variable needs to be accessed by multiple functions or modules.
Global variables can be modified by any function that has access to them, which can lead to unexpected behavior.
Example: global x def func(): global x x = 10 func() print(x)...read more
Q10. What are the differences between the MVC and MVVM architectural patterns, and in what scenarios should each be used?
MVC focuses on separating data, presentation, and logic, while MVVM adds a ViewModel layer to enhance data binding and separation of concerns.
MVC: Model-View-Controller pattern separates data, presentation, and logic. Views directly interact with Models and Controllers.
MVVM: Model-View-ViewModel pattern adds a ViewModel layer between the View and Model to enhance data binding and separation of concerns.
MVC is more traditional and widely used, while MVVM is gaining popularity ...read more
Q11. what is the port number of dns and how it's work?
DNS uses port number 53. It works by translating domain names into IP addresses and vice versa.
DNS stands for Domain Name System.
Port number 53 is used for both TCP and UDP protocols.
DNS works by resolving domain names to their corresponding IP addresses.
It uses a hierarchical distributed database system.
DNS queries and responses are sent over port 53.
DNS operates through a client-server model.
Example: When you type a website URL, DNS translates it to the IP address of the se...read more
Q12. What are the key principles of memory management in iOS app development?
Key principles of memory management in iOS app development include reference counting, autorelease pools, and avoiding retain cycles.
Use ARC (Automatic Reference Counting) to manage memory automatically
Avoid retain cycles by using weak references or unowned references
Use autorelease pools to manage memory for temporary objects
Q13. What are the differences between classes and structs, and when should each be used?
Classes are reference types, while structs are value types. Classes are used for complex data structures, inheritance, and reference counting. Structs are used for simple data types and performance optimization.
Classes are reference types, stored on the heap, and support inheritance and reference counting. Use classes for complex data structures like objects, where identity matters.
Structs are value types, stored on the stack, and do not support inheritance. Use structs for s...read more
Q14. Can you describe a cooking disaster you experienced?
I once tried to bake a cake but accidentally used salt instead of sugar.
Confused salt with sugar while baking
Realized mistake after tasting batter
Had to start over with new ingredients
Q15. How will you scale-up and scale-down Kubernetes pods?
Scaling Kubernetes pods involves adjusting the number of replicas based on demand.
Use Kubernetes Horizontal Pod Autoscaler (HPA) to automatically adjust the number of replicas based on CPU or memory usage
Manually scale pods using kubectl commands like 'kubectl scale deployment
--replicas= ' Implement Cluster Autoscaler to automatically adjust the number of nodes in a cluster based on resource usage
Q16. Write a program to find a prime number from 1 to n, where n is integer.?
Program to find prime numbers from 1 to n
Iterate from 2 to n and check if each number is prime
Use a nested loop to check divisibility by numbers less than the current number
A prime number is only divisible by 1 and itself
Q17. Previous Project details ,flow and how to handle failure cases
I have worked on various projects where I have implemented robust error handling mechanisms to handle failure cases effectively.
Identify potential failure points in the project flow
Implement error handling mechanisms such as try-catch blocks
Log detailed error messages for debugging purposes
Provide user-friendly error messages to guide users in case of failures
Q18. Suppose we have list contains abc1, abcd,1231,null, empty then write java 8 code to find numbers only
Using Java 8 stream to filter out numbers from a list of strings.
Use Java 8 stream to filter out numbers using regex.
Use filter() method along with regex pattern to check for numbers.
Collect the filtered numbers into a new list.
Q19. Explain few Java 8 features, Singleton design pattern
Java 8 features include lambda expressions, streams, default methods, and more. Singleton design pattern ensures only one instance of a class exists.
Java 8 features: lambda expressions, streams, default methods, functional interfaces
Example: lambda expression - (a, b) -> a + b
Singleton design pattern: ensures only one instance of a class is created
Example: Singleton class with private constructor and static method to return instance
Q20. What deep copy and shallow copy write pollyfil for the same
Deep copy creates a new copy of an object with all nested objects also copied, while shallow copy creates a new object with references to the original nested objects.
Deep copy involves recursively copying all nested objects, while shallow copy only copies the top-level object
Deep copy ensures that changes to the original object do not affect the copied object, while shallow copy may have shared references
In JavaScript, deep copy can be achieved using JSON.parse(JSON.stringify...read more
Q21. How do you integrate and maintain third-party libraries?
Integrating and maintaining third-party libraries involves adding dependencies, managing versions, and updating as needed.
Use dependency management tools like CocoaPods or Carthage to easily add and update libraries
Regularly check for updates and security patches for third-party libraries
Ensure compatibility with existing codebase by testing thoroughly after integrating new libraries
Q22. What is testing, and what do you know about it?
Testing is the process of evaluating a software application to ensure it meets specified requirements and functions correctly.
Testing involves executing the software with the intent of finding bugs or errors.
Types of testing include unit testing, integration testing, system testing, and acceptance testing.
Testing can be manual or automated, with automated testing using tools like Selenium or JUnit.
Regression testing ensures that new code changes do not adversely affect existi...read more
Q23. what is the 2G and 3G and 5G service ?
2G, 3G, and 5G are different generations of mobile network technology.
2G refers to second-generation mobile network technology, which primarily provided voice and basic data services.
3G refers to third-generation mobile network technology, which introduced faster data speeds and enabled mobile internet access.
5G refers to fifth-generation mobile network technology, which offers significantly faster data speeds, lower latency, and supports advanced technologies like Internet o...read more
Q24. what is the HTTPS port number ?
The HTTPS port number is 443.
HTTPS uses port 443 for secure communication.
It is the default port for secure HTTP connections.
HTTPS encrypts data using SSL/TLS protocols.
Examples: https://www.example.com:443 or https://192.168.0.1:443
Q25. Difference between var and let keywords in Javascript
var is function-scoped and let is block-scoped.
var declarations are hoisted to the top of their scope
let declarations are not hoisted
var can be redeclared in the same scope
let cannot be redeclared in the same scope
var can be declared without initialization
let must be initialized before use
Q26. Diff bw union and union all Diff bw sp and functions Diff primary key and forgion key Temp table
Explanation of differences between union and union all, stored procedures and functions, primary key and foreign key, and temp tables.
Union combines and removes duplicates, while union all combines without removing duplicates.
Stored procedures are precompiled and can return multiple result sets, while functions are not precompiled and can only return a single value.
Primary key uniquely identifies a record, while foreign key references a primary key in another table.
Temp table...read more
Q27. Do you have any experience in MPLS/IP
Yes, I have experience in MPLS/IP.
I have worked with MPLS VPNs to provide secure connectivity between multiple sites.
I have configured MPLS traffic engineering to optimize network performance.
I have experience with MPLS QoS to prioritize traffic and ensure SLAs are met.
I have worked with MPLS L3VPN and L2VPN technologies.
I have experience with MPLS label distribution protocols such as LDP and RSVP-TE.
Q28. what is STP full form ?
STP stands for Spanning Tree Protocol.
STP is a network protocol used to prevent loops in Ethernet networks.
It works by creating a loop-free logical topology by blocking redundant paths.
STP elects a root bridge and calculates the shortest path to it for each network segment.
It uses Bridge Protocol Data Units (BPDU) to exchange information between switches.
STP is defined by the IEEE 802.1D standard.
Q29. What is the difference between primary key and unique key?
Primary key uniquely identifies each record in a table, while unique key ensures that all values in a column are distinct.
Primary key does not allow NULL values, while unique key allows one NULL value.
A table can have only one primary key, but multiple unique keys.
Primary key automatically creates a unique index, while unique key does not.
Primary key is used to establish relationships between tables, while unique key is used to enforce data integrity.
Q30. Difference between retesting and regression testing
Retesting is testing the same functionality again to ensure the defect is fixed, while regression testing is testing the unchanged parts of the software to ensure new changes have not affected existing functionality.
Retesting focuses on the defect fixes, while regression testing focuses on ensuring existing functionality is not impacted by new changes.
Retesting is done after a defect is fixed, while regression testing is done after new changes are made to the software.
Retesti...read more
Q31. What is your knowledge of core animation?
Core Animation is a powerful framework in iOS for creating animations and visual effects.
Core Animation is a high-performance framework for animating views and graphics on iOS devices.
It allows for smooth animations, transitions, and effects without compromising performance.
Core Animation uses layers to manage the visual content of your app, providing hardware-accelerated rendering.
You can create animations using keyframe animations, implicit animations, and transitions.
Examp...read more
Q32. What is python lambda, pass statement
Python lambda is an anonymous function and pass statement is a null operation.
Lambda is a shorthand way of defining small functions without a name.
Lambda functions can take any number of arguments but can only have one expression.
Pass statement is a placeholder for empty code blocks.
It is used when a statement is required syntactically but no code needs to be executed.
Q33. How variables are being passed in JAVA?
Variables in JAVA are passed by value, meaning a copy of the variable's value is passed to a method.
In JAVA, primitive data types are passed by value, while objects are passed by reference.
When a primitive data type is passed to a method, a copy of the value is passed, so changes made to the parameter inside the method do not affect the original variable.
When an object is passed to a method, the reference to the object is passed by value, meaning changes to the object's state...read more
Q34. Write a sample JAVA program to parse and validate mail-id
A sample JAVA program to parse and validate mail-id
Use regular expressions to validate the email format
Check for the presence of '@' symbol and domain name
Utilize try-catch blocks for error handling
Use Java libraries like javax.mail.internet.InternetAddress for validation
Q35. what is the dhcp dora process?
DHCP DORA process is the sequence of steps followed by a client to obtain an IP address from a DHCP server.
DORA stands for Discover, Offer, Request, and Acknowledge.
Discover: Client broadcasts a DHCP Discover message to find available DHCP servers.
Offer: DHCP servers respond with DHCP Offer messages containing IP address lease information.
Request: Client selects one DHCP Offer and sends a DHCP Request message to request the offered IP address.
Acknowledge: DHCP server sends a ...read more
Q36. what is the HTTP port number ?
The HTTP port number is 80.
The default port number for HTTP is 80.
It is used for communication between web servers and clients.
Other common port numbers for HTTP include 8080 and 8888.
Q37. what is the dtp porotocol ?
DTP (Dynamic Trunking Protocol) is a Cisco proprietary protocol used to negotiate trunking between switches.
DTP is used to automatically negotiate trunking on a link between Cisco switches.
It allows switches to dynamically form trunk links without manual configuration.
DTP operates in three modes: dynamic auto, dynamic desirable, and trunk.
Dynamic auto mode waits for the other end to initiate trunking.
Dynamic desirable mode actively tries to form a trunk.
Trunk mode actively fo...read more
Q38. Code to filter the record using Java 8
Using Java 8 stream to filter records in an array of strings
Use stream() method to convert the array to a stream
Use filter() method to specify the filtering condition
Use collect() method to collect the filtered elements back into an array
Q39. What is WCF authentication
WCF authentication is a mechanism to verify the identity of a client accessing a WCF service.
WCF supports various authentication mechanisms such as Windows, username/password, certificates, and custom authentication.
Authentication can be configured at the transport or message level.
Transport-level authentication is performed before the message is decrypted, while message-level authentication is performed after decryption.
Examples of authentication protocols supported by WCF i...read more
Q40. create 2D matrix and sort them and display
Create and sort a 2D matrix of strings
Create a 2D array of strings
Use a sorting algorithm to sort the strings in each row or column
Display the sorted 2D matrix
Q41. How Spring security works
Spring Security is a powerful and customizable authentication and access control framework for Java applications.
Spring Security provides comprehensive security services for Java EE-based enterprise software applications.
It offers authentication, authorization, and protection against common security vulnerabilities.
Spring Security is highly customizable and can be integrated with various authentication mechanisms like LDAP, OAuth, and more.
It uses filters and interceptors to ...read more
Q42. Why you want to chnage compoany?
Seeking new challenges, growth opportunities, and a better work-life balance.
Looking for new challenges and opportunities for growth
Seeking a better work-life balance
Interested in working with cutting-edge technologies or in a different industry
Want to expand my skill set and knowledge
Q43. Introduction Day to Day Activities 2G 3G &4G Call flows Architecture's Issues in Testing Types of issues Tools knowledge Etc.
Q44. what is your design process from start to finish?
My design process involves research, ideation, prototyping, testing, and iteration to create user-centered solutions.
Research: Understand user needs, market trends, and competition.
Ideation: Brainstorm and sketch out potential design solutions.
Prototyping: Create wireframes or mockups to visualize the design.
Testing: Gather feedback from users through usability testing.
Iteration: Refine the design based on feedback and make improvements.
Examples: Conducting user interviews, c...read more
Q45. reverse a string,swap two numbers without using third variable,framework explanation
Answering interview questions on string reversal, swapping numbers without third variable, and framework explanation for Senior QA Engineer role.
To reverse a string, use a loop to iterate through the string and swap the characters at opposite ends of the string.
To swap two numbers without a third variable, use arithmetic operations to manipulate the values.
For framework explanation, discuss the testing framework you are familiar with and how you have used it in previous proje...read more
Q46. what do you know? your experience data entry? how is typing speed?
I have 3 years of experience in data entry with a typing speed of 70 words per minute.
I have 3 years of experience in data entry.
I am proficient in using Microsoft Excel and Word for data entry tasks.
My typing speed is 70 words per minute, with a high level of accuracy.
I have experience in entering large volumes of data accurately and efficiently.
I am detail-oriented and able to meet tight deadlines for data entry projects.
Q47. What is oops concepts?
Object-oriented programming concepts that focus on objects and classes for better code organization and reusability.
Encapsulation: Bundling data and methods that operate on the data into a single unit (class).
Inheritance: Ability of a class to inherit properties and behavior from another class.
Polymorphism: Ability to present the same interface for different data types.
Abstraction: Hiding the complex implementation details and showing only the necessary features to the outsid...read more
Q48. What is web services?
Web services are software systems designed to allow communication between different devices over the internet.
Web services use standardized protocols like HTTP to enable communication
They can be used for exchanging data between different applications or systems
Examples include RESTful APIs, SOAP, and XML-RPC
Q49. How constructors work in Java
Constructors are special methods used to initialize objects in Java.
Constructors have the same name as the class they belong to.
They are called automatically when an object is created.
Constructors can be overloaded to accept different parameters.
They can also call other constructors using the 'this' keyword.
If a class does not define a constructor, a default constructor is provided.
Q50. Please explain multithreading
Multithreading is the ability of a CPU to execute multiple threads concurrently.
Multithreading allows for parallel execution of tasks, improving performance.
Threads share the same memory space, but have their own stack and registers.
Synchronization is necessary to prevent race conditions and ensure data consistency.
Examples include web servers handling multiple requests simultaneously and video games rendering graphics while processing user input.
Q51. Rafter after gi to be t
The question is nonsensical and does not make sense.
The question does not have a clear meaning or context.
It is likely a mistake or typo.
Without more information, it is impossible to provide a meaningful answer.
Q52. Explain few cypress commands
Cypress is a JavaScript end-to-end testing framework. Few commands are - visit, get, click, type, wait, assert.
visit - navigates to a URL
get - selects an element
click - clicks on an element
type - types into an input field
wait - waits for an element to appear or disappear
assert - verifies that an element has certain text or attributes
Q53. testNG: explain different annotations, parallel test,
testNG annotations are used to control the flow of test execution and parallel test execution allows running tests concurrently.
testNG annotations include @Test, @BeforeSuite, @AfterSuite, @BeforeTest, @AfterTest, @BeforeClass, @AfterClass, @BeforeMethod, @AfterMethod
Annotations help in setting up preconditions, postconditions, grouping tests, prioritizing tests, and enabling/disabling tests
Parallel test execution in testNG can be achieved using 'parallel' attribute in testng...read more
Q54. Exceptions handling in Selenium
Exception handling in Selenium is crucial for maintaining test stability and reliability.
Exceptions can occur due to various reasons such as element not found, timeout, stale element reference, etc.
Handling exceptions can be done using try-catch blocks or using Selenium's built-in exception handling mechanism.
It is important to handle exceptions gracefully and provide meaningful error messages for debugging purposes.
Examples of exception handling in Selenium include handling ...read more
Q55. What is joins in SQL?
Joins in SQL are used to combine rows from two or more tables based on a related column between them.
Joins are used to retrieve data from multiple tables based on a related column between them.
Common types of joins include INNER JOIN, LEFT JOIN, RIGHT JOIN, and FULL JOIN.
Example: SELECT * FROM table1 INNER JOIN table2 ON table1.column = table2.column;
Q56. What is substring in SQL?
Substring in SQL is a function that extracts a portion of a string based on a specified starting position and length.
Substring function is used to extract a part of a string based on the starting position and length provided.
Syntax: SUBSTRING(string_expression, start, length)
Example: SELECT SUBSTRING('Hello World', 1, 5) will return 'Hello'
Q57. Code to reverse a String
Code to reverse a String
Use a loop to iterate through the characters of the string
Append each character to a new string in reverse order
Return the reversed string
Q58. What you know about technical process
Technical process involves a series of steps or actions to achieve a specific goal or outcome.
Technical process typically involves planning, designing, implementing, and evaluating.
It often requires specialized knowledge, skills, and tools.
Examples include software development, manufacturing processes, and engineering design.
Q59. Explain your automation framework
Our automation framework is a hybrid framework that combines data-driven and keyword-driven approaches.
We use Selenium WebDriver for UI automation and RestAssured for API automation
Our framework is built using Java and TestNG
We have a centralized configuration file for easy maintenance
We use Jenkins for continuous integration and delivery
We have a custom reporting mechanism that generates detailed reports with screenshots
We have a set of reusable functions and libraries for f...read more
Q60. Sip headers, difference between contact , to & from
SIP headers like Contact, To, and From play different roles in SIP communication.
Contact header contains the address where the recipient can send requests to the sender.
To header contains the address of the recipient of the request.
From header contains the address of the sender of the request.
Q61. Difference between DROP and TRUNCATE?
DROP deletes the table structure and data, while TRUNCATE deletes only the data.
DROP removes the table from the database, including all data and structure.
TRUNCATE removes all data from the table, but keeps the table structure intact.
DROP is a DDL (Data Definition Language) command, while TRUNCATE is a DML (Data Manipulation Language) command.
Q62. What is the role of kubernetes pod
Kubernetes pod is the smallest deployable unit in Kubernetes that represents a single instance of a running process.
Pods can contain one or more containers that share resources like storage and network.
Pods are scheduled onto nodes in a Kubernetes cluster.
Pods are mortal, meaning they can be created, destroyed, and replaced by the Kubernetes system.
Pods can be managed using controllers like Deployments, StatefulSets, and DaemonSets.
Q63. Reverse a string - Python
Reverse a string in Python using slicing
Use string slicing with a step of -1 to reverse the string
Example: 'hello'[::-1] will return 'olleh'
Q64. What is DNS & how it works
DNS stands for Domain Name System, it translates domain names to IP addresses to locate resources on the internet.
DNS is like a phone book for the internet, translating human-readable domain names (like google.com) to IP addresses (like 172.217.3.206).
DNS works by sending queries to a series of servers starting from the local DNS resolver, then to authoritative DNS servers for the specific domain.
DNS uses a hierarchical system with root servers at the top, followed by top-lev...read more
Q65. Loops in 837 EDI file
Loops in 837 EDI file are used to repeat a segment or a group of segments multiple times.
Loops in 837 EDI file are defined by a loop identifier and a loop repeat count.
Each loop contains a set of segments that are repeated based on the loop repeat count.
For example, Loop 2010AA in the 837 file contains information about the billing provider.
Loops can be nested within each other to represent complex hierarchical data structures.
Q66. Difference between UDP and TCP protocol
UDP is connectionless and unreliable, while TCP is connection-oriented and reliable.
UDP stands for User Datagram Protocol, while TCP stands for Transmission Control Protocol.
UDP does not guarantee delivery of packets, while TCP ensures delivery through error checking and retransmission.
UDP is faster but less reliable, while TCP is slower but more reliable.
Examples of UDP applications include DNS and video streaming, while examples of TCP applications include web browsing and ...read more
Q67. write SQL joins queries
SQL joins queries are used to combine rows from two or more tables based on a related column between them.
Use INNER JOIN to return rows when there is at least one match in both tables
Use LEFT JOIN to return all rows from the left table and the matched rows from the right table
Use RIGHT JOIN to return all rows from the right table and the matched rows from the left table
Use FULL JOIN to return rows when there is a match in one of the tables
Q68. What is OSD and the process
OSD stands for On-Screen Display, a visual interface that provides information and settings on a display screen.
OSD is commonly used in monitors, TVs, and projectors to adjust settings such as brightness, contrast, and volume.
The OSD menu can be accessed by pressing specific buttons on the device or through a remote control.
Users can navigate through the OSD menu using arrow keys or other designated buttons.
OSD can also display information such as input source, resolution, an...read more
Q69. Tools used for testing
Various tools are used for testing software, such as Selenium, JUnit, TestNG, Postman, and JIRA.
Selenium - for automated testing of web applications
JUnit - for unit testing in Java
TestNG - for testing in Java
Postman - for API testing
JIRA - for issue tracking and project management
Q70. Provider types in healthcare
Provider types in healthcare refer to different categories of healthcare professionals or organizations that offer medical services.
Primary care providers (PCPs) - such as family doctors, pediatricians, and internists
Specialists - such as cardiologists, dermatologists, and neurologists
Hospitals and healthcare facilities - including acute care hospitals, rehabilitation centers, and nursing homes
Allied health professionals - such as physical therapists, occupational therapists,...read more
Q71. What is agile model
Agile model is a software development approach where requirements and solutions evolve through collaboration between self-organizing cross-functional teams.
Iterative and incremental development
Customer involvement and feedback throughout the development process
Adaptive planning and flexibility to changes
Regular team collaboration and communication
Examples: Scrum, Kanban, XP
Q72. Solid and design principles
Solid and design principles are fundamental concepts in software engineering that help in creating maintainable and scalable code.
SOLID principles include Single Responsibility, Open/Closed, Liskov Substitution, Interface Segregation, and Dependency Inversion.
Design principles like DRY (Don't Repeat Yourself) and KISS (Keep It Simple, Stupid) help in writing clean and efficient code.
Applying SOLID and design principles leads to code that is easier to understand, maintain, and...read more
Q73. Linux commands for deployment
Linux commands for deployment are essential for Technical Leads to efficiently manage and deploy applications.
Use 'scp' command to securely copy files between local and remote servers
Utilize 'rsync' command for efficient file synchronization and transfer
Leverage 'ssh' command for secure remote access to servers
Employ 'tar' command for archiving and compressing files before deployment
Q74. Explain about waterfall model
Waterfall model is a linear sequential software development process where progress flows in one direction like a waterfall.
Sequential process with distinct phases: Requirements, Design, Implementation, Testing, Deployment
Each phase must be completed before moving to the next
No overlapping of phases
Changes are difficult to implement once a phase is completed
Example: Traditional software development approach
Q75. What is class in java.
A class in Java is a blueprint for creating objects, defining attributes and behaviors.
Classes are used to create objects in Java.
They define attributes (fields) and behaviors (methods) of the objects.
Classes can be instantiated to create multiple objects of the same type.
Example: class Car { String color; void drive() { ... } }
Example: Car myCar = new Car();
Q76. Monitoring tools using in organisation
We use a variety of monitoring tools depending on the specific needs of each system.
For infrastructure monitoring, we use tools like Nagios, Zabbix, and Prometheus.
For application monitoring, we use tools like New Relic, AppDynamics, and Datadog.
We also use ELK stack for log monitoring and analysis.
Our cloud infrastructure is monitored using AWS CloudWatch and Azure Monitor.
We have also implemented custom scripts and dashboards for specific monitoring needs.
Q77. OSPF NETWORK TYPE
OSPF network type refers to the way in which OSPF routers are connected and exchange information.
There are four OSPF network types: point-to-point, broadcast, non-broadcast, and point-to-multipoint.
Point-to-point is used for direct connections between two routers.
Broadcast is used for networks with multiple routers and a shared media, such as Ethernet.
Non-broadcast is used for networks with multiple routers and no shared media, such as Frame Relay.
Point-to-multipoint is used ...read more
Q78. What's the DNS port number
DNS port number is 53
DNS port number is 53 for both TCP and UDP protocols
It is used for DNS queries and responses
Firewalls and network devices need to allow traffic on port 53 for DNS to function properly
Q79. Fundamentals of iOS .
Fundamentals of iOS include UIKit, Core Data, Grand Central Dispatch, and Swift programming language.
UIKit is the framework for building iOS user interfaces
Core Data is the framework for managing data in iOS apps
Grand Central Dispatch is used for managing concurrency and parallelism
Swift is the primary programming language for iOS development
Q80. Code to swap two strings
Code to swap two strings in an array
Create a temporary variable to store one of the strings
Assign the value of the first string to the second string
Assign the value of the temporary variable to the first string
Q81. Call flow of Diameter
Diameter is a protocol used in telecommunications for authentication, authorization, and accounting (AAA) purposes.
Diameter is an evolution of the RADIUS protocol, designed to address its limitations.
It is used in various network elements like AAA servers, gateways, and proxies.
Diameter messages consist of header, flags, command code, application ID, and AVPs.
It supports various applications like Diameter Credit-Control Application (DCCA) and Diameter Base Protocol (DBP).
Q82. What is MVC Pattern.
MVC is a software design pattern that separates an application into three main components: Model, View, and Controller.
Model represents the data and business logic of the application.
View is responsible for displaying the data to the user.
Controller acts as an intermediary between Model and View, handling user input and updating the Model accordingly.
MVC helps in achieving separation of concerns, making the code more organized and maintainable.
Example: In a web application, t...read more
Q83. Golden rules of business
Q84. Data center explanation
A data center is a facility used to house computer systems and associated components, such as telecommunications and storage systems.
Data centers are used to store, manage, and process data for various purposes.
They typically include servers, networking equipment, storage systems, and security devices.
Data centers can be owned and operated by a company or rented from a third-party provider.
Examples of data center providers include Amazon Web Services (AWS), Microsoft Azure, a...read more
Q85. Tools regarding knowledge.
Q86. call flow of Gx
Gx is a protocol used in 3G and 4G networks for policy and charging control.
Gx is used for communication between the Policy and Charging Rules Function (PCRF) and the Policy and Charging Enforcement Function (PCEF)
It is used to establish and manage Quality of Service (QoS) policies for data traffic
Gx messages include Credit-Control-Request (CCR) and Credit-Control-Answer (CCA)
More about working at Infinite Computer Solutions

Top HR Questions asked in Infinite Computer Solutions
Interview Process at Infinite Computer Solutions

Top Interview Questions from Similar Companies








Reviews
Interviews
Salaries
Users/Month

