CoverPhoto
Infinite Computer Solutions logo
Premium Employer

Infinite Computer Solutions

Verified
3.4
based on 1.5k Reviews
Filter interviews by

80+ Infinite Computer Solutions Interview Questions and Answers

Updated 1 Mar 2025
Popular Designations

Q1. Which library do you use to automate tasks in aws?

Ans.

I use boto3 library to automate tasks in aws.

  • Boto3 is the Amazon Web Services (AWS) Software Development Kit (SDK) for Python.

  • It allows Python developers to write software that makes use of services like Amazon S3 and Amazon EC2.

  • Boto3 makes it easy to integrate your Python application, library, or script with AWS services.

  • Example: boto3.client('s3') to create a client for Amazon S3 service.

View 2 more answers
right arrow

Q2. in which layer the Ip address is working on if it working on L3 so how can we assisgn an Ip address on Layer 2 Switch descibe in the details ?

Ans.

The IP address works at Layer 3 of the OSI model. Assigning an IP address on a Layer 2 switch is not possible.

  • IP addresses are used for network layer communication (Layer 3)

  • Layer 2 switches operate at the data link layer (Layer 2)

  • Layer 2 switches use MAC addresses for communication within a local network

  • IP addresses are assigned to devices connected to Layer 2 switches, not to the switch itself

Add your answer
right arrow
Infinite Computer Solutions Interview Questions and Answers for Freshers
illustration image

Q3. what is the OSI model and describe about the each and every layer of that layer function and functionality?

Ans.

The OSI model is a conceptual framework that standardizes the functions of a communication system into seven layers.

  • Layer 1 (Physical): Deals with the physical transmission of data over the network.

  • Layer 2 (Data Link): Provides error-free transmission of data frames between nodes on the same network.

  • Layer 3 (Network): Handles routing and logical addressing to enable data transfer between different networks.

  • Layer 4 (Transport): Ensures reliable delivery of data by segmenting a...read more

Add your answer
right arrow

Q4. What is the main function of the Root bridge switch ?

Ans.

The main function of the Root bridge switch is to control the flow of data traffic in a spanning tree network.

  • The Root bridge switch is elected as the central point of the spanning tree network.

  • It determines the shortest path for data traffic to reach all other switches in the network.

  • The Root bridge switch sends Bridge Protocol Data Units (BPDUs) to other switches to exchange information and maintain the spanning tree topology.

  • It helps prevent loops and ensures a loop-free n...read more

View 1 answer
right arrow
Discover Infinite Computer Solutions interview dos and don'ts from real experiences

Q5. What are the differences and similarities between Java and Python, and which one is considered the best?

Ans.

Java and Python are both popular programming languages, with Java being statically typed and Python being dynamically typed.

  • Java is statically typed, while Python is dynamically typed

  • Java requires explicit declaration of data types, while Python does not

  • Java is compiled into bytecode which runs on the Java Virtual Machine, while Python is interpreted at runtime

  • Java is commonly used for enterprise applications and Android development, while Python is popular for web developmen...read more

Add your answer
right arrow

Q6. what is the ssh port number and why we used the ssh service ?

Ans.

SSH port number is 22. SSH service is used for secure remote access and secure file transfer.

  • SSH port number is 22 by default

  • SSH stands for Secure Shell

  • SSH service provides secure remote access to servers

  • It encrypts the data transmitted over the network

  • SSH service is used for secure file transfer (SFTP) and remote command execution

  • It provides authentication and encryption for secure communication

Add your answer
right arrow
Are these interview questions helpful?

Q7. what is the tcp/ip model and why we used this model in current scenario?

Ans.

The TCP/IP model is a network protocol suite that defines how data is transmitted over the internet.

  • The TCP/IP model consists of four layers: Network Interface, Internet, Transport, and Application.

  • It is used in the current scenario because it provides a standardized framework for communication between devices on a network.

  • The TCP/IP model allows for reliable and efficient data transmission, ensuring that data packets are delivered accurately and in the correct order.

  • It is wi...read more

Add your answer
right arrow

Q8. which series you have worked on router device and the vendors?

Ans.

I have worked on various router devices and vendors.

  • Cisco routers (e.g. Cisco 2900 series)

  • Juniper routers (e.g. Juniper MX series)

  • Huawei routers (e.g. Huawei NE series)

  • MikroTik routers (e.g. MikroTik RB series)

Add your answer
right arrow
Share interview questions and help millions of jobseekers 🌟
man with laptop

Q9. What is the function of global keyword

Ans.

Global keyword is used to define a variable as global, which can be accessed from any part of the program.

  • Global keyword is used to declare a variable outside of a function, making it accessible from any part of the program.

  • It is useful when a variable needs to be accessed by multiple functions or modules.

  • Global variables can be modified by any function that has access to them, which can lead to unexpected behavior.

  • Example: global x def func(): global x x = 10 func() print(x)...read more

Add your answer
right arrow

Q10. What are the differences between the MVC and MVVM architectural patterns, and in what scenarios should each be used?

Ans.

MVC focuses on separating data, presentation, and logic, while MVVM adds a ViewModel layer to enhance data binding and separation of concerns.

  • MVC: Model-View-Controller pattern separates data, presentation, and logic. Views directly interact with Models and Controllers.

  • MVVM: Model-View-ViewModel pattern adds a ViewModel layer between the View and Model to enhance data binding and separation of concerns.

  • MVC is more traditional and widely used, while MVVM is gaining popularity ...read more

Add your answer
right arrow

Q11. what is the port number of dns and how it's work?

Ans.

DNS uses port number 53. It works by translating domain names into IP addresses and vice versa.

  • DNS stands for Domain Name System.

  • Port number 53 is used for both TCP and UDP protocols.

  • DNS works by resolving domain names to their corresponding IP addresses.

  • It uses a hierarchical distributed database system.

  • DNS queries and responses are sent over port 53.

  • DNS operates through a client-server model.

  • Example: When you type a website URL, DNS translates it to the IP address of the se...read more

Add your answer
right arrow

Q12. What are the key principles of memory management in iOS app development?

Ans.

Key principles of memory management in iOS app development include reference counting, autorelease pools, and avoiding retain cycles.

  • Use ARC (Automatic Reference Counting) to manage memory automatically

  • Avoid retain cycles by using weak references or unowned references

  • Use autorelease pools to manage memory for temporary objects

Add your answer
right arrow

Q13. What are the differences between classes and structs, and when should each be used?

Ans.

Classes are reference types, while structs are value types. Classes are used for complex data structures, inheritance, and reference counting. Structs are used for simple data types and performance optimization.

  • Classes are reference types, stored on the heap, and support inheritance and reference counting. Use classes for complex data structures like objects, where identity matters.

  • Structs are value types, stored on the stack, and do not support inheritance. Use structs for s...read more

Add your answer
right arrow

Q14. Can you describe a cooking disaster you experienced?

Ans.

I once tried to bake a cake but accidentally used salt instead of sugar.

  • Confused salt with sugar while baking

  • Realized mistake after tasting batter

  • Had to start over with new ingredients

Add your answer
right arrow

Q15. How will you scale-up and scale-down Kubernetes pods?

Ans.

Scaling Kubernetes pods involves adjusting the number of replicas based on demand.

  • Use Kubernetes Horizontal Pod Autoscaler (HPA) to automatically adjust the number of replicas based on CPU or memory usage

  • Manually scale pods using kubectl commands like 'kubectl scale deployment --replicas='

  • Implement Cluster Autoscaler to automatically adjust the number of nodes in a cluster based on resource usage

Add your answer
right arrow

Q16. Write a program to find a prime number from 1 to n, where n is integer.?

Ans.

Program to find prime numbers from 1 to n

  • Iterate from 2 to n and check if each number is prime

  • Use a nested loop to check divisibility by numbers less than the current number

  • A prime number is only divisible by 1 and itself

Add your answer
right arrow

Q17. Previous Project details ,flow and how to handle failure cases

Ans.

I have worked on various projects where I have implemented robust error handling mechanisms to handle failure cases effectively.

  • Identify potential failure points in the project flow

  • Implement error handling mechanisms such as try-catch blocks

  • Log detailed error messages for debugging purposes

  • Provide user-friendly error messages to guide users in case of failures

Add your answer
right arrow

Q18. Suppose we have list contains abc1, abcd,1231,null, empty then write java 8 code to find numbers only

Ans.

Using Java 8 stream to filter out numbers from a list of strings.

  • Use Java 8 stream to filter out numbers using regex.

  • Use filter() method along with regex pattern to check for numbers.

  • Collect the filtered numbers into a new list.

Add your answer
right arrow

Q19. Explain few Java 8 features, Singleton design pattern

Ans.

Java 8 features include lambda expressions, streams, default methods, and more. Singleton design pattern ensures only one instance of a class exists.

  • Java 8 features: lambda expressions, streams, default methods, functional interfaces

  • Example: lambda expression - (a, b) -> a + b

  • Singleton design pattern: ensures only one instance of a class is created

  • Example: Singleton class with private constructor and static method to return instance

Add your answer
right arrow

Q20. What deep copy and shallow copy write pollyfil for the same

Ans.

Deep copy creates a new copy of an object with all nested objects also copied, while shallow copy creates a new object with references to the original nested objects.

  • Deep copy involves recursively copying all nested objects, while shallow copy only copies the top-level object

  • Deep copy ensures that changes to the original object do not affect the copied object, while shallow copy may have shared references

  • In JavaScript, deep copy can be achieved using JSON.parse(JSON.stringify...read more

Add your answer
right arrow

Q21. How do you integrate and maintain third-party libraries?

Ans.

Integrating and maintaining third-party libraries involves adding dependencies, managing versions, and updating as needed.

  • Use dependency management tools like CocoaPods or Carthage to easily add and update libraries

  • Regularly check for updates and security patches for third-party libraries

  • Ensure compatibility with existing codebase by testing thoroughly after integrating new libraries

Add your answer
right arrow

Q22. What is testing, and what do you know about it?

Ans.

Testing is the process of evaluating a software application to ensure it meets specified requirements and functions correctly.

  • Testing involves executing the software with the intent of finding bugs or errors.

  • Types of testing include unit testing, integration testing, system testing, and acceptance testing.

  • Testing can be manual or automated, with automated testing using tools like Selenium or JUnit.

  • Regression testing ensures that new code changes do not adversely affect existi...read more

Add your answer
right arrow

Q23. what is the 2G and 3G and 5G service ?

Ans.

2G, 3G, and 5G are different generations of mobile network technology.

  • 2G refers to second-generation mobile network technology, which primarily provided voice and basic data services.

  • 3G refers to third-generation mobile network technology, which introduced faster data speeds and enabled mobile internet access.

  • 5G refers to fifth-generation mobile network technology, which offers significantly faster data speeds, lower latency, and supports advanced technologies like Internet o...read more

Add your answer
right arrow

Q24. what is the HTTPS port number ?

Ans.

The HTTPS port number is 443.

  • HTTPS uses port 443 for secure communication.

  • It is the default port for secure HTTP connections.

  • HTTPS encrypts data using SSL/TLS protocols.

  • Examples: https://www.example.com:443 or https://192.168.0.1:443

Add your answer
right arrow

Q25. Difference between var and let keywords in Javascript

Ans.

var is function-scoped and let is block-scoped.

  • var declarations are hoisted to the top of their scope

  • let declarations are not hoisted

  • var can be redeclared in the same scope

  • let cannot be redeclared in the same scope

  • var can be declared without initialization

  • let must be initialized before use

Add your answer
right arrow

Q26. Diff bw union and union all Diff bw sp and functions Diff primary key and forgion key Temp table

Ans.

Explanation of differences between union and union all, stored procedures and functions, primary key and foreign key, and temp tables.

  • Union combines and removes duplicates, while union all combines without removing duplicates.

  • Stored procedures are precompiled and can return multiple result sets, while functions are not precompiled and can only return a single value.

  • Primary key uniquely identifies a record, while foreign key references a primary key in another table.

  • Temp table...read more

Add your answer
right arrow

Q27. Do you have any experience in MPLS/IP

Ans.

Yes, I have experience in MPLS/IP.

  • I have worked with MPLS VPNs to provide secure connectivity between multiple sites.

  • I have configured MPLS traffic engineering to optimize network performance.

  • I have experience with MPLS QoS to prioritize traffic and ensure SLAs are met.

  • I have worked with MPLS L3VPN and L2VPN technologies.

  • I have experience with MPLS label distribution protocols such as LDP and RSVP-TE.

Add your answer
right arrow

Q28. what is STP full form ?

Ans.

STP stands for Spanning Tree Protocol.

  • STP is a network protocol used to prevent loops in Ethernet networks.

  • It works by creating a loop-free logical topology by blocking redundant paths.

  • STP elects a root bridge and calculates the shortest path to it for each network segment.

  • It uses Bridge Protocol Data Units (BPDU) to exchange information between switches.

  • STP is defined by the IEEE 802.1D standard.

View 1 answer
right arrow

Q29. What is the difference between primary key and unique key?

Ans.

Primary key uniquely identifies each record in a table, while unique key ensures that all values in a column are distinct.

  • Primary key does not allow NULL values, while unique key allows one NULL value.

  • A table can have only one primary key, but multiple unique keys.

  • Primary key automatically creates a unique index, while unique key does not.

  • Primary key is used to establish relationships between tables, while unique key is used to enforce data integrity.

Add your answer
right arrow

Q30. Difference between retesting and regression testing

Ans.

Retesting is testing the same functionality again to ensure the defect is fixed, while regression testing is testing the unchanged parts of the software to ensure new changes have not affected existing functionality.

  • Retesting focuses on the defect fixes, while regression testing focuses on ensuring existing functionality is not impacted by new changes.

  • Retesting is done after a defect is fixed, while regression testing is done after new changes are made to the software.

  • Retesti...read more

Add your answer
right arrow

Q31. What is your knowledge of core animation?

Ans.

Core Animation is a powerful framework in iOS for creating animations and visual effects.

  • Core Animation is a high-performance framework for animating views and graphics on iOS devices.

  • It allows for smooth animations, transitions, and effects without compromising performance.

  • Core Animation uses layers to manage the visual content of your app, providing hardware-accelerated rendering.

  • You can create animations using keyframe animations, implicit animations, and transitions.

  • Examp...read more

Add your answer
right arrow

Q32. What is python lambda, pass statement

Ans.

Python lambda is an anonymous function and pass statement is a null operation.

  • Lambda is a shorthand way of defining small functions without a name.

  • Lambda functions can take any number of arguments but can only have one expression.

  • Pass statement is a placeholder for empty code blocks.

  • It is used when a statement is required syntactically but no code needs to be executed.

Add your answer
right arrow

Q33. How variables are being passed in JAVA?

Ans.

Variables in JAVA are passed by value, meaning a copy of the variable's value is passed to a method.

  • In JAVA, primitive data types are passed by value, while objects are passed by reference.

  • When a primitive data type is passed to a method, a copy of the value is passed, so changes made to the parameter inside the method do not affect the original variable.

  • When an object is passed to a method, the reference to the object is passed by value, meaning changes to the object's state...read more

Add your answer
right arrow

Q34. Write a sample JAVA program to parse and validate mail-id

Ans.

A sample JAVA program to parse and validate mail-id

  • Use regular expressions to validate the email format

  • Check for the presence of '@' symbol and domain name

  • Utilize try-catch blocks for error handling

  • Use Java libraries like javax.mail.internet.InternetAddress for validation

Add your answer
right arrow

Q35. what is the dhcp dora process?

Ans.

DHCP DORA process is the sequence of steps followed by a client to obtain an IP address from a DHCP server.

  • DORA stands for Discover, Offer, Request, and Acknowledge.

  • Discover: Client broadcasts a DHCP Discover message to find available DHCP servers.

  • Offer: DHCP servers respond with DHCP Offer messages containing IP address lease information.

  • Request: Client selects one DHCP Offer and sends a DHCP Request message to request the offered IP address.

  • Acknowledge: DHCP server sends a ...read more

Add your answer
right arrow

Q36. what is the HTTP port number ?

Ans.

The HTTP port number is 80.

  • The default port number for HTTP is 80.

  • It is used for communication between web servers and clients.

  • Other common port numbers for HTTP include 8080 and 8888.

Add your answer
right arrow

Q37. what is the dtp porotocol ?

Ans.

DTP (Dynamic Trunking Protocol) is a Cisco proprietary protocol used to negotiate trunking between switches.

  • DTP is used to automatically negotiate trunking on a link between Cisco switches.

  • It allows switches to dynamically form trunk links without manual configuration.

  • DTP operates in three modes: dynamic auto, dynamic desirable, and trunk.

  • Dynamic auto mode waits for the other end to initiate trunking.

  • Dynamic desirable mode actively tries to form a trunk.

  • Trunk mode actively fo...read more

Add your answer
right arrow

Q38. Code to filter the record using Java 8

Ans.

Using Java 8 stream to filter records in an array of strings

  • Use stream() method to convert the array to a stream

  • Use filter() method to specify the filtering condition

  • Use collect() method to collect the filtered elements back into an array

Add your answer
right arrow

Q39. What is WCF authentication

Ans.

WCF authentication is a mechanism to verify the identity of a client accessing a WCF service.

  • WCF supports various authentication mechanisms such as Windows, username/password, certificates, and custom authentication.

  • Authentication can be configured at the transport or message level.

  • Transport-level authentication is performed before the message is decrypted, while message-level authentication is performed after decryption.

  • Examples of authentication protocols supported by WCF i...read more

Add your answer
right arrow

Q40. create 2D matrix and sort them and display

Ans.

Create and sort a 2D matrix of strings

  • Create a 2D array of strings

  • Use a sorting algorithm to sort the strings in each row or column

  • Display the sorted 2D matrix

Add your answer
right arrow

Q41. How Spring security works

Ans.

Spring Security is a powerful and customizable authentication and access control framework for Java applications.

  • Spring Security provides comprehensive security services for Java EE-based enterprise software applications.

  • It offers authentication, authorization, and protection against common security vulnerabilities.

  • Spring Security is highly customizable and can be integrated with various authentication mechanisms like LDAP, OAuth, and more.

  • It uses filters and interceptors to ...read more

Add your answer
right arrow

Q42. Why you want to chnage compoany?

Ans.

Seeking new challenges, growth opportunities, and a better work-life balance.

  • Looking for new challenges and opportunities for growth

  • Seeking a better work-life balance

  • Interested in working with cutting-edge technologies or in a different industry

  • Want to expand my skill set and knowledge

Add your answer
right arrow

Q43. Introduction Day to Day Activities 2G 3G &4G Call flows Architecture's Issues in Testing Types of issues Tools knowledge Etc.

Add your answer
right arrow

Q44. what is your design process from start to finish?

Ans.

My design process involves research, ideation, prototyping, testing, and iteration to create user-centered solutions.

  • Research: Understand user needs, market trends, and competition.

  • Ideation: Brainstorm and sketch out potential design solutions.

  • Prototyping: Create wireframes or mockups to visualize the design.

  • Testing: Gather feedback from users through usability testing.

  • Iteration: Refine the design based on feedback and make improvements.

  • Examples: Conducting user interviews, c...read more

Add your answer
right arrow

Q45. reverse a string,swap two numbers without using third variable,framework explanation

Ans.

Answering interview questions on string reversal, swapping numbers without third variable, and framework explanation for Senior QA Engineer role.

  • To reverse a string, use a loop to iterate through the string and swap the characters at opposite ends of the string.

  • To swap two numbers without a third variable, use arithmetic operations to manipulate the values.

  • For framework explanation, discuss the testing framework you are familiar with and how you have used it in previous proje...read more

Add your answer
right arrow

Q46. what do you know? your experience data entry? how is typing speed?

Ans.

I have 3 years of experience in data entry with a typing speed of 70 words per minute.

  • I have 3 years of experience in data entry.

  • I am proficient in using Microsoft Excel and Word for data entry tasks.

  • My typing speed is 70 words per minute, with a high level of accuracy.

  • I have experience in entering large volumes of data accurately and efficiently.

  • I am detail-oriented and able to meet tight deadlines for data entry projects.

Add your answer
right arrow

Q47. What is oops concepts?

Ans.

Object-oriented programming concepts that focus on objects and classes for better code organization and reusability.

  • Encapsulation: Bundling data and methods that operate on the data into a single unit (class).

  • Inheritance: Ability of a class to inherit properties and behavior from another class.

  • Polymorphism: Ability to present the same interface for different data types.

  • Abstraction: Hiding the complex implementation details and showing only the necessary features to the outsid...read more

Add your answer
right arrow

Q48. What is web services?

Ans.

Web services are software systems designed to allow communication between different devices over the internet.

  • Web services use standardized protocols like HTTP to enable communication

  • They can be used for exchanging data between different applications or systems

  • Examples include RESTful APIs, SOAP, and XML-RPC

Add your answer
right arrow

Q49. How constructors work in Java

Ans.

Constructors are special methods used to initialize objects in Java.

  • Constructors have the same name as the class they belong to.

  • They are called automatically when an object is created.

  • Constructors can be overloaded to accept different parameters.

  • They can also call other constructors using the 'this' keyword.

  • If a class does not define a constructor, a default constructor is provided.

Add your answer
right arrow

Q50. Please explain multithreading

Ans.

Multithreading is the ability of a CPU to execute multiple threads concurrently.

  • Multithreading allows for parallel execution of tasks, improving performance.

  • Threads share the same memory space, but have their own stack and registers.

  • Synchronization is necessary to prevent race conditions and ensure data consistency.

  • Examples include web servers handling multiple requests simultaneously and video games rendering graphics while processing user input.

Add your answer
right arrow

Q51. Rafter after gi to be t

Ans.

The question is nonsensical and does not make sense.

  • The question does not have a clear meaning or context.

  • It is likely a mistake or typo.

  • Without more information, it is impossible to provide a meaningful answer.

Add your answer
right arrow

Q52. Explain few cypress commands

Ans.

Cypress is a JavaScript end-to-end testing framework. Few commands are - visit, get, click, type, wait, assert.

  • visit - navigates to a URL

  • get - selects an element

  • click - clicks on an element

  • type - types into an input field

  • wait - waits for an element to appear or disappear

  • assert - verifies that an element has certain text or attributes

Add your answer
right arrow

Q53. testNG: explain different annotations, parallel test,

Ans.

testNG annotations are used to control the flow of test execution and parallel test execution allows running tests concurrently.

  • testNG annotations include @Test, @BeforeSuite, @AfterSuite, @BeforeTest, @AfterTest, @BeforeClass, @AfterClass, @BeforeMethod, @AfterMethod

  • Annotations help in setting up preconditions, postconditions, grouping tests, prioritizing tests, and enabling/disabling tests

  • Parallel test execution in testNG can be achieved using 'parallel' attribute in testng...read more

Add your answer
right arrow

Q54. Exceptions handling in Selenium

Ans.

Exception handling in Selenium is crucial for maintaining test stability and reliability.

  • Exceptions can occur due to various reasons such as element not found, timeout, stale element reference, etc.

  • Handling exceptions can be done using try-catch blocks or using Selenium's built-in exception handling mechanism.

  • It is important to handle exceptions gracefully and provide meaningful error messages for debugging purposes.

  • Examples of exception handling in Selenium include handling ...read more

Add your answer
right arrow

Q55. What is joins in SQL?

Ans.

Joins in SQL are used to combine rows from two or more tables based on a related column between them.

  • Joins are used to retrieve data from multiple tables based on a related column between them.

  • Common types of joins include INNER JOIN, LEFT JOIN, RIGHT JOIN, and FULL JOIN.

  • Example: SELECT * FROM table1 INNER JOIN table2 ON table1.column = table2.column;

Add your answer
right arrow

Q56. What is substring in SQL?

Ans.

Substring in SQL is a function that extracts a portion of a string based on a specified starting position and length.

  • Substring function is used to extract a part of a string based on the starting position and length provided.

  • Syntax: SUBSTRING(string_expression, start, length)

  • Example: SELECT SUBSTRING('Hello World', 1, 5) will return 'Hello'

Add your answer
right arrow

Q57. Code to reverse a String

Ans.

Code to reverse a String

  • Use a loop to iterate through the characters of the string

  • Append each character to a new string in reverse order

  • Return the reversed string

Add your answer
right arrow

Q58. What you know about technical process

Ans.

Technical process involves a series of steps or actions to achieve a specific goal or outcome.

  • Technical process typically involves planning, designing, implementing, and evaluating.

  • It often requires specialized knowledge, skills, and tools.

  • Examples include software development, manufacturing processes, and engineering design.

Add your answer
right arrow

Q59. Explain your automation framework

Ans.

Our automation framework is a hybrid framework that combines data-driven and keyword-driven approaches.

  • We use Selenium WebDriver for UI automation and RestAssured for API automation

  • Our framework is built using Java and TestNG

  • We have a centralized configuration file for easy maintenance

  • We use Jenkins for continuous integration and delivery

  • We have a custom reporting mechanism that generates detailed reports with screenshots

  • We have a set of reusable functions and libraries for f...read more

Add your answer
right arrow

Q60. Sip headers, difference between contact , to & from

Ans.

SIP headers like Contact, To, and From play different roles in SIP communication.

  • Contact header contains the address where the recipient can send requests to the sender.

  • To header contains the address of the recipient of the request.

  • From header contains the address of the sender of the request.

Add your answer
right arrow

Q61. Difference between DROP and TRUNCATE?

Ans.

DROP deletes the table structure and data, while TRUNCATE deletes only the data.

  • DROP removes the table from the database, including all data and structure.

  • TRUNCATE removes all data from the table, but keeps the table structure intact.

  • DROP is a DDL (Data Definition Language) command, while TRUNCATE is a DML (Data Manipulation Language) command.

Add your answer
right arrow

Q62. What is the role of kubernetes pod

Ans.

Kubernetes pod is the smallest deployable unit in Kubernetes that represents a single instance of a running process.

  • Pods can contain one or more containers that share resources like storage and network.

  • Pods are scheduled onto nodes in a Kubernetes cluster.

  • Pods are mortal, meaning they can be created, destroyed, and replaced by the Kubernetes system.

  • Pods can be managed using controllers like Deployments, StatefulSets, and DaemonSets.

Add your answer
right arrow

Q63. Reverse a string - Python

Ans.

Reverse a string in Python using slicing

  • Use string slicing with a step of -1 to reverse the string

  • Example: 'hello'[::-1] will return 'olleh'

Add your answer
right arrow

Q64. What is DNS & how it works

Ans.

DNS stands for Domain Name System, it translates domain names to IP addresses to locate resources on the internet.

  • DNS is like a phone book for the internet, translating human-readable domain names (like google.com) to IP addresses (like 172.217.3.206).

  • DNS works by sending queries to a series of servers starting from the local DNS resolver, then to authoritative DNS servers for the specific domain.

  • DNS uses a hierarchical system with root servers at the top, followed by top-lev...read more

Add your answer
right arrow

Q65. Loops in 837 EDI file

Ans.

Loops in 837 EDI file are used to repeat a segment or a group of segments multiple times.

  • Loops in 837 EDI file are defined by a loop identifier and a loop repeat count.

  • Each loop contains a set of segments that are repeated based on the loop repeat count.

  • For example, Loop 2010AA in the 837 file contains information about the billing provider.

  • Loops can be nested within each other to represent complex hierarchical data structures.

Add your answer
right arrow

Q66. Difference between UDP and TCP protocol

Ans.

UDP is connectionless and unreliable, while TCP is connection-oriented and reliable.

  • UDP stands for User Datagram Protocol, while TCP stands for Transmission Control Protocol.

  • UDP does not guarantee delivery of packets, while TCP ensures delivery through error checking and retransmission.

  • UDP is faster but less reliable, while TCP is slower but more reliable.

  • Examples of UDP applications include DNS and video streaming, while examples of TCP applications include web browsing and ...read more

Add your answer
right arrow

Q67. write SQL joins queries

Ans.

SQL joins queries are used to combine rows from two or more tables based on a related column between them.

  • Use INNER JOIN to return rows when there is at least one match in both tables

  • Use LEFT JOIN to return all rows from the left table and the matched rows from the right table

  • Use RIGHT JOIN to return all rows from the right table and the matched rows from the left table

  • Use FULL JOIN to return rows when there is a match in one of the tables

Add your answer
right arrow

Q68. What is OSD and the process

Ans.

OSD stands for On-Screen Display, a visual interface that provides information and settings on a display screen.

  • OSD is commonly used in monitors, TVs, and projectors to adjust settings such as brightness, contrast, and volume.

  • The OSD menu can be accessed by pressing specific buttons on the device or through a remote control.

  • Users can navigate through the OSD menu using arrow keys or other designated buttons.

  • OSD can also display information such as input source, resolution, an...read more

Add your answer
right arrow

Q69. Tools used for testing

Ans.

Various tools are used for testing software, such as Selenium, JUnit, TestNG, Postman, and JIRA.

  • Selenium - for automated testing of web applications

  • JUnit - for unit testing in Java

  • TestNG - for testing in Java

  • Postman - for API testing

  • JIRA - for issue tracking and project management

Add your answer
right arrow

Q70. Provider types in healthcare

Ans.

Provider types in healthcare refer to different categories of healthcare professionals or organizations that offer medical services.

  • Primary care providers (PCPs) - such as family doctors, pediatricians, and internists

  • Specialists - such as cardiologists, dermatologists, and neurologists

  • Hospitals and healthcare facilities - including acute care hospitals, rehabilitation centers, and nursing homes

  • Allied health professionals - such as physical therapists, occupational therapists,...read more

Add your answer
right arrow

Q71. What is agile model

Ans.

Agile model is a software development approach where requirements and solutions evolve through collaboration between self-organizing cross-functional teams.

  • Iterative and incremental development

  • Customer involvement and feedback throughout the development process

  • Adaptive planning and flexibility to changes

  • Regular team collaboration and communication

  • Examples: Scrum, Kanban, XP

Add your answer
right arrow

Q72. Solid and design principles

Ans.

Solid and design principles are fundamental concepts in software engineering that help in creating maintainable and scalable code.

  • SOLID principles include Single Responsibility, Open/Closed, Liskov Substitution, Interface Segregation, and Dependency Inversion.

  • Design principles like DRY (Don't Repeat Yourself) and KISS (Keep It Simple, Stupid) help in writing clean and efficient code.

  • Applying SOLID and design principles leads to code that is easier to understand, maintain, and...read more

Add your answer
right arrow

Q73. Linux commands for deployment

Ans.

Linux commands for deployment are essential for Technical Leads to efficiently manage and deploy applications.

  • Use 'scp' command to securely copy files between local and remote servers

  • Utilize 'rsync' command for efficient file synchronization and transfer

  • Leverage 'ssh' command for secure remote access to servers

  • Employ 'tar' command for archiving and compressing files before deployment

Add your answer
right arrow

Q74. Explain about waterfall model

Ans.

Waterfall model is a linear sequential software development process where progress flows in one direction like a waterfall.

  • Sequential process with distinct phases: Requirements, Design, Implementation, Testing, Deployment

  • Each phase must be completed before moving to the next

  • No overlapping of phases

  • Changes are difficult to implement once a phase is completed

  • Example: Traditional software development approach

Add your answer
right arrow

Q75. What is class in java.

Ans.

A class in Java is a blueprint for creating objects, defining attributes and behaviors.

  • Classes are used to create objects in Java.

  • They define attributes (fields) and behaviors (methods) of the objects.

  • Classes can be instantiated to create multiple objects of the same type.

  • Example: class Car { String color; void drive() { ... } }

  • Example: Car myCar = new Car();

Add your answer
right arrow

Q76. Monitoring tools using in organisation

Ans.

We use a variety of monitoring tools depending on the specific needs of each system.

  • For infrastructure monitoring, we use tools like Nagios, Zabbix, and Prometheus.

  • For application monitoring, we use tools like New Relic, AppDynamics, and Datadog.

  • We also use ELK stack for log monitoring and analysis.

  • Our cloud infrastructure is monitored using AWS CloudWatch and Azure Monitor.

  • We have also implemented custom scripts and dashboards for specific monitoring needs.

Add your answer
right arrow

Q77. OSPF NETWORK TYPE

Ans.

OSPF network type refers to the way in which OSPF routers are connected and exchange information.

  • There are four OSPF network types: point-to-point, broadcast, non-broadcast, and point-to-multipoint.

  • Point-to-point is used for direct connections between two routers.

  • Broadcast is used for networks with multiple routers and a shared media, such as Ethernet.

  • Non-broadcast is used for networks with multiple routers and no shared media, such as Frame Relay.

  • Point-to-multipoint is used ...read more

Add your answer
right arrow

Q78. What's the DNS port number

Ans.

DNS port number is 53

  • DNS port number is 53 for both TCP and UDP protocols

  • It is used for DNS queries and responses

  • Firewalls and network devices need to allow traffic on port 53 for DNS to function properly

Add your answer
right arrow

Q79. Fundamentals of iOS .

Ans.

Fundamentals of iOS include UIKit, Core Data, Grand Central Dispatch, and Swift programming language.

  • UIKit is the framework for building iOS user interfaces

  • Core Data is the framework for managing data in iOS apps

  • Grand Central Dispatch is used for managing concurrency and parallelism

  • Swift is the primary programming language for iOS development

Add your answer
right arrow

Q80. Code to swap two strings

Ans.

Code to swap two strings in an array

  • Create a temporary variable to store one of the strings

  • Assign the value of the first string to the second string

  • Assign the value of the temporary variable to the first string

Add your answer
right arrow

Q81. Call flow of Diameter

Ans.

Diameter is a protocol used in telecommunications for authentication, authorization, and accounting (AAA) purposes.

  • Diameter is an evolution of the RADIUS protocol, designed to address its limitations.

  • It is used in various network elements like AAA servers, gateways, and proxies.

  • Diameter messages consist of header, flags, command code, application ID, and AVPs.

  • It supports various applications like Diameter Credit-Control Application (DCCA) and Diameter Base Protocol (DBP).

Add your answer
right arrow

Q82. What is MVC Pattern.

Ans.

MVC is a software design pattern that separates an application into three main components: Model, View, and Controller.

  • Model represents the data and business logic of the application.

  • View is responsible for displaying the data to the user.

  • Controller acts as an intermediary between Model and View, handling user input and updating the Model accordingly.

  • MVC helps in achieving separation of concerns, making the code more organized and maintainable.

  • Example: In a web application, t...read more

Add your answer
right arrow

Q83. Golden rules of business

Add your answer
right arrow

Q84. Data center explanation

Ans.

A data center is a facility used to house computer systems and associated components, such as telecommunications and storage systems.

  • Data centers are used to store, manage, and process data for various purposes.

  • They typically include servers, networking equipment, storage systems, and security devices.

  • Data centers can be owned and operated by a company or rented from a third-party provider.

  • Examples of data center providers include Amazon Web Services (AWS), Microsoft Azure, a...read more

Add your answer
right arrow

Q85. Tools regarding knowledge.

Add your answer
right arrow

Q86. call flow of Gx

Ans.

Gx is a protocol used in 3G and 4G networks for policy and charging control.

  • Gx is used for communication between the Policy and Charging Rules Function (PCRF) and the Policy and Charging Enforcement Function (PCEF)

  • It is used to establish and manage Quality of Service (QoS) policies for data traffic

  • Gx messages include Credit-Control-Request (CCR) and Credit-Control-Answer (CCA)

Add your answer
right arrow
Contribute & help others!
Write a review
Write a review
Share interview
Share interview
Contribute salary
Contribute salary
Add office photos
Add office photos

Interview Process at Infinite Computer Solutions

based on 151 interviews
Interview experience
3.8
Good
View more
interview tips and stories logo
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Interview Questions from Similar Companies

Tata Projects Logo
4.2
 • 297 Interview Questions
BARC Logo
4.4
 • 218 Interview Questions
TCE Logo
3.8
 • 211 Interview Questions
TCS iON Logo
3.9
 • 205 Interview Questions
Johnson Controls Logo
3.6
 • 192 Interview Questions
View all
Recently Viewed
INTERVIEWS
Daimler Truck
No Interviews
INTERVIEWS
Marathon Electric India
No Interviews
INTERVIEWS
Tricolite Electrical Industries
No Interviews
INTERVIEWS
Infinite Computer Solutions
No Interviews
INTERVIEWS
Amphenol Interconnect
No Interviews
SALARIES
Hyundai Motor India Engineering
INTERVIEWS
Finisar
No Interviews
SALARIES
Hyundai Motor India Engineering
INTERVIEWS
Tata Digital
No Interviews
SALARIES
Infinite Computer Solutions
Top Infinite Computer Solutions Interview Questions And Answers
Share an Interview
Stay ahead in your career. Get AmbitionBox app
play-icon
play-icon
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
75 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter