Infosys
100+ BRAC Institute of Educational Development, BRAC University Interview Questions and Answers
Q101. Difference between sales cloud and service cloud
Sales cloud is focused on managing sales processes and customer relationships, while service cloud is focused on providing customer support and service.
Sales cloud is used for managing sales leads, opportunities, and forecasting.
Service cloud is used for managing customer support cases, knowledge base, and service contracts.
Sales cloud helps sales teams track their interactions with customers and close deals efficiently.
Service cloud helps customer service teams provide timel...read more
Q102. Different between profile and permission set
Profiles define the baseline permissions and settings for a user, while permission sets provide additional permissions to users.
Profiles are assigned to users to determine their baseline permissions and settings.
Permission sets are used to grant additional permissions to users without changing their profile.
Profiles control access to objects, fields, and records, while permission sets grant access to specific features or functions.
Profiles are mandatory for every user, while ...read more
Q103. How to manage difficult situation
I use active listening, empathy, problem-solving, and conflict resolution techniques to manage difficult situations.
Practice active listening to understand the root of the issue
Show empathy towards the emotions of all parties involved
Utilize problem-solving skills to find mutually beneficial solutions
Employ conflict resolution techniques to de-escalate tensions
Q104. What are type of master data.
Master data refers to the key data entities that are critical to the business operations of an organization.
Customer data
Product data
Vendor data
Employee data
Financial data
Material data
Asset data
Location data
Q105. What are the different port numbers used
Port numbers are used to identify specific services or processes running on a computer network.
Port 80 is commonly used for HTTP traffic
Port 443 is commonly used for HTTPS traffic
Port 22 is commonly used for SSH connections
Port 25 is commonly used for SMTP email traffic
Port 21 is commonly used for FTP connections
Q106. Difference between centralised & decentralised EAM
Centralised EAM involves a single central authority making decisions, while decentralised EAM allows for decision-making at various levels.
Centralised EAM has a top-down approach with decisions made by a central authority.
Decentralised EAM allows for decision-making at different levels within the organization.
Centralised EAM can lead to quicker decision-making but may lack flexibility.
Decentralised EAM can promote innovation and adaptability but may result in inconsistencies....read more
Q107. What is fragment
A fragment is a small piece or part of something larger.
Fragments can refer to broken pieces of objects or materials.
In programming, a fragment is a reusable portion of code that can be included in multiple parts of a program.
In literature, a fragment can refer to an incomplete or unfinished work.
Fragments can also be used in art to create a sense of incompleteness or ambiguity.
Q108. Difference between getwindowhandle and getwindowhandes?
getwindowhandle returns the handle of the current window, while getwindowhandles returns handles of all open windows.
getwindowhandle is used to get the handle of the current window in Selenium WebDriver.
getwindowhandles is used to get the handles of all open windows in Selenium WebDriver.
getwindowhandle returns a single handle, while getwindowhandles returns multiple handles in a set.
Q109. What is public, Private protected
Public, private, and protected are access modifiers in object-oriented programming languages.
Public: accessible from anywhere, both within and outside the class
Private: only accessible within the class where it is declared
Protected: accessible within the class and its subclasses
Q110. How to create our own annotations
Annotations can be created using @ symbol followed by a keyword or phrase.
Annotations can be used to provide additional information about code
Annotations can be used to suppress warnings or errors
Annotations can be used to mark code as deprecated
Annotations can be created using @ symbol followed by a keyword or phrase
Annotations can have parameters
Examples: @Override, @SuppressWarnings, @Deprecated
Q111. What is osgi and when is it used
OSGi is a Java framework for developing and deploying modular software components.
OSGi allows applications to be composed of small, reusable and independently deployable components called bundles.
It provides a dynamic module system for Java, allowing bundles to be installed, started, stopped, updated, and uninstalled at runtime.
OSGi is commonly used in enterprise applications, IoT devices, and embedded systems where modularity, versioning, and lifecycle management are importa...read more
Q112. What is rds in aws
RDS in AWS stands for Relational Database Service, a managed database service that makes it easy to set up, operate, and scale a relational database in the cloud.
RDS is a fully managed database service provided by AWS
It supports popular database engines like MySQL, PostgreSQL, Oracle, SQL Server, and MariaDB
RDS automates routine tasks like hardware provisioning, database setup, patching, and backups
It offers high availability, automatic failover, and read replicas for improve...read more
Q113. What is XSS and types of xss ?
XSS stands for Cross-Site Scripting, a type of security vulnerability found in web applications.
Types of XSS include: Reflected XSS, Stored XSS, and DOM-based XSS.
Reflected XSS occurs when user input is immediately returned by the web application.
Stored XSS happens when user input is stored on the server and displayed later.
DOM-based XSS involves the manipulation of the Document Object Model (DOM) in the client-side code.
Q114. Tell me about P2P process
P2P process refers to the end-to-end procurement process from purchase requisition to payment.
P2P stands for Procure-to-Pay.
It involves various steps such as requisitioning, sourcing, purchasing, receiving, and payment.
The process typically starts with a purchase requisition submitted by a user.
The requisition is then reviewed and approved by the appropriate authority.
Once approved, the procurement team sources the required goods or services from suppliers.
Purchase orders are...read more
Q115. What are agile ceremonies?
Agile ceremonies are regular meetings or events held within an agile framework to facilitate communication, collaboration, and alignment among team members.
Sprint Planning: Meeting at the start of a sprint to plan the work to be done.
Daily Stand-up: Short daily meeting for team members to discuss progress and plan for the day.
Sprint Review: Meeting at the end of a sprint to review and demonstrate the completed work.
Sprint Retrospective: Meeting at the end of a sprint to refle...read more
Q116. Error Handling way in Mule4
Error handling in Mule4 involves using Try scope, Error handler, and On Error Continue
Use Try scope to encapsulate the code that might throw an error
Use Error handler to catch and handle specific errors
Use On Error Continue to continue processing even if an error occurs
Q117. Batch Processing in mule 4
Batch processing in Mule 4 allows for processing large amounts of data in chunks.
Batch processing in Mule 4 is achieved using the Batch Job component.
It allows for processing large amounts of data in chunks, improving performance and efficiency.
You can configure batch jobs to read data from a variety of sources, process it, and then write the results to a target system.
Batch processing in Mule 4 also supports error handling and retry mechanisms to ensure data integrity.
Exampl...read more
Q118. Tell about Routing in react
Routing in React is the process of determining which components to display based on the URL.
React Router is a popular library used for routing in React applications.
Routes are defined using
components in React Router. Nested routes can be defined to render components within other components.
Route parameters can be accessed using props.match.params.
Redirects can be used to navigate users to different routes.
Private routes can be implemented to restrict access to certain compon...read more
Q119. Write a code to check palindrome
Code to check if a given string is a palindrome.
Convert the string to lowercase and remove spaces and punctuation.
Compare the string with its reverse to check for palindrome.
Return true if the string is a palindrome, false otherwise.
Q120. Difference between RestController and Controller
RestController is a specialized version of Controller in Spring framework for RESTful web services.
RestController is used for creating RESTful web services in Spring framework.
Controller is used for handling general web requests.
RestController automatically serializes and deserializes request and response bodies as JSON.
Controller can return any type of response, not just JSON.
Example: @RestController vs @Controller in Spring MVC.
Q121. Difference between joins in SQL and iics
Joins in SQL and IICS differ in their syntax and implementation.
SQL joins are performed using SQL queries while IICS joins are performed using mapping tasks.
SQL joins can be inner, outer, left, right, or cross joins while IICS joins are limited to inner and outer joins.
SQL joins can be performed on any database while IICS joins are limited to the databases supported by IICS.
SQL joins can be optimized using indexing while IICS joins rely on the performance of the IICS platform...read more
Q122. Mention the actions used in Omniscript
Actions used in Omniscript include show, hide, enable, disable, setValue, and getValue.
show - used to display a hidden element
hide - used to hide a visible element
enable - used to make an element interactive
disable - used to make an element non-interactive
setValue - used to set a value in a field
getValue - used to retrieve the value from a field
Q123. Diff between innumerable and iqueryable?
Innumerable is a collection that cannot be counted, while IQueryable is an interface that allows querying data sources.
Innumerable represents a collection that cannot be enumerated or counted.
IQueryable is an interface in LINQ that allows querying data sources like databases, collections, etc.
Innumerable collections are evaluated immediately, while IQueryable collections are evaluated when the query is executed.
Examples: List
is innumerable, IQueryable is a queryabl...read more
Q124. what is middleware in .net
Middleware in .NET is software that acts as a bridge between an application and the operating system, enabling communication and data exchange.
Middleware helps in handling communication between different components of an application.
It can be used for tasks like authentication, logging, error handling, and more.
Examples of middleware in .NET include ASP.NET Core middleware for request processing and OWIN middleware for authentication.
Q125. what are directives in angular
Directives in Angular are markers on a DOM element that tell Angular to attach a specified behavior to that DOM element or transform it.
Directives are used to create reusable components in Angular applications.
There are three types of directives in Angular: Component, Structural, and Attribute directives.
Examples of built-in directives in Angular include ngIf, ngFor, and ngStyle.
Q126. What is cloud and Supply Chain
Cloud and Supply Chain are two distinct concepts. Cloud refers to the delivery of computing services over the internet, while Supply Chain refers to the process of getting a product or service from the supplier to the customer.
Cloud computing can be used to optimize supply chain management by providing real-time data and analytics.
Cloud-based supply chain management systems can help companies reduce costs and improve efficiency.
Examples of cloud-based supply chain management ...read more
Q127. Subcontracting process. In detail
Subcontracting process involves hiring a third-party vendor to perform a specific task or project.
Identify the need for subcontracting
Select a suitable vendor through a bidding process
Negotiate terms and conditions of the contract
Monitor the progress of the subcontractor
Ensure quality control and timely delivery
Manage payments and invoices
Maintain communication with the subcontractor
Terminate the contract when the project is completed
Examples: outsourcing IT services, hiring ...read more
Q128. what is Flows and type?
Flows are sequences of steps that represent a process or workflow. There are different types of flows based on their purpose and structure.
Flows are used to represent the sequence of steps in a process or workflow.
Types of flows include linear flows, branching flows, and looping flows.
Linear flows follow a single path from start to finish.
Branching flows have multiple paths based on conditions or decisions.
Looping flows repeat a set of steps until a certain condition is met.
Q129. difference between class and object
A class is a blueprint for creating objects, while an object is an instance of a class.
A class defines the properties and behaviors of objects, while an object is a specific instance of a class.
Classes can be used to create multiple objects with similar characteristics.
Objects can interact with each other by calling methods defined in their class.
Example: Class 'Car' defines properties like 'color' and 'model', while an object 'myCar' can have specific values for these proper...read more
Q130. What is bluecoat proxy ?
Bluecoat Proxy is a web proxy server used for content filtering, security, and caching.
Bluecoat Proxy is used to monitor and control internet traffic within an organization.
It can be used to block access to certain websites or limit bandwidth usage.
Bluecoat Proxy can also be used for caching frequently accessed web content to improve network performance.
It provides advanced security features such as SSL inspection and malware detection.
Bluecoat Proxy is commonly used in enter...read more
Q131. What is cloud proxy ?
Cloud proxy is a service that acts as an intermediary between a user and a cloud-based application or service.
Cloud proxy provides secure access to cloud-based resources from anywhere.
It can be used to enforce security policies and prevent unauthorized access.
Cloud proxy can also improve performance by caching frequently accessed data.
Examples of cloud proxy services include Zscaler, Cloudflare, and Akamai.
Q132. Difference between props and state
Props are used to pass data from parent to child components, while state is used to manage data within a component.
Props are read-only and cannot be modified by the child component
State is mutable and can be changed by the component itself
Props are passed down from parent to child components, while state is managed within a component
Example: Passing a user's name as a prop to a child component vs storing the user's input in state within the component
Q133. Expected CTC from Infosys?
Expected CTC from Infosys depends on various factors such as experience, skills, and job role.
The expected CTC can vary based on the level of seniority and experience of the candidate.
The job role and responsibilities also play a significant role in determining the expected CTC.
Skills and expertise in specific technologies or domains can also impact the salary offered.
Market trends and industry standards can also influence the expected CTC.
It is best to research and understan...read more
Q134. What’a ERP and CRM ?
ERP stands for Enterprise Resource Planning and CRM stands for Customer Relationship Management.
ERP is a software system that helps manage business processes and automate back-office functions.
CRM is a software system that helps manage customer interactions and relationships.
ERP and CRM can be integrated to provide a complete view of business operations and customer interactions.
Examples of ERP systems include SAP, Oracle, and Microsoft Dynamics.
Examples of CRM systems includ...read more
Q135. difference btw mvc and web api
MVC is a design pattern for structuring web applications, while Web API is a framework for building HTTP services.
MVC stands for Model-View-Controller and is used for organizing code in web applications.
Web API is a framework for building HTTP services that can be accessed by various clients, not just browsers.
MVC is typically used for server-side rendering of web pages, while Web API is used for providing data and functionality to client-side applications.
MVC is tightly coup...read more
Q136. Difference between iso and Swift
ISO is a set of international standards for various industries, while Swift is a messaging network used by financial institutions.
ISO stands for International Organization for Standardization, which sets standards for various industries such as quality management (ISO 9001) and information security (ISO 27001).
Swift (Society for Worldwide Interbank Financial Telecommunication) is a messaging network used by financial institutions to securely and quickly send information and i...read more
Q137. What is future and queable
Future and queable are terms related to asynchronous programming and task scheduling.
Future refers to a result that is not immediately available but will be at some point in the future.
Queable refers to tasks that can be added to a queue and executed in a specific order or based on certain conditions.
Examples: Future in Java's CompletableFuture, Queable tasks in Python's Celery.
Q138. what is routing
Routing is the process of selecting the best path for data packets to travel from one network to another.
Routing involves determining the optimal path for data packets to reach their destination
Routers use routing tables to make decisions on how to forward packets
Routing protocols like OSPF and BGP help routers communicate and update routing information
Examples of routing protocols include RIP, EIGRP, and IS-IS
Q139. Why use React JS
React JS is a popular JavaScript library for building user interfaces.
Efficiently updates and renders components with virtual DOM
Supports reusable components for faster development
Declarative syntax simplifies code readability and maintenance
Q140. What is virtual DOM
Virtual DOM is a lightweight copy of the actual DOM that allows for efficient updates and rendering in web development.
Virtual DOM is a concept used in frameworks like React to improve performance by minimizing actual DOM manipulations.
Changes are first made to the virtual DOM, then compared to the actual DOM to determine the most efficient way to update the UI.
This process helps reduce the number of updates needed and improves the overall speed and performance of web applica...read more
Q141. What is triggers in salesforce
Triggers in Salesforce are pieces of code that execute before or after specific events occur, allowing for customization and automation of business processes.
Triggers are used to perform actions based on specific events, such as record creation, update, or deletion.
They are written in Apex, Salesforce's proprietary programming language.
Triggers can be used to enforce business rules, validate data, or update related records.
They can be defined for different objects and can exe...read more
Q142. Difference between BW and BW4HANA
BW is a traditional data warehousing solution while BW4HANA is a modern, in-memory data warehousing solution.
BW uses a disk-based storage while BW4HANA uses an in-memory storage
BW requires a lot of manual tuning and maintenance while BW4HANA is self-optimizing
BW4HANA has a simplified data model and faster data processing capabilities
BW4HANA supports real-time data processing and analytics
Example: BW4HANA can process 1 billion records in less than 1 second
Q143. Fibonacci series program using recursion
A Fibonacci series program using recursion in Python
Define a function to calculate Fibonacci series recursively
Base case: return 0 if n is 0, return 1 if n is 1
Recursive case: return fibonacci(n-1) + fibonacci(n-2)
Example: def fibonacci(n): return n if n <= 1 else fibonacci(n-1) + fibonacci(n-2)
Q144. Table names for Security
Table names for Security in a database
Users
Roles
Permissions
AccessLogs
Q145. describe the Ec2 configuration process?
EC2 configuration process involves selecting instance type, configuring security groups, setting up storage, and launching the instance.
Select the appropriate EC2 instance type based on your requirements (e.g. t2.micro, m5.large)
Configure security groups to control inbound and outbound traffic to the instance (e.g. allow SSH access on port 22)
Set up storage options such as EBS volumes or instance store volumes for data storage
Launch the EC2 instance and connect to it using SS...read more
Q146. What is Design Thinking
Design Thinking is a problem-solving approach focused on understanding the user's needs, generating ideas, prototyping, and testing solutions.
Empathize with the user to understand their needs and challenges
Define the problem statement based on user insights
Ideate and brainstorm potential solutions
Prototype and test the solutions with users for feedback
Iterate on the solutions based on feedback to improve them
Q147. What is dependency injection
Dependency injection is a design pattern in which components are given their dependencies rather than creating them internally.
Dependency injection helps in achieving loose coupling between classes.
It allows for easier testing by providing mock dependencies.
There are three types of dependency injection: constructor injection, setter injection, and interface injection.
Q148. What is linq
LINQ is a feature in C# that allows for querying data from different data sources using a syntax similar to SQL.
LINQ stands for Language Integrated Query
It allows for querying data from collections, databases, XML, and more
LINQ queries are written in a declarative syntax
Example: var result = from num in numbers where num % 2 == 0 select num;
Q149. How APIs work
APIs work by allowing different software applications to communicate with each other through a set of rules and protocols.
APIs define the methods and data formats that applications can use to request and exchange information.
APIs can be used to access services or data from a remote server or application.
APIs can be RESTful, SOAP-based, or other types depending on the requirements of the applications.
APIs often require authentication to ensure secure communication between appl...read more
Q150. How to optimize sps
Methods to optimize SPS include data analysis, training programs, performance incentives, and technology integration.
Conduct data analysis to identify areas of improvement and track progress over time.
Implement training programs to enhance sales skills and product knowledge.
Offer performance incentives such as bonuses or rewards for meeting or exceeding targets.
Integrate technology solutions like CRM systems to streamline processes and improve efficiency.
Q151. What are auth guards
Auth guards are a feature in web development frameworks that restrict access to certain routes or resources based on user authentication.
Auth guards are used to protect routes in web applications by checking if a user is authenticated before allowing access.
They can also be used to restrict access based on user roles or permissions.
Examples of auth guards include JWT authentication in Node.js with Express, or role-based access control in Angular.
Q152. Self join in sql example
Self join is a SQL technique where a table is joined with itself.
It is used to compare rows within a table.
It requires aliasing the table names to differentiate them.
It can be used to find hierarchical relationships within a table.
Example: SELECT e1.name, e2.name FROM employees e1 JOIN employees e2 ON e1.manager_id = e2.id;
Q153. What is Trigger?
A trigger is a special kind of stored procedure that is automatically executed when certain events occur in a database.
Triggers can be used to enforce business rules, maintain referential integrity, and automate repetitive tasks.
Examples of trigger events include INSERT, UPDATE, and DELETE operations on a table.
Triggers can be defined to execute before or after the triggering event.
They are commonly used in database management systems like MySQL, Oracle, and SQL Server.
Q154. OOPs Concept in detail
OOPs stands for Object-Oriented Programming. It is a programming paradigm based on the concept of objects.
OOPs focuses on creating objects that contain both data and methods to manipulate that data.
Encapsulation is a key principle in OOPs, where data is kept private and only accessible through public methods.
Inheritance allows classes to inherit attributes and methods from other classes.
Polymorphism allows objects to be treated as instances of their parent class.
Abstraction a...read more
Q155. What is final class
A final class is a class that cannot be subclassed or extended.
Final classes are declared using the 'final' keyword in Java.
Final classes cannot have any subclasses.
Final classes are often used for utility classes or classes that should not be modified or extended.
Q156. What is static class
A static class is a class that cannot be instantiated and can only contain static members.
Static classes are used to group related methods and properties that do not require an instance of the class to be created.
Static classes are declared using the 'static' keyword in C#.
Static classes cannot be instantiated and cannot contain instance members.
Example: 'Math' class in C# is a static class that contains static methods like 'Math.Max()' and 'Math.Min()'.
Q157. Legal Obligations if any ?
Legal obligations refer to the responsibilities and duties that individuals or organizations are required to fulfill under the law.
Compliance with relevant laws and regulations
Protection of confidential information
Adherence to contractual agreements
Respect for intellectual property rights
Ensuring workplace safety and health standards
Proper handling of customer data and privacy
Q158. STO process... In detail
STO process involves transferring materials from one plant to another within the same company code.
STO stands for Stock Transport Order.
It is used to transfer goods from one plant to another within the same company code.
It involves creating a purchase order in the receiving plant and a corresponding sales order in the supplying plant.
The delivery is then created and the goods are transported from the supplying plant to the receiving plant.
The receiving plant then posts a good...read more
Q159. Have you worked on integration
Yes, I have worked on integration.
I have experience integrating various software systems and APIs.
I have worked on integrating payment gateways for e-commerce websites.
I have also integrated CRM systems with marketing automation tools.
I am familiar with RESTful APIs and have used them for integration purposes.
I have experience with middleware tools like MuleSoft and Dell Boomi.
Q160. Types of polymorphism
Types of polymorphism in programming include compile-time polymorphism (method overloading) and runtime polymorphism (method overriding).
Compile-time polymorphism is achieved through method overloading, where multiple methods have the same name but different parameters.
Runtime polymorphism is achieved through method overriding, where a subclass provides a specific implementation of a method that is already defined in its superclass.
Q161. Explain React lifecycle
React lifecycle refers to the series of methods that are invoked during the life of a React component.
Mounting phase: constructor, render, componentDidMount
Updating phase: render, componentDidUpdate
Unmounting phase: componentWillUnmount
Q162. Lamda expression and usage
Lambda expressions are anonymous functions used to create concise code in languages like Java.
Lambda expressions are used to create anonymous functions without a name.
They are commonly used in functional programming languages like Java.
Lambda expressions can be used to implement functional interfaces with a single abstract method.
Syntax: (parameters) -> expression or (parameters) -> { statements; }
Example: (int a, int b) -> a + b
Q163. Comparator vs Comparable
Comparator is used to define custom sorting order for objects, while Comparable is used to define natural ordering of objects.
Comparator is an external class used for custom sorting, while Comparable is implemented by the class itself for natural ordering.
Comparator can be used to sort objects based on multiple criteria, while Comparable can only define one natural ordering.
Example: Sorting a list of Employee objects based on their salary using a Comparator, or sorting a list...read more
Q164. HashSet with custom objects
HashSet is a collection that stores unique elements, custom objects can be added by overriding equals() and hashCode() methods.
Override equals() and hashCode() methods in custom object class for proper comparison and hashing
Ensure immutability of custom object to maintain uniqueness in HashSet
Example: class CustomObject { private int id; private String name; }
Q165. Explain OOPS concepts
OOPS concepts are the foundation of object-oriented programming, including principles like inheritance, encapsulation, polymorphism, and abstraction.
Inheritance: Allows a class to inherit properties and behavior from another class.
Encapsulation: Bundling data and methods that operate on the data into a single unit.
Polymorphism: Ability to present the same interface for different data types.
Abstraction: Hiding the complex implementation details and showing only the necessary f...read more
Q166. Abstract Class vs Interface
Abstract class is a class that can have both abstract and non-abstract methods, while interface is a contract that defines methods that a class must implement.
Abstract class can have constructors, fields, and non-abstract methods.
Interface can only have abstract methods and constants.
A class can implement multiple interfaces but can only inherit from one abstract class.
Abstract class is used to provide a common base for multiple classes, while interface is used to define a co...read more
Q167. What is owasp top 10
OWASP Top 10 is a list of the top 10 most critical web application security risks.
OWASP Top 10 is updated regularly to reflect current security threats.
It is used by organizations to prioritize their security efforts.
Examples of OWASP Top 10 include injection, broken authentication, and sensitive data exposure.
Q168. Implementation phases
Implementation phases involve planning, designing, testing, deploying, and maintaining a solution.
Planning phase involves defining project scope, objectives, and requirements.
Design phase focuses on creating a detailed blueprint of the solution.
Testing phase includes unit testing, integration testing, and user acceptance testing.
Deployment phase involves rolling out the solution to end users.
Maintenance phase includes monitoring, troubleshooting, and updating the solution.
Exa...read more
Q169. what is .net core
ASP.NET Core is a cross-platform, high-performance framework for building modern, cloud-based, internet-connected applications.
ASP.NET Core is an open-source, cross-platform framework for building web applications.
It is a high-performance framework that allows developers to build modern, cloud-based applications.
ASP.NET Core supports multiple platforms including Windows, macOS, and Linux.
It is designed to be modular, allowing developers to only include the components they nee...read more
Q170. Write a trigger on account
A trigger on account to perform actions on record insert, update, or delete
Triggers are used to perform actions before or after records are inserted, updated, or deleted
Triggers can be written in Apex language
Example: Trigger to update a related object when an account is inserted
Q171. Explain modules in Ansible
Ansible modules are reusable, standalone scripts that can be used to automate tasks in Ansible.
Modules are the building blocks of Ansible playbooks
They can be used to perform specific tasks like installing packages, managing files, or configuring services
Modules can be written in any language that can return JSON
Examples of modules include 'yum' for package management, 'copy' for file management, and 'service' for managing services
Q172. Methods in react classes
Methods in react classes are functions defined within a class component to perform specific tasks.
Methods are defined using the 'methodName() {}' syntax within the class component.
Common methods in React classes include 'render()', 'componentDidMount()', 'componentDidUpdate()', and 'componentWillUnmount()'.
Methods can be used to handle events, update state, fetch data, and perform other tasks within the component.
Q173. Different React hooks
React hooks are functions that let you use state and other React features without writing a class.
useState: for managing state in functional components
useEffect: for handling side effects in functional components
useContext: for accessing context in functional components
useReducer: for managing more complex state logic
useMemo: for memoizing expensive calculations
useRef: for accessing DOM elements or storing mutable values
Q174. Inventory data flow in bw4hana
Inventory data flows from source systems to BW4HANA through data acquisition and transformation processes.
Inventory data is extracted from source systems using data acquisition methods such as flat file upload, data services, or real-time data acquisition.
The extracted data is then transformed and cleansed using BW4HANA's data transformation tools such as Open ODS views, Composite Providers, and Advanced DataStore Objects.
The transformed data is then loaded into BW4HANA's in-...read more
Q175. What is gliderecord
glideRecord is a ServiceNow API used to perform database operations on a single table.
glideRecord is used to query, insert, update, and delete records in ServiceNow tables.
It is a JavaScript API that provides access to the underlying database.
It is commonly used in ServiceNow scripts and business rules.
Example: var gr = new GlideRecord('incident'); gr.addQuery('priority', '1'); gr.query();
This will query the 'incident' table for all records with a priority of 1.
Q176. Past project architecture
I have experience working on past projects involving complex architecture designs to meet client requirements.
Designed scalable and secure architecture for a cloud-based application
Implemented microservices architecture for a large e-commerce platform
Utilized containerization technologies like Docker and Kubernetes for deployment
Integrated third-party APIs to enhance functionality
Q177. Complete core java Spring boot
Core Java is the foundation of Java programming language, while Spring Boot is a framework for building Java applications.
Core Java includes concepts like OOP, multithreading, collections, and exception handling.
Spring Boot simplifies the development of Java applications by providing pre-configured settings and tools.
Example: Core Java - classes, objects, inheritance. Spring Boot - auto-configuration, embedded servers.
Q178. Explain Java 8 features
Java 8 introduced several new features including lambda expressions, streams, and functional interfaces.
Lambda expressions allow for functional programming and simplify code.
Streams provide a way to process collections of data in a functional way.
Functional interfaces enable the use of lambda expressions and method references.
Default methods allow for adding new methods to interfaces without breaking existing code.
Date and time API improvements make working with dates and tim...read more
Q179. Stream & Collection in Java
Stream and Collection are Java features for processing and manipulating data.
Stream is a sequence of elements that can be processed in parallel or sequentially.
Collection is a group of objects that can be manipulated using various methods.
Stream API provides functional-style operations like filter, map, reduce, etc.
Collection API provides methods like add, remove, contains, etc.
Stream can be created from a Collection using stream() method.
Example: List
names = Arrays.asList("...read more
Q180. Lifecycle hooks in LWC
Lifecycle hooks in LWC are methods that allow developers to interact with the component lifecycle.
There are several lifecycle hooks in LWC such as connectedCallback, disconnectedCallback, renderedCallback, errorCallback, and more.
connectedCallback is called when a component is inserted into the DOM.
disconnectedCallback is called when a component is removed from the DOM.
renderedCallback is called after the component's template has been rendered.
errorCallback is called when an ...read more
Q181. Recent projects handled
Handled projects related to data analysis and process improvement
Developed and implemented a data-driven process improvement plan for a manufacturing company resulting in a 20% increase in efficiency
Conducted market research and analyzed customer data to identify new product opportunities for a retail company
Collaborated with cross-functional teams to streamline the order fulfillment process for an e-commerce company
Created dashboards and reports to track key performance indi...read more
Q182. Write any Get API
A simple example of a Get API
Use a HTTP GET request to retrieve data from a server
Include the endpoint URL in the request
Handle the response data accordingly
Q183. Types pacs messages
Types of PACS messages include DICOM, HL7, and IHE.
DICOM messages are used for medical imaging data
HL7 messages are used for exchanging clinical and administrative data
IHE messages are used for integrating healthcare information systems
Q184. OECD Guidelines
The OECD Guidelines are a set of recommendations for responsible business conduct by multinational enterprises.
The OECD Guidelines provide principles and standards for responsible business conduct in areas such as human rights, labor, environment, and anti-corruption.
They are voluntary and aim to promote sustainable development and contribute to the welfare of people and communities.
Companies can use the OECD Guidelines to assess and improve their own practices, as well as to...read more
Top HR Questions asked in BRAC Institute of Educational Development, BRAC University
Interview Process at BRAC Institute of Educational Development, BRAC University
Top Senior Associate Consultant Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month