Premium Employer

Infosys

3.6
based on 38.8k Reviews
Filter interviews by

70+ B. Braun Medical Interview Questions and Answers

Updated 14 Jan 2025
Popular Designations

Q1. What do understand by umask value and what are the by default values of umask if I create a file or a directory as a user and root?

Ans.

umask value determines default file permissions when creating a file or directory

  • umask is a 3-digit octal value that subtracts from the maximum permission value (777 for files, 666 for directories)

  • default umask value for users is 022 (files: 644, directories: 755)

  • default umask value for root is 002 (files: 664, directories: 775)

Add your answer

Q2. What projects have you worked on, share the tech stack and basic architecture.

Ans.

I have worked on various projects including a healthcare management system and an e-commerce platform.

  • Developed a healthcare management system using Java, Spring Boot, and MySQL for database.

  • Designed an e-commerce platform using Node.js, React, and MongoDB for database.

  • Implemented microservices architecture for scalability and flexibility.

  • Utilized Docker and Kubernetes for containerization and orchestration.

  • Integrated CI/CD pipelines for automated testing and deployment.

Add your answer

Q3. What is headless and how to achieve in Drupal?

Ans.

Headless is a way of separating the frontend and backend of a website. In Drupal, it involves using Drupal as a backend to provide content via APIs.

  • Headless Drupal involves using Drupal as a backend to provide content via APIs

  • The frontend is built using a separate technology, such as React or Angular

  • This allows for greater flexibility and customization in the frontend design

  • Examples of headless Drupal sites include the NBA and Weather.com

View 1 answer

Q4. What will be the output if you try to console log an uninitialized const variable?

Ans.

Attempting to console log an uninitialized const variable will result in a ReferenceError.

  • Attempting to access an uninitialized const variable will result in a ReferenceError.

  • Constants (const) must be initialized with a value at the time of declaration.

  • Example: const myVar; console.log(myVar); // ReferenceError: myVar is not defined

Add your answer
Discover B. Braun Medical interview dos and don'ts from real experiences

Q5. What is the media type format used in REST API?

Ans.

The media type format used in REST API is JSON (JavaScript Object Notation).

  • JSON (JavaScript Object Notation) is the most commonly used media type format in REST API.

  • It is a lightweight data interchange format that is easy for humans to read and write, and easy for machines to parse and generate.

  • JSON data is represented as key-value pairs enclosed in curly braces {}.

  • Example: {"name": "John Doe", "age": 30}

Add your answer

Q6. Coding: Write a code to remove every 3rd occurrence from an Array.

Ans.

Code to remove every 3rd occurrence from an Array of strings.

  • Iterate through the array and keep track of the count of each element.

  • Remove the element when the count is a multiple of 3.

  • Return the modified array.

Add your answer
Are these interview questions helpful?

Q7. Coding: Write an SQL Query to get the 2nd largest value from a Table.

Ans.

SQL query to get the 2nd largest value from a Table

  • Use the ORDER BY clause to sort the values in descending order

  • Use the LIMIT clause to get the second row after skipping the first row

Add your answer

Q8. How to pass custom args in a url through route?

Ans.

To pass custom args in a URL through route, use route parameters or query strings.

  • For route parameters, define a parameter in the route path and access it in the controller using req.params.

  • For query strings, append key-value pairs to the URL and access them in the controller using req.query.

  • Example: /users/:id for route parameters or /users?id=123 for query strings.

  • Use encodeURIComponent() to encode special characters in the URL.

View 1 answer
Share interview questions and help millions of jobseekers 🌟

Q9. What do you understand by DevOps and Agile methodologies?

Ans.

DevOps and Agile are software development methodologies that focus on collaboration, continuous improvement, and delivering value to customers.

  • DevOps is a culture that emphasizes collaboration between development and operations teams to automate and streamline the software delivery process.

  • Agile is an iterative approach to software development that prioritizes customer satisfaction, teamwork, and flexibility.

  • Both methodologies aim to deliver high-quality software quickly and ...read more

Add your answer

Q10. 1.How to migrate configuration from Cisco to Fortigate and Viceversa

Ans.

Configuration migration between Cisco and Fortigate

  • Identify the configuration on the source device

  • Translate the configuration to the equivalent on the target device

  • Verify the configuration on the target device

  • Test the migrated configuration

  • Use automation tools to simplify the process

  • Consider differences in syntax and feature support between the devices

Add your answer

Q11. What is OSS and BSS? How to differentiate them in Telecom Perspective?

Ans.

OSS stands for Operations Support System and BSS stands for Business Support System in the telecom industry.

  • OSS includes network management, service delivery, and service assurance.

  • BSS includes customer management, billing, and revenue management.

  • OSS focuses on the technical side of operations while BSS focuses on the business side.

  • Examples of OSS components are network monitoring systems and trouble ticketing systems.

  • Examples of BSS components are CRM systems and billing sys...read more

Add your answer

Q12. What is Attribute routing in .NET?

Ans.

Attribute routing in .NET allows developers to define routes directly on controller actions or methods using attributes.

  • Attribute routing provides more control over the URIs in your web application

  • Routes are defined using attributes like [Route] and [HttpGet]

  • Example: [Route("api/customers/{id}")]

Add your answer

Q13. What are the middlewares in .NET?

Ans.

Middlewares in .NET are components that can be added to the request pipeline to handle requests and responses.

  • Middlewares are used in ASP.NET Core to process HTTP requests and responses.

  • They are added to the request pipeline in the Startup class.

  • Examples of middlewares in .NET include authentication middleware, logging middleware, and error handling middleware.

Add your answer

Q14. How would you compare two objects in Javascript?

Ans.

In JavaScript, you can compare two objects using the '===' operator for strict equality or by comparing their properties.

  • Use the '===' operator to check if two objects are the same instance in memory.

  • Compare specific properties of the objects to see if they have the same values.

  • Use JSON.stringify() to compare the stringified versions of the objects.

Add your answer

Q15. Have you worked on back office customisation?

Ans.

Yes, I have worked on back office customisation.

  • I have experience customising back office systems to meet specific business needs.

  • I have worked on customising workflows, data fields, and user interfaces.

  • For example, I have customised the back office system for a retail company to include additional data fields for tracking inventory.

  • I have also worked on customising the user interface for a financial services company to improve usability and efficiency.

  • Overall, I am comfortab...read more

Add your answer

Q16. Explain the Procedure in finding the galera cluster node issue and some fixing examples

Ans.

Procedure for finding and fixing Galera cluster node issues

  • Check Galera cluster status using 'SHOW STATUS LIKE 'wsrep_cluster_size''

  • Look for any errors in Galera cluster logs

  • Verify network connectivity between cluster nodes

  • Restart the Galera cluster node if necessary

  • Check for any hardware issues that may be causing the problem

Add your answer

Q17. Gaps in Functional Requirement Gathering and role of SAP SD Consultant in Support Project

Ans.

Functional requirement gathering gaps can lead to issues in support projects. SAP SD Consultants play a crucial role in bridging these gaps.

  • SAP SD Consultants need to ensure all functional requirements are clearly documented and understood by all stakeholders.

  • They should actively engage with business users to gather detailed requirements and translate them into SAP SD solutions.

  • Regular communication and collaboration with the project team is essential to address any gaps or d...read more

Add your answer

Q18. What are the advantages of MySQL 8 version

Ans.

MySQL 8 version offers improved performance, security, and scalability.

  • Improved performance with new features like common table expressions and window functions

  • Enhanced security with default authentication plugin set to caching_sha2_password

  • Increased scalability with support for more efficient resource management

  • Better JSON support with new functions and operators

  • Enhanced replication capabilities for high availability and disaster recovery

Add your answer

Q19. can we write procedure inside standalone procedure

Ans.

Yes, we can write a procedure inside a standalone procedure.

  • A standalone procedure is a self-contained unit of code that can be executed independently.

  • We can write another procedure inside a standalone procedure to perform a specific task.

  • This is known as a nested procedure or a sub-procedure.

  • The nested procedure can access the variables and parameters of the outer procedure.

  • Example: CREATE PROCEDURE outer_proc AS BEGIN CREATE PROCEDURE inner_proc AS BEGIN ... END END

  • The inne...read more

Add your answer

Q20. What do you understand by CI/CD?

Ans.

CI/CD stands for Continuous Integration/Continuous Deployment. It is a software development practice that aims to automate the building, testing, and deployment of code changes.

  • CI/CD is a process that involves continuous integration of code changes into a shared repository

  • It includes automated testing to ensure that the code changes are functional and do not break existing code

  • Continuous deployment involves automatically deploying the code changes to production servers

  • Example...read more

Add your answer

Q21. Difference b/w == and equals How hashmap works how struts flow works some sqls related questions

Ans.

The interview questions cover topics like the difference between == and equals, how HashMap works, Struts flow, and SQL related questions.

  • The '==' operator in Java is used for reference comparison, while the 'equals' method is used for content comparison.

  • HashMap in Java is a data structure that stores key-value pairs and uses hashing to store and retrieve elements efficiently.

  • Struts is a framework used for developing web applications in Java. It follows a predefined flow of e...read more

Add your answer

Q22. Explain E2E architecture of working project and define rest API integration steps

Ans.

E2E architecture involves end-to-end design of a project, while REST API integration steps include defining endpoints and handling requests/responses.

  • E2E architecture involves designing the entire system from start to finish, including all components and interactions.

  • REST API integration steps include defining endpoints, handling requests using HTTP methods like GET, POST, PUT, DELETE, and managing responses.

  • Steps for REST API integration: Define API endpoints, Create API doc...read more

Add your answer

Q23. Challenges faced in migrating legacy to new technologies

Ans.

Migrating legacy systems to new technologies poses challenges such as compatibility issues, data migration, and training needs.

  • Compatibility issues between old and new systems

  • Data migration from legacy systems to new platforms

  • Training needs for employees to adapt to new technologies

View 1 answer

Q24. What are delegates in .NET?

Ans.

Delegates in .NET are type-safe function pointers that allow methods to be passed as parameters.

  • Delegates are similar to function pointers in C++.

  • They are used to create callback functions and event handlers.

  • Delegates can invoke one or multiple methods.

  • Example: delegate void MyDelegate(string message);

  • Example: MyDelegate del = new MyDelegate(MyMethod);

Add your answer

Q25. What is SDLC and Secure SDLC?

Ans.

SDLC is a process followed for software development. Secure SDLC is the same process with security measures added.

  • SDLC stands for Software Development Life Cycle

  • It is a process followed for software development from planning to deployment

  • Secure SDLC is the same process with security measures added at each stage

  • It includes threat modeling, code review, penetration testing, etc.

  • Secure SDLC ensures that security is integrated into the software development process

Add your answer

Q26. Third party procurement process--Item categories usage

Ans.

Third party procurement process involves categorizing items for efficient usage and tracking.

  • Item categories help in organizing and tracking purchases from third-party vendors.

  • Usage of item categories ensures proper allocation of resources and budgeting.

  • Examples of item categories include office supplies, IT equipment, and marketing materials.

Add your answer

Q27. What are the integration points for SD and MM

Ans.

Integration points for SD and MM include sales order creation, delivery processing, billing, and inventory management.

  • Sales order creation in SD triggers the creation of a delivery document in MM for picking and packing

  • Delivery processing in MM updates the delivery status in the sales order in SD

  • Billing in SD generates invoices which are posted in MM for accounting purposes

  • Inventory management in MM updates stock levels which are reflected in SD for availability

Add your answer

Q28. how to troubleshoot fiori app error, with example

Ans.

To troubleshoot a Fiori app error, start by checking the app logs, network requests, and backend services.

  • Check the app logs for any error messages or warnings.

  • Inspect network requests to see if there are any failed requests or timeouts.

  • Verify the connectivity to backend services and check if they are functioning properly.

  • Try clearing the app cache and refreshing the app to see if the error persists.

  • Consult the Fiori app documentation or community forums for known issues and ...read more

Add your answer

Q29. What are the stages of ITIL?

Ans.

ITIL has 5 stages: Service Strategy, Service Design, Service Transition, Service Operation, and Continual Service Improvement.

  • Service Strategy: Define the strategy for delivering services to meet business needs.

  • Service Design: Design new or changed services and ensure they meet business requirements.

  • Service Transition: Move new or changed services into production.

  • Service Operation: Manage services in production and resolve incidents.

  • Continual Service Improvement: Continuously...read more

Add your answer

Q30. How to setup MySQL native replication

Ans.

MySQL native replication allows for data to be copied from one MySQL database to another in real-time.

  • Enable binary logging on the master server

  • Configure the master server to allow replication connections

  • Create a replication user on the master server

  • Configure the slave server with the master server's information

  • Start the replication process on the slave server

Add your answer

Q31. What are different DB2 abend codes

Ans.

DB2 abend codes are error codes that occur during execution of DB2 programs.

  • ABENDS001 - ABENDS999 are system abend codes

  • SQLCODE - SQL error codes

  • DSN - DB2 error codes

  • Examples: ABENDS013, SQLCODE -805, DSN1101I

  • Each code indicates a specific error or problem in the program execution

Add your answer

Q32. Can we submit dependent parameters in ess job

Ans.

Yes, dependent parameters can be submitted in ESS job.

  • Dependent parameters can be submitted in ESS job by defining the dependencies in the job definition.

  • This allows for dynamic values to be passed based on the values of other parameters.

  • For example, if parameter A is selected, then parameter B should be automatically populated with a specific value.

Add your answer

Q33. what is difference between put and patch

Ans.

Put is used to create or update a resource, while patch is used to update a resource partially.

  • Put is idempotent, meaning multiple identical requests will have the same effect as a single request

  • Patch is not idempotent, as multiple identical requests may have different effects

  • Put requires the client to send the entire updated resource, while patch only requires the client to send the specific changes

  • Put is typically used to create a new resource or completely replace an exist...read more

Add your answer

Q34. What is Twig template?

Ans.

Twig is a template engine for PHP that allows developers to write cleaner and more concise code.

  • Twig is used to separate the presentation layer from the business logic layer in web applications.

  • It provides a syntax that is easy to read and write, making it easier for developers to create templates.

  • Twig supports inheritance, macros, and filters, which can be used to create reusable code.

  • It also has built-in security features to prevent common web application vulnerabilities.

  • Ex...read more

View 1 answer

Q35. what all is involved in discovery phase

Ans.

Discovery phase involves gathering information, analyzing data, and defining project goals.

  • Gathering information from stakeholders and users

  • Analyzing data to identify trends and patterns

  • Defining project goals and objectives

  • Creating user personas and journey maps

  • Conducting interviews and surveys

  • Researching market trends and competitors

Add your answer

Q36. Difference between HANA 1.0 and HANA 2.0

Ans.

HANA 2.0 has improved features and capabilities compared to HANA 1.0.

  • HANA 2.0 has enhanced security features such as data masking and encryption

  • HANA 2.0 supports more programming languages including Python and R

  • HANA 2.0 has improved performance and scalability compared to HANA 1.0

  • HANA 2.0 has a new feature called Multi-tenant database containers (MDC) which allows multiple databases to run on a single HANA instance

  • HANA 2.0 has a new web-based development workbench called SAP ...read more

Add your answer

Q37. What is core expertise in Oracle fusion?

Ans.

Core expertise in Oracle Fusion includes knowledge of Oracle Fusion Middleware, Oracle Fusion Applications, and Oracle Fusion Cloud Services.

  • Understanding of Oracle Fusion Middleware components such as Oracle WebLogic Server, Oracle SOA Suite, and Oracle Identity Management

  • Experience with implementing and customizing Oracle Fusion Applications like Oracle HCM Cloud, Oracle ERP Cloud, and Oracle CX Cloud

  • Knowledge of Oracle Fusion Cloud Services including Oracle Integration Clo...read more

Add your answer

Q38. What is SDWAN and why it is in demand .

Ans.

SDWAN stands for Software-Defined Wide Area Network, a technology that simplifies the management and operation of a WAN by decoupling the networking hardware from its control mechanism.

  • SDWAN allows organizations to use multiple types of connections, such as broadband internet, LTE, and MPLS, to securely connect users to applications.

  • It provides centralized control and visibility, making it easier to manage network traffic and prioritize applications based on business needs.

  • SD...read more

Add your answer

Q39. what all are types of indexes

Ans.

Indexes are used to improve database performance. Types of indexes include clustered, non-clustered, unique, and full-text.

  • Clustered indexes determine the physical order of data in a table

  • Non-clustered indexes create a separate structure to store the index data

  • Unique indexes ensure that no two rows have the same values in the indexed columns

  • Full-text indexes enable text-based searches on large amounts of text data

Add your answer

Q40. What are Filters in .NET?

Ans.

Filters in .NET are attributes that can be applied to classes, methods, or properties to add behavior or functionality.

  • Filters are used to add behavior or functionality to classes, methods, or properties in .NET applications.

  • They can be used for tasks such as logging, exception handling, authorization, and validation.

  • Filters can be applied using attributes like [Authorize], [ExceptionFilter], [ActionFilter], etc.

Add your answer

Q41. Memory management in Android Apps

Ans.

Memory management in Android Apps involves managing memory usage efficiently to prevent crashes and improve performance.

  • Use efficient data structures to minimize memory usage

  • Avoid memory leaks by releasing unused objects and resources

  • Implement caching strategies to reduce the need for frequent memory allocations

  • Optimize code to reduce memory overhead

  • Use tools like Android Profiler to monitor memory usage and identify potential issues

Add your answer

Q42. What is a TDD and BDD?

Ans.

TDD stands for Test-Driven Development and BDD stands for Behavior-Driven Development.

  • TDD is a software development process where tests are written before the actual code.

  • BDD is an extension of TDD that focuses on the behavior of the system rather than just the code.

  • TDD helps in ensuring that the code meets the requirements and is working correctly.

  • BDD helps in improving communication between developers, testers, and stakeholders.

  • Example: In TDD, a developer writes a failing ...read more

Add your answer

Q43. Have you worked on ccv2?

Ans.

Yes, I have worked on ccv2.

  • I have experience working with ccv2 in a previous project.

  • I am familiar with the features and functionalities of ccv2.

  • I have worked on troubleshooting and resolving issues related to ccv2.

  • I have also provided training and support to team members on ccv2.

  • For example, in my previous role as a consultant at XYZ company, I worked on implementing ccv2 for a client in the financial services industry.

Add your answer

Q44. What are features of OOPS

Ans.

Features of OOPS include encapsulation, inheritance, polymorphism, and abstraction.

  • Encapsulation: Bundling data and methods that operate on the data into a single unit.

  • Inheritance: Ability to create a new class from an existing class, inheriting its properties and methods.

  • Polymorphism: Ability to use a single interface to represent different data types or objects.

  • Abstraction: Hiding the implementation details and showing only the necessary features of an object.

Add your answer

Q45. 2.Different types of flags on a firewall

Ans.

Flags on a firewall are used to control network traffic and provide security.

  • Firewall flags can be used to allow or block specific types of traffic

  • Common firewall flags include SYN, ACK, FIN, and RST

  • Flags can also be used to identify and block malicious traffic, such as DoS attacks

  • Firewall flags can be configured at the network or application layer

Add your answer

Q46. 3.IOS updation of a cisco and fortigate

Ans.

IOS updation of Cisco and Fortigate

  • Ensure compatibility of IOS version with hardware and software

  • Backup configuration before updating

  • Test the updated IOS in a lab environment before deploying in production

  • Follow vendor's guidelines and best practices

  • Schedule updates during maintenance windows to minimize downtime

Add your answer

Q47. Write code to create a singleton class

Ans.

Singleton class ensures only one instance of a class is created

  • Use a private static variable to hold the instance of the class

  • Provide a public static method to access the instance

  • Ensure the constructor is private to prevent instantiation from outside the class

Add your answer

Q48. Remove duplicates from an array

Ans.

Remove duplicates from an array of strings

  • Create a Set to store unique elements

  • Iterate through the array and add each element to the Set

  • Convert the Set back to an array to get the unique elements

Add your answer

Q49. Explain the architecture of IBM MDM

Ans.

IBM MDM architecture is a hub-and-spoke model with a central hub and multiple spokes for data sources.

  • IBM MDM uses a hub-and-spoke model for data management

  • The central hub is the MDM server which stores and manages the master data

  • Multiple spokes connect to the hub for data sources such as ERP systems, CRM systems, etc.

  • The hub acts as a mediator between the spokes and manages the data flow

  • IBM MDM also includes data governance and data quality features

Add your answer

Q50. Difference between pickling and unpickling

Ans.

Pickling is the process of converting a Python object into a byte stream, while unpickling is the process of converting the byte stream back into a Python object.

  • Pickling is used for serialization and deserialization of Python objects.

  • Pickling allows objects to be saved to a file or transferred over a network.

  • Unpickling reconstructs the object hierarchy from the byte stream.

  • The pickle module in Python provides functions for pickling and unpickling objects.

  • Example: Pickling a ...read more

Add your answer

Q51. What is Z-index?

Ans.

Z-index is a CSS property that controls the stacking order of elements on a webpage.

  • Z-index is used to specify the stack order of an element along the z-axis.

  • Elements with a higher z-index value will appear on top of elements with a lower z-index value.

  • Z-index only works on positioned elements (position: relative, position: absolute, position: fixed, or position: sticky).

Add your answer

Q52. The no of FAQs for a utility website

Ans.

The number of FAQs for a utility website can vary depending on the complexity of the services offered.

  • The number of FAQs can range from a few dozen to hundreds, depending on the size of the utility website.

  • FAQs should cover common customer queries about billing, account management, service outages, and troubleshooting.

  • Regularly updating and expanding FAQs based on customer feedback can improve user experience and reduce support inquiries.

Add your answer

Q53. Challenges faced in automation.

Ans.

Challenges in automation include complexity of systems, lack of standardization, and resistance to change.

  • Complexity of systems can make automation difficult to implement and maintain.

  • Lack of standardization across different systems and processes can hinder automation efforts.

  • Resistance to change from employees who are used to manual processes can slow down automation adoption.

Add your answer

Q54. Explain about innodb architecture

Ans.

InnoDB is a storage engine for MySQL that provides ACID-compliant transactions and crash recovery.

  • InnoDB uses a clustered index to store data, which helps in faster retrieval of data.

  • It supports row-level locking for better concurrency.

  • InnoDB maintains a transaction log to ensure data integrity and recoverability in case of crashes.

  • It uses a doublewrite buffer to avoid data corruption during crashes.

  • InnoDB also supports foreign key constraints for data integrity.

  • InnoDB buffer...read more

Add your answer

Q55. What are data points?

Ans.

Data points are individual pieces of information that make up a larger dataset.

  • Data points can be numerical or categorical

  • Examples of data points include age, gender, income, and education level

  • Data points are used to analyze trends and patterns in data

Add your answer

Q56. difference between procedure & functions

Ans.

Procedures are used to perform an action, while functions return a value.

  • Procedures do not return a value, while functions do

  • Functions can be used in expressions, while procedures cannot

  • Procedures can modify input parameters, while functions cannot

  • Functions have a return type, while procedures do not

  • Examples of functions include Math.max() and String.length(), while examples of procedures include console.log() and alert()

Add your answer

Q57. What is deadlock condition

Ans.

Deadlock is a situation where two or more processes are unable to proceed because they are waiting for each other to release resources.

  • Occurs in a multi-process system

  • Processes are blocked and cannot continue

  • Each process is waiting for a resource held by another process

  • Can be prevented by proper resource allocation and scheduling

  • Example: Process A holds resource X and waits for resource Y, while Process B holds resource Y and waits for resource X

Add your answer

Q58. Project Related Implementation Examples

Ans.

Implemented a new CRM system for a large retail company, resulting in improved customer data management and increased sales.

  • Analyzed current CRM system and identified areas for improvement

  • Collaborated with IT team to customize CRM system to meet company's specific needs

  • Provided training to staff on how to use the new CRM system effectively

  • Monitored and evaluated the impact of the new CRM system on sales and customer satisfaction

Add your answer

Q59. Reference architecture of insurance

Ans.

Reference architecture of insurance is a blueprint for designing and implementing insurance systems.

  • Reference architecture provides a common language and framework for insurance companies to design and implement their systems.

  • It includes components such as data models, business processes, and technology infrastructure.

  • Examples of reference architectures in insurance include ACORD and LOMA.

  • Reference architecture helps ensure interoperability and standardization across differen...read more

Add your answer

Q60. csrf what is it

Ans.

CSRF stands for Cross-Site Request Forgery, a type of attack where a malicious website tricks a user into performing actions on another website.

  • CSRF attacks exploit the trust that a site has in a user's browser, allowing an attacker to perform actions on behalf of the user without their consent.

  • Prevent CSRF attacks by using tokens to validate requests, ensuring that actions can only be performed by the intended user.

  • Example: An attacker sends a link to a user that, when click...read more

Add your answer

Q61. Requirement gathering technique

Ans.

Requirement gathering techniques help in collecting and documenting project requirements.

  • Interviewing stakeholders to understand their needs and expectations

  • Conducting surveys or questionnaires to gather feedback

  • Observing users in their natural environment to identify pain points

  • Creating prototypes to visualize the final product

  • Brainstorming sessions with team members to generate ideas

Add your answer

Q62. explain Spring annotations

Ans.

Spring annotations are used to provide metadata to Spring framework classes and methods.

  • Annotations are used to configure Spring beans, dependency injection, AOP, and more

  • Examples include @Component, @Autowired, @RequestMapping, @Transactional

  • Annotations reduce the need for XML configuration in Spring applications

Add your answer

Q63. Explain automation framework

Ans.

An automation framework is a set of guidelines, rules, and tools that help in creating automated tests for software applications.

  • Automation frameworks provide structure and organization to automated testing efforts.

  • They define the overall test automation strategy and approach.

  • Frameworks help in reducing maintenance efforts and increasing reusability of test scripts.

  • Examples of automation frameworks include keyword-driven, data-driven, and hybrid frameworks.

Add your answer

Q64. Explain about bdd framework

Ans.

BDD framework is a software development approach that focuses on collaboration between developers, testers, and business stakeholders.

  • BDD stands for Behavior Driven Development

  • It uses natural language to describe the behavior of an application

  • Scenarios are written in a Given-When-Then format

  • Tools like Cucumber and SpecFlow are commonly used for implementing BDD frameworks

Add your answer

Q65. Explain data driven testing

Ans.

Data driven testing is a testing methodology where test input and output values are stored in data files or databases.

  • Test cases are created based on data sets

  • Data sets are stored in external files or databases

  • Allows for easy maintenance and scalability of test cases

  • Reduces the need for code changes when test data changes

Add your answer

Q66. Explain the special procurement process

Ans.

Special procurement process involves acquiring goods or services through non-traditional methods.

  • Special procurement can include emergency purchases, direct purchases from a specific supplier, or purchases through a framework agreement.

  • It is often used for unique or urgent needs that cannot be met through regular procurement channels.

  • Examples include sourcing rare materials for a project, buying specialized equipment from a sole supplier, or procuring goods/services in a cris...read more

Add your answer

Q67. what is -811 error

Ans.

DB2 SQL error code -811 indicates a row or value was not found in the table.

  • Occurs when a SELECT or FETCH statement does not return any rows

  • May also occur when a value being inserted or updated does not exist in the table

  • Can be resolved by checking the SQL statement or verifying the existence of the row or value

Add your answer

Q68. OOPs concepts in ABAP

Ans.

OOPs concepts in ABAP involve classes, objects, inheritance, encapsulation, and polymorphism.

  • ABAP supports object-oriented programming through classes and interfaces.

  • Classes in ABAP can have attributes, methods, and events.

  • Inheritance allows a class to inherit attributes and methods from another class.

  • Encapsulation in ABAP involves bundling data and methods within a class.

  • Polymorphism in ABAP allows methods to be implemented differently in subclasses.

Add your answer

Q69. New trends in core banking

Ans.

Some new trends in core banking include digital transformation, open banking, and AI/ML integration.

  • Digital transformation is changing the way banks interact with customers and manage operations.

  • Open banking allows for collaboration between banks and third-party providers to offer more personalized services.

  • AI/ML integration is being used for fraud detection, customer service, and personalized recommendations.

Add your answer

Q70. Internal working of hashmap

Ans.

HashMap is a data structure that stores key-value pairs and uses hashing to quickly retrieve values based on keys.

  • HashMap internally uses an array of linked lists to store key-value pairs.

  • When a key-value pair is added, the key is hashed to determine the index in the array where it will be stored.

  • If multiple keys hash to the same index, a linked list is used to handle collisions.

  • HashMap uses the hashCode() method of keys to calculate the hash value.

  • HashMap allows null keys an...read more

Add your answer

Q71. Explain Box model.

Ans.

Box model is a concept in CSS where every element is treated as a box with content, padding, border, and margin.

  • Every element in CSS is considered as a rectangular box.

  • The box model consists of content, padding, border, and margin.

  • Content is the actual content of the box, padding is the space between the content and the border, border is the line around the box, and margin is the space outside the border.

  • The total width of an element is calculated as: width + padding-left + p...read more

Add your answer

Q72. Oracle Upgrade Steps

Ans.

Oracle upgrade steps involve planning, testing, and executing the upgrade process.

  • Assess current environment and determine upgrade path

  • Create a backup and recovery plan

  • Test the upgrade process in a non-production environment

  • Perform the upgrade and validate the new environment

  • Perform post-upgrade tasks such as data migration and application testing

Add your answer

Q73. Explain Core Data

Ans.

Core Data is a framework provided by Apple for managing the model layer objects in an iOS application.

  • Core Data allows you to create, read, update, and delete data in your app's database.

  • It provides an object-oriented interface to the underlying SQLite database.

  • Core Data supports relationships between entities, data validation, and undo/redo functionality.

Add your answer

Q74. Explain closures

Ans.

Closures are functions that have access to variables from their outer scope even after the outer function has finished executing.

  • Closures allow functions to 'remember' the environment in which they were created

  • They can access variables from their outer scope even after the outer function has finished executing

  • Closures are commonly used in event handlers and callbacks

Add your answer
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos

Interview Process at B. Braun Medical

based on 91 interviews
4 Interview rounds
Technical Round - 1
Technical Round - 2
HR Round - 1
HR Round - 2
View more
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Senior Consultant Interview Questions from Similar Companies

3.8
 • 70 Interview Questions
3.8
 • 22 Interview Questions
3.6
 • 13 Interview Questions
3.9
 • 12 Interview Questions
3.8
 • 11 Interview Questions
4.1
 • 11 Interview Questions
View all
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
70 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter