Premium Employer

Infosys

3.6
based on 37.8k Reviews
Filter interviews by

100+ Deepaul Technologies Interview Questions and Answers

Updated 7 Jan 2025
Popular Designations

Q1. Split the String Problem Statement

You are given a string str consisting of N lowercase alphabets. Your task is to determine if it is possible to divide the string into three non-empty substrings such that one ...read more

View 2 more answers

Q2. Count Ways to Reach the N-th Stair Problem Statement

You are provided with a number of stairs, and initially, you are located at the 0th stair. You need to reach the Nth stair, and you can climb one or two step...read more

Add your answer

Q3. Are you okay to learn front end and back end technologies to ensure you are a complete developer in the longer run? Would you be able to learn the concepts if a timeline is given?? If yes, explain your learning...

read more
Ans.

Yes, I am willing to learn front end and back end technologies and have a learning strategy in place.

  • I believe in continuous learning and growth as a developer.

  • I have experience in learning new technologies quickly and efficiently.

  • My learning strategy involves breaking down concepts into smaller parts and practicing regularly.

  • I also utilize online resources and seek guidance from experienced colleagues.

  • Examples of technologies I have learned include React, Node.js, and MongoD...read more

Add your answer

Q4. what do you know about latest technologi in market,have you any idea about AI(Artificial Intelligence), tell me about about AI and where AI used

Ans.

AI is a technology that enables machines to learn from experience and perform tasks that typically require human intelligence.

  • AI is used in various industries such as healthcare, finance, and transportation

  • AI can be used for natural language processing, image recognition, and predictive analytics

  • Examples of AI include virtual assistants like Siri and Alexa, self-driving cars, and fraud detection systems

  • AI has the potential to revolutionize industries and improve efficiency an...read more

Add your answer
Discover Deepaul Technologies interview dos and don'ts from real experiences

Q5. Are you comfortable using Command Line Interfaces (CLIs) or Integrated Development Environments (IDEs) as part of your daily tasks?

Ans.

Yes, I am comfortable using both CLIs and IDEs for my daily tasks.

  • I have experience using various CLIs such as Git Bash, Windows Command Prompt, and Terminal on macOS.

  • I am proficient in using IDEs such as Visual Studio Code, Eclipse, and IntelliJ IDEA.

  • I understand the benefits and drawbacks of both CLIs and IDEs and can choose the appropriate tool for the task at hand.

Add your answer

Q6. What is software test life cycle

Ans.

Software test life cycle is a process of testing software from planning to deployment.

  • It includes planning, designing, executing, and reporting.

  • It starts with the test planning phase where test objectives and strategies are defined.

  • Next is the test design phase where test cases are created based on requirements.

  • Then comes the test execution phase where tests are run and defects are logged.

  • Finally, the test closure phase involves analyzing test results and creating a test repo...read more

View 1 answer
Are these interview questions helpful?

Q7. How to pass data between Child and Parent component in angular.

Ans.

Data can be passed between Child and Parent components in Angular using @Input and @Output decorators.

  • Use @Input decorator in the child component to receive data from the parent component.

  • Use @Output decorator along with EventEmitter in the child component to send data to the parent component.

  • Parent component can pass data to child component using property binding.

  • Child component can emit events using EventEmitter to send data to parent component.

Add your answer

Q8. What are session and how to implement them in ASP.NET webforms.

Ans.

Sessions are a way to store user-specific data on the server side in ASP.NET webforms.

  • Sessions are used to store user-specific data across multiple pages during a user's visit to a website.

  • In ASP.NET webforms, sessions can be implemented using the Session object.

  • To store a value in a session, you can use Session['key'] = value;

  • To retrieve a value from a session, you can use var value = Session['key'];

  • Sessions can be used to store user authentication information, shopping cart...read more

Add your answer
Share interview questions and help millions of jobseekers 🌟

Q9. Sql query to show the number of employees joined in a particular year.

Ans.

Use SQL query to count number of employees joined in a specific year.

  • Use COUNT() function to count the number of employees.

  • Use WHERE clause to filter employees based on join year.

  • Group by join year to get count for each year.

Add your answer

Q10. What is functional testing

Ans.

Functional testing is a type of software testing that verifies the functionality of a system or application.

  • It focuses on testing the individual functions or features of the system

  • It ensures that the system meets the specified requirements and works as expected

  • It can be automated or manual

  • Examples include unit testing, integration testing, and system testing

Add your answer

Q11. Do you think algorithms and pseudocodes still play a role in the world of IT Services?

Ans.

Yes, algorithms and pseudocodes are still important in IT Services.

  • Algorithms are used in various fields of IT such as machine learning, data analysis, and cryptography.

  • Pseudocodes are used to plan and design algorithms before coding them.

  • Understanding algorithms and pseudocodes is essential for software engineers to write efficient and optimized code.

  • Examples of algorithms include sorting algorithms, search algorithms, and graph algorithms.

Add your answer

Q12. Do you have experience with working on Linux?

Ans.

Yes, I have experience working on Linux.

  • I have worked on various Linux distributions such as Ubuntu, CentOS, and Debian.

  • I am familiar with command-line interface and shell scripting on Linux.

  • I have experience setting up and configuring web servers like Apache and Nginx on Linux.

  • I have worked with Linux-based cloud platforms like AWS and Google Cloud.

  • I have also contributed to open-source projects on Linux.

Add your answer

Q13. What is defect life cycle process

Ans.

Defect life cycle process is the stages a defect goes through from discovery to resolution.

  • Defect is identified and reported

  • Defect is assigned to a developer

  • Developer fixes the defect

  • Defect is retested

  • Defect is closed if it passes retest, or reopened if it fails

Add your answer

Q14. Explain the scenarios where If and Switch Case statements are used.

Ans.

If and Switch Case statements are used for conditional branching in programming.

  • If statements are used for simple conditional branching.

  • Switch Case statements are used for multiple conditional branching.

  • If statements are more flexible than Switch Case statements.

  • Switch Case statements are more efficient than If statements for large number of conditions.

  • If statements can be nested, but Switch Case statements cannot.

  • Examples: If statement - if(age > 18) { //do something }, Swit...read more

Add your answer

Q15. Where do you add external dlls in asp.net webforms.

Ans.

External dlls can be added in the bin folder of the ASP.NET webforms project.

  • External dlls can be added directly to the 'bin' folder of the ASP.NET webforms project.

  • You can also add external dlls to a separate 'lib' folder within the project and reference them from there.

  • Alternatively, you can use NuGet packages to manage external dependencies in ASP.NET webforms.

Add your answer

Q16. What is defect tracking process

Ans.

Defect tracking process is a system to identify, report, and track defects in software development.

  • Defects are identified through testing and reported in a tracking system

  • Each defect is assigned a unique identifier and categorized by severity

  • Defects are tracked through their lifecycle from discovery to resolution

  • Metrics are used to analyze defect trends and improve development processes

Add your answer

Q17. What are the differences between C and C++?

Ans.

C++ is an extension of C with object-oriented programming features.

  • C++ supports classes and objects while C does not.

  • C++ has built-in support for polymorphism and inheritance.

  • C++ has a standard template library (STL) while C does not.

  • C++ allows function overloading while C does not.

  • C++ has exception handling while C does not.

View 1 answer

Q18. What are Semaphores ? Write a code showing their use

Ans.

Semaphores are synchronization tools used to control access to shared resources in a concurrent system.

  • Semaphores can be used to prevent race conditions and deadlocks.

  • They can be implemented using binary or counting semaphores.

  • A binary semaphore can be used to implement mutual exclusion.

  • A counting semaphore can be used to limit the number of threads accessing a resource.

  • Example code: semaphore_wait(sem); // decrements semaphore value and blocks if value is 0

  • Example code: sema...read more

Add your answer

Q19. What are process scheduling algorithms ? Which is the best one ?

Ans.

Process scheduling algorithms are used to allocate CPU time to processes. There is no one best algorithm.

  • Process scheduling algorithms determine which process gets to use the CPU and for how long.

  • Some common algorithms include First-Come, First-Served (FCFS), Round Robin (RR), and Priority Scheduling.

  • FCFS is simple but can lead to long wait times for processes further down the queue.

  • RR gives each process a small amount of time before moving on to the next process, but can lea...read more

Add your answer

Q20. What is postponed status

Ans.

Postponed status refers to a delay in the progress of a task or project.

  • It indicates that the task or project is not currently being worked on

  • It may be due to a lack of resources or a change in priorities

  • It can be used to track the status of a project or task

  • Examples include a postponed meeting or a postponed software release

Add your answer

Q21. How do you get the second to last element from a SQL table?

Ans.

To get the second to last element from a SQL table, use the OFFSET-FETCH clause.

  • Use the ORDER BY clause to sort the table in descending order.

  • Use the OFFSET-FETCH clause to skip the last row and fetch the second to last row.

  • Example: SELECT column_name FROM table_name ORDER BY column_name DESC OFFSET 1 ROWS FETCH NEXT 1 ROWS ONLY;

Add your answer

Q22. What are the loops in this function

Ans.

The function contains two loops.

  • The first loop is a for loop that iterates over an array.

  • The second loop is a while loop that continues until a certain condition is met.

View 1 answer

Q23. Suppose X application is having a production issue, how would you resolve this issue?

Ans.

I would start by identifying the root cause of the issue, then develop and implement a solution to fix it.

  • Investigate the logs and error messages to understand the issue

  • Replicate the issue in a test environment to analyze it further

  • Collaborate with team members to brainstorm potential solutions

  • Implement the fix and test it thoroughly before deploying to production

View 1 answer

Q24. Do you know about hashing function?

Ans.

Hashing function is a mathematical function that converts data of arbitrary size to a fixed size.

  • Hashing is used for data integrity and security purposes.

  • Hash functions are one-way functions, meaning it is difficult to reverse engineer the original data from the hash value.

  • Examples of hashing algorithms include MD5, SHA-1, and SHA-256.

Add your answer

Q25. What is circular linked list and doubly linked list?

Ans.

Circular linked list is a linked list where the last node points to the first node. Doubly linked list has nodes with pointers to both previous and next nodes.

  • Circular linked list is useful for applications where data needs to be accessed in a circular manner, such as a playlist.

  • Doubly linked list allows for traversal in both directions, making it useful for applications such as a browser history.

  • Both types of linked lists require extra memory for storing pointers to previous...read more

Add your answer

Q26. What is can't be fixed status

Ans.

Can't be fixed status refers to a problem that cannot be resolved or repaired.

  • It is a status given to a problem that is beyond repair or resolution.

  • It is often used in software development to indicate a bug or issue that cannot be fixed.

  • Examples include hardware failures, irreparable data corruption, and certain security vulnerabilities.

  • In some cases, a workaround or mitigation strategy may be possible, but the underlying issue cannot be fully resolved.

  • It is important to prop...read more

Add your answer

Q27. What is demand paging ? Give a practical example

Ans.

Demand paging is a memory management technique where pages are loaded only when needed.

  • Pages are loaded into memory only when they are accessed

  • It reduces the amount of memory needed to run a program

  • It allows for larger programs to run on systems with limited memory

  • Example: When a user opens a web browser, only the necessary pages are loaded into memory as they are accessed

Add your answer

Q28. What is Left Outer Join ? Give an example

Ans.

Left Outer Join returns all the records from the left table and matching records from the right table.

  • Left Outer Join is used to combine two tables based on a common column.

  • The unmatched records from the left table are also included in the result set.

  • Example: SELECT * FROM table1 LEFT OUTER JOIN table2 ON table1.column = table2.column;

Add your answer

Q29. What is duplicate status

Ans.

Duplicate status refers to the presence of multiple copies of the same data or record.

  • Duplicate status can occur in databases, files, or any other data storage system.

  • It can lead to data inconsistency and errors in data analysis.

  • Duplicate status can be identified and resolved using various techniques such as data deduplication and record matching.

  • For example, in a customer database, duplicate status can occur if the same customer is entered multiple times with slightly differ...read more

Add your answer

Q30. What is the core of Operating System ?

Ans.

The core of an operating system is the kernel, which manages the system's resources and provides essential services.

  • The kernel is responsible for managing memory, processes, and input/output operations.

  • It provides services such as device drivers, file system management, and scheduling.

  • Examples of operating system kernels include Linux, Windows NT, and macOS.

  • The kernel acts as a bridge between applications and the hardware of the computer.

  • It ensures that different processes an...read more

View 1 answer

Q31. what is binary search and write a program on it

Ans.

Binary search is a search algorithm that finds the position of a target value within a sorted array.

  • Divide the array into two halves and compare the target value with the middle element.

  • If the target value matches the middle element, return its position.

  • If the target value is less than the middle element, search the left half of the array.

  • If the target value is greater than the middle element, search the right half of the array.

  • Repeat until the target value is found or the se...read more

Add your answer

Q32. explain the logic behind merge sort and tell the worst case complexity

Ans.

Merge sort is a divide and conquer algorithm that recursively divides the array into halves and then merges them in sorted order.

  • Divide the array into two halves

  • Recursively sort the two halves

  • Merge the sorted halves

  • Worst case complexity is O(nlogn)

Add your answer

Q33. How can I write a code in python

Ans.

To write code in Python, you need to use a text editor or an integrated development environment (IDE) and follow the syntax rules of the language.

  • Install Python on your computer

  • Choose a text editor or IDE to write your code

  • Learn the syntax and rules of Python

  • Write your code using Python's syntax and logic

  • Save the code with a .py extension

  • Run the code using a Python interpreter or IDE

View 1 answer

Q34. What is regression testing

Ans.

Regression testing is the process of testing changes made to a software application to ensure that existing functionality still works.

  • It is performed after making changes to the software

  • It ensures that existing functionality is not affected by the changes

  • It helps to catch any defects or bugs that may have been introduced

  • It can be automated using testing tools

  • Examples include retesting after bug fixes, testing after software upgrades, etc.

Add your answer

Q35. What is software testing

Ans.

Software testing is the process of evaluating a software application or system to find defects and ensure it meets the specified requirements.

  • Software testing involves executing the software with the intent of finding defects

  • It ensures that the software meets the specified requirements and works as expected

  • Types of testing include unit testing, integration testing, system testing, and acceptance testing

  • Testing can be manual or automated, and both have their advantages and dis...read more

Add your answer

Q36. What is accepted testing

Ans.

Accepted testing refers to the process of verifying and validating software to ensure it meets the specified requirements.

  • Accepted testing involves testing the software against the requirements and specifications

  • It includes functional testing, performance testing, security testing, and usability testing

  • Testing should be done at different stages of the software development life cycle

  • Examples of accepted testing tools include Selenium, JMeter, and Appium

Add your answer

Q37. What is the difference between compile time and run time polymorphism?

Ans.

Compile time polymorphism is achieved through function overloading and operator overloading, while run time polymorphism is achieved through virtual functions and inheritance.

  • Compile time polymorphism is resolved during compile time based on the number and types of arguments in the function call.

  • Run time polymorphism is resolved during runtime based on the actual object being pointed to or referred to.

  • Compile time polymorphism is faster as the binding of function call is done...read more

Add your answer

Q38. Difference between authentication and authorization?And how we implement in Dot net Core

Ans.

Authentication verifies the identity of a user, while authorization determines what resources a user can access.

  • Authentication confirms the user's identity through credentials like username and password.

  • Authorization controls the access rights of authenticated users to specific resources.

  • In Dot net Core, authentication can be implemented using middleware like JWT authentication or OAuth.

  • Authorization in Dot net Core can be achieved through policies defined in the ConfigureSer...read more

Add your answer

Q39. What is exploratory testing

Ans.

Exploratory testing is a type of testing where the tester explores the software to find defects and issues.

  • It is an unscripted testing approach

  • It involves simultaneous learning, test design, and test execution

  • It is useful for finding defects that are difficult to find with scripted testing

  • It is often used in Agile development methodologies

  • Example: A tester explores a new feature in a software application to find any unexpected behavior

Add your answer

Q40. What are the different concepts of OOPS.

Ans.

OOPS concepts include inheritance, encapsulation, polymorphism, and abstraction.

  • Inheritance: Allows a class to inherit properties and behavior from another class.

  • Encapsulation: Bundling data and methods that operate on the data into a single unit.

  • Polymorphism: Ability to present the same interface for different data types.

  • Abstraction: Hiding the complex implementation details and showing only the necessary features.

Add your answer

Q41. what would happen if we use component instead of repository or service annotation

Ans.

Using component instead of repository or service annotation can lead to confusion and potential errors in the application.

  • Components are typically used for defining Spring beans, while repositories and services are used for specific purposes like data access and business logic

  • Using component annotation instead of repository can lead to ambiguity in the codebase

  • Repositories and services have specific functionalities and responsibilities, using component annotation may not conv...read more

Add your answer

Q42. What are the 4 main uses of python

Ans.

Python is used for web development, data analysis, artificial intelligence, and automation.

  • Web development: Python is widely used for building websites and web applications. Frameworks like Django and Flask are popular choices.

  • Data analysis: Python has powerful libraries like Pandas and NumPy that make it easy to analyze and manipulate data.

  • Artificial intelligence: Python is extensively used in AI and machine learning projects. Libraries like TensorFlow and PyTorch are common...read more

View 1 answer

Q43. What is useable testing

Ans.

Usable testing is a type of testing that focuses on the user experience and usability of the software.

  • Usable testing involves testing the software from the user's perspective

  • It ensures that the software is easy to use and meets the user's needs

  • Usable testing can include user testing, heuristic evaluation, and expert review

  • Examples of usable testing include testing the navigation, layout, and functionality of a website or app

Add your answer

Q44. What is performance testing

Ans.

Performance testing is the process of evaluating the speed, responsiveness, stability, and scalability of a software application.

  • It involves simulating real-world scenarios to measure the performance of the application

  • It helps identify bottlenecks and areas for improvement

  • Examples include load testing, stress testing, and endurance testing

  • Performance testing is important for ensuring a positive user experience and preventing system failures

Add your answer

Q45. What is golbalization

Ans.

Globalization is the process of international integration arising from the interchange of world views, products, ideas, and other aspects of culture.

  • Globalization involves the spread of ideas, culture, and technology across borders

  • It has led to increased trade and economic interdependence between countries

  • Examples include multinational corporations, international trade agreements, and the internet

  • Critics argue that globalization can lead to cultural homogenization and exploit...read more

Add your answer

Q46. What is reject status

Ans.

Reject status is a status given to a request or application that has been denied or declined.

  • Reject status indicates that the request or application has not met the required criteria or standards.

  • It can be given for various reasons such as incomplete information, insufficient qualifications, or failure to meet deadlines.

  • Examples include rejected job applications, rejected loan applications, and rejected project proposals.

Add your answer

Q47. What is white box testing

Ans.

White box testing is a testing technique that involves testing the internal structure of the software.

  • It is also known as clear box testing or structural testing.

  • It requires knowledge of the internal workings of the software.

  • It involves testing individual components or modules of the software.

  • It is used to ensure that the software is working as expected and to identify any defects or errors in the code.

  • Examples include unit testing, integration testing, and code coverage anal...read more

Add your answer

Q48. What is grey box testing

Ans.

Grey box testing is a combination of black box and white box testing techniques.

  • It involves testing the system with partial knowledge of its internal workings.

  • Testers have access to some information about the system's architecture and design.

  • It helps in identifying defects that are difficult to find through black box testing.

  • Examples include API testing and database testing.

Add your answer

Q49. Which version of java you used to develop application

Ans.

I used Java version X to develop the application.

  • Specify the exact version number of Java used

  • Mention any specific features or libraries used in the application

  • Example: Java 8 was used with Spring Boot framework

Add your answer

Q50. How to start an induction motor?

Ans.

An induction motor can be started by providing a rotating magnetic field.

  • Use a three-phase power supply to create a rotating magnetic field

  • The magnetic field induces a current in the rotor, causing it to rotate

  • The motor may require a starting capacitor or a starting winding to provide the initial torque

  • Once the motor reaches its rated speed, the starting mechanism can be switched off

Add your answer

Q51. What is cyclic graph? Difference between array and linked list?

Ans.

Cyclic graph is a graph that contains at least one cycle. Array is a collection of elements of same data type. Linked list is a data structure that stores elements in a linear order.

  • Cyclic graph can be represented using adjacency list or adjacency matrix.

  • Array has fixed size and elements are stored in contiguous memory locations.

  • Linked list has dynamic size and elements are stored in non-contiguous memory locations.

  • Accessing elements in array is faster than linked list.

  • Insert...read more

Add your answer

Q52. What is python programs

Ans.

Python programs are sets of instructions written in the Python programming language to perform specific tasks.

  • Python programs are written using the Python programming language.

  • They consist of a series of instructions that are executed sequentially.

  • Python programs can perform a wide range of tasks, from simple calculations to complex data analysis and web development.

  • They can be used to automate repetitive tasks, manipulate data, create graphical user interfaces, and much more...read more

View 1 answer

Q53. explain project like which technology and framework used

Ans.

Developed a web application using ReactJS and NodeJS with MongoDB as the database.

  • Used ReactJS for the frontend development

  • NodeJS was used for the backend development

  • MongoDB was used as the database

  • Implemented RESTful APIs for communication between frontend and backend

  • Used Git for version control

Add your answer

Q54. what is the difference between insertion sort and merge sort

Ans.

Insertion sort is a simple sorting algorithm that iterates through an array and places each element in its correct position. Merge sort is a divide and conquer algorithm that divides an array into two halves, sorts them separately, and then merges them back together.

  • Insertion sort has a time complexity of O(n^2) while merge sort has a time complexity of O(n log n)

  • Insertion sort is efficient for small data sets while merge sort is efficient for large data sets

  • Insertion sort is...read more

Add your answer

Q55. Type of black box testing

Ans.

Black box testing is a method of testing where the internal workings of the system are not known to the tester.

  • Functional testing

  • Non-functional testing

  • Regression testing

  • Boundary value testing

  • Equivalence partitioning

  • State transition testing

Add your answer

Q56. Dose python use or == ?

Ans.

Python uses == for comparison of values.

  • Python uses == to compare the values of two objects.

  • The == operator returns True if the values are equal, and False otherwise.

  • It is used to compare integers, strings, lists, dictionaries, and other data types.

  • For example, '5 == 5' returns True, while '5 == 6' returns False.

View 1 answer

Q57. Difference between ViewState and Session.

Ans.

ViewState stores data on the client side, while Session stores data on the server side.

  • ViewState is used to store page-specific data in ASP.NET web applications.

  • Session is used to store user-specific data that needs to be accessed across multiple pages.

  • ViewState data is stored in a hidden field on the page, while Session data is stored on the server.

  • ViewState data is available only for the current page, while Session data is available throughout the user's session.

  • Example: Vi...read more

Add your answer

Q58. Is java object oriented or process oriented?

Ans.

Java is object oriented.

  • Java is designed to be object oriented.

  • It supports encapsulation, inheritance, and polymorphism.

  • Java classes are used to create objects.

  • Example: String class in Java is an object.

  • Java also supports functional programming with lambda expressions.

View 1 answer

Q59. Type of software testing

Ans.

Software testing includes functional, non-functional, manual, automated, regression, performance, and security testing.

  • Functional testing checks if the software meets the requirements and specifications.

  • Non-functional testing checks the software's performance, usability, and reliability.

  • Manual testing is done by humans, while automated testing is done by software tools.

  • Regression testing checks if the changes made to the software have affected its existing functionality.

  • Perfo...read more

Add your answer

Q60. Types of bug life cycle

Ans.

Bug life cycle includes stages like new, open, assigned, fixed, verified and closed.

  • New: When a bug is identified and reported

  • Open: When the bug is confirmed and assigned to a developer

  • Assigned: When the developer starts working on the bug

  • Fixed: When the developer fixes the bug

  • Verified: When the tester verifies the fix

  • Closed: When the bug is closed after successful verification

Add your answer

Q61. how do u balance load using load balancer

Ans.

Load balancers distribute incoming network traffic across multiple servers to ensure no single server is overwhelmed.

  • Set up multiple servers to handle incoming traffic

  • Use a load balancer to distribute traffic evenly among servers

  • Monitor server health and adjust load balancing algorithms as needed

Add your answer

Q62. Difference between Spring mvc, spring boot and controller and rest controller, multithreading

Ans.

Spring MVC is a framework for building web applications, Spring Boot is for quickly creating stand-alone applications, and controllers handle requests in Spring MVC while RestController specifically handles RESTful requests.

  • Spring MVC is a framework for building web applications using the Model-View-Controller design pattern.

  • Spring Boot is a tool for quickly creating stand-alone, production-grade Spring-based applications.

  • Controllers in Spring MVC handle incoming requests and...read more

Add your answer

Q63. What do you know about AI?

Ans.

AI stands for Artificial Intelligence, which is the simulation of human intelligence in machines.

  • AI involves the development of intelligent machines that can perform tasks that typically require human intelligence.

  • It encompasses various subfields such as machine learning, natural language processing, computer vision, and robotics.

  • AI is used in various applications like virtual assistants (e.g., Siri), recommendation systems (e.g., Netflix), and autonomous vehicles.

  • Deep learni...read more

Add your answer

Q64. What is SDLC,explain steps in SDLC

Ans.

SDLC stands for Software Development Life Cycle, which is a process used to design, develop, and test software.

  • The steps in SDLC are planning, analysis, design, development, testing, deployment, and maintenance.

  • During planning, the project scope and requirements are defined.

  • Analysis involves gathering and analyzing user requirements.

  • Design involves creating a detailed plan for the software.

  • Development involves coding and building the software.

  • Testing involves verifying that t...read more

Add your answer

Q65. What is identity in Sql.

Ans.

Identity in SQL is a property used to uniquely identify each row in a table.

  • Identity columns are typically used as primary keys in tables

  • They automatically generate unique values for each new row

  • Identity values are often used for referencing and joining tables

Add your answer

Q66. What are the data types

Ans.

Data types are classifications of data that determine the possible values and operations on that data.

  • Data types define the type of data that can be stored in a variable or used in an expression.

  • Common data types include integers, floating-point numbers, characters, booleans, and strings.

  • Examples: int age = 25, float salary = 5000.50, char grade = 'A', bool isTrue = true, string name = 'John'.

View 1 answer

Q67. What is Operating System ?

Ans.

An operating system is a software that manages computer hardware and software resources.

  • It acts as an interface between the user and the computer hardware.

  • It provides services to applications and manages system resources.

  • Examples include Windows, macOS, Linux, Android, iOS.

  • It controls the allocation of memory, processing power, and input/output devices.

  • It provides security and protection to the system and user data.

Add your answer

Q68. what are the four pillars of OOPs

Ans.

The four pillars of OOPs are Abstraction, Encapsulation, Inheritance, and Polymorphism.

  • Abstraction: Hiding implementation details and showing only necessary information.

  • Encapsulation: Binding data and functions together and restricting access to them.

  • Inheritance: Creating new classes from existing ones, inheriting properties and methods.

  • Polymorphism: Ability of objects to take on multiple forms or behaviors.

Add your answer

Q69. software and office equipment are you proficient in using

Ans.

I am proficient in using various software and office equipment.

  • Proficient in using Microsoft Office Suite (Word, Excel, PowerPoint, Outlook)

  • Familiar with project management tools like Trello and Asana

  • Experience with programming languages such as Java and Python

  • Comfortable using printers, scanners, and copiers

  • Adept at troubleshooting technical issues

Add your answer

Q70. Q1) vertical print of tree Q2) find minimum length of tree

Ans.

The interviewee is asked to print a tree vertically and find its minimum length.

  • To print a tree vertically, we can use a recursive approach and traverse the tree in a top-down manner.

  • To find the minimum length of the tree, we can use a similar recursive approach and traverse the tree in a bottom-up manner.

  • We can keep track of the minimum length as we traverse the tree and return it at the end.

Add your answer

Q71. Why Infosys Time management Polymarphirms Sql Oops

Ans.

Infosys is a leading IT company with a strong focus on innovation and customer satisfaction.

  • Infosys has a strong reputation for delivering high-quality software solutions

  • The company places a strong emphasis on time management and project planning

  • Infosys has expertise in a wide range of technologies, including polymorphism, SQL, and OOPs

  • The company offers excellent career growth opportunities and a supportive work environment

Add your answer

Q72. What is the difference between list and tuple

Ans.

List is mutable, tuple is immutable in Python.

  • List can be modified after creation, tuple cannot.

  • List is defined using square brackets [], tuple using parentheses ().

  • List is used for collections of items that may change, tuple for fixed collections.

  • Example: list_example = [1, 2, 3], tuple_example = (4, 5, 6)

Add your answer

Q73. What is Belady's Anomaly ?

Ans.

Belady's Anomaly is a phenomenon where increasing the number of page frames may result in more page faults.

  • Belady's Anomaly occurs in page replacement algorithms.

  • It contradicts the belief that more page frames always lead to fewer page faults.

  • It can be observed in the FIFO page replacement algorithm.

  • Adding more page frames can cause the page fault rate to increase instead of decreasing.

Add your answer

Q74. What is Mutual Exclusion ?

Ans.

Mutual exclusion is a technique used to prevent multiple processes from accessing a shared resource simultaneously.

  • It ensures that only one process can access the shared resource at a time.

  • It is commonly used in multi-threaded programming to prevent race conditions.

  • Examples include the use of locks, semaphores, and monitors.

  • Mutual exclusion can improve program efficiency and prevent data corruption.

  • It is an important concept in concurrent programming.

Add your answer

Q75. How do you configure Ant build file?

Ans.

Ant build file can be configured using XML syntax with various tags and attributes.

  • Create a build.xml file with targets and tasks

  • Use tag to define project properties

  • Use tag to define tasks and dependencies

  • Use tag to define properties

  • Use tag to define custom tasks

  • Use tag to print messages

  • Use tag to compile Java code

  • Use tag to create JAR files

  • Use tag to copy files

  • Use tag to delete files

  • Use tag to create directories

  • Use tag to create ZIP files

  • Use tag to execute extern...read more

Add your answer

Q76. what do you understand by polymorphism?

Ans.

Polymorphism is the ability of a function or method to behave differently based on the object it is acting upon.

  • Polymorphism allows objects of different classes to be treated as objects of a common superclass.

  • There are two types of polymorphism: compile-time (method overloading) and runtime (method overriding).

  • Example of compile-time polymorphism: function overloading in Java.

  • Example of runtime polymorphism: method overriding in Java.

Add your answer

Q77. What is the keyword in python

Ans.

The keyword in Python is a reserved word that has a special meaning and cannot be used as a variable name.

  • Keywords are used to define the syntax and structure of the Python language.

  • Examples of keywords include 'if', 'else', 'while', 'for', 'def', 'class', 'import', 'try', 'except', 'finally', 'and', 'or', 'not', 'in', 'is', 'global', 'lambda', 'return', 'yield', 'assert', 'break', 'continue', 'pass', 'del', 'with', and 'as'.

  • Using a keyword as a variable name will result in a...read more

Add your answer

Q78. Software testing in company

Ans.

Software testing is an essential part of the development process in any company.

  • Testing ensures that the software meets the requirements and functions as expected.

  • It helps to identify and fix bugs and errors before the software is released.

  • Different types of testing such as unit testing, integration testing, and acceptance testing are performed.

  • Automated testing is becoming increasingly popular to save time and improve accuracy.

  • Testing should be done throughout the developmen...read more

Add your answer

Q79. What is Recursion and its program

Ans.

Recursion is a process of calling a function within itself.

  • Recursion is useful for solving problems that can be broken down into smaller sub-problems.

  • It involves a base case and a recursive case.

  • Examples include factorial, Fibonacci sequence, and binary search.

  • Recursion can be memory-intensive and may cause stack overflow errors.

  • Tail recursion optimization can be used to optimize recursive functions.

Add your answer

Q80. Major Project and Describe about any new technology

Ans.

Developed a web-based project management tool using React and Node.js

  • Utilized React for front-end development

  • Implemented Node.js for back-end functionality

  • Incorporated features such as task tracking and user authentication

  • Used MongoDB for database management

Add your answer

Q81. Difference between merge sort and insertion sort

Ans.

Merge sort is a divide and conquer algorithm that divides the input array into two halves, sorts them and then merges them. Insertion sort iterates through the array and inserts each element into its correct position.

  • Merge sort has a time complexity of O(nlogn) while insertion sort has a time complexity of O(n^2)

  • Merge sort is a stable sort while insertion sort is not necessarily stable

  • Merge sort requires additional memory space while insertion sort does not

  • Merge sort is prefe...read more

Add your answer

Q82. What is Starvation ?

Ans.

Starvation is a condition where a process is unable to access necessary resources to continue its execution.

  • Occurs when a process is blocked from accessing resources it needs to continue executing

  • Can lead to decreased performance and even system failure

  • Can be caused by resource allocation algorithms that prioritize certain processes over others

  • Examples include a low-priority process being constantly preempted by higher-priority processes or a process waiting indefinitely for ...read more

Add your answer

Q83. How to create interface in java

Ans.

Interfaces in Java define a contract for classes to implement certain methods and provide a way to achieve abstraction.

  • Interfaces are declared using the 'interface' keyword in Java.

  • All methods in an interface are abstract by default and do not have a method body.

  • Classes can implement interfaces using the 'implements' keyword.

  • Interfaces can be used to achieve multiple inheritance in Java.

  • Example: public interface Shape { double calculateArea(); }

Add your answer

Q84. What is companion object in Scala

Ans.

Companion object is a singleton object with the same name as a class, used to store static methods and properties.

  • Companion object is defined in the same file as the class it is associated with.

  • It can access private members of the class.

  • It can be used to define factory methods.

  • It can be used to define implicit conversions.

  • Example: class Person(name: String) { ... } object Person { def apply(name: String) = new Person(name) }

  • Example: class Celsius(temp: Double) { ... } object ...read more

Add your answer

Q85. Difference between String and StringBuffer?

Ans.

String is immutable, StringBuffer is mutable.

  • String is a sequence of characters that cannot be changed once created.

  • StringBuffer is a mutable sequence of characters that can be modified.

  • StringBuffer is more efficient when concatenating multiple strings.

  • StringBuffer is synchronized, while String is not.

View 1 answer

Q86. How to develop software company

Ans.

Developing a software company involves strategic planning, hiring skilled professionals, creating innovative products, and establishing a strong brand presence.

  • Identify a niche market or problem to solve

  • Build a talented team of software engineers and developers

  • Create innovative and user-friendly software products

  • Establish a strong brand presence through marketing and networking

  • Focus on customer satisfaction and feedback for continuous improvement

Add your answer

Q87. What is Paging ?

Ans.

Paging is a memory management technique used by operating systems to store and retrieve data from secondary storage.

  • Paging divides memory into fixed-size pages.

  • Pages are stored in secondary storage like hard disk.

  • When a process needs a page, it is loaded into memory.

  • If there is no free space in memory, a page is swapped out to secondary storage.

  • Paging reduces fragmentation and allows for larger virtual memory.

  • Examples of operating systems that use paging are Windows, Linux, a...read more

Add your answer

Q88. What is Thrashing ?

Ans.

Thrashing is a phenomenon in which a computer system spends more time in managing its virtual memory than executing actual instructions.

  • It occurs when the system is overburdened with too many processes or too little memory.

  • It leads to a decrease in system performance and response time.

  • It can be resolved by adding more memory or reducing the number of processes.

  • Example: A computer running multiple applications simultaneously may experience thrashing if it does not have enough ...read more

Add your answer

Q89. What us the size of a bit

Ans.

A bit is the smallest unit of digital information. It can have a value of either 0 or 1.

  • A bit is a binary digit, represented as either 0 or 1.

  • It is the basic unit of information used in computing and digital communications.

  • A group of 8 bits is called a byte.

  • The size of a bit is dependent on the architecture of the computer system.

Add your answer

Q90. How many bits are there in C

Ans.

C is a programming language and does not have a fixed number of bits.

  • C is a high-level programming language that can be compiled to run on different architectures with varying bit sizes.

  • The number of bits in C depends on the hardware architecture it is compiled for.

  • For example, C code compiled for a 32-bit architecture will have 32-bit integers, while code compiled for a 64-bit architecture will have 64-bit integers.

Add your answer

Q91. write a program on palindrome

Ans.

A program to check if a given string is a palindrome or not.

  • Remove all non-alphanumeric characters from the string

  • Convert the string to lowercase

  • Reverse the string and compare it with the original string

  • If they are the same, then the string is a palindrome

Add your answer

Q92. How many functions can we invoke

Ans.

The number of functions that can be invoked depends on the programming language and the system's resources.

  • The number of functions that can be invoked is typically limited by the available memory and processing power of the system.

  • In languages like C or C++, the number of functions that can be invoked is limited by the stack size.

  • In languages like Python or JavaScript, the number of functions that can be invoked is limited by the call stack depth.

  • Some programming languages ma...read more

Add your answer

Q93. Tell something about java

Ans.

Java is a high-level, object-oriented programming language used for developing applications and software.

  • Java is platform-independent, meaning it can run on any operating system

  • It is known for its security features, such as the Java Security Manager

  • Java uses a virtual machine (JVM) to execute code

  • It has a vast library of pre-built classes and methods for developers to use

  • Java is used for developing web applications, mobile apps, and enterprise software

Add your answer

Q94. Project Experience & Best Practices followed

Ans.

I have experience working on various projects and following best practices in software development.

  • I have worked on developing web applications using Agile methodology.

  • I have followed version control using Git for tracking changes in code.

  • I have implemented unit testing using JUnit for ensuring code quality.

  • I have used code reviews to improve code readability and maintainability.

  • I have documented code and project requirements for better understanding and future reference.

Add your answer

Q95. What is oops language in C

Ans.

There is no OOP language in C, but C++ is an OOP language that is derived from C.

  • C++ is an extension of C that supports OOP concepts like encapsulation, inheritance, and polymorphism.

  • C++ allows the creation of classes and objects, which are the building blocks of OOP.

  • C++ also supports features like templates, exceptions, and namespaces that make it a powerful language for software development.

Add your answer

Q96. Jvm vs jre, comparable and comparator

Ans.

JVM is the Java Virtual Machine, while JRE is the Java Runtime Environment. Comparable is an interface used for comparing objects, while Comparator is an interface used for custom sorting.

  • JVM is responsible for running Java bytecode, while JRE includes JVM along with libraries and other components necessary for running Java applications.

  • Comparable interface is used to define a natural ordering for a class, while Comparator interface is used to define custom ordering for a cla...read more

Add your answer

Q97. what is object

Ans.

An object is a self-contained entity that consists of both data and behavior.

  • An object is an instance of a class.

  • It encapsulates data and provides methods to manipulate that data.

  • Objects have state, behavior, and identity.

  • For example, a car object can have properties like color and speed, and methods like accelerate and brake.

View 1 answer

Q98. How to sort elements of a BST

Ans.

BST elements can be sorted using in-order traversal

  • Perform in-order traversal of the BST

  • Store the elements in a temporary array

  • Sort the array using any sorting algorithm

  • Replace the elements in the BST with the sorted array

Add your answer

Q99. What is sdlc?

Ans.

SDLC stands for Software Development Life Cycle. It is a process used to design, develop, and maintain software.

  • SDLC is a structured approach to software development.

  • It consists of several phases including requirements gathering, design, coding, testing, and maintenance.

  • Each phase has specific activities and deliverables.

  • SDLC models include Waterfall, Agile, and DevOps.

  • Example: In the requirements gathering phase, the software engineer works with stakeholders to understand th...read more

Add your answer

Q100. Layers in ISO OSI model

Ans.

The ISO OSI model consists of 7 layers that define the functions and protocols of network communication.

  • The layers are: Physical, Data Link, Network, Transport, Session, Presentation, and Application.

  • Each layer has specific responsibilities and interacts with adjacent layers.

  • For example, the Physical layer deals with the physical transmission of data, while the Application layer handles user interfaces and network services.

Add your answer
1
2
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos

Interview Process at Deepaul Technologies

based on 122 interviews
6 Interview rounds
Technical Round
HR Round
Personal Interview1 Round - 1
Aptitude Test Round
Personal Interview1 Round - 2
Personal Interview1 Round - 3
View more
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Software Engineer Interview Questions from Similar Companies

3.8
 • 120 Interview Questions
4.0
 • 45 Interview Questions
4.0
 • 14 Interview Questions
3.2
 • 12 Interview Questions
3.9
 • 11 Interview Questions
3.1
 • 10 Interview Questions
View all
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
70 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter