Innominds Software
40+ insightsoftware Interview Questions and Answers
Q1. (1) write a list comprehension to print a list from 1 to 10 (2) write a program to check if a given positive integer is a power of two (3) create a fibonacci series of 100 using recursive function (4) write a p...
read moreA technical interview question for Senior Automation Test Engineer involving list comprehension, power of two, fibonacci series, missing numbers, and character count.
Use range() function to generate a list from 1 to 10 in list comprehension
Check if the given integer is a power of two by using bitwise AND operator
Use recursion to create a fibonacci series of 100
Find missing numbers from a list by comparing it with a range of numbers
Use a dictionary to count the occurrence of e...read more
Q2. Python : (1) what is recursion ? Give example ? (2)what are the different data types in python? (3)What is negative indexing in python ? (4) How exception is handled in python ? (5) what is with statement (6) W...
read morePython interview questions covering recursion, data types, exception handling, memory management, and more.
Recursion is a function that calls itself. Example: factorial function.
Python data types include integers, floats, strings, lists, tuples, and dictionaries.
Negative indexing allows you to access elements from the end of a list or string. Example: my_list[-1] returns the last element.
Exceptions are handled using try-except blocks. Example: try: some_code except SomeExcept...read more
Q3. What is a generator ? Have you used it in real time?
A generator is a function that returns an iterator object. It generates a sequence of values on the fly.
Generators are used to create iterators for lazy evaluation of a sequence of values.
They are memory efficient as they generate values on the fly instead of storing them in memory.
Generators are used in Python for creating infinite sequences, reading large files, and processing data in chunks.
Example: def my_generator(): yield 1; yield 2; yield 3; for i in my_generator(): pr...read more
Q4. Print a list of odd index elements from list1 and even index elements from list2 and print the thrid list with the result set of both. list1 = [3,6,9,12,15,18,21] list2 = [4,8,12,16,20,24,28]
Print odd index elements from list1 and even index elements from list2 and combine them into a third list.
Loop through both lists and use conditional statements to append the elements to the third list.
Use the modulo operator to check for odd/even index.
Final list should contain [6, 4, 12, 12, 18, 20].
Q5. What is software Test life Cycle and Bug Life cycle?
Software Test Life Cycle (STLC) is a sequence of activities carried out to ensure quality in software testing. Bug Life Cycle is a process followed by the testing team to track and manage bugs found during testing.
STLC includes planning, designing, executing, and reporting of tests.
Bug Life Cycle includes bug identification, reporting, assigning, fixing, retesting, and closing.
STLC ensures that the software meets the requirements and is of high quality.
Bug Life Cycle ensures ...read more
Q6. Chocolate Distribution Problem
You are given an array/list CHOCOLATES
of size 'N', where each element represents the number of chocolates in a packet. Your task is to distribute these chocolates among 'M' stude...read more
Q7. What is pull request in git? how do you commit code ? how do you resolve merge conflicts ?
Pull request is a feature in git that allows developers to review and merge code changes.
A pull request is created when a developer wants to merge their changes into the main branch
Other developers can review the changes and leave comments or suggestions
Once the changes are approved, the pull request can be merged into the main branch
To commit code, use the 'git commit' command with a message describing the changes made
To resolve merge conflicts, use 'git merge' and manually ...read more
Q8. (1) what is chmod 644 example.txt permission ? (2) what is the use of xpath? (3) how will you find an element by xpath and by css in selenium ?
Answers to technical questions for Senior Automation Test Engineer position.
chmod 644 example.txt permission means the owner has read and write access, while others have only read access.
XPath is a language used to locate elements in an XML document or HTML page.
To find an element by XPath in Selenium, use the findElement() method with the By.xpath() locator. For example: driver.findElement(By.xpath("//input[@id='username']"));
To find an element by CSS in Selenium, use the fi...read more
Q9. What is a lambda function? Give a example
A lambda function is a small anonymous function that can take any number of arguments and return a single value.
Lambda functions are also known as anonymous functions or closures.
They are often used as arguments for higher-order functions, such as map, filter, and reduce.
Example: lambda x: x**2 defines a lambda function that takes one argument and returns its square.
Q10. write a python program to print the repititve characters in a list which should exclude integers input = ['a','a',4,4,'b','c','a'] output = {'a':3}
Python program to print repetitive characters in a list excluding integers
Use a dictionary to store the count of each character
Iterate through the list and check if the character is a string and not an integer
Print the characters with count greater than 1
Q11. What is a Blue Screen of Death (BSOD) error, and how can it be resolved?
BSOD is a Windows error screen displayed when the system encounters a critical error that it cannot recover from.
BSOD is commonly caused by hardware failures, driver issues, or software conflicts.
To resolve BSOD errors, one can try restarting the computer, updating drivers, running system diagnostics, or performing a system restore.
Examples of BSOD errors include 'IRQL_NOT_LESS_OR_EQUAL' and 'KERNEL_SECURITY_CHECK_FAILURE'.
Q12. What are DNS and DHCP, and what are their respective port numbers?
DNS (Domain Name System) is a system that translates domain names to IP addresses, while DHCP (Dynamic Host Configuration Protocol) assigns IP addresses to devices on a network.
DNS resolves domain names to IP addresses, allowing users to access websites using human-readable names (e.g. www.google.com)
DHCP dynamically assigns IP addresses to devices on a network, simplifying network administration and reducing the risk of IP address conflicts
DNS typically uses port 53 for both...read more
Q13. What is Active Directory, and how is it used in network management?
Active Directory is a directory service developed by Microsoft for Windows domain networks.
Centralized database for managing network resources
Stores information about users, computers, and other network objects
Enables administrators to assign policies, deploy software, and apply updates across the network
Facilitates single sign-on for users to access various resources within the network
Supports group policies for controlling user access and permissions
Q14. What does SLA stand for in ServiceNow, and what is its significance?
SLA stands for Service Level Agreement in ServiceNow, defining agreed upon levels of service between provider and customer.
SLA in ServiceNow sets expectations for response and resolution times for incidents and requests
It helps in measuring and improving service performance
SLAs can be customized based on the criticality of services or customers
Example: SLA for critical incidents may require a response within 1 hour and resolution within 4 hours
Q15. What do the priorities P1, P2, and P3 represent in ticketing tools?
P1, P2, and P3 represent the priorities assigned to tickets in ticketing tools.
P1 represents the highest priority level, usually for critical issues that require immediate attention.
P2 represents a medium priority level, for issues that need to be resolved in a timely manner but are not critical.
P3 represents the lowest priority level, for minor issues or requests that can be addressed when time permits.
Q16. What are the different licenses available for Office 365?
Office 365 offers different licenses including Business, Enterprise, Education, and Government plans.
Business plans include Business Basic, Business Standard, and Business Premium
Enterprise plans include E1, E3, and E5
Education plans include A1, A3, and A5
Government plans include G1, G3, and G5
Q17. What is patch management in relation to Windows Server?
Patch management in Windows Server involves regularly applying updates and patches to ensure system security and stability.
Regularly applying updates and patches to Windows Server to address security vulnerabilities
Testing patches in a non-production environment before deploying to production servers
Automating patch deployment using tools like WSUS or SCCM
Creating a patch management policy to define procedures for patching servers
Monitoring patch compliance and ensuring all s...read more
Q18. What are incident management and change management?
Incident management involves responding to and resolving unplanned events that disrupt IT services. Change management is the process of controlling changes to IT systems.
Incident management focuses on restoring normal service operation as quickly as possible.
Change management ensures that changes to IT systems are implemented in a controlled and coordinated manner.
Examples of incidents include server crashes, network outages, and software failures.
Examples of changes include ...read more
Q19. How to Configure Outlook manually how to take data backup.
Manually configure Outlook for data backup by setting up a PST file.
Open Outlook and go to File > Account Settings > Account Settings.
Click on the Data Files tab and then Add to create a new PST file.
Choose a location to save the PST file and set a name for it.
Select the folders you want to backup by dragging them into the new PST file.
Regularly export the PST file to ensure data backup is up to date.
Q20. What are the different classes of IP addresses?
There are five classes of IP addresses: A, B, C, D, and E.
Class A: Used for large networks, with the first octet being the network portion and the remaining three octets being the host portion. Example: 10.0.0.0
Class B: Used for medium-sized networks, with the first two octets being the network portion and the remaining two octets being the host portion. Example: 172.16.0.0
Class C: Used for small networks, with the first three octets being the network portion and the last oct...read more
Q26. 1) How to prevent DDOS attack in AWS ? 2)How autoscaling is done in Kafka, PostgresSQl, Kubernetes? 3) What is the difference between IAM group and IAM role ? 4) Design Spotify? 5) How to build a queue using st...
read moreQ27. 1. Java vs Python 2. Normalizations 3. Why mongodb 4. Program to reverese linkedlist (just the idea) 5. Cloud Computing
Interview questions for Big Data Engineer role
Java and Python are both popular programming languages for Big Data processing, but Java is preferred for its performance and scalability
Normalization is the process of organizing data in a database to reduce redundancy and improve data integrity
MongoDB is a NoSQL database that is highly scalable and flexible, making it a good choice for Big Data applications
To reverse a linked list, iterate through the list and change the directi...read more
Q28. C++ code to find an element in an array using binary search tree
C++ code for binary search in an array of strings
Sort the array of strings in lexicographical order
Set the lower and upper bounds of the search range
Calculate the middle index and compare the search string with the middle element
If the search string is less than the middle element, update the upper bound
If the search string is greater than the middle element, update the lower bound
Repeat until the search string is found or the search range is exhausted
Q30. Write a query on left join
A left join returns all records from the left table and matching records from the right table.
Use the LEFT JOIN keyword followed by the ON clause to specify the join condition.
The left table is always the one before the LEFT JOIN keyword.
If there is no match in the right table, NULL values are returned for the right table columns.
Q31. reverse a linked list string manupliations
Reverse a linked list
Iteratively or recursively traverse the linked list
Reverse the pointers of each node to point to the previous node
Update the head of the linked list to the last node
Q32. What is purpose of Audioflinger
Audioflinger is a part of the Android system that manages audio input and output streams.
Audioflinger handles audio routing, mixing, and processing in Android devices.
It manages audio focus and volume control for different apps and system components.
Developers can interact with Audioflinger through the AudioTrack and AudioRecord classes in Android.
Q33. What is thread and concurrency
Threads are lightweight processes within a program that can run concurrently, allowing for parallel execution of tasks.
Threads are independent sequences of execution within a program.
Concurrency refers to multiple threads running simultaneously.
Threads share the same memory space, allowing for communication and synchronization.
Example: A web server handling multiple client requests concurrently using threads.
Q34. How to handle fault tolerence
Fault tolerance can be achieved by implementing redundancy, monitoring systems for failures, and implementing failover mechanisms.
Implement redundancy in critical systems to ensure that if one component fails, another can take over.
Regularly monitor systems for failures and implement automated alerts for immediate response.
Implement failover mechanisms such as load balancing and clustering to ensure continuous operation in case of failure.
Regularly test and update disaster re...read more
Q35. What is the use of ipc
IPC (Inter-Process Communication) is used for communication between different processes or applications running on the same or different devices.
IPC allows processes to communicate and share data with each other.
It can be used for passing messages, sharing files, or synchronizing processes.
Examples of IPC mechanisms include sockets, shared memory, and message queues.
Q36. What are stratergies of mobile testing
Q37. Types of memory are in JVM
Types of memory in JVM include heap memory, stack memory, and non-heap memory.
Heap memory is where objects are stored and is divided into Young Generation, Old Generation, and Permanent Generation.
Stack memory is used for storing local variables and method call information.
Non-heap memory includes Metaspace (replacing Permanent Generation) and Code Cache.
Examples: Young Generation, Old Generation, Metaspace
Q38. reverse of string
Function to reverse a given string.
Create a function that takes a string as input.
Use built-in functions like reverse() or loop through the string to reverse it.
Return the reversed string.
Q39. What is android audio
Android audio refers to the functionality and capabilities of the Android operating system related to sound and music playback.
Android audio includes features such as playing music, making phone calls, and receiving notifications.
Developers can use APIs like MediaPlayer and AudioManager to control audio playback in their apps.
Android supports various audio formats like MP3, AAC, and WAV.
Audio focus is an important concept in Android audio, allowing apps to request and release...read more
Q40. AWS services used in your project
The project utilized AWS services such as EC2, S3, and RDS for hosting, storage, and database functionalities.
EC2 for hosting the application
S3 for storing files and data
RDS for managing the database
Q41. 2. Simple Project in React
A simple project in React
Create a basic React app using create-react-app
Add components and props to display data
Use state and lifecycle methods to update and manage data
Implement routing using React Router
Integrate with APIs to fetch and display data
Style components using CSS or a CSS framework like Bootstrap
Q42. C++ code to reverse a string
C++ code to reverse a string
Create a character array of the same length as the string
Loop through the string and copy each character to the array in reverse order
Add a null terminator at the end of the array to make it a valid string
Q43. What is bootloader
Bootloader is a program that loads the operating system into the computer's memory during the boot-up process.
Bootloader is the first piece of software that runs when a device is powered on.
It initializes the hardware and loads the operating system into memory.
Bootloaders are specific to each device and are usually locked to prevent unauthorized modifications.
Examples of bootloaders include GRUB for Linux systems and U-Boot for embedded devices.
Q44. What is virtual Dom
Interview Process at insightsoftware
Top Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month