Add office photos
Premium Employer

Innominds Software

3.3
based on 453 Reviews
Video summary
Filter interviews by

40+ insightsoftware Interview Questions and Answers

Updated 20 Jan 2025
Popular Designations

Q1. (1) write a list comprehension to print a list from 1 to 10 (2) write a program to check if a given positive integer is a power of two (3) create a fibonacci series of 100 using recursive function (4) write a p...

read more
Ans.

A technical interview question for Senior Automation Test Engineer involving list comprehension, power of two, fibonacci series, missing numbers, and character count.

  • Use range() function to generate a list from 1 to 10 in list comprehension

  • Check if the given integer is a power of two by using bitwise AND operator

  • Use recursion to create a fibonacci series of 100

  • Find missing numbers from a list by comparing it with a range of numbers

  • Use a dictionary to count the occurrence of e...read more

View 1 answer

Q2. Python : (1) what is recursion ? Give example ? (2)what are the different data types in python? (3)What is negative indexing in python ? (4) How exception is handled in python ? (5) what is with statement (6) W...

read more
Ans.

Python interview questions covering recursion, data types, exception handling, memory management, and more.

  • Recursion is a function that calls itself. Example: factorial function.

  • Python data types include integers, floats, strings, lists, tuples, and dictionaries.

  • Negative indexing allows you to access elements from the end of a list or string. Example: my_list[-1] returns the last element.

  • Exceptions are handled using try-except blocks. Example: try: some_code except SomeExcept...read more

Add your answer

Q3. What is a generator ? Have you used it in real time?

Ans.

A generator is a function that returns an iterator object. It generates a sequence of values on the fly.

  • Generators are used to create iterators for lazy evaluation of a sequence of values.

  • They are memory efficient as they generate values on the fly instead of storing them in memory.

  • Generators are used in Python for creating infinite sequences, reading large files, and processing data in chunks.

  • Example: def my_generator(): yield 1; yield 2; yield 3; for i in my_generator(): pr...read more

Add your answer

Q4. Print a list of odd index elements from list1 and even index elements from list2 and print the thrid list with the result set of both. list1 = [3,6,9,12,15,18,21] list2 = [4,8,12,16,20,24,28]

Ans.

Print odd index elements from list1 and even index elements from list2 and combine them into a third list.

  • Loop through both lists and use conditional statements to append the elements to the third list.

  • Use the modulo operator to check for odd/even index.

  • Final list should contain [6, 4, 12, 12, 18, 20].

Add your answer
Discover insightsoftware interview dos and don'ts from real experiences

Q5. What is software Test life Cycle and Bug Life cycle?

Ans.

Software Test Life Cycle (STLC) is a sequence of activities carried out to ensure quality in software testing. Bug Life Cycle is a process followed by the testing team to track and manage bugs found during testing.

  • STLC includes planning, designing, executing, and reporting of tests.

  • Bug Life Cycle includes bug identification, reporting, assigning, fixing, retesting, and closing.

  • STLC ensures that the software meets the requirements and is of high quality.

  • Bug Life Cycle ensures ...read more

Add your answer

Q6. Chocolate Distribution Problem

You are given an array/list CHOCOLATES of size 'N', where each element represents the number of chocolates in a packet. Your task is to distribute these chocolates among 'M' stude...read more

Add your answer
Are these interview questions helpful?

Q7. What is pull request in git? how do you commit code ? how do you resolve merge conflicts ?

Ans.

Pull request is a feature in git that allows developers to review and merge code changes.

  • A pull request is created when a developer wants to merge their changes into the main branch

  • Other developers can review the changes and leave comments or suggestions

  • Once the changes are approved, the pull request can be merged into the main branch

  • To commit code, use the 'git commit' command with a message describing the changes made

  • To resolve merge conflicts, use 'git merge' and manually ...read more

Add your answer

Q8. (1) what is chmod 644 example.txt permission ? (2) what is the use of xpath? (3) how will you find an element by xpath and by css in selenium ?

Ans.

Answers to technical questions for Senior Automation Test Engineer position.

  • chmod 644 example.txt permission means the owner has read and write access, while others have only read access.

  • XPath is a language used to locate elements in an XML document or HTML page.

  • To find an element by XPath in Selenium, use the findElement() method with the By.xpath() locator. For example: driver.findElement(By.xpath("//input[@id='username']"));

  • To find an element by CSS in Selenium, use the fi...read more

Add your answer
Share interview questions and help millions of jobseekers 🌟

Q9. What is a lambda function? Give a example

Ans.

A lambda function is a small anonymous function that can take any number of arguments and return a single value.

  • Lambda functions are also known as anonymous functions or closures.

  • They are often used as arguments for higher-order functions, such as map, filter, and reduce.

  • Example: lambda x: x**2 defines a lambda function that takes one argument and returns its square.

Add your answer

Q10. write a python program to print the repititve characters in a list which should exclude integers input = ['a','a',4,4,'b','c','a'] output = {'a':3}

Ans.

Python program to print repetitive characters in a list excluding integers

  • Use a dictionary to store the count of each character

  • Iterate through the list and check if the character is a string and not an integer

  • Print the characters with count greater than 1

Add your answer

Q11. What is a Blue Screen of Death (BSOD) error, and how can it be resolved?

Ans.

BSOD is a Windows error screen displayed when the system encounters a critical error that it cannot recover from.

  • BSOD is commonly caused by hardware failures, driver issues, or software conflicts.

  • To resolve BSOD errors, one can try restarting the computer, updating drivers, running system diagnostics, or performing a system restore.

  • Examples of BSOD errors include 'IRQL_NOT_LESS_OR_EQUAL' and 'KERNEL_SECURITY_CHECK_FAILURE'.

Add your answer

Q12. What are DNS and DHCP, and what are their respective port numbers?

Ans.

DNS (Domain Name System) is a system that translates domain names to IP addresses, while DHCP (Dynamic Host Configuration Protocol) assigns IP addresses to devices on a network.

  • DNS resolves domain names to IP addresses, allowing users to access websites using human-readable names (e.g. www.google.com)

  • DHCP dynamically assigns IP addresses to devices on a network, simplifying network administration and reducing the risk of IP address conflicts

  • DNS typically uses port 53 for both...read more

Add your answer

Q13. What is Active Directory, and how is it used in network management?

Ans.

Active Directory is a directory service developed by Microsoft for Windows domain networks.

  • Centralized database for managing network resources

  • Stores information about users, computers, and other network objects

  • Enables administrators to assign policies, deploy software, and apply updates across the network

  • Facilitates single sign-on for users to access various resources within the network

  • Supports group policies for controlling user access and permissions

Add your answer

Q14. What does SLA stand for in ServiceNow, and what is its significance?

Ans.

SLA stands for Service Level Agreement in ServiceNow, defining agreed upon levels of service between provider and customer.

  • SLA in ServiceNow sets expectations for response and resolution times for incidents and requests

  • It helps in measuring and improving service performance

  • SLAs can be customized based on the criticality of services or customers

  • Example: SLA for critical incidents may require a response within 1 hour and resolution within 4 hours

Add your answer

Q15. What do the priorities P1, P2, and P3 represent in ticketing tools?

Ans.

P1, P2, and P3 represent the priorities assigned to tickets in ticketing tools.

  • P1 represents the highest priority level, usually for critical issues that require immediate attention.

  • P2 represents a medium priority level, for issues that need to be resolved in a timely manner but are not critical.

  • P3 represents the lowest priority level, for minor issues or requests that can be addressed when time permits.

Add your answer

Q16. What are the different licenses available for Office 365?

Ans.

Office 365 offers different licenses including Business, Enterprise, Education, and Government plans.

  • Business plans include Business Basic, Business Standard, and Business Premium

  • Enterprise plans include E1, E3, and E5

  • Education plans include A1, A3, and A5

  • Government plans include G1, G3, and G5

Add your answer

Q17. What is patch management in relation to Windows Server?

Ans.

Patch management in Windows Server involves regularly applying updates and patches to ensure system security and stability.

  • Regularly applying updates and patches to Windows Server to address security vulnerabilities

  • Testing patches in a non-production environment before deploying to production servers

  • Automating patch deployment using tools like WSUS or SCCM

  • Creating a patch management policy to define procedures for patching servers

  • Monitoring patch compliance and ensuring all s...read more

Add your answer

Q18. What are incident management and change management?

Ans.

Incident management involves responding to and resolving unplanned events that disrupt IT services. Change management is the process of controlling changes to IT systems.

  • Incident management focuses on restoring normal service operation as quickly as possible.

  • Change management ensures that changes to IT systems are implemented in a controlled and coordinated manner.

  • Examples of incidents include server crashes, network outages, and software failures.

  • Examples of changes include ...read more

Add your answer

Q19. How to Configure Outlook manually how to take data backup.

Ans.

Manually configure Outlook for data backup by setting up a PST file.

  • Open Outlook and go to File > Account Settings > Account Settings.

  • Click on the Data Files tab and then Add to create a new PST file.

  • Choose a location to save the PST file and set a name for it.

  • Select the folders you want to backup by dragging them into the new PST file.

  • Regularly export the PST file to ensure data backup is up to date.

Add your answer

Q20. What are the different classes of IP addresses?

Ans.

There are five classes of IP addresses: A, B, C, D, and E.

  • Class A: Used for large networks, with the first octet being the network portion and the remaining three octets being the host portion. Example: 10.0.0.0

  • Class B: Used for medium-sized networks, with the first two octets being the network portion and the remaining two octets being the host portion. Example: 172.16.0.0

  • Class C: Used for small networks, with the first three octets being the network portion and the last oct...read more

Add your answer
Q21. Can you explain method overriding in Python?
Add your answer
Q22. What is the difference between SOAP and REST in the context of Web API services?
Add your answer
Q23. Can you explain the architecture of Django?
Add your answer
Q24. What is the difference between JSON and XML?
Add your answer
Q25. Can you explain the difference between mutable and immutable objects in Python?
Add your answer

Q26. 1) How to prevent DDOS attack in AWS ? 2)How autoscaling is done in Kafka, PostgresSQl, Kubernetes? 3) What is the difference between IAM group and IAM role ? 4) Design Spotify? 5) How to build a queue using st...

read more
Add your answer

Q27. 1. Java vs Python 2. Normalizations 3. Why mongodb 4. Program to reverese linkedlist (just the idea) 5. Cloud Computing

Ans.

Interview questions for Big Data Engineer role

  • Java and Python are both popular programming languages for Big Data processing, but Java is preferred for its performance and scalability

  • Normalization is the process of organizing data in a database to reduce redundancy and improve data integrity

  • MongoDB is a NoSQL database that is highly scalable and flexible, making it a good choice for Big Data applications

  • To reverse a linked list, iterate through the list and change the directi...read more

Add your answer

Q28. C++ code to find an element in an array using binary search tree

Ans.

C++ code for binary search in an array of strings

  • Sort the array of strings in lexicographical order

  • Set the lower and upper bounds of the search range

  • Calculate the middle index and compare the search string with the middle element

  • If the search string is less than the middle element, update the upper bound

  • If the search string is greater than the middle element, update the lower bound

  • Repeat until the search string is found or the search range is exhausted

Add your answer
Q29. What are the differences between Django and Flask?
Add your answer

Q30. Write a query on left join

Ans.

A left join returns all records from the left table and matching records from the right table.

  • Use the LEFT JOIN keyword followed by the ON clause to specify the join condition.

  • The left table is always the one before the LEFT JOIN keyword.

  • If there is no match in the right table, NULL values are returned for the right table columns.

Add your answer

Q31. reverse a linked list string manupliations

Ans.

Reverse a linked list

  • Iteratively or recursively traverse the linked list

  • Reverse the pointers of each node to point to the previous node

  • Update the head of the linked list to the last node

Add your answer

Q32. What is purpose of Audioflinger

Ans.

Audioflinger is a part of the Android system that manages audio input and output streams.

  • Audioflinger handles audio routing, mixing, and processing in Android devices.

  • It manages audio focus and volume control for different apps and system components.

  • Developers can interact with Audioflinger through the AudioTrack and AudioRecord classes in Android.

Add your answer

Q33. What is thread and concurrency

Ans.

Threads are lightweight processes within a program that can run concurrently, allowing for parallel execution of tasks.

  • Threads are independent sequences of execution within a program.

  • Concurrency refers to multiple threads running simultaneously.

  • Threads share the same memory space, allowing for communication and synchronization.

  • Example: A web server handling multiple client requests concurrently using threads.

Add your answer

Q34. How to handle fault tolerence

Ans.

Fault tolerance can be achieved by implementing redundancy, monitoring systems for failures, and implementing failover mechanisms.

  • Implement redundancy in critical systems to ensure that if one component fails, another can take over.

  • Regularly monitor systems for failures and implement automated alerts for immediate response.

  • Implement failover mechanisms such as load balancing and clustering to ensure continuous operation in case of failure.

  • Regularly test and update disaster re...read more

Add your answer

Q35. What is the use of ipc

Ans.

IPC (Inter-Process Communication) is used for communication between different processes or applications running on the same or different devices.

  • IPC allows processes to communicate and share data with each other.

  • It can be used for passing messages, sharing files, or synchronizing processes.

  • Examples of IPC mechanisms include sockets, shared memory, and message queues.

Add your answer

Q36. What are stratergies of mobile testing

Add your answer

Q37. Types of memory are in JVM

Ans.

Types of memory in JVM include heap memory, stack memory, and non-heap memory.

  • Heap memory is where objects are stored and is divided into Young Generation, Old Generation, and Permanent Generation.

  • Stack memory is used for storing local variables and method call information.

  • Non-heap memory includes Metaspace (replacing Permanent Generation) and Code Cache.

  • Examples: Young Generation, Old Generation, Metaspace

Add your answer

Q38. reverse of string

Ans.

Function to reverse a given string.

  • Create a function that takes a string as input.

  • Use built-in functions like reverse() or loop through the string to reverse it.

  • Return the reversed string.

Add your answer

Q39. What is android audio

Ans.

Android audio refers to the functionality and capabilities of the Android operating system related to sound and music playback.

  • Android audio includes features such as playing music, making phone calls, and receiving notifications.

  • Developers can use APIs like MediaPlayer and AudioManager to control audio playback in their apps.

  • Android supports various audio formats like MP3, AAC, and WAV.

  • Audio focus is an important concept in Android audio, allowing apps to request and release...read more

Add your answer

Q40. AWS services used in your project

Ans.

The project utilized AWS services such as EC2, S3, and RDS for hosting, storage, and database functionalities.

  • EC2 for hosting the application

  • S3 for storing files and data

  • RDS for managing the database

Add your answer

Q41. 2. Simple Project in React

Ans.

A simple project in React

  • Create a basic React app using create-react-app

  • Add components and props to display data

  • Use state and lifecycle methods to update and manage data

  • Implement routing using React Router

  • Integrate with APIs to fetch and display data

  • Style components using CSS or a CSS framework like Bootstrap

Add your answer

Q42. C++ code to reverse a string

Ans.

C++ code to reverse a string

  • Create a character array of the same length as the string

  • Loop through the string and copy each character to the array in reverse order

  • Add a null terminator at the end of the array to make it a valid string

Add your answer

Q43. What is bootloader

Ans.

Bootloader is a program that loads the operating system into the computer's memory during the boot-up process.

  • Bootloader is the first piece of software that runs when a device is powered on.

  • It initializes the hardware and loads the operating system into memory.

  • Bootloaders are specific to each device and are usually locked to prevent unauthorized modifications.

  • Examples of bootloaders include GRUB for Linux systems and U-Boot for embedded devices.

Add your answer

Q44. What is virtual Dom

Add your answer
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos

Interview Process at insightsoftware

based on 29 interviews
Interview experience
3.7
Good
View more
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Interview Questions from Similar Companies

3.4
 • 649 Interview Questions
4.0
 • 471 Interview Questions
3.6
 • 338 Interview Questions
3.8
 • 299 Interview Questions
3.9
 • 197 Interview Questions
4.3
 • 138 Interview Questions
View all
Top Innominds Software Interview Questions And Answers
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
70 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter