LTIMindtree
200+ Cerence Interview Questions and Answers
Q101. How Hashset works internally
HashSet is an unordered collection that uses hashing to store and retrieve elements efficiently.
HashSet internally uses a HashMap to store its elements.
Each element is stored as a key in the HashMap with a fixed value.
When adding an element, its hash code is calculated and used to determine the bucket in the HashMap where it will be stored.
If multiple elements have the same hash code, they are stored in the same bucket as a linked list.
To retrieve an element, its hash code is...read more
Q102. Tell me what ways you improve performance of report?
Performance of reports can be improved by optimizing queries, reducing data volume, using efficient visuals, and caching data.
Optimize queries by removing unnecessary columns and filters
Reduce data volume by aggregating data at the source or using incremental refresh
Use efficient visuals like matrix instead of tables for large datasets
Cache data to reduce query times for frequently accessed data
Q103. What is SQL
SQL is a programming language used to manage and manipulate relational databases.
SQL stands for Structured Query Language
It is used to create, modify, and query databases
Common commands include SELECT, INSERT, UPDATE, and DELETE
Examples of database management systems that use SQL include MySQL, Oracle, and Microsoft SQL Server
Q104. What is schema
Schema is a blueprint or structure that defines the organization of data in a database.
Schema is used to define the structure of a database.
It includes information about tables, columns, data types, relationships, and constraints.
It helps ensure data consistency and integrity.
Examples of schema include SQL Server, Oracle, and MySQL.
Schema can also refer to the organization of data in XML or JSON documents.
Q105. Write a program to write all prime numbers in the given range.
Program to print all prime numbers in a given range.
Take input for the range of numbers
Loop through the range and check if each number is prime
If a number is prime, print it
A number is prime if it is only divisible by 1 and itself
Q106. What does LtiMindtree do?
LtiMindtree is a global technology consulting and services company.
Provides IT consulting, digital transformation, and technology services
Offers solutions in areas such as cloud computing, data analytics, and artificial intelligence
Works with clients across various industries including banking, healthcare, and retail
Q107. what is closuer? is normal function call as closuer or not
A closure is a function that has access to its own scope, as well as the scope in which it was defined.
A closure allows a function to access variables from its outer function even after the outer function has finished executing.
Closures are created whenever a function is defined within another function.
Example: function outerFunction() { let outerVar = 'I am outer'; return function innerFunction() { console.log(outerVar); }; }
Q108. Features of OOPS
OOPS is a programming paradigm that focuses on objects and their interactions.
Encapsulation: bundling of data and methods that operate on that data
Inheritance: ability of a class to inherit properties and methods from a parent class
Polymorphism: ability of objects to take on multiple forms or behaviors
Abstraction: hiding of complex implementation details from the user
Examples: Java, C++, Python
Q109. What is multiple inheritance
Multiple inheritance is a feature in object-oriented programming where a class can inherit attributes and methods from more than one parent class.
Allows a class to inherit attributes and methods from multiple parent classes
Can lead to the diamond problem where ambiguity arises if two parent classes have a method with the same name
Languages like C++ support multiple inheritance
Q110. Tell me abt ltimindtree
Mindtree is a global technology consulting and services company, specializing in IT services and digital transformation.
Founded in 1999 in Bangalore, India
Provides services in application development, maintenance, infrastructure management, and testing
Acquired by L&T (Larsen & Toubro) in 2019
Has offices in multiple countries including the USA, UK, and India
Q111. Cut one cake into 8 pieces with 3 slices
Cut the cake into 8 pieces by making 3 slices, creating 8 equal-sized slices.
Make two vertical cuts to divide the cake into 4 equal quarters.
Then make one horizontal cut through the middle of the cake to create 8 equal-sized slices.
Each slice will be a triangular piece of cake.
Q112. Time and space complexity of merge sort.
Merge sort has a time complexity of O(n log n) and a space complexity of O(n).
Time complexity of merge sort is O(n log n) where n is the number of elements in the array.
Space complexity of merge sort is O(n) as it requires additional space to store the temporary arrays during the merging process.
Merge sort is a divide and conquer algorithm that recursively divides the array into halves until each subarray contains only one element, then merges them in sorted order.
Q113. What is HTML, and what purposes does it serve?
HTML is a markup language used for creating and structuring web pages.
HTML stands for HyperText Markup Language.
It is used to create the structure and content of web pages.
HTML uses tags to define elements such as headings, paragraphs, images, links, and more.
Example: <h1>This is a heading</h1>
Example: <p>This is a paragraph</p>
HTML documents are saved with a .html file extension.
Q114. Difference between extract and live connection
Extract connection imports data into Tableau while live connection directly connects to the data source.
Extract connection creates a static snapshot of data while live connection accesses real-time data from the source.
Extract connection is useful for large datasets or when offline access is needed.
Live connection is beneficial for real-time analysis and when data needs to be updated frequently.
Examples: Extract connection - importing a CSV file into Tableau. Live connection ...read more
Q115. gave code class A { int i = 10; } class B extends A { int i = 20; } public class test{ public static void main (String [] args) { A a = new B(); System.out.println(a.i): } }
The code will output 10 because the variable i is accessed through a reference of class A.
When a subclass object is assigned to a superclass reference, the superclass reference can only access the superclass members.
In this case, even though the object is of class B, the variable i is accessed from class A.
Output: 10
Q116. What are Java Data types?
Java data types are classifications of data items that determine the kind of values they can hold.
Java has two categories of data types: primitive data types and reference data types.
Primitive data types include int, double, char, boolean, etc.
Reference data types include classes, interfaces, arrays, etc.
Example: int num = 10; String name = "John";
Q117. What is Data Science?
Data Science is a field that uses scientific methods, algorithms, and systems to extract knowledge and insights from structured and unstructured data.
Data Science involves collecting, cleaning, analyzing, and interpreting large amounts of data to make informed decisions.
It combines statistics, machine learning, and domain knowledge to uncover patterns and trends in data.
Examples include predicting customer behavior based on past purchases, analyzing medical records to improve...read more
Q118. Write a java proram to check if a given string is a palindrome
A Java program to check if a given string is a palindrome.
Create a function that takes a string as input.
Use two pointers, one starting from the beginning and one from the end, to compare characters.
If all characters match, the string is a palindrome.
Example: 'racecar' is a palindrome, 'hello' is not.
Q119. Write a code in Java, explain the concept of a class, using example of a fruit class
Explanation of a class in Java using a fruit class example
A class in Java is a blueprint for creating objects. It defines the properties and behaviors of objects.
In the case of a fruit class, properties could include name, color, and taste, while behaviors could include methods like ripen() and rot().
Example: class Fruit { String name; String color; String taste; void ripen() { //code to ripen fruit } void rot() { //code to rot fruit }}
Q120. What is dsa, explain knapsack
DSA stands for Data Structures and Algorithms. Knapsack is a problem in combinatorial optimization.
DSA is a field of study that involves the design and analysis of data structures and algorithms.
Knapsack problem involves maximizing the value of items in a knapsack without exceeding its capacity.
There are two types of knapsack problems: 0/1 knapsack (where items cannot be broken) and fractional knapsack (where items can be broken).
Q121. What are String Tokenizers
String tokenizers are tools used to break a string into smaller parts based on a specified delimiter.
String tokenizers are commonly used in programming to parse strings and extract relevant information.
They can be used to split a sentence into individual words, or to extract specific data from a structured text.
For example, in Java, the StringTokenizer class can be used to break a string into tokens based on a specified delimiter.
Q122. What is cross site scripting
Cross site scripting (XSS) is a type of security vulnerability typically found in web applications where malicious scripts are injected into trusted websites.
XSS allows attackers to execute scripts in the victim's browser, potentially stealing sensitive information or altering the website's content.
There are three main types of XSS: stored XSS, reflected XSS, and DOM-based XSS.
Preventing XSS involves input validation, output encoding, and implementing Content Security Policy ...read more
Q123. why linux is preferred instead of windows OS in IT high security system?
Linux is preferred over Windows in high security systems due to its open-source nature, strong security features, and minimal attack surface.
Linux is open-source, allowing for greater transparency and customization to meet security needs.
Linux has a strong permission system, making it easier to control access to sensitive data and resources.
Linux has a smaller attack surface compared to Windows, reducing the risk of vulnerabilities being exploited.
Linux distributions like Cen...read more
Q124. What programming languages are you familiar with?
I am familiar with Java, Python, C++, and JavaScript.
Java
Python
C++
JavaScript
Q125. What are some commands commonly used in MySQL?
Some commonly used commands in MySQL include SELECT, INSERT, UPDATE, DELETE, and JOIN.
SELECT: Used to retrieve data from a database table
INSERT: Used to add new records to a table
UPDATE: Used to modify existing records in a table
DELETE: Used to remove records from a table
JOIN: Used to combine rows from two or more tables based on a related column
Q126. What is the process for creating a table in MySQL?
Creating a table in MySQL involves using the CREATE TABLE statement with specified columns and data types.
Use the CREATE TABLE statement followed by the table name
List the columns along with their data types and any constraints
Specify the primary key if needed
Example: CREATE TABLE employees (id INT PRIMARY KEY, name VARCHAR(50), age INT)
Q127. Difference between C and Cpp
C is a procedural programming language while C++ is an object-oriented programming language.
C is a subset of C++.
C does not support classes and objects, while C++ does.
C++ supports function overloading and operator overloading, which C does not.
C++ has a more complex syntax compared to C.
C++ has a standard template library (STL) for data structures and algorithms, which C does not have.
Q128. what is struct and unions
Structs and unions are data structures in C programming used to group different data types under a single name.
Structs allow you to group different data types together under a single name. For example, a struct 'Person' can have fields like name, age, and gender.
Unions are similar to structs but they share the same memory location for all its members. Only one member can contain a value at a time. For example, a union 'Data' can have fields like int, float, and char, but only...read more
Q129. Prime numbers in a range
Finding prime numbers within a given range.
A prime number is a number that is only divisible by 1 and itself.
Start with the first number in the range and check if it is prime.
If it is prime, add it to the list of prime numbers.
If it is not prime, move on to the next number.
Repeat until all numbers in the range have been checked.
Examples: Prime numbers between 1 and 10 are 2, 3, 5, and 7.
Examples: Prime numbers between 20 and 30 are 23 and 29.
Q130. Asci value along with alphabets(both capital and small)
The ASCII value is a numerical representation of a character. It includes both capital and small alphabets.
ASCII values range from 65 to 90 for capital letters A to Z.
ASCII values range from 97 to 122 for small letters a to z.
For example, the ASCII value of 'A' is 65 and the ASCII value of 'a' is 97.
Q131. What is star schema and snowflake schema?
Star schema is a data warehouse schema where a central fact table is connected to multiple dimension tables. Snowflake schema is a normalized form of star schema.
Star schema consists of a central fact table connected to multiple dimension tables
Snowflake schema is a normalized form of star schema where dimension tables are further normalized into sub-dimension tables
Star schema is denormalized for faster query performance, while snowflake schema is normalized for easier maint...read more
Q132. What is CALCULATED function and how it works?
CALCULATED function is used in Power BI to create custom calculations based on existing data in a report.
CALCULATED function is used to create custom calculations in DAX (Data Analysis Expressions) language.
It allows users to define complex calculations based on existing data in the report.
CALCULATED function can be used with other DAX functions to perform calculations like aggregations, comparisons, and conditional logic.
Example: CALCULATED column can be used to calculate pr...read more
Q133. Write some java8 code Multi thread concept File handling
Java8 code for multi-threading and file handling
Use ExecutorService to create and manage threads
Use Files class to read/write files
Example: ExecutorService executor = Executors.newFixedThreadPool(5);
Example: Files.write(Paths.get("file.txt"), "Hello World".getBytes());
Q134. What is the COND parameter
COND parameter is used in JCL (Job Control Language) to specify a condition for executing a job step.
COND parameter is used to specify a condition code that must be satisfied for the job step to execute.
It can be used with IF or ONLY keywords to control the execution flow based on the condition code.
For example, COND=(0,NE) means the job step will execute if the condition code is not equal to 0.
Q135. Why OOPs is used
OOP is used for organizing code into reusable objects, promoting code reusability, modularity, and easier maintenance.
Encapsulation: Data and methods are bundled together in objects, promoting data security and code organization.
Inheritance: Allows for the creation of new classes based on existing ones, promoting code reuse and reducing redundancy.
Polymorphism: Objects can be treated as instances of their parent class, allowing for flexibility and extensibility.
Modularity: Co...read more
Q136. What is testng? Uses?
TestNG is a testing framework for Java that provides various features for testing applications.
TestNG is an open-source testing framework that is inspired by JUnit and NUnit.
It allows the creation of test cases, test suites, and test configurations.
TestNG supports various annotations for test configuration and execution control.
It provides features like parallel test execution, data-driven testing, and test dependency management.
TestNG generates detailed test reports and supp...read more
Q137. Tell me about complex DAX functions you used
I have used complex DAX functions like CALCULATE, FILTER, SUMX, etc. to perform advanced calculations in Power BI.
Used CALCULATE function to apply filters and context changes to calculations
Utilized FILTER function to filter data based on specific conditions
Implemented SUMX function to iterate over a table and perform calculations for each row
Q138. Write a program for credit, debit and billing for grocery shop. . Explain normalization
Q139. What is MITM
MITM stands for Man-in-the-Middle attack, where a third party intercepts communication between two parties without their knowledge.
MITM attack involves a hacker intercepting communication between two parties to steal information or manipulate data.
Common examples include eavesdropping on Wi-Fi networks or intercepting emails.
To prevent MITM attacks, encryption and secure communication protocols like HTTPS are used.
Q140. 1.In the java multiple inheritance possible 2.reverse string line word by word,
1. Java supports multiple inheritance. 2. Reverse a string word by word.
1. Java supports multiple inheritance through interfaces. A class can implement multiple interfaces.
2. Split the string into words using split() method. Reverse the array of words and join them using join() method.
Q141. Write the code to sort the array.
Code to sort an array of strings
Use the built-in sort() function in the programming language of your choice
If case-insensitive sorting is required, use a custom comparator
Consider the time complexity of the sorting algorithm used
Q142. How will you automate payment gateway and payment process in selenium webdriver.
Automating payment gateway and process in Selenium WebDriver involves identifying elements, handling pop-ups, and verifying transactions.
Identify and interact with payment gateway elements using Selenium WebDriver commands.
Handle any pop-ups or alerts that may appear during the payment process.
Verify successful completion of the payment transaction by checking for expected outcomes.
Use test data to simulate different payment scenarios and ensure robust automation scripts.
Q143. suppose you have a dynamic web page with n number of popup and pages how will you automate it.
Automate dynamic web page with multiple popups and pages by using a combination of tools like Selenium, TestNG, and Page Object Model.
Use Selenium WebDriver to interact with elements on the web page.
Implement TestNG for test case management and execution.
Utilize Page Object Model design pattern to organize and maintain the automation code.
Handle popups using WebDriver's switchTo() method.
Use explicit waits to handle dynamic elements on the page.
Implement data-driven testing t...read more
Q144. Give Introduction
I am a software developer with 5 years of experience in Java and Python.
Experienced software developer
Proficient in Java and Python
5 years of industry experience
Q145. How to calculate risk analysis in change mangement
Risk analysis in change management involves identifying potential risks, assessing their impact, and developing strategies to mitigate them.
Identify potential risks associated with the change
Assess the impact of each risk on the project or organization
Prioritize risks based on their likelihood and impact
Develop strategies to mitigate or manage the identified risks
Monitor and review the effectiveness of risk mitigation strategies
Q146. What are ddl and dml commands in SQL
DDL (Data Definition Language) commands are used to define the structure of a database, while DML (Data Manipulation Language) commands are used to manipulate data within the database.
DDL commands include CREATE, ALTER, DROP, TRUNCATE, etc.
DML commands include INSERT, UPDATE, DELETE, SELECT, etc.
DDL commands are used to create or modify the structure of database objects like tables, indexes, etc.
DML commands are used to manipulate data stored in the database tables.
Example of...read more
Q147. What strategies can be employed to overcome failures?
Strategies to overcome failures include learning from mistakes, staying positive, seeking feedback, and setting new goals.
Learn from mistakes by analyzing what went wrong and how to improve
Stay positive and maintain a growth mindset to bounce back from setbacks
Seek feedback from mentors or colleagues to gain different perspectives
Set new goals and create a plan to move forward with renewed motivation
Q148. OOP in python study properly
OOP in Python refers to the concept of using classes and objects to organize and structure code.
Python supports object-oriented programming (OOP) principles such as encapsulation, inheritance, and polymorphism.
Classes are used to define objects, which can have attributes (variables) and methods (functions).
Inheritance allows a class to inherit attributes and methods from another class.
Polymorphism enables objects to be treated as instances of their parent class or their own c...read more
Q149. What is ACID PROPERTIES?
ACID properties are a set of properties that guarantee that database transactions are processed reliably.
ACID stands for Atomicity, Consistency, Isolation, Durability
Atomicity ensures that either all operations in a transaction are completed successfully or none are
Consistency ensures that the database remains in a consistent state before and after the transaction
Isolation ensures that multiple transactions can be executed concurrently without affecting each other
Durability e...read more
Q150. Array lists vs arrays
Array lists are dynamic in size, while arrays have fixed sizes.
Array lists can grow or shrink in size dynamically, while arrays have a fixed size.
Array lists are implemented using dynamic arrays, while arrays are static data structures.
Array lists provide methods for adding, removing, and accessing elements easily, while arrays require manual resizing and shifting of elements.
Example: ArrayList<String> vs String[]
Q151. Q.) Difference Between SQL and MySQL Q.) Class Loader in JAVA
Q152. What is data query and data flow?
Data query is the process of retrieving specific data from a database, while data flow is the movement of data from one point to another.
Data query involves writing SQL queries to extract specific data from a database
Data flow refers to the movement of data from source to destination through various transformations
Data query is used to filter and retrieve relevant data, while data flow ensures data is processed and moved efficiently
Example: Data query can be used to extract s...read more
Q153. What is Calculated column and Measure?
Calculated column is a static column in a table calculated based on a formula, while Measure is a dynamic calculation based on aggregated data.
Calculated column is created in Power BI using DAX formula and stored in the data model.
Measure is a calculation performed on the fly based on the context of the visualization.
Calculated columns are static and can be used for filtering and sorting, while Measures are dynamic and used for aggregations like sum, average, etc.
Q154. What is query folding in power BI?
Query folding in Power BI is a process where Power BI pushes the data transformation steps back to the data source.
Query folding improves performance by reducing the amount of data loaded into Power BI.
It allows Power BI to leverage the capabilities of the data source for data transformation.
Commonly used with relational databases like SQL Server, Oracle, etc.
Example: When filtering data in Power BI, query folding will push the filter operation back to the database for proces...read more
Q155. Difference between data blending and cross database join
Data blending combines data from multiple sources while cross database join combines data from different tables in the same database.
Data blending is used when data is stored in different sources like Excel, CSV, or databases.
Cross database join is used when data is stored in different tables within the same database.
Data blending creates a relationship between the data sources based on common dimensions.
Cross database join combines data based on a common field or key.
Data bl...read more
Q156. Types of Joins
Types of joins in SQL are inner join, left join, right join, and full outer join.
Inner join: Returns rows when there is a match in both tables.
Left join: Returns all rows from the left table and the matched rows from the right table.
Right join: Returns all rows from the right table and the matched rows from the left table.
Full outer join: Returns rows when there is a match in either table.
Q157. TCP/IP vs UDP
TCP/IP is a connection-oriented protocol that ensures data delivery, while UDP is a connectionless protocol that prioritizes speed.
TCP/IP is reliable as it guarantees delivery of data packets in the correct order.
UDP is faster as it does not require a connection setup before transmitting data.
TCP/IP is used for applications that require high reliability, such as web browsing and email.
UDP is used for real-time applications like online gaming and video streaming.
TCP/IP include...read more
Q158. Tell me about one deadlock algorithm
One deadlock algorithm is the Banker's algorithm.
Banker's algorithm is used to avoid deadlock in a multi-process system.
It works by checking if a request for resources will leave the system in a safe state.
If the request will not leave the system in a safe state, it is denied.
The algorithm keeps track of available resources and the maximum resources each process can request.
It also keeps track of the resources currently allocated to each process.
If a process requests resource...read more
Q159. how will you automate API using selenium webdriver.
To automate API using Selenium WebDriver, we can use tools like RestAssured and create test scripts to interact with API endpoints.
Use RestAssured library to send HTTP requests and validate responses
Create test scripts to interact with API endpoints and verify data
Utilize Selenium WebDriver to automate the process of sending requests and validating responses
Q160. what is difference b/w redux and redux toolkit
Redux Toolkit is a set of tools and best practices to simplify Redux development, while Redux is a predictable state container for JavaScript apps.
Redux Toolkit provides a set of tools like createSlice, createAsyncThunk, and configureStore to simplify Redux setup and reduce boilerplate code.
Redux Toolkit includes immer library for writing immutable update logic in a more convenient way.
Redux Toolkit also includes a default setup for Redux DevTools Extension integration.
Redux ...read more
Q161. what inline level and block level elements
Inline and block level elements are two types of HTML elements with different display behaviors.
Inline elements flow in the same line as surrounding content, while block level elements take up the full width available.
Examples of inline elements include <span>, <a>, and <strong>.
Examples of block level elements include <div>, <p>, and <h1>.
Q162. What is RANK & DENSE RANK in SQL
RANK assigns a unique rank to each row based on a specified column, while DENSE RANK assigns a unique rank to each distinct row.
RANK function is used to assign a unique rank to each row based on a specified column
DENSE RANK function is used to assign a unique rank to each distinct row, skipping ranks if there are ties
RANK and DENSE RANK are commonly used in SQL queries to rank data based on certain criteria
Q163. Namespaces in python
Namespaces in Python are a way to organize and group related code together.
Namespaces prevent naming conflicts and improve code readability.
Python uses a hierarchical namespace structure.
Namespaces can be created using modules, classes, and functions.
The 'global' and 'local' keywords are used to access variables in different namespaces.
Examples of namespaces in Python include built-in, global, and local namespaces.
Q165. What are most Routine sections of TDS? What deductions are allowed under chp vi a of income tax.
Routine sections of TDS include salary, interest on securities, interest other than interest on securities, winnings from lotteries, crossword puzzles, card games, and other games of any sort, and winnings from horse races.
Salary
Interest on securities
Interest other than interest on securities
Winnings from lotteries
Winnings from crossword puzzles, card games, and other games of any sort
Winnings from horse races
Q166. Flexible with moving
I am open to relocating for the right opportunity.
I am willing to move to different locations for career growth
I understand the importance of being flexible with relocation for job opportunities
I have experience moving for previous job opportunities, such as relocating for internships or projects
Q167. What does deadlock mean?
Deadlock is a situation where two or more processes are unable to proceed because they are waiting for each other to release resources.
Occurs in multi-process systems
Processes are stuck in a circular wait
Can lead to system crashes or freezes
Prevented by proper resource allocation and scheduling
Example: Process A holds resource X and waits for resource Y, while process B holds resource Y and waits for resource X
Q168. Difference between power query and direct query
Power Query is used to import and transform data within Power BI, while Direct Query allows real-time data access from the data source.
Power Query is used to import and transform data within Power BI before loading it into the data model.
Direct Query allows Power BI to query the data source directly in real-time, without importing the data into the data model.
Power Query is suitable for smaller datasets that can be loaded into memory, while Direct Query is ideal for large dat...read more
Q169. Write merge sort
Merge sort is a divide and conquer algorithm that recursively splits an array into halves, sorts them, and then merges them back together.
Divide the array into two halves
Recursively sort each half
Merge the sorted halves back together
Q170. Divisible by 2 code
Write a code to check if a number is divisible by 2.
Use the modulo operator (%) to check if the remainder is 0 when divided by 2.
If the remainder is 0, then the number is divisible by 2.
Example: if(num % 2 == 0) { // divisible by 2 }
Q171. Explain ur experience
I have 5 years of experience working as a Data Engineer in various industries.
Developed ETL pipelines to extract, transform, and load data from multiple sources into a data warehouse
Optimized database performance by tuning queries and indexes
Implemented data quality checks to ensure accuracy and consistency of data
Worked with cross-functional teams to design and implement data solutions for business needs
Q172. SQL: Find keys present in table A but not in B(B is old copy of A)
Use SQL to find keys present in table A but not in table B (old copy of A).
Use a LEFT JOIN to combine tables A and B based on the key column
Filter the results where the key column in table B is NULL
This will give you the keys present in table A but not in table B
Q173. Case Study: Using GCP's tool make a pipeline to transfer file from one GCS bucket to another
Use GCP Dataflow to transfer files between GCS buckets
Create a Dataflow pipeline using Apache Beam to read from source bucket and write to destination bucket
Use GCS connector to read and write files in Dataflow pipeline
Set up appropriate permissions for Dataflow service account to access both buckets
Q174. Default join in tableau
Default join in Tableau is inner join
Default join in Tableau is inner join, which only includes rows that have matching values in both tables
Other types of joins in Tableau include left join, right join, and full outer join
To change the default join type in Tableau, you can drag the field from one table to another and select the desired join type
Q175. Your interest in all Shift Timings ?
I am flexible with all shift timings and can adapt to different schedules as needed.
I have experience working in both morning and night shifts in my previous job.
I am willing to work weekends and holidays if required.
I understand the importance of being available for different shifts to meet the needs of the business.
Q176. The standard size of a concrete cube is 15 cm × 15 cm × 15 cm
Yes, the standard size of a concrete cube is 15 cm × 15 cm × 15 cm.
The standard size of a concrete cube is used for testing the compressive strength of concrete.
The cubes are casted and cured for 28 days before testing.
The cubes are tested using a compression testing machine.
The compressive strength of concrete is calculated by dividing the maximum load applied to the cube by the cross-sectional area of the cube.
Q177. Explain virtual function and static method in C++
Q178. what is react hooks explain some
React Hooks are functions that let you use state and other React features without writing a class.
React Hooks were introduced in React 16.8.
They allow you to use state and other React features in functional components.
Some commonly used hooks are useState, useEffect, useContext, and useRef.
Hooks make it easier to reuse logic across components.
Hooks can be used to manage component state, perform side effects, and more.
Q179. how to manage state using redux
Redux is a predictable state container for JavaScript apps. It helps manage the state of an application in a centralized store.
Create a Redux store to hold the state of the application
Define actions to describe state changes
Write reducers to specify how the state changes in response to actions
Dispatch actions to update the state in the store
Connect components to the Redux store using the connect function from react-redux
Q180. recursion in java implementation
Recursion in Java is a programming technique where a method calls itself to solve a problem.
Recursion involves breaking down a problem into smaller subproblems and solving them recursively.
A base case is needed to stop the recursion and prevent infinite loops.
Example: Factorial calculation using recursion - int factorial(int n) { return (n == 0) ? 1 : n * factorial(n-1); }
Q181. What are various data visualisation platforms
Various data visualisation platforms include Tableau, Power BI, Google Data Studio, and D3.js.
Tableau
Power BI
Google Data Studio
D3.js
Q182. tell me about types of Context
Types of context refer to the different ways in which data can be analyzed and interpreted in Power BI.
Row context: evaluates calculations row by row
Filter context: applies filters to data before calculations
Query context: used in DAX queries to retrieve data
Relationship context: determines how tables are related
Q183. What do you mean by polymorphism?
Polymorphism is the ability of a function or method to behave differently based on the object it is acting upon.
Polymorphism allows objects of different classes to be treated as objects of a common superclass.
There are two types of polymorphism: compile-time (method overloading) and runtime (method overriding).
Example: Inheritance in OOP allows a child class to override a method from its parent class, exhibiting polymorphic behavior.
Q184. how to defain generators?
Generators are functions that can pause and resume their execution, allowing for lazy evaluation of values.
Generators are defined using the function* syntax in JavaScript.
They use the yield keyword to pause execution and return a value.
Generators can be iterated over using a for...of loop.
They are useful for generating sequences of values on demand.
Q185. what is instance verable?
Instance variable is a variable declared in a class, but outside of any method. It is unique to each object of the class.
Instance variables are also known as member variables or attributes.
They hold data that is unique to each object created from the class.
Example: In a class representing a car, instance variables could include 'color', 'model', and 'year'.
Q186. What is a foreign key?
A foreign key is a column or set of columns in a database table that refers to the primary key of another table.
It establishes a link between two tables.
It ensures referential integrity.
It helps in maintaining data consistency.
It can be used to join tables in a query.
Example: A 'customer' table may have a foreign key that refers to the 'order' table's primary key.
Q187. pyspark optimization technique
One pyspark optimization technique is using broadcast variables to efficiently distribute read-only data across all nodes.
Use broadcast variables to efficiently distribute read-only data across all nodes
Avoid shuffling data unnecessarily by using partitioning and caching
Optimize data processing by using appropriate transformations and actions
Q188. How do you work on performance optimization
I work on performance optimization by analyzing query execution plans, indexing, and code refactoring.
Analyzing query execution plans to identify bottlenecks
Creating appropriate indexes to improve query performance
Refactoring code to optimize resource usage
Using tools like Explain Plan and SQL Tuning Advisor
Q189. What is function in Java?
A function in Java is a block of code that performs a specific task. It can be called multiple times within a program.
Functions in Java are defined using the 'public static' keywords.
They can have parameters and return a value.
Example: public static int add(int a, int b) { return a + b; }
Q190. What is jav acompiler?
Java compiler is a tool that translates Java source code into bytecode.
Java compiler converts Java source code (.java files) into bytecode (.class files)
It checks for syntax errors and generates executable code
Examples of Java compilers include javac (command-line compiler) and Eclipse compiler
Q191. What is COND parameter?
COND parameter is used to specify the condition code value of the previous step to determine the execution of the current step.
It is used in JCL statements like IF, ELSEIF, and COND.
It can be used to execute a step conditionally based on the return code of the previous step.
It can also be used to skip a step based on the return code of the previous step.
The syntax for COND parameter is COND=(code, operator, stepname).
Q192. What programming knowledge you have ?
Proficient in Python, R, and SQL with experience in data manipulation, visualization, and machine learning algorithms.
Proficient in Python for data analysis and machine learning tasks
Experience with R for statistical analysis and visualization
Knowledge of SQL for querying databases and extracting data
Familiarity with libraries such as Pandas, NumPy, Matplotlib, and Scikit-learn
Q193. callable vs runnable?
Callable is used to return a result and can throw checked exceptions, while Runnable is used for void operations.
Callable can return a result and throw checked exceptions, while Runnable cannot.
Callable is a functional interface with a method call() that returns a result, while Runnable is a functional interface with a method run() that does not return a result.
Example: Callable
task = () -> { return 5 + 3; }; Runnable task = () -> { System.out.println("Hello World!"); };
Q194. Give me an example forINNER JOIN in sql
INNER JOIN is used to combine rows from two or more tables based on a related column between them.
Use INNER JOIN to retrieve rows from both tables that have matching values in the specified column
Syntax: SELECT column_name(s) FROM table1 INNER JOIN table2 ON table1.column_name = table2.column_name
Example: SELECT Orders.OrderID, Customers.CustomerName FROM Orders INNER JOIN Customers ON Orders.CustomerID = Customers.CustomerID
Q195. Difference between C, C++ and Java
C is a procedural language, C++ is an object-oriented language, and Java is a platform-independent language.
C is a procedural programming language, focusing on functions and procedures.
C++ is an extension of C with added features like classes and objects.
Java is a platform-independent language that runs on a virtual machine.
Q196. Code For parse Traingle
Code for parsing a triangle
Use a loop to iterate through each line of the triangle
Split each line into an array of numbers
Store the parsed numbers in a 2D array or a list of lists
Q197. How to log the calls
To log calls, create a system for recording and tracking information about each call.
Use a ticketing system or software to log calls
Include details such as caller information, issue description, and resolution
Assign unique reference numbers to each call for easy tracking
Categorize calls based on urgency or priority
Regularly update the call log with progress and resolution status
Q198. Can we change wait time during runtime.
Yes, wait time can be changed during runtime by adjusting the code logic or configuration settings.
Wait time can be changed by modifying the code to include dynamic wait times based on certain conditions.
Configuration settings in the application or system can also be adjusted to change wait times.
For example, in automated testing scripts, wait times can be adjusted based on the response time of the application being tested.
Q199. What you know about osi reference model
The OSI reference model is a conceptual framework that standardizes the functions of a telecommunication or computing system into seven layers.
The OSI model stands for Open Systems Interconnection model
It helps in understanding how different networking protocols work together
Each layer has specific functions and communicates with adjacent layers
Examples of layers include physical layer, data link layer, network layer, etc.
Q200. Explain automation framework structure
Automation framework structure is the organization of tools, libraries, and guidelines used for automated testing.
Automation framework consists of a set of guidelines, coding standards, and best practices.
It includes tools and libraries for test script development, execution, and reporting.
Frameworks can be data-driven, keyword-driven, modular, or hybrid.
Common frameworks include Selenium WebDriver for web testing and Appium for mobile testing.
More about working at LTIMindtree
Top HR Questions asked in Cerence
Interview Process at Cerence
Top Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month