Add office photos
Engaged Employer

LTIMindtree

3.8
based on 20.6k Reviews
Filter interviews by

200+ Cerence Interview Questions and Answers

Updated 23 Dec 2024
Popular Designations

Q101. How Hashset works internally

Ans.

HashSet is an unordered collection that uses hashing to store and retrieve elements efficiently.

  • HashSet internally uses a HashMap to store its elements.

  • Each element is stored as a key in the HashMap with a fixed value.

  • When adding an element, its hash code is calculated and used to determine the bucket in the HashMap where it will be stored.

  • If multiple elements have the same hash code, they are stored in the same bucket as a linked list.

  • To retrieve an element, its hash code is...read more

Add your answer

Q102. Tell me what ways you improve performance of report?

Ans.

Performance of reports can be improved by optimizing queries, reducing data volume, using efficient visuals, and caching data.

  • Optimize queries by removing unnecessary columns and filters

  • Reduce data volume by aggregating data at the source or using incremental refresh

  • Use efficient visuals like matrix instead of tables for large datasets

  • Cache data to reduce query times for frequently accessed data

Add your answer
Ans.

SQL is a programming language used to manage and manipulate relational databases.

  • SQL stands for Structured Query Language

  • It is used to create, modify, and query databases

  • Common commands include SELECT, INSERT, UPDATE, and DELETE

  • Examples of database management systems that use SQL include MySQL, Oracle, and Microsoft SQL Server

Add your answer

Q104. What is schema

Ans.

Schema is a blueprint or structure that defines the organization of data in a database.

  • Schema is used to define the structure of a database.

  • It includes information about tables, columns, data types, relationships, and constraints.

  • It helps ensure data consistency and integrity.

  • Examples of schema include SQL Server, Oracle, and MySQL.

  • Schema can also refer to the organization of data in XML or JSON documents.

Add your answer
Discover Cerence interview dos and don'ts from real experiences
Asked in
ASE Interview

Q105. Write a program to write all prime numbers in the given range.

Ans.

Program to print all prime numbers in a given range.

  • Take input for the range of numbers

  • Loop through the range and check if each number is prime

  • If a number is prime, print it

  • A number is prime if it is only divisible by 1 and itself

Add your answer

Q106. What does LtiMindtree do?

Ans.

LtiMindtree is a global technology consulting and services company.

  • Provides IT consulting, digital transformation, and technology services

  • Offers solutions in areas such as cloud computing, data analytics, and artificial intelligence

  • Works with clients across various industries including banking, healthcare, and retail

Add your answer
Are these interview questions helpful?

Q107. what is closuer? is normal function call as closuer or not

Ans.

A closure is a function that has access to its own scope, as well as the scope in which it was defined.

  • A closure allows a function to access variables from its outer function even after the outer function has finished executing.

  • Closures are created whenever a function is defined within another function.

  • Example: function outerFunction() { let outerVar = 'I am outer'; return function innerFunction() { console.log(outerVar); }; }

Add your answer

Q108. Features of OOPS

Ans.

OOPS is a programming paradigm that focuses on objects and their interactions.

  • Encapsulation: bundling of data and methods that operate on that data

  • Inheritance: ability of a class to inherit properties and methods from a parent class

  • Polymorphism: ability of objects to take on multiple forms or behaviors

  • Abstraction: hiding of complex implementation details from the user

  • Examples: Java, C++, Python

Add your answer
Share interview questions and help millions of jobseekers 🌟

Q109. What is multiple inheritance

Ans.

Multiple inheritance is a feature in object-oriented programming where a class can inherit attributes and methods from more than one parent class.

  • Allows a class to inherit attributes and methods from multiple parent classes

  • Can lead to the diamond problem where ambiguity arises if two parent classes have a method with the same name

  • Languages like C++ support multiple inheritance

Add your answer

Q110. Tell me abt ltimindtree

Ans.

Mindtree is a global technology consulting and services company, specializing in IT services and digital transformation.

  • Founded in 1999 in Bangalore, India

  • Provides services in application development, maintenance, infrastructure management, and testing

  • Acquired by L&T (Larsen & Toubro) in 2019

  • Has offices in multiple countries including the USA, UK, and India

Add your answer

Q111. Cut one cake into 8 pieces with 3 slices

Ans.

Cut the cake into 8 pieces by making 3 slices, creating 8 equal-sized slices.

  • Make two vertical cuts to divide the cake into 4 equal quarters.

  • Then make one horizontal cut through the middle of the cake to create 8 equal-sized slices.

  • Each slice will be a triangular piece of cake.

Add your answer

Q112. Time and space complexity of merge sort.

Ans.

Merge sort has a time complexity of O(n log n) and a space complexity of O(n).

  • Time complexity of merge sort is O(n log n) where n is the number of elements in the array.

  • Space complexity of merge sort is O(n) as it requires additional space to store the temporary arrays during the merging process.

  • Merge sort is a divide and conquer algorithm that recursively divides the array into halves until each subarray contains only one element, then merges them in sorted order.

Add your answer

Q113. What is HTML, and what purposes does it serve?

Ans.

HTML is a markup language used for creating and structuring web pages.

  • HTML stands for HyperText Markup Language.

  • It is used to create the structure and content of web pages.

  • HTML uses tags to define elements such as headings, paragraphs, images, links, and more.

  • Example: <h1>This is a heading</h1>

  • Example: <p>This is a paragraph</p>

  • HTML documents are saved with a .html file extension.

Add your answer

Q114. Difference between extract and live connection

Ans.

Extract connection imports data into Tableau while live connection directly connects to the data source.

  • Extract connection creates a static snapshot of data while live connection accesses real-time data from the source.

  • Extract connection is useful for large datasets or when offline access is needed.

  • Live connection is beneficial for real-time analysis and when data needs to be updated frequently.

  • Examples: Extract connection - importing a CSV file into Tableau. Live connection ...read more

Add your answer

Q115. gave code class A { int i = 10; } class B extends A { int i = 20; } public class test{ public static void main (String [] args) { A a = new B(); System.out.println(a.i): } }

Ans.

The code will output 10 because the variable i is accessed through a reference of class A.

  • When a subclass object is assigned to a superclass reference, the superclass reference can only access the superclass members.

  • In this case, even though the object is of class B, the variable i is accessed from class A.

  • Output: 10

View 1 answer

Q116. What are Java Data types?

Ans.

Java data types are classifications of data items that determine the kind of values they can hold.

  • Java has two categories of data types: primitive data types and reference data types.

  • Primitive data types include int, double, char, boolean, etc.

  • Reference data types include classes, interfaces, arrays, etc.

  • Example: int num = 10; String name = "John";

Add your answer

Q117. What is Data Science?

Ans.

Data Science is a field that uses scientific methods, algorithms, and systems to extract knowledge and insights from structured and unstructured data.

  • Data Science involves collecting, cleaning, analyzing, and interpreting large amounts of data to make informed decisions.

  • It combines statistics, machine learning, and domain knowledge to uncover patterns and trends in data.

  • Examples include predicting customer behavior based on past purchases, analyzing medical records to improve...read more

Add your answer

Q118. Write a java proram to check if a given string is a palindrome

Ans.

A Java program to check if a given string is a palindrome.

  • Create a function that takes a string as input.

  • Use two pointers, one starting from the beginning and one from the end, to compare characters.

  • If all characters match, the string is a palindrome.

  • Example: 'racecar' is a palindrome, 'hello' is not.

Add your answer

Q119. Write a code in Java, explain the concept of a class, using example of a fruit class

Ans.

Explanation of a class in Java using a fruit class example

  • A class in Java is a blueprint for creating objects. It defines the properties and behaviors of objects.

  • In the case of a fruit class, properties could include name, color, and taste, while behaviors could include methods like ripen() and rot().

  • Example: class Fruit { String name; String color; String taste; void ripen() { //code to ripen fruit } void rot() { //code to rot fruit }}

Add your answer

Q120. What is dsa, explain knapsack

Ans.

DSA stands for Data Structures and Algorithms. Knapsack is a problem in combinatorial optimization.

  • DSA is a field of study that involves the design and analysis of data structures and algorithms.

  • Knapsack problem involves maximizing the value of items in a knapsack without exceeding its capacity.

  • There are two types of knapsack problems: 0/1 knapsack (where items cannot be broken) and fractional knapsack (where items can be broken).

Add your answer

Q121. What are String Tokenizers

Ans.

String tokenizers are tools used to break a string into smaller parts based on a specified delimiter.

  • String tokenizers are commonly used in programming to parse strings and extract relevant information.

  • They can be used to split a sentence into individual words, or to extract specific data from a structured text.

  • For example, in Java, the StringTokenizer class can be used to break a string into tokens based on a specified delimiter.

Add your answer

Q122. What is cross site scripting

Ans.

Cross site scripting (XSS) is a type of security vulnerability typically found in web applications where malicious scripts are injected into trusted websites.

  • XSS allows attackers to execute scripts in the victim's browser, potentially stealing sensitive information or altering the website's content.

  • There are three main types of XSS: stored XSS, reflected XSS, and DOM-based XSS.

  • Preventing XSS involves input validation, output encoding, and implementing Content Security Policy ...read more

Add your answer

Q123. why linux is preferred instead of windows OS in IT high security system?

Ans.

Linux is preferred over Windows in high security systems due to its open-source nature, strong security features, and minimal attack surface.

  • Linux is open-source, allowing for greater transparency and customization to meet security needs.

  • Linux has a strong permission system, making it easier to control access to sensitive data and resources.

  • Linux has a smaller attack surface compared to Windows, reducing the risk of vulnerabilities being exploited.

  • Linux distributions like Cen...read more

Add your answer

Q124. What programming languages are you familiar with?

Ans.

I am familiar with Java, Python, C++, and JavaScript.

  • Java

  • Python

  • C++

  • JavaScript

Add your answer

Q125. What are some commands commonly used in MySQL?

Ans.

Some commonly used commands in MySQL include SELECT, INSERT, UPDATE, DELETE, and JOIN.

  • SELECT: Used to retrieve data from a database table

  • INSERT: Used to add new records to a table

  • UPDATE: Used to modify existing records in a table

  • DELETE: Used to remove records from a table

  • JOIN: Used to combine rows from two or more tables based on a related column

Add your answer

Q126. What is the process for creating a table in MySQL?

Ans.

Creating a table in MySQL involves using the CREATE TABLE statement with specified columns and data types.

  • Use the CREATE TABLE statement followed by the table name

  • List the columns along with their data types and any constraints

  • Specify the primary key if needed

  • Example: CREATE TABLE employees (id INT PRIMARY KEY, name VARCHAR(50), age INT)

Add your answer

Q127. Difference between C and Cpp

Ans.

C is a procedural programming language while C++ is an object-oriented programming language.

  • C is a subset of C++.

  • C does not support classes and objects, while C++ does.

  • C++ supports function overloading and operator overloading, which C does not.

  • C++ has a more complex syntax compared to C.

  • C++ has a standard template library (STL) for data structures and algorithms, which C does not have.

Add your answer

Q128. what is struct and unions

Ans.

Structs and unions are data structures in C programming used to group different data types under a single name.

  • Structs allow you to group different data types together under a single name. For example, a struct 'Person' can have fields like name, age, and gender.

  • Unions are similar to structs but they share the same memory location for all its members. Only one member can contain a value at a time. For example, a union 'Data' can have fields like int, float, and char, but only...read more

Add your answer

Q129. Prime numbers in a range

Ans.

Finding prime numbers within a given range.

  • A prime number is a number that is only divisible by 1 and itself.

  • Start with the first number in the range and check if it is prime.

  • If it is prime, add it to the list of prime numbers.

  • If it is not prime, move on to the next number.

  • Repeat until all numbers in the range have been checked.

  • Examples: Prime numbers between 1 and 10 are 2, 3, 5, and 7.

  • Examples: Prime numbers between 20 and 30 are 23 and 29.

Add your answer

Q130. Asci value along with alphabets(both capital and small)

Ans.

The ASCII value is a numerical representation of a character. It includes both capital and small alphabets.

  • ASCII values range from 65 to 90 for capital letters A to Z.

  • ASCII values range from 97 to 122 for small letters a to z.

  • For example, the ASCII value of 'A' is 65 and the ASCII value of 'a' is 97.

Add your answer

Q131. What is star schema and snowflake schema?

Ans.

Star schema is a data warehouse schema where a central fact table is connected to multiple dimension tables. Snowflake schema is a normalized form of star schema.

  • Star schema consists of a central fact table connected to multiple dimension tables

  • Snowflake schema is a normalized form of star schema where dimension tables are further normalized into sub-dimension tables

  • Star schema is denormalized for faster query performance, while snowflake schema is normalized for easier maint...read more

Add your answer

Q132. What is CALCULATED function and how it works?

Ans.

CALCULATED function is used in Power BI to create custom calculations based on existing data in a report.

  • CALCULATED function is used to create custom calculations in DAX (Data Analysis Expressions) language.

  • It allows users to define complex calculations based on existing data in the report.

  • CALCULATED function can be used with other DAX functions to perform calculations like aggregations, comparisons, and conditional logic.

  • Example: CALCULATED column can be used to calculate pr...read more

Add your answer

Q133. Write some java8 code Multi thread concept File handling

Ans.

Java8 code for multi-threading and file handling

  • Use ExecutorService to create and manage threads

  • Use Files class to read/write files

  • Example: ExecutorService executor = Executors.newFixedThreadPool(5);

  • Example: Files.write(Paths.get("file.txt"), "Hello World".getBytes());

Add your answer

Q134. What is the COND parameter

Ans.

COND parameter is used in JCL (Job Control Language) to specify a condition for executing a job step.

  • COND parameter is used to specify a condition code that must be satisfied for the job step to execute.

  • It can be used with IF or ONLY keywords to control the execution flow based on the condition code.

  • For example, COND=(0,NE) means the job step will execute if the condition code is not equal to 0.

Add your answer

Q135. Why OOPs is used

Ans.

OOP is used for organizing code into reusable objects, promoting code reusability, modularity, and easier maintenance.

  • Encapsulation: Data and methods are bundled together in objects, promoting data security and code organization.

  • Inheritance: Allows for the creation of new classes based on existing ones, promoting code reuse and reducing redundancy.

  • Polymorphism: Objects can be treated as instances of their parent class, allowing for flexibility and extensibility.

  • Modularity: Co...read more

Add your answer

Q136. What is testng? Uses?

Ans.

TestNG is a testing framework for Java that provides various features for testing applications.

  • TestNG is an open-source testing framework that is inspired by JUnit and NUnit.

  • It allows the creation of test cases, test suites, and test configurations.

  • TestNG supports various annotations for test configuration and execution control.

  • It provides features like parallel test execution, data-driven testing, and test dependency management.

  • TestNG generates detailed test reports and supp...read more

Add your answer

Q137. Tell me about complex DAX functions you used

Ans.

I have used complex DAX functions like CALCULATE, FILTER, SUMX, etc. to perform advanced calculations in Power BI.

  • Used CALCULATE function to apply filters and context changes to calculations

  • Utilized FILTER function to filter data based on specific conditions

  • Implemented SUMX function to iterate over a table and perform calculations for each row

Add your answer

Q138. Write a program for credit, debit and billing for grocery shop. . Explain normalization

Add your answer

Q139. What is MITM

Ans.

MITM stands for Man-in-the-Middle attack, where a third party intercepts communication between two parties without their knowledge.

  • MITM attack involves a hacker intercepting communication between two parties to steal information or manipulate data.

  • Common examples include eavesdropping on Wi-Fi networks or intercepting emails.

  • To prevent MITM attacks, encryption and secure communication protocols like HTTPS are used.

Add your answer

Q140. 1.In the java multiple inheritance possible 2.reverse string line word by word,

Ans.

1. Java supports multiple inheritance. 2. Reverse a string word by word.

  • 1. Java supports multiple inheritance through interfaces. A class can implement multiple interfaces.

  • 2. Split the string into words using split() method. Reverse the array of words and join them using join() method.

Add your answer

Q141. Write the code to sort the array.

Ans.

Code to sort an array of strings

  • Use the built-in sort() function in the programming language of your choice

  • If case-insensitive sorting is required, use a custom comparator

  • Consider the time complexity of the sorting algorithm used

Add your answer

Q142. How will you automate payment gateway and payment process in selenium webdriver.

Ans.

Automating payment gateway and process in Selenium WebDriver involves identifying elements, handling pop-ups, and verifying transactions.

  • Identify and interact with payment gateway elements using Selenium WebDriver commands.

  • Handle any pop-ups or alerts that may appear during the payment process.

  • Verify successful completion of the payment transaction by checking for expected outcomes.

  • Use test data to simulate different payment scenarios and ensure robust automation scripts.

Add your answer

Q143. suppose you have a dynamic web page with n number of popup and pages how will you automate it.

Ans.

Automate dynamic web page with multiple popups and pages by using a combination of tools like Selenium, TestNG, and Page Object Model.

  • Use Selenium WebDriver to interact with elements on the web page.

  • Implement TestNG for test case management and execution.

  • Utilize Page Object Model design pattern to organize and maintain the automation code.

  • Handle popups using WebDriver's switchTo() method.

  • Use explicit waits to handle dynamic elements on the page.

  • Implement data-driven testing t...read more

Add your answer

Q144. Give Introduction

Ans.

I am a software developer with 5 years of experience in Java and Python.

  • Experienced software developer

  • Proficient in Java and Python

  • 5 years of industry experience

Add your answer

Q145. How to calculate risk analysis in change mangement

Ans.

Risk analysis in change management involves identifying potential risks, assessing their impact, and developing strategies to mitigate them.

  • Identify potential risks associated with the change

  • Assess the impact of each risk on the project or organization

  • Prioritize risks based on their likelihood and impact

  • Develop strategies to mitigate or manage the identified risks

  • Monitor and review the effectiveness of risk mitigation strategies

Add your answer

Q146. What are ddl and dml commands in SQL

Ans.

DDL (Data Definition Language) commands are used to define the structure of a database, while DML (Data Manipulation Language) commands are used to manipulate data within the database.

  • DDL commands include CREATE, ALTER, DROP, TRUNCATE, etc.

  • DML commands include INSERT, UPDATE, DELETE, SELECT, etc.

  • DDL commands are used to create or modify the structure of database objects like tables, indexes, etc.

  • DML commands are used to manipulate data stored in the database tables.

  • Example of...read more

Add your answer

Q147. What strategies can be employed to overcome failures?

Ans.

Strategies to overcome failures include learning from mistakes, staying positive, seeking feedback, and setting new goals.

  • Learn from mistakes by analyzing what went wrong and how to improve

  • Stay positive and maintain a growth mindset to bounce back from setbacks

  • Seek feedback from mentors or colleagues to gain different perspectives

  • Set new goals and create a plan to move forward with renewed motivation

Add your answer

Q148. OOP in python study properly

Ans.

OOP in Python refers to the concept of using classes and objects to organize and structure code.

  • Python supports object-oriented programming (OOP) principles such as encapsulation, inheritance, and polymorphism.

  • Classes are used to define objects, which can have attributes (variables) and methods (functions).

  • Inheritance allows a class to inherit attributes and methods from another class.

  • Polymorphism enables objects to be treated as instances of their parent class or their own c...read more

Add your answer

Q149. What is ACID PROPERTIES?

Ans.

ACID properties are a set of properties that guarantee that database transactions are processed reliably.

  • ACID stands for Atomicity, Consistency, Isolation, Durability

  • Atomicity ensures that either all operations in a transaction are completed successfully or none are

  • Consistency ensures that the database remains in a consistent state before and after the transaction

  • Isolation ensures that multiple transactions can be executed concurrently without affecting each other

  • Durability e...read more

Add your answer

Q150. Array lists vs arrays

Ans.

Array lists are dynamic in size, while arrays have fixed sizes.

  • Array lists can grow or shrink in size dynamically, while arrays have a fixed size.

  • Array lists are implemented using dynamic arrays, while arrays are static data structures.

  • Array lists provide methods for adding, removing, and accessing elements easily, while arrays require manual resizing and shifting of elements.

  • Example: ArrayList<String> vs String[]

Add your answer

Q151. Q.) Difference Between SQL and MySQL Q.) Class Loader in JAVA

Add your answer

Q152. What is data query and data flow?

Ans.

Data query is the process of retrieving specific data from a database, while data flow is the movement of data from one point to another.

  • Data query involves writing SQL queries to extract specific data from a database

  • Data flow refers to the movement of data from source to destination through various transformations

  • Data query is used to filter and retrieve relevant data, while data flow ensures data is processed and moved efficiently

  • Example: Data query can be used to extract s...read more

Add your answer

Q153. What is Calculated column and Measure?

Ans.

Calculated column is a static column in a table calculated based on a formula, while Measure is a dynamic calculation based on aggregated data.

  • Calculated column is created in Power BI using DAX formula and stored in the data model.

  • Measure is a calculation performed on the fly based on the context of the visualization.

  • Calculated columns are static and can be used for filtering and sorting, while Measures are dynamic and used for aggregations like sum, average, etc.

Add your answer

Q154. What is query folding in power BI?

Ans.

Query folding in Power BI is a process where Power BI pushes the data transformation steps back to the data source.

  • Query folding improves performance by reducing the amount of data loaded into Power BI.

  • It allows Power BI to leverage the capabilities of the data source for data transformation.

  • Commonly used with relational databases like SQL Server, Oracle, etc.

  • Example: When filtering data in Power BI, query folding will push the filter operation back to the database for proces...read more

Add your answer

Q155. Difference between data blending and cross database join

Ans.

Data blending combines data from multiple sources while cross database join combines data from different tables in the same database.

  • Data blending is used when data is stored in different sources like Excel, CSV, or databases.

  • Cross database join is used when data is stored in different tables within the same database.

  • Data blending creates a relationship between the data sources based on common dimensions.

  • Cross database join combines data based on a common field or key.

  • Data bl...read more

Add your answer

Q156. Types of Joins

Ans.

Types of joins in SQL are inner join, left join, right join, and full outer join.

  • Inner join: Returns rows when there is a match in both tables.

  • Left join: Returns all rows from the left table and the matched rows from the right table.

  • Right join: Returns all rows from the right table and the matched rows from the left table.

  • Full outer join: Returns rows when there is a match in either table.

Add your answer

Q157. TCP/IP vs UDP

Ans.

TCP/IP is a connection-oriented protocol that ensures data delivery, while UDP is a connectionless protocol that prioritizes speed.

  • TCP/IP is reliable as it guarantees delivery of data packets in the correct order.

  • UDP is faster as it does not require a connection setup before transmitting data.

  • TCP/IP is used for applications that require high reliability, such as web browsing and email.

  • UDP is used for real-time applications like online gaming and video streaming.

  • TCP/IP include...read more

Add your answer
Asked in
ASE Interview

Q158. Tell me about one deadlock algorithm

Ans.

One deadlock algorithm is the Banker's algorithm.

  • Banker's algorithm is used to avoid deadlock in a multi-process system.

  • It works by checking if a request for resources will leave the system in a safe state.

  • If the request will not leave the system in a safe state, it is denied.

  • The algorithm keeps track of available resources and the maximum resources each process can request.

  • It also keeps track of the resources currently allocated to each process.

  • If a process requests resource...read more

Add your answer

Q159. how will you automate API using selenium webdriver.

Ans.

To automate API using Selenium WebDriver, we can use tools like RestAssured and create test scripts to interact with API endpoints.

  • Use RestAssured library to send HTTP requests and validate responses

  • Create test scripts to interact with API endpoints and verify data

  • Utilize Selenium WebDriver to automate the process of sending requests and validating responses

Add your answer

Q160. what is difference b/w redux and redux toolkit

Ans.

Redux Toolkit is a set of tools and best practices to simplify Redux development, while Redux is a predictable state container for JavaScript apps.

  • Redux Toolkit provides a set of tools like createSlice, createAsyncThunk, and configureStore to simplify Redux setup and reduce boilerplate code.

  • Redux Toolkit includes immer library for writing immutable update logic in a more convenient way.

  • Redux Toolkit also includes a default setup for Redux DevTools Extension integration.

  • Redux ...read more

Add your answer

Q161. what inline level and block level elements

Ans.

Inline and block level elements are two types of HTML elements with different display behaviors.

  • Inline elements flow in the same line as surrounding content, while block level elements take up the full width available.

  • Examples of inline elements include <span>, <a>, and <strong>.

  • Examples of block level elements include <div>, <p>, and <h1>.

Add your answer

Q162. What is RANK &amp; DENSE RANK in SQL

Ans.

RANK assigns a unique rank to each row based on a specified column, while DENSE RANK assigns a unique rank to each distinct row.

  • RANK function is used to assign a unique rank to each row based on a specified column

  • DENSE RANK function is used to assign a unique rank to each distinct row, skipping ranks if there are ties

  • RANK and DENSE RANK are commonly used in SQL queries to rank data based on certain criteria

Add your answer

Q163. Namespaces in python

Ans.

Namespaces in Python are a way to organize and group related code together.

  • Namespaces prevent naming conflicts and improve code readability.

  • Python uses a hierarchical namespace structure.

  • Namespaces can be created using modules, classes, and functions.

  • The 'global' and 'local' keywords are used to access variables in different namespaces.

  • Examples of namespaces in Python include built-in, global, and local namespaces.

Add your answer
Q164. Can you explain scheduling in operating systems?
Add your answer

Q165. What are most Routine sections of TDS? What deductions are allowed under chp vi a of income tax.

Ans.

Routine sections of TDS include salary, interest on securities, interest other than interest on securities, winnings from lotteries, crossword puzzles, card games, and other games of any sort, and winnings from horse races.

  • Salary

  • Interest on securities

  • Interest other than interest on securities

  • Winnings from lotteries

  • Winnings from crossword puzzles, card games, and other games of any sort

  • Winnings from horse races

Add your answer

Q166. Flexible with moving

Ans.

I am open to relocating for the right opportunity.

  • I am willing to move to different locations for career growth

  • I understand the importance of being flexible with relocation for job opportunities

  • I have experience moving for previous job opportunities, such as relocating for internships or projects

Add your answer
Asked in
ASE Interview

Q167. What does deadlock mean?

Ans.

Deadlock is a situation where two or more processes are unable to proceed because they are waiting for each other to release resources.

  • Occurs in multi-process systems

  • Processes are stuck in a circular wait

  • Can lead to system crashes or freezes

  • Prevented by proper resource allocation and scheduling

  • Example: Process A holds resource X and waits for resource Y, while process B holds resource Y and waits for resource X

Add your answer

Q168. Difference between power query and direct query

Ans.

Power Query is used to import and transform data within Power BI, while Direct Query allows real-time data access from the data source.

  • Power Query is used to import and transform data within Power BI before loading it into the data model.

  • Direct Query allows Power BI to query the data source directly in real-time, without importing the data into the data model.

  • Power Query is suitable for smaller datasets that can be loaded into memory, while Direct Query is ideal for large dat...read more

Add your answer

Q169. Write merge sort

Ans.

Merge sort is a divide and conquer algorithm that recursively splits an array into halves, sorts them, and then merges them back together.

  • Divide the array into two halves

  • Recursively sort each half

  • Merge the sorted halves back together

Add your answer

Q170. Divisible by 2 code

Ans.

Write a code to check if a number is divisible by 2.

  • Use the modulo operator (%) to check if the remainder is 0 when divided by 2.

  • If the remainder is 0, then the number is divisible by 2.

  • Example: if(num % 2 == 0) { // divisible by 2 }

Add your answer

Q171. Explain ur experience

Ans.

I have 5 years of experience working as a Data Engineer in various industries.

  • Developed ETL pipelines to extract, transform, and load data from multiple sources into a data warehouse

  • Optimized database performance by tuning queries and indexes

  • Implemented data quality checks to ensure accuracy and consistency of data

  • Worked with cross-functional teams to design and implement data solutions for business needs

Add your answer

Q172. SQL: Find keys present in table A but not in B(B is old copy of A)

Ans.

Use SQL to find keys present in table A but not in table B (old copy of A).

  • Use a LEFT JOIN to combine tables A and B based on the key column

  • Filter the results where the key column in table B is NULL

  • This will give you the keys present in table A but not in table B

Add your answer

Q173. Case Study: Using GCP's tool make a pipeline to transfer file from one GCS bucket to another

Ans.

Use GCP Dataflow to transfer files between GCS buckets

  • Create a Dataflow pipeline using Apache Beam to read from source bucket and write to destination bucket

  • Use GCS connector to read and write files in Dataflow pipeline

  • Set up appropriate permissions for Dataflow service account to access both buckets

Add your answer

Q174. Default join in tableau

Ans.

Default join in Tableau is inner join

  • Default join in Tableau is inner join, which only includes rows that have matching values in both tables

  • Other types of joins in Tableau include left join, right join, and full outer join

  • To change the default join type in Tableau, you can drag the field from one table to another and select the desired join type

Add your answer

Q175. Your interest in all Shift Timings ?

Ans.

I am flexible with all shift timings and can adapt to different schedules as needed.

  • I have experience working in both morning and night shifts in my previous job.

  • I am willing to work weekends and holidays if required.

  • I understand the importance of being available for different shifts to meet the needs of the business.

Add your answer

Q176. The standard size of a concrete cube is 15 cm × 15 cm × 15 cm

Ans.

Yes, the standard size of a concrete cube is 15 cm × 15 cm × 15 cm.

  • The standard size of a concrete cube is used for testing the compressive strength of concrete.

  • The cubes are casted and cured for 28 days before testing.

  • The cubes are tested using a compression testing machine.

  • The compressive strength of concrete is calculated by dividing the maximum load applied to the cube by the cross-sectional area of the cube.

Add your answer

Q177. Explain virtual function and static method in C++

Add your answer

Q178. what is react hooks explain some

Ans.

React Hooks are functions that let you use state and other React features without writing a class.

  • React Hooks were introduced in React 16.8.

  • They allow you to use state and other React features in functional components.

  • Some commonly used hooks are useState, useEffect, useContext, and useRef.

  • Hooks make it easier to reuse logic across components.

  • Hooks can be used to manage component state, perform side effects, and more.

Add your answer

Q179. how to manage state using redux

Ans.

Redux is a predictable state container for JavaScript apps. It helps manage the state of an application in a centralized store.

  • Create a Redux store to hold the state of the application

  • Define actions to describe state changes

  • Write reducers to specify how the state changes in response to actions

  • Dispatch actions to update the state in the store

  • Connect components to the Redux store using the connect function from react-redux

Add your answer

Q180. recursion in java implementation

Ans.

Recursion in Java is a programming technique where a method calls itself to solve a problem.

  • Recursion involves breaking down a problem into smaller subproblems and solving them recursively.

  • A base case is needed to stop the recursion and prevent infinite loops.

  • Example: Factorial calculation using recursion - int factorial(int n) { return (n == 0) ? 1 : n * factorial(n-1); }

Add your answer

Q181. What are various data visualisation platforms

Ans.

Various data visualisation platforms include Tableau, Power BI, Google Data Studio, and D3.js.

  • Tableau

  • Power BI

  • Google Data Studio

  • D3.js

Add your answer

Q182. tell me about types of Context

Ans.

Types of context refer to the different ways in which data can be analyzed and interpreted in Power BI.

  • Row context: evaluates calculations row by row

  • Filter context: applies filters to data before calculations

  • Query context: used in DAX queries to retrieve data

  • Relationship context: determines how tables are related

Add your answer

Q183. What do you mean by polymorphism?

Ans.

Polymorphism is the ability of a function or method to behave differently based on the object it is acting upon.

  • Polymorphism allows objects of different classes to be treated as objects of a common superclass.

  • There are two types of polymorphism: compile-time (method overloading) and runtime (method overriding).

  • Example: Inheritance in OOP allows a child class to override a method from its parent class, exhibiting polymorphic behavior.

Add your answer

Q184. how to defain generators?

Ans.

Generators are functions that can pause and resume their execution, allowing for lazy evaluation of values.

  • Generators are defined using the function* syntax in JavaScript.

  • They use the yield keyword to pause execution and return a value.

  • Generators can be iterated over using a for...of loop.

  • They are useful for generating sequences of values on demand.

Add your answer

Q185. what is instance verable?

Ans.

Instance variable is a variable declared in a class, but outside of any method. It is unique to each object of the class.

  • Instance variables are also known as member variables or attributes.

  • They hold data that is unique to each object created from the class.

  • Example: In a class representing a car, instance variables could include 'color', 'model', and 'year'.

Add your answer
Asked in
ASE Interview

Q186. What is a foreign key?

Ans.

A foreign key is a column or set of columns in a database table that refers to the primary key of another table.

  • It establishes a link between two tables.

  • It ensures referential integrity.

  • It helps in maintaining data consistency.

  • It can be used to join tables in a query.

  • Example: A 'customer' table may have a foreign key that refers to the 'order' table's primary key.

Add your answer

Q187. pyspark optimization technique

Ans.

One pyspark optimization technique is using broadcast variables to efficiently distribute read-only data across all nodes.

  • Use broadcast variables to efficiently distribute read-only data across all nodes

  • Avoid shuffling data unnecessarily by using partitioning and caching

  • Optimize data processing by using appropriate transformations and actions

Add your answer

Q188. How do you work on performance optimization

Ans.

I work on performance optimization by analyzing query execution plans, indexing, and code refactoring.

  • Analyzing query execution plans to identify bottlenecks

  • Creating appropriate indexes to improve query performance

  • Refactoring code to optimize resource usage

  • Using tools like Explain Plan and SQL Tuning Advisor

Add your answer

Q189. What is function in Java?

Ans.

A function in Java is a block of code that performs a specific task. It can be called multiple times within a program.

  • Functions in Java are defined using the 'public static' keywords.

  • They can have parameters and return a value.

  • Example: public static int add(int a, int b) { return a + b; }

Add your answer

Q190. What is jav acompiler?

Ans.

Java compiler is a tool that translates Java source code into bytecode.

  • Java compiler converts Java source code (.java files) into bytecode (.class files)

  • It checks for syntax errors and generates executable code

  • Examples of Java compilers include javac (command-line compiler) and Eclipse compiler

Add your answer

Q191. What is COND parameter?

Ans.

COND parameter is used to specify the condition code value of the previous step to determine the execution of the current step.

  • It is used in JCL statements like IF, ELSEIF, and COND.

  • It can be used to execute a step conditionally based on the return code of the previous step.

  • It can also be used to skip a step based on the return code of the previous step.

  • The syntax for COND parameter is COND=(code, operator, stepname).

Add your answer

Q192. What programming knowledge you have ?

Ans.

Proficient in Python, R, and SQL with experience in data manipulation, visualization, and machine learning algorithms.

  • Proficient in Python for data analysis and machine learning tasks

  • Experience with R for statistical analysis and visualization

  • Knowledge of SQL for querying databases and extracting data

  • Familiarity with libraries such as Pandas, NumPy, Matplotlib, and Scikit-learn

Add your answer

Q193. callable vs runnable?

Ans.

Callable is used to return a result and can throw checked exceptions, while Runnable is used for void operations.

  • Callable can return a result and throw checked exceptions, while Runnable cannot.

  • Callable is a functional interface with a method call() that returns a result, while Runnable is a functional interface with a method run() that does not return a result.

  • Example: Callable task = () -> { return 5 + 3; }; Runnable task = () -> { System.out.println("Hello World!"); };

Add your answer

Q194. Give me an example forINNER JOIN in sql

Ans.

INNER JOIN is used to combine rows from two or more tables based on a related column between them.

  • Use INNER JOIN to retrieve rows from both tables that have matching values in the specified column

  • Syntax: SELECT column_name(s) FROM table1 INNER JOIN table2 ON table1.column_name = table2.column_name

  • Example: SELECT Orders.OrderID, Customers.CustomerName FROM Orders INNER JOIN Customers ON Orders.CustomerID = Customers.CustomerID

Add your answer

Q195. Difference between C, C++ and Java

Ans.

C is a procedural language, C++ is an object-oriented language, and Java is a platform-independent language.

  • C is a procedural programming language, focusing on functions and procedures.

  • C++ is an extension of C with added features like classes and objects.

  • Java is a platform-independent language that runs on a virtual machine.

Add your answer

Q196. Code For parse Traingle

Ans.

Code for parsing a triangle

  • Use a loop to iterate through each line of the triangle

  • Split each line into an array of numbers

  • Store the parsed numbers in a 2D array or a list of lists

Add your answer

Q197. How to log the calls

Ans.

To log calls, create a system for recording and tracking information about each call.

  • Use a ticketing system or software to log calls

  • Include details such as caller information, issue description, and resolution

  • Assign unique reference numbers to each call for easy tracking

  • Categorize calls based on urgency or priority

  • Regularly update the call log with progress and resolution status

View 1 answer

Q198. Can we change wait time during runtime.

Ans.

Yes, wait time can be changed during runtime by adjusting the code logic or configuration settings.

  • Wait time can be changed by modifying the code to include dynamic wait times based on certain conditions.

  • Configuration settings in the application or system can also be adjusted to change wait times.

  • For example, in automated testing scripts, wait times can be adjusted based on the response time of the application being tested.

Add your answer

Q199. What you know about osi reference model

Ans.

The OSI reference model is a conceptual framework that standardizes the functions of a telecommunication or computing system into seven layers.

  • The OSI model stands for Open Systems Interconnection model

  • It helps in understanding how different networking protocols work together

  • Each layer has specific functions and communicates with adjacent layers

  • Examples of layers include physical layer, data link layer, network layer, etc.

Add your answer

Q200. Explain automation framework structure

Ans.

Automation framework structure is the organization of tools, libraries, and guidelines used for automated testing.

  • Automation framework consists of a set of guidelines, coding standards, and best practices.

  • It includes tools and libraries for test script development, execution, and reporting.

  • Frameworks can be data-driven, keyword-driven, modular, or hybrid.

  • Common frameworks include Selenium WebDriver for web testing and Appium for mobile testing.

Add your answer
1
2
3
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos
Top LTIMindtree Interview Questions And Answers
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
70 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter