
LTIMindtree

1500+ LTIMindtree Interview Questions and Answers
Q101. Write down Fibonacci series and also explain pseudo code for it?
Fibonacci series is a sequence of numbers where each number is the sum of the two preceding ones.
The first two numbers of the series are always 0 and 1
The next number is the sum of the previous two numbers
The series goes on infinitely: 0, 1, 1, 2, 3, 5, 8, 13, 21, 34, 55, 89, 144, ...
Pseudo code: 1. Initialize variables a=0, b=1, c=0 2. Print a and b 3. Repeat steps 4-6 until desired number of terms 4. c=a+b 5. Print c 6. a=b, b=c
Q102. What are the linux distributions you are using in customer environment?
We are using various Linux distributions based on customer requirements.
Red Hat Enterprise Linux
Ubuntu
CentOS
SUSE Linux Enterprise
Debian
Yes, it is allowed in C++ to have two functions with the same name as long as they have different parameters.
Function overloading in C++ allows multiple functions with the same name but different parameters.
The compiler distinguishes between the functions based on the number or types of parameters.
Example: void display(int x) and void display(float y) can coexist in C++.
Q104. 1. How to get last property of an object in js? 2. Count the number of properties in object? 3. How do you trigger lambda with s3 ?
1. To get the last property of an object in JavaScript, you can use Object.keys() method. 2. To count the number of properties in an object, you can use Object.keys() method. 3. To trigger a lambda function with S3, you can use S3 event notifications.
To get the last property of an object in JavaScript, you can use Object.keys() method and access the last key in the array.
To count the number of properties in an object, you can use Object.keys() method and get the length of the...read more
Q105. How would you implement a data security or Data Loss Prevention (DLP) solution from scratch in our organization, and if policies are already in place, what steps would you take to enhance our security posture?
Implementing a data security or DLP solution from scratch and enhancing existing security posture.
Conduct a thorough assessment of current data security measures and identify potential vulnerabilities
Define data classification policies to categorize sensitive information
Select and implement a DLP solution that aligns with the organization's needs and budget
Configure the DLP solution to monitor and protect data in transit, at rest, and in use
Establish incident response procedu...read more
Intermediate operations return a new stream and allow further operations, while terminal operations produce a result or side-effect.
Intermediate operations include filter(), map(), sorted(), etc.
Terminal operations include forEach(), collect(), reduce(), etc.
Intermediate operations are lazy and only executed when a terminal operation is called.
Terminal operations are eager and trigger the stream to process the data.
A hash map in Java is a data structure that stores key-value pairs and uses hashing to efficiently retrieve values based on keys.
Hash map uses an array to store key-value pairs.
Keys are hashed to determine the index where the value will be stored.
Collision resolution techniques like chaining or open addressing are used to handle hash collisions.
Example: HashMap<String, Integer> map = new HashMap<>(); map.put("key", 123); int value = map.get("key");
Q108. 1. How to handle exception in microservices? 2.What is config server 3.ClassNotFoundException vs NoClassDefException
Handling exceptions in microservices, config server, ClassNotFoundException vs NoClassDefException
1. Exception handling in microservices involves using try-catch blocks to catch and handle exceptions at the service level.
2. Config server is a centralized server that stores configuration information for microservices, allowing them to retrieve configurations at runtime.
3. ClassNotFoundException occurs when a class is not found at runtime, while NoClassDefFoundError occurs when...read more
Q109. How will you achieve OOPS feature in real word scenario? Any Example?
OOPS features can be achieved by implementing concepts like inheritance, polymorphism, encapsulation, and abstraction.
Inheritance can be used to create a new class from an existing class, inheriting its properties and methods.
Polymorphism allows objects to take on multiple forms, depending on the context in which they are used.
Encapsulation involves hiding the implementation details of a class from the outside world, and only exposing a public interface.
Abstraction involves c...read more
Q110. What is RAD model and tell me how can you use RAD model in your project?
RAD model is a rapid application development model that focuses on iterative development and prototyping.
RAD model involves continuous feedback and collaboration between developers and customers
It emphasizes on delivering a working prototype as quickly as possible
RAD model is suitable for projects with well-defined requirements and tight deadlines
It can be used in SAP projects for developing custom applications or enhancing existing ones
RAD model can help in reducing developm...read more
Q111. how you can take the .jar file from jenkins nexus repo to apache tomcat container
Use Tomcat Manager to deploy .jar file from Jenkins Nexus repo to Apache Tomcat container.
Configure Tomcat Manager credentials in Tomcat's server.xml file.
Add Tomcat Manager plugin to Jenkins and configure credentials.
Create a Jenkins job to download .jar file from Nexus repo and use Tomcat Manager API to deploy it to Tomcat container.
Alternatively, use Maven plugin to deploy .jar file to Tomcat container.
Ensure proper permissions and firewall rules are set up.
Test the deploy...read more
Q112. How to insert a java code in (html tags) 9
You can insert Java code in HTML tags using the <script> tag.
Use the <script> tag to insert Java code within HTML tags.
Make sure to properly close the <script> tag.
Example: <script>System.out.println('Hello, World!');</script>
Q113. Write a program to print unique elements in an array in java
Program to print unique elements in an array in Java
Create a HashSet to store unique elements
Iterate through the array and add each element to the HashSet
Print the HashSet to get the unique elements
Q114. Remove all the pcs from the lab and keep in other lab RIGHT NOW?
Yes, I can remove all the pcs from the lab and keep them in another lab right now.
Ensure all the necessary equipment and tools are available for the move
Coordinate with the lab staff to ensure a smooth transition
Label and document each PC for easy identification and setup in the new lab
Ensure proper packaging and handling to prevent any damage during the move
Q115. What are analytical functions, what is the difference between rank and dens_rank, different types of joins, what is the difference between view and materialized view, different types of refresh methods in Mview...
read moreAnalytical functions are used to perform calculations across a set of rows. Rank assigns a unique rank to each row, while dens_rank assigns consecutive ranks.
Analytical functions are used to perform calculations across a set of rows in a table.
Rank function assigns a unique rank to each row based on the specified order.
Dens_rank function assigns consecutive ranks to rows, leaving no gaps between ranks.
Types of joins include inner join, outer join, left join, right join, etc.
A...read more
Q116. What is the operating system what was he can use it
There are multiple operating systems that can be used depending on the hardware and software requirements.
Windows operating system is commonly used in desktops and laptops.
Linux operating system is commonly used in servers and embedded systems.
macOS operating system is commonly used in Apple computers.
Android operating system is commonly used in mobile devices.
iOS operating system is commonly used in Apple mobile devices.
Q117. How to navigate between iFrames when both name and id are not present for the frame in DOM ?
Q118. code based on reverse a string and search an element.
Code to reverse a string and search an element.
To reverse a string, use a loop to iterate through the string and append each character to a new string in reverse order.
To search for an element in a string, use the indexOf() method or a loop to iterate through the string and check each character.
Example: function reverseAndSearch(str, elem) { let reversed = ''; for(let i = str.length - 1; i >= 0; i--) { reversed += str[i]; } return reversed.indexOf(elem) !== -1; }
Q119. How did you implement (a particular feature) in reactjs.
I implemented (a particular feature) in ReactJS using (specific method/technique).
Identified the specific feature requirements
Researched and selected the appropriate ReactJS library or tool
Implemented the feature using ReactJS components and state management
Tested and debugged the feature for optimal performance
Integrated the feature with the rest of the application
Continuously monitored and improved the feature as needed
Q120. What are directives in Angular, and how do they function?
Directives in Angular are markers on DOM elements that tell Angular to attach a specified behavior to that DOM element or transform it.
Directives are used to create reusable components or add behavior to existing components.
There are three types of directives in Angular: Component, Structural, and Attribute directives.
Component directives are used to create custom components with their own templates and logic.
Structural directives change the DOM layout by adding or removing e...read more
Q121. What is the process by which an Angular application operates?
Angular applications operate by following a specific lifecycle process.
Angular application starts by bootstrapping the root module.
Components are created and rendered based on the component tree.
Data binding ensures synchronization between the model and view.
Angular runs change detection to update the view when data changes.
Services provide shared data and functionality across components.
Q122. How to remove extra spaces in Python ?
Use the split() and join() methods to remove extra spaces in Python.
Split the string using split() method to create a list of words.
Use join() method to join the words back together with a single space between them.
Use strip() method to remove any leading or trailing spaces.
Q123. What is abstraction? Explain with example
Abstraction is the process of hiding complex implementation details and exposing only the necessary information.
Abstraction helps in reducing complexity and increasing efficiency.
It allows us to focus on the essential features of an object or system.
For example, a car can be abstracted as a vehicle with certain properties like speed, fuel efficiency, and seating capacity.
Abstraction can be achieved through interfaces, abstract classes, and encapsulation.
Q124. how to call 1 webservice to another webservices
To call one webservice from another, use the endpoint URL and pass required parameters.
Identify the endpoint URL of the webservice to be called
Pass the required parameters to the endpoint URL
Handle the response from the webservice
Ensure proper error handling and logging
Q125. What is plugins,factory, dependency injection,rest api,ui components, how you will resolve some queries
Explanation of plugins, factory, dependency injection, REST API, and UI components and how to resolve queries related to them.
Plugins are software components that add specific functionality to an existing application.
A factory is a design pattern that provides an interface for creating objects in a superclass, but allows subclasses to alter the type of objects that will be created.
Dependency injection is a technique where an object receives its dependencies from an external s...read more
Q126. 2. Tell me about software testing methodologies?
Software testing methodologies are techniques used to test software for quality and functionality.
There are several types of testing methodologies such as black box testing, white box testing, and gray box testing.
Black box testing focuses on testing the functionality of the software without knowledge of its internal workings.
White box testing involves testing the internal workings of the software, including code and algorithms.
Gray box testing is a combination of black and w...read more
Q127. How do you open Device Manager In windows ?
Device Manager can be opened in Windows using multiple methods.
Press Windows key + X and select Device Manager
Open Run dialog box (Windows key + R) and type devmgmt.msc
Search for Device Manager in Windows search bar
Right-click on This PC/My Computer and select Manage, then select Device Manager from the left pane
Q128. HashMap storing and fetching the elements in various ways using java 7 and 8 as well.
HashMap can store and fetch elements in various ways using Java 7 and 8.
In Java 7, we can use put() and get() methods to store and fetch elements respectively.
In Java 8, we can use forEach() and compute() methods to store and fetch elements respectively.
We can also use keySet(), values(), and entrySet() methods to retrieve keys, values, and key-value pairs respectively.
Java 8 also introduced the stream() method for HashMap, which allows for more efficient processing of large ...read more
Q129. How can resources be shared between two node instances?
Resources can be shared between two node instances using inter-process communication methods like message passing or shared memory.
Use message passing mechanisms like sockets, message queues, or RPC to share data between node instances
Implement shared memory using techniques like memory-mapped files or shared buffers to allow direct access to shared resources
Use synchronization mechanisms like locks, semaphores, or mutexes to coordinate access to shared resources
Consider usin...read more
MVC architecture separates concerns, improves code organization, promotes reusability, and enhances maintainability.
Separates concerns: MVC separates the application into three main components - Model, View, and Controller, allowing for easier management of code and logic.
Improves code organization: Each component in MVC has a specific role, making it easier to organize and maintain code.
Promotes reusability: With clear separation of concerns, components can be reused in diff...read more
RANK() assigns a unique rank to each row based on the specified column, while ROW_NUMBER() assigns a unique sequential row number to each row.
RANK() may have gaps in the ranking if there are ties, while ROW_NUMBER() will not have any gaps.
RANK() will assign the same rank to rows with the same value, while ROW_NUMBER() will assign a unique row number to each row.
ROW_NUMBER() is used to generate a unique sequential number for each row in a result set, while RANK() is used to as...read more
Q132. What is Function App and Logic App in Azure
Function App is a serverless compute service that enables you to run code on demand. Logic App is a workflow automation service.
Function App is used to run code on demand without worrying about infrastructure
Logic App is used to automate workflows and integrate systems
Function App supports multiple languages and platforms
Logic App has a visual designer to create workflows
Example: A Function App can be used to process data from a queue
Example: A Logic App can be used to automa...read more
Q133. What is the application lifecycle in ASP.NET MVC
The application lifecycle in ASP.NET MVC involves several stages from initialization to disposal.
The application starts with the Application_Start event in Global.asax
The request is then routed to the appropriate controller and action
The controller processes the request and returns a view
The view is rendered and returned to the client
The application can be configured to use various middleware and services
The application can be monitored and debugged using tools like Visual St...read more
Q134. structure of an html file or DOM structure use of meta tag what are hooks in react how to import index.css in index.js router in react where is styling done and some other basic web dev questions
Basic web development questions covering HTML structure, meta tags, React hooks, CSS import, and routing.
HTML file structure includes <html>, <head>, and <body> tags
Meta tags provide metadata about the HTML document
React hooks are functions that let you use state and other React features in functional components
To import index.css in index.js, use 'import './index.css';' at the top of the index.js file
React Router is a standard library for routing in React applications
Styling...read more
Q135. How can multithreading be implemented in a Java microservices application?
Multithreading in Java microservices can be implemented using Java's built-in threading capabilities.
Use Java's Executor framework to manage threads in a microservices application.
Implement asynchronous processing using CompletableFuture to improve performance.
Consider using thread pools to manage resources efficiently.
Use synchronized blocks or locks to handle shared resources safely.
Leverage Java's concurrent data structures like ConcurrentHashMap for thread-safe operations...read more
Q136. What is normalization and denormalization?
Normalization is the process of organizing data in a database to reduce redundancy and improve data integrity. Denormalization is the opposite process.
Normalization involves breaking down a table into smaller tables and establishing relationships between them.
Denormalization involves combining tables to improve performance by reducing the number of joins required.
Normalization helps to prevent data inconsistencies and anomalies.
Denormalization can improve query performance bu...read more
Q137. What is Single Page Application ?
Single Page Application is a web application that loads a single HTML page and dynamically updates the content.
Loads a single HTML page
Dynamically updates the content
Uses AJAX and JavaScript frameworks
Provides a seamless user experience
Examples: Gmail, Facebook, Twitter
Q138. 1. Write code to count number of hand shakes between N number of people. 2. Create a class and write function using the OOPs concept
Code to count handshakes between N people and a class using OOPs concept.
For counting handshakes, use a loop to iterate through each person and add up the handshakes with the remaining people.
For the class, define attributes and methods based on the requirements and use encapsulation, inheritance, and polymorphism concepts.
Example: class Person with attributes name and age, and method greet(). Class Employee inherits from Person and has additional attribute salary and method ...read more
Q139. How to you can find the troubleshooting and how to fix it
To troubleshoot, identify the problem and its root cause. Then, use appropriate tools and techniques to fix it.
Identify the problem and its root cause
Use appropriate tools and techniques to fix it
Test the solution to ensure it resolves the issue
Document the troubleshooting process and solution for future reference
Q140. What are the differences between lists and arrays in the Python programming language?
Lists are dynamic arrays in Python that can hold different data types, while arrays are fixed-size and can only hold a single data type.
Lists can hold different data types, while arrays can only hold a single data type.
Lists are dynamic in size, while arrays have a fixed size.
Lists are more flexible and versatile compared to arrays.
Example: list_example = [1, 'hello', True]
Example: array_example = array('i', [1, 2, 3])
Q141. What is meant by integration testing?
Integration testing is the process of testing the interaction between different components or modules of a software system.
It involves testing the interfaces between modules
It ensures that the modules work together as expected
It can be done manually or with automated tools
Examples include testing the integration between a database and a web application, or between different microservices in a distributed system
StringBuffer is synchronized and thread-safe, while StringBuilder is not synchronized and faster.
StringBuffer is synchronized, making it thread-safe for use in multi-threaded environments.
StringBuilder is not synchronized, making it faster but not thread-safe.
Use StringBuffer when thread safety is needed, and StringBuilder for better performance in single-threaded scenarios.
Q143. What was the optimum depth in Assam & Assam-Arakan Basin?
The optimum depth in Assam & Assam-Arakan Basin varies depending on the specific location and geological factors.
The optimum depth in Assam & Assam-Arakan Basin is determined by various factors such as the presence of hydrocarbon reservoirs, geological structures, and exploration data.
Geoscientists analyze seismic data, well logs, and geological models to identify the most promising depths for oil and gas exploration.
The optimum depth can vary significantly within the basin, ...read more
Q144. What was the Seismic processing Sequences in 3D Seismic Survey?
The seismic processing sequences in a 3D seismic survey involve several steps to enhance the quality and interpretability of the data.
Data acquisition: Collecting seismic data using an array of sensors or geophones.
Field processing: Initial processing steps performed on-site to remove noise and correct for acquisition-related issues.
Data preprocessing: Further processing steps performed in the office to enhance the data quality, including noise removal, filtering, and amplitu...read more
Q145. What was the differences between Muliplex and Demultiplex data?
Multiplex data refers to the process of combining multiple signals into a single signal, while demultiplex data refers to the process of separating a single signal into multiple signals.
Multiplexing combines multiple signals into one, while demultiplexing separates one signal into multiple signals.
Multiplexing is commonly used in telecommunications to transmit multiple signals over a single channel.
Demultiplexing is the reverse process of multiplexing, where a single signal i...read more
Q146. What was the header file in Seismic processing software?
The header file in Seismic processing software contains metadata about the seismic data.
The header file includes information such as acquisition parameters, processing history, and data quality.
It is typically in a binary format and is read by the processing software to properly interpret the seismic data.
Examples of header file formats include SEGY and SEG-D.
The header file is essential for proper seismic data management and interpretation.
Q147. Write a program to replace the character with another character in java.
A program to replace a character with another character in Java.
Create a string variable with the original text
Use the replace() method to replace the character with another character
Print the new string with the replaced character
Q148. what is email studio and how will you send an email ?
Email Studio is a Salesforce tool for creating and sending personalized emails to targeted audiences.
Create an email in Email Studio using drag-and-drop tools or HTML coding
Select a targeted audience using Salesforce data
Preview and test the email before sending
Schedule or send the email to the selected audience
Track email performance and engagement metrics
Q149. What is calculate and filter function in power bi? 2. Latest features in power bi. 3. Conditional formatting in power bi. 4. Pivot and unpivot table in power bi. 5. Cardinality in power bi. 6. Star and snowflak...
read moreCalculate and filter functions in Power BI are used for performing calculations and filtering data in reports.
Calculate function is used to create new calculated columns or measures based on existing data in Power BI.
Filter function is used to apply filters to data in Power BI reports to display specific information.
Examples: CALCULATE(SUM(Sales[Amount]), 'Date'[Year]=2021) - calculates total sales amount for the year 2021.
FILTER('Product', 'Product'[Category] = 'Electronics'...read more
Q150. What is oops?what is difference between static and final?
OOPs stands for Object-Oriented Programming. Static is a keyword used to create a class-level variable or method. Final is a keyword used to declare a constant value.
OOPs is a programming paradigm that focuses on objects and their interactions.
Static variables or methods belong to the class and not to the instance of the class.
Final variables cannot be changed once they are assigned a value.
Static and final can be used together to create a class-level constant.
Example: public...read more
Collections in Java are frameworks that provide an architecture to store and manipulate a group of objects.
Collections provide interfaces (List, Set, Map) and classes (ArrayList, HashSet, HashMap) to store and manipulate groups of objects.
Collections offer methods to add, remove, and retrieve elements from the group.
Examples include ArrayList, LinkedList, HashSet, TreeSet, HashMap, TreeMap.
Q152. Explain about AWS services such as EC2, S3 and Lambda's.
EC2 is a virtual server in the cloud, S3 is a scalable storage service, and Lambda is a serverless computing service.
EC2 (Elastic Compute Cloud) provides resizable compute capacity in the cloud.
S3 (Simple Storage Service) is object storage built to store and retrieve any amount of data.
Lambda allows you to run code without provisioning or managing servers.
Examples: EC2 can be used to host web applications, S3 can store files and data backups, Lambda can run code in response t...read more
Q153. What are the OOPs concept explain?
OOPs (Object-Oriented Programming) concepts include inheritance, polymorphism, encapsulation, and abstraction.
Inheritance: Allows a class to inherit properties and behavior from another class. Example: Parent class 'Animal' and child class 'Dog'.
Polymorphism: Ability to present the same interface for different data types. Example: Method 'drawShape' can be used for different shapes.
Encapsulation: Bundling data and methods that operate on the data into a single unit. Example: ...read more
Q154. What is Empathy Mapping & Affinity Mapping
Empathy Mapping & Affinity Mapping are two techniques used in UX design to understand user needs and preferences.
Empathy Mapping is a visual representation of a user's thoughts, feelings, and behaviors. It helps designers understand the user's perspective.
Affinity Mapping is a technique used to group and organize data collected during research. It helps designers identify patterns and themes.
Both techniques are used to gain insights into user needs and preferences, and to inf...read more
Q155. What are the key concepts of Object-Oriented Programming (OOP)?
Key concepts of OOP include encapsulation, inheritance, polymorphism, and abstraction.
Encapsulation: Bundling data and methods that operate on the data into a single unit (object).
Inheritance: Allowing a class to inherit properties and behavior from another class.
Polymorphism: The ability for objects of different classes to respond to the same method in different ways.
Abstraction: Hiding the complex implementation details and showing only the necessary features of an object.
Q156. Standard profiles on SFDC and what is web to lead in sfdc and how can you do it
Standard profiles on SFDC and web to lead in SFDC
Standard profiles in SFDC are pre-built sets of permissions and access levels for users
Web-to-Lead is a feature in SFDC that allows you to capture lead information from your website and automatically create a lead record in SFDC
To set up Web-to-Lead, you need to create a web form on your website and then configure the form to send the data to SFDC
Standard profiles can be assigned to users to control their access to different pa...read more
Q157. What is the hierarchy of different annotations in TestNG ?
Q158. How authentication sone in angular and SAML?
SAML is used for authentication in Angular by integrating SAML libraries and configuring SAML settings.
SAML libraries like 'angular-saml2-js' can be used to integrate SAML in Angular
SAML settings like 'issuer', 'identityProviderUrl', 'logoutUrl', etc. need to be configured
After successful authentication, SAML response is received and verified to grant access to the user
Q159. Explain custom functionality which you ever done?
Developed custom functionality for various projects.
Created a custom payment gateway integration for an e-commerce platform.
Implemented a personalized recommendation system based on user preferences for a streaming service.
Developed a custom data visualization tool for analyzing sales data in a retail application.
Q160. What is the process of migrating from on-premises infrastructure to Azure Cloud?
Migrating from on-premises infrastructure to Azure Cloud involves planning, assessment, migration, and optimization.
Assess current on-premises infrastructure and workloads
Plan the migration strategy including selecting appropriate Azure services
Migrate data and applications to Azure using tools like Azure Site Recovery or Azure Database Migration Service
Optimize resources in Azure for cost-efficiency and performance
Implement monitoring and management tools for ongoing mainten...read more
Q161. What is the Azure networking architecture, and can you explain the Hub and Spoke model?
Azure networking architecture includes Hub and Spoke model for centralized connectivity and security.
Azure networking architecture is based on virtual networks, subnets, and network security groups.
Hub and Spoke model is a networking design where a central 'hub' network connects to multiple 'spoke' networks.
The hub network acts as a central point for connectivity and security policies, while the spoke networks connect to the hub for communication.
This model allows for central...read more
Q162. What is the difference between a load balancer and an application gateway?
A load balancer distributes incoming network traffic across multiple servers, while an application gateway manages traffic at the application layer.
Load balancer operates at the network layer (Layer 4) and distributes traffic based on network-level information like IP address and port numbers.
Application gateway operates at the application layer (Layer 7) and can make routing decisions based on more complex criteria like URL path or HTTP headers.
Load balancer is typically use...read more
Q163. how would you validate the form using HTML? How do you validate the phone number with the country code?
Form validation using HTML and validating phone number with country code
Use HTML5 form validation attributes like 'required', 'pattern', 'minlength', etc.
For phone number validation, use 'pattern' attribute with regex for specific country code format
Example: <input type='tel' pattern='[0-9]{3}-[0-9]{3}-[0-9]{4}' required>
Q164. Explain the features of java 8 and java 11
Java 8 introduced features like lambda expressions, streams, and default methods. Java 11 introduced features like local-variable syntax for lambda parameters and HTTP client API.
Java 8: Lambda expressions allow functional programming in Java. Streams provide a way to work with collections. Default methods allow adding new methods to interfaces without breaking existing implementations.
Java 11: Local-variable syntax for lambda parameters simplifies code readability. HTTP clie...read more
Q165. how to consume web service in your application
To consume a web service in an application, use HTTP requests to send and receive data.
Identify the web service endpoint and its API documentation
Choose a programming language and framework to make HTTP requests
Send HTTP requests to the web service endpoint with required parameters
Receive and parse the response data from the web service
Handle errors and exceptions appropriately
Q166. What is the process of implementing OAuth for authentication?
OAuth implementation involves registering the application, obtaining client credentials, redirecting users to authorization server, exchanging authorization code for access token, and securing API calls.
Register the application with the OAuth provider
Obtain client credentials (client ID and client secret)
Redirect users to the authorization server for authentication
Exchange the authorization code for an access token
Secure API calls using the access token
Q167. What is the difference between functions and stored procedures?
Functions return a single value, while stored procedures can perform multiple operations and return multiple values.
Functions return a single value, while stored procedures can return multiple values.
Functions are called in SQL statements, while stored procedures are called using the EXECUTE command.
Functions cannot modify the database state, while stored procedures can.
Functions are precompiled and stored in the database, while stored procedures are compiled at runtime.
Funct...read more
Q168. 7) How does query acceleration speed up query processing?
Query acceleration speeds up query processing by optimizing query execution and reducing the time taken to retrieve data.
Query acceleration uses techniques like indexing, partitioning, and caching to optimize query execution.
It reduces the time taken to retrieve data by minimizing disk I/O and utilizing in-memory processing.
Examples include using columnar storage formats like Parquet or optimizing join operations.
Q169. How do you store a credit card number in python data types tell me use case
Credit card numbers should be stored securely using encryption and hashing algorithms.
Use encryption and hashing algorithms to store credit card numbers securely
Never store the full credit card number, only store the last 4 digits for identification purposes
Use a secure database to store the credit card information
Implement strict access controls to limit who can access the credit card information
Q170. Write a code to get a response for given respurce and base uri, what is serialization and deserialization ,how do you achieve them(pogo classes) etc
Code to get response for given resource and base URI, explanation of serialization and deserialization with POGO classes.
To get response for given resource and base URI, use HTTP client libraries like Apache HttpClient or OkHttp
Serialization is the process of converting an object into a stream of bytes to store or transmit it over a network. Deserialization is the reverse process of converting a stream of bytes back into an object.
POGO (Plain Old Java Object) classes are used...read more
Q171. What is incrimental and full load?
Incremental and full load are two methods of data extraction and loading.
Incremental load only extracts and loads new or updated data since the last load.
Full load extracts and loads all data every time.
Incremental load is faster and more efficient than full load.
Full load is useful when there are major changes in the data source.
Example: Incremental load extracts and loads only new customer data since the last load.
Example: Full load extracts and loads all customer data ever...read more
Q172. Why python is popular in market and java popularity is decreasing?
Python's simplicity, versatility, and ease of use make it popular. Java's complexity and verbosity make it less popular.
Python has a simpler syntax and is easier to learn than Java.
Python is versatile and can be used for a wide range of applications, including web development, data analysis, and artificial intelligence.
Java's verbosity and complexity make it less appealing to developers.
Python has a large and active community that contributes to its popularity.
Java's populari...read more
Q173. 6. What trouble shoot will you do if your browser stops working suddenly?
Q174. Write a program to display prime numbers from 1-35
Program to display prime numbers from 1-35
Loop through numbers 1-35
Check if each number is prime
If prime, display the number
Q175. Explain the Internal functionality of the hashmap.
Hashmap is a data structure that stores key-value pairs using a hash function.
Hashmap uses a hash function to map keys to their corresponding values.
It has constant time complexity for insertion, deletion, and retrieval.
Collisions can occur when two keys map to the same index, which is resolved using separate chaining or open addressing.
Load factor determines the threshold for resizing the hashmap.
Java's implementation of hashmap uses an array of linked lists for separate cha...read more
Q176. What are the access speacifier In C language?
Access specifiers in C language control the visibility and accessibility of variables and functions.
C language has three access specifiers: public, private, and protected.
Public variables and functions can be accessed from anywhere in the program.
Private variables and functions can only be accessed within the same file.
Protected variables and functions can be accessed within the same file and any derived classes.
Access specifiers are used in struct and class definitions to co...read more
Q177. What is callback hell and how to resolve
Callback hell is a situation where multiple nested callbacks make the code difficult to read and maintain.
Use named functions instead of anonymous functions to make code more readable.
Use promises or async/await to handle asynchronous operations in a more organized way.
Break down complex functions into smaller, more manageable functions.
Use libraries like async.js to handle asynchronous operations in a more structured manner.
Q178. Comparable and comparator concepts and sorting by use of comparator functional Interface.
Comparable and comparator concepts and sorting by use of comparator functional Interface.
Comparable interface is used to define natural ordering of objects
Comparator interface is used to define custom ordering of objects
Sorting can be done using Comparator functional interface
Example: Sorting a list of employees by their salary using Comparator
Q179. 1. Tel me about claim Adjudication process? 2. Tel me about difference between star & snowflake schema? 3. Difference between Medicare & Medicaid? 4. What is the difference between OLTP & OLTP? 5. What is DWHS?...
read moreThe interview questions cover topics related to healthcare claim adjudication, database schemas, healthcare programs, OLTP vs OLAP, DWHS, and dimension tables.
Claim adjudication process involves reviewing and processing insurance claims to determine payment or denial.
Star schema is a type of database schema where a central fact table is connected to multiple dimension tables, while snowflake schema normalizes dimension tables by splitting them into sub-dimensions.
Medicare is ...read more
Q180. How can u configure 2 DB in 1 spring boot application
You can configure 2 DB in 1 Spring Boot application by defining multiple DataSource beans and configuring them in application.properties.
Define multiple DataSource beans in your configuration class.
Configure each DataSource bean with its respective database properties in application.properties.
Use @Qualifier annotation to specify which DataSource to use in your repositories or services.
Q181. What is ASAP methodology explain with your experience?
ASAP methodology is a structured approach to implement SAP software.
ASAP stands for Accelerated SAP
It consists of five phases: Project Preparation, Business Blueprint, Realization, Final Preparation, and Go-Live and Support
Each phase has specific deliverables and tasks to be completed
ASAP methodology ensures that the implementation is completed on time, within budget, and meets the business requirements
I have used ASAP methodology in my previous project to implement SAP S/4HA...read more
Q182. What is Flow specially Record Triggered flow?
Record Triggered Flow is a type of Flow in Salesforce that is triggered when a record is created or updated.
Record Triggered Flow is used to automate processes in Salesforce based on changes to records.
It can be set to run before or after the record is saved.
Record Triggered Flow can access and update related records as well.
It is a powerful tool for automating complex business processes in Salesforce.
Q183. What are the different Product we have in CPQ?
CPQ offers multiple products including Configure, Price, Quote, Contract Management, and Billing.
Configure: Allows users to customize products based on customer needs
Price: Calculates pricing based on configurations and discounts
Quote: Generates quotes for customers based on configured products
Contract Management: Manages contracts and agreements with customers
Billing: Handles invoicing and payment processing
Q184. What is Bundle Product and Nested Bundle?
Bundle product is a group of related products sold together, while nested bundle is a bundle within a bundle.
Bundle product is a collection of multiple products sold together as a single unit.
Nested bundle is a bundle that contains another bundle within it.
Example: A laptop bundle may include a laptop, a laptop bag, and a mouse. Within this bundle, there could be a nested bundle for extended warranty options.
Override and virtual are keywords in C# used for method overriding and polymorphism.
Override keyword is used to provide a new implementation for a method in a derived class that is already defined in a base class.
Virtual keyword is used to allow a method to be overridden in a derived class.
Override keyword is used in the derived class to indicate that a method overrides a base class method.
Virtual keyword is used in the base class to indicate that a method can be overridden i...read more
CTE is a temporary result set that can be referenced within a SELECT, INSERT, UPDATE, or DELETE statement in SQL.
CTEs help improve readability and maintainability of complex SQL queries.
They can be recursive, allowing for hierarchical data querying.
CTEs are defined using the WITH keyword followed by the CTE name and query.
Example: WITH cte_name AS (SELECT * FROM table_name) SELECT * FROM cte_name;
Q187. What will be the size of the ring of 300×450 beams
The size of the ring of 300×450 beams depends on the diameter of the ring.
The size of the ring can be determined by calculating the circumference of the ring.
The formula to calculate the circumference of a ring is 2πr, where r is the radius of the ring.
To find the radius, we need to know the diameter of the ring.
Once we have the radius, we can calculate the circumference and determine the size of the ring.
Q188. What is Registry Keys? Where you can find Registry Keys in Windows System
Registry Keys are a hierarchical database that stores configuration settings and options on Windows systems.
Registry Keys contain information about software, hardware, user preferences, and system settings.
They are organized in a hierarchical structure similar to a file system.
Registry Keys can be accessed and modified using the Registry Editor (regedit.exe) or programmatically using the Windows API.
Some common locations for Registry Keys include HKEY_LOCAL_MACHINE, HKEY_CURR...read more
Q189. 3. What is difference between list and set?
List is an ordered collection of elements while set is an unordered collection of unique elements.
Lists allow duplicate elements while sets do not.
Lists are accessed by index while sets are accessed by value.
Lists are represented by square brackets [] while sets are represented by curly braces {}.
Example: [1, 2, 3] is a list while {1, 2, 3} is a set.
Q190. What are the concepts of Object-Oriented Programming (OOP)?
OOP is a programming paradigm based on the concept of objects, which can contain data in the form of fields and code in the form of procedures.
Encapsulation: Bundling data and methods that operate on the data into a single unit (object).
Inheritance: Ability of a class to inherit properties and behavior from another class.
Polymorphism: Ability to present the same interface for different data types.
Abstraction: Hiding the complex implementation details and showing only the nece...read more
Q191. Is method overloading possible in c++?
Yes, method overloading is possible in C++.
Method overloading allows multiple functions with the same name but different parameters.
The compiler determines which function to call based on the number and types of arguments passed.
Example: void print(int x), void print(float x), void print(char x) can all be overloaded.
Overloading can also be done with operators like +, -, *, /, etc.
Overloading improves code readability and reduces code duplication.
Q192. Are you comfortable with a hybrid work model?
Yes, I am comfortable with a hybrid work model.
I have experience working remotely and in-office, so I am comfortable with a hybrid model.
I am adaptable and can effectively communicate and collaborate with team members regardless of location.
I have the necessary tools and technology to work efficiently in a hybrid work environment.
Q193. What is the word count problem, and how can it be solved using Java 8 streams and the collect method?
The word count problem involves counting the frequency of words in a given text.
Use Java 8 streams to split the text into words, map each word to a key-value pair with word as key and count as value, and then collect the results using groupingBy and counting collectors.
Example: Stream.of(text.split("\\s+")).collect(Collectors.groupingBy(Function.identity(), Collectors.counting()));
Q194. 1. How will you conduct annual appraisal of your direct reportees ?
I will conduct annual appraisal of my direct reportees through a structured process involving goal setting, regular feedback, and performance evaluation.
Set clear and measurable goals at the beginning of the year
Provide regular feedback throughout the year to ensure alignment and progress
Conduct a formal performance evaluation at the end of the year
Use a combination of quantitative and qualitative measures to assess performance
Discuss strengths, areas for improvement, and car...read more
Q195. What is the strongest point in your azure how did you rate it?
My strongest point in Azure is my expertise in designing and implementing highly scalable and resilient cloud solutions.
I have extensive experience in designing and implementing cloud solutions using Azure services such as Virtual Machines, Azure Functions, Azure App Service, and Azure Storage.
I have a deep understanding of Azure networking and security, including Virtual Networks, Network Security Groups, and Azure Active Directory.
I am skilled in using Azure DevOps for cont...read more
Q196. What is static & Dynamic Testing? How many phases of Testing we perform before deliver to production .
Q197. What are steps performed when a migration requirement comes
Steps performed when a migration requirement comes
Assess the current system and identify the scope of migration
Determine the target system and its requirements
Plan the migration process and create a timeline
Test the migration process in a non-production environment
Execute the migration process and monitor for any issues
Validate the migrated system to ensure it meets the requirements
Provide post-migration support and maintenance
Q198. What is QTP, difference between findelememt() and findelements().
QTP is a test automation tool. findelement() is used to find a single element, findelements() is used to find multiple elements.
QTP is short for QuickTest Professional, a test automation tool used for functional and regression testing.
findelement() is a method in QTP used to find a single element on a web page based on the specified locator.
findelements() is a method in QTP used to find multiple elements on a web page based on the specified locator.
The findelement() method re...read more
Q199. What is the process for deploying a SharePoint Framework (SPFx) solution?
The process for deploying a SharePoint Framework (SPFx) solution involves packaging the solution, uploading it to the app catalog, and adding it to the site.
Package the SPFx solution using the gulp bundle and gulp package commands
Upload the packaged solution to the app catalog in SharePoint Online or on-premises
Add the solution to the site by either deploying it globally or adding it to specific pages
Monitor the deployment status and troubleshoot any issues that may arise
Q200. What is the purpose of using ExecuteQuery in Client-Side Object Model (CSOM)?
ExecuteQuery is used in CSOM to execute the queued actions and retrieve data from SharePoint server.
ExecuteQuery is used to send all pending actions to the server and execute them in a single batch.
It is necessary to call ExecuteQuery after making changes to the client-side object model to ensure the changes are reflected on the server.
ExecuteQuery is asynchronous and requires a callback function to handle the response from the server.
It helps in reducing the number of round ...read more
More about working at LTIMindtree




Top HR Questions asked in LTIMindtree
Interview Process at LTIMindtree

Top Interview Questions from Similar Companies





