Add office photos
Engaged Employer

LTIMindtree

3.7
based on 21.7k Reviews
Filter interviews by

1500+ CWD Limited Interview Questions and Answers

Updated 2 Apr 2025
Popular Designations

Q201. What is the process for deploying a SharePoint Framework (SPFx) solution?

Ans.

The process for deploying a SharePoint Framework (SPFx) solution involves packaging the solution, uploading it to the app catalog, and adding it to the site.

  • Package the SPFx solution using the gulp bundle and gulp package commands

  • Upload the packaged solution to the app catalog in SharePoint Online or on-premises

  • Add the solution to the site by either deploying it globally or adding it to specific pages

  • Monitor the deployment status and troubleshoot any issues that may arise

Add your answer

Q202. What is the purpose of using ExecuteQuery in Client-Side Object Model (CSOM)?

Ans.

ExecuteQuery is used in CSOM to execute the queued actions and retrieve data from SharePoint server.

  • ExecuteQuery is used to send all pending actions to the server and execute them in a single batch.

  • It is necessary to call ExecuteQuery after making changes to the client-side object model to ensure the changes are reflected on the server.

  • ExecuteQuery is asynchronous and requires a callback function to handle the response from the server.

  • It helps in reducing the number of round ...read more

Add your answer

Q203. Boomi question: What's the use of flow control shape

Ans.

Flow control shape in Boomi is used to control the flow of data within a process.

  • Flow control shape allows you to route data based on conditions or criteria.

  • It can be used to loop through a set of data multiple times until a certain condition is met.

  • Examples include decision shape, branch shape, and stop shape.

Add your answer

Q204. Usage of action classes Alert used in scripting Where we are using/implementing OOps concepts in Selenium Automation Why are we doing regression testing Usage of interface Difference between Super and This keyw...

read more
Ans.

Answering questions related to Selenium Automation and Java programming concepts.

  • Action classes are used to perform complex user interactions like drag and drop, double click, etc.

  • Alerts are used to handle pop-up windows and messages in web applications.

  • OOps concepts like inheritance, encapsulation, and polymorphism are implemented in Selenium Automation to create reusable and maintainable code.

  • Regression testing is done to ensure that new changes or updates to the applicatio...read more

Add your answer
Discover CWD Limited interview dos and don'ts from real experiences

Q205. What is Fold Taper and Migration Apron?

Ans.

Fold taper refers to the change in thickness of a fold along its length, while migration apron is a sedimentary deposit formed at the base of a fold.

  • Fold taper is the variation in thickness of a fold from its hinge to its limbs.

  • It is caused by the differential shortening and thickening of rock layers during folding.

  • Fold taper can be observed in geological structures such as anticlines and synclines.

  • Migration apron is a sedimentary deposit that accumulates at the base of a fol...read more

Add your answer

Q206. 3. How can we make a class immutable in java?

Ans.

To make a class immutable in Java, we need to follow certain guidelines.

  • Make the class final

  • Make all fields private and final

  • Do not provide setter methods

  • If the field is mutable, return a clone of it instead of the original object

  • Ensure that any mutable objects passed to the constructor are not modified outside the class

Add your answer
Are these interview questions helpful?

Q207. If I add 2 same attribute values for a object to a set...will I see 2 objects in the set, if yes what changes you make to the code to insert unique objects to a set

Ans.

No, you will not see 2 objects in the set. To insert unique objects to a set, you can override the equals() and hashCode() methods in the object class.

  • In a set, each element must be unique based on the equals() method. If you add 2 objects with the same attribute values, only one will be stored in the set.

  • To ensure uniqueness, override the equals() and hashCode() methods in the object class. This will define how objects are compared and stored in the set.

  • For example, if you h...read more

Add your answer

Q208. What are the different types of inheritance in Java, and can you explain the concept of interfaces? Additionally, code editor link was paste where I had to code and execute the code for interfaces .

Ans.

There are four types of inheritance in Java: single, multilevel, hierarchical, and multiple. Interfaces in Java are used to achieve abstraction and multiple inheritance.

  • Types of inheritance in Java: single (one class extends one class), multilevel (class extends another class which extends another class), hierarchical (multiple classes extend one class), multiple (one class implements multiple interfaces)

  • Interfaces in Java are like abstract classes with only abstract methods....read more

Add your answer
Share interview questions and help millions of jobseekers 🌟

Q209. What are some real-life examples that illustrate the concepts of Object-Oriented Programming (OOP)?

Ans.

Real-life examples of Object-Oriented Programming include modeling a car as an object with properties and methods.

  • Modeling a car as an object with properties like color, make, model, and methods like start, stop, accelerate

  • Creating a banking system where accounts are objects with properties like balance and methods like deposit, withdraw

  • Developing a video game where characters are objects with properties like health, position and methods like move, attack

Add your answer

Q210. What is autoscaling how it works? Give scenario that you have worked on for autoscaling.

Ans.

Autoscaling is a feature in cloud computing that automatically adjusts the number of compute resources based on workload.

  • Autoscaling helps in optimizing resource utilization and maintaining performance during peak loads.

  • It works by monitoring metrics such as CPU utilization or network traffic, and then adding or removing instances as needed.

  • An example scenario could be setting up autoscaling for a web application that experiences high traffic during certain times of the day.

Add your answer

Q211. Have you worked on Amendment? Explain it?

Ans.

Yes, I have worked on Amendment. It involves making changes to existing software code or documentation.

  • Amendment involves modifying existing code or documentation to improve functionality or fix issues.

  • Examples include updating a software feature to meet new requirements, fixing bugs in the code, or enhancing performance.

  • Amendment may also involve revising documentation to reflect changes made to the software.

Add your answer

Q212. What is renewal in CPQ? Explain the complete Flow?

Ans.

Renewal in CPQ refers to the process of renewing a contract or subscription for a product or service.

  • Renewal in CPQ involves generating a renewal quote for an existing contract or subscription.

  • The renewal flow typically includes reviewing the terms of the existing contract, making any necessary adjustments, and generating a new quote for the renewed contract.

  • Customers may have the option to renew their contract for a specified period of time, with the possibility of negotiati...read more

Add your answer

Q213. What is BR, difference between after and async How to restrict data visibility without using ACL How to call one function to another in the same script include name How to get number of vowels count present in...

read more
Ans.

The interview questions cover topics such as BR, async, data visibility, function calling, string manipulation, integrations, and server-side data retrieval.

  • BR stands for Business Rule, which is a server-side script used to define and enforce business logic in ServiceNow.

  • The difference between after and async is that 'after' runs the script after the record is saved, while 'async' runs the script asynchronously.

  • To restrict data visibility without using ACL, you can use client...read more

Add your answer

Q214. Architecture of spark. What is lazy evaluation? Difference between repartition and coalesce function?

Ans.

Spark architecture, lazy evaluation, repartition vs coalesce

  • Spark architecture consists of a driver program, cluster manager, and worker nodes

  • Lazy evaluation is a feature of Spark where transformations are not executed until an action is called

  • Repartition function shuffles data across partitions while coalesce reduces the number of partitions

  • Repartition can increase or decrease the number of partitions while coalesce only decreases

  • Repartition is a costly operation while coale...read more

Add your answer

Q215. Q.) What do mean by Joins in SQL? list all of them Q.) What do you mean by Normalization in the database

Add your answer

Q216. What are the disadvantages of using Node.js?

Ans.

Some disadvantages of using Node.js include performance issues with CPU-bound tasks, callback hell, and lack of strong typing.

  • Performance issues with CPU-bound tasks due to its single-threaded nature

  • Callback hell can occur when handling multiple asynchronous operations

  • Lack of strong typing can lead to errors that may not be caught until runtime

Add your answer

Q217. coding example and to determine which oops concept used

Ans.

The coding example involves creating a class for a car with properties and methods, demonstrating encapsulation and inheritance.

  • Create a class 'Car' with private properties like 'make', 'model', 'year' and public methods like 'getMake', 'getModel', 'getYear'. This demonstrates encapsulation.

  • Create a subclass 'ElectricCar' that inherits from 'Car' and adds a property 'batteryCapacity'. This demonstrates inheritance.

Add your answer
Q218. How is memory allocated for a string in Java?
Ans.

Memory for a string in Java is allocated on the heap, with a reference stored on the stack.

  • Strings in Java are immutable, so once created they cannot be changed.

  • String objects are stored on the heap, while references to them are stored on the stack.

  • String literals are stored in a special memory area called the String Pool.

  • String objects can also be created using the 'new' keyword.

Add your answer

Q219. How do you configure Application gateway, explain in detail.

Ans.

To configure Application Gateway, create a resource group, create an application gateway, configure listeners, backend pools, and rules.

  • Create a resource group

  • Create an application gateway

  • Configure listeners

  • Configure backend pools

  • Configure rules

Add your answer

Q220. What are some of the code words in the test runner file in cucumber?

Ans.

Code words in test runner file in Cucumber

  • Cucumber uses Gherkin syntax for writing feature files

  • Test runner file specifies the location of feature files and step definitions

  • Code words in test runner file include 'feature', 'glue', 'tags', 'plugin', 'monochrome', etc.

Add your answer

Q221. How to access the security on CICS screen on distributed system

Ans.

To access security on CICS screen on distributed system, use CICS Transaction Server Security.

  • Use CICS Transaction Server Security to control access to CICS resources.

  • Define security policies and profiles to control access to CICS resources.

  • Use the CICS Security API to check security status and perform security-related tasks.

  • Examples of CICS security features include RACF, ACF2, and Top Secret.

  • Ensure that all users have appropriate security clearance before accessing CICS res...read more

Add your answer

Q222. 1. Explaining the project from my portfolio. 2. Difference between UI and UX. 3. Design Principles. 4. Examples of good and bad UX. 5. Some questions on projects in portfolio.

Ans.

Interview questions for Associate Designer position

  • Explained a project from my portfolio

  • Differentiated between UI and UX

  • Discussed design principles

  • Provided examples of good and bad UX

  • Answered questions on projects in portfolio

Add your answer

Q223. Explain the OOPs concepts and describe the design patterns used in your projects

Ans.

OOPs concepts include encapsulation, inheritance, and polymorphism. Design patterns used in my projects include Singleton and Factory.

  • Encapsulation: bundling data and methods that operate on that data within a single unit

  • Inheritance: creating new classes from existing ones, inheriting their properties and methods

  • Polymorphism: ability of objects to take on many forms, allowing for flexibility and extensibility

  • Singleton: ensuring only one instance of a class is created and prov...read more

Add your answer

Q224. What is Middleware in ASP.NET Core

Ans.

Middleware in ASP.NET Core is software that sits between the web server and the application, handling requests and responses.

  • Middleware is a pipeline of components that can be added to the application's request processing pipeline.

  • Each middleware component can handle a specific aspect of the request/response cycle.

  • Examples of middleware include authentication, logging, and routing.

  • Middleware can be added to the pipeline using the Use() method in the Startup class.

  • Middleware c...read more

Add your answer

Q225. What is map, filter and reduce in JavaScript?

Ans.

Map, filter and reduce are higher-order functions in JavaScript used to manipulate arrays.

  • Map transforms each element of an array into a new array based on a provided function.

  • Filter creates a new array with all elements that pass a test implemented by a provided function.

  • Reduce applies a function to each element of an array and reduces the array to a single value.

  • These functions are commonly used in functional programming and can make code more concise and readable.

  • Example: ...read more

Add your answer

Q226. What is journey builder and what are the elements on it?

Ans.

Journey Builder is a tool in Salesforce Marketing Cloud that allows marketers to create and automate personalized customer journeys.

  • Journey Builder is a drag-and-drop tool that enables marketers to create and manage customer journeys.

  • It allows marketers to define the steps a customer takes in their journey, such as sending emails, SMS messages, or push notifications.

  • Journey Builder also allows for real-time personalization based on customer behavior and preferences.

  • Elements o...read more

Add your answer

Q227. BE project, what softwares you will use?

Ans.

I will use software tools that are relevant to my BE project.

  • The software tools I will use will depend on the nature of my BE project.

  • For example, if my project involves designing a circuit, I may use software like LTSpice or Proteus.

  • If my project involves programming, I may use software like Visual Studio or Eclipse.

  • I will also use software for data analysis and visualization, such as MATLAB or Python.

  • Ultimately, I will choose software tools that will help me achieve the goa...read more

Add your answer

Q228. How does the Circuit Breaker design pattern work?

Ans.

Circuit Breaker design pattern is used to prevent a system from repeatedly trying to execute an operation that is likely to fail.

  • Circuit Breaker monitors the number of failures when calling a remote service

  • If the failures exceed a certain threshold, the Circuit Breaker trips and stops further calls to the service

  • After a specified time, the Circuit Breaker allows a limited number of calls to test if the service is available again

Add your answer
Asked in
ASE Interview

Q229. Write a program to write all prime numbers in the given range.

Ans.

Program to print all prime numbers in a given range.

  • Take input for the range of numbers

  • Loop through the range and check if each number is prime

  • If a number is prime, print it

  • A number is prime if it is only divisible by 1 and itself

Add your answer

Q230. What are the methods to secure a database using SQL?

Ans.

Methods to secure a database using SQL include encryption, access control, and regular updates.

  • Use encryption to protect sensitive data

  • Implement access control to restrict unauthorized access

  • Regularly update the database software to patch security vulnerabilities

Add your answer

Q231. what is autoboxing and unboxing

Ans.

Autoboxing is the automatic conversion of primitive data types to their corresponding object wrapper classes.

  • Autoboxing is useful when working with collections that require objects instead of primitives.

  • Example: int i = 5; Integer j = i; //autoboxing

  • Unboxing is the opposite of autoboxing, where an object of a wrapper class is converted back to its corresponding primitive type.

  • Example: Integer j = 5; int i = j; //unboxing

Add your answer

Q232. What is Requirement and what is requirement traceability matrix

Ans.

A requirement is a need or expectation from a stakeholder. A requirement traceability matrix is a tool to track requirements throughout the project lifecycle.

  • Requirement is a statement that specifies what a product or service should do or how it should perform.

  • Requirement Traceability Matrix (RTM) is a document that links requirements to their origin and traces them throughout the project lifecycle.

  • RTM helps to ensure that all requirements are met and that changes to requirem...read more

Add your answer

Q233. What is the Difference between C & C++?

Ans.

C is a procedural programming language while C++ is a multi-paradigm programming language with object-oriented features.

  • C is a procedural programming language while C++ supports both procedural and object-oriented programming.

  • C does not have classes and objects like C++.

  • C++ has features like inheritance, polymorphism, and encapsulation which are not present in C.

  • C++ allows function overloading and operator overloading which are not supported in C.

  • C++ has a richer standard lib...read more

Add your answer

Q234. What is cloud based services, why companies are shifting to cloud?

Ans.

Cloud based services refer to services and resources delivered over the internet. Companies are shifting to cloud for scalability, cost savings, flexibility, and improved collaboration.

  • Scalability: Companies can easily scale their resources up or down based on demand without investing in physical infrastructure.

  • Cost savings: Cloud services eliminate the need for companies to purchase and maintain expensive hardware, leading to cost savings.

  • Flexibility: Cloud services offer fl...read more

Add your answer

Q235. What is a container and why is the use?

Ans.

A container is a lightweight, standalone executable package that contains everything needed to run an application.

  • Containers provide a consistent and reproducible environment for applications to run in.

  • They are isolated from the host system and other containers, providing security and portability.

  • Containers can be easily deployed and scaled, making them ideal for modern application development and deployment.

  • Examples of container technologies include Docker, Kubernetes, and O...read more

Add your answer

Q236. How much experience do you have in Big Data Administration?

Ans.

I have 3 years of experience in Big Data Administration.

  • I have worked with Hadoop, Spark, and Hive.

  • I have experience in setting up and maintaining Hadoop clusters.

  • I have worked with various Big Data tools and technologies.

  • I have experience in troubleshooting and resolving issues related to Big Data systems.

Add your answer

Q237. Explain Plugins, What are events, What is dependency injection, What is B2B development

Ans.

Plugins, events, dependency injection, and B2B development in Magento

  • Plugins are modules that modify or extend the functionality of Magento

  • Events are triggers that execute code when a specific action occurs in Magento

  • Dependency injection is a design pattern that allows objects to be passed as dependencies rather than being created within a class

  • B2B development involves creating custom features for business-to-business e-commerce websites

Add your answer

Q238. What is constraints and explain them?

Ans.

Constraints are limitations or restrictions that are put on a system or process.

  • Constraints can be physical, such as the size or weight of a product

  • Constraints can also be related to time, budget, or resources

  • Constraints can impact the design, development, and testing of a system

  • Examples of constraints include regulatory requirements, customer specifications, and technical limitations

Add your answer

Q239. What do you mean by transformation?

Ans.

Transformation refers to the process of changing or converting something from one form to another.

  • Transformation can occur in various fields such as technology, business, and personal development.

  • Examples of transformation include digital transformation, organizational transformation, and personal transformation.

  • Transformation often involves a significant change in mindset, processes, and systems.

  • Successful transformation requires careful planning, communication, and executio...read more

Add your answer
Q240. Can you explain scheduling in operating systems?
Ans.

Scheduling in operating systems involves managing the execution of processes to optimize resource utilization.

  • Scheduling determines which process gets the CPU next based on priority, time slice, etc.

  • Types of scheduling algorithms include FCFS, Round Robin, Priority Scheduling, etc.

  • Schedulers can be preemptive (interruptible) or non-preemptive (run to completion).

Add your answer

Q241. Write a program to add numbers in harmonic series. (1+1/2+1/3+.....1/n)

Ans.

Program to add numbers in harmonic series (1+1/2+1/3+...+1/n)

  • Create a variable to store the sum

  • Use a loop to iterate through the series up to n

  • Add each term to the sum

  • Print the sum

Add your answer

Q242. What are the key concepts of Object-Oriented Programming (OOP), and can you provide a detailed and structured explanation?

Ans.

Key concepts of Object-Oriented Programming (OOP) include encapsulation, inheritance, polymorphism, and abstraction.

  • Encapsulation: Bundling data and methods that operate on the data into a single unit (object).

  • Inheritance: Allowing a class to inherit properties and behavior from another class.

  • Polymorphism: The ability for objects of different classes to respond to the same method in different ways.

  • Abstraction: Hiding the complex implementation details and showing only the nec...read more

Add your answer

Q243. what is the difference between method overloading and overrding

Ans.

Method overloading is having multiple methods in the same class with the same name but different parameters, while method overriding is having a method in a subclass with the same name and parameters as a method in its superclass.

  • Method overloading is resolved at compile time based on the method signature and parameters.

  • Method overriding is resolved at runtime based on the actual object type.

  • Example of method overloading: public void print(int num) and public void print(Strin...read more

Add your answer

Q244. What is the difference between with sharing and without sharing?

Ans.

With sharing and without sharing are keywords used in Apex to specify sharing rules for a class.

  • With sharing enforces the sharing rules of the current user, while without sharing ignores them.

  • With sharing is used for classes that access or modify data that belongs to multiple users, while without sharing is used for utility classes or classes that only access data owned by the current user.

  • With sharing is the default behavior if sharing is not specified.

  • Example: A class that ...read more

Add your answer

Q245. Generators and Decorators implementation in Python

Ans.

Generators and decorators are powerful features in Python for creating iterable objects and modifying functions respectively.

  • Generators are functions that use the yield keyword to return a sequence of values lazily.

  • They are memory efficient as they generate values on the fly instead of storing them in memory.

  • Decorators are functions that modify the behavior of other functions without changing their source code.

  • They are used to add functionality to functions, such as logging, ...read more

View 1 answer

Q246. What is the code to generate the first 12 prime numbers?

Ans.

The code to generate the first 12 prime numbers involves checking divisibility by numbers up to the square root of the number.

  • Start with a list of prime numbers and a counter for the number of primes found.

  • Loop through numbers starting from 2 and check if they are prime by dividing them by all previous prime numbers.

  • If a number is not divisible by any previous prime numbers, add it to the list of primes.

  • Continue this process until you have found 12 prime numbers.

Add your answer

Q247. Sort a map of employees and their corresponding salaries using java streams.

Ans.

Sort a map of employees and their corresponding salaries using Java streams.

  • Use entrySet() to get a stream of key-value pairs from the map.

  • Use sorted() with a comparator to sort the stream based on salaries.

  • Collect the sorted stream back into a LinkedHashMap to maintain the order.

Add your answer

Q248. What is the difference between CSS and SASS? what is the use of Sass

Ans.

SASS is a preprocessor scripting language that is interpreted into CSS, offering more features and flexibility.

  • SASS is a preprocessor for CSS, allowing for variables, nesting, and mixins to be used in stylesheets.

  • SASS code needs to be compiled into CSS before being used in a web project.

  • SASS helps in writing cleaner and more organized CSS code, making it easier to maintain and update styles.

  • CSS is the styling language used for web development, while SASS is a tool that extend...read more

Add your answer

Q249. What do you understand by Report Definition?

Ans.

Report Definition is a template that defines the structure and layout of a report.

  • Report Definition specifies the data to be included in a report

  • It defines the layout, formatting, and grouping of data in a report

  • Report Definitions can be created using tools like Crystal Reports or SSRS

  • They help in standardizing the format of reports across an organization

Add your answer
Q250. What are the different types of hashmaps in Java?
Ans.

Types of hashmaps in Java include HashMap, LinkedHashMap, and TreeMap.

  • HashMap: basic implementation, no order guaranteed

  • LinkedHashMap: maintains insertion order

  • TreeMap: sorted by natural order or custom comparator

Add your answer

Q251. 1. Difference between finally and static block?

Ans.

finally is used to execute a block of code after try-catch block, while static block is executed when class is loaded.

  • finally block is used to perform cleanup operations like closing database connections, file streams etc.

  • static block is used to initialize static variables or perform any other static initialization.

  • finally block is always executed whether an exception is thrown or not, while static block is executed only once when class is loaded.

  • finally block is always writt...read more

Add your answer

Q252. What are the selectors in css

Ans.

Selectors in CSS are patterns used to select the elements you want to style on a web page.

  • Selectors can target elements based on their tag name, class, ID, attributes, and more.

  • Examples include: element selector (p), class selector (.example), ID selector (#example), attribute selector ([type='text']), and pseudo-class selector (:hover).

Add your answer

Q253. Write a program to find the largest and second largest number in an array

Ans.

Program to find largest and second largest number in an array

  • Iterate through array and compare each element to current largest and second largest

  • Update variables accordingly

  • Return largest and second largest

Add your answer

Q254. What are Isolation level in Db2

Ans.

Isolation levels in Db2 determine how transactions interact with each other.

  • Isolation levels include Read Uncommitted, Read Committed, Repeatable Read, and Serializable.

  • Higher isolation levels provide more consistency but can also lead to more contention and slower performance.

  • Isolation levels can be set at the transaction level or for individual queries.

  • For example, a transaction with Repeatable Read isolation level will prevent other transactions from modifying the same dat...read more

Add your answer

Q255. Find the unique element in the array?

Ans.

To find the unique element in an array

  • Iterate through the array and use a hash table to keep track of the frequency of each element

  • Return the element with frequency 1

  • Alternatively, use XOR operation to cancel out duplicate elements and return the remaining element

Add your answer

Q256. Address of a particular element in an array. And adress of 0th index is given

Ans.

Finding address of an element in an array given the address of 0th index.

  • Calculate the offset of the desired element from the 0th index address and add it to the 0th index address.

  • Address of ith element = address of 0th element + i * size of each element.

  • Example: Address of 3rd element in an array of strings = address of 0th element + 3 * size of string.

Add your answer

Q257. What is agile methodology used?

Ans.

Agile methodology is an iterative approach to project management that emphasizes flexibility and customer satisfaction.

  • Agile methodology involves breaking down a project into smaller, more manageable tasks

  • It emphasizes collaboration and communication between team members and stakeholders

  • It allows for changes and adjustments to be made throughout the project

  • Examples of agile methodologies include Scrum, Kanban, and Lean

  • Agile is often used in software development, but can be ap...read more

View 1 answer

Q258. is it necessary for classes implementing an interface to implement interface methods?

Ans.

Yes, classes implementing an interface must implement interface methods.

  • Classes implementing an interface must provide concrete implementations for all methods declared in the interface.

  • Failure to implement all interface methods will result in a compilation error.

  • Interfaces are used to define a contract that implementing classes must adhere to.

Add your answer

Q259. Write a program to print the letter counts in the given string?

Ans.

Program to print letter counts in a given string

  • Iterate through the string and count occurrences of each letter

  • Use an array to store the counts for each letter

  • Print the counts for each letter in the array

Add your answer

Q260. How do you optimize SQL queries?

Ans.

Optimizing SQL queries involves using indexes, avoiding unnecessary joins, and optimizing the query structure.

  • Use indexes on columns frequently used in WHERE clauses

  • Avoid using SELECT * and only retrieve necessary columns

  • Optimize joins by using INNER JOIN instead of OUTER JOIN when possible

  • Use EXPLAIN to analyze query performance and make necessary adjustments

Add your answer

Q261. Calculate second highest salary using SQL as well as pyspark.

Ans.

Calculate second highest salary using SQL and pyspark

  • Use SQL query with ORDER BY and LIMIT to get the second highest salary

  • In pyspark, use orderBy() and take() functions to achieve the same result

Add your answer

Q262. What is Ransomware ? Why windows is more vulnerable than Linux system

Ans.

Ransomware is a type of malware that encrypts files and demands payment for decryption. Windows is more vulnerable due to its popularity and weaker security measures.

  • Ransomware is a type of malware that encrypts files and demands payment for decryption

  • Windows is more vulnerable due to its popularity and weaker security measures compared to Linux

  • Ransomware can spread through phishing emails, malicious websites, and software vulnerabilities

  • Examples of ransomware include WannaCr...read more

Add your answer

Q263. 7. What trouble shoot will you do if your wifi stops working suddenly?

Add your answer

Q264. Why windows function are not being used in where clause?

Ans.

Windows functions are not used in WHERE clause to avoid performance issues.

  • Windows functions are used to perform complex calculations on data.

  • Using them in WHERE clause can slow down the query execution.

  • Instead, use simple conditions in WHERE clause and perform calculations in SELECT clause.

  • For example, instead of using AVG() function in WHERE clause, use HAVING clause.

  • Also, consider using indexes to improve query performance.

Add your answer

Q265. Find the output of the following code snippets

Ans.

Code snippet output prediction for software engineer interview

  • Understand the code logic and data flow

  • Consider the input values and their impact on output

  • Check for any loops or conditions that may affect the output

Add your answer

Q266. What do you know about java?

Ans.

Java is a popular programming language known for its platform independence and object-oriented approach.

  • Java is a high-level, class-based, object-oriented programming language.

  • It is designed to have as few implementation dependencies as possible, making it platform-independent.

  • Java applications are typically compiled to bytecode that can run on any Java virtual machine (JVM).

  • Java is widely used for developing desktop, web, and mobile applications.

  • Popular frameworks and librar...read more

Add your answer

Q267. Which protocol is used in SSL configuration?

Ans.

SSL configuration uses the TLS protocol.

  • SSL configuration uses the Transport Layer Security (TLS) protocol.

  • TLS ensures secure communication over a computer network.

  • Examples of TLS versions include TLS 1.2 and TLS 1.3.

Add your answer
Q268. Write an SQL query to find all the students with marks greater than the average marks.
Ans.

SQL query to find students with marks greater than average marks

  • Calculate the average marks first

  • Use a subquery to compare each student's marks with the average marks

  • Select students where marks are greater than the average

Add your answer

Q269. What are the ways to maintain field level securities in the Aura component?

Ans.

Field level securities in Aura components

  • Use Lightning Data Service to enforce CRUD and FLS

  • Use Apex to enforce additional security logic

  • Use Lightning Design System to control visibility of fields

  • Use custom validation rules to enforce business logic

  • Use sharing rules to control record access

Add your answer

Q270. Modify null salary with avg salary, find count of employees by joining date. Configurations needed Glue job. What are connecters and Data connections in Glue service.

Ans.

Use Glue job to modify null salaries with average salary and find count of employees by joining date.

  • Create a Glue job to read data, modify null salaries with average salary, and count employees by joining date

  • Use Glue connectors to connect to data sources like S3, RDS, or Redshift

  • Data connections in Glue service are used to define the connection information to data sources

  • Example: Use Glue job to read employee data from S3, calculate average salary, replace null values, and ...read more

Add your answer

Q271. gave code class A { int i = 10; } class B extends A { int i = 20; } public class test{ public static void main (String [] args) { A a = new B(); System.out.println(a.i): } }

Ans.

The code will output 10 because the variable i is accessed through a reference of class A.

  • When a subclass object is assigned to a superclass reference, the superclass reference can only access the superclass members.

  • In this case, even though the object is of class B, the variable i is accessed from class A.

  • Output: 10

View 1 answer

Q272. tell me the output 1)a = 20; console.log(a); var a; 2)b=10; console.log(b); let b; 3)let a =5; if(a<5){ let b = " a lessthen 5"; }else{ let b = "b is grater then 5"; } console.log(b);

Ans.

The output for the given code snippets will be: 1) 20 2) ReferenceError: Cannot access 'b' before initialization 3) ReferenceError: b is not defined

  • In the first snippet, variable 'a' is declared using 'var' after it is assigned a value, so it logs 20 without any issues.

  • In the second snippet, variable 'b' is declared using 'let' after it is assigned a value, so it throws a ReferenceError as 'b' is accessed before initialization.

  • In the third snippet, variable 'b' is declared us...read more

Add your answer

Q273. Git commands you have used, and how to handle merge conflict?

Ans.

Git commands used and handling merge conflicts

  • Git commands used: git clone, git pull, git push, git add, git commit, git merge, git rebase

  • To handle merge conflict: git status to see conflicted files, git diff to see the differences, manually resolve conflicts in the files, git add the resolved files, git commit the changes

Add your answer

Q274. How will you accommodate changes in requirements or enhancement?

Ans.

I will use agile methodology to accommodate changes in requirements or enhancement.

  • I will prioritize the changes based on their impact on the project and discuss them with the stakeholders.

  • I will update the project plan and communicate the changes to the team.

  • I will use agile methodology to accommodate changes in requirements or enhancement.

  • I will ensure that the changes are properly documented and tested before implementation.

  • I will continuously monitor the changes and make ...read more

Add your answer

Q275. What is the process for creating and submitting code on GeeksforGeeks?

Ans.

The process for creating and submitting code on GeeksforGeeks involves writing code, testing it, and then submitting it on the platform.

  • Create an account on GeeksforGeeks website.

  • Write the code for the problem statement provided.

  • Test the code locally to ensure it works correctly.

  • Submit the code on the GeeksforGeeks platform for evaluation.

  • Receive feedback and improve the code if necessary.

Add your answer

Q276. What is Component, Pipe,Directive,Services

Ans.

Components, Pipes, Directives, and Services are key building blocks of Angular applications.

  • Components are the building blocks of Angular applications and represent a part of the UI.

  • Pipes are used to transform data before displaying it in the UI.

  • Directives are used to add behavior to an existing element or create a new element.

  • Services are used to share data and functionality across components and other services.

Add your answer

Q277. Explain Inheritance and Encapsulation with real-time examples.

Ans.

Inheritance is a mechanism in which a new class inherits properties and behaviors from an existing class. Encapsulation is the concept of bundling data and methods that operate on the data into a single unit.

  • Inheritance allows a subclass to inherit attributes and methods from a superclass. For example, a class Animal can be a superclass with attributes like name and age, and methods like eat() and sleep(). A subclass Dog can inherit these attributes and methods.

  • Encapsulation ...read more

Add your answer

Q278. Create a function and print the addition of two number

Ans.

Create a function to print the addition of two numbers

  • Define a function that takes two parameters representing the numbers to be added

  • Inside the function, add the two numbers together

  • Print the result of the addition

Add your answer

Q279. What is the difference between Functional & non-functional requirements

Ans.

Functional requirements describe what the system should do, while non-functional requirements describe how the system should perform.

  • Functional requirements focus on specific functions or features that the system must provide.

  • Non-functional requirements focus on qualities or constraints that the system must meet, such as performance, security, or usability.

  • Functional requirements are typically documented in use cases or user stories.

  • Non-functional requirements are often docum...read more

Add your answer

Q280. Which is the fastest sorting algorithm?

Ans.

The fastest sorting algorithm is QuickSort.

  • QuickSort has an average time complexity of O(n log n).

  • It is a divide and conquer algorithm that recursively partitions the array.

  • It is widely used in practice due to its efficiency.

  • Other fast sorting algorithms include MergeSort and HeapSort.

Add your answer

Q281. What is the benefit of company product and how to pitch with customer and how to sale that product

Ans.

Our product offers unique features that solve customer pain points and increase efficiency. We pitch by highlighting these benefits and providing personalized solutions.

  • Identify customer pain points and show how our product solves them

  • Highlight unique features and advantages of our product

  • Provide personalized solutions based on customer needs

  • Offer competitive pricing and flexible payment options

  • Build strong relationships with customers through excellent service

  • Use data and an...read more

Add your answer

Q282. What is the code to calculate the factorial of a number?

Ans.

Factorial of a number is calculated by multiplying all positive integers up to that number.

  • Use a loop to multiply all positive integers up to the given number.

  • Handle edge cases like 0 and negative numbers separately.

  • Example: For input 5, factorial = 5*4*3*2*1 = 120.

Add your answer

Q283. How to fine tune Oracle GoldenGate processes for better performance during long running transactions?

Ans.

To fine tune Oracle GoldenGate processes for better performance during long running transactions, consider optimizing network bandwidth, adjusting batch sizes, and monitoring lag.

  • Optimize network bandwidth to reduce latency and improve data transfer speeds.

  • Adjust batch sizes to balance between latency and throughput, finding the optimal size for your specific workload.

  • Monitor lag between source and target systems to identify bottlenecks and optimize performance.

  • Consider using...read more

Add your answer

Q284. Explain where you used Azure function and why

Ans.

I have used Azure Functions to automate data processing tasks and trigger actions based on events.

  • Implemented Azure Functions to process incoming data from IoT devices and trigger alerts based on predefined rules

  • Utilized Azure Functions to automatically resize images uploaded to a storage account

  • Integrated Azure Functions with Azure Logic Apps to create automated workflows

Add your answer

Q285. What would you do when application is down, what are the debugging steps?

Ans.

Debugging steps when application is down

  • Check if the server is up and running

  • Check if the application service is running

  • Check the event logs for any errors

  • Check the application logs for any errors

  • Check the network connectivity

  • Check the database connectivity

  • Check the firewall settings

  • Restart the application service

  • Restart the server if necessary

Add your answer
Q286. What are the features of Java 8?
Ans.

Java 8 introduced several new features including lambda expressions, functional interfaces, streams, and the new Date and Time API.

  • Lambda expressions allow you to write more concise code by providing a way to pass functions as arguments.

  • Functional interfaces are interfaces with a single abstract method, which can be implemented using lambda expressions.

  • Streams provide a way to work with sequences of elements and perform aggregate operations on them.

  • The new Date and Time API p...read more

Add your answer

Q287. How to create end to end pipeline from Jenkins

Ans.

To create an end to end pipeline from Jenkins, you need to set up stages for building, testing, and deploying your code.

  • Set up Jenkins job with necessary plugins for version control, build tools, and deployment

  • Define stages in Jenkinsfile for building, testing, and deploying code

  • Configure Jenkins job to trigger automatically on code changes

  • Integrate with version control system for code checkout and triggering builds

  • Use Jenkins pipeline syntax to define stages and steps for ea...read more

Add your answer

Q288. What are Compute Services in AZURE, explain

Ans.

Compute Services in Azure are cloud-based services that provide virtual machines, containers, and serverless computing capabilities.

  • Azure Virtual Machines: Allows users to create and manage virtual machines in the cloud.

  • Azure Container Instances: Offers a solution for running containers without managing servers.

  • Azure Functions: Enables serverless computing by running code in response to events.

  • Azure Batch: Provides job scheduling and compute management for large-scale paralle...read more

Add your answer

Q289. What is n-1 in agile?

Ans.

n-1 in agile refers to the number of testers required to test a feature, where n is the total number of testers.

  • n-1 is a formula used to determine the number of testers needed to test a feature in agile development.

  • It means that one tester less than the total number of testers is required to test a feature.

  • For example, if there are 5 testers in a team, then n-1 would mean that 4 testers are required to test a feature.

  • This approach ensures that there is enough coverage and col...read more

View 1 answer

Q290. What is bug and what is defect?

Ans.

A bug is a coding error that causes unexpected behavior. A defect is a deviation from the expected behavior.

  • A bug is a mistake made by a programmer while writing code.

  • A defect is a problem with the software that causes it to behave differently than expected.

  • Bugs can be fixed by correcting the code, while defects require a deeper analysis of the software.

  • Examples of bugs include syntax errors, logical errors, and runtime errors.

  • Examples of defects include incorrect calculation...read more

View 1 answer

Q291. what are types of joins, explain inner join

Ans.

Types of joins include inner join, outer join, left join, and right join. Inner join returns rows when there is a match in both tables.

  • Inner join combines rows from two tables based on a related column between them

  • Only the rows with matching values in both tables are included in the result set

  • Example: SELECT * FROM table1 INNER JOIN table2 ON table1.column = table2.column

Add your answer

Q292. What is the difference between Arrays and dynamic arrays in java?

Ans.

Arrays have fixed size while dynamic arrays can resize themselves as needed.

  • Arrays in Java have a fixed size that is specified when the array is created.

  • Dynamic arrays in Java, like ArrayList, can resize themselves as needed to accommodate more elements.

  • Example: int[] fixedArray = new int[5]; ArrayList<Integer> dynamicArray = new ArrayList<>();

Add your answer

Q293. What are the port numbers used for JDBC and ODBC connections?

Ans.

JDBC typically uses port 3306 for MySQL and ODBC typically uses port 1433 for SQL Server.

  • JDBC commonly uses port 3306 for MySQL connections

  • ODBC typically uses port 1433 for SQL Server connections

Add your answer

Q294. What is the Java Development Kit (JDK) and what are its main components?

Ans.

The Java Development Kit (JDK) is a software development kit used to develop Java applications.

  • Main components include Java Compiler (javac), Java Virtual Machine (JVM), and Java Archive Tool (jar)

  • JDK also includes libraries, documentation, and development tools

  • JDK is necessary for compiling, debugging, and running Java programs

Add your answer

Q295. What are the key features and functionalities of lists in Python?

Ans.

Lists in Python are ordered, mutable, and can contain elements of different data types.

  • Lists are ordered collections of items, indexed starting at 0.

  • Lists are mutable, meaning you can change, add, or remove elements.

  • Lists can contain elements of different data types, such as integers, strings, or even other lists.

  • You can access elements in a list using square brackets, e.g. my_list[0] to access the first element.

  • Common list methods include append(), remove(), and sort().

Add your answer

Q296. What are the key concepts of Object-Oriented Programming (OOP) in Java?

Ans.

Key concepts of OOP in Java include classes, objects, inheritance, polymorphism, encapsulation, and abstraction.

  • Classes: Blueprint for creating objects, containing attributes and methods.

  • Objects: Instances of classes that encapsulate data and behavior.

  • Inheritance: Allows a class to inherit attributes and methods from another class.

  • Polymorphism: Ability to present the same interface for different data types.

  • Encapsulation: Bundling data and methods that operate on the data into...read more

Add your answer

Q297. What are different types of data structures?

Ans.

Data structures are ways to organize and store data in a computer program.

  • Some common data structures include arrays, linked lists, stacks, queues, trees, and graphs.

  • Arrays are a collection of elements of the same data type, accessed by an index.

  • Linked lists are a sequence of nodes, each containing data and a reference to the next node.

  • Stacks are a last-in, first-out (LIFO) data structure, where elements are added and removed from the top.

  • Queues are a first-in, first-out (FIF...read more

Add your answer

Q298. Areas of strength and weekness .

Ans.

My areas of strength include problem-solving, teamwork, and adaptability. My weakness is public speaking.

  • Strengths: problem-solving (e.g. developing efficient algorithms), teamwork (e.g. collaborating with colleagues on a project), adaptability (e.g. quickly learning new programming languages)

  • Weakness: public speaking (e.g. presenting technical information to a large audience)

View 1 answer

Q299. What is PEGA, and what motivated you to learn it?

Ans.

PEGA is a business process management tool used for building enterprise applications.

  • PEGA is a platform for creating and managing business processes and customer interactions.

  • It offers tools for designing, building, and deploying applications without the need for traditional coding.

  • I learned PEGA because of its popularity in the industry and its ability to streamline business processes.

  • Having PEGA skills can open up job opportunities in various industries such as finance, hea...read more

Add your answer

Q300. Write a code to show last 10 incident created in background script

Ans.

Code to display last 10 incidents in background script

  • Query incident table to get last 10 records

  • Use GlideRecord to fetch incident records

  • Sort records by created date in descending order

View 1 answer
1
2
3
4
5
6
7
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos

Interview Process at CWD Limited

based on 2.9k interviews
Interview experience
4.1
Good
View more
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Interview Questions from Similar Companies

4.0
 • 1.2k Interview Questions
3.3
 • 321 Interview Questions
3.6
 • 174 Interview Questions
4.1
 • 168 Interview Questions
3.7
 • 144 Interview Questions
View all
Top LTIMindtree Interview Questions And Answers
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
75 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter