LTIMindtree
1500+ CWD Limited Interview Questions and Answers
Q201. What is the process for deploying a SharePoint Framework (SPFx) solution?
The process for deploying a SharePoint Framework (SPFx) solution involves packaging the solution, uploading it to the app catalog, and adding it to the site.
Package the SPFx solution using the gulp bundle and gulp package commands
Upload the packaged solution to the app catalog in SharePoint Online or on-premises
Add the solution to the site by either deploying it globally or adding it to specific pages
Monitor the deployment status and troubleshoot any issues that may arise
Q202. What is the purpose of using ExecuteQuery in Client-Side Object Model (CSOM)?
ExecuteQuery is used in CSOM to execute the queued actions and retrieve data from SharePoint server.
ExecuteQuery is used to send all pending actions to the server and execute them in a single batch.
It is necessary to call ExecuteQuery after making changes to the client-side object model to ensure the changes are reflected on the server.
ExecuteQuery is asynchronous and requires a callback function to handle the response from the server.
It helps in reducing the number of round ...read more
Q203. Boomi question: What's the use of flow control shape
Flow control shape in Boomi is used to control the flow of data within a process.
Flow control shape allows you to route data based on conditions or criteria.
It can be used to loop through a set of data multiple times until a certain condition is met.
Examples include decision shape, branch shape, and stop shape.
Q204. Usage of action classes Alert used in scripting Where we are using/implementing OOps concepts in Selenium Automation Why are we doing regression testing Usage of interface Difference between Super and This keyw...
read moreAnswering questions related to Selenium Automation and Java programming concepts.
Action classes are used to perform complex user interactions like drag and drop, double click, etc.
Alerts are used to handle pop-up windows and messages in web applications.
OOps concepts like inheritance, encapsulation, and polymorphism are implemented in Selenium Automation to create reusable and maintainable code.
Regression testing is done to ensure that new changes or updates to the applicatio...read more
Q205. What is Fold Taper and Migration Apron?
Fold taper refers to the change in thickness of a fold along its length, while migration apron is a sedimentary deposit formed at the base of a fold.
Fold taper is the variation in thickness of a fold from its hinge to its limbs.
It is caused by the differential shortening and thickening of rock layers during folding.
Fold taper can be observed in geological structures such as anticlines and synclines.
Migration apron is a sedimentary deposit that accumulates at the base of a fol...read more
Q206. 3. How can we make a class immutable in java?
To make a class immutable in Java, we need to follow certain guidelines.
Make the class final
Make all fields private and final
Do not provide setter methods
If the field is mutable, return a clone of it instead of the original object
Ensure that any mutable objects passed to the constructor are not modified outside the class
Q207. If I add 2 same attribute values for a object to a set...will I see 2 objects in the set, if yes what changes you make to the code to insert unique objects to a set
No, you will not see 2 objects in the set. To insert unique objects to a set, you can override the equals() and hashCode() methods in the object class.
In a set, each element must be unique based on the equals() method. If you add 2 objects with the same attribute values, only one will be stored in the set.
To ensure uniqueness, override the equals() and hashCode() methods in the object class. This will define how objects are compared and stored in the set.
For example, if you h...read more
Q208. What are the different types of inheritance in Java, and can you explain the concept of interfaces? Additionally, code editor link was paste where I had to code and execute the code for interfaces .
There are four types of inheritance in Java: single, multilevel, hierarchical, and multiple. Interfaces in Java are used to achieve abstraction and multiple inheritance.
Types of inheritance in Java: single (one class extends one class), multilevel (class extends another class which extends another class), hierarchical (multiple classes extend one class), multiple (one class implements multiple interfaces)
Interfaces in Java are like abstract classes with only abstract methods....read more
Q209. What are some real-life examples that illustrate the concepts of Object-Oriented Programming (OOP)?
Real-life examples of Object-Oriented Programming include modeling a car as an object with properties and methods.
Modeling a car as an object with properties like color, make, model, and methods like start, stop, accelerate
Creating a banking system where accounts are objects with properties like balance and methods like deposit, withdraw
Developing a video game where characters are objects with properties like health, position and methods like move, attack
Q210. What is autoscaling how it works? Give scenario that you have worked on for autoscaling.
Autoscaling is a feature in cloud computing that automatically adjusts the number of compute resources based on workload.
Autoscaling helps in optimizing resource utilization and maintaining performance during peak loads.
It works by monitoring metrics such as CPU utilization or network traffic, and then adding or removing instances as needed.
An example scenario could be setting up autoscaling for a web application that experiences high traffic during certain times of the day.
Q211. Have you worked on Amendment? Explain it?
Yes, I have worked on Amendment. It involves making changes to existing software code or documentation.
Amendment involves modifying existing code or documentation to improve functionality or fix issues.
Examples include updating a software feature to meet new requirements, fixing bugs in the code, or enhancing performance.
Amendment may also involve revising documentation to reflect changes made to the software.
Q212. What is renewal in CPQ? Explain the complete Flow?
Renewal in CPQ refers to the process of renewing a contract or subscription for a product or service.
Renewal in CPQ involves generating a renewal quote for an existing contract or subscription.
The renewal flow typically includes reviewing the terms of the existing contract, making any necessary adjustments, and generating a new quote for the renewed contract.
Customers may have the option to renew their contract for a specified period of time, with the possibility of negotiati...read more
Q213. What is BR, difference between after and async How to restrict data visibility without using ACL How to call one function to another in the same script include name How to get number of vowels count present in...
read moreThe interview questions cover topics such as BR, async, data visibility, function calling, string manipulation, integrations, and server-side data retrieval.
BR stands for Business Rule, which is a server-side script used to define and enforce business logic in ServiceNow.
The difference between after and async is that 'after' runs the script after the record is saved, while 'async' runs the script asynchronously.
To restrict data visibility without using ACL, you can use client...read more
Q214. Architecture of spark. What is lazy evaluation? Difference between repartition and coalesce function?
Spark architecture, lazy evaluation, repartition vs coalesce
Spark architecture consists of a driver program, cluster manager, and worker nodes
Lazy evaluation is a feature of Spark where transformations are not executed until an action is called
Repartition function shuffles data across partitions while coalesce reduces the number of partitions
Repartition can increase or decrease the number of partitions while coalesce only decreases
Repartition is a costly operation while coale...read more
Q215. Q.) What do mean by Joins in SQL? list all of them Q.) What do you mean by Normalization in the database
Q216. What are the disadvantages of using Node.js?
Some disadvantages of using Node.js include performance issues with CPU-bound tasks, callback hell, and lack of strong typing.
Performance issues with CPU-bound tasks due to its single-threaded nature
Callback hell can occur when handling multiple asynchronous operations
Lack of strong typing can lead to errors that may not be caught until runtime
Q217. coding example and to determine which oops concept used
The coding example involves creating a class for a car with properties and methods, demonstrating encapsulation and inheritance.
Create a class 'Car' with private properties like 'make', 'model', 'year' and public methods like 'getMake', 'getModel', 'getYear'. This demonstrates encapsulation.
Create a subclass 'ElectricCar' that inherits from 'Car' and adds a property 'batteryCapacity'. This demonstrates inheritance.
Memory for a string in Java is allocated on the heap, with a reference stored on the stack.
Strings in Java are immutable, so once created they cannot be changed.
String objects are stored on the heap, while references to them are stored on the stack.
String literals are stored in a special memory area called the String Pool.
String objects can also be created using the 'new' keyword.
Q219. How do you configure Application gateway, explain in detail.
To configure Application Gateway, create a resource group, create an application gateway, configure listeners, backend pools, and rules.
Create a resource group
Create an application gateway
Configure listeners
Configure backend pools
Configure rules
Q220. What are some of the code words in the test runner file in cucumber?
Code words in test runner file in Cucumber
Cucumber uses Gherkin syntax for writing feature files
Test runner file specifies the location of feature files and step definitions
Code words in test runner file include 'feature', 'glue', 'tags', 'plugin', 'monochrome', etc.
Q221. How to access the security on CICS screen on distributed system
To access security on CICS screen on distributed system, use CICS Transaction Server Security.
Use CICS Transaction Server Security to control access to CICS resources.
Define security policies and profiles to control access to CICS resources.
Use the CICS Security API to check security status and perform security-related tasks.
Examples of CICS security features include RACF, ACF2, and Top Secret.
Ensure that all users have appropriate security clearance before accessing CICS res...read more
Q222. 1. Explaining the project from my portfolio. 2. Difference between UI and UX. 3. Design Principles. 4. Examples of good and bad UX. 5. Some questions on projects in portfolio.
Interview questions for Associate Designer position
Explained a project from my portfolio
Differentiated between UI and UX
Discussed design principles
Provided examples of good and bad UX
Answered questions on projects in portfolio
Q223. Explain the OOPs concepts and describe the design patterns used in your projects
OOPs concepts include encapsulation, inheritance, and polymorphism. Design patterns used in my projects include Singleton and Factory.
Encapsulation: bundling data and methods that operate on that data within a single unit
Inheritance: creating new classes from existing ones, inheriting their properties and methods
Polymorphism: ability of objects to take on many forms, allowing for flexibility and extensibility
Singleton: ensuring only one instance of a class is created and prov...read more
Q224. What is Middleware in ASP.NET Core
Middleware in ASP.NET Core is software that sits between the web server and the application, handling requests and responses.
Middleware is a pipeline of components that can be added to the application's request processing pipeline.
Each middleware component can handle a specific aspect of the request/response cycle.
Examples of middleware include authentication, logging, and routing.
Middleware can be added to the pipeline using the Use() method in the Startup class.
Middleware c...read more
Q225. What is map, filter and reduce in JavaScript?
Map, filter and reduce are higher-order functions in JavaScript used to manipulate arrays.
Map transforms each element of an array into a new array based on a provided function.
Filter creates a new array with all elements that pass a test implemented by a provided function.
Reduce applies a function to each element of an array and reduces the array to a single value.
These functions are commonly used in functional programming and can make code more concise and readable.
Example: ...read more
Q226. What is journey builder and what are the elements on it?
Journey Builder is a tool in Salesforce Marketing Cloud that allows marketers to create and automate personalized customer journeys.
Journey Builder is a drag-and-drop tool that enables marketers to create and manage customer journeys.
It allows marketers to define the steps a customer takes in their journey, such as sending emails, SMS messages, or push notifications.
Journey Builder also allows for real-time personalization based on customer behavior and preferences.
Elements o...read more
Q227. BE project, what softwares you will use?
I will use software tools that are relevant to my BE project.
The software tools I will use will depend on the nature of my BE project.
For example, if my project involves designing a circuit, I may use software like LTSpice or Proteus.
If my project involves programming, I may use software like Visual Studio or Eclipse.
I will also use software for data analysis and visualization, such as MATLAB or Python.
Ultimately, I will choose software tools that will help me achieve the goa...read more
Q228. How does the Circuit Breaker design pattern work?
Circuit Breaker design pattern is used to prevent a system from repeatedly trying to execute an operation that is likely to fail.
Circuit Breaker monitors the number of failures when calling a remote service
If the failures exceed a certain threshold, the Circuit Breaker trips and stops further calls to the service
After a specified time, the Circuit Breaker allows a limited number of calls to test if the service is available again
Q229. Write a program to write all prime numbers in the given range.
Program to print all prime numbers in a given range.
Take input for the range of numbers
Loop through the range and check if each number is prime
If a number is prime, print it
A number is prime if it is only divisible by 1 and itself
Q230. What are the methods to secure a database using SQL?
Methods to secure a database using SQL include encryption, access control, and regular updates.
Use encryption to protect sensitive data
Implement access control to restrict unauthorized access
Regularly update the database software to patch security vulnerabilities
Q231. what is autoboxing and unboxing
Autoboxing is the automatic conversion of primitive data types to their corresponding object wrapper classes.
Autoboxing is useful when working with collections that require objects instead of primitives.
Example: int i = 5; Integer j = i; //autoboxing
Unboxing is the opposite of autoboxing, where an object of a wrapper class is converted back to its corresponding primitive type.
Example: Integer j = 5; int i = j; //unboxing
Q232. What is Requirement and what is requirement traceability matrix
A requirement is a need or expectation from a stakeholder. A requirement traceability matrix is a tool to track requirements throughout the project lifecycle.
Requirement is a statement that specifies what a product or service should do or how it should perform.
Requirement Traceability Matrix (RTM) is a document that links requirements to their origin and traces them throughout the project lifecycle.
RTM helps to ensure that all requirements are met and that changes to requirem...read more
Q233. What is the Difference between C & C++?
C is a procedural programming language while C++ is a multi-paradigm programming language with object-oriented features.
C is a procedural programming language while C++ supports both procedural and object-oriented programming.
C does not have classes and objects like C++.
C++ has features like inheritance, polymorphism, and encapsulation which are not present in C.
C++ allows function overloading and operator overloading which are not supported in C.
C++ has a richer standard lib...read more
Q234. What is cloud based services, why companies are shifting to cloud?
Cloud based services refer to services and resources delivered over the internet. Companies are shifting to cloud for scalability, cost savings, flexibility, and improved collaboration.
Scalability: Companies can easily scale their resources up or down based on demand without investing in physical infrastructure.
Cost savings: Cloud services eliminate the need for companies to purchase and maintain expensive hardware, leading to cost savings.
Flexibility: Cloud services offer fl...read more
Q235. What is a container and why is the use?
A container is a lightweight, standalone executable package that contains everything needed to run an application.
Containers provide a consistent and reproducible environment for applications to run in.
They are isolated from the host system and other containers, providing security and portability.
Containers can be easily deployed and scaled, making them ideal for modern application development and deployment.
Examples of container technologies include Docker, Kubernetes, and O...read more
Q236. How much experience do you have in Big Data Administration?
I have 3 years of experience in Big Data Administration.
I have worked with Hadoop, Spark, and Hive.
I have experience in setting up and maintaining Hadoop clusters.
I have worked with various Big Data tools and technologies.
I have experience in troubleshooting and resolving issues related to Big Data systems.
Q237. Explain Plugins, What are events, What is dependency injection, What is B2B development
Plugins, events, dependency injection, and B2B development in Magento
Plugins are modules that modify or extend the functionality of Magento
Events are triggers that execute code when a specific action occurs in Magento
Dependency injection is a design pattern that allows objects to be passed as dependencies rather than being created within a class
B2B development involves creating custom features for business-to-business e-commerce websites
Q238. What is constraints and explain them?
Constraints are limitations or restrictions that are put on a system or process.
Constraints can be physical, such as the size or weight of a product
Constraints can also be related to time, budget, or resources
Constraints can impact the design, development, and testing of a system
Examples of constraints include regulatory requirements, customer specifications, and technical limitations
Q239. What do you mean by transformation?
Transformation refers to the process of changing or converting something from one form to another.
Transformation can occur in various fields such as technology, business, and personal development.
Examples of transformation include digital transformation, organizational transformation, and personal transformation.
Transformation often involves a significant change in mindset, processes, and systems.
Successful transformation requires careful planning, communication, and executio...read more
Scheduling in operating systems involves managing the execution of processes to optimize resource utilization.
Scheduling determines which process gets the CPU next based on priority, time slice, etc.
Types of scheduling algorithms include FCFS, Round Robin, Priority Scheduling, etc.
Schedulers can be preemptive (interruptible) or non-preemptive (run to completion).
Q241. Write a program to add numbers in harmonic series. (1+1/2+1/3+.....1/n)
Program to add numbers in harmonic series (1+1/2+1/3+...+1/n)
Create a variable to store the sum
Use a loop to iterate through the series up to n
Add each term to the sum
Print the sum
Q242. What are the key concepts of Object-Oriented Programming (OOP), and can you provide a detailed and structured explanation?
Key concepts of Object-Oriented Programming (OOP) include encapsulation, inheritance, polymorphism, and abstraction.
Encapsulation: Bundling data and methods that operate on the data into a single unit (object).
Inheritance: Allowing a class to inherit properties and behavior from another class.
Polymorphism: The ability for objects of different classes to respond to the same method in different ways.
Abstraction: Hiding the complex implementation details and showing only the nec...read more
Q243. what is the difference between method overloading and overrding
Method overloading is having multiple methods in the same class with the same name but different parameters, while method overriding is having a method in a subclass with the same name and parameters as a method in its superclass.
Method overloading is resolved at compile time based on the method signature and parameters.
Method overriding is resolved at runtime based on the actual object type.
Example of method overloading: public void print(int num) and public void print(Strin...read more
Q244. What is the difference between with sharing and without sharing?
With sharing and without sharing are keywords used in Apex to specify sharing rules for a class.
With sharing enforces the sharing rules of the current user, while without sharing ignores them.
With sharing is used for classes that access or modify data that belongs to multiple users, while without sharing is used for utility classes or classes that only access data owned by the current user.
With sharing is the default behavior if sharing is not specified.
Example: A class that ...read more
Q245. Generators and Decorators implementation in Python
Generators and decorators are powerful features in Python for creating iterable objects and modifying functions respectively.
Generators are functions that use the yield keyword to return a sequence of values lazily.
They are memory efficient as they generate values on the fly instead of storing them in memory.
Decorators are functions that modify the behavior of other functions without changing their source code.
They are used to add functionality to functions, such as logging, ...read more
Q246. What is the code to generate the first 12 prime numbers?
The code to generate the first 12 prime numbers involves checking divisibility by numbers up to the square root of the number.
Start with a list of prime numbers and a counter for the number of primes found.
Loop through numbers starting from 2 and check if they are prime by dividing them by all previous prime numbers.
If a number is not divisible by any previous prime numbers, add it to the list of primes.
Continue this process until you have found 12 prime numbers.
Q247. Sort a map of employees and their corresponding salaries using java streams.
Sort a map of employees and their corresponding salaries using Java streams.
Use entrySet() to get a stream of key-value pairs from the map.
Use sorted() with a comparator to sort the stream based on salaries.
Collect the sorted stream back into a LinkedHashMap to maintain the order.
Q248. What is the difference between CSS and SASS? what is the use of Sass
SASS is a preprocessor scripting language that is interpreted into CSS, offering more features and flexibility.
SASS is a preprocessor for CSS, allowing for variables, nesting, and mixins to be used in stylesheets.
SASS code needs to be compiled into CSS before being used in a web project.
SASS helps in writing cleaner and more organized CSS code, making it easier to maintain and update styles.
CSS is the styling language used for web development, while SASS is a tool that extend...read more
Q249. What do you understand by Report Definition?
Report Definition is a template that defines the structure and layout of a report.
Report Definition specifies the data to be included in a report
It defines the layout, formatting, and grouping of data in a report
Report Definitions can be created using tools like Crystal Reports or SSRS
They help in standardizing the format of reports across an organization
Types of hashmaps in Java include HashMap, LinkedHashMap, and TreeMap.
HashMap: basic implementation, no order guaranteed
LinkedHashMap: maintains insertion order
TreeMap: sorted by natural order or custom comparator
Q251. 1. Difference between finally and static block?
finally is used to execute a block of code after try-catch block, while static block is executed when class is loaded.
finally block is used to perform cleanup operations like closing database connections, file streams etc.
static block is used to initialize static variables or perform any other static initialization.
finally block is always executed whether an exception is thrown or not, while static block is executed only once when class is loaded.
finally block is always writt...read more
Q252. What are the selectors in css
Selectors in CSS are patterns used to select the elements you want to style on a web page.
Selectors can target elements based on their tag name, class, ID, attributes, and more.
Examples include: element selector (p), class selector (.example), ID selector (#example), attribute selector ([type='text']), and pseudo-class selector (:hover).
Q253. Write a program to find the largest and second largest number in an array
Program to find largest and second largest number in an array
Iterate through array and compare each element to current largest and second largest
Update variables accordingly
Return largest and second largest
Q254. What are Isolation level in Db2
Isolation levels in Db2 determine how transactions interact with each other.
Isolation levels include Read Uncommitted, Read Committed, Repeatable Read, and Serializable.
Higher isolation levels provide more consistency but can also lead to more contention and slower performance.
Isolation levels can be set at the transaction level or for individual queries.
For example, a transaction with Repeatable Read isolation level will prevent other transactions from modifying the same dat...read more
Q255. Find the unique element in the array?
To find the unique element in an array
Iterate through the array and use a hash table to keep track of the frequency of each element
Return the element with frequency 1
Alternatively, use XOR operation to cancel out duplicate elements and return the remaining element
Q256. Address of a particular element in an array. And adress of 0th index is given
Finding address of an element in an array given the address of 0th index.
Calculate the offset of the desired element from the 0th index address and add it to the 0th index address.
Address of ith element = address of 0th element + i * size of each element.
Example: Address of 3rd element in an array of strings = address of 0th element + 3 * size of string.
Q257. What is agile methodology used?
Agile methodology is an iterative approach to project management that emphasizes flexibility and customer satisfaction.
Agile methodology involves breaking down a project into smaller, more manageable tasks
It emphasizes collaboration and communication between team members and stakeholders
It allows for changes and adjustments to be made throughout the project
Examples of agile methodologies include Scrum, Kanban, and Lean
Agile is often used in software development, but can be ap...read more
Q258. is it necessary for classes implementing an interface to implement interface methods?
Yes, classes implementing an interface must implement interface methods.
Classes implementing an interface must provide concrete implementations for all methods declared in the interface.
Failure to implement all interface methods will result in a compilation error.
Interfaces are used to define a contract that implementing classes must adhere to.
Q259. Write a program to print the letter counts in the given string?
Program to print letter counts in a given string
Iterate through the string and count occurrences of each letter
Use an array to store the counts for each letter
Print the counts for each letter in the array
Q260. How do you optimize SQL queries?
Optimizing SQL queries involves using indexes, avoiding unnecessary joins, and optimizing the query structure.
Use indexes on columns frequently used in WHERE clauses
Avoid using SELECT * and only retrieve necessary columns
Optimize joins by using INNER JOIN instead of OUTER JOIN when possible
Use EXPLAIN to analyze query performance and make necessary adjustments
Q261. Calculate second highest salary using SQL as well as pyspark.
Calculate second highest salary using SQL and pyspark
Use SQL query with ORDER BY and LIMIT to get the second highest salary
In pyspark, use orderBy() and take() functions to achieve the same result
Q262. What is Ransomware ? Why windows is more vulnerable than Linux system
Ransomware is a type of malware that encrypts files and demands payment for decryption. Windows is more vulnerable due to its popularity and weaker security measures.
Ransomware is a type of malware that encrypts files and demands payment for decryption
Windows is more vulnerable due to its popularity and weaker security measures compared to Linux
Ransomware can spread through phishing emails, malicious websites, and software vulnerabilities
Examples of ransomware include WannaCr...read more
Q263. 7. What trouble shoot will you do if your wifi stops working suddenly?
Q264. Why windows function are not being used in where clause?
Windows functions are not used in WHERE clause to avoid performance issues.
Windows functions are used to perform complex calculations on data.
Using them in WHERE clause can slow down the query execution.
Instead, use simple conditions in WHERE clause and perform calculations in SELECT clause.
For example, instead of using AVG() function in WHERE clause, use HAVING clause.
Also, consider using indexes to improve query performance.
Q265. Find the output of the following code snippets
Code snippet output prediction for software engineer interview
Understand the code logic and data flow
Consider the input values and their impact on output
Check for any loops or conditions that may affect the output
Q266. What do you know about java?
Java is a popular programming language known for its platform independence and object-oriented approach.
Java is a high-level, class-based, object-oriented programming language.
It is designed to have as few implementation dependencies as possible, making it platform-independent.
Java applications are typically compiled to bytecode that can run on any Java virtual machine (JVM).
Java is widely used for developing desktop, web, and mobile applications.
Popular frameworks and librar...read more
Q267. Which protocol is used in SSL configuration?
SSL configuration uses the TLS protocol.
SSL configuration uses the Transport Layer Security (TLS) protocol.
TLS ensures secure communication over a computer network.
Examples of TLS versions include TLS 1.2 and TLS 1.3.
SQL query to find students with marks greater than average marks
Calculate the average marks first
Use a subquery to compare each student's marks with the average marks
Select students where marks are greater than the average
Q269. What are the ways to maintain field level securities in the Aura component?
Field level securities in Aura components
Use Lightning Data Service to enforce CRUD and FLS
Use Apex to enforce additional security logic
Use Lightning Design System to control visibility of fields
Use custom validation rules to enforce business logic
Use sharing rules to control record access
Q270. Modify null salary with avg salary, find count of employees by joining date. Configurations needed Glue job. What are connecters and Data connections in Glue service.
Use Glue job to modify null salaries with average salary and find count of employees by joining date.
Create a Glue job to read data, modify null salaries with average salary, and count employees by joining date
Use Glue connectors to connect to data sources like S3, RDS, or Redshift
Data connections in Glue service are used to define the connection information to data sources
Example: Use Glue job to read employee data from S3, calculate average salary, replace null values, and ...read more
Q271. gave code class A { int i = 10; } class B extends A { int i = 20; } public class test{ public static void main (String [] args) { A a = new B(); System.out.println(a.i): } }
The code will output 10 because the variable i is accessed through a reference of class A.
When a subclass object is assigned to a superclass reference, the superclass reference can only access the superclass members.
In this case, even though the object is of class B, the variable i is accessed from class A.
Output: 10
Q272. tell me the output 1)a = 20; console.log(a); var a; 2)b=10; console.log(b); let b; 3)let a =5; if(a<5){ let b = " a lessthen 5"; }else{ let b = "b is grater then 5"; } console.log(b);
The output for the given code snippets will be: 1) 20 2) ReferenceError: Cannot access 'b' before initialization 3) ReferenceError: b is not defined
In the first snippet, variable 'a' is declared using 'var' after it is assigned a value, so it logs 20 without any issues.
In the second snippet, variable 'b' is declared using 'let' after it is assigned a value, so it throws a ReferenceError as 'b' is accessed before initialization.
In the third snippet, variable 'b' is declared us...read more
Q273. Git commands you have used, and how to handle merge conflict?
Git commands used and handling merge conflicts
Git commands used: git clone, git pull, git push, git add, git commit, git merge, git rebase
To handle merge conflict: git status to see conflicted files, git diff to see the differences, manually resolve conflicts in the files, git add the resolved files, git commit the changes
Q274. How will you accommodate changes in requirements or enhancement?
I will use agile methodology to accommodate changes in requirements or enhancement.
I will prioritize the changes based on their impact on the project and discuss them with the stakeholders.
I will update the project plan and communicate the changes to the team.
I will use agile methodology to accommodate changes in requirements or enhancement.
I will ensure that the changes are properly documented and tested before implementation.
I will continuously monitor the changes and make ...read more
Q275. What is the process for creating and submitting code on GeeksforGeeks?
The process for creating and submitting code on GeeksforGeeks involves writing code, testing it, and then submitting it on the platform.
Create an account on GeeksforGeeks website.
Write the code for the problem statement provided.
Test the code locally to ensure it works correctly.
Submit the code on the GeeksforGeeks platform for evaluation.
Receive feedback and improve the code if necessary.
Q276. What is Component, Pipe,Directive,Services
Components, Pipes, Directives, and Services are key building blocks of Angular applications.
Components are the building blocks of Angular applications and represent a part of the UI.
Pipes are used to transform data before displaying it in the UI.
Directives are used to add behavior to an existing element or create a new element.
Services are used to share data and functionality across components and other services.
Q277. Explain Inheritance and Encapsulation with real-time examples.
Inheritance is a mechanism in which a new class inherits properties and behaviors from an existing class. Encapsulation is the concept of bundling data and methods that operate on the data into a single unit.
Inheritance allows a subclass to inherit attributes and methods from a superclass. For example, a class Animal can be a superclass with attributes like name and age, and methods like eat() and sleep(). A subclass Dog can inherit these attributes and methods.
Encapsulation ...read more
Q278. Create a function and print the addition of two number
Create a function to print the addition of two numbers
Define a function that takes two parameters representing the numbers to be added
Inside the function, add the two numbers together
Print the result of the addition
Q279. What is the difference between Functional & non-functional requirements
Functional requirements describe what the system should do, while non-functional requirements describe how the system should perform.
Functional requirements focus on specific functions or features that the system must provide.
Non-functional requirements focus on qualities or constraints that the system must meet, such as performance, security, or usability.
Functional requirements are typically documented in use cases or user stories.
Non-functional requirements are often docum...read more
Q280. Which is the fastest sorting algorithm?
The fastest sorting algorithm is QuickSort.
QuickSort has an average time complexity of O(n log n).
It is a divide and conquer algorithm that recursively partitions the array.
It is widely used in practice due to its efficiency.
Other fast sorting algorithms include MergeSort and HeapSort.
Q281. What is the benefit of company product and how to pitch with customer and how to sale that product
Our product offers unique features that solve customer pain points and increase efficiency. We pitch by highlighting these benefits and providing personalized solutions.
Identify customer pain points and show how our product solves them
Highlight unique features and advantages of our product
Provide personalized solutions based on customer needs
Offer competitive pricing and flexible payment options
Build strong relationships with customers through excellent service
Use data and an...read more
Q282. What is the code to calculate the factorial of a number?
Factorial of a number is calculated by multiplying all positive integers up to that number.
Use a loop to multiply all positive integers up to the given number.
Handle edge cases like 0 and negative numbers separately.
Example: For input 5, factorial = 5*4*3*2*1 = 120.
Q283. How to fine tune Oracle GoldenGate processes for better performance during long running transactions?
To fine tune Oracle GoldenGate processes for better performance during long running transactions, consider optimizing network bandwidth, adjusting batch sizes, and monitoring lag.
Optimize network bandwidth to reduce latency and improve data transfer speeds.
Adjust batch sizes to balance between latency and throughput, finding the optimal size for your specific workload.
Monitor lag between source and target systems to identify bottlenecks and optimize performance.
Consider using...read more
Q284. Explain where you used Azure function and why
I have used Azure Functions to automate data processing tasks and trigger actions based on events.
Implemented Azure Functions to process incoming data from IoT devices and trigger alerts based on predefined rules
Utilized Azure Functions to automatically resize images uploaded to a storage account
Integrated Azure Functions with Azure Logic Apps to create automated workflows
Q285. What would you do when application is down, what are the debugging steps?
Debugging steps when application is down
Check if the server is up and running
Check if the application service is running
Check the event logs for any errors
Check the application logs for any errors
Check the network connectivity
Check the database connectivity
Check the firewall settings
Restart the application service
Restart the server if necessary
Java 8 introduced several new features including lambda expressions, functional interfaces, streams, and the new Date and Time API.
Lambda expressions allow you to write more concise code by providing a way to pass functions as arguments.
Functional interfaces are interfaces with a single abstract method, which can be implemented using lambda expressions.
Streams provide a way to work with sequences of elements and perform aggregate operations on them.
The new Date and Time API p...read more
Q287. How to create end to end pipeline from Jenkins
To create an end to end pipeline from Jenkins, you need to set up stages for building, testing, and deploying your code.
Set up Jenkins job with necessary plugins for version control, build tools, and deployment
Define stages in Jenkinsfile for building, testing, and deploying code
Configure Jenkins job to trigger automatically on code changes
Integrate with version control system for code checkout and triggering builds
Use Jenkins pipeline syntax to define stages and steps for ea...read more
Q288. What are Compute Services in AZURE, explain
Compute Services in Azure are cloud-based services that provide virtual machines, containers, and serverless computing capabilities.
Azure Virtual Machines: Allows users to create and manage virtual machines in the cloud.
Azure Container Instances: Offers a solution for running containers without managing servers.
Azure Functions: Enables serverless computing by running code in response to events.
Azure Batch: Provides job scheduling and compute management for large-scale paralle...read more
Q289. What is n-1 in agile?
n-1 in agile refers to the number of testers required to test a feature, where n is the total number of testers.
n-1 is a formula used to determine the number of testers needed to test a feature in agile development.
It means that one tester less than the total number of testers is required to test a feature.
For example, if there are 5 testers in a team, then n-1 would mean that 4 testers are required to test a feature.
This approach ensures that there is enough coverage and col...read more
Q290. What is bug and what is defect?
A bug is a coding error that causes unexpected behavior. A defect is a deviation from the expected behavior.
A bug is a mistake made by a programmer while writing code.
A defect is a problem with the software that causes it to behave differently than expected.
Bugs can be fixed by correcting the code, while defects require a deeper analysis of the software.
Examples of bugs include syntax errors, logical errors, and runtime errors.
Examples of defects include incorrect calculation...read more
Q291. what are types of joins, explain inner join
Types of joins include inner join, outer join, left join, and right join. Inner join returns rows when there is a match in both tables.
Inner join combines rows from two tables based on a related column between them
Only the rows with matching values in both tables are included in the result set
Example: SELECT * FROM table1 INNER JOIN table2 ON table1.column = table2.column
Q292. What is the difference between Arrays and dynamic arrays in java?
Arrays have fixed size while dynamic arrays can resize themselves as needed.
Arrays in Java have a fixed size that is specified when the array is created.
Dynamic arrays in Java, like ArrayList, can resize themselves as needed to accommodate more elements.
Example: int[] fixedArray = new int[5]; ArrayList<Integer> dynamicArray = new ArrayList<>();
Q293. What are the port numbers used for JDBC and ODBC connections?
JDBC typically uses port 3306 for MySQL and ODBC typically uses port 1433 for SQL Server.
JDBC commonly uses port 3306 for MySQL connections
ODBC typically uses port 1433 for SQL Server connections
Q294. What is the Java Development Kit (JDK) and what are its main components?
The Java Development Kit (JDK) is a software development kit used to develop Java applications.
Main components include Java Compiler (javac), Java Virtual Machine (JVM), and Java Archive Tool (jar)
JDK also includes libraries, documentation, and development tools
JDK is necessary for compiling, debugging, and running Java programs
Q295. What are the key features and functionalities of lists in Python?
Lists in Python are ordered, mutable, and can contain elements of different data types.
Lists are ordered collections of items, indexed starting at 0.
Lists are mutable, meaning you can change, add, or remove elements.
Lists can contain elements of different data types, such as integers, strings, or even other lists.
You can access elements in a list using square brackets, e.g. my_list[0] to access the first element.
Common list methods include append(), remove(), and sort().
Q296. What are the key concepts of Object-Oriented Programming (OOP) in Java?
Key concepts of OOP in Java include classes, objects, inheritance, polymorphism, encapsulation, and abstraction.
Classes: Blueprint for creating objects, containing attributes and methods.
Objects: Instances of classes that encapsulate data and behavior.
Inheritance: Allows a class to inherit attributes and methods from another class.
Polymorphism: Ability to present the same interface for different data types.
Encapsulation: Bundling data and methods that operate on the data into...read more
Q297. What are different types of data structures?
Data structures are ways to organize and store data in a computer program.
Some common data structures include arrays, linked lists, stacks, queues, trees, and graphs.
Arrays are a collection of elements of the same data type, accessed by an index.
Linked lists are a sequence of nodes, each containing data and a reference to the next node.
Stacks are a last-in, first-out (LIFO) data structure, where elements are added and removed from the top.
Queues are a first-in, first-out (FIF...read more
Q298. Areas of strength and weekness .
My areas of strength include problem-solving, teamwork, and adaptability. My weakness is public speaking.
Strengths: problem-solving (e.g. developing efficient algorithms), teamwork (e.g. collaborating with colleagues on a project), adaptability (e.g. quickly learning new programming languages)
Weakness: public speaking (e.g. presenting technical information to a large audience)
Q299. What is PEGA, and what motivated you to learn it?
PEGA is a business process management tool used for building enterprise applications.
PEGA is a platform for creating and managing business processes and customer interactions.
It offers tools for designing, building, and deploying applications without the need for traditional coding.
I learned PEGA because of its popularity in the industry and its ability to streamline business processes.
Having PEGA skills can open up job opportunities in various industries such as finance, hea...read more
Q300. Write a code to show last 10 incident created in background script
Code to display last 10 incidents in background script
Query incident table to get last 10 records
Use GlideRecord to fetch incident records
Sort records by created date in descending order
More about working at LTIMindtree
Top HR Questions asked in CWD Limited
Interview Process at CWD Limited
Top Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month