Add office photos
Engaged Employer

Mphasis

3.4
based on 8.6k Reviews
Video summary
Filter interviews by

500+ Cognida Interview Questions and Answers

Updated 2 Apr 2025
Popular Designations

Q101. What is the query to print the third highest salary from the given table?

Ans.

Use a subquery to find the third highest salary in a table.

  • Use the RANK() function to assign a rank to each salary in descending order.

  • Filter the results to only include rows with a rank of 3.

  • Consider handling ties in salaries appropriately.

Add your answer

Q102. What is a package, and how do you utilize it in your project?

Ans.

A package is a collection of related procedures, functions, variables, and other PL/SQL constructs.

  • Packages help organize and encapsulate code for easier maintenance and reuse.

  • They can contain both public and private elements.

  • Packages can be used to group related functionality together, improving code modularity.

  • Example: CREATE PACKAGE my_package AS ... END my_package;

Add your answer

Q103. Can you describe two complex JIRA issues you have worked on?

Ans.

Resolved a critical bug causing data loss and implemented a new feature for better user experience.

  • Identified root cause of data loss bug by analyzing database queries and logs

  • Collaborated with cross-functional teams to prioritize and implement a fix

  • Designed and implemented a new feature based on user feedback to enhance usability

Add your answer

Q104. What steps did you take to perform root cause analysis in your project?

Ans.

I conducted thorough analysis by reviewing code, logs, and discussing with team members.

  • Reviewed code to identify potential issues

  • Analyzed logs for error messages and patterns

  • Discussed with team members to gather insights and perspectives

  • Used debugging tools to trace the root cause

Add your answer
Discover Cognida interview dos and don'ts from real experiences

Q105. What is a trigger in database management, and what are its different types?

Ans.

A trigger in database management is a special type of stored procedure that is automatically executed when certain events occur in a database.

  • Triggers can be used to enforce business rules, maintain referential integrity, and automate repetitive tasks.

  • There are two main types of triggers: row-level triggers and statement-level triggers.

  • Row-level triggers are fired for each row affected by a triggering statement, while statement-level triggers are fired once for each triggerin...read more

Add your answer

Q106. Write the program to find smaller value from 3 input

Ans.

Program to find the smallest value from 3 inputs.

  • Compare the first two inputs and store the smaller value.

  • Compare the stored value with the third input and update if smaller.

  • Return the final stored value as the smallest value.

Add your answer
Are these interview questions helpful?

Q107. As per OFAC list what are the sanctioned countries

Ans.

The sanctioned countries as per OFAC list include Iran, North Korea, Syria, Cuba, and Venezuela.

  • Iran

  • North Korea

  • Syria

  • Cuba

  • Venezuela

View 1 answer

Q108. What is inheritance and types of inheritance

Ans.

Inheritance is a concept in object-oriented programming where a class inherits properties and behaviors from another class.

  • Types of inheritance include single inheritance, where a class inherits from only one parent class, and multiple inheritance, where a class inherits from multiple parent classes.

  • Hierarchical inheritance involves one class serving as a parent for multiple child classes.

  • Multilevel inheritance involves a chain of inheritance where a derived class serves as t...read more

Add your answer
Share interview questions and help millions of jobseekers 🌟

Q109. What are the agile metrics you used in your previous project?

Ans.

Agile metrics used in previous project included velocity, burndown charts, and cycle time.

  • Velocity - measuring the amount of work completed in a sprint

  • Burndown charts - tracking the remaining work in a sprint

  • Cycle time - measuring the time taken for a task to be completed

Add your answer

Q110. Various patterns to achieve DI (Method, Constructor, Property level)

Ans.

DI can be achieved through method, constructor, and property level patterns.

  • Method level DI involves passing dependencies as method parameters.

  • Constructor level DI involves passing dependencies as constructor parameters.

  • Property level DI involves setting dependencies as properties of an object.

  • Examples of DI frameworks that use these patterns include Spring and Unity.

  • Choosing the appropriate pattern depends on the specific use case and design considerations.

Add your answer

Q111. 3. How will you pick the product backlog items for particular sprint?

Ans.

Product backlog items are picked for a sprint based on priority, value, dependencies, and team capacity.

  • Prioritize backlog items based on business value and urgency

  • Consider dependencies between backlog items

  • Take into account team capacity and velocity

  • Collaborate with stakeholders to ensure alignment on priorities

  • Use techniques like MoSCoW method or Kano model for prioritization

Add your answer

Q112. how many types of constructor are there? ---told

Ans.

There are three types of constructors in Java: default, parameterized, and copy constructors.

  • Default constructor: no arguments passed

  • Parameterized constructor: arguments passed

  • Copy constructor: creates a new object as a copy of an existing object

  • Example: public class Person { public Person() {} public Person(String name) { this.name = name; } public Person(Person person) { this.name = person.name; } }

Add your answer

Q113. What are different data types and it's features

Ans.

Data types are categories of data items that determine the operations that can be performed on them.

  • Numeric types: int, float, complex

  • Sequence types: list, tuple, range

  • Text type: str

  • Mapping type: dict

  • Set types: set, frozenset

  • Boolean type: bool

  • Binary types: bytes, bytearray, memoryview

Add your answer

Q114. what is meant by polymorphism? abstarction code

Ans.

Polymorphism in programming refers to the ability of a function or method to behave differently based on the object it is called with.

  • Polymorphism allows objects of different classes to be treated as objects of a common superclass.

  • There are two types of polymorphism: compile-time (method overloading) and runtime (method overriding).

  • Example: Inheritance in Java allows a subclass to override a method of its superclass, exhibiting polymorphic behavior.

Add your answer

Q115. how to implement exception handling and filters in .net core web api

Ans.

Exception handling and filters in .NET Core Web API

  • Use try-catch blocks to handle exceptions in the code

  • Implement global exception handling middleware to catch unhandled exceptions

  • Use filters like [Authorize] for authentication and [ValidateAntiForgeryToken] for CSRF protection

  • Create custom exception filters by implementing IExceptionFilter interface

Add your answer
Q116. What is a JIT compiler?
Ans.

JIT compiler stands for Just-In-Time compiler, which compiles code during runtime instead of ahead of time.

  • JIT compiler translates bytecode into machine code on-the-fly

  • Improves performance by optimizing frequently executed code

  • Examples include Java HotSpot, .NET CLR, V8 JavaScript engine

Add your answer
Q117. What is dependency injection?
Ans.

Dependency injection is a design pattern where components are provided with their dependencies rather than creating them internally.

  • Allows for easier testing by providing mock dependencies

  • Promotes loose coupling between components

  • Improves code reusability and maintainability

  • Examples: Constructor injection, Setter injection, Interface injection

Add your answer
Q118. What is an interface?
Ans.

An interface in software engineering is a contract that defines the methods that a class must implement.

  • Defines a set of methods that a class must implement

  • Helps achieve abstraction and loose coupling

  • Allows for multiple classes to implement the same interface

  • Example: Java interfaces define method signatures that classes must implement

Add your answer

Q119. How do you recover from a disk consolidation needed warning.

Ans.

To recover from disk consolidation warning, run a disk consolidation process.

  • Run a disk consolidation process to resolve the warning.

  • Ensure that there is enough free space on the datastore before running the consolidation process.

  • Check for any snapshots on the virtual machine and delete them if not required.

  • If the warning persists, check for any disk or storage-related issues and resolve them.

Add your answer

Q120. What are sub files, types of sub files, difference, which one is used in which conditions.

Add your answer

Q121. Can you walk me through a application migration scenario from onprem to cloud

Ans.

Application migration scenario from onprem to cloud

  • Assess current on-premises application architecture and dependencies

  • Select appropriate cloud provider and services based on requirements

  • Plan for data migration, security, compliance, and performance considerations

  • Test the migration process in a non-production environment

  • Execute the migration with minimal downtime and monitor for any issues

  • Optimize the application for cloud-native features and scalability

Add your answer

Q122. What do you know about Mphasis?

Ans.

Mphasis is an IT services company providing digital solutions to clients globally.

  • Founded in 2000 and headquartered in Bangalore, India

  • Offers services in application development, infrastructure management, and business process outsourcing

  • Has a presence in over 30 countries and serves clients in industries such as banking, insurance, and healthcare

Add your answer

Q123. how to convert rows to columns

Ans.

To convert rows to columns, use the PIVOT function in SQL or transpose function in Excel.

  • Identify the column to be transposed as the new row header

  • Identify the column to be used as the new column header

  • Use PIVOT function in SQL or transpose function in Excel

  • Example: SELECT * FROM table_name PIVOT (MAX(column_to_be_transposed) FOR column_to_be_used AS new_column_header)

  • Example: Select the data to be transposed in Excel, copy it, select a new cell, right-click and select 'Trans...read more

Add your answer

Q124. What are the steps you follow as part of BRD documentation?

Ans.

Steps followed in BRD documentation include gathering requirements, analyzing data, documenting specifications, and obtaining approval.

  • Gather requirements from stakeholders

  • Analyze data to understand current processes and identify gaps

  • Document specifications including functional and non-functional requirements

  • Obtain approval from stakeholders before moving to the next phase

Add your answer

Q125. What is your view on the industry with the advent of Gen AI and Blockchain?

Ans.

Gen AI and Blockchain are revolutionizing the industry by enhancing automation, security, and transparency.

  • Gen AI is transforming data analysis and decision-making processes through advanced algorithms and machine learning.

  • Blockchain technology is revolutionizing data security and transparency by creating decentralized and immutable ledgers.

  • The combination of Gen AI and Blockchain is leading to more efficient and secure business operations across various industries.

  • For exampl...read more

Add your answer

Q126. What are the events of scrum? How do you carry them out?

Ans.

The events of Scrum are Sprint, Sprint Planning, Daily Standup, Sprint Review, and Sprint Retrospective.

  • Sprint: Time-boxed iteration where work is completed and reviewed.

  • Sprint Planning: Meeting to plan the work to be done in the Sprint.

  • Daily Standup: Daily meeting for the team to synchronize and plan the day's work.

  • Sprint Review: Meeting at the end of the Sprint to review the work completed.

  • Sprint Retrospective: Meeting at the end of the Sprint to reflect on what went well a...read more

Add your answer

Q127. What is Shallow copy and deep copy

Ans.

Shallow copy creates a new object with the same reference as the original, while deep copy creates a new object with a new reference.

  • Shallow copy only copies the top-level object, while deep copy copies all nested objects.

  • Shallow copy can be done using slicing or the copy() method, while deep copy requires the copy module.

  • Modifying the original object will affect the shallow copy, but not the deep copy.

  • Example: x = [[1, 2], [3, 4]]; y = x[:] # shallow copy; z = copy.deepcopy(...read more

Add your answer

Q128. Write java program to count the number of repeated characters in the string

Ans.

Java program to count the number of repeated characters in a string

  • Create a HashMap to store characters and their counts

  • Iterate through the string and update the counts in the HashMap

  • Print the characters with counts greater than 1

Add your answer

Q129. 1.How to write an user stories? Is it mandatory to follow any standard?

Ans.

User stories are written to capture requirements from the perspective of an end user. It is not mandatory to follow a specific standard, but it is recommended to include key elements.

  • Start with a simple template: As a [role], I want [feature], so that [benefit].

  • Include acceptance criteria to define when the user story is complete.

  • Prioritize user stories based on business value and dependencies.

  • Collaborate with stakeholders to refine and validate user stories.

  • Use tools like JI...read more

Add your answer

Q130. Write an unit test test case for atm withdraw Remove duplicates from a string Write a post request using rest sharper

Ans.

Unit test case for ATM withdraw and removing duplicates from a string, and writing a post request using RestSharper.

  • For ATM withdraw, test if the correct amount is deducted from the account balance

  • For removing duplicates from a string, test if the output string has no duplicate characters

  • For writing a post request using RestSharper, test if the request is successful and returns the expected response

Add your answer

Q131. What do you know about Capital Market

Ans.

Capital market refers to the financial market where long-term securities such as stocks and bonds are traded.

  • Capital market is a market for long-term securities such as stocks and bonds

  • It is a platform for companies to raise capital by issuing stocks and bonds

  • Investors can buy and sell securities in the capital market

  • Capital market is regulated by government bodies such as SEC in the US

  • Examples of capital markets include NYSE, NASDAQ, and London Stock Exchange

Add your answer

Q132. which Microservice communication pattern you have used?

Ans.

I have used the asynchronous messaging pattern for Microservice communication.

  • Implemented messaging queues like RabbitMQ or Kafka for decoupled communication

  • Used message brokers to enable communication between Microservices

  • Leveraged event-driven architecture for real-time updates and scalability

Add your answer

Q133. What is a constructor and it's purpose?

Ans.

A constructor is a special type of method in a class that is automatically called when an object of that class is created.

  • Constructors have the same name as the class they belong to

  • They are used to initialize the object's state or perform any necessary setup

  • Constructors can have parameters to customize the initialization process

  • Example: public class Car { public Car(String color) { this.color = color; } }

Add your answer

Q134. Can you override a Static Method?

Ans.

Yes, a static method can be overridden in Java using the concept of method hiding.

  • In Java, static methods cannot be overridden in the traditional sense like instance methods.

  • When a subclass defines a static method with the same signature as a static method in the superclass, it is called method hiding.

  • Method hiding does not follow polymorphism and is resolved at compile time based on the reference type.

  • Example: class Parent { static void display() { System.out.println("Parent...read more

Add your answer

Q135. What is the Parent class of Java?

Ans.

The parent class of Java is the Object class.

  • All classes in Java are directly or indirectly derived from the Object class.

  • The Object class is the root class in Java's class hierarchy.

  • It provides methods that are common to all objects in Java, such as toString(), equals(), and hashCode().

Add your answer

Q136. What is Window Handles in Selenium?

Ans.

Window Handles in Selenium are unique identifiers used to handle multiple browser windows in a Selenium test script.

  • Window Handles are unique alphanumeric strings assigned to each browser window opened by Selenium.

  • They are used to switch between different browser windows during a test script execution.

  • Window Handles can be obtained using getWindowHandles() method in Selenium.

  • Example: Set<String> handles = driver.getWindowHandles();

Add your answer

Q137. What are the various joins in SQL?

Ans.

Various types of joins in SQL include inner join, left join, right join, and full outer join.

  • Inner join: Returns rows when there is a match in both tables.

  • Left join: Returns all rows from the left table and the matched rows from the right table.

  • Right join: Returns all rows from the right table and the matched rows from the left table.

  • Full outer join: Returns rows when there is a match in either table.

Add your answer

Q138. What strategies can be employed to enhance the performance of an Angular application?

Ans.

Enhancing Angular app performance involves optimization techniques like lazy loading, change detection strategies, and efficient data handling.

  • Use Lazy Loading: Load feature modules only when needed to reduce initial load time. Example: Implementing lazy loading in the routing module.

  • Optimize Change Detection: Use OnPush strategy to limit checks to only when inputs change. Example: Using ChangeDetectionStrategy.OnPush in components.

  • Track By in ngFor: Improve rendering perform...read more

Add your answer

Q139. What are some best practices to follow while coding in Angular?

Ans.

Follow best practices in Angular to enhance code quality, maintainability, and performance.

  • Use Angular CLI for project setup and management to ensure consistency.

  • Organize code into modules for better separation of concerns.

  • Implement lazy loading for feature modules to improve application performance.

  • Utilize services for data management and business logic, keeping components lean.

  • Follow the Angular style guide for naming conventions and file structure.

  • Use reactive programming ...read more

Add your answer

Q140. What is the difference between call, apply, and bind in JavaScript?

Ans.

call, apply, and bind are methods to set the context of 'this' in JavaScript functions.

  • call: Invokes a function with a specified 'this' value and arguments provided individually. Example: func.call(obj, arg1, arg2);

  • apply: Similar to call, but arguments are provided as an array. Example: func.apply(obj, [arg1, arg2]);

  • bind: Returns a new function with a specified 'this' value, allowing for later invocation. Example: const boundFunc = func.bind(obj);

Add your answer

Q141. What is the difference between the "for," "for each," and "for of" constructs in programming?

Ans.

Different looping constructs in programming serve unique purposes for iterating over collections.

  • for: A traditional loop that iterates over a range of numbers. Example: for (let i = 0; i < 5; i++) { console.log(i); }

  • for each: A method to iterate over elements in an array or collection. Example: array.forEach(item => console.log(item));

  • for of: A modern loop for iterating over iterable objects like arrays, strings, etc. Example: for (const item of array) { console.log(item); }

Add your answer

Q142. What function can be written to check if a string is a palindrome?

Ans.

A palindrome is a string that reads the same forwards and backwards. Here's how to check for it in JavaScript.

  • Convert the string to lowercase to ensure case insensitivity. Example: 'Racecar' becomes 'racecar'.

  • Remove non-alphanumeric characters to focus only on letters and numbers. Example: 'A man, a plan, a canal: Panama!' becomes 'amanaplanacanalpanama'.

  • Reverse the cleaned string and compare it to the original cleaned string. If they match, it's a palindrome.

  • Example function...read more

Add your answer

Q143. An anagram of string is another string contains the same character only the order of character can be different

Ans.

An anagram of a string is a rearrangement of its characters to form a new string with the same set of characters.

  • Anagrams can be formed by rearranging the letters of a word or phrase.

  • Anagrams can be used in cryptography and word games.

  • Examples of anagrams include 'listen' and 'silent', 'debit card' and 'bad credit'.

Add your answer

Q144. What is the full form of KYc, CDD , AML

Ans.

KYC stands for Know Your Customer, CDD stands for Customer Due Diligence, and AML stands for Anti-Money Laundering.

  • KYC is a process of verifying the identity of customers to prevent fraud and money laundering.

  • CDD is a process of assessing the risk of a customer and verifying their identity before establishing a business relationship.

  • AML refers to the laws, regulations, and procedures aimed at preventing criminals from disguising illegally obtained funds as legitimate income.

  • E...read more

Add your answer
Q145. What are Java 8 streams?
Ans.

Java 8 streams are a sequence of elements that support functional-style operations.

  • Streams allow for processing collections of data in a declarative way.

  • They can be used to perform operations like filter, map, reduce, and collect.

  • Streams are lazy, meaning they only perform operations when necessary.

  • Example: List<String> names = Arrays.asList("Alice", "Bob", "Charlie"); Stream<String> stream = names.stream();

Add your answer

Q146. 7. Marker interfaces, Singleton design pattern, why string is immutable

Ans.

Explaining marker interfaces, Singleton design pattern, and immutability of strings

  • Marker interfaces are interfaces with no methods, used to mark a class as having a certain behavior or capability

  • Singleton design pattern ensures only one instance of a class is created and provides a global point of access to it

  • Strings are immutable in Java to ensure their values cannot be changed once created, which improves security and performance

  • Immutable objects are thread-safe and can be...read more

Add your answer

Q147. Tell me about how to call a web service from front end

Ans.

To call a web service from front end, use AJAX or fetch API to send HTTP requests to the web service endpoint.

  • Identify the web service endpoint URL

  • Use AJAX or fetch API to send HTTP requests to the endpoint

  • Specify the HTTP method (GET, POST, PUT, DELETE) and request headers

  • Handle the response from the web service in the front end code

Add your answer

Q148. what scenarios would you choose nosql over sql database?

Ans.

NoSQL databases are preferred for scenarios requiring high scalability, flexibility, and unstructured data.

  • When dealing with large amounts of unstructured data

  • When scalability and performance are key requirements

  • When flexibility in data model is needed

  • For real-time analytics and IoT applications

Add your answer

Q149. What is Liskov Principle?

Ans.

Liskov Principle is a principle of object-oriented programming that states that objects of a superclass should be replaceable with objects of its subclasses without affecting the correctness of the program.

  • Named after Barbara Liskov, a computer scientist who introduced the principle in 1987

  • Also known as Liskov Substitution Principle (LSP)

  • Helps in designing classes that are easy to extend and maintain

  • Violation of LSP can lead to unexpected behavior in the program

  • Example: If a ...read more

Add your answer

Q150. You have three developers working on same powerapps application how do you merge their code while upgrading.

Add your answer

Q151. 5.Can you do debugging while performing testing

Ans.

Yes, debugging is an integral part of testing.

  • Debugging helps identify and fix issues in the code.

  • Debugging can be done using tools like breakpoints, logs, and debuggers.

  • Debugging should be done in a separate environment to avoid affecting the testing environment.

  • Debugging should be done in a systematic manner to ensure all issues are identified and resolved.

Add your answer

Q152. What are Db2 utilities, meaning of various SQL Codes, cursor application.

Ans.

Db2 utilities are tools used for database management, SQL Codes indicate status of SQL operations, and cursors are used for navigating through query results.

  • Db2 utilities are programs used for managing Db2 databases, such as LOAD, REORG, and RUNSTATS.

  • SQL Codes are numeric values that indicate the success or failure of SQL operations, with negative values indicating errors.

  • Cursors are used in database applications to navigate through query results row by row, allowing for proc...read more

Add your answer

Q153. Have you designed architecture solution for large proposals? If so give insights on that.

Ans.

Yes, I have designed architecture solutions for large proposals.

  • I have experience designing architecture solutions for large-scale projects that require high availability, scalability, and security.

  • I have worked on proposals for enterprise clients where the architecture needed to support thousands of users and handle large amounts of data.

  • I have expertise in designing cloud-based solutions using AWS, Azure, or Google Cloud to meet the specific requirements of the proposal.

  • I h...read more

Add your answer

Q154. How do you feel about policies and location constraints?

Ans.

I am comfortable with policies but prefer flexibility in location constraints.

  • I believe policies are necessary for maintaining order and consistency in a work environment.

  • I am open to following company policies and procedures to ensure smooth operations.

  • I prefer flexibility in location constraints as it allows for a better work-life balance and increased productivity.

  • For example, remote work options can be beneficial for employees who may have personal commitments or prefer w...read more

Add your answer

Q155. What is the difference between procedures and functions in programming?

Ans.

Procedures are used to perform an action, while functions return a value.

  • Procedures do not return a value, while functions do.

  • Functions can be used in SQL queries, while procedures cannot.

  • Functions can be called from within SQL statements, while procedures cannot.

  • Procedures can have OUT parameters to return multiple values, while functions can only return a single value.

Add your answer

Q156. Write a program for differentiate odd and even nos

Ans.

Program to differentiate odd and even numbers

  • Use modulus operator to check if number is divisible by 2

  • If remainder is 0, number is even else odd

  • Print the result accordingly

Add your answer

Q157. What were some of the libraries that you used in Selenium using python for Backend testing?

Add your answer

Q158. How do you determine if a string is a palidrome

Ans.

A palindrome is a string that reads the same forwards and backwards.

  • Compare the first character with the last character, the second character with the second-to-last character, and so on.

  • If any pair of characters doesn't match, the string is not a palindrome.

  • Ignore spaces and punctuation marks when comparing characters.

  • Convert the string to lowercase or uppercase to make the comparison case-insensitive.

View 1 answer

Q159. Explain about OSI model

Ans.

The OSI model is a conceptual model that describes how data is transmitted over a network.

  • OSI stands for Open Systems Interconnection.

  • It has 7 layers: Physical, Data Link, Network, Transport, Session, Presentation, and Application.

  • Each layer has a specific function and communicates with the adjacent layers.

  • Example: When you send an email, the Application layer sends it to the Presentation layer, which formats the data, and then sends it to the Session layer.

  • The Session layer ...read more

Add your answer

Q160. what is Authentication, how to achieve it

Ans.

Authentication is the process of verifying the identity of a user or system.

  • Authentication involves confirming the identity of a user through credentials such as passwords, biometrics, or security tokens.

  • Common methods of authentication include single-factor authentication (e.g. password) and multi-factor authentication (e.g. password + SMS code).

  • Authentication can be achieved through protocols like OAuth, OpenID, SAML, and JWT.

  • Implementing secure authentication practices is ...read more

Add your answer

Q161. 2. What's the difference between Functional and Non-Functional requirements?

Ans.

Functional requirements describe what the system should do, while non-functional requirements describe how the system should perform.

  • Functional requirements focus on specific behaviors or functions of the system.

  • Non-functional requirements focus on qualities such as performance, security, and usability.

  • Functional requirements are typically documented in use cases or user stories.

  • Non-functional requirements are often documented in a separate section of the requirements documen...read more

Add your answer

Q162. What documents needs to be post closing

Ans.

Documents required post-closing include title deed, mortgage note, and closing disclosure.

  • Title deed

  • Mortgage note

  • Closing disclosure

Add your answer

Q163. Can you handle 3teams, how you overcome silos

Ans.

Yes, I can handle 3 teams and overcome silos through effective communication and collaboration.

  • Establish regular meetings with all teams to ensure alignment and identify any potential issues

  • Encourage cross-functional collaboration and knowledge sharing

  • Implement a shared project management tool to track progress and ensure transparency

  • Celebrate team successes together to foster a sense of unity

  • Address any conflicts or misunderstandings promptly and openly

Add your answer

Q164. Difference between functional and non functional testing

Ans.

Functional testing checks if the software functions as expected, while non-functional testing checks other aspects like performance and usability.

  • Functional testing focuses on the specific functions of the software.

  • Non-functional testing focuses on aspects like performance, usability, security, and scalability.

  • Examples of functional testing include unit testing, integration testing, and system testing.

  • Examples of non-functional testing include load testing, stress testing, an...read more

Add your answer

Q165. 2. Microservice architecture, benefits, and their disadvantages

Ans.

Microservice architecture is a software design pattern where an application is divided into small, independent services.

  • Benefits of microservice architecture:

  • - Scalability: Each service can be scaled independently, allowing for better performance and resource utilization.

  • - Flexibility: Services can be developed, deployed, and updated independently, enabling faster development cycles.

  • - Fault isolation: If one service fails, it doesn't affect the entire application.

  • - Technology...read more

View 1 answer

Q166. Concurrent modification exception.how to avoid it

Ans.

To avoid concurrent modification exception, use synchronized blocks or data structures like ConcurrentHashMap.

  • Use synchronized blocks to ensure only one thread can modify the data at a time

  • Use data structures like ConcurrentHashMap which are designed to handle concurrent modifications

  • Consider using immutable objects to prevent modification conflicts

Add your answer

Q167. mysql to gcs ,how to move 10 tables at a time?

Ans.

Use Apache Sqoop to move 10 tables from MySQL to Google Cloud Storage.

  • Use Apache Sqoop to import data from MySQL to HDFS

  • Use Google Cloud Storage connector for Hadoop to move data from HDFS to GCS

  • Create a script to automate the process for all 10 tables

Add your answer

Q168. Which single sign on technology/Mechanism is used in project

Ans.

We are using OAuth 2.0 for single sign on in the project.

  • OAuth 2.0 is a widely used authorization framework that enables a third-party application to obtain limited access to an HTTP service.

  • It allows users to log in once and access multiple applications without having to log in again.

  • OAuth 2.0 provides secure delegated access to resources without sharing user credentials.

Add your answer

Q169. Investment banking What is investment banking and top companies

Ans.

Investment banking involves helping companies and governments raise capital by underwriting and selling securities.

  • Investment banks provide financial advisory services to clients

  • They help clients raise capital by underwriting and selling securities

  • Top investment banks include Goldman Sachs, JPMorgan Chase, and Morgan Stanley

Add your answer

Q170. What factors would you consider before deploying services to kubernetes

Ans.

Factors to consider before deploying services to Kubernetes

  • Resource requirements of the services

  • Networking considerations

  • Security measures

  • Monitoring and logging capabilities

  • High availability and scalability needs

Add your answer

Q171. Code for sum of n natural numbers

Ans.

Code for sum of n natural numbers

  • Use a loop to iterate from 1 to n and add each number to a sum variable

  • Return the sum variable

Add your answer

Q172. Explain the difference b/w WebService vs WebApi

Ans.

WebService is a software system designed to support interoperable machine-to-machine interaction over a network. WebApi is a framework for building HTTP services that can be consumed by a broad range of clients.

  • WebService uses SOAP protocol for communication while WebApi uses HTTP protocol.

  • WebService is platform-independent while WebApi is platform-dependent.

  • WebService supports only XML format while WebApi supports XML, JSON, and other formats.

  • WebService is used for enterpris...read more

Add your answer

Q173. Can we change the order for dictionary

Ans.

Yes, we can change the order of a dictionary in Python.

  • Use OrderedDict to maintain the order of insertion

  • Sort the dictionary based on keys or values

  • Convert the dictionary to a list of tuples and sort them

  • Use the sorted() function to sort the dictionary

Add your answer

Q174. Select alternate rows from SQL

Ans.

Select alternate rows from SQL

  • Use the modulo operator to filter alternate rows

  • Add a WHERE clause with the modulo operator

  • Example: SELECT * FROM table WHERE id % 2 = 0

  • Example: SELECT * FROM table WHERE MOD(id, 2) = 0

View 1 answer

Q175. What is investment banking

Ans.

Investment banking is a type of financial service that helps companies and governments raise capital by underwriting and selling securities.

  • Investment banks act as intermediaries between issuers of securities and investors.

  • They provide services such as underwriting, mergers and acquisitions, and securities trading.

  • Examples of investment banks include Goldman Sachs, JPMorgan Chase, and Morgan Stanley.

  • Investment banking is a highly competitive and lucrative industry.

  • It plays a ...read more

View 1 answer

Q176. What is the difference between Regression testing and Retesting?

Ans.

Regression testing is testing the entire system after making changes, while retesting is testing a specific bug fix.

  • Regression testing ensures that changes made to the system do not affect existing functionality.

  • Retesting ensures that a specific bug or issue has been resolved.

  • Regression testing is done after every change, while retesting is done after a bug fix.

  • Regression testing is time-consuming, while retesting is relatively quick.

  • Example of regression testing: testing the...read more

Add your answer

Q177. What steps you perform to increase velociity

Ans.

To increase velocity, I focus on improving team communication, removing impediments, and continuously refining our processes.

  • Encourage open communication and collaboration within the team

  • Identify and remove any obstacles or impediments that are slowing down progress

  • Regularly review and refine our processes to optimize efficiency

  • Ensure that the team is properly trained and equipped with the necessary tools and resources

  • Encourage a culture of continuous improvement and learning

Add your answer

Q178. How a reverse string in java

Ans.

Reverse a string in Java

  • Convert the string to a character array

  • Use two pointers, one at the start and one at the end of the array

  • Swap the characters at the two pointers and move the pointers towards each other

  • Repeat until the pointers meet in the middle

View 1 answer

Q179. What are the troubleshooting steps for resolving Wi-Fi connectivity issues?

Ans.

Troubleshooting steps for resolving Wi-Fi connectivity issues

  • Check if Wi-Fi is enabled on the device

  • Restart the device and the Wi-Fi router

  • Forget and reconnect to the Wi-Fi network

  • Check for any software updates on the device

  • Move closer to the Wi-Fi router to improve signal strength

Add your answer

Q180. What is purpose for TILA RESPA

Ans.

TILA RESPA is a federal law that aims to protect consumers by providing them with clear and accurate information about mortgage loans.

  • TILA RESPA stands for Truth in Lending Act and Real Estate Settlement Procedures Act.

  • The purpose of TILA RESPA is to promote transparency and prevent predatory lending practices in the mortgage industry.

  • It requires lenders to provide borrowers with clear and easy-to-understand information about loan terms, costs, and risks.

  • TILA RESPA also manda...read more

View 1 answer

Q181. What are the reports that a QA has to prepare?

Ans.

QA prepares various reports to track and analyze quality metrics.

  • Test execution report

  • Defect report

  • Test summary report

  • Test coverage report

  • Test trend report

Add your answer

Q182. Wap in java to reverse string, exceptional handling, waits in selenium,

Ans.

Java code to reverse a string with exception handling and waits in Selenium

  • Use StringBuilder to reverse the string

  • Use try-catch block for exception handling

  • Use implicit or explicit waits in Selenium for synchronization

  • Example: String originalString = "hello"; StringBuilder reversedString = new StringBuilder(originalString).reverse();

  • Example: try { // code that may throw exception } catch (Exception e) { // handle exception }

Add your answer

Q183. What is the waterfall model in software development?

Ans.

Waterfall model is a linear sequential software development process where progress flows in one direction like a waterfall.

  • Involves distinct phases such as requirements, design, implementation, testing, and maintenance.

  • Each phase must be completed before moving on to the next.

  • Changes are difficult to implement once a phase is completed.

  • Example: Traditional software development approach.

  • Example: Construction projects.

Add your answer

Q184. How can security and vulnerabilities be managed in Angular applications?

Ans.

Manage security in Angular by using built-in features, best practices, and regular updates to mitigate vulnerabilities.

  • Use Angular's built-in security features like DomSanitizer to prevent XSS attacks.

  • Implement Content Security Policy (CSP) to restrict resources that can be loaded.

  • Regularly update Angular and its dependencies to patch known vulnerabilities.

  • Validate and sanitize user inputs to prevent injection attacks.

  • Use Angular's HttpClient with proper headers to prevent CS...read more

Add your answer

Q185. What is the difference between ngShow and ngIf in AngularJS?

Ans.

ngShow toggles visibility with CSS, while ngIf adds/removes elements from the DOM based on a condition.

  • ngShow: Uses CSS display property to show/hide elements without removing them from the DOM.

  • Example: <div ng-show='isVisible'>Content</div> - Content remains in DOM but hidden if isVisible is false.

  • ngIf: Conditionally includes or excludes elements from the DOM based on the expression's truthiness.

  • Example: <div ng-if='isVisible'>Content</div> - Content is added to the DOM only...read more

Add your answer

Q186. What is the difference between map, filter, and reduce functions?

Ans.

Map, filter, and reduce are array methods in JavaScript for transforming and processing data.

  • Map: Creates a new array by applying a function to each element. Example: [1, 2, 3].map(x => x * 2) results in [2, 4, 6].

  • Filter: Creates a new array with elements that pass a test. Example: [1, 2, 3].filter(x => x > 1) results in [2, 3].

  • Reduce: Reduces an array to a single value by applying a function. Example: [1, 2, 3].reduce((acc, x) => acc + x, 0) results in 6.

Add your answer

Q187. Linear and binary search algorithm

Ans.

Linear search checks each element in a list sequentially, while binary search divides the list in half at each step.

  • Linear search has a time complexity of O(n), while binary search has a time complexity of O(log n).

  • Linear search is used for unsorted lists, while binary search is used for sorted lists.

  • Example: Linear search - searching for a name in a phone book. Binary search - searching for a word in a dictionary.

Add your answer
Q188. What are views in SQL?
Ans.

Views in SQL are virtual tables that are generated based on the result set of a SELECT query.

  • Views are not stored physically in the database, but are dynamically generated when queried.

  • They can be used to simplify complex queries by encapsulating logic and joining multiple tables.

  • Views can also be used to restrict access to certain columns or rows of a table.

  • Example: CREATE VIEW vw_employee AS SELECT emp_id, emp_name FROM employees;

Add your answer

Q189. which Application Insight tool you have used?

Ans.

I have used Application Insights for monitoring and analyzing the performance of .NET applications.

  • Used Application Insights to track application performance metrics

  • Analyzed telemetry data to identify performance bottlenecks

  • Set up alerts and notifications for critical issues

  • Integrated Application Insights with Azure DevOps for continuous monitoring

Add your answer

Q190. GD-one time use plastic should be banned r not

Ans.

Yes, GD-one time use plastic should be banned.

  • One-time use plastic is harmful to the environment and wildlife.

  • Alternatives like reusable bags and containers are readily available.

  • Many countries and cities have already implemented bans on single-use plastics.

  • Reducing plastic waste is crucial for the health of our planet.

Add your answer

Q191. What is PIR and when it is used

Ans.

PIR stands for Post Implementation Review. It is used to evaluate the success of a change initiative and identify areas for improvement.

  • PIR is conducted after a change has been implemented to assess its impact and effectiveness.

  • It involves gathering feedback from stakeholders and analyzing data to determine if the change achieved its objectives.

  • PIR helps identify any issues or challenges faced during the implementation and provides recommendations for future improvements.

  • Exam...read more

View 1 answer

Q192. What are the steps followed to gather requirements?

Ans.

Steps followed to gather requirements include identifying stakeholders, conducting interviews, analyzing existing documentation, and documenting the requirements.

  • Identify stakeholders involved in the project

  • Conduct interviews with stakeholders to understand their needs and expectations

  • Analyze existing documentation such as business processes, system requirements, and user manuals

  • Document the requirements in a clear and concise manner

Add your answer

Q193. Micro services design pattern and example

Ans.

Microservices design pattern involves breaking down a large application into smaller, independent services.

  • Each microservice is responsible for a specific function or feature

  • Communication between microservices is typically done through APIs

  • Microservices can be deployed independently, allowing for easier scalability and maintenance

  • Examples include Netflix (uses microservices for different functionalities like recommendation, user management) and Amazon (uses microservices for ...read more

Add your answer

Q194. Tell me something about Capital Market

Ans.

Capital market is a financial market where long-term securities like stocks, bonds, and mutual funds are traded.

  • It is a market for raising long-term funds

  • It includes stock exchanges, bond markets, and mutual fund markets

  • It facilitates the transfer of funds from savers to borrowers

  • It is regulated by the Securities and Exchange Board of India (SEBI)

  • Examples include BSE, NSE, NYSE, NASDAQ, etc.

Add your answer

Q195. Find the most booking rooms from a Resort which is having multiple floors

Add your answer

Q196. Architecture of previous assignments . Explain deployment pattern as well as interaction between components and Database

Ans.

Utilized microservices architecture with containerization for deployment. Components interacted through REST APIs with database.

  • Implemented microservices architecture for modularity and scalability

  • Utilized containerization (e.g. Docker) for easy deployment and management

  • Components communicated through REST APIs for decoupling and flexibility

  • Database interactions handled through ORM (Object-Relational Mapping) for data access

  • Ensured data consistency and integrity through trans...read more

Add your answer

Q197. oops concepts with real time examples

Ans.

Object-oriented programming concepts with real-life examples

  • Encapsulation: A car's engine is encapsulated and hidden from the user, who only interacts with the car's interface.

  • Inheritance: A cat is a subclass of the animal class, inheriting its properties and methods.

  • Polymorphism: A shape class can have different methods for calculating area depending on the shape, such as circle or rectangle.

  • Abstraction: A TV remote control abstracts the complex inner workings of the TV and ...read more

Add your answer

Q198. What are the built-in functions available in SQL?

Ans.

Some built-in functions in SQL include AVG, COUNT, MAX, MIN, SUM, and CONCAT.

  • AVG: Calculates the average value of a numeric column

  • COUNT: Counts the number of rows in a result set

  • MAX: Returns the maximum value in a column

  • MIN: Returns the minimum value in a column

  • SUM: Calculates the sum of values in a column

  • CONCAT: Concatenates two or more strings together

Add your answer

Q199. What you know about capital markets and explain.

Ans.

Capital markets are financial markets where long-term debt or equity-backed securities are bought and sold.

  • Capital markets are where companies and governments raise long-term funds through debt or equity securities.

  • Investors can buy and sell stocks, bonds, and other financial instruments in capital markets.

  • Capital markets play a crucial role in allocating financial resources efficiently in the economy.

  • Examples of capital markets include stock exchanges like NYSE and NASDAQ, a...read more

Add your answer

Q200. How do you perform upgrades of ESXi and vCenter.

Ans.

Upgrades are performed by following a well-planned process that includes compatibility checks, backups, and testing.

  • Check compatibility of new version with existing hardware and software

  • Take backups of all critical data and configurations

  • Test the upgrade in a non-production environment before applying to production

  • Upgrade ESXi hosts first, followed by vCenter

  • Monitor the upgrade process and troubleshoot any issues that arise

Add your answer
1
2
3
4
5
6
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos

Interview Process at Cognida

based on 687 interviews
Interview experience
4.0
Good
View more
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Interview Questions from Similar Companies

4.1
 • 292 Interview Questions
3.9
 • 201 Interview Questions
4.0
 • 197 Interview Questions
3.6
 • 191 Interview Questions
4.1
 • 172 Interview Questions
3.7
 • 144 Interview Questions
View all
Top Mphasis Interview Questions And Answers
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
75 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter