Mphasis
500+ Cognida Interview Questions and Answers
Q101. What is the query to print the third highest salary from the given table?
Use a subquery to find the third highest salary in a table.
Use the RANK() function to assign a rank to each salary in descending order.
Filter the results to only include rows with a rank of 3.
Consider handling ties in salaries appropriately.
Q102. What is a package, and how do you utilize it in your project?
A package is a collection of related procedures, functions, variables, and other PL/SQL constructs.
Packages help organize and encapsulate code for easier maintenance and reuse.
They can contain both public and private elements.
Packages can be used to group related functionality together, improving code modularity.
Example: CREATE PACKAGE my_package AS ... END my_package;
Q103. Can you describe two complex JIRA issues you have worked on?
Resolved a critical bug causing data loss and implemented a new feature for better user experience.
Identified root cause of data loss bug by analyzing database queries and logs
Collaborated with cross-functional teams to prioritize and implement a fix
Designed and implemented a new feature based on user feedback to enhance usability
Q104. What steps did you take to perform root cause analysis in your project?
I conducted thorough analysis by reviewing code, logs, and discussing with team members.
Reviewed code to identify potential issues
Analyzed logs for error messages and patterns
Discussed with team members to gather insights and perspectives
Used debugging tools to trace the root cause
Q105. What is a trigger in database management, and what are its different types?
A trigger in database management is a special type of stored procedure that is automatically executed when certain events occur in a database.
Triggers can be used to enforce business rules, maintain referential integrity, and automate repetitive tasks.
There are two main types of triggers: row-level triggers and statement-level triggers.
Row-level triggers are fired for each row affected by a triggering statement, while statement-level triggers are fired once for each triggerin...read more
Q106. Write the program to find smaller value from 3 input
Program to find the smallest value from 3 inputs.
Compare the first two inputs and store the smaller value.
Compare the stored value with the third input and update if smaller.
Return the final stored value as the smallest value.
Q107. As per OFAC list what are the sanctioned countries
The sanctioned countries as per OFAC list include Iran, North Korea, Syria, Cuba, and Venezuela.
Iran
North Korea
Syria
Cuba
Venezuela
Q108. What is inheritance and types of inheritance
Inheritance is a concept in object-oriented programming where a class inherits properties and behaviors from another class.
Types of inheritance include single inheritance, where a class inherits from only one parent class, and multiple inheritance, where a class inherits from multiple parent classes.
Hierarchical inheritance involves one class serving as a parent for multiple child classes.
Multilevel inheritance involves a chain of inheritance where a derived class serves as t...read more
Q109. What are the agile metrics you used in your previous project?
Agile metrics used in previous project included velocity, burndown charts, and cycle time.
Velocity - measuring the amount of work completed in a sprint
Burndown charts - tracking the remaining work in a sprint
Cycle time - measuring the time taken for a task to be completed
Q110. Various patterns to achieve DI (Method, Constructor, Property level)
DI can be achieved through method, constructor, and property level patterns.
Method level DI involves passing dependencies as method parameters.
Constructor level DI involves passing dependencies as constructor parameters.
Property level DI involves setting dependencies as properties of an object.
Examples of DI frameworks that use these patterns include Spring and Unity.
Choosing the appropriate pattern depends on the specific use case and design considerations.
Q111. 3. How will you pick the product backlog items for particular sprint?
Product backlog items are picked for a sprint based on priority, value, dependencies, and team capacity.
Prioritize backlog items based on business value and urgency
Consider dependencies between backlog items
Take into account team capacity and velocity
Collaborate with stakeholders to ensure alignment on priorities
Use techniques like MoSCoW method or Kano model for prioritization
Q112. how many types of constructor are there? ---told
There are three types of constructors in Java: default, parameterized, and copy constructors.
Default constructor: no arguments passed
Parameterized constructor: arguments passed
Copy constructor: creates a new object as a copy of an existing object
Example: public class Person { public Person() {} public Person(String name) { this.name = name; } public Person(Person person) { this.name = person.name; } }
Q113. What are different data types and it's features
Data types are categories of data items that determine the operations that can be performed on them.
Numeric types: int, float, complex
Sequence types: list, tuple, range
Text type: str
Mapping type: dict
Set types: set, frozenset
Boolean type: bool
Binary types: bytes, bytearray, memoryview
Q114. what is meant by polymorphism? abstarction code
Polymorphism in programming refers to the ability of a function or method to behave differently based on the object it is called with.
Polymorphism allows objects of different classes to be treated as objects of a common superclass.
There are two types of polymorphism: compile-time (method overloading) and runtime (method overriding).
Example: Inheritance in Java allows a subclass to override a method of its superclass, exhibiting polymorphic behavior.
Q115. how to implement exception handling and filters in .net core web api
Exception handling and filters in .NET Core Web API
Use try-catch blocks to handle exceptions in the code
Implement global exception handling middleware to catch unhandled exceptions
Use filters like [Authorize] for authentication and [ValidateAntiForgeryToken] for CSRF protection
Create custom exception filters by implementing IExceptionFilter interface
JIT compiler stands for Just-In-Time compiler, which compiles code during runtime instead of ahead of time.
JIT compiler translates bytecode into machine code on-the-fly
Improves performance by optimizing frequently executed code
Examples include Java HotSpot, .NET CLR, V8 JavaScript engine
Dependency injection is a design pattern where components are provided with their dependencies rather than creating them internally.
Allows for easier testing by providing mock dependencies
Promotes loose coupling between components
Improves code reusability and maintainability
Examples: Constructor injection, Setter injection, Interface injection
An interface in software engineering is a contract that defines the methods that a class must implement.
Defines a set of methods that a class must implement
Helps achieve abstraction and loose coupling
Allows for multiple classes to implement the same interface
Example: Java interfaces define method signatures that classes must implement
Q119. How do you recover from a disk consolidation needed warning.
To recover from disk consolidation warning, run a disk consolidation process.
Run a disk consolidation process to resolve the warning.
Ensure that there is enough free space on the datastore before running the consolidation process.
Check for any snapshots on the virtual machine and delete them if not required.
If the warning persists, check for any disk or storage-related issues and resolve them.
Q120. What are sub files, types of sub files, difference, which one is used in which conditions.
Q121. Can you walk me through a application migration scenario from onprem to cloud
Application migration scenario from onprem to cloud
Assess current on-premises application architecture and dependencies
Select appropriate cloud provider and services based on requirements
Plan for data migration, security, compliance, and performance considerations
Test the migration process in a non-production environment
Execute the migration with minimal downtime and monitor for any issues
Optimize the application for cloud-native features and scalability
Q122. What do you know about Mphasis?
Mphasis is an IT services company providing digital solutions to clients globally.
Founded in 2000 and headquartered in Bangalore, India
Offers services in application development, infrastructure management, and business process outsourcing
Has a presence in over 30 countries and serves clients in industries such as banking, insurance, and healthcare
Q123. how to convert rows to columns
To convert rows to columns, use the PIVOT function in SQL or transpose function in Excel.
Identify the column to be transposed as the new row header
Identify the column to be used as the new column header
Use PIVOT function in SQL or transpose function in Excel
Example: SELECT * FROM table_name PIVOT (MAX(column_to_be_transposed) FOR column_to_be_used AS new_column_header)
Example: Select the data to be transposed in Excel, copy it, select a new cell, right-click and select 'Trans...read more
Q124. What are the steps you follow as part of BRD documentation?
Steps followed in BRD documentation include gathering requirements, analyzing data, documenting specifications, and obtaining approval.
Gather requirements from stakeholders
Analyze data to understand current processes and identify gaps
Document specifications including functional and non-functional requirements
Obtain approval from stakeholders before moving to the next phase
Q125. What is your view on the industry with the advent of Gen AI and Blockchain?
Gen AI and Blockchain are revolutionizing the industry by enhancing automation, security, and transparency.
Gen AI is transforming data analysis and decision-making processes through advanced algorithms and machine learning.
Blockchain technology is revolutionizing data security and transparency by creating decentralized and immutable ledgers.
The combination of Gen AI and Blockchain is leading to more efficient and secure business operations across various industries.
For exampl...read more
Q126. What are the events of scrum? How do you carry them out?
The events of Scrum are Sprint, Sprint Planning, Daily Standup, Sprint Review, and Sprint Retrospective.
Sprint: Time-boxed iteration where work is completed and reviewed.
Sprint Planning: Meeting to plan the work to be done in the Sprint.
Daily Standup: Daily meeting for the team to synchronize and plan the day's work.
Sprint Review: Meeting at the end of the Sprint to review the work completed.
Sprint Retrospective: Meeting at the end of the Sprint to reflect on what went well a...read more
Q127. What is Shallow copy and deep copy
Shallow copy creates a new object with the same reference as the original, while deep copy creates a new object with a new reference.
Shallow copy only copies the top-level object, while deep copy copies all nested objects.
Shallow copy can be done using slicing or the copy() method, while deep copy requires the copy module.
Modifying the original object will affect the shallow copy, but not the deep copy.
Example: x = [[1, 2], [3, 4]]; y = x[:] # shallow copy; z = copy.deepcopy(...read more
Q128. Write java program to count the number of repeated characters in the string
Java program to count the number of repeated characters in a string
Create a HashMap to store characters and their counts
Iterate through the string and update the counts in the HashMap
Print the characters with counts greater than 1
Q129. 1.How to write an user stories? Is it mandatory to follow any standard?
User stories are written to capture requirements from the perspective of an end user. It is not mandatory to follow a specific standard, but it is recommended to include key elements.
Start with a simple template: As a [role], I want [feature], so that [benefit].
Include acceptance criteria to define when the user story is complete.
Prioritize user stories based on business value and dependencies.
Collaborate with stakeholders to refine and validate user stories.
Use tools like JI...read more
Q130. Write an unit test test case for atm withdraw Remove duplicates from a string Write a post request using rest sharper
Unit test case for ATM withdraw and removing duplicates from a string, and writing a post request using RestSharper.
For ATM withdraw, test if the correct amount is deducted from the account balance
For removing duplicates from a string, test if the output string has no duplicate characters
For writing a post request using RestSharper, test if the request is successful and returns the expected response
Q131. What do you know about Capital Market
Capital market refers to the financial market where long-term securities such as stocks and bonds are traded.
Capital market is a market for long-term securities such as stocks and bonds
It is a platform for companies to raise capital by issuing stocks and bonds
Investors can buy and sell securities in the capital market
Capital market is regulated by government bodies such as SEC in the US
Examples of capital markets include NYSE, NASDAQ, and London Stock Exchange
Q132. which Microservice communication pattern you have used?
I have used the asynchronous messaging pattern for Microservice communication.
Implemented messaging queues like RabbitMQ or Kafka for decoupled communication
Used message brokers to enable communication between Microservices
Leveraged event-driven architecture for real-time updates and scalability
Q133. What is a constructor and it's purpose?
A constructor is a special type of method in a class that is automatically called when an object of that class is created.
Constructors have the same name as the class they belong to
They are used to initialize the object's state or perform any necessary setup
Constructors can have parameters to customize the initialization process
Example: public class Car { public Car(String color) { this.color = color; } }
Q134. Can you override a Static Method?
Yes, a static method can be overridden in Java using the concept of method hiding.
In Java, static methods cannot be overridden in the traditional sense like instance methods.
When a subclass defines a static method with the same signature as a static method in the superclass, it is called method hiding.
Method hiding does not follow polymorphism and is resolved at compile time based on the reference type.
Example: class Parent { static void display() { System.out.println("Parent...read more
Q135. What is the Parent class of Java?
The parent class of Java is the Object class.
All classes in Java are directly or indirectly derived from the Object class.
The Object class is the root class in Java's class hierarchy.
It provides methods that are common to all objects in Java, such as toString(), equals(), and hashCode().
Q136. What is Window Handles in Selenium?
Window Handles in Selenium are unique identifiers used to handle multiple browser windows in a Selenium test script.
Window Handles are unique alphanumeric strings assigned to each browser window opened by Selenium.
They are used to switch between different browser windows during a test script execution.
Window Handles can be obtained using getWindowHandles() method in Selenium.
Example: Set<String> handles = driver.getWindowHandles();
Q137. What are the various joins in SQL?
Various types of joins in SQL include inner join, left join, right join, and full outer join.
Inner join: Returns rows when there is a match in both tables.
Left join: Returns all rows from the left table and the matched rows from the right table.
Right join: Returns all rows from the right table and the matched rows from the left table.
Full outer join: Returns rows when there is a match in either table.
Q138. What strategies can be employed to enhance the performance of an Angular application?
Enhancing Angular app performance involves optimization techniques like lazy loading, change detection strategies, and efficient data handling.
Use Lazy Loading: Load feature modules only when needed to reduce initial load time. Example: Implementing lazy loading in the routing module.
Optimize Change Detection: Use OnPush strategy to limit checks to only when inputs change. Example: Using ChangeDetectionStrategy.OnPush in components.
Track By in ngFor: Improve rendering perform...read more
Q139. What are some best practices to follow while coding in Angular?
Follow best practices in Angular to enhance code quality, maintainability, and performance.
Use Angular CLI for project setup and management to ensure consistency.
Organize code into modules for better separation of concerns.
Implement lazy loading for feature modules to improve application performance.
Utilize services for data management and business logic, keeping components lean.
Follow the Angular style guide for naming conventions and file structure.
Use reactive programming ...read more
Q140. What is the difference between call, apply, and bind in JavaScript?
call, apply, and bind are methods to set the context of 'this' in JavaScript functions.
call: Invokes a function with a specified 'this' value and arguments provided individually. Example: func.call(obj, arg1, arg2);
apply: Similar to call, but arguments are provided as an array. Example: func.apply(obj, [arg1, arg2]);
bind: Returns a new function with a specified 'this' value, allowing for later invocation. Example: const boundFunc = func.bind(obj);
Q141. What is the difference between the "for," "for each," and "for of" constructs in programming?
Different looping constructs in programming serve unique purposes for iterating over collections.
for: A traditional loop that iterates over a range of numbers. Example: for (let i = 0; i < 5; i++) { console.log(i); }
for each: A method to iterate over elements in an array or collection. Example: array.forEach(item => console.log(item));
for of: A modern loop for iterating over iterable objects like arrays, strings, etc. Example: for (const item of array) { console.log(item); }
Q142. What function can be written to check if a string is a palindrome?
A palindrome is a string that reads the same forwards and backwards. Here's how to check for it in JavaScript.
Convert the string to lowercase to ensure case insensitivity. Example: 'Racecar' becomes 'racecar'.
Remove non-alphanumeric characters to focus only on letters and numbers. Example: 'A man, a plan, a canal: Panama!' becomes 'amanaplanacanalpanama'.
Reverse the cleaned string and compare it to the original cleaned string. If they match, it's a palindrome.
Example function...read more
Q143. An anagram of string is another string contains the same character only the order of character can be different
An anagram of a string is a rearrangement of its characters to form a new string with the same set of characters.
Anagrams can be formed by rearranging the letters of a word or phrase.
Anagrams can be used in cryptography and word games.
Examples of anagrams include 'listen' and 'silent', 'debit card' and 'bad credit'.
Q144. What is the full form of KYc, CDD , AML
KYC stands for Know Your Customer, CDD stands for Customer Due Diligence, and AML stands for Anti-Money Laundering.
KYC is a process of verifying the identity of customers to prevent fraud and money laundering.
CDD is a process of assessing the risk of a customer and verifying their identity before establishing a business relationship.
AML refers to the laws, regulations, and procedures aimed at preventing criminals from disguising illegally obtained funds as legitimate income.
E...read more
Java 8 streams are a sequence of elements that support functional-style operations.
Streams allow for processing collections of data in a declarative way.
They can be used to perform operations like filter, map, reduce, and collect.
Streams are lazy, meaning they only perform operations when necessary.
Example: List<String> names = Arrays.asList("Alice", "Bob", "Charlie"); Stream<String> stream = names.stream();
Q146. 7. Marker interfaces, Singleton design pattern, why string is immutable
Explaining marker interfaces, Singleton design pattern, and immutability of strings
Marker interfaces are interfaces with no methods, used to mark a class as having a certain behavior or capability
Singleton design pattern ensures only one instance of a class is created and provides a global point of access to it
Strings are immutable in Java to ensure their values cannot be changed once created, which improves security and performance
Immutable objects are thread-safe and can be...read more
Q147. Tell me about how to call a web service from front end
To call a web service from front end, use AJAX or fetch API to send HTTP requests to the web service endpoint.
Identify the web service endpoint URL
Use AJAX or fetch API to send HTTP requests to the endpoint
Specify the HTTP method (GET, POST, PUT, DELETE) and request headers
Handle the response from the web service in the front end code
Q148. what scenarios would you choose nosql over sql database?
NoSQL databases are preferred for scenarios requiring high scalability, flexibility, and unstructured data.
When dealing with large amounts of unstructured data
When scalability and performance are key requirements
When flexibility in data model is needed
For real-time analytics and IoT applications
Q149. What is Liskov Principle?
Liskov Principle is a principle of object-oriented programming that states that objects of a superclass should be replaceable with objects of its subclasses without affecting the correctness of the program.
Named after Barbara Liskov, a computer scientist who introduced the principle in 1987
Also known as Liskov Substitution Principle (LSP)
Helps in designing classes that are easy to extend and maintain
Violation of LSP can lead to unexpected behavior in the program
Example: If a ...read more
Q150. You have three developers working on same powerapps application how do you merge their code while upgrading.
Q151. 5.Can you do debugging while performing testing
Yes, debugging is an integral part of testing.
Debugging helps identify and fix issues in the code.
Debugging can be done using tools like breakpoints, logs, and debuggers.
Debugging should be done in a separate environment to avoid affecting the testing environment.
Debugging should be done in a systematic manner to ensure all issues are identified and resolved.
Q152. What are Db2 utilities, meaning of various SQL Codes, cursor application.
Db2 utilities are tools used for database management, SQL Codes indicate status of SQL operations, and cursors are used for navigating through query results.
Db2 utilities are programs used for managing Db2 databases, such as LOAD, REORG, and RUNSTATS.
SQL Codes are numeric values that indicate the success or failure of SQL operations, with negative values indicating errors.
Cursors are used in database applications to navigate through query results row by row, allowing for proc...read more
Q153. Have you designed architecture solution for large proposals? If so give insights on that.
Yes, I have designed architecture solutions for large proposals.
I have experience designing architecture solutions for large-scale projects that require high availability, scalability, and security.
I have worked on proposals for enterprise clients where the architecture needed to support thousands of users and handle large amounts of data.
I have expertise in designing cloud-based solutions using AWS, Azure, or Google Cloud to meet the specific requirements of the proposal.
I h...read more
Q154. How do you feel about policies and location constraints?
I am comfortable with policies but prefer flexibility in location constraints.
I believe policies are necessary for maintaining order and consistency in a work environment.
I am open to following company policies and procedures to ensure smooth operations.
I prefer flexibility in location constraints as it allows for a better work-life balance and increased productivity.
For example, remote work options can be beneficial for employees who may have personal commitments or prefer w...read more
Q155. What is the difference between procedures and functions in programming?
Procedures are used to perform an action, while functions return a value.
Procedures do not return a value, while functions do.
Functions can be used in SQL queries, while procedures cannot.
Functions can be called from within SQL statements, while procedures cannot.
Procedures can have OUT parameters to return multiple values, while functions can only return a single value.
Q156. Write a program for differentiate odd and even nos
Program to differentiate odd and even numbers
Use modulus operator to check if number is divisible by 2
If remainder is 0, number is even else odd
Print the result accordingly
Q157. What were some of the libraries that you used in Selenium using python for Backend testing?
Q158. How do you determine if a string is a palidrome
A palindrome is a string that reads the same forwards and backwards.
Compare the first character with the last character, the second character with the second-to-last character, and so on.
If any pair of characters doesn't match, the string is not a palindrome.
Ignore spaces and punctuation marks when comparing characters.
Convert the string to lowercase or uppercase to make the comparison case-insensitive.
Q159. Explain about OSI model
The OSI model is a conceptual model that describes how data is transmitted over a network.
OSI stands for Open Systems Interconnection.
It has 7 layers: Physical, Data Link, Network, Transport, Session, Presentation, and Application.
Each layer has a specific function and communicates with the adjacent layers.
Example: When you send an email, the Application layer sends it to the Presentation layer, which formats the data, and then sends it to the Session layer.
The Session layer ...read more
Q160. what is Authentication, how to achieve it
Authentication is the process of verifying the identity of a user or system.
Authentication involves confirming the identity of a user through credentials such as passwords, biometrics, or security tokens.
Common methods of authentication include single-factor authentication (e.g. password) and multi-factor authentication (e.g. password + SMS code).
Authentication can be achieved through protocols like OAuth, OpenID, SAML, and JWT.
Implementing secure authentication practices is ...read more
Q161. 2. What's the difference between Functional and Non-Functional requirements?
Functional requirements describe what the system should do, while non-functional requirements describe how the system should perform.
Functional requirements focus on specific behaviors or functions of the system.
Non-functional requirements focus on qualities such as performance, security, and usability.
Functional requirements are typically documented in use cases or user stories.
Non-functional requirements are often documented in a separate section of the requirements documen...read more
Q162. What documents needs to be post closing
Documents required post-closing include title deed, mortgage note, and closing disclosure.
Title deed
Mortgage note
Closing disclosure
Q163. Can you handle 3teams, how you overcome silos
Yes, I can handle 3 teams and overcome silos through effective communication and collaboration.
Establish regular meetings with all teams to ensure alignment and identify any potential issues
Encourage cross-functional collaboration and knowledge sharing
Implement a shared project management tool to track progress and ensure transparency
Celebrate team successes together to foster a sense of unity
Address any conflicts or misunderstandings promptly and openly
Q164. Difference between functional and non functional testing
Functional testing checks if the software functions as expected, while non-functional testing checks other aspects like performance and usability.
Functional testing focuses on the specific functions of the software.
Non-functional testing focuses on aspects like performance, usability, security, and scalability.
Examples of functional testing include unit testing, integration testing, and system testing.
Examples of non-functional testing include load testing, stress testing, an...read more
Q165. 2. Microservice architecture, benefits, and their disadvantages
Microservice architecture is a software design pattern where an application is divided into small, independent services.
Benefits of microservice architecture:
- Scalability: Each service can be scaled independently, allowing for better performance and resource utilization.
- Flexibility: Services can be developed, deployed, and updated independently, enabling faster development cycles.
- Fault isolation: If one service fails, it doesn't affect the entire application.
- Technology...read more
Q166. Concurrent modification exception.how to avoid it
To avoid concurrent modification exception, use synchronized blocks or data structures like ConcurrentHashMap.
Use synchronized blocks to ensure only one thread can modify the data at a time
Use data structures like ConcurrentHashMap which are designed to handle concurrent modifications
Consider using immutable objects to prevent modification conflicts
Q167. mysql to gcs ,how to move 10 tables at a time?
Use Apache Sqoop to move 10 tables from MySQL to Google Cloud Storage.
Use Apache Sqoop to import data from MySQL to HDFS
Use Google Cloud Storage connector for Hadoop to move data from HDFS to GCS
Create a script to automate the process for all 10 tables
Q168. Which single sign on technology/Mechanism is used in project
We are using OAuth 2.0 for single sign on in the project.
OAuth 2.0 is a widely used authorization framework that enables a third-party application to obtain limited access to an HTTP service.
It allows users to log in once and access multiple applications without having to log in again.
OAuth 2.0 provides secure delegated access to resources without sharing user credentials.
Q169. Investment banking What is investment banking and top companies
Investment banking involves helping companies and governments raise capital by underwriting and selling securities.
Investment banks provide financial advisory services to clients
They help clients raise capital by underwriting and selling securities
Top investment banks include Goldman Sachs, JPMorgan Chase, and Morgan Stanley
Q170. What factors would you consider before deploying services to kubernetes
Factors to consider before deploying services to Kubernetes
Resource requirements of the services
Networking considerations
Security measures
Monitoring and logging capabilities
High availability and scalability needs
Q171. Code for sum of n natural numbers
Code for sum of n natural numbers
Use a loop to iterate from 1 to n and add each number to a sum variable
Return the sum variable
Q172. Explain the difference b/w WebService vs WebApi
WebService is a software system designed to support interoperable machine-to-machine interaction over a network. WebApi is a framework for building HTTP services that can be consumed by a broad range of clients.
WebService uses SOAP protocol for communication while WebApi uses HTTP protocol.
WebService is platform-independent while WebApi is platform-dependent.
WebService supports only XML format while WebApi supports XML, JSON, and other formats.
WebService is used for enterpris...read more
Q173. Can we change the order for dictionary
Yes, we can change the order of a dictionary in Python.
Use OrderedDict to maintain the order of insertion
Sort the dictionary based on keys or values
Convert the dictionary to a list of tuples and sort them
Use the sorted() function to sort the dictionary
Q174. Select alternate rows from SQL
Select alternate rows from SQL
Use the modulo operator to filter alternate rows
Add a WHERE clause with the modulo operator
Example: SELECT * FROM table WHERE id % 2 = 0
Example: SELECT * FROM table WHERE MOD(id, 2) = 0
Q175. What is investment banking
Investment banking is a type of financial service that helps companies and governments raise capital by underwriting and selling securities.
Investment banks act as intermediaries between issuers of securities and investors.
They provide services such as underwriting, mergers and acquisitions, and securities trading.
Examples of investment banks include Goldman Sachs, JPMorgan Chase, and Morgan Stanley.
Investment banking is a highly competitive and lucrative industry.
It plays a ...read more
Q176. What is the difference between Regression testing and Retesting?
Regression testing is testing the entire system after making changes, while retesting is testing a specific bug fix.
Regression testing ensures that changes made to the system do not affect existing functionality.
Retesting ensures that a specific bug or issue has been resolved.
Regression testing is done after every change, while retesting is done after a bug fix.
Regression testing is time-consuming, while retesting is relatively quick.
Example of regression testing: testing the...read more
Q177. What steps you perform to increase velociity
To increase velocity, I focus on improving team communication, removing impediments, and continuously refining our processes.
Encourage open communication and collaboration within the team
Identify and remove any obstacles or impediments that are slowing down progress
Regularly review and refine our processes to optimize efficiency
Ensure that the team is properly trained and equipped with the necessary tools and resources
Encourage a culture of continuous improvement and learning
Q178. How a reverse string in java
Reverse a string in Java
Convert the string to a character array
Use two pointers, one at the start and one at the end of the array
Swap the characters at the two pointers and move the pointers towards each other
Repeat until the pointers meet in the middle
Q179. What are the troubleshooting steps for resolving Wi-Fi connectivity issues?
Troubleshooting steps for resolving Wi-Fi connectivity issues
Check if Wi-Fi is enabled on the device
Restart the device and the Wi-Fi router
Forget and reconnect to the Wi-Fi network
Check for any software updates on the device
Move closer to the Wi-Fi router to improve signal strength
Q180. What is purpose for TILA RESPA
TILA RESPA is a federal law that aims to protect consumers by providing them with clear and accurate information about mortgage loans.
TILA RESPA stands for Truth in Lending Act and Real Estate Settlement Procedures Act.
The purpose of TILA RESPA is to promote transparency and prevent predatory lending practices in the mortgage industry.
It requires lenders to provide borrowers with clear and easy-to-understand information about loan terms, costs, and risks.
TILA RESPA also manda...read more
Q181. What are the reports that a QA has to prepare?
QA prepares various reports to track and analyze quality metrics.
Test execution report
Defect report
Test summary report
Test coverage report
Test trend report
Q182. Wap in java to reverse string, exceptional handling, waits in selenium,
Java code to reverse a string with exception handling and waits in Selenium
Use StringBuilder to reverse the string
Use try-catch block for exception handling
Use implicit or explicit waits in Selenium for synchronization
Example: String originalString = "hello"; StringBuilder reversedString = new StringBuilder(originalString).reverse();
Example: try { // code that may throw exception } catch (Exception e) { // handle exception }
Q183. What is the waterfall model in software development?
Waterfall model is a linear sequential software development process where progress flows in one direction like a waterfall.
Involves distinct phases such as requirements, design, implementation, testing, and maintenance.
Each phase must be completed before moving on to the next.
Changes are difficult to implement once a phase is completed.
Example: Traditional software development approach.
Example: Construction projects.
Q184. How can security and vulnerabilities be managed in Angular applications?
Manage security in Angular by using built-in features, best practices, and regular updates to mitigate vulnerabilities.
Use Angular's built-in security features like DomSanitizer to prevent XSS attacks.
Implement Content Security Policy (CSP) to restrict resources that can be loaded.
Regularly update Angular and its dependencies to patch known vulnerabilities.
Validate and sanitize user inputs to prevent injection attacks.
Use Angular's HttpClient with proper headers to prevent CS...read more
Q185. What is the difference between ngShow and ngIf in AngularJS?
ngShow toggles visibility with CSS, while ngIf adds/removes elements from the DOM based on a condition.
ngShow: Uses CSS display property to show/hide elements without removing them from the DOM.
Example: <div ng-show='isVisible'>Content</div> - Content remains in DOM but hidden if isVisible is false.
ngIf: Conditionally includes or excludes elements from the DOM based on the expression's truthiness.
Example: <div ng-if='isVisible'>Content</div> - Content is added to the DOM only...read more
Q186. What is the difference between map, filter, and reduce functions?
Map, filter, and reduce are array methods in JavaScript for transforming and processing data.
Map: Creates a new array by applying a function to each element. Example: [1, 2, 3].map(x => x * 2) results in [2, 4, 6].
Filter: Creates a new array with elements that pass a test. Example: [1, 2, 3].filter(x => x > 1) results in [2, 3].
Reduce: Reduces an array to a single value by applying a function. Example: [1, 2, 3].reduce((acc, x) => acc + x, 0) results in 6.
Q187. Linear and binary search algorithm
Linear search checks each element in a list sequentially, while binary search divides the list in half at each step.
Linear search has a time complexity of O(n), while binary search has a time complexity of O(log n).
Linear search is used for unsorted lists, while binary search is used for sorted lists.
Example: Linear search - searching for a name in a phone book. Binary search - searching for a word in a dictionary.
Views in SQL are virtual tables that are generated based on the result set of a SELECT query.
Views are not stored physically in the database, but are dynamically generated when queried.
They can be used to simplify complex queries by encapsulating logic and joining multiple tables.
Views can also be used to restrict access to certain columns or rows of a table.
Example: CREATE VIEW vw_employee AS SELECT emp_id, emp_name FROM employees;
Q189. which Application Insight tool you have used?
I have used Application Insights for monitoring and analyzing the performance of .NET applications.
Used Application Insights to track application performance metrics
Analyzed telemetry data to identify performance bottlenecks
Set up alerts and notifications for critical issues
Integrated Application Insights with Azure DevOps for continuous monitoring
Q190. GD-one time use plastic should be banned r not
Yes, GD-one time use plastic should be banned.
One-time use plastic is harmful to the environment and wildlife.
Alternatives like reusable bags and containers are readily available.
Many countries and cities have already implemented bans on single-use plastics.
Reducing plastic waste is crucial for the health of our planet.
Q191. What is PIR and when it is used
PIR stands for Post Implementation Review. It is used to evaluate the success of a change initiative and identify areas for improvement.
PIR is conducted after a change has been implemented to assess its impact and effectiveness.
It involves gathering feedback from stakeholders and analyzing data to determine if the change achieved its objectives.
PIR helps identify any issues or challenges faced during the implementation and provides recommendations for future improvements.
Exam...read more
Q192. What are the steps followed to gather requirements?
Steps followed to gather requirements include identifying stakeholders, conducting interviews, analyzing existing documentation, and documenting the requirements.
Identify stakeholders involved in the project
Conduct interviews with stakeholders to understand their needs and expectations
Analyze existing documentation such as business processes, system requirements, and user manuals
Document the requirements in a clear and concise manner
Q193. Micro services design pattern and example
Microservices design pattern involves breaking down a large application into smaller, independent services.
Each microservice is responsible for a specific function or feature
Communication between microservices is typically done through APIs
Microservices can be deployed independently, allowing for easier scalability and maintenance
Examples include Netflix (uses microservices for different functionalities like recommendation, user management) and Amazon (uses microservices for ...read more
Q194. Tell me something about Capital Market
Capital market is a financial market where long-term securities like stocks, bonds, and mutual funds are traded.
It is a market for raising long-term funds
It includes stock exchanges, bond markets, and mutual fund markets
It facilitates the transfer of funds from savers to borrowers
It is regulated by the Securities and Exchange Board of India (SEBI)
Examples include BSE, NSE, NYSE, NASDAQ, etc.
Q195. Find the most booking rooms from a Resort which is having multiple floors
Q196. Architecture of previous assignments . Explain deployment pattern as well as interaction between components and Database
Utilized microservices architecture with containerization for deployment. Components interacted through REST APIs with database.
Implemented microservices architecture for modularity and scalability
Utilized containerization (e.g. Docker) for easy deployment and management
Components communicated through REST APIs for decoupling and flexibility
Database interactions handled through ORM (Object-Relational Mapping) for data access
Ensured data consistency and integrity through trans...read more
Q197. oops concepts with real time examples
Object-oriented programming concepts with real-life examples
Encapsulation: A car's engine is encapsulated and hidden from the user, who only interacts with the car's interface.
Inheritance: A cat is a subclass of the animal class, inheriting its properties and methods.
Polymorphism: A shape class can have different methods for calculating area depending on the shape, such as circle or rectangle.
Abstraction: A TV remote control abstracts the complex inner workings of the TV and ...read more
Q198. What are the built-in functions available in SQL?
Some built-in functions in SQL include AVG, COUNT, MAX, MIN, SUM, and CONCAT.
AVG: Calculates the average value of a numeric column
COUNT: Counts the number of rows in a result set
MAX: Returns the maximum value in a column
MIN: Returns the minimum value in a column
SUM: Calculates the sum of values in a column
CONCAT: Concatenates two or more strings together
Q199. What you know about capital markets and explain.
Capital markets are financial markets where long-term debt or equity-backed securities are bought and sold.
Capital markets are where companies and governments raise long-term funds through debt or equity securities.
Investors can buy and sell stocks, bonds, and other financial instruments in capital markets.
Capital markets play a crucial role in allocating financial resources efficiently in the economy.
Examples of capital markets include stock exchanges like NYSE and NASDAQ, a...read more
Q200. How do you perform upgrades of ESXi and vCenter.
Upgrades are performed by following a well-planned process that includes compatibility checks, backups, and testing.
Check compatibility of new version with existing hardware and software
Take backups of all critical data and configurations
Test the upgrade in a non-production environment before applying to production
Upgrade ESXi hosts first, followed by vCenter
Monitor the upgrade process and troubleshoot any issues that arise
Top HR Questions asked in Cognida
Interview Process at Cognida
Top Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month