Add office photos
Engaged Employer

Nagarro

4.0
based on 4.1k Reviews
Video summary
Filter interviews by

400+ ITC Interview Questions and Answers

Updated 30 Jan 2025
Popular Designations

Q101. Maximum Sum Path in a Binary Tree

Your task is to determine the maximum possible sum of a simple path between any two nodes (possibly the same) in a given binary tree of 'N' nodes with integer values.

Explanati...read more

Ans.

Find the maximum sum of a simple path between any two nodes in a binary tree.

  • Use a recursive approach to traverse the binary tree and calculate the maximum sum path.

  • Keep track of the maximum sum path found so far while traversing the tree.

  • Consider negative values in the path sum calculation to handle cases where the path can start and end at different nodes.

  • Handle cases where the path can go through the root node or not.

Add your answer

Q102. How would you search any string(numeric or alphanumeric) from a ps file(position could b any)?

Ans.

To search a string from a ps file, use the grep command with the string and file name as arguments.

  • Open the ps file in a text editor or use the command line to navigate to the file location.

  • Use the grep command followed by the string you want to search and the file name as arguments.

  • If the string is found, the command will return the line(s) containing the string.

  • If the string is not found, the command will return nothing.

  • You can also use regular expressions with the grep com...read more

Add your answer

Q103. DFS Traversal Problem Statement

Given an undirected and disconnected graph G(V, E), where V is the number of vertices and E is the number of edges, the connections between vertices are provided in the 'GRAPH' m...read more

Ans.

DFS traversal to find connected components in an undirected and disconnected graph.

  • Use Depth First Search (DFS) algorithm to traverse the graph and find connected components.

  • Maintain a visited array to keep track of visited vertices.

  • For each unvisited vertex, perform DFS to explore all connected vertices and form a connected component.

Add your answer

Q104. Properties of MST in an Undirected Graph

You have a simple undirected graph G = (V, E) where each edge has a distinct weight. Consider an edge e as part of this graph. Determine which of the given statements re...read more

Ans.

In an undirected graph with distinct edge weights, the lightest edge in a cycle is included in every MST, while the heaviest edge is excluded.

  • The lightest edge in a cycle is always included in every MST of the graph.

  • The heaviest edge in a cycle is always excluded from every MST of the graph.

  • This property holds true for all simple undirected graphs with distinct edge weights.

Add your answer
Discover ITC interview dos and don'ts from real experiences

Q105. Difference between High severity and low severity with example, what is important as QA point of view?

Ans.

High severity refers to critical defects that impact the core functionality of the software, while low severity refers to minor issues that have minimal impact on functionality.

  • High severity issues can cause the software to crash or result in data loss.

  • Low severity issues are cosmetic or minor usability problems.

  • From a QA point of view, high severity issues are more critical as they can significantly impact the user experience and the overall functionality of the software.

  • Low...read more

Add your answer

Q106. How you are going to implement in Mendix

Ans.

I will implement in Mendix by following best practices and utilizing its features to build scalable and efficient solutions.

  • Identify the requirements and design the solution using Mendix Studio or Studio Pro

  • Leverage Mendix's built-in modules and widgets to reduce development time

  • Use microflows and nanoflows to implement business logic

  • Integrate with external systems using Mendix's connectors and APIs

  • Perform testing and debugging using Mendix's built-in tools

  • Deploy the solution...read more

Add your answer
Are these interview questions helpful?

Q107. Types of entity in Mendix

Ans.

Mendix has three types of entities: persistent, non-persistent, and microflow.

  • Persistent entities are stored in the database and have a unique identifier.

  • Non-persistent entities are not stored in the database and are used for temporary data.

  • Microflow entities are used to define the input and output parameters of a microflow.

  • Entities can have attributes, associations, and validations.

  • Examples of entities include Customer, Order, and Product.

View 2 more answers

Q108. Find The Closest Perfect Square Problem Statement

You are given a positive integer N. Your task is to find the perfect square number that is closest to N and determine the number of steps required to reach that...read more

Ans.

Find the closest perfect square to a given positive integer and determine the number of steps required to reach that number.

  • Iterate through perfect squares starting from 1 until the square is greater than the given number

  • Calculate the distance between the perfect square and the given number

  • Return the closest perfect square and the distance as output

Add your answer
Share interview questions and help millions of jobseekers 🌟
Q109. What is the difference between an Abstract Class and an Interface in Java?
Ans.

Abstract class can have both abstract and non-abstract methods, while interface can only have abstract methods.

  • Abstract class can have constructor, fields, and methods, while interface can only have constants and abstract methods.

  • A class can extend only one abstract class, but can implement multiple interfaces.

  • Abstract classes are used to provide a common base for subclasses, while interfaces are used to define a contract for classes to implement.

  • Example: Abstract class - Ani...read more

Add your answer
Q110. What is the difference between a constructor and a method in Object-Oriented Programming?
Ans.

Constructor is a special method used to initialize objects, while a method is a regular function that performs a specific task.

  • Constructors are called automatically when an object is created, while methods need to be called explicitly.

  • Constructors have the same name as the class, while methods have unique names.

  • Constructors do not have a return type, while methods have a return type.

  • Example: Constructor - public ClassName() { // initialization code } Method - public void meth...read more

Add your answer
Q111. What are the advantages of using views in a database management system?
Ans.

Views in a database management system provide security, simplify complex queries, and improve performance.

  • Enhanced security by restricting access to certain columns or rows

  • Simplify complex queries by pre-defining joins and filters

  • Improve performance by storing frequently used queries as views

  • Reduce redundancy by storing common logic in views

Add your answer

Q112. given a starting point in a 2d array of size X Y you have to rotate subarray of size N staring from given starting point

Ans.

Rotate a subarray of size N starting from a given point in a 2D array of size X Y.

  • Identify the subarray based on the starting point and size N

  • Extract the subarray and rotate it using a temporary array or in-place rotation

  • Replace the rotated subarray back into the original array

  • Handle edge cases such as subarray exceeding array boundaries

Add your answer

Q113. what will b d equiv. of varchar(20) in a cobol pgm? SQL 805, 922?

Ans.

Equivalent of varchar(20) in COBOL and SQL error codes 805 and 922

  • In COBOL, the equivalent of varchar(20) is PIC X(20)

  • SQL error code 805 indicates program not found or not authorized

  • SQL error code 922 indicates memory allocation failure

Add your answer

Q114. 1.what is stack? 2.undo-redo 3.backward and forward in the browser 4.polymorphism 5.given array find the frequency of each element. 6.Pseudo code is given on screen asked for output ...topic :--multiple inherit...

read more
Ans.

A technical interview question on various computer science concepts.

  • Stack is a data structure that follows the Last-In-First-Out (LIFO) principle.

  • Undo-Redo is a feature that allows users to reverse or repeat actions in software applications.

  • Backward and forward in the browser refers to navigating to previously visited or next pages.

  • Polymorphism is the ability of an object to take on multiple forms or behaviors.

  • To find the frequency of each element in an array, iterate through...read more

Add your answer
Q115. Can you explain indexing in databases?
Ans.

Indexing in databases is a technique used to improve the speed of data retrieval by creating a data structure that allows for quick lookups.

  • Indexes are created on columns in a database table to speed up the retrieval of rows that match a certain condition.

  • Types of indexes include B-tree, hash, and bitmap indexes.

  • Indexes can improve the performance of SELECT queries but may slow down INSERT, UPDATE, and DELETE operations.

  • Examples of indexes include primary keys, unique constra...read more

Add your answer

Q116. 2. what are the types of wait supported by webdriver? and so on

Ans.

WebDriver supports two types of waits: implicit and explicit.

  • Implicit wait: waits for a certain amount of time before throwing a NoSuchElementException if the element is not found

  • Explicit wait: waits for a certain condition to occur before proceeding to the next step

  • Examples of conditions for explicit wait: element to be clickable, element to be visible, element to have a certain text

  • WebDriverWait class is used for explicit wait

Add your answer
Q117. Can you discuss the CTC (Cost to Company) offered in this position?
Ans.

The CTC offered for this position is competitive and includes salary, benefits, and bonuses.

  • CTC includes salary, benefits, bonuses, and any other perks offered by the company.

  • It is important to consider the overall compensation package, not just the base salary.

  • Negotiation for a higher CTC may be possible based on experience and skills.

  • Example: CTC for this position ranges from $100,000 to $120,000 per year.

Add your answer

Q118. Join duplicate records in tables and output of inner join, left outer join, right outer join, full join. Table1 : 1, 1, 2, 2, 2, Null Table2: 1, 1, 2, 3, Null, Null

Ans.

Demonstrate joining duplicate records in tables using different types of joins.

  • Inner join will only return the matching records (1,1 and 2,2) from both tables.

  • Left outer join will return all records from Table1 and matching records from Table2 (including Null values).

  • Right outer join will return all records from Table2 and matching records from Table1 (including Null values).

  • Full join will return all records from both tables (including Null values) and matching records.

  • To joi...read more

Add your answer

Q119. An array contain 6 different numbers, only 1 number is repeated for 5 times. So now total 10 numbers in array, Find that duplicate number in 2 steps only?

Ans.

Find the duplicate number in an array of 10 numbers with only 2 steps.

  • Use a hash set to keep track of visited numbers.

  • Iterate through the array and check if the number is already in the set.

  • If it is, then it is the duplicate number.

  • If not, add it to the set.

  • At the end, the duplicate number will be found.

Add your answer
Q120. Can you explain the concept of static variables and classes in Object-Oriented Programming?
Ans.

Static variables and classes in OOP are used to store data that is shared among all instances of a class.

  • Static variables are shared among all instances of a class and retain their value throughout the program's execution.

  • Static classes cannot be instantiated and are used to group related static members together.

  • Example: In a class representing a bank account, a static variable could be used to store the total number of accounts created.

  • Example: A static class in a math libra...read more

Add your answer

Q121. Input an array and then print the repeating characters?? Example: Input:1,3,23,11,44,3,23,2,3. Output:3,23

Ans.

The question asks to input an array and print the repeating characters.

  • Iterate through the array and store each element in a hash table or dictionary.

  • If an element already exists in the hash table, it is a repeating character.

  • Print all the repeating characters found.

Add your answer

Q122. Specify few things which are not mentioned in Nagarro

Ans.

Some things not mentioned in Nagarro

  • Specific technologies or tools used in current projects

  • Recent achievements or awards

  • Upcoming projects or initiatives

  • Personal hobbies or interests related to engineering

  • Future career goals or aspirations

Add your answer

Q123. Can Two Primary keys can be made possible in Sql Table ?

Ans.

No, only one primary key can be defined in a SQL table.

  • Primary key ensures uniqueness of each record in a table.

  • A table can have only one primary key constraint.

  • However, a composite primary key can be created using multiple columns.

View 1 answer

Q124. What are the different access modifiers and what is there uses?

Ans.

Access modifiers control the visibility and accessibility of class members.

  • Public: accessible from anywhere

  • Private: accessible only within the class

  • Protected: accessible within the class and its subclasses

  • Default: accessible within the same package

  • Used to enforce encapsulation and prevent unauthorized access

Add your answer

Q125. What are the techniques for requirement prioritizations?

Ans.

Techniques for requirement prioritization

  • MoSCoW prioritization

  • Kano model

  • Value vs Complexity matrix

  • Risk vs Benefit analysis

  • User story mapping

Add your answer
Asked in
SDE Interview
Q126. Can you explain the concept of keys in database management systems?
Ans.

Keys in database management systems are unique identifiers for rows in a table.

  • Keys ensure data integrity by enforcing uniqueness and relationships between tables.

  • Primary key uniquely identifies each record in a table (e.g. employee ID).

  • Foreign key establishes a link between two tables by referencing the primary key of another table.

Add your answer

Q127. COBOL DB2 compilation process? Diff bw CS and RR? Explain Restart logic in a cobol pgm.

Ans.

COBOL DB2 compilation process, CS vs RR, and Restart logic in COBOL program.

  • COBOL DB2 compilation process involves precompilation, compilation, and linkage editing.

  • CS (Change Strategy) and RR (Release Strategy) are two different methods of implementing DB2 changes.

  • Restart logic in COBOL program is used to resume program execution from a specific point after an interruption.

  • Restart logic can be implemented using checkpoints, savepoints, and restartable sections.

  • CS involves mak...read more

Add your answer

Q128. What kind of QA metrices do you follow in ensuring QA guidelines.

Ans.

QA metrics are essential for ensuring adherence to QA guidelines.

  • We follow metrics such as defect density, test coverage, and test efficiency.

  • Defect density measures the number of defects per line of code or per test case.

  • Test coverage measures the percentage of code or requirements covered by tests.

  • Test efficiency measures the number of tests executed per unit of time.

  • We also track metrics related to customer satisfaction and feedback.

  • For example, we may track the number of ...read more

View 2 more answers

Q129. given an sorted array of size n and there is another array of 2n also contain elements in sorted order . merge these sorted arrays and remove duplicates if any .the resultant array should also be in sorted orde...

read more
Ans.

Merge two sorted arrays of size n and 2n, remove duplicates and keep sorted.

  • Create a new array of size 3n to hold the merged and sorted array

  • Use two pointers to iterate through the arrays and compare elements

  • If an element is a duplicate, skip it and move to the next element

  • If an element is not a duplicate, add it to the new array and move to the next element

  • Continue until all elements have been added to the new array and it is sorted

Add your answer

Q130. 1. Responsibility of Business analyst, product owner 2. Difference between Ready and Done 3. Questions related Change and impact analysis 4. Questions about Scrum events 5. Case study etc Duration : 30 mins

Ans.

Interview questions for Senior Staff Consultant role

  • Business analyst responsible for gathering and analyzing business requirements

  • Product owner responsible for prioritizing and managing product backlog

  • Ready means the task is ready to be worked on, while Done means the task is completed

  • Change analysis involves identifying the impact of changes on project scope, timeline, and budget

  • Scrum events include Sprint planning, Daily Scrum, Sprint review, and Sprint retrospective

  • Case st...read more

Add your answer

Q131. Input a number and then find the next higher number such that for both the number (inputted and the next higher number) in binary representation contains equal number os ones. Example: Input:3(0000000000000011)...

read more
Ans.

Find the next higher number with equal number of ones in binary representation.

  • Convert input number to binary

  • Count number of ones in binary representation

  • Increment input number until binary representation has equal number of ones

  • Convert incremented number to decimal

Add your answer

Q132. Input an array and prints the second minimum in an array?? Example Input:34,45,21,12,54,67,15 Output:15

Ans.

Program to find the second minimum in an array.

  • Sort the array and return the second element.

  • Initialize two variables to store minimum and second minimum values.

  • Loop through the array and update the variables accordingly.

Add your answer

Q133. Create a timer with start stop and reset button which will work automatically when mount but buttons can also interfere in between.

Ans.

Create a timer with start stop and reset buttons that can work automatically but also be manually controlled.

  • Implement a timer function that starts counting when mounted

  • Include start, stop, and reset buttons for manual control

  • Allow the buttons to interfere with the automatic timer

  • Use JavaScript to handle the timer functionality

Add your answer

Q134. Create a comment section with name time and comment where user can reply and the reply is nested with the comment.

Ans.

Create a nested comment section with name, time, and comment for users to reply.

  • Create a parent comment section with fields for name, time, and comment

  • Allow users to reply to comments, with nested replies

  • Display nested replies under the parent comment they are replying to

Add your answer

Q135. Write a program to print elements of a linked list in reverse order by using same single linked list?

Ans.

Program to print elements of a linked list in reverse order using same single linked list

  • Traverse the linked list and push each element onto a stack

  • Pop elements from the stack and print them in reverse order

Add your answer
Asked in
CSD Interview
Q136. What is normalization in the context of database management systems?
Ans.

Normalization in database management systems is the process of organizing data in a database to reduce redundancy and improve data integrity.

  • Normalization involves breaking down a database into smaller, more manageable tables.

  • It helps in reducing data redundancy by storing data in a structured manner.

  • Normalization ensures data integrity by minimizing data anomalies.

  • There are different normal forms such as 1NF, 2NF, 3NF, and BCNF that define the level of normalization.

  • For exam...read more

Add your answer

Q137. Take an array, store the numbers and print the numbers using arrayList?

Ans.

To store and print numbers from an array using arrayList.

  • Create an arrayList object

  • Loop through the array and add each element to the arrayList using add() method

  • Print the arrayList using toString() method

  • Example: int[] arr = {1, 2, 3}; ArrayList list = new ArrayList<>(); for(int num : arr) { list.add(num); } System.out.println(list.toString());

Add your answer

Q138. Calling Rest API steps

Ans.

To call a REST API, first identify the endpoint and required parameters. Then use a HTTP client library to send a request.

  • Identify the endpoint and required parameters

  • Choose a HTTP client library (e.g. Axios, Fetch)

  • Send a request with the appropriate HTTP method (e.g. GET, POST)

  • Handle the response and any errors

  • Example: axios.get('https://api.example.com/data', {params: {id: 123}})

  • Example: fetch('https://api.example.com/data?id=123', {method: 'POST'})

Add your answer
Q139. What do you mean by FCFS?
Ans.

FCFS stands for First-Come, First-Served. It is a scheduling algorithm where tasks are executed in the order they arrive.

  • FCFS is a non-preemptive scheduling algorithm.

  • Tasks are executed in the order they arrive in the queue.

  • It is simple to understand and implement.

  • Example: Consider a printer queue where print jobs are processed in the order they are submitted.

Add your answer

Q140. Make a 3*3 cube where you need to fill the numbers using 1-9, rows, columns and diagonal sum should be equal to 15?

Add your answer

Q141. How many day are taken by online sites to create a backup ?

Ans.

The number of days taken by online sites to create a backup varies depending on the size of the site and the frequency of backups.

  • The backup process can take anywhere from a few minutes to several hours or even days.

  • Factors that affect backup time include the amount of data being backed up, the speed of the internet connection, and the backup method used.

  • For example, a small site with minimal data may only take a few minutes to back up, while a large site with terabytes of da...read more

Add your answer

Q142. Clone a FULL linked list given a pointer and a random pointer

Ans.

Clone a linked list with a random pointer.

  • Create a new node for each node in the original list.

  • Use a hash table to map the original nodes to their clones.

  • Iterate through the original list again and update the random pointers of the clone nodes.

Add your answer

Q143. Project architecture in terms of technical &amp; your contribution

Ans.

I have contributed to project architecture by designing and implementing technical solutions.

  • I have designed the overall system architecture based on project requirements.

  • I have implemented various technical solutions such as database design, API development, and integration with third-party services.

  • I have collaborated with cross-functional teams to ensure seamless integration of different components.

  • I have also conducted code reviews and provided technical guidance to junio...read more

Add your answer
Q144. How do you approach solving and troubleshooting infrastructure issues?
Ans.

I approach solving and troubleshooting infrastructure issues by following a systematic approach and utilizing various tools and techniques.

  • Identify the root cause of the issue by analyzing logs, monitoring metrics, and conducting tests.

  • Utilize automation tools like Ansible, Puppet, or Chef to quickly deploy and configure infrastructure.

  • Collaborate with team members and stakeholders to gather information and brainstorm potential solutions.

  • Document the troubleshooting process a...read more

Add your answer

Q145. Different ways to inject services, Dependency injection, forChild vs forRoot, how to create reusable components,

Ans.

Answering questions related to Angular development

  • Dependency injection is a way to provide dependencies to a class

  • forRoot is used to configure services at the root level

  • forChild is used to configure services at the child level

  • Reusable components can be created by breaking down complex components into smaller ones

  • Services can be injected using constructor injection or property injection

Add your answer

Q146. 2. Why we use SerialVersionUID? and what if my ID do not match?

Ans.

SerialVersionUID is used to ensure version compatibility of serialized objects.

  • SerialVersionUID is a unique identifier assigned to a serializable class.

  • It is used to ensure that the serialized object can be deserialized correctly even if the class definition has changed.

  • If the SerialVersionUID of the serialized object does not match the one in the class definition, an InvalidClassException is thrown.

  • To avoid this, it is recommended to declare a static final long SerialVersion...read more

Add your answer

Q147. What is a binary tree and implementation? what is the heap? Array and sorting? Coding Problem.

Ans.

Binary tree is a data structure where each node has at most two children. Heap is a specialized tree-based data structure. Array is a collection of elements stored in contiguous memory locations.

  • Binary tree can be implemented using linked lists or arrays.

  • Heap is used to efficiently implement priority queues.

  • Sorting algorithms like bubble sort, insertion sort, merge sort, quick sort can be used to sort arrays.

  • Coding problem can be related to traversing a binary tree, implement...read more

Add your answer

Q148. What is Decorator, what is binary tree, what is difference between tree and binary tree , about hash map

Ans.

Decorator is a design pattern that allows behavior to be added to an individual object, either statically or dynamically.

  • Binary tree is a tree data structure in which each node has at most two children.

  • A tree is a data structure consisting of nodes connected by edges. A binary tree is a specific type of tree with at most two children per node.

  • A hash map is a data structure that maps keys to values for efficient lookup.

Add your answer

Q149. Identify key KPIs to measure the performance for the case study to be successful for Ed-Tech platform?

Ans.

Key KPIs for measuring success of an Ed-Tech platform

  • User engagement metrics such as time spent on platform, number of logins, and frequency of usage

  • Retention rate of users over time

  • Conversion rate of free users to paid subscribers

  • Customer satisfaction scores and feedback

  • Number of active users and growth rate

  • Revenue generated from the platform

  • Completion rates of courses or modules

  • Effectiveness of marketing campaigns in acquiring new users

Add your answer

Q150. How to present to customer when delivery is not on time

Ans.

Be honest and transparent, provide a clear explanation of the delay, offer solutions and a plan to mitigate future delays.

  • Acknowledge the delay and apologize for any inconvenience caused

  • Explain the reason for the delay and provide any relevant details

  • Offer solutions to mitigate the impact of the delay, such as expedited shipping or a discount

  • Provide a plan to prevent future delays, such as improved communication or better project management

  • Maintain open communication with the...read more

Add your answer

Q151. How and when API controller class instance generated in c#

Ans.

API controller class instance is generated when a request is made to the API endpoint.

  • API controller class is responsible for handling incoming requests and returning responses.

  • Instance of API controller class is generated by the ASP.NET Core framework when a request is made to the API endpoint.

  • API controller class instance is disposed of after the request has been processed.

  • API controller class can be customized and configured using attributes and middleware.

Add your answer

Q152. Write a program for given login scenario using defined automation architecture?

Ans.

A program for login scenario using defined automation architecture.

  • Identify the elements on the login page such as username, password, and login button

  • Use automation tools like Selenium to interact with the elements and input data

  • Verify successful login by checking for expected elements on the landing page

  • Implement error handling for incorrect login credentials

  • Use a modular and scalable architecture for maintainability

Add your answer

Q153. What is constructor and destructor and also explain its working

Ans.

Constructor and destructor are special member functions in a class that are used to initialize and destroy objects respectively.

  • Constructor is called when an object is created and is used to initialize the object's data members.

  • Destructor is called when an object is destroyed and is used to free up any resources that the object was using.

  • Constructor has the same name as the class and no return type, while destructor has the same name as the class preceded by a tilde (~) and n...read more

Add your answer

Q154. How to make sure that the currency column will have different decimals as per the currency in an ABAP Report ?

Ans.

To ensure currency column has different decimals based on currency in ABAP Report, use field symbols and currency conversion functions.

  • Use field symbols to dynamically assign the number of decimal places based on the currency

  • Utilize currency conversion functions like 'CONVERT_TO_FOREIGN_CURRENCY' to handle different decimal places for different currencies

  • Implement logic to determine the currency and set the decimal places accordingly

Add your answer

Q155. Definition of Types of entity

Ans.

Types of entity refer to the different categories of objects or concepts that can be represented in a system or model.

  • Entities can be physical objects, such as people or buildings, or abstract concepts, such as ideas or relationships.

  • Entities can be further classified as unique or non-unique, depending on whether there can be multiple instances of the same entity.

  • Examples of entities include customers, products, orders, invoices, and employees.

Add your answer

Q156. Write test scenario for download functionality of a songs website?

Ans.

Test scenario for download functionality of a songs website

  • Verify that the download button is visible and clickable

  • Check that the downloaded file is in the correct format

  • Ensure that the downloaded file is not corrupted

  • Test the download speed for different file sizes

  • Verify that the download progress is displayed to the user

Add your answer

Q157. Find the longest palendrom in a string? Example Input: abfgerccdedccfgfer Output: ccdedcc

Ans.

To find the longest palindrome in a given string.

  • Iterate through the string and check for palindromes of odd and even lengths.

  • Keep track of the longest palindrome found so far.

  • Use two pointers to check if the substring is a palindrome.

  • If the substring is a palindrome and its length is greater than the current longest palindrome, update the longest palindrome.

Add your answer

Q158. What are the major components of MarTech platforms?

Ans.

Major components of MarTech platforms include CRM, marketing automation, analytics, content management, and social media management.

  • Customer Relationship Management (CRM) systems

  • Marketing automation tools

  • Analytics tools for tracking and analyzing data

  • Content management systems for creating and managing content

  • Social media management tools for monitoring and engaging on social platforms

Add your answer

Q159. What happens if we don't give required fields while inserting data through insert or database.insert

Ans.

If required fields are not given while inserting data through insert or database.insert, an error is thrown.

  • An error message is displayed indicating which fields are required.

  • The record is not inserted into the database.

  • The transaction is rolled back.

  • The error can be caught and handled in the code.

  • Validation rules can also prevent the insertion of records with missing required fields.

Add your answer

Q160. Challenges faced during requirement gathering and how you overcame it with examples

Ans.

Challenges faced during requirement gathering and how they were overcome

  • Lack of clarity in client's requirements

  • Miscommunication between stakeholders

  • Scope creep

  • Used visual aids and prototypes to clarify requirements

  • Held regular meetings with stakeholders to ensure clear communication

  • Implemented change control process to manage scope creep

Add your answer
Q161. What is the static keyword in Java?
Ans.

The static keyword in Java is used to create class-level variables and methods that can be accessed without creating an instance of the class.

  • Static variables are shared among all instances of a class.

  • Static methods can be called without creating an object of the class.

  • Static blocks are used to initialize static variables.

  • Example: public static int count = 0;

Add your answer

Q162. Write a program in javascript to display a pyramid

Ans.

Program in javascript to display a pyramid

  • Use nested loops to print the pyramid

  • The outer loop controls the number of rows

  • The inner loop controls the number of spaces and asterisks to print

  • Use string concatenation to build the pyramid

Add your answer

Q163. Suppose we have more 2 interfaces with the same default method. What will happen when we try to implment both the interfaces in the same class.?

Ans.

The class will have to provide its own implementation of the conflicting default method.

  • When implementing multiple interfaces with the same default method, a class must provide its own implementation of the conflicting method.

  • The class cannot inherit the default implementation from both interfaces.

  • The class can choose to implement one of the default methods and provide its own implementation for the other.

  • Alternatively, the class can provide a completely new implementation fo...read more

Add your answer

Q164. Que: Display all possible substrings of a string Que: Sort a list containing dates in ascending order

Ans.

This question asks for displaying all possible substrings of a given string.

  • Iterate through the string and generate all possible substrings

  • Use nested loops to generate substrings of different lengths

  • Store the substrings in an array of strings

Add your answer

Q165. Quick and merge time complexity and when worst case happens in quick sort

Ans.

Quick sort has O(n log n) time complexity on average, O(n^2) worst case. Merge sort has O(n log n) time complexity always.

  • Quick sort has an average time complexity of O(n log n) due to its divide-and-conquer approach.

  • Worst case for quick sort occurs when the pivot element is either the smallest or largest element in the array, leading to O(n^2) time complexity.

  • Merge sort always has a time complexity of O(n log n) due to its consistent splitting and merging of subarrays.

Add your answer

Q166. What is the difference between contentasset and content slots?

Ans.

Contentasset stores reusable content while content slots define where content is displayed on a page.

  • Contentasset stores reusable content like images, videos, and text.

  • Content slots define where content is displayed on a page, such as a banner or product description section.

  • Contentassets can be reused across multiple content slots on different pages.

View 1 answer

Q167. How do you do Sprint planning and Backlog Grooming.

Ans.

Sprint planning involves selecting items from the backlog and estimating the effort required to complete them.

  • Review the backlog and prioritize items based on business value

  • Break down items into smaller tasks and estimate effort required

  • Assign tasks to team members based on their skills and availability

  • Monitor progress during the sprint and adjust plans as needed

View 1 answer

Q168. burn down chart, how does it work?

Ans.

A burn down chart is a visual representation of the progress of a project, showing how much work is left to be done.

  • It tracks the amount of work remaining over time

  • It helps the team to stay on track and adjust their efforts as needed

  • It shows the ideal progress line and the actual progress line

  • It is commonly used in Agile methodologies

  • Example: If a project has 100 tasks and the team completes 20 tasks in the first week, the burn down chart will show that 80 tasks are remaining...read more

Add your answer
Q169. Can you design a login page for Facebook?
Ans.

I can design a login page for Facebook with user input fields for email/phone and password, a 'Login' button, and 'Forgot password?' link.

  • Include user input fields for email/phone and password

  • Add a 'Login' button for submitting credentials

  • Include a 'Forgot password?' link for password recovery

  • Design the page with Facebook branding and color scheme

Add your answer

Q170. 2. You have a array of 1 to 5 in which 4 and 5 are repeated. Write a code to find 2nd largest no. In array?

Ans.

Find the 2nd largest number in an array with repeated elements.

  • Sort the array in descending order

  • Remove duplicates

  • Return the second element in the sorted array

Add your answer

Q171. How to kick off projecr, challenges, how to plan, how to decide deqndecies, how to maintain risk register

Ans.

To kick off a project, address challenges, plan, decide dependencies, and maintain a risk register.

  • Kick off the project by clearly defining the project scope, objectives, and deliverables.

  • Identify potential challenges and risks that may arise during the project and develop mitigation strategies.

  • Create a detailed project plan outlining tasks, timelines, resources, and responsibilities.

  • Determine dependencies between tasks and team members to ensure smooth execution of the proje...read more

Add your answer

Q172. What is polymorphism and explain in brief?

Ans.

Polymorphism is the ability of an object to take on many forms.

  • Polymorphism allows objects of different classes to be treated as if they are of the same class.

  • It is achieved through method overriding and method overloading.

  • Example: A parent class Animal can have child classes like Dog, Cat, and Cow. All these child classes can have a method called 'makeSound', but each class can have a different implementation of the method.

  • Polymorphism makes code more flexible and reusable.

Add your answer

Q173. What is the input activities to take input from the end user during automation?

Ans.

Input activities to take input from end user during automation include forms, text boxes, dropdowns, and buttons.

  • Forms can be used to collect multiple inputs from the user.

  • Text boxes allow users to enter text or numerical values.

  • Dropdowns provide a list of options for users to select from.

  • Buttons can be clicked by users to submit or confirm their input.

Add your answer

Q174. 3. How can we prevent circular dependency in Spring?

Ans.

Circular dependency in Spring can be prevented by using constructor injection or setter injection.

  • Use constructor injection to inject dependencies

  • Use setter injection to inject dependencies

  • Use @Autowired annotation to inject dependencies

  • Use @Qualifier annotation to specify which bean to inject

  • Use @Lazy annotation to delay bean initialization

  • Use @DependsOn annotation to specify bean dependencies

  • Use @ComponentScan annotation to scan for beans

Add your answer

Q175. How to color a single column and single row in ABAP Report?

Ans.

Use the WRITE statement with the addition COLOR to color a single column and single row in ABAP Report.

  • Use the WRITE statement with the addition COLOR to specify the color for the text output.

  • For coloring a single column, use the WRITE statement within a loop for each row and specify the column number.

  • For coloring a single row, use the WRITE statement for each column in that row and specify the row number.

Add your answer

Q176. Write a program to sort an array

Ans.

Program to sort an array

  • Choose a sorting algorithm based on the requirements

  • Implement the chosen algorithm in the programming language of choice

  • Test the program with different input sizes and edge cases

Add your answer

Q177. Tell Travelling Salesman Problem Optimal Solution Approach

Ans.

The optimal solution approach for the Travelling Salesman Problem involves using algorithms such as the Nearest Neighbor Algorithm and the 2-Opt Algorithm.

  • The Nearest Neighbor Algorithm starts at a random city and selects the nearest unvisited city as the next stop.

  • The 2-Opt Algorithm involves swapping two edges in the tour to see if it results in a shorter distance.

  • Other algorithms include the Genetic Algorithm and the Simulated Annealing Algorithm.

  • The optimal solution is no...read more

Add your answer

Q178. given a string consisting of various words . reverse all the string and words by 2 methods

Ans.

Reverse a string and its words using two methods.

  • Method 1: Reverse the entire string and then reverse each word individually.

  • Method 2: Split the string into words, reverse the order of the words, and then reverse each word individually.

  • Example: Input string - 'Hello world, how are you?' Output - '?uoy era woh ,dlrow olleH'

Add your answer

Q179. Tell me difference between extends keywords and implements keywords. What is Static block etc. Collection Map in core Java .

Add your answer

Q180. one code to solve find frequency of every character of string

Ans.

A code to find the frequency of every character in a string.

  • Create an empty dictionary to store the frequency of each character.

  • Iterate through the string and for each character, check if it is already in the dictionary.

  • If it is, increment its value by 1. If it is not, add it to the dictionary with a value of 1.

  • Return the dictionary with the frequency of each character.

Add your answer

Q181. 4. React: What is Virtual DOM, useState and different types of Hooks in React

Ans.

Virtual DOM is a lightweight copy of the actual DOM, useState is a hook for managing state in functional components, and Hooks are functions that let you use state and other React features in functional components.

  • Virtual DOM is a lightweight copy of the actual DOM that React uses to improve performance by updating only the necessary parts of the actual DOM.

  • useState is a hook in React that allows functional components to have state. It returns an array with the current state ...read more

Add your answer

Q182. How can you check whether the give string can become palindrome or not. You can apply unlimited operations.

Ans.

To check if a string can become a palindrome, count the frequency of each character. If there is at most one character with an odd frequency, it can be rearranged into a palindrome.

  • Count the frequency of each character in the string

  • Check if there is at most one character with an odd frequency

  • If yes, the string can be rearranged into a palindrome

Add your answer

Q183. Given an array find if there are two elements are present that sum to target, else return -1;

Ans.

Given an array find if there are two elements are present that sum to target, else return -1

  • Iterate through the array and for each element check if target - element is present in the array

  • Use a hash table to store the elements and their indices for faster lookup

  • If no such pair is found, return -1

Add your answer

Q184. Given a number , check if it can be represented in 5^n form , where n is positive integer

Ans.

Check if a number can be represented in the form 5^n

  • Check if the number is a power of 5

  • Use logarithms to determine if the number can be represented as 5^n

  • Examples: 5, 25, 125 are represented as 5^1, 5^2, 5^3 respectively

Add your answer

Q185. Find missing number in array of n size where numbers are from 1 to n

Ans.

Use the formula for sum of first n natural numbers to find the missing number in the array.

  • Calculate the sum of first n natural numbers using the formula n*(n+1)/2

  • Calculate the sum of all numbers in the array

  • Subtract the sum of array from the sum of first n natural numbers to find the missing number

Add your answer

Q186. Flatten an object with nested objects as simplified keys. Like person.name.firstName.

Ans.

Flatten nested objects with simplified keys like person.name.firstName

  • Iterate through the nested objects using recursion

  • Concatenate the keys with a dot to create the simplified key

  • Store the value of the nested key in the flattened object

Add your answer

Q187. Which estimate technique you follow , if fibonacci then why it is in 1 2 3 5 8 13 ?? Not in 12345678

Ans.

Fibonacci sequence is a mathematical pattern where each number is the sum of the two preceding ones.

  • Fibonacci sequence is a series of numbers where each number is the sum of the two preceding ones.

  • The sequence starts with 1, 2, then each subsequent number is the sum of the two previous numbers (1+2=3, 2+3=5, 3+5=8, and so on).

  • This sequence is used in estimating because it reflects natural growth patterns found in nature.

Add your answer

Q188. Selenium: What is page factory, webdriver architecture, how it interact with different browsers Java: interface, string pool, exception handling Cucumber: scenario outline, hooks Describe automation framework H...

read more
Ans.

Page factory is a design pattern in Selenium, WebDriver architecture interacts with browsers, Java concepts like interfaces and exception handling, Cucumber features like scenario outline and hooks, automation framework design, tool selection for testing.

  • Page factory in Selenium is a design pattern that allows for better organization of code by separating the page elements from the test methods.

  • WebDriver architecture is a client-server architecture where the WebDriver API int...read more

Add your answer

Q189. Framework design and explanation BDD explanation POM vs Page factory Selenium Code for finding broken link Selenium wait POJO explanation BDD reporting Java collections Interface and abstraction Why multiple in...

read more
Add your answer

Q190. Remove a linked list node without head or tail pointer given

Ans.

Removing a node from a linked list without head or tail pointer

  • Use the node to be removed's next node to copy its data and then delete the next node

  • Update the current node's next pointer to skip the next node

Add your answer

Q191. Reverse a linked list (iterative AND Recursive)

Ans.

Reverse a linked list using iterative and recursive methods.

  • Iterative method involves traversing the list and changing the pointers to reverse the order.

  • Recursive method involves calling the function recursively on the next node and changing the pointers.

  • Both methods have O(n) time complexity and O(1) space complexity.

  • Example: 1->2->3->4->5 becomes 5->4->3->2->1.

Add your answer

Q192. How would you split a search query across multiple machines?

Add your answer
Q193. What are constraints in SQL?
Ans.

Constraints in SQL are rules and restrictions applied to columns in a table to enforce data integrity.

  • Constraints ensure data accuracy and consistency in a database.

  • Common constraints include NOT NULL, UNIQUE, PRIMARY KEY, FOREIGN KEY, and CHECK constraints.

  • NOT NULL constraint ensures a column cannot have a NULL value.

  • UNIQUE constraint ensures all values in a column are unique.

  • PRIMARY KEY constraint uniquely identifies each record in a table.

  • FOREIGN KEY constraint establishes...read more

Add your answer

Q194. What is SCD and it's types ?

Ans.

SCD stands for Slowly Changing Dimensions. It is a technique used in data warehousing to track changes in data over time.

  • SCD is used to maintain historical data in a data warehouse

  • There are three types of SCD: Type 1, Type 2, and Type 3

  • Type 1 SCD overwrites old data with new data

  • Type 2 SCD creates a new record for each change and maintains a history of changes

  • Type 3 SCD adds new columns to the existing record to track changes

  • Example: In a customer database, SCD can be used to...read more

Add your answer

Q195. Writing program using any programming language

Ans.

I would write a program in Python to automate a repetitive task.

  • Identify the task and break it down into smaller steps

  • Choose the appropriate data structures and algorithms

  • Write clean and readable code with proper documentation

  • Test the program thoroughly before deployment

Add your answer

Q196. What is Test plan and what are the contents for the plan.

Ans.

A test plan is a document that outlines the testing strategy, objectives, scope, and deliverables for a software project.

  • Test plan defines the approach to be taken for testing a software application

  • It includes the objectives, scope, test strategy, test environment, test deliverables, and test schedule

  • It also outlines the roles and responsibilities of the testing team

  • Test plan helps in identifying the risks and issues associated with testing

  • Examples of test plan templates incl...read more

Add your answer

Q197. Data Science project pipeline ,what components are involved , step by step process

Ans.

Data science project pipeline involves multiple components and follows a step-by-step process.

  • 1. Define the problem statement and objectives of the project.

  • 2. Collect and preprocess the data needed for analysis.

  • 3. Explore and visualize the data to gain insights.

  • 4. Build and train machine learning models to solve the problem.

  • 5. Evaluate the models using appropriate metrics.

  • 6. Deploy the model into production and monitor its performance.

  • 7. Communicate the results and findings t...read more

Add your answer

Q198. What is BMC in CSS

Ans.

BMC stands for Block Formatting Context in CSS, which is a mechanism for controlling the layout of elements.

  • BMC is created when an element is floated, positioned absolutely, or has an overflow value other than visible.

  • BMC prevents margin collapsing between parent and child elements.

  • BMC can be used to create columns of equal height.

  • Example: Using display: inline-block on child elements creates a BMC.

  • Example: Using overflow: hidden on a parent element creates a BMC.

View 1 answer

Q199. How to find largest element in array with O(N) complexity

Ans.

Iterate through array once, keeping track of largest element found so far.

  • Initialize a variable to store the largest element found so far

  • Iterate through the array and update the variable if a larger element is found

  • Return the largest element after the iteration is complete

Add your answer

Q200. How will you prevent docker container from assuming root user role?

Ans.

To prevent a docker container from assuming root user role, use non-root users, drop privileges, and utilize user namespaces.

  • Create a non-root user in the Dockerfile with appropriate permissions

  • Use the USER instruction in the Dockerfile to switch to the non-root user

  • Utilize user namespaces to map the container's root user to a non-root user on the host system

  • Drop privileges within the container to limit the capabilities of the processes running inside

Add your answer
1
2
3
4
5

More about working at Nagarro

#2 Best Large Company - 2022
#1 Best IT/ITES Company - 2022
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos

Interview Process at ITC

based on 589 interviews
Interview experience
4.0
Good
View more
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Interview Questions from Similar Companies

3.3
 • 318 Interview Questions
3.7
 • 278 Interview Questions
3.8
 • 211 Interview Questions
4.0
 • 166 Interview Questions
3.3
 • 142 Interview Questions
3.9
 • 139 Interview Questions
View all
Top Nagarro Interview Questions And Answers
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
70 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter