Nagarro
400+ ITC Interview Questions and Answers
Q101. Maximum Sum Path in a Binary Tree
Your task is to determine the maximum possible sum of a simple path between any two nodes (possibly the same) in a given binary tree of 'N' nodes with integer values.
Explanati...read more
Find the maximum sum of a simple path between any two nodes in a binary tree.
Use a recursive approach to traverse the binary tree and calculate the maximum sum path.
Keep track of the maximum sum path found so far while traversing the tree.
Consider negative values in the path sum calculation to handle cases where the path can start and end at different nodes.
Handle cases where the path can go through the root node or not.
Q102. How would you search any string(numeric or alphanumeric) from a ps file(position could b any)?
To search a string from a ps file, use the grep command with the string and file name as arguments.
Open the ps file in a text editor or use the command line to navigate to the file location.
Use the grep command followed by the string you want to search and the file name as arguments.
If the string is found, the command will return the line(s) containing the string.
If the string is not found, the command will return nothing.
You can also use regular expressions with the grep com...read more
Q103. DFS Traversal Problem Statement
Given an undirected and disconnected graph G(V, E)
, where V
is the number of vertices and E
is the number of edges, the connections between vertices are provided in the 'GRAPH' m...read more
DFS traversal to find connected components in an undirected and disconnected graph.
Use Depth First Search (DFS) algorithm to traverse the graph and find connected components.
Maintain a visited array to keep track of visited vertices.
For each unvisited vertex, perform DFS to explore all connected vertices and form a connected component.
Q104. Properties of MST in an Undirected Graph
You have a simple undirected graph G = (V, E)
where each edge has a distinct weight. Consider an edge e
as part of this graph. Determine which of the given statements re...read more
In an undirected graph with distinct edge weights, the lightest edge in a cycle is included in every MST, while the heaviest edge is excluded.
The lightest edge in a cycle is always included in every MST of the graph.
The heaviest edge in a cycle is always excluded from every MST of the graph.
This property holds true for all simple undirected graphs with distinct edge weights.
Q105. Difference between High severity and low severity with example, what is important as QA point of view?
High severity refers to critical defects that impact the core functionality of the software, while low severity refers to minor issues that have minimal impact on functionality.
High severity issues can cause the software to crash or result in data loss.
Low severity issues are cosmetic or minor usability problems.
From a QA point of view, high severity issues are more critical as they can significantly impact the user experience and the overall functionality of the software.
Low...read more
Q106. How you are going to implement in Mendix
I will implement in Mendix by following best practices and utilizing its features to build scalable and efficient solutions.
Identify the requirements and design the solution using Mendix Studio or Studio Pro
Leverage Mendix's built-in modules and widgets to reduce development time
Use microflows and nanoflows to implement business logic
Integrate with external systems using Mendix's connectors and APIs
Perform testing and debugging using Mendix's built-in tools
Deploy the solution...read more
Q107. Types of entity in Mendix
Mendix has three types of entities: persistent, non-persistent, and microflow.
Persistent entities are stored in the database and have a unique identifier.
Non-persistent entities are not stored in the database and are used for temporary data.
Microflow entities are used to define the input and output parameters of a microflow.
Entities can have attributes, associations, and validations.
Examples of entities include Customer, Order, and Product.
Q108. Find The Closest Perfect Square Problem Statement
You are given a positive integer N
. Your task is to find the perfect square number that is closest to N
and determine the number of steps required to reach that...read more
Find the closest perfect square to a given positive integer and determine the number of steps required to reach that number.
Iterate through perfect squares starting from 1 until the square is greater than the given number
Calculate the distance between the perfect square and the given number
Return the closest perfect square and the distance as output
Abstract class can have both abstract and non-abstract methods, while interface can only have abstract methods.
Abstract class can have constructor, fields, and methods, while interface can only have constants and abstract methods.
A class can extend only one abstract class, but can implement multiple interfaces.
Abstract classes are used to provide a common base for subclasses, while interfaces are used to define a contract for classes to implement.
Example: Abstract class - Ani...read more
Constructor is a special method used to initialize objects, while a method is a regular function that performs a specific task.
Constructors are called automatically when an object is created, while methods need to be called explicitly.
Constructors have the same name as the class, while methods have unique names.
Constructors do not have a return type, while methods have a return type.
Example: Constructor - public ClassName() { // initialization code } Method - public void meth...read more
Views in a database management system provide security, simplify complex queries, and improve performance.
Enhanced security by restricting access to certain columns or rows
Simplify complex queries by pre-defining joins and filters
Improve performance by storing frequently used queries as views
Reduce redundancy by storing common logic in views
Q112. given a starting point in a 2d array of size X Y you have to rotate subarray of size N staring from given starting point
Rotate a subarray of size N starting from a given point in a 2D array of size X Y.
Identify the subarray based on the starting point and size N
Extract the subarray and rotate it using a temporary array or in-place rotation
Replace the rotated subarray back into the original array
Handle edge cases such as subarray exceeding array boundaries
Q113. what will b d equiv. of varchar(20) in a cobol pgm? SQL 805, 922?
Equivalent of varchar(20) in COBOL and SQL error codes 805 and 922
In COBOL, the equivalent of varchar(20) is PIC X(20)
SQL error code 805 indicates program not found or not authorized
SQL error code 922 indicates memory allocation failure
Q114. 1.what is stack? 2.undo-redo 3.backward and forward in the browser 4.polymorphism 5.given array find the frequency of each element. 6.Pseudo code is given on screen asked for output ...topic :--multiple inherit...
read moreA technical interview question on various computer science concepts.
Stack is a data structure that follows the Last-In-First-Out (LIFO) principle.
Undo-Redo is a feature that allows users to reverse or repeat actions in software applications.
Backward and forward in the browser refers to navigating to previously visited or next pages.
Polymorphism is the ability of an object to take on multiple forms or behaviors.
To find the frequency of each element in an array, iterate through...read more
Indexing in databases is a technique used to improve the speed of data retrieval by creating a data structure that allows for quick lookups.
Indexes are created on columns in a database table to speed up the retrieval of rows that match a certain condition.
Types of indexes include B-tree, hash, and bitmap indexes.
Indexes can improve the performance of SELECT queries but may slow down INSERT, UPDATE, and DELETE operations.
Examples of indexes include primary keys, unique constra...read more
Q116. 2. what are the types of wait supported by webdriver? and so on
WebDriver supports two types of waits: implicit and explicit.
Implicit wait: waits for a certain amount of time before throwing a NoSuchElementException if the element is not found
Explicit wait: waits for a certain condition to occur before proceeding to the next step
Examples of conditions for explicit wait: element to be clickable, element to be visible, element to have a certain text
WebDriverWait class is used for explicit wait
The CTC offered for this position is competitive and includes salary, benefits, and bonuses.
CTC includes salary, benefits, bonuses, and any other perks offered by the company.
It is important to consider the overall compensation package, not just the base salary.
Negotiation for a higher CTC may be possible based on experience and skills.
Example: CTC for this position ranges from $100,000 to $120,000 per year.
Q118. Join duplicate records in tables and output of inner join, left outer join, right outer join, full join. Table1 : 1, 1, 2, 2, 2, Null Table2: 1, 1, 2, 3, Null, Null
Demonstrate joining duplicate records in tables using different types of joins.
Inner join will only return the matching records (1,1 and 2,2) from both tables.
Left outer join will return all records from Table1 and matching records from Table2 (including Null values).
Right outer join will return all records from Table2 and matching records from Table1 (including Null values).
Full join will return all records from both tables (including Null values) and matching records.
To joi...read more
Q119. An array contain 6 different numbers, only 1 number is repeated for 5 times. So now total 10 numbers in array, Find that duplicate number in 2 steps only?
Find the duplicate number in an array of 10 numbers with only 2 steps.
Use a hash set to keep track of visited numbers.
Iterate through the array and check if the number is already in the set.
If it is, then it is the duplicate number.
If not, add it to the set.
At the end, the duplicate number will be found.
Static variables and classes in OOP are used to store data that is shared among all instances of a class.
Static variables are shared among all instances of a class and retain their value throughout the program's execution.
Static classes cannot be instantiated and are used to group related static members together.
Example: In a class representing a bank account, a static variable could be used to store the total number of accounts created.
Example: A static class in a math libra...read more
Q121. Input an array and then print the repeating characters?? Example: Input:1,3,23,11,44,3,23,2,3. Output:3,23
The question asks to input an array and print the repeating characters.
Iterate through the array and store each element in a hash table or dictionary.
If an element already exists in the hash table, it is a repeating character.
Print all the repeating characters found.
Q122. Specify few things which are not mentioned in Nagarro
Some things not mentioned in Nagarro
Specific technologies or tools used in current projects
Recent achievements or awards
Upcoming projects or initiatives
Personal hobbies or interests related to engineering
Future career goals or aspirations
Q123. Can Two Primary keys can be made possible in Sql Table ?
No, only one primary key can be defined in a SQL table.
Primary key ensures uniqueness of each record in a table.
A table can have only one primary key constraint.
However, a composite primary key can be created using multiple columns.
Q124. What are the different access modifiers and what is there uses?
Access modifiers control the visibility and accessibility of class members.
Public: accessible from anywhere
Private: accessible only within the class
Protected: accessible within the class and its subclasses
Default: accessible within the same package
Used to enforce encapsulation and prevent unauthorized access
Q125. What are the techniques for requirement prioritizations?
Techniques for requirement prioritization
MoSCoW prioritization
Kano model
Value vs Complexity matrix
Risk vs Benefit analysis
User story mapping
Keys in database management systems are unique identifiers for rows in a table.
Keys ensure data integrity by enforcing uniqueness and relationships between tables.
Primary key uniquely identifies each record in a table (e.g. employee ID).
Foreign key establishes a link between two tables by referencing the primary key of another table.
Q127. COBOL DB2 compilation process? Diff bw CS and RR? Explain Restart logic in a cobol pgm.
COBOL DB2 compilation process, CS vs RR, and Restart logic in COBOL program.
COBOL DB2 compilation process involves precompilation, compilation, and linkage editing.
CS (Change Strategy) and RR (Release Strategy) are two different methods of implementing DB2 changes.
Restart logic in COBOL program is used to resume program execution from a specific point after an interruption.
Restart logic can be implemented using checkpoints, savepoints, and restartable sections.
CS involves mak...read more
Q128. What kind of QA metrices do you follow in ensuring QA guidelines.
QA metrics are essential for ensuring adherence to QA guidelines.
We follow metrics such as defect density, test coverage, and test efficiency.
Defect density measures the number of defects per line of code or per test case.
Test coverage measures the percentage of code or requirements covered by tests.
Test efficiency measures the number of tests executed per unit of time.
We also track metrics related to customer satisfaction and feedback.
For example, we may track the number of ...read more
Q129. given an sorted array of size n and there is another array of 2n also contain elements in sorted order . merge these sorted arrays and remove duplicates if any .the resultant array should also be in sorted orde...
read moreMerge two sorted arrays of size n and 2n, remove duplicates and keep sorted.
Create a new array of size 3n to hold the merged and sorted array
Use two pointers to iterate through the arrays and compare elements
If an element is a duplicate, skip it and move to the next element
If an element is not a duplicate, add it to the new array and move to the next element
Continue until all elements have been added to the new array and it is sorted
Q130. 1. Responsibility of Business analyst, product owner 2. Difference between Ready and Done 3. Questions related Change and impact analysis 4. Questions about Scrum events 5. Case study etc Duration : 30 mins
Interview questions for Senior Staff Consultant role
Business analyst responsible for gathering and analyzing business requirements
Product owner responsible for prioritizing and managing product backlog
Ready means the task is ready to be worked on, while Done means the task is completed
Change analysis involves identifying the impact of changes on project scope, timeline, and budget
Scrum events include Sprint planning, Daily Scrum, Sprint review, and Sprint retrospective
Case st...read more
Q131. Input a number and then find the next higher number such that for both the number (inputted and the next higher number) in binary representation contains equal number os ones. Example: Input:3(0000000000000011)...
read moreFind the next higher number with equal number of ones in binary representation.
Convert input number to binary
Count number of ones in binary representation
Increment input number until binary representation has equal number of ones
Convert incremented number to decimal
Q132. Input an array and prints the second minimum in an array?? Example Input:34,45,21,12,54,67,15 Output:15
Program to find the second minimum in an array.
Sort the array and return the second element.
Initialize two variables to store minimum and second minimum values.
Loop through the array and update the variables accordingly.
Q133. Create a timer with start stop and reset button which will work automatically when mount but buttons can also interfere in between.
Create a timer with start stop and reset buttons that can work automatically but also be manually controlled.
Implement a timer function that starts counting when mounted
Include start, stop, and reset buttons for manual control
Allow the buttons to interfere with the automatic timer
Use JavaScript to handle the timer functionality
Q134. Create a comment section with name time and comment where user can reply and the reply is nested with the comment.
Create a nested comment section with name, time, and comment for users to reply.
Create a parent comment section with fields for name, time, and comment
Allow users to reply to comments, with nested replies
Display nested replies under the parent comment they are replying to
Q135. Write a program to print elements of a linked list in reverse order by using same single linked list?
Program to print elements of a linked list in reverse order using same single linked list
Traverse the linked list and push each element onto a stack
Pop elements from the stack and print them in reverse order
Normalization in database management systems is the process of organizing data in a database to reduce redundancy and improve data integrity.
Normalization involves breaking down a database into smaller, more manageable tables.
It helps in reducing data redundancy by storing data in a structured manner.
Normalization ensures data integrity by minimizing data anomalies.
There are different normal forms such as 1NF, 2NF, 3NF, and BCNF that define the level of normalization.
For exam...read more
Q137. Take an array, store the numbers and print the numbers using arrayList?
To store and print numbers from an array using arrayList.
Create an arrayList object
Loop through the array and add each element to the arrayList using add() method
Print the arrayList using toString() method
Example: int[] arr = {1, 2, 3}; ArrayList
list = new ArrayList<>(); for(int num : arr) { list.add(num); } System.out.println(list.toString());
Q138. Calling Rest API steps
To call a REST API, first identify the endpoint and required parameters. Then use a HTTP client library to send a request.
Identify the endpoint and required parameters
Choose a HTTP client library (e.g. Axios, Fetch)
Send a request with the appropriate HTTP method (e.g. GET, POST)
Handle the response and any errors
Example: axios.get('https://api.example.com/data', {params: {id: 123}})
Example: fetch('https://api.example.com/data?id=123', {method: 'POST'})
FCFS stands for First-Come, First-Served. It is a scheduling algorithm where tasks are executed in the order they arrive.
FCFS is a non-preemptive scheduling algorithm.
Tasks are executed in the order they arrive in the queue.
It is simple to understand and implement.
Example: Consider a printer queue where print jobs are processed in the order they are submitted.
Q140. Make a 3*3 cube where you need to fill the numbers using 1-9, rows, columns and diagonal sum should be equal to 15?
Q141. How many day are taken by online sites to create a backup ?
The number of days taken by online sites to create a backup varies depending on the size of the site and the frequency of backups.
The backup process can take anywhere from a few minutes to several hours or even days.
Factors that affect backup time include the amount of data being backed up, the speed of the internet connection, and the backup method used.
For example, a small site with minimal data may only take a few minutes to back up, while a large site with terabytes of da...read more
Q142. Clone a FULL linked list given a pointer and a random pointer
Clone a linked list with a random pointer.
Create a new node for each node in the original list.
Use a hash table to map the original nodes to their clones.
Iterate through the original list again and update the random pointers of the clone nodes.
Q143. Project architecture in terms of technical & your contribution
I have contributed to project architecture by designing and implementing technical solutions.
I have designed the overall system architecture based on project requirements.
I have implemented various technical solutions such as database design, API development, and integration with third-party services.
I have collaborated with cross-functional teams to ensure seamless integration of different components.
I have also conducted code reviews and provided technical guidance to junio...read more
I approach solving and troubleshooting infrastructure issues by following a systematic approach and utilizing various tools and techniques.
Identify the root cause of the issue by analyzing logs, monitoring metrics, and conducting tests.
Utilize automation tools like Ansible, Puppet, or Chef to quickly deploy and configure infrastructure.
Collaborate with team members and stakeholders to gather information and brainstorm potential solutions.
Document the troubleshooting process a...read more
Q145. Different ways to inject services, Dependency injection, forChild vs forRoot, how to create reusable components,
Answering questions related to Angular development
Dependency injection is a way to provide dependencies to a class
forRoot is used to configure services at the root level
forChild is used to configure services at the child level
Reusable components can be created by breaking down complex components into smaller ones
Services can be injected using constructor injection or property injection
Q146. 2. Why we use SerialVersionUID? and what if my ID do not match?
SerialVersionUID is used to ensure version compatibility of serialized objects.
SerialVersionUID is a unique identifier assigned to a serializable class.
It is used to ensure that the serialized object can be deserialized correctly even if the class definition has changed.
If the SerialVersionUID of the serialized object does not match the one in the class definition, an InvalidClassException is thrown.
To avoid this, it is recommended to declare a static final long SerialVersion...read more
Q147. What is a binary tree and implementation? what is the heap? Array and sorting? Coding Problem.
Binary tree is a data structure where each node has at most two children. Heap is a specialized tree-based data structure. Array is a collection of elements stored in contiguous memory locations.
Binary tree can be implemented using linked lists or arrays.
Heap is used to efficiently implement priority queues.
Sorting algorithms like bubble sort, insertion sort, merge sort, quick sort can be used to sort arrays.
Coding problem can be related to traversing a binary tree, implement...read more
Q148. What is Decorator, what is binary tree, what is difference between tree and binary tree , about hash map
Decorator is a design pattern that allows behavior to be added to an individual object, either statically or dynamically.
Binary tree is a tree data structure in which each node has at most two children.
A tree is a data structure consisting of nodes connected by edges. A binary tree is a specific type of tree with at most two children per node.
A hash map is a data structure that maps keys to values for efficient lookup.
Q149. Identify key KPIs to measure the performance for the case study to be successful for Ed-Tech platform?
Key KPIs for measuring success of an Ed-Tech platform
User engagement metrics such as time spent on platform, number of logins, and frequency of usage
Retention rate of users over time
Conversion rate of free users to paid subscribers
Customer satisfaction scores and feedback
Number of active users and growth rate
Revenue generated from the platform
Completion rates of courses or modules
Effectiveness of marketing campaigns in acquiring new users
Q150. How to present to customer when delivery is not on time
Be honest and transparent, provide a clear explanation of the delay, offer solutions and a plan to mitigate future delays.
Acknowledge the delay and apologize for any inconvenience caused
Explain the reason for the delay and provide any relevant details
Offer solutions to mitigate the impact of the delay, such as expedited shipping or a discount
Provide a plan to prevent future delays, such as improved communication or better project management
Maintain open communication with the...read more
Q151. How and when API controller class instance generated in c#
API controller class instance is generated when a request is made to the API endpoint.
API controller class is responsible for handling incoming requests and returning responses.
Instance of API controller class is generated by the ASP.NET Core framework when a request is made to the API endpoint.
API controller class instance is disposed of after the request has been processed.
API controller class can be customized and configured using attributes and middleware.
Q152. Write a program for given login scenario using defined automation architecture?
A program for login scenario using defined automation architecture.
Identify the elements on the login page such as username, password, and login button
Use automation tools like Selenium to interact with the elements and input data
Verify successful login by checking for expected elements on the landing page
Implement error handling for incorrect login credentials
Use a modular and scalable architecture for maintainability
Q153. What is constructor and destructor and also explain its working
Constructor and destructor are special member functions in a class that are used to initialize and destroy objects respectively.
Constructor is called when an object is created and is used to initialize the object's data members.
Destructor is called when an object is destroyed and is used to free up any resources that the object was using.
Constructor has the same name as the class and no return type, while destructor has the same name as the class preceded by a tilde (~) and n...read more
Q154. How to make sure that the currency column will have different decimals as per the currency in an ABAP Report ?
To ensure currency column has different decimals based on currency in ABAP Report, use field symbols and currency conversion functions.
Use field symbols to dynamically assign the number of decimal places based on the currency
Utilize currency conversion functions like 'CONVERT_TO_FOREIGN_CURRENCY' to handle different decimal places for different currencies
Implement logic to determine the currency and set the decimal places accordingly
Q155. Definition of Types of entity
Types of entity refer to the different categories of objects or concepts that can be represented in a system or model.
Entities can be physical objects, such as people or buildings, or abstract concepts, such as ideas or relationships.
Entities can be further classified as unique or non-unique, depending on whether there can be multiple instances of the same entity.
Examples of entities include customers, products, orders, invoices, and employees.
Q156. Write test scenario for download functionality of a songs website?
Test scenario for download functionality of a songs website
Verify that the download button is visible and clickable
Check that the downloaded file is in the correct format
Ensure that the downloaded file is not corrupted
Test the download speed for different file sizes
Verify that the download progress is displayed to the user
Q157. Find the longest palendrom in a string? Example Input: abfgerccdedccfgfer Output: ccdedcc
To find the longest palindrome in a given string.
Iterate through the string and check for palindromes of odd and even lengths.
Keep track of the longest palindrome found so far.
Use two pointers to check if the substring is a palindrome.
If the substring is a palindrome and its length is greater than the current longest palindrome, update the longest palindrome.
Q158. What are the major components of MarTech platforms?
Major components of MarTech platforms include CRM, marketing automation, analytics, content management, and social media management.
Customer Relationship Management (CRM) systems
Marketing automation tools
Analytics tools for tracking and analyzing data
Content management systems for creating and managing content
Social media management tools for monitoring and engaging on social platforms
Q159. What happens if we don't give required fields while inserting data through insert or database.insert
If required fields are not given while inserting data through insert or database.insert, an error is thrown.
An error message is displayed indicating which fields are required.
The record is not inserted into the database.
The transaction is rolled back.
The error can be caught and handled in the code.
Validation rules can also prevent the insertion of records with missing required fields.
Q160. Challenges faced during requirement gathering and how you overcame it with examples
Challenges faced during requirement gathering and how they were overcome
Lack of clarity in client's requirements
Miscommunication between stakeholders
Scope creep
Used visual aids and prototypes to clarify requirements
Held regular meetings with stakeholders to ensure clear communication
Implemented change control process to manage scope creep
The static keyword in Java is used to create class-level variables and methods that can be accessed without creating an instance of the class.
Static variables are shared among all instances of a class.
Static methods can be called without creating an object of the class.
Static blocks are used to initialize static variables.
Example: public static int count = 0;
Q162. Write a program in javascript to display a pyramid
Program in javascript to display a pyramid
Use nested loops to print the pyramid
The outer loop controls the number of rows
The inner loop controls the number of spaces and asterisks to print
Use string concatenation to build the pyramid
Q163. Suppose we have more 2 interfaces with the same default method. What will happen when we try to implment both the interfaces in the same class.?
The class will have to provide its own implementation of the conflicting default method.
When implementing multiple interfaces with the same default method, a class must provide its own implementation of the conflicting method.
The class cannot inherit the default implementation from both interfaces.
The class can choose to implement one of the default methods and provide its own implementation for the other.
Alternatively, the class can provide a completely new implementation fo...read more
Q164. Que: Display all possible substrings of a string Que: Sort a list containing dates in ascending order
This question asks for displaying all possible substrings of a given string.
Iterate through the string and generate all possible substrings
Use nested loops to generate substrings of different lengths
Store the substrings in an array of strings
Q165. Quick and merge time complexity and when worst case happens in quick sort
Quick sort has O(n log n) time complexity on average, O(n^2) worst case. Merge sort has O(n log n) time complexity always.
Quick sort has an average time complexity of O(n log n) due to its divide-and-conquer approach.
Worst case for quick sort occurs when the pivot element is either the smallest or largest element in the array, leading to O(n^2) time complexity.
Merge sort always has a time complexity of O(n log n) due to its consistent splitting and merging of subarrays.
Q166. What is the difference between contentasset and content slots?
Contentasset stores reusable content while content slots define where content is displayed on a page.
Contentasset stores reusable content like images, videos, and text.
Content slots define where content is displayed on a page, such as a banner or product description section.
Contentassets can be reused across multiple content slots on different pages.
Q167. How do you do Sprint planning and Backlog Grooming.
Sprint planning involves selecting items from the backlog and estimating the effort required to complete them.
Review the backlog and prioritize items based on business value
Break down items into smaller tasks and estimate effort required
Assign tasks to team members based on their skills and availability
Monitor progress during the sprint and adjust plans as needed
Q168. burn down chart, how does it work?
A burn down chart is a visual representation of the progress of a project, showing how much work is left to be done.
It tracks the amount of work remaining over time
It helps the team to stay on track and adjust their efforts as needed
It shows the ideal progress line and the actual progress line
It is commonly used in Agile methodologies
Example: If a project has 100 tasks and the team completes 20 tasks in the first week, the burn down chart will show that 80 tasks are remaining...read more
I can design a login page for Facebook with user input fields for email/phone and password, a 'Login' button, and 'Forgot password?' link.
Include user input fields for email/phone and password
Add a 'Login' button for submitting credentials
Include a 'Forgot password?' link for password recovery
Design the page with Facebook branding and color scheme
Q170. 2. You have a array of 1 to 5 in which 4 and 5 are repeated. Write a code to find 2nd largest no. In array?
Find the 2nd largest number in an array with repeated elements.
Sort the array in descending order
Remove duplicates
Return the second element in the sorted array
Q171. How to kick off projecr, challenges, how to plan, how to decide deqndecies, how to maintain risk register
To kick off a project, address challenges, plan, decide dependencies, and maintain a risk register.
Kick off the project by clearly defining the project scope, objectives, and deliverables.
Identify potential challenges and risks that may arise during the project and develop mitigation strategies.
Create a detailed project plan outlining tasks, timelines, resources, and responsibilities.
Determine dependencies between tasks and team members to ensure smooth execution of the proje...read more
Q172. What is polymorphism and explain in brief?
Polymorphism is the ability of an object to take on many forms.
Polymorphism allows objects of different classes to be treated as if they are of the same class.
It is achieved through method overriding and method overloading.
Example: A parent class Animal can have child classes like Dog, Cat, and Cow. All these child classes can have a method called 'makeSound', but each class can have a different implementation of the method.
Polymorphism makes code more flexible and reusable.
Q173. What is the input activities to take input from the end user during automation?
Input activities to take input from end user during automation include forms, text boxes, dropdowns, and buttons.
Forms can be used to collect multiple inputs from the user.
Text boxes allow users to enter text or numerical values.
Dropdowns provide a list of options for users to select from.
Buttons can be clicked by users to submit or confirm their input.
Q174. 3. How can we prevent circular dependency in Spring?
Circular dependency in Spring can be prevented by using constructor injection or setter injection.
Use constructor injection to inject dependencies
Use setter injection to inject dependencies
Use @Autowired annotation to inject dependencies
Use @Qualifier annotation to specify which bean to inject
Use @Lazy annotation to delay bean initialization
Use @DependsOn annotation to specify bean dependencies
Use @ComponentScan annotation to scan for beans
Q175. How to color a single column and single row in ABAP Report?
Use the WRITE statement with the addition COLOR to color a single column and single row in ABAP Report.
Use the WRITE statement with the addition COLOR to specify the color for the text output.
For coloring a single column, use the WRITE statement within a loop for each row and specify the column number.
For coloring a single row, use the WRITE statement for each column in that row and specify the row number.
Q176. Write a program to sort an array
Program to sort an array
Choose a sorting algorithm based on the requirements
Implement the chosen algorithm in the programming language of choice
Test the program with different input sizes and edge cases
Q177. Tell Travelling Salesman Problem Optimal Solution Approach
The optimal solution approach for the Travelling Salesman Problem involves using algorithms such as the Nearest Neighbor Algorithm and the 2-Opt Algorithm.
The Nearest Neighbor Algorithm starts at a random city and selects the nearest unvisited city as the next stop.
The 2-Opt Algorithm involves swapping two edges in the tour to see if it results in a shorter distance.
Other algorithms include the Genetic Algorithm and the Simulated Annealing Algorithm.
The optimal solution is no...read more
Q178. given a string consisting of various words . reverse all the string and words by 2 methods
Reverse a string and its words using two methods.
Method 1: Reverse the entire string and then reverse each word individually.
Method 2: Split the string into words, reverse the order of the words, and then reverse each word individually.
Example: Input string - 'Hello world, how are you?' Output - '?uoy era woh ,dlrow olleH'
Q179. Tell me difference between extends keywords and implements keywords. What is Static block etc. Collection Map in core Java .
Q180. one code to solve find frequency of every character of string
A code to find the frequency of every character in a string.
Create an empty dictionary to store the frequency of each character.
Iterate through the string and for each character, check if it is already in the dictionary.
If it is, increment its value by 1. If it is not, add it to the dictionary with a value of 1.
Return the dictionary with the frequency of each character.
Q181. 4. React: What is Virtual DOM, useState and different types of Hooks in React
Virtual DOM is a lightweight copy of the actual DOM, useState is a hook for managing state in functional components, and Hooks are functions that let you use state and other React features in functional components.
Virtual DOM is a lightweight copy of the actual DOM that React uses to improve performance by updating only the necessary parts of the actual DOM.
useState is a hook in React that allows functional components to have state. It returns an array with the current state ...read more
Q182. How can you check whether the give string can become palindrome or not. You can apply unlimited operations.
To check if a string can become a palindrome, count the frequency of each character. If there is at most one character with an odd frequency, it can be rearranged into a palindrome.
Count the frequency of each character in the string
Check if there is at most one character with an odd frequency
If yes, the string can be rearranged into a palindrome
Q183. Given an array find if there are two elements are present that sum to target, else return -1;
Given an array find if there are two elements are present that sum to target, else return -1
Iterate through the array and for each element check if target - element is present in the array
Use a hash table to store the elements and their indices for faster lookup
If no such pair is found, return -1
Q184. Given a number , check if it can be represented in 5^n form , where n is positive integer
Check if a number can be represented in the form 5^n
Check if the number is a power of 5
Use logarithms to determine if the number can be represented as 5^n
Examples: 5, 25, 125 are represented as 5^1, 5^2, 5^3 respectively
Q185. Find missing number in array of n size where numbers are from 1 to n
Use the formula for sum of first n natural numbers to find the missing number in the array.
Calculate the sum of first n natural numbers using the formula n*(n+1)/2
Calculate the sum of all numbers in the array
Subtract the sum of array from the sum of first n natural numbers to find the missing number
Q186. Flatten an object with nested objects as simplified keys. Like person.name.firstName.
Flatten nested objects with simplified keys like person.name.firstName
Iterate through the nested objects using recursion
Concatenate the keys with a dot to create the simplified key
Store the value of the nested key in the flattened object
Q187. Which estimate technique you follow , if fibonacci then why it is in 1 2 3 5 8 13 ?? Not in 12345678
Fibonacci sequence is a mathematical pattern where each number is the sum of the two preceding ones.
Fibonacci sequence is a series of numbers where each number is the sum of the two preceding ones.
The sequence starts with 1, 2, then each subsequent number is the sum of the two previous numbers (1+2=3, 2+3=5, 3+5=8, and so on).
This sequence is used in estimating because it reflects natural growth patterns found in nature.
Q188. Selenium: What is page factory, webdriver architecture, how it interact with different browsers Java: interface, string pool, exception handling Cucumber: scenario outline, hooks Describe automation framework H...
read morePage factory is a design pattern in Selenium, WebDriver architecture interacts with browsers, Java concepts like interfaces and exception handling, Cucumber features like scenario outline and hooks, automation framework design, tool selection for testing.
Page factory in Selenium is a design pattern that allows for better organization of code by separating the page elements from the test methods.
WebDriver architecture is a client-server architecture where the WebDriver API int...read more
Q189. Framework design and explanation BDD explanation POM vs Page factory Selenium Code for finding broken link Selenium wait POJO explanation BDD reporting Java collections Interface and abstraction Why multiple in...
read moreQ190. Remove a linked list node without head or tail pointer given
Removing a node from a linked list without head or tail pointer
Use the node to be removed's next node to copy its data and then delete the next node
Update the current node's next pointer to skip the next node
Q191. Reverse a linked list (iterative AND Recursive)
Reverse a linked list using iterative and recursive methods.
Iterative method involves traversing the list and changing the pointers to reverse the order.
Recursive method involves calling the function recursively on the next node and changing the pointers.
Both methods have O(n) time complexity and O(1) space complexity.
Example: 1->2->3->4->5 becomes 5->4->3->2->1.
Q192. How would you split a search query across multiple machines?
Constraints in SQL are rules and restrictions applied to columns in a table to enforce data integrity.
Constraints ensure data accuracy and consistency in a database.
Common constraints include NOT NULL, UNIQUE, PRIMARY KEY, FOREIGN KEY, and CHECK constraints.
NOT NULL constraint ensures a column cannot have a NULL value.
UNIQUE constraint ensures all values in a column are unique.
PRIMARY KEY constraint uniquely identifies each record in a table.
FOREIGN KEY constraint establishes...read more
Q194. What is SCD and it's types ?
SCD stands for Slowly Changing Dimensions. It is a technique used in data warehousing to track changes in data over time.
SCD is used to maintain historical data in a data warehouse
There are three types of SCD: Type 1, Type 2, and Type 3
Type 1 SCD overwrites old data with new data
Type 2 SCD creates a new record for each change and maintains a history of changes
Type 3 SCD adds new columns to the existing record to track changes
Example: In a customer database, SCD can be used to...read more
Q195. Writing program using any programming language
I would write a program in Python to automate a repetitive task.
Identify the task and break it down into smaller steps
Choose the appropriate data structures and algorithms
Write clean and readable code with proper documentation
Test the program thoroughly before deployment
Q196. What is Test plan and what are the contents for the plan.
A test plan is a document that outlines the testing strategy, objectives, scope, and deliverables for a software project.
Test plan defines the approach to be taken for testing a software application
It includes the objectives, scope, test strategy, test environment, test deliverables, and test schedule
It also outlines the roles and responsibilities of the testing team
Test plan helps in identifying the risks and issues associated with testing
Examples of test plan templates incl...read more
Q197. Data Science project pipeline ,what components are involved , step by step process
Data science project pipeline involves multiple components and follows a step-by-step process.
1. Define the problem statement and objectives of the project.
2. Collect and preprocess the data needed for analysis.
3. Explore and visualize the data to gain insights.
4. Build and train machine learning models to solve the problem.
5. Evaluate the models using appropriate metrics.
6. Deploy the model into production and monitor its performance.
7. Communicate the results and findings t...read more
Q198. What is BMC in CSS
BMC stands for Block Formatting Context in CSS, which is a mechanism for controlling the layout of elements.
BMC is created when an element is floated, positioned absolutely, or has an overflow value other than visible.
BMC prevents margin collapsing between parent and child elements.
BMC can be used to create columns of equal height.
Example: Using display: inline-block on child elements creates a BMC.
Example: Using overflow: hidden on a parent element creates a BMC.
Q199. How to find largest element in array with O(N) complexity
Iterate through array once, keeping track of largest element found so far.
Initialize a variable to store the largest element found so far
Iterate through the array and update the variable if a larger element is found
Return the largest element after the iteration is complete
Q200. How will you prevent docker container from assuming root user role?
To prevent a docker container from assuming root user role, use non-root users, drop privileges, and utilize user namespaces.
Create a non-root user in the Dockerfile with appropriate permissions
Use the USER instruction in the Dockerfile to switch to the non-root user
Utilize user namespaces to map the container's root user to a non-root user on the host system
Drop privileges within the container to limit the capabilities of the processes running inside
More about working at Nagarro
Interview Process at ITC
Top Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month