Netcracker Technology
50+ Tech-Matrix Sdn Bhd Interview Questions and Answers
Q1. check if thelinkedlist has a cycle exceptions threads arrays - reverse pattern matching
To check if a linked list has a cycle, use Floyd's Tortoise and Hare algorithm.
Use two pointers, slow and fast, to traverse the linked list.
If there is a cycle, the fast pointer will eventually meet the slow pointer.
Example: 1->2->3->4->2 (cycle exists between 4 and 2)
Q2. What is RDBMS and SQL query to retrieve data from database.
RDBMS is a relational database management system. SQL query to retrieve data is SELECT * FROM table_name;
RDBMS is a software system used to manage relational databases.
SQL is a programming language used to manage RDBMS.
SELECT statement is used to retrieve data from a table.
The * symbol retrieves all columns from the specified table.
table_name is the name of the table from which data is to be retrieved.
Q3. 1. Write program to add node in link list. 2. Delete node from singly link list. 3. Try catch block basics 4. Polymorphism. 5. Function overloading, overriding.
Interview questions for Senior Software Engineer on linked lists, exception handling, and OOP concepts.
For adding a node in a linked list, create a new node and point it to the next node in the list.
For deleting a node, find the node to be deleted and point the previous node to the next node.
Try-catch blocks are used for handling exceptions in code.
Polymorphism allows objects of different classes to be treated as if they are of the same class.
Function overloading is when mult...read more
Q4. Difference between comprable and comparator in java
Comparable is an interface used for natural ordering of objects, while Comparator is an interface used for custom ordering of objects.
Comparable interface is used to define the natural ordering of objects in a class by implementing the compareTo() method.
Comparator interface is used to define custom ordering of objects in a class by implementing the compare() method.
Example: Comparable interface is used in classes like String, Integer for default sorting. Comparator interface...read more
Q5. Given an array of integers, return thr largest subbaray sum
Find the largest subarray sum in an array of integers
Use Kadane's algorithm to find the maximum subarray sum
Iterate through the array and keep track of the current sum and maximum sum
Reset the current sum to 0 if it becomes negative
Q6. V table and V pointer difference?
V table is a table of function pointers used in object-oriented programming, while V pointer is a pointer to the V table.
V table is a table of function pointers used for dynamic dispatch in object-oriented programming.
V pointer is a pointer to the V table, allowing objects to call the correct functions at runtime.
Example: In C++ virtual functions are implemented using V tables and V pointers.
Q7. what was exception handling , is this concept present in C?
Exception handling is a mechanism to handle runtime errors and prevent program crashes.
It allows the program to gracefully handle errors and continue execution.
C does have a basic form of exception handling using the setjmp() and longjmp() functions.
Examples of exceptions include divide by zero, null pointer dereference, and file not found errors.
Q8. count no of words in a string taken from a user - techno managerial round
Count the number of words in a user input string.
Use the split() method to split the string into an array of words.
Get the length of the array to get the number of words.
Handle edge cases like leading/trailing spaces and multiple spaces between words.
Q9. Explain friend function with syntax?
Friend function is a function that is not a member of a class but has access to its private and protected members.
Friend functions are declared inside a class with the 'friend' keyword.
They can access private and protected members of the class.
They are not member functions of the class.
Example: class MyClass { private: int x; friend void myFriendFunction(MyClass obj); };
Q10. A program to swap variables
A program to swap variables
Declare two variables and assign values to them
Use a third variable to store the value of the first variable
Assign the value of the second variable to the first variable
Assign the value of the third variable to the second variable
Q11. What is the significance of the public static void main(String arv[]) method in Java?
The public static void main(String arv[]) method is the entry point of a Java program, where execution begins.
The 'public' keyword allows the method to be accessed from outside the class.
The 'static' keyword allows the method to be called without creating an instance of the class.
The 'void' keyword indicates that the method does not return any value.
The 'main' method is the starting point of execution for a Java program.
The 'String[] args' parameter allows command-line argume...read more
Q12. Given a string input = "Achiever2025," how can you separate the alphabets and digits from input?
Separate alphabets and digits from a given string input.
Iterate through each character in the input string
Check if the character is a letter or a digit using built-in functions like isalpha() and isdigit()
Create separate arrays for alphabets and digits and store the characters accordingly
Q13. Scope resolution with syntax ?
Scope resolution refers to the process of specifying which scope a particular variable or function belongs to in a programming language.
Scope resolution is typically denoted by the double colon (::) operator in languages like C++ and PHP.
It is used to access static members, constants, and overridden methods in a class.
Example: ClassName::staticMember
Example: Namespace::functionName
Q14. Oops concepts in C Language?
Oops concepts in C Language include encapsulation, inheritance, polymorphism, and abstraction.
Encapsulation: Bundling data and methods that operate on the data into a single unit. Example: struct in C.
Inheritance: Allowing a class to inherit properties and behavior from another class. Example: using struct to mimic inheritance.
Polymorphism: Ability to present the same interface for different data types. Example: function overloading in C.
Abstraction: Hiding the complex implem...read more
Q15. File handling classes?
File handling classes are used in programming to read, write, and manipulate files.
File handling classes provide methods to open, read, write, and close files.
Examples include FileInputStream, FileOutputStream, FileReader, FileWriter in Java.
These classes help in managing file operations efficiently and securely.
Q16. components of wsdl file, fault handing in webservices.
WSDL file components and fault handling in web services.
WSDL file components include types, messages, port types, bindings, and services.
Fault handling in web services is done through SOAP fault messages.
SOAP fault messages contain information about the error, including a fault code and fault string.
Web services can also define custom fault messages for specific errors.
Fault handling can be implemented using try-catch blocks in the web service code.
Q17. Write Fibonacci series program using recursion
Fibonacci series program using recursion
Define a recursive function to calculate Fibonacci series
Base case: return 0 if n is 0, return 1 if n is 1
Recursive case: return sum of previous two Fibonacci numbers
Q18. Improvements on project and architecture.
Implemented microservices architecture to improve scalability and maintainability of the project.
Decomposed monolithic application into smaller, independent services
Utilized containerization technology like Docker for easy deployment and scaling
Implemented service discovery and load balancing for better performance
Used API gateways for centralized access control and monitoring
Q19. how to get MAC based routing table ? what happened at kernel level when we pung server.
To get MAC based routing table, use 'ip neigh show' command. When pinging a server, kernel sends ICMP packets and updates ARP cache.
Use 'ip neigh show' command to display MAC based routing table
Kernel sends ICMP packets when pinging a server
Kernel updates ARP cache with MAC address of the server
Q20. which performance tuning parameter you know and how to set it permanently and temporary
One performance tuning parameter is swappiness, which controls how often the system swaps data to disk.
To set swappiness temporarily, use the 'sysctl' command: sysctl vm.swappiness=10
To set swappiness permanently, edit the '/etc/sysctl.conf' file and add 'vm.swappiness=10'
Another performance tuning parameter is 'dirty_ratio' which controls the percentage of system memory that can be filled with dirty pages before processes are forced to write them out to disk
To set dirty_rati...read more
Q21. Find the duplicates in an array.
Find duplicates in an array of strings.
Iterate through the array and store each element in a hash set.
If an element is already in the hash set, it is a duplicate.
Return a list of all duplicates found.
Q22. what is the notice period
Notice period refers to the amount of time an employee must give before leaving a job.
Notice period is typically stated in the employment contract or company policy.
It can range from 2 weeks to 3 months depending on the company and position.
During the notice period, the employee is expected to fulfill their job responsibilities and assist with the transition.
Some companies may require employees to serve notice even if they are on probation.
Notice period can be negotiable in s...read more
Q23. difference between soap and rest
SOAP is a protocol while REST is an architectural style for web services.
SOAP uses XML for messaging while REST uses JSON or XML.
SOAP requires more bandwidth and processing power than REST.
SOAP has built-in error handling while REST relies on HTTP error codes.
SOAP supports both stateful and stateless communication while REST is stateless.
SOAP is commonly used in enterprise applications while REST is popular for web-based applications.
Q24. Write a program to print factorial of a number using recursion
Program to print factorial of a number using recursion
Define a function that takes an integer as input
Check if the input is 0 or 1, return 1 if true
Else, call the function recursively with input-1 and multiply with input
Q25. sed command syntax and what are special permission
sed command is used for text manipulation in Linux. Special permissions include setuid, setgid, and sticky bit.
sed command is used for text substitution and manipulation in Linux
Syntax: sed 's/pattern/replacement/g' filename
Special permissions in Linux include setuid, setgid, and sticky bit
Setuid: allows a user to execute a file with the permissions of the file owner
Setgid: allows a user to execute a file with the permissions of the group owner
Sticky bit: restricts the deleti...read more
Q26. difference between pure and impure pipes in angular
Pure pipes are stateless and only depend on input values, while impure pipes can have side effects and depend on external factors.
Pure pipes are faster and more efficient than impure pipes.
Pure pipes are used for simple transformations of data, while impure pipes are used for more complex transformations.
Pure pipes can be memoized for better performance.
Impure pipes can cause performance issues if not used carefully.
Examples of pure pipes include currency and date formatting,...read more
Q27. Delete a node from Linked
To delete a node from a Linked List, update the pointers of the previous node to skip the node to be deleted.
Set the next pointer of the previous node to skip the node to be deleted
Update the next pointer of the node before deletion to point to the node after deletion
Free the memory of the node to be deleted
Q28. Java concepts in deep
Java concepts cover a wide range of topics including object-oriented programming, data structures, algorithms, and more.
Object-oriented programming principles like inheritance, encapsulation, and polymorphism
Data structures such as arrays, linked lists, stacks, and queues
Algorithms like sorting, searching, and graph traversal
Exception handling, multithreading, and networking in Java
Java collections framework including lists, sets, maps, and queues
Q29. how you harden your linux server
I harden my Linux server by implementing security measures to protect against potential threats.
Regularly update the operating system and software to patch vulnerabilities
Disable unnecessary services and ports to reduce attack surface
Implement strong password policies and use SSH keys for authentication
Set up a firewall to control incoming and outgoing traffic
Monitor logs for suspicious activities and set up intrusion detection systems
Q30. What is RDBMS? and write a query?
RDBMS stands for Relational Database Management System. It is a type of database management system that stores data in a structured format using rows and columns.
RDBMS organizes data into tables with rows and columns.
It uses SQL (Structured Query Language) for querying and managing the data.
Examples of RDBMS include MySQL, Oracle, SQL Server, and PostgreSQL.
Q31. Write a query to fetch all details from table?
Query to fetch all details from a table
Use SELECT * FROM table_name to fetch all details
Make sure to replace 'table_name' with the actual name of the table
Ensure proper permissions to access the table
Q32. How pods communicates with each others.
Pods communicate with each other through network communication within the same Kubernetes cluster.
Pods can communicate using localhost or loopback address.
Pods can communicate using services which act as stable endpoints for pods.
Pods can communicate using environment variables to pass information.
Pods can communicate using shared volumes to exchange data.
Pods can communicate using Kubernetes networking model like DNS for service discovery.
Q33. Design and present order management process
Designing an efficient order management process to streamline operations and improve customer satisfaction.
Identify key stakeholders involved in the order management process (e.g. sales team, warehouse staff, customer service)
Map out the current order management workflow to identify bottlenecks and inefficiencies
Implement automation tools and software to streamline order processing and tracking
Establish clear communication channels between departments to ensure smooth order f...read more
Q34. What is Class and Object
A class is a blueprint for creating objects, while an object is an instance of a class.
A class defines the properties and behaviors of objects.
An object is a specific instance of a class.
Classes can be used to create multiple objects with similar characteristics.
Objects can interact with each other by calling methods defined in their class.
Example: Class 'Car' defines properties like 'color' and behaviors like 'drive'. An object 'myCar' can be created from this class.
Q35. BSS flow with project description
BSS flow refers to the process of managing and delivering services to customers in a telecommunication network.
BSS stands for Business Support System and includes functions such as billing, customer management, and service provisioning.
The BSS flow involves the following steps: customer registration, service activation, usage tracking, billing, and payment collection.
For example, when a customer signs up for a new mobile phone plan, the BSS flow would involve verifying their ...read more
Q36. Difference between test case and test scenario.
Test case is a detailed step-by-step procedure to test a specific functionality, while test scenario is a high-level description of a test.
Test case is detailed, specific steps to test a particular functionality.
Test scenario is a high-level description of a test objective.
Test case includes preconditions, test steps, expected results, and postconditions.
Test scenario may cover multiple test cases or a broader aspect of testing.
Example: Test case - Verify login functionality ...read more
Q37. write script to echo line repeatedly
Script to echo a line repeatedly
Use a loop to echo the line multiple times
Specify the number of times to repeat the line
Example: for i in {1..5}; do echo 'Hello, World!'; done
Q38. 1. Explain about SSL certificates
SSL certificates are digital certificates that authenticate the identity of a website and encrypt data sent to and from it.
SSL certificates use public key encryption to secure data transmission
They contain information about the website owner, domain name, and expiration date
SSL certificates can be obtained from trusted certificate authorities or self-signed
They are essential for secure online transactions and protecting sensitive information
Q39. API structure example for Order creation
API structure for Order creation should include endpoints, request and response formats, and authentication.
Endpoints should be clearly defined for creating, updating, and deleting orders.
Request format should include required and optional parameters, such as order details and customer information.
Response format should include status codes and error messages.
Authentication should be implemented to ensure secure access to the API.
Example: POST /orders, Request: {"customer_id"...read more
Q40. how to check wwn number
To check WWN number, use commands like 'lsscsi' or 'lsblk' in Linux.
Use 'lsscsi' command to list SCSI devices and their WWN numbers
Use 'lsblk' command to list block devices and their WWN numbers
Q41. what is Devops and its methodology
DevOps is a methodology that combines software development (Dev) with IT operations (Ops) to improve collaboration and efficiency.
DevOps focuses on automating processes to streamline development and deployment.
It emphasizes continuous integration and continuous delivery (CI/CD) to deliver software faster and more reliably.
DevOps encourages a culture of collaboration, communication, and shared responsibility between development and operations teams.
Tools commonly used in DevOp...read more
Q42. What are day to day activities
Day to day activities involve troubleshooting technical issues, providing customer support, testing new applications, and collaborating with other teams.
Troubleshooting technical issues with software or hardware
Providing customer support via phone, email, or in person
Testing new applications or software updates
Collaborating with sales, marketing, and development teams
Attending meetings to discuss project progress and requirements
Q43. Bug life cycle with example
Bug life cycle is the process of identifying, reporting, fixing, and verifying software defects.
Bug is identified by testers during testing phase
Bug is reported to development team
Development team fixes the bug
Bug fix is verified by testers
Bug is closed if verified or reopened if not fixed properly
Q44. Find 2nd highest number using a query
Use a query to find the 2nd highest number in a dataset
Use the ORDER BY clause to sort the numbers in descending order
Use the LIMIT clause to retrieve the second row
Q45. Advantage of Macros over Function
Macros provide faster execution and smaller code size compared to functions.
Macros are preprocessed and expanded inline, reducing function call overhead.
Macros can access and modify program data directly, whereas functions cannot.
Macros can be used to define constants, loops, and conditional statements.
Macros can be used to generate repetitive code, such as getters and setters.
Macros can be used to implement domain-specific languages (DSLs).
Q46. What are the oops pillars
The four pillars of object-oriented programming are encapsulation, inheritance, polymorphism, and abstraction.
Encapsulation: Bundling data and methods that operate on the data into a single unit (class).
Inheritance: Allowing a new class to inherit properties and behavior from an existing class.
Polymorphism: The ability for objects of different classes to respond to the same message in different ways.
Abstraction: Hiding the complex implementation details and showing only the n...read more
Q47. What is kube-proxy?
Kube-proxy is a network proxy that runs on each node in a Kubernetes cluster.
Responsible for routing traffic to the appropriate pods based on IP and port
Implements load balancing for services within the cluster
Supports different proxy modes like userspace, iptables, and IPVS
Q48. Define flow in order mangement
Flow in order management refers to the process of managing the movement of orders through various stages from placement to fulfillment.
Flow in order management involves tracking orders from the moment they are placed to when they are delivered to the customer.
It includes managing inventory levels, processing payments, and coordinating with suppliers and logistics partners.
Efficient flow in order management leads to faster order processing, reduced errors, and improved custome...read more
Q49. Define M2M authentication
M2M authentication is the process of verifying the identity of machines communicating with each other.
M2M authentication is used in IoT devices to ensure secure communication between devices.
It involves the use of digital certificates and keys to authenticate the devices.
M2M authentication can also involve the use of biometric authentication for added security.
Examples of M2M authentication protocols include OAuth, MQTT, and CoAP.
Q50. How is branching strategy
Branching strategy is a method used in version control systems to manage code changes and collaboration.
Branching allows for parallel development of features without affecting the main codebase
Common strategies include feature branching, release branching, and hotfix branching
Branching should be used judiciously to avoid code conflicts and merge issues
Q51. various types of joins n output
Various types of joins in SQL include inner join, outer join, left join, right join, and full join.
Inner join: returns rows when there is a match in both tables
Outer join: returns all rows when there is a match in one of the tables
Left join: returns all rows from the left table and the matched rows from the right table
Right join: returns all rows from the right table and the matched rows from the left table
Full join: returns rows when there is a match in one of the tables
Q52. What is module fedration ?
Q53. What is Bug cycle
Bug cycle is the process of identifying, reporting, fixing, retesting, and closing a software bug.
Bug is identified by tester during testing phase
Bug is reported to development team
Development team fixes the bug
Tester retests the bug fix
If bug is fixed, it is closed. If not, cycle repeats
Q54. Explain project in detail
The project involved developing a new software application for a financial services company.
The project was initiated to address the need for a more efficient and user-friendly system for managing financial transactions.
The team consisted of developers, testers, and business analysts who worked together to design and build the application.
The project was divided into several phases, including requirements gathering, design, development, testing, and deployment.
Throughout the ...read more
Q55. Major contribution to project
Led the development of a new software tool that increased efficiency by 30%.
Managed a team of 5 engineers to design and implement the tool
Conducted user testing and gathered feedback for iterative improvements
Presented the final product to stakeholders and received positive feedback
Q56. 2. Explain patching
Patching refers to the process of updating software to fix bugs or security vulnerabilities.
Patching involves downloading and installing updates from the software vendor.
It is important to test patches before deploying them to ensure they do not cause any issues.
Patching should be done regularly to ensure software is up-to-date and secure.
Examples of patching include installing Windows updates or updating Java on a server.
Q57. 3. Explain Jdbc
JDBC stands for Java Database Connectivity. It is a Java API that allows Java programs to access databases.
JDBC provides a standard set of interfaces for accessing relational databases.
It allows Java programs to connect to a database, execute SQL queries, and retrieve results.
JDBC drivers are used to connect to different types of databases, such as Oracle, MySQL, and SQL Server.
JDBC is used in many Java-based applications, such as web applications and enterprise applications.
Q58. Difference between DML and DDL
DML is used to manipulate data in a database, while DDL is used to define the structure of the database.
DML stands for Data Manipulation Language and is used for inserting, updating, deleting, and retrieving data in a database.
DDL stands for Data Definition Language and is used for defining the structure of the database such as creating tables, indexes, and constraints.
Examples of DML statements include INSERT, UPDATE, DELETE, and SELECT.
Examples of DDL statements include CRE...read more
Q59. Alias in webpack
Alias in webpack allows you to create shortcuts for module paths.
Aliases are defined in the webpack configuration file using the 'resolve.alias' property.
They help in avoiding long relative paths and make the code more readable.
Example: resolve: { alias: { '@': path.resolve(__dirname, 'src/') } }
Interview Process at Tech-Matrix Sdn Bhd
Top Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month