NICE
50+ Nexus Day Surgery Centre Interview Questions and Answers
Q1. 4- Selenium questions- list vs set, findelement vs findelements, Actions class, write syntax for actions class, implict wait and explict wait
Selenium questions covering list vs set, findelement vs findelements, Actions class, implicit wait, and explicit wait.
List vs Set: List allows duplicate elements and maintains insertion order, while Set does not allow duplicates.
findElement vs findElements: findElement returns the first matching element, findElements returns a list of all matching elements.
Actions class: Used for performing complex user interactions like drag-and-drop, mouse movements, etc.
Syntax for Actions ...read more
Q2. 8- agile process, what is user story, what is sprint
User story is a description of a feature from an end-user perspective, and sprint is a time-boxed iteration in Agile development.
User story is a short, simple description of a feature told from the perspective of the person who desires the new capability.
Sprint is a time-boxed iteration in Agile development, usually lasting 1-4 weeks, where a team works on a set of user stories.
User stories are written in a specific format: 'As a [type of user], I want [some goal] so that [so...read more
Q3. Would you be compfortable in handling clients all over the world
Yes, I am comfortable in handling clients all over the world.
I have experience in working with clients from different countries and cultures.
I am familiar with different time zones and can adjust my schedule accordingly.
I have excellent communication skills and can effectively communicate with clients in different languages.
I am willing to learn about different cultures and customs to better serve clients.
I am able to work remotely and can use various communication tools to s...read more
Q4. What is difference between const, let and var?
const, let, and var are all used to declare variables in JavaScript, but they have different scopes and behaviors.
const is used to declare variables that cannot be reassigned. It has block scope.
let is used to declare variables that can be reassigned. It also has block scope.
var is used to declare variables with function scope. It can be reassigned and hoisted.
Q5. How would you troubleshoot a faulty internet line
To troubleshoot a faulty internet line, start by checking the physical connections and then move on to testing the network settings.
Check if the modem and router are properly connected and powered on
Inspect the Ethernet cables for any damage or loose connections
Restart the modem and router
Check the network settings on the computer or device
Ping the router and external websites to test connectivity
Contact the internet service provider if the issue persists
Q6. What is Testing Pyramid? What are the different layers in it?
Testing Pyramid is a testing strategy that suggests the right balance of different types of automated tests.
The Testing Pyramid consists of three layers: Unit Tests, Service Tests, and UI Tests.
Unit Tests are at the bottom of the pyramid and focus on testing individual components or functions in isolation.
Service Tests are in the middle layer and focus on testing the interactions between different components or services.
UI Tests are at the top of the pyramid and focus on test...read more
Q7. What is diff between ActiveMQ and RabbitMQ
ActiveMQ is Java-based messaging broker while RabbitMQ is a message broker that implements the Advanced Message Queuing Protocol (AMQP).
ActiveMQ is written in Java and supports multiple messaging protocols like OpenWire, STOMP, MQTT, and AMQP.
RabbitMQ is written in Erlang and specifically implements the AMQP protocol.
ActiveMQ is more feature-rich and has a larger user base, while RabbitMQ is known for its reliability and performance.
ActiveMQ has a more complex setup and confi...read more
Q8. What are databases are present in Azure DB
Azure DB offers various databases including SQL Database, Cosmos DB, MySQL, PostgreSQL, and MariaDB.
SQL Database
Cosmos DB
MySQL
PostgreSQL
MariaDB
Q9. How will you troubleshoot a faulty Internet line?
To troubleshoot a faulty Internet line, I would follow a step-by-step process to identify and resolve the issue.
Check if the modem and router are powered on and connected properly
Run a diagnostic test to identify any issues with the line
Check for any physical damage to the cables or equipment
Reset the modem and router
Contact the Internet service provider for further assistance
Q10. 3-Java program to reverse string, check palindrome
Java program to reverse string and check if it is a palindrome.
Create a function to reverse the input string.
Compare the reversed string with the original string to check if it is a palindrome.
Use built-in functions like StringBuilder or StringBuffer for string manipulation.
Handle cases where input is null or empty.
Q11. What is default scope of bean in spring ?
Singleton
Default scope of a bean in Spring is singleton
Singleton scope means that only one instance of the bean will be created for each Spring container
This is the default scope in Spring, meaning if no scope is specified, the bean will be treated as a singleton
Q12. Why HashSet has default size 16
HashSet default size 16 for performance balance between memory usage and lookup time.
Default size 16 provides a good balance between memory usage and lookup time.
Choosing a power of 2 size helps in distributing elements evenly across buckets.
Resizing the HashSet is expensive, so starting with a larger size reduces the need for resizing.
Example: If the default size was too small, it would lead to more collisions and degrade performance.
Q13. What are different Oops concept that you have used in your framework?
Encapsulation, Inheritance, Polymorphism, and Abstraction are the OOP concepts used in my framework.
Encapsulation: Used to hide the internal details of an object and provide a public interface.
Inheritance: Used to create a new class from an existing class, inheriting its properties and methods.
Polymorphism: Used to perform a single action in different ways based on the object's type.
Abstraction: Used to provide a simplified view of complex systems by hiding unnecessary detail...read more
Q14. What is map and flat map in Java 8 ?
Map and flatMap are methods in Java 8 Stream API used for transforming elements in a stream.
Map applies a function to each element in the stream and returns a new stream with the transformed elements.
FlatMap applies a function that returns a stream for each element in the original stream, then flattens the result into a single stream.
Example: List
words = Arrays.asList("hello", "world"); words.stream().map(String::toUpperCase).forEach(System.out::println); Example: List
- > numbe...read more
Q15. How will you create the solution with Azure Cloud Native Services ?
I will leverage Azure Cloud Native Services to design and implement scalable, resilient, and efficient solutions.
Utilize Azure Kubernetes Service (AKS) for container orchestration
Leverage Azure Functions for serverless computing
Implement Azure Cosmos DB for globally distributed databases
Utilize Azure DevOps for continuous integration and deployment
Leverage Azure Monitor for performance monitoring and optimization
Q16. Given a string s1= Apple. Write a code to convert s1 to array and put the vowels to that array
Convert string to array and extract vowels into a new array
Iterate through each character in the string
Check if the character is a vowel (a, e, i, o, u)
Add the vowel to a new array of strings
Q17. Explain layers of TCP/ IP model
TCP/IP model has 4 layers: Application, Transport, Internet, and Network Access.
Application layer handles high-level protocols like HTTP, FTP, SMTP, etc.
Transport layer provides reliable data transfer using TCP or fast but unreliable transfer using UDP.
Internet layer handles IP addressing and routing of data packets.
Network Access layer deals with physical network hardware and protocols like Ethernet, Wi-Fi, etc.
Q18. What is microservices architecture
Microservices architecture is an architectural style that structures an application as a collection of loosely coupled services.
Each service is self-contained and can be developed, deployed, and scaled independently.
Services communicate with each other over lightweight protocols like HTTP or messaging queues.
Microservices allow for flexibility, scalability, and easier maintenance compared to monolithic architectures.
Examples of companies using microservices architecture inclu...read more
Q19. How managed code works?
Managed code is code that is executed by the Common Language Runtime (CLR) in .NET framework.
Managed code is compiled into Intermediate Language (IL) by the compiler.
IL is then converted into native code by the Just-In-Time (JIT) compiler at runtime.
CLR manages memory allocation, garbage collection, exception handling, and security for managed code.
Managed code runs in a managed environment, providing features like cross-language integration and automatic memory management.
Q20. 6-API testing various response codes
API testing involves checking various response codes to ensure the API functions correctly.
Test for common response codes like 200 (OK), 400 (Bad Request), 401 (Unauthorized), 404 (Not Found), 500 (Internal Server Error)
Verify the response code matches the expected result based on the API request
Use tools like Postman or RestAssured to automate API testing and check response codes
Check for edge cases where the API may return unexpected response codes
Q21. How will you design a solution considering AI and Safety?
Designing a solution with AI and Safety involves implementing robust algorithms, thorough testing, and continuous monitoring.
Implement robust AI algorithms that prioritize safety and ethical considerations.
Conduct thorough testing to ensure the AI system behaves predictably and safely in all scenarios.
Implement fail-safe mechanisms to prevent AI from making harmful decisions.
Utilize real-time monitoring and feedback loops to continuously assess and improve the AI system's saf...read more
Q22. Write an automation code for handling multiple windows.
Automation code for handling multiple windows
Use getWindowHandles() method to get handles of all open windows
Switch between windows using switchTo().window() method
Perform actions on each window as needed
Q23. Which are not Object Oriented Languages?
Non-object oriented languages do not support the concept of objects and classes.
C
COBOL
Fortran
Pascal
Q24. What is JUnit and Mockito
JUnit is a unit testing framework for Java, while Mockito is a mocking framework used for creating mock objects in unit tests.
JUnit is used for writing and running repeatable automated tests to ensure code behaves as expected.
Mockito is used to create mock objects to simulate the behavior of real objects in unit tests.
Both JUnit and Mockito are commonly used in test-driven development (TDD) to ensure code quality and reliability.
Q25. - Difference between Functional component vs class component
Functional components are stateless and use functional programming concepts, while class components have state and lifecycle methods.
Functional components are simpler and easier to read/write.
Class components have access to lifecycle methods like componentDidMount.
Functional components can use hooks like useState and useEffect.
Class components are typically used for more complex components with state management.
Q26. Diff between HashSet and HashMap
HashSet is a collection of unique elements, while HashMap is a key-value pair collection.
HashSet does not allow duplicate elements, HashMap allows duplicate keys but not duplicate values.
HashSet uses Set interface, HashMap uses Map interface.
Example: HashSet
set = new HashSet<>(); HashMap map = new HashMap<>();
Q27. OOPs Concepts in detail
OOPs concepts refer to Object-Oriented Programming principles like Inheritance, Encapsulation, Polymorphism, and Abstraction.
Inheritance: Allows a class to inherit properties and behavior from another class.
Encapsulation: Bundling data and methods that operate on the data into a single unit.
Polymorphism: Ability to present the same interface for different data types.
Abstraction: Hiding the complex implementation details and showing only the necessary features.
Q28. How you have extracted data from excel sheet?
To extract data from an Excel sheet, you can use libraries like Apache POI or Openpyxl in Java or Python respectively.
Use a library like Apache POI or Openpyxl to read Excel files
Identify the sheet and cell range from which you want to extract data
Iterate through the rows and columns to extract the desired data
Store the extracted data in variables or data structures for further processing
Q29. what is BDD and TDD
BDD stands for Behavior Driven Development and TDD stands for Test Driven Development.
BDD focuses on the behavior of the system from the user's perspective.
TDD focuses on writing tests before writing the actual code.
BDD uses natural language to describe the behavior of the system.
TDD helps in ensuring that the code meets the requirements and is well-tested.
Both BDD and TDD help in improving the quality of the software and reducing bugs.
Q30. What are the pillars of oops?
The pillars of OOP are encapsulation, inheritance, and polymorphism.
Encapsulation: bundling of data and methods into a single unit
Inheritance: ability to create new classes from existing ones
Polymorphism: ability to use a single interface for multiple types
Q31. Which one is better for loop or foreach loop
It depends on the specific use case and programming language.
For loop is more flexible and can be used with different data structures.
Foreach loop is simpler and more readable for iterating over arrays or collections.
Use for loop when you need to control the iteration more precisely.
Use foreach loop when you just need to iterate over all elements in an array or collection.
Q32. Explain layers of OSI model
The OSI model is a conceptual framework used to describe network communication. It consists of 7 layers.
Layer 1: Physical layer - responsible for transmitting raw data over a physical medium
Layer 2: Data link layer - responsible for error-free transfer of data between nodes on a network
Layer 3: Network layer - responsible for routing data between different networks
Layer 4: Transport layer - responsible for reliable data transfer between end systems
Layer 5: Session layer - res...read more
Q33. Who performs unit testing?
Developers perform unit testing to ensure individual units of code are working correctly.
Developers are responsible for writing unit tests for their own code.
Unit testing is typically done using testing frameworks like JUnit, NUnit, or pytest.
Unit tests focus on testing small, isolated parts of the codebase, such as functions or methods.
Unit testing helps identify bugs early in the development process.
Automated unit tests are often run as part of the continuous integration pr...read more
Q34. Internal working of HashMap
HashMap is a data structure that stores key-value pairs and uses hashing to quickly retrieve values based on keys.
HashMap internally uses an array of linked lists to store key-value pairs.
When a key-value pair is added, the key is hashed to determine the index in the array where it will be stored.
If multiple keys hash to the same index, a linked list is used to handle collisions.
HashMap allows null keys and values, and can have one null key and multiple null values.
The load f...read more
Q35. What are the SQL DML commands
SQL DML commands are used to manipulate data in a database.
DML stands for Data Manipulation Language
Common DML commands include INSERT, UPDATE, DELETE
INSERT is used to add new data to a table
UPDATE is used to modify existing data in a table
DELETE is used to remove data from a table
Q36. design of some machine
Designing a machine involves creating a detailed plan for its structure, functionality, and operation.
Consider the purpose of the machine and its intended use
Identify the key components and their interactions
Create a schematic or blueprint detailing the layout and connections
Select appropriate materials and technologies for construction
Test the machine for functionality and efficiency
Q37. Design a file download and upload system.
Design a secure and efficient file download and upload system.
Implement secure authentication and authorization mechanisms to control access to files
Use encryption to protect data during transmission and storage
Utilize a user-friendly interface for easy file upload and download
Consider implementing version control for files to track changes and updates
Q38. Difference between Covariance and Correlation
Covariance measures the relationship between two variables, while correlation measures the strength and direction of a relationship.
Covariance can be positive, negative, or zero, indicating the direction of the relationship.
Correlation is always between -1 and 1, with 1 indicating a perfect positive relationship, -1 indicating a perfect negative relationship, and 0 indicating no relationship.
Covariance is affected by the scale of the variables, while correlation is a standard...read more
Q39. How do you write use case
Use cases are written to describe how a system interacts with users or other systems to achieve a specific goal.
Identify actors or users interacting with the system
Define goals or objectives to be achieved
Describe steps or actions taken by users to achieve the goals
Include alternative paths or scenarios
Use a structured format like 'Actor - Action - System Response'
Q40. cleaning data using DML command
DML commands like UPDATE and DELETE can be used to clean data in a database.
Use UPDATE command to modify existing data in a table.
Use DELETE command to remove unwanted data from a table.
Always backup data before performing DML commands to avoid data loss.
Consider using WHERE clause to specify which records to update or delete.
Q41. Authorisation and authentication difference
Authentication verifies the identity of a user, while authorization determines what actions they are allowed to perform.
Authentication confirms the user's identity through credentials like passwords or biometrics.
Authorization controls the access rights of authenticated users to specific resources or actions.
Example: Logging into a system with a username and password is authentication, while being able to view/edit certain files based on user roles is authorization.
Q42. DSA-Mirror image of binary tree
Mirror image of a binary tree involves swapping the left and right children of each node.
Start with the root node and recursively swap the left and right children of each node.
Repeat this process for all nodes in the binary tree.
The resulting tree will be the mirror image of the original binary tree.
Q43. What is the flow of cicd
CI/CD flow involves continuous integration, testing, deployment, and monitoring of code changes.
Code is pushed to version control system (e.g. Git)
Automated build and test process is triggered
Code is deployed to testing environment for validation
If tests pass, code is deployed to production environment
Monitoring and feedback loop for continuous improvement
Q44. Name the layers of OSI model
The OSI model has 7 layers that define how data is transmitted over a network.
Layer 1: Physical layer - deals with the physical aspects of transmitting data
Layer 2: Data link layer - responsible for error-free transfer of data between nodes
Layer 3: Network layer - handles routing of data between different networks
Layer 4: Transport layer - ensures reliable delivery of data between applications
Layer 5: Session layer - establishes and manages connections between applications
Lay...read more
Q45. Web api Security mechanism
Web API security mechanisms protect against unauthorized access and ensure data integrity.
Authentication: Verify the identity of the user or client accessing the API.
Authorization: Determine what actions the authenticated user or client is allowed to perform.
Encryption: Securely transmit data over the network using encryption algorithms.
Input validation: Validate and sanitize user input to prevent common security vulnerabilities like SQL injection or cross-site scripting (XSS...read more
Q46. Optianal class in java
Optional class in Java is used to represent a value that may or may not be present.
Optional class was introduced in Java 8 to handle null values more effectively.
It helps to avoid NullPointerException by providing methods to check if a value is present or not.
Example: Optional
optionalString = Optional.ofNullable("Hello");
Q47. Marker Iterface in java
Marker interface in Java is an empty interface with no methods, used to mark classes for special treatment.
Marker interfaces have no methods and are used for identification purposes only
Examples include Serializable interface in Java, which marks classes as serializable
Marker interfaces are often used for reflection and runtime type identification
Q48. Immutable class in java
Immutable class in Java is a class whose objects cannot be modified once they are created.
Immutable classes have all fields as final and private.
Immutable classes do not have any setter methods.
Examples of immutable classes in Java are String, Integer, and LocalDate.
Q49. Explain Feature selection Techniques
Feature selection techniques are methods used to select the most relevant features for a predictive model.
Filter methods: Select features based on statistical measures like correlation, chi-squared, or mutual information.
Wrapper methods: Use a specific model to evaluate the importance of features by training and testing subsets of features.
Embedded methods: Features are selected as part of the model training process, like LASSO regression or decision trees.
Principal Component...read more
Q50. Handle dynamic dropdowns in selenium
Use Select class in Selenium to handle dynamic dropdowns by locating the dropdown element and selecting options by visible text, value, or index.
Locate the dropdown element using findElement method
Create a Select object using the dropdown element
Select options by visible text, value, or index using selectByVisibleText, selectByValue, selectByIndex methods
Q51. deadlock in Sql
Deadlock in SQL occurs when two or more transactions permanently wait for each other to release resources.
Deadlock happens when two or more transactions acquire locks on resources and wait for each other indefinitely.
It can occur due to poor transaction scheduling, lock contention, or incorrect use of transactions.
To prevent deadlock, use proper transaction isolation levels, minimize lock contention, and ensure transactions release resources in a consistent order.
Example: Tra...read more
Q52. Explain SOLID principles
SOLID principles are a set of five design principles that help make software designs more understandable, flexible, and maintainable.
Single Responsibility Principle (SRP) - A class should have only one reason to change.
Open/Closed Principle (OCP) - Software entities should be open for extension but closed for modification.
Liskov Substitution Principle (LSP) - Objects of a superclass should be replaceable with objects of its subclasses without affecting the program's correctne...read more
Q53. Explain Debugging techniques
Debugging techniques are methods used to identify and fix errors in software code.
Use print statements to track the flow of the program
Utilize debugging tools like breakpoints and watchpoints
Step through the code line by line to identify the source of the error
Review logs and error messages for clues
Isolate the problem by testing small sections of code
Top HR Questions asked in Nexus Day Surgery Centre
Interview Process at Nexus Day Surgery Centre
Top Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month