Add office photos
Engaged Employer

NICE

3.6
based on 484 Reviews
Filter interviews by

50+ Nexus Day Surgery Centre Interview Questions and Answers

Updated 8 Jan 2025
Popular Designations

Q1. 4- Selenium questions- list vs set, findelement vs findelements, Actions class, write syntax for actions class, implict wait and explict wait

Ans.

Selenium questions covering list vs set, findelement vs findelements, Actions class, implicit wait, and explicit wait.

  • List vs Set: List allows duplicate elements and maintains insertion order, while Set does not allow duplicates.

  • findElement vs findElements: findElement returns the first matching element, findElements returns a list of all matching elements.

  • Actions class: Used for performing complex user interactions like drag-and-drop, mouse movements, etc.

  • Syntax for Actions ...read more

Add your answer

Q2. 8- agile process, what is user story, what is sprint

Ans.

User story is a description of a feature from an end-user perspective, and sprint is a time-boxed iteration in Agile development.

  • User story is a short, simple description of a feature told from the perspective of the person who desires the new capability.

  • Sprint is a time-boxed iteration in Agile development, usually lasting 1-4 weeks, where a team works on a set of user stories.

  • User stories are written in a specific format: 'As a [type of user], I want [some goal] so that [so...read more

Add your answer

Q3. Would you be compfortable in handling clients all over the world

Ans.

Yes, I am comfortable in handling clients all over the world.

  • I have experience in working with clients from different countries and cultures.

  • I am familiar with different time zones and can adjust my schedule accordingly.

  • I have excellent communication skills and can effectively communicate with clients in different languages.

  • I am willing to learn about different cultures and customs to better serve clients.

  • I am able to work remotely and can use various communication tools to s...read more

Add your answer

Q4. What is difference between const, let and var?

Ans.

const, let, and var are all used to declare variables in JavaScript, but they have different scopes and behaviors.

  • const is used to declare variables that cannot be reassigned. It has block scope.

  • let is used to declare variables that can be reassigned. It also has block scope.

  • var is used to declare variables with function scope. It can be reassigned and hoisted.

Add your answer
Discover Nexus Day Surgery Centre interview dos and don'ts from real experiences

Q5. How would you troubleshoot a faulty internet line

Ans.

To troubleshoot a faulty internet line, start by checking the physical connections and then move on to testing the network settings.

  • Check if the modem and router are properly connected and powered on

  • Inspect the Ethernet cables for any damage or loose connections

  • Restart the modem and router

  • Check the network settings on the computer or device

  • Ping the router and external websites to test connectivity

  • Contact the internet service provider if the issue persists

Add your answer

Q6. What is Testing Pyramid? What are the different layers in it?

Ans.

Testing Pyramid is a testing strategy that suggests the right balance of different types of automated tests.

  • The Testing Pyramid consists of three layers: Unit Tests, Service Tests, and UI Tests.

  • Unit Tests are at the bottom of the pyramid and focus on testing individual components or functions in isolation.

  • Service Tests are in the middle layer and focus on testing the interactions between different components or services.

  • UI Tests are at the top of the pyramid and focus on test...read more

Add your answer
Are these interview questions helpful?

Q7. What is diff between ActiveMQ and RabbitMQ

Ans.

ActiveMQ is Java-based messaging broker while RabbitMQ is a message broker that implements the Advanced Message Queuing Protocol (AMQP).

  • ActiveMQ is written in Java and supports multiple messaging protocols like OpenWire, STOMP, MQTT, and AMQP.

  • RabbitMQ is written in Erlang and specifically implements the AMQP protocol.

  • ActiveMQ is more feature-rich and has a larger user base, while RabbitMQ is known for its reliability and performance.

  • ActiveMQ has a more complex setup and confi...read more

Add your answer

Q8. What are databases are present in Azure DB

Ans.

Azure DB offers various databases including SQL Database, Cosmos DB, MySQL, PostgreSQL, and MariaDB.

  • SQL Database

  • Cosmos DB

  • MySQL

  • PostgreSQL

  • MariaDB

Add your answer
Share interview questions and help millions of jobseekers 🌟

Q9. How will you troubleshoot a faulty Internet line?

Ans.

To troubleshoot a faulty Internet line, I would follow a step-by-step process to identify and resolve the issue.

  • Check if the modem and router are powered on and connected properly

  • Run a diagnostic test to identify any issues with the line

  • Check for any physical damage to the cables or equipment

  • Reset the modem and router

  • Contact the Internet service provider for further assistance

Add your answer

Q10. 3-Java program to reverse string, check palindrome

Ans.

Java program to reverse string and check if it is a palindrome.

  • Create a function to reverse the input string.

  • Compare the reversed string with the original string to check if it is a palindrome.

  • Use built-in functions like StringBuilder or StringBuffer for string manipulation.

  • Handle cases where input is null or empty.

Add your answer

Q11. What is default scope of bean in spring ?

Ans.

Singleton

  • Default scope of a bean in Spring is singleton

  • Singleton scope means that only one instance of the bean will be created for each Spring container

  • This is the default scope in Spring, meaning if no scope is specified, the bean will be treated as a singleton

Add your answer

Q12. Why HashSet has default size 16

Ans.

HashSet default size 16 for performance balance between memory usage and lookup time.

  • Default size 16 provides a good balance between memory usage and lookup time.

  • Choosing a power of 2 size helps in distributing elements evenly across buckets.

  • Resizing the HashSet is expensive, so starting with a larger size reduces the need for resizing.

  • Example: If the default size was too small, it would lead to more collisions and degrade performance.

Add your answer

Q13. What are different Oops concept that you have used in your framework?

Ans.

Encapsulation, Inheritance, Polymorphism, and Abstraction are the OOP concepts used in my framework.

  • Encapsulation: Used to hide the internal details of an object and provide a public interface.

  • Inheritance: Used to create a new class from an existing class, inheriting its properties and methods.

  • Polymorphism: Used to perform a single action in different ways based on the object's type.

  • Abstraction: Used to provide a simplified view of complex systems by hiding unnecessary detail...read more

View 1 answer

Q14. What is map and flat map in Java 8 ?

Ans.

Map and flatMap are methods in Java 8 Stream API used for transforming elements in a stream.

  • Map applies a function to each element in the stream and returns a new stream with the transformed elements.

  • FlatMap applies a function that returns a stream for each element in the original stream, then flattens the result into a single stream.

  • Example: List words = Arrays.asList("hello", "world"); words.stream().map(String::toUpperCase).forEach(System.out::println);

  • Example: List> numbe...read more

Add your answer

Q15. How will you create the solution with Azure Cloud Native Services ?

Ans.

I will leverage Azure Cloud Native Services to design and implement scalable, resilient, and efficient solutions.

  • Utilize Azure Kubernetes Service (AKS) for container orchestration

  • Leverage Azure Functions for serverless computing

  • Implement Azure Cosmos DB for globally distributed databases

  • Utilize Azure DevOps for continuous integration and deployment

  • Leverage Azure Monitor for performance monitoring and optimization

Add your answer

Q16. Given a string s1= Apple. Write a code to convert s1 to array and put the vowels to that array

Ans.

Convert string to array and extract vowels into a new array

  • Iterate through each character in the string

  • Check if the character is a vowel (a, e, i, o, u)

  • Add the vowel to a new array of strings

Add your answer

Q17. Explain layers of TCP/ IP model

Ans.

TCP/IP model has 4 layers: Application, Transport, Internet, and Network Access.

  • Application layer handles high-level protocols like HTTP, FTP, SMTP, etc.

  • Transport layer provides reliable data transfer using TCP or fast but unreliable transfer using UDP.

  • Internet layer handles IP addressing and routing of data packets.

  • Network Access layer deals with physical network hardware and protocols like Ethernet, Wi-Fi, etc.

Add your answer

Q18. What is microservices architecture

Ans.

Microservices architecture is an architectural style that structures an application as a collection of loosely coupled services.

  • Each service is self-contained and can be developed, deployed, and scaled independently.

  • Services communicate with each other over lightweight protocols like HTTP or messaging queues.

  • Microservices allow for flexibility, scalability, and easier maintenance compared to monolithic architectures.

  • Examples of companies using microservices architecture inclu...read more

Add your answer

Q19. How managed code works?

Ans.

Managed code is code that is executed by the Common Language Runtime (CLR) in .NET framework.

  • Managed code is compiled into Intermediate Language (IL) by the compiler.

  • IL is then converted into native code by the Just-In-Time (JIT) compiler at runtime.

  • CLR manages memory allocation, garbage collection, exception handling, and security for managed code.

  • Managed code runs in a managed environment, providing features like cross-language integration and automatic memory management.

Add your answer

Q20. 6-API testing various response codes

Ans.

API testing involves checking various response codes to ensure the API functions correctly.

  • Test for common response codes like 200 (OK), 400 (Bad Request), 401 (Unauthorized), 404 (Not Found), 500 (Internal Server Error)

  • Verify the response code matches the expected result based on the API request

  • Use tools like Postman or RestAssured to automate API testing and check response codes

  • Check for edge cases where the API may return unexpected response codes

Add your answer

Q21. How will you design a solution considering AI and Safety?

Ans.

Designing a solution with AI and Safety involves implementing robust algorithms, thorough testing, and continuous monitoring.

  • Implement robust AI algorithms that prioritize safety and ethical considerations.

  • Conduct thorough testing to ensure the AI system behaves predictably and safely in all scenarios.

  • Implement fail-safe mechanisms to prevent AI from making harmful decisions.

  • Utilize real-time monitoring and feedback loops to continuously assess and improve the AI system's saf...read more

Add your answer

Q22. Write an automation code for handling multiple windows.

Ans.

Automation code for handling multiple windows

  • Use getWindowHandles() method to get handles of all open windows

  • Switch between windows using switchTo().window() method

  • Perform actions on each window as needed

Add your answer

Q23. Which are not Object Oriented Languages?

Ans.

Non-object oriented languages do not support the concept of objects and classes.

  • C

  • COBOL

  • Fortran

  • Pascal

Add your answer

Q24. What is JUnit and Mockito

Ans.

JUnit is a unit testing framework for Java, while Mockito is a mocking framework used for creating mock objects in unit tests.

  • JUnit is used for writing and running repeatable automated tests to ensure code behaves as expected.

  • Mockito is used to create mock objects to simulate the behavior of real objects in unit tests.

  • Both JUnit and Mockito are commonly used in test-driven development (TDD) to ensure code quality and reliability.

Add your answer

Q25. - Difference between Functional component vs class component

Ans.

Functional components are stateless and use functional programming concepts, while class components have state and lifecycle methods.

  • Functional components are simpler and easier to read/write.

  • Class components have access to lifecycle methods like componentDidMount.

  • Functional components can use hooks like useState and useEffect.

  • Class components are typically used for more complex components with state management.

Add your answer

Q26. Diff between HashSet and HashMap

Ans.

HashSet is a collection of unique elements, while HashMap is a key-value pair collection.

  • HashSet does not allow duplicate elements, HashMap allows duplicate keys but not duplicate values.

  • HashSet uses Set interface, HashMap uses Map interface.

  • Example: HashSet set = new HashSet<>(); HashMap map = new HashMap<>();

Add your answer

Q27. OOPs Concepts in detail

Ans.

OOPs concepts refer to Object-Oriented Programming principles like Inheritance, Encapsulation, Polymorphism, and Abstraction.

  • Inheritance: Allows a class to inherit properties and behavior from another class.

  • Encapsulation: Bundling data and methods that operate on the data into a single unit.

  • Polymorphism: Ability to present the same interface for different data types.

  • Abstraction: Hiding the complex implementation details and showing only the necessary features.

Add your answer

Q28. How you have extracted data from excel sheet?

Ans.

To extract data from an Excel sheet, you can use libraries like Apache POI or Openpyxl in Java or Python respectively.

  • Use a library like Apache POI or Openpyxl to read Excel files

  • Identify the sheet and cell range from which you want to extract data

  • Iterate through the rows and columns to extract the desired data

  • Store the extracted data in variables or data structures for further processing

Add your answer

Q29. what is BDD and TDD

Ans.

BDD stands for Behavior Driven Development and TDD stands for Test Driven Development.

  • BDD focuses on the behavior of the system from the user's perspective.

  • TDD focuses on writing tests before writing the actual code.

  • BDD uses natural language to describe the behavior of the system.

  • TDD helps in ensuring that the code meets the requirements and is well-tested.

  • Both BDD and TDD help in improving the quality of the software and reducing bugs.

Add your answer

Q30. What are the pillars of oops?

Ans.

The pillars of OOP are encapsulation, inheritance, and polymorphism.

  • Encapsulation: bundling of data and methods into a single unit

  • Inheritance: ability to create new classes from existing ones

  • Polymorphism: ability to use a single interface for multiple types

Add your answer

Q31. Which one is better for loop or foreach loop

Ans.

It depends on the specific use case and programming language.

  • For loop is more flexible and can be used with different data structures.

  • Foreach loop is simpler and more readable for iterating over arrays or collections.

  • Use for loop when you need to control the iteration more precisely.

  • Use foreach loop when you just need to iterate over all elements in an array or collection.

Add your answer

Q32. Explain layers of OSI model

Ans.

The OSI model is a conceptual framework used to describe network communication. It consists of 7 layers.

  • Layer 1: Physical layer - responsible for transmitting raw data over a physical medium

  • Layer 2: Data link layer - responsible for error-free transfer of data between nodes on a network

  • Layer 3: Network layer - responsible for routing data between different networks

  • Layer 4: Transport layer - responsible for reliable data transfer between end systems

  • Layer 5: Session layer - res...read more

Add your answer

Q33. Who performs unit testing?

Ans.

Developers perform unit testing to ensure individual units of code are working correctly.

  • Developers are responsible for writing unit tests for their own code.

  • Unit testing is typically done using testing frameworks like JUnit, NUnit, or pytest.

  • Unit tests focus on testing small, isolated parts of the codebase, such as functions or methods.

  • Unit testing helps identify bugs early in the development process.

  • Automated unit tests are often run as part of the continuous integration pr...read more

Add your answer

Q34. Internal working of HashMap

Ans.

HashMap is a data structure that stores key-value pairs and uses hashing to quickly retrieve values based on keys.

  • HashMap internally uses an array of linked lists to store key-value pairs.

  • When a key-value pair is added, the key is hashed to determine the index in the array where it will be stored.

  • If multiple keys hash to the same index, a linked list is used to handle collisions.

  • HashMap allows null keys and values, and can have one null key and multiple null values.

  • The load f...read more

Add your answer

Q35. What are the SQL DML commands

Ans.

SQL DML commands are used to manipulate data in a database.

  • DML stands for Data Manipulation Language

  • Common DML commands include INSERT, UPDATE, DELETE

  • INSERT is used to add new data to a table

  • UPDATE is used to modify existing data in a table

  • DELETE is used to remove data from a table

Add your answer

Q36. design of some machine

Ans.

Designing a machine involves creating a detailed plan for its structure, functionality, and operation.

  • Consider the purpose of the machine and its intended use

  • Identify the key components and their interactions

  • Create a schematic or blueprint detailing the layout and connections

  • Select appropriate materials and technologies for construction

  • Test the machine for functionality and efficiency

Add your answer

Q37. Design a file download and upload system.

Ans.

Design a secure and efficient file download and upload system.

  • Implement secure authentication and authorization mechanisms to control access to files

  • Use encryption to protect data during transmission and storage

  • Utilize a user-friendly interface for easy file upload and download

  • Consider implementing version control for files to track changes and updates

Add your answer

Q38. Difference between Covariance and Correlation

Ans.

Covariance measures the relationship between two variables, while correlation measures the strength and direction of a relationship.

  • Covariance can be positive, negative, or zero, indicating the direction of the relationship.

  • Correlation is always between -1 and 1, with 1 indicating a perfect positive relationship, -1 indicating a perfect negative relationship, and 0 indicating no relationship.

  • Covariance is affected by the scale of the variables, while correlation is a standard...read more

Add your answer

Q39. How do you write use case

Ans.

Use cases are written to describe how a system interacts with users or other systems to achieve a specific goal.

  • Identify actors or users interacting with the system

  • Define goals or objectives to be achieved

  • Describe steps or actions taken by users to achieve the goals

  • Include alternative paths or scenarios

  • Use a structured format like 'Actor - Action - System Response'

Add your answer

Q40. cleaning data using DML command

Ans.

DML commands like UPDATE and DELETE can be used to clean data in a database.

  • Use UPDATE command to modify existing data in a table.

  • Use DELETE command to remove unwanted data from a table.

  • Always backup data before performing DML commands to avoid data loss.

  • Consider using WHERE clause to specify which records to update or delete.

Add your answer

Q41. Authorisation and authentication difference

Ans.

Authentication verifies the identity of a user, while authorization determines what actions they are allowed to perform.

  • Authentication confirms the user's identity through credentials like passwords or biometrics.

  • Authorization controls the access rights of authenticated users to specific resources or actions.

  • Example: Logging into a system with a username and password is authentication, while being able to view/edit certain files based on user roles is authorization.

Add your answer

Q42. DSA-Mirror image of binary tree

Ans.

Mirror image of a binary tree involves swapping the left and right children of each node.

  • Start with the root node and recursively swap the left and right children of each node.

  • Repeat this process for all nodes in the binary tree.

  • The resulting tree will be the mirror image of the original binary tree.

Add your answer

Q43. What is the flow of cicd

Ans.

CI/CD flow involves continuous integration, testing, deployment, and monitoring of code changes.

  • Code is pushed to version control system (e.g. Git)

  • Automated build and test process is triggered

  • Code is deployed to testing environment for validation

  • If tests pass, code is deployed to production environment

  • Monitoring and feedback loop for continuous improvement

Add your answer

Q44. Name the layers of OSI model

Ans.

The OSI model has 7 layers that define how data is transmitted over a network.

  • Layer 1: Physical layer - deals with the physical aspects of transmitting data

  • Layer 2: Data link layer - responsible for error-free transfer of data between nodes

  • Layer 3: Network layer - handles routing of data between different networks

  • Layer 4: Transport layer - ensures reliable delivery of data between applications

  • Layer 5: Session layer - establishes and manages connections between applications

  • Lay...read more

Add your answer

Q45. Web api Security mechanism

Ans.

Web API security mechanisms protect against unauthorized access and ensure data integrity.

  • Authentication: Verify the identity of the user or client accessing the API.

  • Authorization: Determine what actions the authenticated user or client is allowed to perform.

  • Encryption: Securely transmit data over the network using encryption algorithms.

  • Input validation: Validate and sanitize user input to prevent common security vulnerabilities like SQL injection or cross-site scripting (XSS...read more

Add your answer

Q46. Optianal class in java

Ans.

Optional class in Java is used to represent a value that may or may not be present.

  • Optional class was introduced in Java 8 to handle null values more effectively.

  • It helps to avoid NullPointerException by providing methods to check if a value is present or not.

  • Example: Optional optionalString = Optional.ofNullable("Hello");

Add your answer

Q47. Marker Iterface in java

Ans.

Marker interface in Java is an empty interface with no methods, used to mark classes for special treatment.

  • Marker interfaces have no methods and are used for identification purposes only

  • Examples include Serializable interface in Java, which marks classes as serializable

  • Marker interfaces are often used for reflection and runtime type identification

Add your answer

Q48. Immutable class in java

Ans.

Immutable class in Java is a class whose objects cannot be modified once they are created.

  • Immutable classes have all fields as final and private.

  • Immutable classes do not have any setter methods.

  • Examples of immutable classes in Java are String, Integer, and LocalDate.

Add your answer

Q49. Explain Feature selection Techniques

Ans.

Feature selection techniques are methods used to select the most relevant features for a predictive model.

  • Filter methods: Select features based on statistical measures like correlation, chi-squared, or mutual information.

  • Wrapper methods: Use a specific model to evaluate the importance of features by training and testing subsets of features.

  • Embedded methods: Features are selected as part of the model training process, like LASSO regression or decision trees.

  • Principal Component...read more

Add your answer

Q50. Handle dynamic dropdowns in selenium

Ans.

Use Select class in Selenium to handle dynamic dropdowns by locating the dropdown element and selecting options by visible text, value, or index.

  • Locate the dropdown element using findElement method

  • Create a Select object using the dropdown element

  • Select options by visible text, value, or index using selectByVisibleText, selectByValue, selectByIndex methods

Add your answer

Q51. deadlock in Sql

Ans.

Deadlock in SQL occurs when two or more transactions permanently wait for each other to release resources.

  • Deadlock happens when two or more transactions acquire locks on resources and wait for each other indefinitely.

  • It can occur due to poor transaction scheduling, lock contention, or incorrect use of transactions.

  • To prevent deadlock, use proper transaction isolation levels, minimize lock contention, and ensure transactions release resources in a consistent order.

  • Example: Tra...read more

Add your answer

Q52. Explain SOLID principles

Ans.

SOLID principles are a set of five design principles that help make software designs more understandable, flexible, and maintainable.

  • Single Responsibility Principle (SRP) - A class should have only one reason to change.

  • Open/Closed Principle (OCP) - Software entities should be open for extension but closed for modification.

  • Liskov Substitution Principle (LSP) - Objects of a superclass should be replaceable with objects of its subclasses without affecting the program's correctne...read more

Add your answer

Q53. Explain Debugging techniques

Ans.

Debugging techniques are methods used to identify and fix errors in software code.

  • Use print statements to track the flow of the program

  • Utilize debugging tools like breakpoints and watchpoints

  • Step through the code line by line to identify the source of the error

  • Review logs and error messages for clues

  • Isolate the problem by testing small sections of code

Add your answer
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos

Interview Process at Nexus Day Surgery Centre

based on 77 interviews
Interview experience
3.9
Good
View more
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Interview Questions from Similar Companies

3.7
 • 4.4k Interview Questions
3.8
 • 3k Interview Questions
3.7
 • 630 Interview Questions
3.8
 • 183 Interview Questions
3.9
 • 150 Interview Questions
3.8
 • 135 Interview Questions
View all
Top NICE Interview Questions And Answers
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
70 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter