Nityo Infotech
30+ Eastbound Discoveries Interview Questions and Answers
Q1. Write a program to sort an array using insertion sort algorithm?
Program to sort an array using insertion sort algorithm
Iterate through the array from index 1 to n-1
Compare each element with the previous elements and swap if necessary
Repeat until the array is sorted
Q2. Any other companies for LG Samsung Whirlpool different type of companies tell me
Some other companies in the same industry include GE, Bosch, and Electrolux.
GE is a well-known brand for home appliances like refrigerators and washing machines.
Bosch is known for its high-quality kitchen appliances and power tools.
Electrolux offers a wide range of home appliances including vacuum cleaners and air conditioners.
Q3. Can we sort hashmap? How to secure webservices?
Yes, we can sort a hashmap using TreeMap. To secure webservices, we can use SSL/TLS encryption and implement authentication and authorization mechanisms.
To sort a hashmap, we can create a TreeMap and pass the hashmap to its constructor. The keys will be automatically sorted.
To secure webservices, we can use SSL/TLS encryption to encrypt the data in transit. We can also implement authentication and authorization mechanisms to ensure only authorized users can access the service...read more
Q4. How to keep candidate warmed up if there is no feedback from client side
Regular communication, provide updates, offer support and guidance
Regularly check in with the candidate to provide updates on the status of the feedback
Offer support and guidance to the candidate during the waiting period
Provide additional resources or training opportunities to keep the candidate engaged
Encourage the candidate to continue networking and exploring other opportunities
Maintain a positive and encouraging attitude to keep the candidate motivated
Q5. what is the diff b/w replicaset & repliation controller
ReplicaSet is a newer version of Replication Controller with additional features.
ReplicaSet supports more expressive selector queries than Replication Controller.
ReplicaSet can be used to manage stateful applications.
ReplicaSet can be used to manage pods that are not created by a Deployment.
Replication Controller is deprecated and should not be used in new deployments.
Q6. Please find out any other companies or LG Samsung Whirlpool
I'm sorry, but the question seems to be incomplete or unclear. Please provide more information or clarify the question.
Q7. how do you use variables at the level of playbook
Variables can be defined in playbook using 'vars' keyword and can be accessed using '{{ variable_name }}'
Variables can be defined at the playbook level using the 'vars' keyword
Variables can be accessed using the '{{ variable_name }}' syntax
Variables can be used to store values that can be reused throughout the playbook
Variables can be defined in a separate file and included in the playbook using the 'vars_files' keyword
Q8. What is the process involved in warehouse operations?
Warehouse operations involve receiving, storing, picking, packing, and shipping goods efficiently.
Receiving: Goods are received from suppliers and checked for accuracy and quality.
Storing: Items are organized and stored in designated locations within the warehouse.
Picking: Orders are picked from the stored items based on customer requirements.
Packing: Picked items are packed securely and labeled for shipping.
Shipping: Packed orders are shipped out to customers using various t...read more
Q9. What is your knowledge and experience with database testing?
I have extensive knowledge and experience in database testing, including writing complex SQL queries, data validation, and performance testing.
Proficient in writing complex SQL queries to retrieve and validate data
Experience in testing data integrity, accuracy, and consistency
Knowledge of performance testing techniques to optimize database performance
Familiarity with database management systems such as MySQL, Oracle, and SQL Server
Experience in testing database triggers, stor...read more
Q10. Different type of transformation and explanation
Different types of transformations in data engineering
Extract: Selecting specific columns from a dataset
Filter: Removing rows that do not meet certain criteria
Join: Combining two or more datasets based on a common key
Aggregate: Grouping data and performing calculations on groups
Normalize: Restructuring data into a standardized format
Q11. Write a dockerfile you're using in your project
Dockerfile for a Node.js application with MongoDB
Use official Node.js image as base
Install dependencies using package.json
Copy application code to container
Expose port used by application
Install and run MongoDB in container
Set environment variables for MongoDB connection
Use CMD to start application
Q12. You hv to handle tally and give your ans on software
Handling tally software is a key responsibility for an Accounts Payable Associate.
Familiarity with Tally software is essential for recording and managing financial transactions.
Ability to input and reconcile invoices, payments, and expenses in Tally.
Knowledge of generating reports and analyzing data in Tally for financial reporting purposes.
Experience in troubleshooting and resolving issues related to Tally software.
Training and continuous learning to stay updated on new feat...read more
Q13. Explain OOPS concept, framework, difference between string buffer and builder?
OOPS is a programming paradigm based on objects, frameworks are pre-built structures for software development, and String Buffer and Builder are classes used for string manipulation.
OOPS is based on the concept of objects, which encapsulate data and behavior
Frameworks are pre-built structures that provide a foundation for software development
String Buffer and Builder are classes used for string manipulation, with Builder being more efficient for large strings
String Buffer is ...read more
Q14. What is windows and type of windows
Windows is a popular operating system developed by Microsoft.
Windows is a graphical operating system.
It has different versions such as Windows 10, Windows 8, Windows 7, etc.
It is widely used in personal computers, laptops, and servers.
It supports various applications and software.
It has a user-friendly interface and customizable features.
Q15. how to debug packages in SSIS
Debugging packages in SSIS involves using breakpoints, data viewers, logging, and error outputs.
Set breakpoints in control flow tasks to pause package execution for inspection.
Use data viewers to see data at various points in the package.
Enable logging to capture detailed information about package execution.
Redirect error outputs to handle and troubleshoot errors effectively.
Q16. How to configure promotion in Adobe commerce
Promotions in Adobe Commerce can be configured through the admin panel by creating rules and conditions.
Navigate to Marketing > Promotions > Cart Price Rules in the admin panel
Click on 'Add New Rule' to create a new promotion
Set conditions and actions for the promotion, such as discount amount or free shipping
Save the rule and apply it to specific products or customer groups as needed
Q17. Explain the communication from one component to other component.
Communication between components in Angular can be achieved using @Input, @Output, services, and event emitters.
Use @Input to pass data from parent to child component
Use @Output and EventEmitter to emit events from child to parent component
Use services to share data between components
Use RxJS subjects for more complex communication scenarios
Q18. What is piepes and types of pipes?
Pipes in Angular are used to transform data before displaying it in the view.
Pipes are used in Angular templates to format data before displaying it.
There are built-in pipes like DatePipe, UpperCasePipe, LowerCasePipe, etc.
Custom pipes can also be created for specific formatting needs.
Pipes can be chained together for more complex transformations.
Q19. How is LinkedIn search made?
LinkedIn search is made using a complex algorithm that takes into account various factors to provide relevant search results.
LinkedIn search algorithm considers factors like keyword relevance, profile completeness, connections, and activity.
It also takes into account the user's search history and behavior on the platform.
LinkedIn uses machine learning and AI to continuously improve the search algorithm.
Search results are ranked based on relevance and other factors to provide ...read more
Q20. Explain the architecture of k8s.
Kubernetes is a container orchestration platform that manages containerized workloads and services.
Kubernetes architecture follows a master-slave model.
The master node manages the cluster and the worker nodes run the applications.
The master node consists of API server, etcd, scheduler, and controller manager.
The worker node consists of kubelet, kube-proxy, and container runtime.
Kubernetes uses labels and selectors to manage and group resources.
Kubernetes also provides various...read more
Q21. Cycle process of Sales and Service
Sales and Service cycle involves identifying potential customers, making sales, providing support and maintaining customer relationships.
Identify potential customers through marketing and advertising
Make sales through effective communication and negotiation
Provide support through technical assistance and troubleshooting
Maintain customer relationships through follow-up and customer satisfaction surveys
Q22. How to domain remove user
To remove a user from a domain, use the appropriate command-line tool or GUI interface.
Use the 'userdel' command to delete the user account
Remove the user from any groups they belong to using the 'deluser' command
Remove any files or directories owned by the user
In a GUI interface, navigate to the user management section and select the user to remove
Ensure that any services or applications that rely on the user account are updated accordingly
Q23. diff among container in SSIS
Containers in SSIS are used to group related tasks and provide a way to manage the flow of data and control the execution of tasks.
Containers help in organizing and managing tasks in SSIS packages.
There are different types of containers in SSIS such as Sequence Container, For Loop Container, Foreach Loop Container, and Task Host Container.
Sequence Container is used to group tasks and define the order of execution.
For Loop Container is used to repeat a set of tasks for a speci...read more
Q24. SCD Implementation in SSIS
SCD implementation in SSIS involves using Slowly Changing Dimension transformations to handle changing data in data warehouse.
Use Slowly Changing Dimension (SCD) transformations in SSIS to handle changing data in data warehouse
Identify Type 1, Type 2, or Type 3 changes and implement appropriate SCD logic
Utilize Lookup and Conditional Split components to compare incoming data with existing data and determine the type of change
Implement historical tracking of changes by maintai...read more
Q25. What is ITIL V4?
ITIL V4 is the latest version of the Information Technology Infrastructure Library, a framework for IT service management.
ITIL V4 focuses on integrating ITIL guidance with best practices from the worlds of DevOps, Agile, and Lean.
It emphasizes the importance of collaboration, automation, and streamlining processes to improve service delivery.
ITIL V4 introduces the Service Value System (SVS) which helps organizations create value through services.
It includes four dimensions of...read more
Q26. what is union in sql
Union in SQL is used to combine the result sets of two or more SELECT statements into a single result set.
Union removes duplicate rows from the result set
Columns in each SELECT statement must have the same data types
Use UNION ALL to include duplicate rows in the result set
Q27. What is bgp community
BGP community is a way to group routes and apply policies based on common attributes.
BGP community is a 32-bit value that can be attached to BGP routes.
It is used to group routes together based on common attributes such as geographic location, customer type, etc.
Network operators can use BGP communities to apply policies to routes, such as controlling route propagation or setting local preference.
For example, a network operator can use BGP communities to tag routes from a spe...read more
Q28. Skill sets worked on
I have worked on a variety of skill sets including programming languages, databases, cloud technologies, and project management tools.
Programming languages such as Java, Python, C++
Databases like MySQL, MongoDB, Oracle
Cloud technologies like AWS, Azure, Google Cloud
Project management tools such as Jira, Trello, Asana
Q29. What is ITsm process
ITSM (IT Service Management) process is a set of policies, procedures, and activities that help organizations deliver and support IT services to meet the needs of their customers.
ITSM processes help organizations align IT services with business needs
ITSM processes include incident management, change management, problem management, and more
ITSM processes often follow ITIL (Information Technology Infrastructure Library) best practices
Q30. what is your CTC
My current CTC is $120,000 per year.
My current CTC is $120,000 per year
It includes base salary, bonuses, and benefits
I am open to discussing salary expectations for this role
Q31. what is your ECTC
My Expected Current Total Compensation (ECTC) is $120,000 per year.
My ECTC includes my base salary, bonuses, and any other benefits or perks.
I have researched industry standards for Senior Consultants in this region to determine a competitive ECTC.
I am open to negotiation based on the total compensation package offered by the company.
Q32. Purpose of DMS.
DMS stands for Document Management System. It is used to store, manage and track electronic documents.
DMS helps in organizing and storing documents in a centralized location
It allows for easy retrieval and sharing of documents
DMS can also provide version control and access control for documents
Examples of DMS include SharePoint, Google Drive, and Dropbox
Q33. Oops concepts of JS
Oops concepts in JS include inheritance, encapsulation, polymorphism, and abstraction.
Inheritance allows objects to inherit properties and methods from a parent object.
Encapsulation is the practice of keeping properties and methods private to prevent external access.
Polymorphism allows objects to take on multiple forms and behave differently based on context.
Abstraction involves hiding complex implementation details and exposing only necessary information to the user.
Examples...read more
More about working at Nityo Infotech
Top HR Questions asked in Eastbound Discoveries
Interview Process at Eastbound Discoveries
Top Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month