Add office photos
Engaged Employer

Oracle

3.7
based on 5.2k Reviews
Video summary
Filter interviews by

100+ SocioClout Interview Questions and Answers

Updated 31 Jan 2025
Popular Designations

Q1. 1. Write a program to remove duplicate elements from String and mention the count of duplication.

Ans.

Program to remove duplicate elements from String and count their occurrences.

  • Create a HashSet to store unique characters from the String.

  • Iterate through the String and add each character to the HashSet.

  • While adding, check if the character already exists in the HashSet and increment its count.

  • Print the count of each character that has duplicates.

  • Return the modified String with duplicates removed.

View 3 more answers

Q2. 4. What is marker interface? Example of marker interface. Why it is used.

Ans.

Marker interface is an interface with no methods. It is used to mark a class for special treatment.

  • Marker interface is used to provide metadata to the JVM.

  • It is used to indicate that a class has some special behavior or characteristics.

  • Example: Serializable interface in Java.

  • Marker interfaces are used for reflection and serialization.

  • They are also used in frameworks like Spring and Hibernate.

  • Marker interfaces are also known as tagging interfaces.

  • They are used to group classes...read more

Add your answer

Q3. 2. Write a program to capitalise all the first letter of a word in a sentence.

Ans.

A program to capitalize the first letter of each word in a sentence.

  • Split the sentence into words

  • Loop through each word and capitalize the first letter

  • Join the words back into a sentence

View 2 more answers

Q4. Spring Collections Difference between list and set What is sorted mean in hashed set java Serialization Exceptions How can you give an exception to caller method Unix- how to move a folder without giving yes/no...

read more
Ans.

Interview questions for Software Developer related to Spring, Collections, Serialization, Exceptions, Unix, Annotations, Json, Build tools, Restful services, and more.

  • List and Set are both collection interfaces in Java. List allows duplicates and maintains insertion order while Set doesn't allow duplicates and doesn't maintain any order.

  • Sorted in Hashed Set means that the elements are stored in a sorted order based on their hash code.

  • Serialization is the process of converting...read more

Add your answer
Discover SocioClout interview dos and don'ts from real experiences

Q5. 6. Consider an array of String, remove those string from array whose length is less than 3.

Ans.

Remove strings from an array whose length is less than 3.

  • Loop through the array and check the length of each string.

  • If the length is less than 3, remove that string from the array.

  • Use a for loop or filter method to remove the strings.

  • Example: ['cat', 'dog', 'bird', 'elephant'] -> ['cat', 'dog', 'bird', 'elephant']

  • Example: ['a', 'to', 'the', 'in'] -> ['the', 'in']

View 1 answer

Q6. 4. When to use list and when to use linked list.

Ans.

Lists are used for small collections, linked lists for large or frequently modified collections.

  • Use lists for small collections that don't require frequent modifications.

  • Use linked lists for large collections or collections that require frequent modifications.

  • Linked lists are better for inserting or deleting elements in the middle of the collection.

  • Lists are better for accessing elements by index.

  • Example: Use a list to store a small list of names, use a linked list to impleme...read more

Add your answer
Are these interview questions helpful?

Q7. What is rotational shifts. What is web service flow. How will you check ports on Unix or Solaris machine.

Ans.

Rotational shifts refer to working in different shifts at different times. Web service flow is the sequence of steps involved in a web service request. Checking ports on Unix or Solaris machine involves using the netstat command.

  • Rotational shifts involve working in different shifts at different times, such as day shift, night shift, and swing shift.

  • Web service flow involves a sequence of steps, such as sending a request, receiving a response, and processing the data.

  • To check ...read more

Add your answer

Q8. 10. Write a program to separate even and odd numbers using Java 8.

Ans.

Program to separate even and odd numbers using Java 8.

  • Use Java 8 Stream API to filter even and odd numbers

  • Create two separate lists for even and odd numbers

  • Use lambda expressions to filter the numbers

  • Example: List evenNumbers = numbers.stream().filter(n -> n % 2 == 0).collect(Collectors.toList());

  • Example: List oddNumbers = numbers.stream().filter(n -> n % 2 != 0).collect(Collectors.toList());

View 1 answer
Share interview questions and help millions of jobseekers 🌟

Q9. Find All Pairs Adding Up to Target

Given an array of integers ARR of length N and an integer Target, your task is to return all pairs of elements such that they add up to the Target.

Input:

The first line conta...read more
Add your answer

Q10. 3. How to remove sensitive information from serializable interface.

Ans.

Sensitive information can be removed from serializable interface by implementing custom serialization.

  • Create a custom serialization method that excludes sensitive information.

  • Use the transient keyword to mark sensitive fields as non-serializable.

  • Consider using encryption or hashing to protect sensitive data.

  • Test serialization and deserialization to ensure sensitive information is not included.

  • Examples: exclude passwords, credit card numbers, and personal identification inform...read more

Add your answer

Q11. 3. How map works internally in Java

Ans.

Java Map is an interface that maps unique keys to values. It works internally using hash table data structure.

  • Map interface is implemented by HashMap, TreeMap, LinkedHashMap, etc.

  • Keys in a map must be unique and values can be duplicated.

  • Hash table data structure is used to store key-value pairs internally.

  • Hashing is used to convert keys into indices of an array where values are stored.

  • Collision resolution techniques like chaining and open addressing are used to handle collisi...read more

Add your answer

Q12. Validate BST Problem Statement

Given a binary tree with N nodes, determine whether the tree is a Binary Search Tree (BST). If it is a BST, return true; otherwise, return false.

A binary search tree (BST) is a b...read more

Add your answer

Q13. 5. Difference between primitives and wrapper class in Java.

Ans.

Primitives are basic data types in Java while wrapper classes are objects that wrap around primitives.

  • Primitives are faster and take less memory than wrapper classes.

  • Wrapper classes provide additional functionality like conversion to and from strings.

  • Primitives are passed by value while wrapper classes are passed by reference.

  • Examples of primitives include int, boolean, and double while examples of wrapper classes include Integer, Boolean, and Double.

Add your answer

Q14. Subset sum variant, find missing number using single loop, difference between two dates, , Core Java concept , Sql, finding duplicate number in list, finding loop in linkedlist, finding node where cycle starts...

read more
Ans.

Interview questions for Application Engineer role covering various topics.

  • Subset sum variant - finding a subset of numbers that add up to a given sum

  • Single loop missing number - finding a missing number in an array using a single loop

  • Difference between two dates - calculating the difference between two dates in Java

  • Core Java concepts - knowledge of basic Java concepts such as inheritance, polymorphism, etc.

  • SQL - knowledge of SQL queries and database management

  • Finding duplicat...read more

Add your answer

Q15. Bursting Balloons Problem

Given an array ARR of size N, where each element represents the height of a balloon. The task is to destroy all balloons by shooting arrows from left to right. When an arrow hits a bal...read more

Add your answer

Q16. Program Based on Java String Operations. Print concatenation of Zig Zag string from a row

Ans.

Program to concatenate Zig Zag string from a row using Java String Operations.

  • Use StringBuilder to efficiently concatenate strings

  • Use loops to traverse the rows and columns of the zig zag pattern

  • Use conditional statements to determine the direction of traversal

Add your answer

Q17. 1. What are the different layers of OSI model.

Ans.

The OSI model has 7 layers that define how data is transmitted over a network.

  • Layer 1: Physical layer - deals with the physical aspects of transmitting data

  • Layer 2: Data link layer - responsible for error-free transfer of data between nodes

  • Layer 3: Network layer - handles routing of data between different networks

  • Layer 4: Transport layer - ensures reliable delivery of data between applications

  • Layer 5: Session layer - establishes and manages connections between applications

  • Lay...read more

Add your answer

Q18. 2. What are different layers of TCP/IP model.

Ans.

TCP/IP model has four layers: Application, Transport, Internet, and Network Access.

  • Application layer handles high-level protocols like HTTP, FTP, SMTP, etc.

  • Transport layer provides end-to-end communication between hosts using TCP or UDP protocols.

  • Internet layer handles the routing of data packets between networks using IP protocol.

  • Network Access layer deals with the physical transmission of data over the network.

  • Examples of protocols at each layer: HTTP (Application), TCP (Tr...read more

Add your answer

Q19. Root to Leaf Path Problem Statement

Given a binary tree with 'N' nodes numbered from 1 to 'N', your task is to print all the root-to-leaf paths of the binary tree.

Input:

The first line of the input contains a ...read more
Add your answer

Q20. 2. Difference between String Buffer and String Builder

Ans.

String Buffer and String Builder are both used to manipulate strings, but the former is synchronized while the latter is not.

  • String Buffer is thread-safe while String Builder is not

  • String Builder is faster than String Buffer

  • String Builder is preferred when thread safety is not a concern

  • String Buffer is used when multiple threads are involved in manipulating the same string

  • Both classes have similar methods for appending, inserting, and deleting characters

Add your answer

Q21. You are given a list of n numbers. How would you find the median in this stream. You are given an array. Give an algorithm to randomly shuffle it.

Ans.

Algorithm to find median in a stream of n numbers

  • Sort the list and find the middle element for odd n

  • For even n, find the average of middle two elements

  • Use a min-heap and max-heap to maintain the smaller and larger half of the stream respectively

  • Insert new elements into the appropriate heap and balance the heaps to ensure median is always at the top

Add your answer

Q22. 9. Difference between @Service and @Component.

Ans.

Difference between @Service and @Component

  • Both are used for component scanning in Spring

  • @Service is used for service layer classes

  • @Component is used for general purpose beans

  • Service layer classes contain business logic

  • Examples of @Service: UserService, ProductService

  • Examples of @Component: DAO, Utility classes

Add your answer

Q23. 5. Explain the process of data communication using TCP/IP model.

Ans.

TCP/IP model is a protocol used for data communication. It consists of four layers: application, transport, internet, and network access.

  • Data is sent from the application layer to the transport layer where it is divided into segments.

  • The internet layer adds IP addresses to the segments and sends them to the network access layer.

  • The network access layer adds physical addresses and sends the data over the network.

  • The process is reversed at the receiving end.

  • Examples of TCP/IP p...read more

Add your answer

Q24. 1. Difference between String and String Buffer.

Ans.

String is immutable while StringBuffer is mutable.

  • String objects are constant and cannot be changed once created.

  • StringBuffer objects are mutable and can be modified.

  • StringBuffer is thread-safe while String is not.

  • StringBuffer has methods to append, insert, and delete while String does not.

  • Example: String str = "hello"; StringBuffer sb = new StringBuffer("world");

  • str.concat("world"); // returns a new string "helloworld"

  • sb.append("hello"); // modifies the existing StringBuffer...read more

Add your answer

Q25. What is difference between writing rule in Excel and word in oracle policy automation

Ans.

Excel rules are formula-based while OPA rules are natural language-based.

  • Excel rules are written using formulas and functions, while OPA rules are written in natural language using if-then statements.

  • Excel rules are limited to the capabilities of the Excel program, while OPA rules can be more complex and flexible.

  • OPA rules can be easily updated and maintained by non-technical users, while Excel rules may require technical expertise.

  • Excel rules are typically used for simple ca...read more

Add your answer

Q26. 3. Difference between TCP, UDP and TLS protocol.

Ans.

TCP is a reliable, connection-oriented protocol. UDP is a connectionless protocol. TLS is a secure protocol for data encryption.

  • TCP ensures reliable data transmission by establishing a connection between sender and receiver.

  • UDP is faster but less reliable as it does not establish a connection before sending data.

  • TLS provides secure communication by encrypting data and verifying the identity of the communicating parties.

  • TCP and UDP are transport layer protocols while TLS is a ...read more

Add your answer

Q27. 5. Difference type of HTTP request in Spring Boot.

Ans.

There are four types of HTTP requests in Spring Boot: GET, POST, PUT, and DELETE.

  • GET: used to retrieve data from a server

  • POST: used to submit data to a server

  • PUT: used to update existing data on a server

  • DELETE: used to delete data from a server

  • These requests are handled by the @RequestMapping annotation in Spring Boot

Add your answer

Q28. 11. Different types of spring boot annotations.

Ans.

Spring Boot annotations are used to simplify the development process. Some common annotations are @SpringBootApplication, @RestController, @Autowired, @GetMapping, @PostMapping, @Service, @Repository, @Component, etc.

  • The @SpringBootApplication annotation is used to mark the main class of the application.

  • The @RestController annotation is used to mark a class as a RESTful controller.

  • The @Autowired annotation is used to inject dependencies.

  • The @GetMapping and @PostMapping annota...read more

Add your answer

Q29. 7. Why String is immutable

Ans.

String is immutable because it cannot be changed once created.

  • Immutable objects are safer to use in multi-threaded environments.

  • String pool in Java is possible because of immutability.

  • StringBuffer and StringBuilder are mutable alternatives to String.

Add your answer

Q30. 10. Remove the duplicate elements in an array.

Ans.

Remove duplicate elements in an array.

  • Create a new empty array.

  • Loop through the original array and check if the element already exists in the new array.

  • If it doesn't exist, add it to the new array.

  • Return the new array without duplicates.

Add your answer

Q31. 7. Uses of Factory Design Pattern

Ans.

Factory Design Pattern is used to create objects without exposing the creation logic to the client.

  • It provides a way to delegate the object creation to a factory class.

  • It helps in achieving loose coupling between classes.

  • It is useful when we have a super class with multiple sub-classes and based on input, we need to return one of the sub-class.

  • Examples include: java.util.Calendar, java.text.NumberFormat, java.nio.charset.Charset

Add your answer

Q32. 8. Different type of HTTP response code.

Ans.

HTTP response codes indicate the status of a web request. There are 5 categories of codes.

  • 1xx - Informational

  • 2xx - Success

  • 3xx - Redirection

  • 4xx - Client Error

  • 5xx - Server Error

Add your answer

Q33. Find missing and repeating element in an array of 1 to n elements. N is the size of array. Solve in O-n time and O-1 space.

Ans.

Find missing and repeating element in an array of 1 to n elements in O(n) time and O(1) space.

  • Iterate through the array and for each element, mark the element at index equal to its value as negative. If the element is already negative, it is the repeating element.

  • After marking all elements, the positive element's index + 1 is the missing element.

  • Example: Array ['1', '2', '3', '3', '5'] - Repeating element is '3' and missing element is '4'.

Add your answer

Q34. What is what if analysis in oracle policy automation?

Ans.

What-if analysis in Oracle Policy Automation is a tool that allows users to simulate different scenarios and evaluate their impact on policy outcomes.

  • Users can create hypothetical scenarios by changing input values and assumptions

  • The tool then calculates the impact of these changes on policy outcomes

  • This helps users make informed decisions and identify potential risks and opportunities

  • For example, a user can simulate the impact of changing eligibility criteria on the number o...read more

Add your answer

Q35. 6. Explain JVM architecture.

Ans.

JVM is an abstract machine that executes Java bytecode. It consists of class loader, runtime data area, and execution engine.

  • JVM stands for Java Virtual Machine.

  • It is responsible for executing Java bytecode.

  • JVM architecture consists of class loader, runtime data area, and execution engine.

  • Class loader loads the class files into the memory.

  • Runtime data area is divided into method area, heap, and stack.

  • Execution engine executes the bytecode.

  • JVM provides platform independence to...read more

Add your answer

Q36. 9. Types of functional interface.

Ans.

Functional interfaces are interfaces with only one abstract method. There are four types of functional interfaces.

  • Consumer: accepts a single argument and returns no result. Example: Consumer

  • Supplier: takes no argument and returns a result. Example: Supplier

  • Predicate: takes a single argument and returns a boolean. Example: Predicate

  • Function: takes a single argument and returns a result. Example: Function

Add your answer

Q37. sum 2 linkedlists in efficient way

Ans.

Use iterative approach to traverse both linked lists and sum corresponding nodes while keeping track of carry.

  • Iterate through both linked lists simultaneously

  • Sum corresponding nodes and carry from previous sum

  • Create a new linked list to store the sum

Add your answer

Q38. Different ways to write PLSQL package and it's procedures and functions

Ans.

PLSQL packages can be written in different ways. Here are some pointers.

  • Packages can be written in a single file or multiple files.

  • Procedures and functions can be written inside the package or outside the package.

  • Packages can be created using CREATE PACKAGE statement or CREATE OR REPLACE PACKAGE statement.

  • Packages can be compiled in debug mode using the keyword 'DEBUG'.

Add your answer

Q39. All c++ core concepts and oops concept. Find second greatest element in an array without sorting.

Ans.

Find the second greatest element in an array without sorting using C++ concepts.

  • Iterate through the array to find the greatest element.

  • While iterating, keep track of the second greatest element.

  • Return the second greatest element once the iteration is complete.

Add your answer

Q40. Implement Linked list with add, display, insert at end and delete operations.

Ans.

Implementation of Linked List with add, display, insert at end and delete operations.

  • Create a Node class with data and next pointer

  • Create a LinkedList class with head pointer

  • Add method to add a new node at the end of the list

  • Display method to print all nodes in the list

  • Insert at end method to insert a new node at the end of the list

  • Delete method to delete a node from the list

Add your answer

Q41. 8. Different Java 8 features.

Ans.

Java 8 introduced several new features including lambda expressions, streams, and default methods.

  • Lambda expressions allow for functional programming and simplify code.

  • Streams provide a way to process collections of data in a functional way.

  • Default methods allow for adding new methods to interfaces without breaking existing implementations.

  • Other features include the Optional class, Date and Time API, and Nashorn JavaScript engine.

  • Example: Lambda expression - (x, y) -> x + y

  • Ex...read more

Add your answer

Q42. Linux bash script to rename files

Ans.

Use 'mv' command in a bash script to rename files in Linux.

  • Use 'mv' command followed by the current file name and the new file name to rename files.

  • You can use wildcards like '*' to rename multiple files at once.

  • Make sure to test the script on a few files before running it on all files.

Add your answer

Q43. Linux system calls with an example

Ans.

Linux system calls are functions provided by the kernel for user-space programs to interact with the operating system.

  • System calls are used to request services from the kernel, such as creating processes, opening files, and networking.

  • Examples of system calls include open(), read(), write(), fork(), exec(), and socket().

  • System calls are invoked using a software interrupt or trap instruction, switching the CPU from user mode to kernel mode.

  • System calls are essential for the fu...read more

Add your answer

Q44. Count nodes in a binary tree without using recursion

Ans.

Count nodes in a binary tree without using recursion

  • Use a stack to keep track of nodes to visit

  • Pop nodes from the stack and increment count for each node visited

  • Continue until stack is empty

Add your answer

Q45. How much equipment needed to be done for make one access door ?

Ans.

The amount of equipment needed to make one access door varies depending on the specific requirements and design of the door.

  • The type of access door (e.g. metal, wood, glass) will determine the necessary equipment.

  • Common equipment includes measuring tools, cutting tools (e.g. saw, drill), hinges, screws, and a door handle.

  • Additional equipment may be needed for specialized features such as locks, insulation, or decorative elements.

  • The quantity of equipment required will also de...read more

View 1 answer

Q46. There are 1 million random numbers and 1 number is missing find the missing number

Ans.

Find the missing number from 1 million random numbers.

  • Calculate the sum of all numbers from 1 to 1 million using the formula n(n+1)/2

  • Calculate the sum of all the given numbers

  • Subtract the sum of given numbers from the sum of all numbers to get the missing number

Add your answer

Q47. Longest non repeating subsequence in a string

Ans.

Find the longest subsequence in a string without repeating characters.

  • Use a sliding window approach to keep track of the characters seen so far.

  • Update the start index of the window when a repeating character is encountered.

  • Keep track of the longest subsequence length seen so far.

View 1 answer

Q48. 4. Explain SIP signalling.

Ans.

SIP signalling is a protocol used for initiating, modifying, and terminating real-time sessions that involve video, voice, messaging, and other communications applications.

  • SIP stands for Session Initiation Protocol.

  • It is used to establish, modify, and terminate multimedia sessions.

  • SIP signalling is used in VoIP (Voice over Internet Protocol) and other real-time communication applications.

  • It uses a request-response model, where a client sends a request to a server and the serv...read more

Add your answer

Q49. Two stack implementation with one single array with no extra space

Ans.

Implement two stacks using a single array without extra space.

  • Divide the array into two halves and use one half for each stack.

  • Keep track of the top of each stack separately.

  • Handle stack overflow and underflow conditions.

  • Example: Implementing two stacks for undo and redo operations in a text editor.

Add your answer

Q50. 3. Which emerging technology excites you the most ? Explain any use case about it.

Ans.

The emerging technology that excites me the most is Artificial Intelligence.

  • AI has the potential to revolutionize various industries such as healthcare, finance, and transportation.

  • One use case of AI is in medical diagnosis, where it can analyze large amounts of patient data to identify patterns and make accurate predictions.

  • Another use case is in autonomous vehicles, where AI can help improve safety and efficiency on the roads.

  • AI can also be used in fraud detection and preve...read more

Add your answer

Q51. 1. List and Arraylist Differences 2. What happens when element with same key is added into HashMap 3.Spring boot beans and how we can avoid bean instantiation 4.Profile annotation in spring 5.what are the confi...

read more
Ans.

Explanation of differences between List and ArrayList, HashMap behavior with same key, Spring boot beans, Profile annotation in Spring, database configurations in pom.xml, and data structures.

  • List is an interface while ArrayList is a class that implements List interface

  • HashMap replaces the old value with the new value if the same key is added

  • Spring boot beans can be avoided by using @Lazy annotation

  • Profile annotation in Spring allows defining different configurations for diff...read more

Add your answer

Q52. How to test huge XML in debugger in OPA?

Ans.

To test huge XML in debugger in OPA, use the 'Evaluate' feature and break down the XML into smaller parts.

  • Use the 'Evaluate' feature to test the XML in smaller parts

  • Break down the XML into smaller parts to make it easier to test

  • Use the 'Watch' feature to monitor variables and their values

  • Use the 'Step Into' and 'Step Over' features to navigate through the code

  • Consider using third-party tools like XMLSpy or Oxygen XML Editor for easier debugging

Add your answer

Q53. Maximum substring Sum , Merge two arrays without extra space .

Ans.

Find maximum sum of substring and merge two arrays without extra space.

  • Use Kadane's algorithm to find maximum sum of substring in an array.

  • To merge two arrays without extra space, use two pointers approach.

  • Example: Input arrays [1, 2, -3, 4, 5] and [6, 7, 8], output merged array [1, 2, -3, 4, 5, 6, 7, 8].

View 1 answer

Q54. Rotate k elements to the right in an array

Ans.

Rotate k elements to the right in an array

  • Create a new array with the same length as the original array

  • Copy elements from the original array to the new array starting from index (k % array length)

  • Copy remaining elements from the original array to the new array

  • Return the new array as the rotated array

Add your answer

Q55. Longest Palindromic Substring in a given String

Ans.

Find the longest palindromic substring in a given string.

  • Use dynamic programming to check if substrings are palindromes.

  • Start with single characters as potential palindromes and expand outwards.

  • Keep track of the longest palindrome found so far.

Add your answer

Q56. What is Hashmap? How it works? Difference between Hashmap and Concurrent Hashmap. Find Middle node of LinkedList. Difference between JVM, JRE and JDK,etc.

Ans.

Hashmap is a data structure that stores key-value pairs and provides constant time complexity for basic operations.

  • Hashmap uses hashing to store and retrieve values based on their keys.

  • Concurrent Hashmap is a thread-safe version of Hashmap.

  • Middle node of LinkedList can be found using two pointers, one moving at twice the speed of the other.

  • JVM is a virtual machine that executes Java bytecode.

  • JRE is a runtime environment that provides libraries and tools for executing Java pro...read more

Add your answer

Q57. What is auto event wireup

Ans.

Auto event wireup is a feature in ASP.NET that automatically connects events to event handlers based on naming conventions.

  • Auto event wireup simplifies event handling by automatically connecting events to event handlers without needing to manually wire them up in code.

  • In ASP.NET Web Forms, auto event wireup is enabled by default, but can be disabled by setting the AutoEventWireup attribute to false in the Page directive.

  • Event handlers are expected to follow a specific naming ...read more

Add your answer

Q58. Java api implementation approach and how you are connecting it from front end.

Ans.

Java api implementation approach and front-end connection.

  • Java api implementation involves creating classes and methods to interact with the api

  • The front-end can connect to the api using HTTP requests and JSON data

  • Frameworks like Spring can simplify the implementation process

  • API documentation is crucial for understanding how to use the api

Add your answer

Q59. What is mapped in and mapped out in OPA

Ans.

Mapped in and mapped out in OPA refers to the process of importing and exporting data from external sources.

  • Mapped in refers to the process of importing data into OPA from external sources such as spreadsheets or databases.

  • Mapped out refers to the process of exporting data from OPA to external sources.

  • Mapping in and out is done using the OPA Data Mapper tool.

  • Data can be mapped in and out in various formats such as CSV, XML, and JSON.

Add your answer

Q60. Triggers and it's types and importance.

Ans.

Triggers are database objects that are used to automatically execute a set of actions when a specific event occurs.

  • Triggers can be of two types: DML triggers and DDL triggers.

  • DML triggers are fired in response to DML (Data Manipulation Language) events like INSERT, UPDATE, and DELETE.

  • DDL triggers are fired in response to DDL (Data Definition Language) events like CREATE, ALTER, and DROP.

  • Triggers are important as they help in maintaining data integrity, enforcing business rule...read more

Add your answer

Q61. Consumer producer multithreading program.

Ans.

Consumer producer multithreading program involves multiple threads sharing a common buffer to produce and consume data.

  • Use synchronized data structures like BlockingQueue to handle thread synchronization.

  • Implement separate producer and consumer classes with run methods.

  • Use wait() and notify() methods to control the flow of data between producer and consumer threads.

Add your answer

Q62. What is Deferred Tax Liabilities and can it shown under Non Current Assets

Ans.

Deferred Tax Liabilities are future tax obligations that arise due to temporary differences between accounting and tax rules.

  • Deferred Tax Liabilities are recorded on the balance sheet as a non-current liability.

  • They represent taxes that a company will have to pay in the future when the temporary differences reverse.

  • Temporary differences can arise from items such as depreciation, inventory valuation, and revenue recognition.

  • Deferred Tax Liabilities are calculated by applying t...read more

Add your answer

Q63. What is the difference between ux and ui ?

Ans.

UX focuses on the overall user experience, while UI focuses on the visual and interactive elements of a product.

  • UX (User Experience) is about the overall experience a user has with a product, including usability, accessibility, and satisfaction.

  • UI (User Interface) is specifically about the visual and interactive elements of a product, such as buttons, menus, and layout.

  • UX design involves research, testing, and understanding user needs, while UI design focuses on creating visu...read more

Add your answer

Q64. What is the difference between scan vip & node vip?

Ans.

Scan VIP is used for load balancing traffic to multiple nodes, while Node VIP is assigned to a specific node for direct access.

  • Scan VIP is a virtual IP address used for load balancing traffic across multiple nodes in a cluster.

  • Node VIP is a virtual IP address assigned to a specific node in the cluster for direct access.

  • Scan VIP is typically used for services that need to be highly available and distributed across multiple nodes.

  • Node VIP is used when direct access to a specifi...read more

Add your answer

Q65. Programs: 1. Write program to return list of duplicate integer using int array 2. Write program to return square of integers in ascending order input:[-4,0,3,5] output:[0,9,16,25]

Ans.

Program to return square of integers in ascending order from input array

  • Iterate through the input array and calculate the square of each integer

  • Store the squares in a new array and sort it in ascending order

  • Return the sorted array of squares

Add your answer

Q66. What is expected compensation

Ans.

Expected compensation should be based on industry standards, experience, skills, and location.

  • Research industry standards for Senior Software Engineer salaries

  • Consider your level of experience and skills

  • Take into account the cost of living in the location of the job

  • Negotiate based on your value to the company

Add your answer

Q67. Xpath and css for web elements

Ans.

Xpath and CSS are used to locate web elements on a webpage.

  • Xpath is a language used to navigate through the XML structure of a webpage.

  • CSS selectors are used to target specific HTML elements on a webpage.

  • Xpath can be used to locate elements based on their attributes, text content, or position on the page.

  • CSS selectors can be used to locate elements based on their tag name, class, ID, or attributes.

  • Both Xpath and CSS can be used in automated testing frameworks like Selenium to...read more

Add your answer

Q68. What is Excepted Credit Loss - What are the 2 methods that the Standard prescribes

Ans.

Expected Credit Loss (ECL) is a measure of the potential loss that a financial institution may incur due to default or impairment of its credit exposures.

  • ECL is a key concept in financial accounting and reporting.

  • It is used to estimate the amount of credit losses that a financial institution is likely to experience in the future.

  • The two methods prescribed by the Standard are the General Approach and the Simplified Approach.

  • Under the General Approach, financial institutions ar...read more

Add your answer

Q69. What is Deferred Revenue and Accrued Revenue

Ans.

Deferred revenue is income received in advance for goods or services that will be delivered in the future. Accrued revenue is income earned but not yet received.

  • Deferred revenue is a liability on the balance sheet.

  • It represents revenue that has been received but not yet earned.

  • Examples of deferred revenue include prepaid subscriptions, advance payments for services, or gift cards.

  • Accrued revenue is an asset on the balance sheet.

  • It represents revenue that has been earned but n...read more

Add your answer

Q70. Delete a head node from linked list given that head node is not given in list in qn.

Ans.

To delete a head node from a linked list without the head node given, we need to traverse the list.

  • Traverse the list until we find the node whose next node is the head node.

  • Make the next node of that node as the new head node.

  • Delete the original head node.

Add your answer

Q71. System design of hotel management system

Ans.

A hotel management system involves designing a software system to handle reservations, check-ins, check-outs, room assignments, billing, and other hotel operations.

  • Consider the different modules needed such as reservation management, room assignment, billing, and reporting

  • Design a user-friendly interface for both staff and guests

  • Implement features like online booking, room availability tracking, and payment processing

  • Ensure data security and privacy measures are in place to p...read more

Add your answer

Q72. How will setup a pipeline for a build process using Concourse?

Ans.

Setting up a pipeline for a build process using Concourse

  • Create a pipeline configuration file in YAML format

  • Define jobs, resources, and tasks in the configuration file

  • Set up a Concourse server and target it with the fly CLI tool

  • Upload the pipeline configuration file to the Concourse server using fly set-pipeline command

  • Unpause the pipeline to start the build process

Add your answer

Q73. System design of traffic signal

Ans.

Design a traffic signal system

  • Identify the number of lanes and intersections

  • Determine the traffic flow and peak hours

  • Choose appropriate sensors and controllers

  • Implement a synchronization algorithm

  • Consider emergency vehicle prioritization

  • Include pedestrian crossing signals

  • Ensure compliance with local regulations

Add your answer

Q74. What is primary and secondary Ledger?

Ans.

Primary and secondary ledgers are accounting books used to record financial transactions in different currencies or accounting standards.

  • Primary ledger is the main accounting book used to record transactions in the company's base currency or accounting standard.

  • Secondary ledger is an additional accounting book used to record transactions in a different currency or accounting standard.

  • Secondary ledgers can be used for reporting purposes or to comply with local accounting regul...read more

Add your answer

Q75. Common longest Substring from 2 or more than 2 string

Ans.

Finding the longest common substring among multiple strings.

  • Iterate through all substrings of the first string and check if it exists in all other strings.

  • Use dynamic programming to find the longest common substring among all strings.

  • If the strings are sorted, use binary search to find the common substring.

  • Example: For strings 'abcdef' and 'defghij', the longest common substring is 'def'.

Add your answer

Q76. How to identify the master switch in Exadata?

Ans.

The master switch in Exadata can be identified by checking the status of the cell server software.

  • Check the status of the cell server software using the 'cellcli' command

  • The cell server with the 'MS' role is the master switch

  • The master switch can also be identified by checking the 'cellinit.ora' file

Add your answer

Q77. What is spine switch & leaf switch in exadata?

Ans.

Spine switch and leaf switch are networking components in Exadata used for connecting database servers and storage servers.

  • Spine switch acts as the core of the network, connecting all leaf switches and providing high-speed connectivity.

  • Leaf switches connect database servers and storage servers to the spine switch, facilitating communication between them.

  • Exadata uses a leaf-spine network architecture for efficient data transfer and scalability.

  • Spine switches typically have hig...read more

Add your answer

Q78. System design for small systems

Ans.

System design for small systems involves creating a high-level architecture to meet specific requirements.

  • Identify the requirements and constraints of the system

  • Break down the system into smaller components/modules

  • Design the interactions between components

  • Consider scalability, reliability, and performance

  • Choose appropriate technologies and frameworks

  • Document the design for future reference

Add your answer

Q79. Stack implementation using Queue, Queue implementation using stack,

Ans.

Stack can be implemented using two queues, and Queue can be implemented using two stacks.

  • To implement Stack using Queue, we can use two queues. One queue will be used for storing elements and the other will be used for dequeuing elements. When we push an element, we enqueue it to the first queue. When we pop an element, we dequeue all the elements from the first queue and enqueue them to the second queue, except for the last element which is the one to be popped. We then swap...read more

Add your answer

Q80. Use case study implementation in SOA and osb

Ans.

SOA and OSB implementation in use case study

  • Identify business requirements and goals for the use case study

  • Design service-oriented architecture (SOA) to meet the requirements

  • Implement Oracle Service Bus (OSB) for communication between services

  • Test and validate the implementation to ensure functionality and performance

  • Document the use case study implementation for future reference

Add your answer

Q81. find a word in 2 d matrix , palindrome or not

Ans.

A program to find a palindrome word in a 2D matrix of strings.

  • Iterate through each row and column of the matrix

  • Check if each string is a palindrome using two pointers approach

  • Return the first palindrome word found

Add your answer

Q82. Design Toll system

Ans.

Design a toll system for collecting fees from vehicles using RFID technology.

  • Implement RFID technology for automatic vehicle identification

  • Set up toll booths with RFID readers to detect vehicles

  • Calculate toll fees based on vehicle type, distance traveled, and time of day

  • Provide payment options such as prepaid accounts or credit card payments

Add your answer

Q83. How can You optimize MySQL queries.

Ans.

Optimizing MySQL queries involves using indexes, avoiding unnecessary joins, optimizing data types, and using query caching.

  • Use indexes on columns frequently used in WHERE, ORDER BY, and GROUP BY clauses.

  • Avoid using SELECT * and only fetch the columns needed.

  • Optimize data types to use the smallest data type possible for each column.

  • Avoid unnecessary joins and use INNER JOIN instead of OUTER JOIN when possible.

  • Enable query caching to store the results of frequent queries.

Add your answer

Q84. How rates are setup in Oracle Projects

Ans.

Rates in Oracle Projects are setup using rate schedules and rate matrices.

  • Rate schedules define the rates for different resources or roles in a project

  • Rate matrices define the rates based on different criteria such as project type, organization, or location

  • Rates can be setup for different time periods, such as hourly, daily, or monthly

  • Rates can also be setup for different cost types, such as labor, material, or equipment

  • Example: A rate schedule can define the hourly rate for ...read more

Add your answer

Q85. Explain how an Select statement is parsed in Oracle database

Ans.

The parsing of a SELECT statement in Oracle database involves several steps.

  • The statement is first checked for syntax errors.

  • The query is then parsed to identify the objects involved and their relationships.

  • The optimizer determines the most efficient execution plan.

  • The plan is executed and the result set is returned.

Add your answer

Q86. Explain how an insert/update is parsed in Oracle database

Ans.

An insert/update statement in Oracle database is parsed by the SQL parser to check syntax and semantics.

  • The SQL parser first checks the syntax of the insert/update statement to ensure it follows the rules of the SQL language.

  • Next, the parser checks the semantics of the statement, which involves verifying the existence and accessibility of the tables and columns referenced in the statement.

  • During parsing, the parser also determines the execution plan for the statement, which i...read more

Add your answer

Q87. Variable and methods calling which are inherited and overridden.

Ans.

Inherited variables and methods can be overridden in child classes.

  • Inheritance allows child classes to access parent class variables and methods.

  • Child classes can override inherited variables and methods with their own implementation.

  • The 'super' keyword can be used to call the parent class version of an overridden method.

  • Example: class Child extends Parent { int variable = 5; void method() { super.method(); } }

Add your answer

Q88. Dense rank in sql

Ans.

Dense rank in SQL is a function that assigns a rank to each row in a result set with no gaps between the ranks.

  • Dense rank is used to assign unique ranks to each row in a result set, with no gaps between the ranks.

  • It is similar to the RANK function, but does not leave gaps in the ranking sequence.

  • For example, if two rows have the same value and are ranked 1 and 2, the next row will be ranked 3, not 2.

Add your answer

Q89. Procure to pay process?

Ans.

Procure to pay process is the cycle of activities involved in purchasing goods or services and paying for them.

  • The process starts with identifying the need for a product or service

  • Then, a purchase requisition is created and approved

  • Next, a purchase order is issued to the supplier

  • Goods or services are received and inspected

  • An invoice is received and matched with the purchase order and goods receipt

  • Payment is made to the supplier

  • The process ends with recording the transaction i...read more

Add your answer

Q90. What all technologies did you get to work on?

Ans.

I have worked on a variety of technologies including Windows Server, Linux, VMware, Active Directory, and networking equipment.

  • Windows Server

  • Linux

  • VMware

  • Active Directory

  • Networking equipment

Add your answer

Q91. Differences between Previous and Current Revenue Recognition

Ans.

The current revenue recognition standards have changed compared to the previous standards.

  • Previous standards recognized revenue when it was realized or realizable and earned, while current standards focus on the transfer of control of goods or services.

  • Under previous standards, revenue could be recognized over time using percentage-of-completion method, while current standards require the use of input or output methods to measure progress towards completion.

  • The current standa...read more

Add your answer

Q92. Write an SQL query to copy the structure of a table to another table, but without copying data

Ans.

SQL query to copy table structure without data

  • Use CREATE TABLE AS SELECT statement

  • Include WHERE clause to avoid copying data

  • Example: CREATE TABLE new_table AS SELECT * FROM old_table WHERE 1=0

Add your answer

Q93. Sort the array of 0,1,2

Ans.

Sort an array of strings containing '0', '1', and '2'.

  • Use counting sort algorithm to count the occurrences of '0', '1', and '2'.

  • Create a new array based on the counts of each element.

  • Return the sorted array.

Add your answer

Q94. Design quick ecommerce site.

Ans.

Designing a quick ecommerce site involves creating a user-friendly interface with easy navigation and secure payment options.

  • Focus on a clean and intuitive user interface

  • Implement a robust search functionality for products

  • Include secure payment gateways like PayPal or Stripe

  • Optimize site speed for quick loading times

  • Ensure mobile responsiveness for on-the-go shopping

  • Integrate customer reviews and ratings for trust-building

  • Implement a user-friendly checkout process with guest ...read more

Add your answer

Q95. Order to Cash process?

Ans.

Order to Cash process involves all the steps from receiving an order to receiving payment for it.

  • It includes order entry, order fulfillment, invoicing, and payment collection.

  • It is a critical process for any business as it directly impacts cash flow.

  • Efficient management of this process can lead to improved customer satisfaction and increased revenue.

  • Examples of software used for this process include SAP, Oracle, and Salesforce.

Add your answer

Q96. Hashmap implementation

Ans.

Hashmap is a data structure that stores key-value pairs and provides constant time complexity for insertion, deletion, and retrieval.

  • Hashmap uses hashing function to map keys to indices in an array

  • Collisions can occur when multiple keys map to the same index, which can be resolved using separate chaining or open addressing

  • Java implementation: HashMap map = new HashMap<>();

Add your answer

Q97. Common point in linked list

Ans.

Common point in linked list refers to the node where two or more linked lists intersect.

  • The common point can be found by traversing both linked lists and comparing the nodes.

  • The common point can also be found by using two pointers, one for each linked list, and moving them until they meet at the common point.

  • Examples include finding the intersection point of two linked lists or finding the loop in a linked list.

Add your answer

Q98. Aspects of bill? Table Structure? Difference between all three scripts? UI, portal types

Add your answer

Q99. try catch finally block how many characters to delete to make a string palindrome how to run test parallely in test ng

Add your answer

Q100. Permutation of the number without duplicates

Ans.

Generate all permutations of a given number without duplicates

  • Use backtracking to generate all possible permutations

  • Avoid duplicates by keeping track of used digits

  • Recursively swap digits to generate permutations

Add your answer
1
2

More about working at Oracle

#22 Best Mega Company - 2022
#3 Best Internet/Product Company - 2022
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos

Interview Process at SocioClout

based on 156 interviews
Interview experience
4.1
Good
View more
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Interview Questions from Similar Companies

3.9
 • 361 Interview Questions
3.5
 • 307 Interview Questions
3.9
 • 200 Interview Questions
4.1
 • 161 Interview Questions
4.1
 • 146 Interview Questions
3.7
 • 141 Interview Questions
View all
Top Oracle Interview Questions And Answers
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
70 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter