Oracle
600+ Ergode IT Services Interview Questions and Answers
Q201. What kind of Fast Formulas are used to meet the requirement?
Fast Formulas in Oracle HCM Cloud are used for complex calculations and validations.
Fast Formulas are used in Oracle HCM Cloud to calculate elements like earnings, deductions, and benefits.
They can be used to define eligibility criteria for elements.
Fast Formulas can also be used for complex validations and conditions in payroll processing.
Examples include calculating overtime pay based on specific criteria, determining bonus amounts based on performance ratings, and validati...read more
Q202. What is the difference between list and touple in python?
Lists are mutable, ordered collections of items, while tuples are immutable, ordered collections of items.
Lists are defined using square brackets [], while tuples are defined using parentheses ().
Lists can be modified after creation (mutable), while tuples cannot be modified (immutable).
Lists are typically used for collections of similar items that may need to be changed, while tuples are used for fixed collections of items.
Example: list_example = [1, 2, 3] and tuple_example ...read more
Q203. Two stack implementation with one single array with no extra space
Implement two stacks using a single array without extra space.
Divide the array into two halves and use one half for each stack.
Keep track of the top of each stack separately.
Handle stack overflow and underflow conditions.
Example: Implementing two stacks for undo and redo operations in a text editor.
Q204. What is difference between abstract class and interface?
Abstract class can have implementation while interface cannot. Classes can implement multiple interfaces but only one abstract class.
Abstract class can have constructors while interface cannot.
Abstract class can have non-abstract methods while interface cannot.
Interfaces are used for full abstraction while abstract classes are used for partial abstraction.
Example: Abstract class - Animal with method eat() and subclass Dog with implementation. Interface - Runnable with method ...read more
Q205. Find missing and repeating numbers in a group of billions of numbers without extra space.
Find missing and repeating numbers in a group of billions of numbers without extra space.
Use bitwise XOR to find the missing number
Use modulo and division to find the repeating number
Divide the numbers into smaller chunks to avoid memory overflow
Q206. How to solve the question 1 with O(n),O(logn) time complexity
To solve question 1 with O(n) time complexity, iterate through the array once. To solve with O(logn) time complexity, use binary search.
For O(n) time complexity, iterate through the array once and perform the required operations.
For O(logn) time complexity, use binary search to find the desired element or perform the required operations.
O(n) time complexity is generally faster than O(logn) time complexity for smaller input sizes, while O(logn) is faster for larger input sizes...read more
Q207. Find the maximum salary in emp table
To find the maximum salary in emp table, use the MAX function on the salary column.
Use the MAX function in SQL to find the highest value in a column
Specify the column name after the MAX function, in this case 'salary'
Example: SELECT MAX(salary) FROM emp
This will return the highest salary value in the emp table
Constraints in SQL are rules that are enforced on columns or tables to ensure data integrity and consistency.
Constraints ensure data accuracy and reliability.
Common constraints include NOT NULL, UNIQUE, PRIMARY KEY, FOREIGN KEY, and CHECK.
NOT NULL constraint ensures a column cannot have a NULL value.
UNIQUE constraint ensures that all values in a column are unique.
PRIMARY KEY constraint uniquely identifies each record in a table.
FOREIGN KEY constraint establishes a relationshi...read more
TCP is a connection-oriented protocol that provides reliable data delivery, while UDP is a connectionless protocol that offers faster but less reliable data transmission.
TCP is reliable as it ensures all data packets are received in order and retransmits any lost packets.
UDP is faster as it does not establish a connection before sending data and does not guarantee delivery of packets.
TCP is used for applications that require high reliability and accuracy, such as web browsing...read more
Q210. What is the difference between Java and other programming languages such as C++.
Java is an object-oriented programming language that is platform-independent and has automatic memory management.
Java is platform-independent, while C++ is platform-dependent.
Java has automatic memory management, while C++ requires manual memory management.
Java is an object-oriented language, while C++ supports both procedural and object-oriented programming.
Java has a simpler syntax than C++.
Java has a larger standard library than C++.
Java is used for developing web applicat...read more
Q211. Design the DB, how to handle the user requests during peak hours in University.
Design a scalable database to handle user requests during peak hours in a university setting.
Implement load balancing to distribute user requests evenly across servers.
Use caching mechanisms to reduce database load and improve response times.
Optimize database queries and indexes to improve performance during peak hours.
Consider sharding or partitioning the database to distribute data across multiple servers.
Implement failover mechanisms to ensure high availability during peak...read more
Q212. What are ER diagrams for?
ER diagrams are used to visualize and design relational databases.
ER diagrams show the relationships between entities in a database
They help in identifying the attributes of each entity
They aid in designing the structure of a database
ER diagrams are commonly used in software development
Q213. What is Excepted Credit Loss - What are the 2 methods that the Standard prescribes
Expected Credit Loss (ECL) is a measure of the potential loss that a financial institution may incur due to default or impairment of its credit exposures.
ECL is a key concept in financial accounting and reporting.
It is used to estimate the amount of credit losses that a financial institution is likely to experience in the future.
The two methods prescribed by the Standard are the General Approach and the Simplified Approach.
Under the General Approach, financial institutions ar...read more
Routing in MVC pattern is handled by a routing engine which maps incoming URLs to specific controller actions.
Routing is the process of matching incoming URLs to specific controller actions in the MVC pattern.
Routes are defined in a routing table which maps URLs to corresponding controller actions.
The routing engine uses the routing table to determine which controller and action should handle a particular request.
Routes can include placeholders for dynamic segments of the URL...read more
Filters in MVC are components that allow pre-processing and post-processing of requests and responses.
Filters are used to perform common functionalities like logging, authentication, authorization, etc.
They can be applied globally to all controllers or selectively to specific controllers or actions.
Examples of filters include Authorization filters, Action filters, Result filters, and Exception filters.
Q216. Write code on multi threaded example? Like create two threads and synchronised them.
Creating two threads and synchronizing them in a multi-threaded example.
Create two threads using the Thread class in Java.
Implement the run() method for each thread.
Use synchronized keyword to ensure thread safety.
Example: Thread t1 = new Thread(new MyRunnable()); t1.start();
Example: Thread t2 = new Thread(new MyRunnable()); t2.start();
Q217. What algorithm is used for garbage collection in Java?
Q218. Write code two merge and remove duplicates from two sorted arrays with any Collections
Merge and remove duplicates from two sorted arrays without using Collections
Use two pointers to iterate through both arrays simultaneously
Compare elements at each pointer and add the smaller one to the result array
Skip duplicates by checking if the current element is equal to the previous element
Q219. Singleton design pattern. Explain and implement (thread safe)
Singleton design pattern ensures a class has only one instance and provides a global point of access to it.
Ensure a private static instance variable in the class.
Provide a public static method to access the instance, creating it if necessary.
Use synchronized keyword or double-checked locking to make it thread-safe.
Q220. How to check ports in Solaris or linux machine
To check ports in Solaris or Linux machine, use the netstat command.
Open the terminal and type 'netstat -an' to display all open ports.
Use 'netstat -an | grep
' to check if a specific port is open. To check listening ports, use 'netstat -an | grep LISTEN'.
For Solaris, use 'netstat -an | grep .
' instead of '| grep '.
Q221. What is Deferred Revenue and Accrued Revenue
Deferred revenue is income received in advance for goods or services that will be delivered in the future. Accrued revenue is income earned but not yet received.
Deferred revenue is a liability on the balance sheet.
It represents revenue that has been received but not yet earned.
Examples of deferred revenue include prepaid subscriptions, advance payments for services, or gift cards.
Accrued revenue is an asset on the balance sheet.
It represents revenue that has been earned but n...read more
Q222. 6. Explain JVM architecture.
JVM is an abstract machine that executes Java bytecode. It consists of class loader, runtime data area, and execution engine.
JVM stands for Java Virtual Machine.
It is responsible for executing Java bytecode.
JVM architecture consists of class loader, runtime data area, and execution engine.
Class loader loads the class files into the memory.
Runtime data area is divided into method area, heap, and stack.
Execution engine executes the bytecode.
JVM provides platform independence to...read more
Q223. 9. Types of functional interface.
Functional interfaces are interfaces with only one abstract method. There are four types of functional interfaces.
Consumer: accepts a single argument and returns no result. Example: Consumer
Supplier: takes no argument and returns a result. Example: Supplier
Predicate: takes a single argument and returns a boolean. Example: Predicate
Function: takes a single argument and returns a result. Example: Function
Q224. Given array contain duplicate elements need to remove duplicates and after deletion oreder of remaining element should remain same..
Remove duplicates from array of strings while maintaining original order.
Iterate through the array and use a Set to keep track of unique elements.
Add elements to a new array only if they are not already in the Set.
Q225. Design circular doubly linked list with all operations.
Circular doubly linked list is a data structure where each node has a reference to both the next and previous nodes, forming a circular loop.
Create a Node class with data, next, and prev pointers
Implement operations like insert, delete, search, and display
Ensure the last node's next pointer points to the first node and the first node's prev pointer points to the last node
Q226. Different types of searching and sorting algo discussion.
Searching and sorting algorithms are essential in programming for efficiently organizing and retrieving data.
Searching algorithms: linear search, binary search, depth-first search, breadth-first search
Sorting algorithms: bubble sort, selection sort, insertion sort, merge sort, quick sort
Examples: Searching for a specific item in a list, sorting a list of numbers in ascending order
Q227. Delete a head node from linked list given that head node is not given in list in qn.
To delete a head node from a linked list without the head node given, we need to traverse the list.
Traverse the list until we find the node whose next node is the head node.
Make the next node of that node as the new head node.
Delete the original head node.
Q228. Write code for Towers of Hanoi problem
Towers of Hanoi is a classic problem of moving disks from one peg to another with specific rules.
The problem involves three pegs and a number of disks of different sizes.
The goal is to move all the disks from the first peg to the third peg, while following the rules.
The rules are: only one disk can be moved at a time, a larger disk cannot be placed on top of a smaller disk, and all disks must be moved to the third peg.
The solution can be implemented recursively.
Example code: ...read more
Q229. What is the difference between iterator and geneator
Iterator is a design pattern that allows sequential access to elements, while generator is a function that can pause and resume execution.
Iterator is an object that provides a way to access elements of a collection sequentially.
Generator is a function that can yield multiple values one at a time, allowing it to pause and resume execution.
Iterators are used in loops to iterate over collections like arrays, while generators are used to create iterable sequences.
Q230. Explain three normalizations with example
Explanation of three normalizations with examples
First Normal Form (1NF): Eliminate duplicate data and create separate tables for related data
Example: A table with customer information and their orders should be split into two tables
Second Normal Form (2NF): Ensure non-key attributes are dependent on the primary key
Example: A table with customer information and their orders should have separate tables for customer and order details
Third Normal Form (3NF): Eliminate transitive...read more
Q231. How will setup a pipeline for a build process using Concourse?
Setting up a pipeline for a build process using Concourse
Create a pipeline configuration file in YAML format
Define jobs, resources, and tasks in the configuration file
Set up a Concourse server and target it with the fly CLI tool
Upload the pipeline configuration file to the Concourse server using fly set-pipeline command
Unpause the pipeline to start the build process
Q232. Can you explain the difference between linear progression and non-linear progression?
Linear progression is a constant rate of change, while non-linear progression involves varying rates of change.
Linear progression follows a straight line or a constant slope.
Non-linear progression does not follow a straight line and has varying rates of change.
Examples of linear progression include simple interest growth, while examples of non-linear progression include exponential growth.
Linear progression can be represented by equations like y = mx + b, while non-linear pro...read more
Q233. Kth element after merging two sorted arrays
Finding the Kth element after merging two sorted arrays.
Merge the two sorted arrays into a single array.
Sort the merged array.
Return the Kth element from the merged and sorted array.
Q234. What is the difference between scan vip & node vip?
Scan VIP is used for load balancing traffic to multiple nodes, while Node VIP is assigned to a specific node for direct access.
Scan VIP is a virtual IP address used for load balancing traffic across multiple nodes in a cluster.
Node VIP is a virtual IP address assigned to a specific node in the cluster for direct access.
Scan VIP is typically used for services that need to be highly available and distributed across multiple nodes.
Node VIP is used when direct access to a specifi...read more
Q235. Find the duplicates in an array
Find duplicates in an array
Iterate through the array and compare each element with the rest of the elements
Use a hash table to keep track of the frequency of each element
Sort the array and compare adjacent elements
Use a set to keep track of unique elements and add duplicates to another set
Q236. what is BCNF, difference between other forms ?
Q237. Difference between where and having clause ?
Q238. What are the key components and considerations for low-level design in a healthcare system?
Key components and considerations for low-level design in a healthcare system
Identifying the different modules and components of the system such as patient management, appointment scheduling, billing, etc.
Defining the interactions between these components and how data flows between them
Ensuring data security and privacy measures are in place to protect sensitive patient information
Optimizing performance and scalability to handle a large volume of data and users
Implementing fa...read more
Q239. Different ways to write PLSQL package and it's procedures and functions
PLSQL packages can be written in different ways. Here are some pointers.
Packages can be written in a single file or multiple files.
Procedures and functions can be written inside the package or outside the package.
Packages can be created using CREATE PACKAGE statement or CREATE OR REPLACE PACKAGE statement.
Packages can be compiled in debug mode using the keyword 'DEBUG'.
Q240. How can one troubleshoot the crashloop error in Kubernetes (k8s)?
Troubleshooting crashloop error in Kubernetes involves checking pod logs, examining resource limits, and verifying configuration files.
Check pod logs to identify the cause of the crashloop.
Examine resource limits to ensure the pod has enough resources to run.
Verify configuration files for any errors or misconfigurations.
Use kubectl commands like describe, logs, and exec to troubleshoot further.
Consider checking for issues with persistent volumes or network connectivity.
Q241. How can you divide a cake into 8 parts only 3 cuts allowed
To divide a cake into 8 parts with only 3 cuts, make two perpendicular cuts to create 4 equal pieces, then cut each of those pieces in half.
Make a horizontal cut across the middle of the cake to create 2 equal halves.
Make a vertical cut through the middle of the cake to create 4 equal quarters.
Make a diagonal cut through each quarter to create 8 equal parts.
Q242. Difference between semaphore and mutex
Semaphore allows multiple threads to access shared resources at the same time, while mutex allows only one thread at a time.
Semaphore is used to control access to a resource with limited capacity, like a printer or database connection pool.
Mutex is used to protect a shared resource from simultaneous access, like a critical section of code.
Semaphore can have a count greater than 1, allowing multiple threads to access the resource simultaneously.
Mutex has a binary state, either...read more
Q243. What is primary and secondary Ledger?
Primary and secondary ledgers are accounting books used to record financial transactions in different currencies or accounting standards.
Primary ledger is the main accounting book used to record transactions in the company's base currency or accounting standard.
Secondary ledger is an additional accounting book used to record transactions in a different currency or accounting standard.
Secondary ledgers can be used for reporting purposes or to comply with local accounting regul...read more
Garbage collector in Java is a built-in mechanism that automatically manages memory by reclaiming unused objects.
Garbage collector runs in the background to identify and delete objects that are no longer needed.
It helps prevent memory leaks and optimize memory usage.
Examples of garbage collectors in Java include Serial, Parallel, CMS, and G1.
Q245. Common longest Substring from 2 or more than 2 string
Finding the longest common substring among multiple strings.
Iterate through all substrings of the first string and check if it exists in all other strings.
Use dynamic programming to find the longest common substring among all strings.
If the strings are sorted, use binary search to find the common substring.
Example: For strings 'abcdef' and 'defghij', the longest common substring is 'def'.
Q246. How to test huge XML in debugger in OPA?
To test huge XML in debugger in OPA, use the 'Evaluate' feature and break down the XML into smaller parts.
Use the 'Evaluate' feature to test the XML in smaller parts
Break down the XML into smaller parts to make it easier to test
Use the 'Watch' feature to monitor variables and their values
Use the 'Step Into' and 'Step Over' features to navigate through the code
Consider using third-party tools like XMLSpy or Oxygen XML Editor for easier debugging
Q247. All c++ core concepts and oops concept. Find second greatest element in an array without sorting.
Find the second greatest element in an array without sorting using C++ concepts.
Iterate through the array to find the greatest element.
While iterating, keep track of the second greatest element.
Return the second greatest element once the iteration is complete.
Q248. How many nodes can we implement in rac
Up to 60 nodes can be implemented in RAC.
RAC stands for Real Application Clusters
The number of nodes depends on the version of Oracle Database being used
Oracle Database 12c supports up to 60 nodes in RAC
Q249. Why do you want to work as a python developer?
I am passionate about coding and enjoy problem-solving using Python.
I have a strong interest in programming and have been learning Python for a while.
I find Python to be a versatile and powerful language that can be used in various applications.
I enjoy the challenge of writing efficient and clean code to solve complex problems.
I believe working as a Python developer will allow me to further enhance my skills and contribute to innovative projects.
Q250. Write a CPU Scheduler implemeting priority scheduling in C language - 20 lines of code, 10 minutes time. Also give the data structure to use
Priority scheduling CPU scheduler implemented in C language with a 20-line code limit.
Use an array of structs to store process information including priority.
Sort the processes based on priority before scheduling.
Implement a function to switch between processes based on priority levels.
Q251. Stack implementation using Queue, Queue implementation using stack,
Stack can be implemented using two queues, and Queue can be implemented using two stacks.
To implement Stack using Queue, we can use two queues. One queue will be used for storing elements and the other will be used for dequeuing elements. When we push an element, we enqueue it to the first queue. When we pop an element, we dequeue all the elements from the first queue and enqueue them to the second queue, except for the last element which is the one to be popped. We then swap...read more
Q252. Tell me the recent biggest Accounting froud happened in india? How do you find the Accounting fraudulent happened or not?
One of the recent biggest accounting frauds in India was the Punjab National Bank (PNB) scam involving Nirav Modi.
The PNB scam involved fraudulent issuance of Letters of Undertaking (LoUs) worth over $2 billion by Nirav Modi and his associates.
The scam was uncovered in 2018 when PNB reported unauthorized transactions to the RBI.
Nirav Modi and his uncle Mehul Choksi were accused of colluding with bank officials to obtain credit from overseas branches of Indian banks using frau...read more
Q253. Given 2 arrays one of n elements and another of n - 1 elements
Given 2 arrays, one with n elements and another with n-1 elements, answer the question.
Compare the elements of both arrays to find the missing element.
Use a loop or a built-in function to iterate through the arrays.
Consider edge cases where the missing element is at the beginning or end of the array.
Q254. What is Ingress? What is Prometheus ?What is Grafana?
Ingress is a Kubernetes resource that manages external access to services. Prometheus is a monitoring system and Grafana is a visualization tool.
Ingress is used to route external traffic to the appropriate Kubernetes service
Prometheus is used to collect and store metrics from various sources
Grafana is used to visualize the collected metrics in a user-friendly way
Ingress can be configured to use different load balancing algorithms
Prometheus has a powerful query language for an...read more
Q255. what is spring, what is benefits of spring boot and what are the disadvantages of spring boot
Spring is a popular Java framework for building enterprise applications. Spring Boot is a tool that simplifies the process of creating Spring applications.
Spring is a framework that provides comprehensive infrastructure support for developing Java applications.
Benefits of Spring Boot include rapid application development, auto-configuration, and easy deployment.
Disadvantages of Spring Boot may include increased memory consumption and potential performance overhead.
Spring Boot...read more
Q256. Search words with matching prefixes. How to solve in multiple vms if data is huge
To search words with matching prefixes in multiple vms with huge data, use parallel processing and divide data among vms.
Divide the data into chunks and distribute them among multiple virtual machines for parallel processing
Each VM can search for words with matching prefixes in their assigned chunk of data
Combine the results from all VMs to get the final list of words with matching prefixes
Q257. Design the data structure for the efficient implementation of cache level memory
The data structure for efficient implementation of cache level memory is a multi-level cache hierarchy.
Use a multi-level cache hierarchy with different levels of cache (L1, L2, L3, etc.)
Each cache level should have a smaller size and faster access time compared to the previous level
Implement a cache coherence protocol to ensure consistency between different cache levels
Use a replacement policy (e.g., LRU - Least Recently Used) to determine which data to evict from the cache
Co...read more
Q258. 8. Different Java 8 features.
Java 8 introduced several new features including lambda expressions, streams, and default methods.
Lambda expressions allow for functional programming and simplify code.
Streams provide a way to process collections of data in a functional way.
Default methods allow for adding new methods to interfaces without breaking existing implementations.
Other features include the Optional class, Date and Time API, and Nashorn JavaScript engine.
Example: Lambda expression - (x, y) -> x + y
Ex...read more
Map uses a data structure called Hash Table for storing key-value pairs.
Hash Table is a data structure that allows for fast retrieval of values based on keys.
It uses a hash function to map keys to their corresponding values in an array.
Common implementations include HashMap in Java and dict in Python.
A thread in an operating system is a basic unit of CPU utilization, representing a single sequence of execution within a process.
Threads share the same memory space within a process.
Threads can communicate with each other more easily than processes.
Examples of operating systems that support threads include Windows, Linux, and macOS.
Q261. What are the fundamentals of OOPS?
OOPS fundamentals include encapsulation, inheritance, polymorphism, and abstraction.
Encapsulation: Bundling data and methods together in a class.
Inheritance: Creating new classes from existing ones, inheriting their properties and behaviors.
Polymorphism: Objects of different classes can be treated as objects of a common superclass.
Abstraction: Hiding complex implementation details and providing simplified interfaces.
Q262. How can You optimize MySQL queries.
Optimizing MySQL queries involves using indexes, avoiding unnecessary joins, optimizing data types, and using query caching.
Use indexes on columns frequently used in WHERE, ORDER BY, and GROUP BY clauses.
Avoid using SELECT * and only fetch the columns needed.
Optimize data types to use the smallest data type possible for each column.
Avoid unnecessary joins and use INNER JOIN instead of OUTER JOIN when possible.
Enable query caching to store the results of frequent queries.
Q263. How BRM works in Telco, and how we can launch in market
BRM in Telco involves managing relationships with business partners to launch new products in the market.
BRM in Telco focuses on building and maintaining relationships with business partners such as vendors, suppliers, and distributors.
It involves negotiating contracts, setting up agreements, and ensuring smooth collaboration between all parties involved.
To launch a new product in the market, BRM plays a crucial role in coordinating efforts, aligning goals, and managing expec...read more
Q264. Programs: 1. Write program to return list of duplicate integer using int array 2. Write program to return square of integers in ascending order input:[-4,0,3,5] output:[0,9,16,25]
Program to return square of integers in ascending order from input array
Iterate through the input array and calculate the square of each integer
Store the squares in a new array and sort it in ascending order
Return the sorted array of squares
Q265. What is Java and what are the loops in Java
Java is a high-level programming language used for developing applications. Loops in Java are used for repetitive execution of code.
Java is an object-oriented language
It is platform-independent
Java programs are compiled into bytecode
Loops in Java include for, while, and do-while loops
For loop example: for(int i=0; i<10; i++) { // code }
While loop example: int i=0; while(i<10) { // code; i++; }
Do-while loop example: int i=0; do { // code; i++; } while(i<10);
Q266. What kind of work you have done with respect to performance tuning?
Q267. Implement queue using linked lists
Implementing queue using linked lists
Create a Node class with data and next pointer
Create a Queue class with head and tail pointers
Enqueue by adding a new node at the tail and dequeue by removing the head node
Check for empty queue by checking if head is null
Q268. Explain how an Select statement is parsed in Oracle database
The parsing of a SELECT statement in Oracle database involves several steps.
The statement is first checked for syntax errors.
The query is then parsed to identify the objects involved and their relationships.
The optimizer determines the most efficient execution plan.
The plan is executed and the result set is returned.
Q269. Explain how an insert/update is parsed in Oracle database
An insert/update statement in Oracle database is parsed by the SQL parser to check syntax and semantics.
The SQL parser first checks the syntax of the insert/update statement to ensure it follows the rules of the SQL language.
Next, the parser checks the semantics of the statement, which involves verifying the existence and accessibility of the tables and columns referenced in the statement.
During parsing, the parser also determines the execution plan for the statement, which i...read more
Q270. Variable and methods calling which are inherited and overridden.
Inherited variables and methods can be overridden in child classes.
Inheritance allows child classes to access parent class variables and methods.
Child classes can override inherited variables and methods with their own implementation.
The 'super' keyword can be used to call the parent class version of an overridden method.
Example: class Child extends Parent { int variable = 5; void method() { super.method(); } }
Q271. Program for Fibonacci numbers (Space Otimized Method)
Program to generate Fibonacci numbers using space optimized method.
Use two variables to store the last two Fibonacci numbers instead of an array.
Iterate through the sequence by updating the variables with the sum of the previous two numbers.
Repeat until the desired number of Fibonacci numbers is generated.
Q272. How do you convert monolithic application to mocroservices?
To convert a monolithic application to microservices, you need to break down the application into smaller, independent services.
Identify the different functionalities of the monolithic application
Decide on the boundaries of each microservice
Refactor the codebase to separate out the functionalities into individual services
Implement communication between the microservices using APIs or messaging queues
Deploy the microservices independently and manage them using container orches...read more
Q273. Use case of abstract class and interfaces
Abstract classes are used to provide a common base for multiple classes, while interfaces define a contract for classes to implement.
Abstract classes can contain both abstract and concrete methods, while interfaces can only have abstract methods.
Abstract classes can have constructors, while interfaces cannot.
Interfaces allow for multiple inheritance, while classes can only inherit from one abstract class.
Abstract classes are used when there is a need for a common base impleme...read more
Q274. How to find the nth node in a linked list
To find the nth node in a linked list, iterate through the list until reaching the nth node.
Start at the head of the linked list
Iterate through the list, moving to the next node each time
Stop when reaching the nth node
Q275. How do you list all the files held by a process
Use the lsof command to list all files held by a process
Use the lsof command followed by the -p flag and the process ID to list files held by a specific process
For example, to list all files held by process ID 1234, run: lsof -p 1234
You can also use the -c flag to specify a process name instead of ID, like: lsof -c chrome
Q276. What all technologies did you get to work on?
I have worked on a variety of technologies including Windows Server, Linux, VMware, Active Directory, and networking equipment.
Windows Server
Linux
VMware
Active Directory
Networking equipment
Q277. Differences between Previous and Current Revenue Recognition
The current revenue recognition standards have changed compared to the previous standards.
Previous standards recognized revenue when it was realized or realizable and earned, while current standards focus on the transfer of control of goods or services.
Under previous standards, revenue could be recognized over time using percentage-of-completion method, while current standards require the use of input or output methods to measure progress towards completion.
The current standa...read more
Q278. What is Function overloading and overriding?
Function overloading is having multiple functions with the same name but different parameters. Function overriding is redefining a function in a subclass.
Function overloading allows multiple functions with the same name but different parameters.
Function overriding involves redefining a function in a subclass with the same name and parameters as in the superclass.
Example of function overloading: int add(int a, int b) and float add(float a, float b)
Example of function overridin...read more
Q279. Write a code to create a class (with some attributes) and sort the objects on the basis of their attributes and print the same.
Create a class with attributes, sort objects based on attributes, and print.
Create a class with attributes like name, age, and salary
Implement Comparable interface to define sorting logic based on attributes
Create objects of the class, add them to a list, and use Collections.sort() to sort them
Print the sorted objects
Q280. Why Standby Redo logfiles are required. How to troubleshoot node-eviction in RAC. RTO and RPO. Extended RAC. Managed Database.
Standby Redo logfiles are required for data protection and disaster recovery in Oracle databases.
Standby Redo logfiles are essential for maintaining a standby database in Oracle Data Guard for disaster recovery purposes.
They contain a record of changes made to the primary database, which can be applied to the standby database to keep it synchronized.
In case of a primary database failure, the standby database can be activated quickly using the standby redo logfiles to minimize...read more
Q281. How do you manage multiple clients simultaneously?
I prioritize tasks, set clear expectations, utilize time management tools, and communicate effectively.
Prioritize tasks based on urgency and importance
Set clear expectations with clients regarding response times and availability
Utilize time management tools such as calendars and task lists
Communicate effectively with clients to provide updates and manage expectations
Q282. How to identify the master switch in Exadata?
The master switch in Exadata can be identified by checking the status of the cell server software.
Check the status of the cell server software using the 'cellcli' command
The cell server with the 'MS' role is the master switch
The master switch can also be identified by checking the 'cellinit.ora' file
Q283. What is spine switch & leaf switch in exadata?
Spine switch and leaf switch are networking components in Exadata used for connecting database servers and storage servers.
Spine switch acts as the core of the network, connecting all leaf switches and providing high-speed connectivity.
Leaf switches connect database servers and storage servers to the spine switch, facilitating communication between them.
Exadata uses a leaf-spine network architecture for efficient data transfer and scalability.
Spine switches typically have hig...read more
C++ supports polymorphism through virtual functions and inheritance.
C++ supports polymorphism through virtual functions and inheritance
Virtual functions allow a function to be overridden in a derived class
Base class pointers can point to derived class objects and call overridden functions
Example: class Animal { virtual void speak() { cout << 'Animal speaks'; } }; class Dog : public Animal { void speak() { cout << 'Dog barks'; } }; Animal* a = new Dog(); a->speak(); // Output:...read more
Q285. What is the difference between 11i and R12
11i and R12 are two different versions of Oracle E-Business Suite.
11i is the older version, released in 2000, while R12 was released in 2007.
R12 has a more modern architecture and improved features, such as online patching and subledger accounting.
Upgrading from 11i to R12 requires careful planning and testing.
Both versions are still in use, but Oracle has announced that support for 11i will end in 2020.
Q286. Tell me some erp application you recently worked on?
I recently worked on implementing Oracle ERP Cloud for a manufacturing company.
Configured financial modules such as General Ledger, Accounts Payable, and Accounts Receivable
Integrated supply chain modules for inventory management and procurement
Customized reports and dashboards for management visibility
Provided training to end users on system functionalities
Q287. What is string pool ?
String pool is a cache of string literals stored in memory for efficient reuse.
String pool is a part of Java's memory management system.
It stores a collection of unique string literals to save memory.
When a new string is created, it is first checked in the pool and reused if already present.
String pool can be accessed using the intern() method.
Example: String s1 = "Hello"; String s2 = "Hello"; s1 and s2 will point to the same object in the pool.
Q288. Juggling algorithm ? Write a program to find all triplets whose sum is 0 from a given array of numbers ?
Q289. What is mapped in and mapped out in OPA
Mapped in and mapped out in OPA refers to the process of importing and exporting data from external sources.
Mapped in refers to the process of importing data into OPA from external sources such as spreadsheets or databases.
Mapped out refers to the process of exporting data from OPA to external sources.
Mapping in and out is done using the OPA Data Mapper tool.
Data can be mapped in and out in various formats such as CSV, XML, and JSON.
Q290. What does errors in 4xx format usually mean?
Errors in 4xx format usually indicate client-side errors.
4xx errors are typically caused by the client sending a request that is incorrect or cannot be fulfilled.
Examples include 400 Bad Request, 401 Unauthorized, 403 Forbidden, and 404 Not Found.
These errors are different from 5xx errors which indicate server-side issues.
Q291. find a word in 2 d matrix , palindrome or not
A program to find a palindrome word in a 2D matrix of strings.
Iterate through each row and column of the matrix
Check if each string is a palindrome using two pointers approach
Return the first palindrome word found
Q292. Count nodes in a binary tree without using recursion
Count nodes in a binary tree without using recursion
Use a stack to keep track of nodes to visit
Pop nodes from the stack and increment count for each node visited
Continue until stack is empty
Q293. Given an integer array, find the length of the longest subarray that contains all unique elements.
Find length of longest subarray with all unique elements in an integer array.
Use a sliding window approach to keep track of unique elements in the subarray.
Use a set to store unique elements and update the window accordingly.
Iterate through the array and update the window size based on unique elements.
Q294. minimum area of square that contains all the points
The minimum area of a square that contains all given points is the square of the maximum distance between any two points.
Calculate the distance between all pairs of points
Find the maximum distance
Square the maximum distance to get the minimum area of the square
Q295. How rates are setup in Oracle Projects
Rates in Oracle Projects are setup using rate schedules and rate matrices.
Rate schedules define the rates for different resources or roles in a project
Rate matrices define the rates based on different criteria such as project type, organization, or location
Rates can be setup for different time periods, such as hourly, daily, or monthly
Rates can also be setup for different cost types, such as labor, material, or equipment
Example: A rate schedule can define the hourly rate for ...read more
Q296. What do you know about Oracle?
Oracle is a multinational computer technology corporation that specializes in developing and marketing database software and technology.
Oracle is known for its flagship product, the Oracle Database, which is widely used in enterprise applications.
It also offers a range of other software products, including middleware, application development tools, and cloud services.
Oracle has a strong presence in the enterprise market and is a major competitor to other database vendors like...read more
Q297. Longest non repeating subsequence in a string
Find the longest subsequence in a string without repeating characters.
Use a sliding window approach to keep track of the characters seen so far.
Update the start index of the window when a repeating character is encountered.
Keep track of the longest subsequence length seen so far.
Q298. Aspects of bill? Table Structure? Difference between all three scripts? UI, portal types
Q299. try catch finally block how many characters to delete to make a string palindrome how to run test parallely in test ng
Q300. 4. Explain SIP signalling.
SIP signalling is a protocol used for initiating, modifying, and terminating real-time sessions that involve video, voice, messaging, and other communications applications.
SIP stands for Session Initiation Protocol.
It is used to establish, modify, and terminate multimedia sessions.
SIP signalling is used in VoIP (Voice over Internet Protocol) and other real-time communication applications.
It uses a request-response model, where a client sends a request to a server and the serv...read more
More about working at Oracle
Top HR Questions asked in Ergode IT Services
Interview Process at Ergode IT Services
Top Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month