CoverPhoto
Persistent Systems logo
Premium Employer

Persistent Systems

Verified
3.5
based on 3.9k Reviews
Filter interviews by

400+ Persistent Systems Interview Questions and Answers

Updated 10 Mar 2025
Popular Designations

Q101. how wire method works, while importing data want to add record inside wire method in Jsfile how?

Ans.

Wire method in Salesforce is used to fetch data from Apex controller to Lightning Web Component. Adding records inside wire method in JS file involves using imperative Apex to create records.

  • Use @wire decorator in Lightning Web Component JS file to call an Apex method

  • Inside the wire method, use imperative Apex to create records by calling the createRecord method from the Lightning Data Service

  • Pass the record data as parameters to the createRecord method

Add your answer
right arrow

Q102. Find top 5 countries with highest population in Spark and SQL

Ans.

Use Spark and SQL to find the top 5 countries with the highest population.

  • Use Spark to load the data and perform data processing.

  • Use SQL queries to group by country and sum the population.

  • Order the results in descending order and limit to top 5.

  • Example: SELECT country, SUM(population) AS total_population FROM table_name GROUP BY country ORDER BY total_population DESC LIMIT 5

Add your answer
right arrow
Persistent Systems Interview Questions and Answers for Freshers
illustration image

Q103. What is dependency Injection, how can we implement multiple interference?

Ans.

Dependency Injection is a design pattern where components are given their dependencies rather than creating them internally.

  • Dependency Injection helps in making components more modular, testable, and reusable.

  • It can be implemented using constructor injection, setter injection, or interface injection.

  • Multiple inheritance can be implemented in languages like C++ using virtual inheritance to avoid the diamond problem.

Add your answer
right arrow

Q104. What is shuffling? How to Handle Shuffling?

Ans.

Shuffling is the process of redistributing data across partitions in a distributed computing environment.

  • Shuffling is necessary when data needs to be grouped or aggregated across different partitions.

  • It can be handled efficiently by minimizing the amount of data being shuffled and optimizing the partitioning strategy.

  • Techniques like partitioning, combiners, and reducers can help reduce the amount of shuffling in MapReduce jobs.

Add your answer
right arrow
Discover Persistent Systems interview dos and don'ts from real experiences

Q105. What is a catalyst optimiser? How it works?

Ans.

A catalyst optimizer is a query optimization tool used in Apache Spark to improve performance by generating an optimal query plan.

  • Catalyst optimizer is a rule-based query optimization framework in Apache Spark.

  • It leverages rules to transform the logical query plan into a more optimized physical plan.

  • The optimizer applies various optimization techniques like predicate pushdown, constant folding, and join reordering.

  • By optimizing the query plan, it reduces the overall execution...read more

Add your answer
right arrow

Q106. Upon receiving client requirement to create APIs, what are the intial steps you will take?

Ans.

The initial steps involve understanding the client requirements, analyzing the scope of work, and creating a plan for API development.

  • Meet with the client to discuss their requirements and goals for the APIs

  • Gather detailed information about the data and functionality that the APIs need to provide

  • Analyze the scope of work and determine the resources and timeline needed for development

  • Create a plan outlining the steps involved in API development, including design, implementatio...read more

Add your answer
right arrow
Are these interview questions helpful?

Q107. Given an array, how can you separate the even and odd numbers, placing the even numbers on the right side and the odd numbers on the left side?

Ans.

Separate even and odd numbers in an array, placing even numbers on the right side and odd numbers on the left side.

  • Iterate through the array and check if each element is even or odd.

  • Create two separate arrays to store even and odd numbers.

  • Append even numbers to one array and odd numbers to another.

  • Finally, combine the two arrays with even numbers on the right and odd numbers on the left.

Add your answer
right arrow

Q108. Write a program to find the reverse of a string

Ans.

A program to reverse a string

  • Iterate through the characters of the string from the last to the first

  • Append each character to a new string

  • Return the reversed string

View 1 answer
right arrow
Share interview questions and help millions of jobseekers 🌟
man with laptop

Q109. Whats the difference between @Service and @Component annotations?

Ans.

The @Service annotation is a specialization of the @Component annotation and is used to indicate that a class is a service.

  • Both @Service and @Component annotations are used to indicate that a class is a Spring-managed component.

  • @Service is a specialization of @Component and is used to indicate that a class is a service layer component.

  • The @Service annotation is used to add a layer of abstraction between the controller and the DAO layer.

  • The @Service annotation is used to provi...read more

Add your answer
right arrow

Q110. What is array in. Python

Ans.

An array in Python is a data structure that can hold multiple values of the same data type.

  • Arrays in Python are created using square brackets []

  • Elements in an array can be accessed using their index starting from 0

  • Example: names = ['Alice', 'Bob', 'Charlie']

Add your answer
right arrow

Q111. Scenarios to implement code.

Ans.

Scenarios for implementing code

  • Implementing a new feature

  • Fixing a bug

  • Optimizing code for performance

  • Refactoring existing code

  • Integrating with third-party APIs

  • Handling errors and exceptions

  • Writing unit tests

  • Adding new functionality to an existing system

Add your answer
right arrow

Q112. Difference between sort and sorted, dump vs dumps, load vs loads etc.

Ans.

Difference between sort and sorted, dump vs dumps, load vs loads etc.

  • sort() is a method of list object while sorted() is a built-in function

  • dump() serializes an object to a file while dumps() serializes to a string

  • load() deserializes an object from a file while loads() deserializes from a string

Add your answer
right arrow

Q113. What is Oopps? Concept of polmorphism.

Ans.

OOPs stands for Object-Oriented Programming. Polymorphism is the ability of an object to take on many forms.

  • OOPs is a programming paradigm that focuses on objects and their interactions.

  • Polymorphism allows objects of different classes to be treated as if they are of the same class.

  • There are two types of polymorphism: compile-time and runtime.

  • Compile-time polymorphism is achieved through method overloading.

  • Runtime polymorphism is achieved through method overriding.

  • Example of p...read more

Add your answer
right arrow

Q114. From a js nested object, print only values not keys.

Ans.

Print only values from a nested JS object

  • Use Object.values() to get an array of values

  • Recursively iterate through nested objects

  • Filter out non-object values before iterating

Add your answer
right arrow

Q115. How would you convince the client if is not agreeing with your design?

Ans.

I would present the client with a detailed explanation of the design, highlighting its benefits and addressing any concerns they may have.

  • Listen to the client's concerns and understand their perspective

  • Explain the design concept clearly and address how it meets the client's needs

  • Provide visual aids such as sketches or 3D models to help the client visualize the design

  • Offer alternative solutions or compromises that may address the client's concerns while still maintaining the i...read more

Add your answer
right arrow

Q116. How to make call from one namespace t another in AKS environment

Ans.

To make a call from one namespace to another in AKS environment, use the fully qualified domain name (FQDN) of the service.

  • Use the FQDN of the service to make a call from one namespace to another in AKS environment

  • The FQDN should include the namespace and service name, for example: myservice.mynamespace.svc.cluster.local

  • Ensure that the service is exposed within the cluster and has a stable IP address

  • Use the appropriate network policies to allow traffic between namespaces if n...read more

Add your answer
right arrow

Q117. query on sql to find the names of the person who is having same name

Add your answer
right arrow

Q118. what are arrow functions

Ans.

Arrow functions are a concise way to write functions in JavaScript.

  • They have a shorter syntax than traditional function expressions.

  • They do not have their own 'this' keyword.

  • They are not suitable for methods, constructors, or prototype methods.

  • Example: const add = (a, b) => a + b;

  • Example: const square = x => x * x;

Add your answer
right arrow

Q119. why nodejs is single Threaded

Ans.

Node.js is single-threaded to optimize performance and simplify programming.

  • Node.js uses an event-driven, non-blocking I/O model.

  • This allows for efficient handling of multiple requests without creating new threads.

  • Node.js also uses a single event loop to manage all I/O operations.

  • This simplifies programming by eliminating the need for complex thread synchronization.

  • However, Node.js can still take advantage of multi-core systems by creating child processes.

Add your answer
right arrow

Q120. Working concepts of loops , map , list problem statment.

Ans.

Loops, map, and list are fundamental concepts in programming.

  • Loops are used to repeat a block of code until a certain condition is met.

  • Map is a higher-order function that applies a given function to each element of a list and returns a new list.

  • List is a collection of elements that can be accessed by their index.

  • Example: for loop, map function, list comprehension.

Add your answer
right arrow

Q121. Testing methodologies Defect life-cycle Example of high priority and low severity defect and vice versa What is Agile

Ans.

Testing methodologies, defect life-cycle, high priority vs low severity defects, and Agile.

  • Testing methodologies include black box, white box, and grey box testing.

  • Defect life-cycle includes identification, logging, prioritization, fixing, retesting, and closure.

  • High priority and low severity defect example: spelling mistake in a critical message.

  • Low priority and high severity defect example: cosmetic issue in a non-critical area.

  • Agile is an iterative and incremental approach...read more

Add your answer
right arrow

Q122. Regex matcher problem

Ans.

Regex matcher problem involves matching patterns in strings using regular expressions.

  • Understand the requirements of the regex pattern to be matched

  • Use tools like regex101.com to test and validate the regex pattern

  • Consider special characters and escape sequences in the regex pattern

Add your answer
right arrow

Q123. explain dml, ddl, tcl...

Ans.

DML, DDL, and TCL are types of SQL commands used to manipulate databases.

  • DML (Data Manipulation Language) is used to manipulate data in a database, such as inserting, updating, and deleting records.

  • DDL (Data Definition Language) is used to define the structure of a database, such as creating tables, indexes, and constraints.

  • TCL (Transaction Control Language) is used to manage transactions in a database, such as committing or rolling back changes.

  • Examples of DML commands inclu...read more

Add your answer
right arrow

Q124. Explain Data structures

Ans.

Data structures are ways of organizing and storing data in a computer so that it can be accessed and used efficiently.

  • Data structures are used to manage and manipulate data in programs.

  • They can be implemented using arrays, linked lists, trees, graphs, and other techniques.

  • Examples include stacks, queues, hash tables, and binary search trees.

  • Choosing the right data structure for a particular problem can greatly improve program efficiency.

Add your answer
right arrow

Q125. Multithreading. Ways of synchronisation. How to handle exceptions.

Ans.

Multithreading synchronization and exception handling in Java.

  • Synchronization can be achieved using synchronized keyword, locks, and semaphores.

  • Exceptions can be handled using try-catch blocks, finally block, and throwing exceptions.

  • Deadlock can be avoided by acquiring locks in a consistent order.

  • Thread safety can be ensured by using immutable objects and thread-safe collections.

  • Examples of thread-safe collections are ConcurrentHashMap and CopyOnWriteArrayList.

Add your answer
right arrow

Q126. write a sql query to select 2nd highest from a column of a table

Ans.

SQL query to select 2nd highest from a column of a table

  • Use ORDER BY to sort the column in descending order

  • Use LIMIT to select the second row

  • Use subquery to avoid duplicates

Add your answer
right arrow

Q127. How do you suggest an engagement model to a customer problem?

Ans.

Engage with the customer to understand their problem and suggest a suitable engagement model.

  • Listen actively to the customer's problem and ask relevant questions to gain a deeper understanding.

  • Identify the customer's goals and priorities to suggest an engagement model that aligns with their needs.

  • Consider factors such as budget, timeline, and resources when proposing an engagement model.

  • Provide clear and concise explanations of the proposed engagement model and its benefits t...read more

Add your answer
right arrow

Q128. List manipulation using list comprehension and lambda function for prime number

Ans.

Using list comprehension and lambda function to manipulate a list of prime numbers

  • Use list comprehension to generate a list of numbers

  • Use a lambda function to check if a number is prime

  • Filter the list of numbers using the lambda function to get prime numbers

Add your answer
right arrow

Q129. How our microservices are communicate with each other

Ans.

Microservices communicate with each other through APIs and message queues.

  • Microservices use APIs to send and receive data between each other.

  • They can also utilize message queues for asynchronous communication.

  • APIs can be RESTful or use other protocols like gRPC.

  • Message queues like RabbitMQ or Kafka enable decoupled communication.

  • Microservices can also use events or pub/sub patterns for communication.

View 1 answer
right arrow

Q130. difference between node and expressjs

Ans.

Node is a runtime environment for executing JavaScript code, while Express is a web application framework built on top of Node.

  • Node provides the platform for running JavaScript code outside of a web browser

  • Express is a lightweight framework that simplifies building web applications on top of Node

  • Express provides features like routing, middleware, and templating that make it easier to build web applications

  • Node and Express are often used together to build scalable and efficien...read more

Add your answer
right arrow

Q131. How do you handle Incremental data?

Ans.

Incremental data is handled by identifying new data since the last update and merging it with existing data.

  • Identify new data since last update

  • Merge new data with existing data

  • Update data warehouse or database with incremental changes

Add your answer
right arrow

Q132. Using two tables find the different records for different joins

Ans.

To find different records for different joins using two tables

  • Use the SQL query to perform different joins like INNER JOIN, LEFT JOIN, RIGHT JOIN, and FULL JOIN

  • Identify the key columns in both tables to join on

  • Select the columns from both tables and use WHERE clause to filter out the different records

Add your answer
right arrow

Q133. What happens when we enforce schema ?

Ans.

Enforcing schema ensures that data conforms to a predefined structure and rules.

  • Ensures data integrity by validating incoming data against predefined schema

  • Helps in maintaining consistency and accuracy of data

  • Prevents data corruption and errors in data processing

  • Can lead to rejection of data that does not adhere to the schema

Add your answer
right arrow

Q134. What does the HTTP error codes 400, 500 represent?

Ans.

HTTP error codes 400 and 500 represent client and server errors respectively.

  • HTTP error code 400 indicates a client-side error, such as a bad request or invalid input.

  • HTTP error code 500 indicates a server-side error, such as an internal server error or database connection issue.

  • Other common client-side errors include 401 (unauthorized), 403 (forbidden), and 404 (not found).

  • Other common server-side errors include 503 (service unavailable) and 504 (gateway timeout).

Add your answer
right arrow

Q135. Implement String class

Ans.

Implement a custom String class in a programming language.

  • Define a class with necessary properties and methods to manipulate strings.

  • Include methods for concatenation, substring, length, etc.

  • Handle memory allocation and deallocation properly.

  • Example: class MyString { // implementation }

Add your answer
right arrow

Q136. Difference between tuple,list

Ans.

Tuple is immutable and ordered while list is mutable and ordered.

  • Tuple is defined using () while list is defined using []

  • Tuple cannot be modified while list can be modified

  • Tuple is faster than list for accessing elements

  • Tuple is used for fixed data while list is used for dynamic data

  • Example: tuple = (1, 2, 3) and list = [1, 2, 3]

Add your answer
right arrow

Q137. Why NextJs is preferred over react js

Ans.

Next.js is preferred over React.js for server-side rendering, automatic code splitting, and simplified routing.

  • Next.js provides built-in support for server-side rendering, improving performance and SEO.

  • Automatic code splitting in Next.js allows for faster page loads by only loading necessary code.

  • Next.js simplifies routing with file-based routing, making it easier to organize and navigate between pages.

  • Next.js also offers features like static site generation and API routes fo...read more

Add your answer
right arrow

Q138. How many python modules you have used?

Ans.

I have used multiple python modules for various purposes.

  • I have used NumPy for numerical computations.

  • I have used Pandas for data analysis and manipulation.

  • I have used Matplotlib for data visualization.

  • I have used Flask for web development.

  • I have used Requests for making HTTP requests.

  • I have used BeautifulSoup for web scraping.

  • I have used Scikit-learn for machine learning tasks.

  • I have used TensorFlow for deep learning tasks.

Add your answer
right arrow

Q139. Validation on how much exposure to the product

Ans.

Exposure to the product can be validated through hands-on experience, user feedback, market research, and data analysis.

  • Hands-on experience with the product through development and testing

  • User feedback from customers or internal stakeholders

  • Market research to understand the competitive landscape and user preferences

  • Data analysis of usage metrics, customer behavior, and product performance

  • Examples: Conducting user interviews, A/B testing features, analyzing sales data

Add your answer
right arrow

Q140. .Net Core middleware, when we required custom middleware?

Ans.

Custom middleware in .Net Core is required when we need to add additional processing logic to the request pipeline.

  • Custom authentication

  • Request logging

  • Error handling

  • Response compression

Add your answer
right arrow

Q141. What is the difference between a risk and an issue?

Ans.

A risk is a potential future problem that may or may not occur, while an issue is a current problem that is already happening.

  • Risk is a potential future problem, while an issue is a current problem

  • Risks can be identified and mitigated before they occur, while issues need to be resolved

  • Examples of risks include budget overruns or resource constraints, while examples of issues include software bugs or project delays

Add your answer
right arrow

Q142. How do you implement budget controls for your project?

Ans.

Implementing budget controls involves setting clear financial goals, tracking expenses, and adjusting plans as needed.

  • Establish a detailed budget at the beginning of the project, including all anticipated expenses.

  • Regularly monitor actual expenses against the budget to identify any discrepancies or overspending.

  • Implement approval processes for any changes or additional expenses that may arise during the project.

  • Utilize project management tools or software to track expenses an...read more

Add your answer
right arrow

Q143. How does a concurrent Hash Map works internally?

Ans.

Concurrent Hash Map is a thread-safe implementation of Hash Map.

  • Uses multiple segments to allow concurrent access

  • Each segment is a separate hash table with its own lock

  • Segments are dynamically added or removed based on usage

  • Uses CAS (Compare and Swap) operation for updates

  • Provides higher concurrency than synchronized Hash Map

Add your answer
right arrow

Q144. What is abstract class Difference between final,finally finalize Different types of polymorphism

Ans.

Abstract class is a class that cannot be instantiated and may contain abstract methods.

  • Abstract class cannot be instantiated directly.

  • It may contain abstract methods that must be implemented by the subclass.

  • Example: abstract class Shape { abstract void draw(); }

Add your answer
right arrow

Q145. What is multi threading and difference between threads and processes

Ans.

Multithreading is the concurrent execution of multiple threads to achieve parallelism and improve performance.

  • Multithreading allows multiple threads to run concurrently within a single process.

  • Threads share the same memory space and resources of the process they belong to.

  • Processes are independent instances of a program, each with its own memory space and resources.

  • Processes do not share memory directly and communicate through inter-process communication (IPC).

  • Threads are lig...read more

Add your answer
right arrow

Q146. OOPS concepts with examples

Ans.

OOPS concepts are fundamental principles in object-oriented programming.

  • Encapsulation: bundling data and methods together in a class

  • Inheritance: creating new classes from existing ones

  • Polymorphism: using a single interface to represent different types

  • Abstraction: hiding complex implementation details

  • Example: A class 'Car' with properties like 'color' and methods like 'startEngine'

Add your answer
right arrow

Q147. How do you define a composite Primary key?

Ans.

A composite primary key is a primary key that consists of two or more columns.

  • A composite primary key is used when a single column cannot uniquely identify a record.

  • It is created by combining two or more columns that together uniquely identify a record.

  • Each column in a composite primary key must be unique and not null.

  • Example: A table of orders may have a composite primary key consisting of order number and customer ID.

Add your answer
right arrow

Q148. Have u worked on Java and Selenium?

Ans.

Yes, I have worked extensively on Java and Selenium.

  • I have experience in developing and executing automated test scripts using Selenium WebDriver with Java.

  • I have worked on various frameworks like TestNG, JUnit, and Cucumber for test automation.

  • I have also integrated Selenium with other tools like Jenkins, Maven, and Git for continuous integration and delivery.

  • I have experience in debugging and troubleshooting issues in Selenium scripts.

  • I have worked on both web and mobile au...read more

Add your answer
right arrow

Q149. what is inheritance and its type?

Ans.

Inheritance is a concept in object-oriented programming where a class inherits properties and behaviors from another class.

  • Inheritance allows for code reuse and promotes modularity.

  • There are different types of inheritance: single, multiple, multilevel, and hierarchical.

  • Example: A 'Car' class can inherit properties and behaviors from a 'Vehicle' class.

Add your answer
right arrow

Q150. How DAG handle Fault tolerance?

Ans.

DAGs handle fault tolerance by rerunning failed tasks and maintaining task dependencies.

  • DAGs rerun failed tasks automatically to ensure completion.

  • DAGs maintain task dependencies to ensure proper sequencing.

  • DAGs can be configured to retry failed tasks a certain number of times before marking them as failed.

Add your answer
right arrow
Asked in
SDE Interview

Q151. What is foreign key and how you can you can use foreign key in your DBMS system?

Ans.

Foreign key is a key used to link two tables in a database, enforcing referential integrity.

  • Foreign key is a column or a set of columns in one table that references the primary key in another table.

  • It ensures that the values in the foreign key column(s) match the values in the primary key column of the referenced table.

  • Foreign key constraints help maintain data integrity by preventing actions that would destroy links between tables.

  • For example, in a database with tables 'Orde...read more

Add your answer
right arrow

Q152. linux give the command which tells the process status

Ans.

The command to check process status in Linux is 'ps'.

  • The 'ps' command displays information about active processes on the system.

  • It provides details such as process ID (PID), CPU and memory usage, and process status.

  • Additional options can be used with 'ps' to customize the output, such as 'ps aux' to display all processes.

  • To continuously monitor process status, 'ps' can be combined with other commands like 'watch' or 'top'.

Add your answer
right arrow

Q153. Class A{int num=60;} Class B extends A{int num=100; main(){ A a=new B; Sop(a.num);//output}}

Ans.

Output of a Java program that extends a class and overrides a variable

  • Class B extends Class A and overrides the variable num with a value of 100

  • In the main method, an object of Class B is created and assigned to a reference variable of Class A

  • When the value of num is accessed using the reference variable, the output will be 60 as it is the value of num in Class A

Add your answer
right arrow

Q154. what are Design Patters? What is DI?

Ans.

Design patterns are reusable solutions to common problems in software design. DI stands for Dependency Injection, a design pattern used to inject dependencies into a class.

  • Design patterns are best practices for solving common software design problems.

  • DI is a design pattern where dependencies are injected into a class rather than created within the class.

  • Examples of design patterns include Singleton, Factory, and Observer.

  • Dependency Injection helps improve code maintainability...read more

Add your answer
right arrow

Q155. Internal Working of HashMap

Ans.

HashMap is a data structure that stores key-value pairs and uses hashing to quickly retrieve values based on keys.

  • HashMap internally uses an array of linked lists to store key-value pairs.

  • When a key-value pair is added, the key is hashed to determine the index in the array where it will be stored.

  • If multiple keys hash to the same index, a linked list is used to handle collisions.

  • To retrieve a value, the key is hashed again to find the corresponding index and then the linked l...read more

Add your answer
right arrow

Q156. What is python testing and their unittest

Ans.

Python testing is a process of verifying the functionality of code. Unittest is a built-in testing framework in Python.

  • Python testing is done to ensure that the code is working as expected.

  • Unittest is a testing framework that comes with Python's standard library.

  • It provides a set of tools for constructing and running tests.

  • Tests are written as methods within a class that inherits from unittest.TestCase.

  • Assertions are used to check if the expected output matches the actual out...read more

Add your answer
right arrow

Q157. Explain Lambda functions. Map, reduce, filter etc.

Ans.

Lambda functions are anonymous functions that can be passed as arguments to other functions.

  • Lambda functions are also known as anonymous functions because they don't have a name.

  • They are often used as arguments to higher-order functions like map, reduce, and filter.

  • Map applies a function to each element of an array and returns a new array with the results.

  • Reduce applies a function to the elements of an array and returns a single value.

  • Filter applies a function to each element...read more

Add your answer
right arrow

Q158. What is difference between List and Tuple in python?

Ans.

List is mutable, Tuple is immutable in Python.

  • List can be modified after creation, Tuple cannot be modified.

  • List uses square brackets [], Tuple uses parentheses ().

  • List is used for collections of items that may need to be changed, Tuple is used for collections of items that should not change.

  • Example: list_example = [1, 2, 3], tuple_example = (4, 5, 6)

Add your answer
right arrow

Q159. Joins in SQL ?

Ans.

Joins in SQL are used to combine rows from two or more tables based on a related column between them.

  • Joins are used to retrieve data from multiple tables based on a related column

  • Common types of joins include INNER JOIN, LEFT JOIN, RIGHT JOIN, and FULL JOIN

  • INNER JOIN returns rows when there is at least one match in both tables

  • LEFT JOIN returns all rows from the left table and the matched rows from the right table

  • RIGHT JOIN returns all rows from the right table and the matched...read more

Add your answer
right arrow

Q160. Pillars of OOP ?

Ans.

Pillars of OOP are Inheritance, Encapsulation, Abstraction, and Polymorphism.

  • Inheritance allows a class to inherit properties and behavior from another class.

  • Encapsulation restricts access to certain components of an object, protecting its integrity.

  • Abstraction hides complex implementation details and only shows the necessary features.

  • Polymorphism allows objects to be treated as instances of their parent class or their own class.

Add your answer
right arrow

Q161. How Agile process works

Ans.

Agile process involves iterative development, collaboration, and flexibility in responding to change.

  • Agile process breaks down projects into smaller, manageable tasks called sprints.

  • Teams work in short iterations, typically 2-4 weeks, to deliver working software.

  • Regular meetings like daily stand-ups, sprint planning, and retrospectives help keep the team on track.

  • Customer feedback is incorporated throughout the development process to ensure the final product meets their needs...read more

Add your answer
right arrow

Q162. When we use ssis packages? Difference between union merge

Ans.

SSIS packages are used for ETL processes in SQL Server. Union combines datasets vertically, while merge combines them horizontally.

  • SSIS packages are used for Extract, Transform, Load (ETL) processes in SQL Server.

  • Union in SSIS combines datasets vertically, stacking rows on top of each other.

  • Merge in SSIS combines datasets horizontally, matching rows based on specified columns.

  • Union All in SSIS combines datasets vertically without removing duplicates.

  • Merge Join in SSIS combine...read more

Add your answer
right arrow

Q163. Tell us about Quality Assurance process as I was hired for Quality department

Ans.

Quality Assurance process involves ensuring products meet standards and customer expectations.

  • Developing quality standards and procedures

  • Testing products to identify defects

  • Implementing corrective actions

  • Continuous monitoring and improvement

  • Training staff on quality processes

Add your answer
right arrow

Q164. How to share data between two components each other

Ans.

Use props to pass data from parent component to child component, and use state to manage shared data between sibling components.

  • Pass data from parent to child components using props

  • Use state management libraries like Redux or Context API to share data between sibling components

  • Use event emitters or callbacks to communicate between components

Add your answer
right arrow

Q165. some applications of different data structures in real life

Ans.

Data structures like arrays, linked lists, and trees are used in real life applications for efficient storage and retrieval of information.

  • Arrays are used in databases to store and retrieve large amounts of data efficiently.

  • Linked lists are used in task scheduling algorithms to keep track of tasks and their dependencies.

  • Trees are used in file systems to organize and search for files and folders.

  • Graphs are used in social networks to represent relationships between users.

  • Hash t...read more

Add your answer
right arrow

Q166. Given an input string s ="aabbbcddbb". Write a java program to get output as a2b3c1d2b2

Ans.

Java program to count consecutive characters in a string

  • Iterate through the input string and compare each character with the next one

  • Use a StringBuilder to build the output string with character and count

  • Handle edge cases like empty string or single character input

Add your answer
right arrow

Q167. Write a Rest api to get employee details by employee id.

Ans.

A Rest api to get employee details by employee id

  • Create a GET endpoint with a path like '/employees/{employeeId}'

  • Retrieve employee details from a database using the employee id

  • Return the employee details in JSON format

Add your answer
right arrow

Q168. Explain dict, tuple, list, set, string etc.

Ans.

Data structures in Python: dict, tuple, list, set, string

  • dict: unordered collection of key-value pairs

  • tuple: ordered, immutable collection of elements

  • list: ordered, mutable collection of elements

  • set: unordered collection of unique elements

  • string: ordered collection of characters

Add your answer
right arrow

Q169. Puzzle on cutting cake in 8 same parts using only three cuts

Ans.

Cut the cake in 8 equal parts using only three cuts

  • Make two perpendicular cuts to divide the cake into four equal parts

  • Stack the four pieces on top of each other and make a single horizontal cut to divide them into eight equal parts

Add your answer
right arrow

Q170. What is relation between account and contact?

Ans.

Account and contact have a parent-child relationship in Salesforce.

  • An account represents a company or organization, while a contact represents an individual associated with that account.

  • An account can have multiple contacts, but a contact can only be associated with one account.

  • Contacts are linked to accounts through a lookup relationship.

  • Account and contact records can be related using the AccountId field on the contact object.

Add your answer
right arrow

Q171. Write a program using Java to find the counts of specified characters and replace them with corresponding numbers.

Ans.

A Java program to find and replace specified characters with corresponding numbers in an array of strings.

  • Iterate through each string in the array

  • Count the occurrences of specified characters

  • Replace the characters with corresponding numbers

  • Return the modified array of strings

Add your answer
right arrow

Q172. write a program on finding a position of number in fabonaci series

Ans.

Program to find the position of a number in the Fibonacci series.

  • Create a function that takes a number as input

  • Initialize variables to store the first two numbers of the Fibonacci series

  • Use a loop to generate the Fibonacci series until the desired number is found

  • Return the position of the number in the series

Add your answer
right arrow

Q173. SQL query to find 2nd highest salary.

Ans.

SQL query to find 2nd highest salary.

  • Use ORDER BY to sort the salaries in descending order

  • Use LIMIT to get the second highest salary

  • Use subquery to avoid duplicates if multiple employees have the same salary

View 1 answer
right arrow

Q174. Have you handled enterprise change management?

Ans.

Yes, I have experience in handling enterprise change management.

  • Led cross-functional teams through major system upgrades

  • Implemented new processes to improve efficiency and productivity

  • Communicated changes effectively to stakeholders at all levels

  • Managed resistance to change and ensured successful adoption

  • Utilized change management tools and methodologies such as ADKAR or Prosci

Add your answer
right arrow

Q175. Four pillars of OOPs

Ans.

Encapsulation, Inheritance, Polymorphism, Abstraction

  • Encapsulation: Bundling data and methods that operate on the data into a single unit

  • Inheritance: Ability to create a new class that inherits attributes and methods from an existing class

  • Polymorphism: Ability to present the same interface for different data types

  • Abstraction: Hiding the complex implementation details and showing only the necessary features

Add your answer
right arrow

Q176. AOT vs JIT compiler, Agile methodology

Ans.

AOT and JIT compilers are used to compile code, while Agile methodology is a project management approach.

  • AOT (Ahead of Time) compiler compiles code before it is executed, while JIT (Just in Time) compiler compiles code during runtime.

  • AOT is used in languages like C++, while JIT is used in languages like Java.

  • Agile methodology is a project management approach that emphasizes on iterative development, continuous feedback, and collaboration.

  • Agile methodology is used in software ...read more

Add your answer
right arrow

Q177. Java program to count frequency of characters in string

Ans.

Java program to count frequency of characters in string

  • Create a HashMap to store character and its frequency

  • Convert the string to char array

  • Iterate through the char array and update the frequency in HashMap

  • Print the HashMap

Add your answer
right arrow

Q178. What is CI Cd pipeline and string manipulation programs

Ans.

CI/CD pipeline is a set of automated processes for building, testing, and deploying software. String manipulation programs involve manipulating text data.

  • CI/CD pipeline automates the process of integrating code changes, testing them, and deploying them to production.

  • String manipulation programs involve tasks like searching, replacing, and modifying text data.

  • Examples of string manipulation programs include finding the length of a string, converting text to uppercase, and extr...read more

Add your answer
right arrow

Q179. What is class components and functional components

Ans.

Class components and functional components are two ways to create components in React Native.

  • Class components are created using ES6 class syntax and extend the React.Component class.

  • Functional components are created using JavaScript functions.

  • Class components have a state and lifecycle methods, while functional components do not.

  • Functional components are simpler and easier to test and maintain.

  • Class components are recommended for complex components with state and lifecycle ne...read more

View 1 answer
right arrow

Q180. Customization tools and details

Ans.

Customization tools and details are essential for tailoring engineering solutions to specific needs.

  • Customization tools allow for adjusting parameters to meet unique requirements

  • Details provide a deeper understanding of the system being engineered

  • Examples include CAD software for designing custom parts and simulation tools for optimizing performance

Add your answer
right arrow

Q181. Explain list slices, starts and ends at.

Ans.

List slices are a way to extract a portion of a list by specifying start and end indices.

  • List slices are denoted by using square brackets with start and end indices separated by a colon.

  • The start index is inclusive and the end index is exclusive.

  • If the start index is omitted, it defaults to 0. If the end index is omitted, it defaults to the length of the list.

  • Negative indices can be used to count from the end of the list.

  • List slices return a new list with the specified portio...read more

Add your answer
right arrow

Q182. 3. Write a program to find duplicates number from list

Ans.

Program to find duplicates in a list

  • Create an empty list to store duplicates

  • Loop through the list and check if the element appears more than once

  • If yes, add it to the duplicates list

  • Return the duplicates list

Add your answer
right arrow

Q183. What is OOPs, What are OOPs pillers?

Ans.

OOPs stands for Object-Oriented Programming. The pillars of OOPs are Inheritance, Encapsulation, Abstraction, and Polymorphism.

  • OOPs is a programming paradigm based on the concept of objects, which can contain data in the form of fields and code in the form of procedures.

  • The four pillars of OOPs are Inheritance, Encapsulation, Abstraction, and Polymorphism.

  • Inheritance allows a class to inherit properties and behavior from another class.

  • Encapsulation refers to the bundling of d...read more

Add your answer
right arrow

Q184. write a star program

Ans.

A star program prints a pattern of stars in a specific shape.

  • Use nested loops to control the number of rows and columns

  • Use if-else statements to determine when to print a star or a space

  • Example: Print a pyramid of stars with 5 rows

Add your answer
right arrow

Q185. datatypes in java

Ans.

Java has various datatypes like int, double, boolean, etc. to store different types of values.

  • Primitive datatypes include int, double, boolean, char, etc.

  • Reference datatypes include classes, interfaces, arrays, etc.

  • Examples: int num = 10; double price = 19.99; boolean isTrue = true;

Add your answer
right arrow

Q186. Write a program to demonstrate virtual function

Ans.

A program demonstrating virtual function in C++

  • Create a base class with a virtual function

  • Create derived classes that override the virtual function

  • Instantiate objects of derived classes and call the virtual function

Add your answer
right arrow

Q187. finding a liked list whether it is looping linked list or general linked list

Ans.

To find if a linked list is looping or general, we can use Floyd's Cycle Detection Algorithm.

  • Use Floyd's Cycle Detection Algorithm to detect a loop in a linked list

  • If there is a loop, the fast and slow pointers will meet at some point

  • If there is no loop, the fast pointer will reach the end of the list

Add your answer
right arrow

Q188. Draw flow diagram for ur project and explain it in brief

Add your answer
right arrow

Q189. create sql queries for different scenarios

Ans.

Creating SQL queries for different scenarios

  • Use SELECT statement to retrieve data from a table

  • Use WHERE clause to filter data based on specific conditions

  • Use JOIN clause to combine data from multiple tables

Add your answer
right arrow

Q190. Explain how security can be implemented for .net core

Ans.

Security in .NET Core can be implemented through various mechanisms such as authentication, authorization, data protection, and secure coding practices.

  • Use authentication mechanisms like JWT tokens or OAuth for user identity verification

  • Implement authorization policies to control access to resources based on roles or claims

  • Utilize data protection APIs to encrypt sensitive data at rest and in transit

  • Follow secure coding practices to prevent common security vulnerabilities like...read more

Add your answer
right arrow

Q191. How did you ensure code quality?

Ans.

Ensured code quality through code reviews, automated testing, and adherence to coding standards.

  • Conducted regular code reviews to identify and fix any issues

  • Implemented automated testing to catch errors before deployment

  • Followed coding standards and best practices to ensure consistency and readability

  • Used tools like SonarQube to analyze code quality and identify areas for improvement

Add your answer
right arrow

Q192. What if there is no server in springboot

Ans.

Spring Boot is designed to be a standalone application, so it can run without a separate server.

  • Spring Boot includes an embedded server (like Tomcat or Jetty) so it can run independently.

  • The embedded server is included in the application's JAR file, making it self-contained.

  • This allows Spring Boot applications to be easily deployed and run without the need for a separate server installation.

Add your answer
right arrow

Q193. What is redux? Which library use for Navigation?

Ans.

Redux is a predictable state container for JavaScript apps. React Navigation is used for navigation in React Native.

  • Redux is a state management library commonly used with React to manage application state in a predictable way.

  • It helps in maintaining a single source of truth for the state of the entire application.

  • Redux works by having a central store that holds the entire state tree of the application.

  • React Navigation is a library used for navigation in React Native applicati...read more

Add your answer
right arrow

Q194. How to install Robot Framework? How to execute multiple testcase using Robot Framework? What are the reporting methods and how to Archive reports?

Add your answer
right arrow

Q195. write a program to draw square without using recatangle function in c++

Add your answer
right arrow

Q196. how we can use cpp methods in java application

Ans.

It is not possible to directly use C++ methods in a Java application.

  • C++ and Java are different programming languages with different syntax and runtime environments.

  • To use C++ methods in a Java application, you would need to create a bridge between the two languages.

  • One approach is to use Java Native Interface (JNI) to call C++ code from Java.

  • Another approach is to use a language interoperability framework like SWIG or JNA.

  • You can also consider rewriting the C++ code in Java ...read more

Add your answer
right arrow

Q197. Explain ownership of the project approach.

Ans.

Ownership of the project approach refers to taking responsibility for the project's success and making decisions accordingly.

  • The owner of the project approach should have a clear understanding of the project's goals and objectives.

  • They should be able to make informed decisions about the project's direction and prioritize tasks accordingly.

  • The owner should also be accountable for the project's success or failure and be willing to take corrective action when necessary.

  • Effective...read more

Add your answer
right arrow

Q198. Can we use list as dict key?

Ans.

Yes, but only if the list is immutable.

  • Lists are mutable and cannot be used as dict keys.

  • Tuples are immutable and can be used as dict keys.

  • If a list needs to be used as a key, it can be converted to a tuple.

Add your answer
right arrow

Q199. How to resolve the system slow issue

Ans.

To resolve system slow issue, check for malware, clear cache, update drivers, and increase RAM.

  • Scan for malware and viruses using antivirus software

  • Clear cache and temporary files

  • Update drivers for hardware components

  • Increase RAM if possible

  • Disable unnecessary startup programs

  • Defragment hard drive

  • Check for overheating and clean the system if necessary

Add your answer
right arrow

Q200. Explain Oops concepts and object oriented programming approach.

Ans.

Object-oriented programming is a programming paradigm that uses objects to represent and manipulate data.

  • Encapsulation: bundling data and methods together in a class

  • Inheritance: creating new classes from existing ones

  • Polymorphism: using a single interface to represent different types

  • Abstraction: simplifying complex systems by breaking them into smaller, manageable parts

Add your answer
right arrow
Previous
1
2
3
4
5
Next
Contribute & help others!
Write a review
Write a review
Share interview
Share interview
Contribute salary
Contribute salary
Add office photos
Add office photos

Interview Process at Persistent Systems

based on 548 interviews
Interview experience
3.9
Good
View more
interview tips and stories logo
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Interview Questions from Similar Companies

PwC Logo
3.4
 • 792 Interview Questions
BYJU'S Logo
3.1
 • 686 Interview Questions
Morgan Stanley Logo
3.7
 • 262 Interview Questions
Atos Logo
3.9
 • 185 Interview Questions
iEnergizer Logo
4.6
 • 159 Interview Questions
Fujitsu Logo
3.8
 • 135 Interview Questions
View all
Recently Viewed
REVIEWS
Tata Motors Finance
No Reviews
JOBS
Aquila Finance
No Jobs
JOBS
Rohini Hospital
No Jobs
SALARIES
Tata Motors Finance
INTERVIEWS
Tata Motors Finance
No Interviews
SALARIES
Tata Motors Finance
JOBS
SIB Operations and Services
No Jobs
REVIEWS
Tata Motors Finance
No Reviews
JOBS
HiLITE Group
No Jobs
REVIEWS
Tata Motors Finance
No Reviews
Top Persistent Systems Interview Questions And Answers
Share an Interview
Stay ahead in your career. Get AmbitionBox app
play-icon
play-icon
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
75 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter