Persistent Systems
400+ Interview Questions and Answers
Q101. What is dependency Injection, how can we implement multiple interference?
Dependency Injection is a design pattern where components are given their dependencies rather than creating them internally.
Dependency Injection helps in making components more modular, testable, and reusable.
It can be implemented using constructor injection, setter injection, or interface injection.
Multiple inheritance can be implemented in languages like C++ using virtual inheritance to avoid the diamond problem.
Q102. Upon receiving client requirement to create APIs, what are the intial steps you will take?
The initial steps involve understanding the client requirements, analyzing the scope of work, and creating a plan for API development.
Meet with the client to discuss their requirements and goals for the APIs
Gather detailed information about the data and functionality that the APIs need to provide
Analyze the scope of work and determine the resources and timeline needed for development
Create a plan outlining the steps involved in API development, including design, implementatio...read more
Q103. Write a program to find the reverse of a string
A program to reverse a string
Iterate through the characters of the string from the last to the first
Append each character to a new string
Return the reversed string
Q104. What is array in. Python
An array in Python is a data structure that can hold multiple values of the same data type.
Arrays in Python are created using square brackets []
Elements in an array can be accessed using their index starting from 0
Example: names = ['Alice', 'Bob', 'Charlie']
Q105. Whats the difference between @Service and @Component annotations?
The @Service annotation is a specialization of the @Component annotation and is used to indicate that a class is a service.
Both @Service and @Component annotations are used to indicate that a class is a Spring-managed component.
@Service is a specialization of @Component and is used to indicate that a class is a service layer component.
The @Service annotation is used to add a layer of abstraction between the controller and the DAO layer.
The @Service annotation is used to provi...read more
Q106. Scenarios to implement code.
Scenarios for implementing code
Implementing a new feature
Fixing a bug
Optimizing code for performance
Refactoring existing code
Integrating with third-party APIs
Handling errors and exceptions
Writing unit tests
Adding new functionality to an existing system
Q107. What is Oopps? Concept of polmorphism.
OOPs stands for Object-Oriented Programming. Polymorphism is the ability of an object to take on many forms.
OOPs is a programming paradigm that focuses on objects and their interactions.
Polymorphism allows objects of different classes to be treated as if they are of the same class.
There are two types of polymorphism: compile-time and runtime.
Compile-time polymorphism is achieved through method overloading.
Runtime polymorphism is achieved through method overriding.
Example of p...read more
Q108. How many python modules you have used?
I have used multiple python modules for various purposes.
I have used NumPy for numerical computations.
I have used Pandas for data analysis and manipulation.
I have used Matplotlib for data visualization.
I have used Flask for web development.
I have used Requests for making HTTP requests.
I have used BeautifulSoup for web scraping.
I have used Scikit-learn for machine learning tasks.
I have used TensorFlow for deep learning tasks.
Q109. From a js nested object, print only values not keys.
Print only values from a nested JS object
Use Object.values() to get an array of values
Recursively iterate through nested objects
Filter out non-object values before iterating
Q110. How would you convince the client if is not agreeing with your design?
I would present the client with a detailed explanation of the design, highlighting its benefits and addressing any concerns they may have.
Listen to the client's concerns and understand their perspective
Explain the design concept clearly and address how it meets the client's needs
Provide visual aids such as sketches or 3D models to help the client visualize the design
Offer alternative solutions or compromises that may address the client's concerns while still maintaining the i...read more
Q111. How to make call from one namespace t another in AKS environment
To make a call from one namespace to another in AKS environment, use the fully qualified domain name (FQDN) of the service.
Use the FQDN of the service to make a call from one namespace to another in AKS environment
The FQDN should include the namespace and service name, for example: myservice.mynamespace.svc.cluster.local
Ensure that the service is exposed within the cluster and has a stable IP address
Use the appropriate network policies to allow traffic between namespaces if n...read more
Q112. query on sql to find the names of the person who is having same name
Q113. what are arrow functions
Arrow functions are a concise way to write functions in JavaScript.
They have a shorter syntax than traditional function expressions.
They do not have their own 'this' keyword.
They are not suitable for methods, constructors, or prototype methods.
Example: const add = (a, b) => a + b;
Example: const square = x => x * x;
Q114. why nodejs is single Threaded
Node.js is single-threaded to optimize performance and simplify programming.
Node.js uses an event-driven, non-blocking I/O model.
This allows for efficient handling of multiple requests without creating new threads.
Node.js also uses a single event loop to manage all I/O operations.
This simplifies programming by eliminating the need for complex thread synchronization.
However, Node.js can still take advantage of multi-core systems by creating child processes.
Q115. Working concepts of loops , map , list problem statment.
Loops, map, and list are fundamental concepts in programming.
Loops are used to repeat a block of code until a certain condition is met.
Map is a higher-order function that applies a given function to each element of a list and returns a new list.
List is a collection of elements that can be accessed by their index.
Example: for loop, map function, list comprehension.
Q116. Testing methodologies Defect life-cycle Example of high priority and low severity defect and vice versa What is Agile
Testing methodologies, defect life-cycle, high priority vs low severity defects, and Agile.
Testing methodologies include black box, white box, and grey box testing.
Defect life-cycle includes identification, logging, prioritization, fixing, retesting, and closure.
High priority and low severity defect example: spelling mistake in a critical message.
Low priority and high severity defect example: cosmetic issue in a non-critical area.
Agile is an iterative and incremental approach...read more
Q117. Regex matcher problem
Regex matcher problem involves matching patterns in strings using regular expressions.
Understand the requirements of the regex pattern to be matched
Use tools like regex101.com to test and validate the regex pattern
Consider special characters and escape sequences in the regex pattern
Q118. Explain Data structures
Data structures are ways of organizing and storing data in a computer so that it can be accessed and used efficiently.
Data structures are used to manage and manipulate data in programs.
They can be implemented using arrays, linked lists, trees, graphs, and other techniques.
Examples include stacks, queues, hash tables, and binary search trees.
Choosing the right data structure for a particular problem can greatly improve program efficiency.
Q119. explain dml, ddl, tcl...
DML, DDL, and TCL are types of SQL commands used to manipulate databases.
DML (Data Manipulation Language) is used to manipulate data in a database, such as inserting, updating, and deleting records.
DDL (Data Definition Language) is used to define the structure of a database, such as creating tables, indexes, and constraints.
TCL (Transaction Control Language) is used to manage transactions in a database, such as committing or rolling back changes.
Examples of DML commands inclu...read more
Q120. Multithreading. Ways of synchronisation. How to handle exceptions.
Multithreading synchronization and exception handling in Java.
Synchronization can be achieved using synchronized keyword, locks, and semaphores.
Exceptions can be handled using try-catch blocks, finally block, and throwing exceptions.
Deadlock can be avoided by acquiring locks in a consistent order.
Thread safety can be ensured by using immutable objects and thread-safe collections.
Examples of thread-safe collections are ConcurrentHashMap and CopyOnWriteArrayList.
Q121. write a sql query to select 2nd highest from a column of a table
SQL query to select 2nd highest from a column of a table
Use ORDER BY to sort the column in descending order
Use LIMIT to select the second row
Use subquery to avoid duplicates
Q122. How do you suggest an engagement model to a customer problem?
Engage with the customer to understand their problem and suggest a suitable engagement model.
Listen actively to the customer's problem and ask relevant questions to gain a deeper understanding.
Identify the customer's goals and priorities to suggest an engagement model that aligns with their needs.
Consider factors such as budget, timeline, and resources when proposing an engagement model.
Provide clear and concise explanations of the proposed engagement model and its benefits t...read more
Q123. List manipulation using list comprehension and lambda function for prime number
Using list comprehension and lambda function to manipulate a list of prime numbers
Use list comprehension to generate a list of numbers
Use a lambda function to check if a number is prime
Filter the list of numbers using the lambda function to get prime numbers
Q124. How our microservices are communicate with each other
Microservices communicate with each other through APIs and message queues.
Microservices use APIs to send and receive data between each other.
They can also utilize message queues for asynchronous communication.
APIs can be RESTful or use other protocols like gRPC.
Message queues like RabbitMQ or Kafka enable decoupled communication.
Microservices can also use events or pub/sub patterns for communication.
Q125. How do you handle Incremental data?
Incremental data is handled by identifying new data since the last update and merging it with existing data.
Identify new data since last update
Merge new data with existing data
Update data warehouse or database with incremental changes
Q126. Using two tables find the different records for different joins
To find different records for different joins using two tables
Use the SQL query to perform different joins like INNER JOIN, LEFT JOIN, RIGHT JOIN, and FULL JOIN
Identify the key columns in both tables to join on
Select the columns from both tables and use WHERE clause to filter out the different records
Q127. What happens when we enforce schema ?
Enforcing schema ensures that data conforms to a predefined structure and rules.
Ensures data integrity by validating incoming data against predefined schema
Helps in maintaining consistency and accuracy of data
Prevents data corruption and errors in data processing
Can lead to rejection of data that does not adhere to the schema
Q128. Implement String class
Implement a custom String class in a programming language.
Define a class with necessary properties and methods to manipulate strings.
Include methods for concatenation, substring, length, etc.
Handle memory allocation and deallocation properly.
Example: class MyString { // implementation }
Q129. difference between node and expressjs
Node is a runtime environment for executing JavaScript code, while Express is a web application framework built on top of Node.
Node provides the platform for running JavaScript code outside of a web browser
Express is a lightweight framework that simplifies building web applications on top of Node
Express provides features like routing, middleware, and templating that make it easier to build web applications
Node and Express are often used together to build scalable and efficien...read more
Q130. What does the HTTP error codes 400, 500 represent?
HTTP error codes 400 and 500 represent client and server errors respectively.
HTTP error code 400 indicates a client-side error, such as a bad request or invalid input.
HTTP error code 500 indicates a server-side error, such as an internal server error or database connection issue.
Other common client-side errors include 401 (unauthorized), 403 (forbidden), and 404 (not found).
Other common server-side errors include 503 (service unavailable) and 504 (gateway timeout).
Q131. Difference between tuple,list
Tuple is immutable and ordered while list is mutable and ordered.
Tuple is defined using () while list is defined using []
Tuple cannot be modified while list can be modified
Tuple is faster than list for accessing elements
Tuple is used for fixed data while list is used for dynamic data
Example: tuple = (1, 2, 3) and list = [1, 2, 3]
Q132. Why NextJs is preferred over react js
Next.js is preferred over React.js for server-side rendering, automatic code splitting, and simplified routing.
Next.js provides built-in support for server-side rendering, improving performance and SEO.
Automatic code splitting in Next.js allows for faster page loads by only loading necessary code.
Next.js simplifies routing with file-based routing, making it easier to organize and navigate between pages.
Next.js also offers features like static site generation and API routes fo...read more
Q133. .Net Core middleware, when we required custom middleware?
Custom middleware in .Net Core is required when we need to add additional processing logic to the request pipeline.
Custom authentication
Request logging
Error handling
Response compression
Q134. Validation on how much exposure to the product
Exposure to the product can be validated through hands-on experience, user feedback, market research, and data analysis.
Hands-on experience with the product through development and testing
User feedback from customers or internal stakeholders
Market research to understand the competitive landscape and user preferences
Data analysis of usage metrics, customer behavior, and product performance
Examples: Conducting user interviews, A/B testing features, analyzing sales data
Q135. What is python testing and their unittest
Python testing is a process of verifying the functionality of code. Unittest is a built-in testing framework in Python.
Python testing is done to ensure that the code is working as expected.
Unittest is a testing framework that comes with Python's standard library.
It provides a set of tools for constructing and running tests.
Tests are written as methods within a class that inherits from unittest.TestCase.
Assertions are used to check if the expected output matches the actual out...read more
Q136. Explain Lambda functions. Map, reduce, filter etc.
Lambda functions are anonymous functions that can be passed as arguments to other functions.
Lambda functions are also known as anonymous functions because they don't have a name.
They are often used as arguments to higher-order functions like map, reduce, and filter.
Map applies a function to each element of an array and returns a new array with the results.
Reduce applies a function to the elements of an array and returns a single value.
Filter applies a function to each element...read more
Q137. What is abstract class Difference between final,finally finalize Different types of polymorphism
Abstract class is a class that cannot be instantiated and may contain abstract methods.
Abstract class cannot be instantiated directly.
It may contain abstract methods that must be implemented by the subclass.
Example: abstract class Shape { abstract void draw(); }
Q138. How does a concurrent Hash Map works internally?
Concurrent Hash Map is a thread-safe implementation of Hash Map.
Uses multiple segments to allow concurrent access
Each segment is a separate hash table with its own lock
Segments are dynamically added or removed based on usage
Uses CAS (Compare and Swap) operation for updates
Provides higher concurrency than synchronized Hash Map
Q139. What is multi threading and difference between threads and processes
Multithreading is the concurrent execution of multiple threads to achieve parallelism and improve performance.
Multithreading allows multiple threads to run concurrently within a single process.
Threads share the same memory space and resources of the process they belong to.
Processes are independent instances of a program, each with its own memory space and resources.
Processes do not share memory directly and communicate through inter-process communication (IPC).
Threads are lig...read more
Q140. Explain dict, tuple, list, set, string etc.
Data structures in Python: dict, tuple, list, set, string
dict: unordered collection of key-value pairs
tuple: ordered, immutable collection of elements
list: ordered, mutable collection of elements
set: unordered collection of unique elements
string: ordered collection of characters
Q141. OOPS concepts with examples
OOPS concepts are fundamental principles in object-oriented programming.
Encapsulation: bundling data and methods together in a class
Inheritance: creating new classes from existing ones
Polymorphism: using a single interface to represent different types
Abstraction: hiding complex implementation details
Example: A class 'Car' with properties like 'color' and methods like 'startEngine'
Q142. Have u worked on Java and Selenium?
Yes, I have worked extensively on Java and Selenium.
I have experience in developing and executing automated test scripts using Selenium WebDriver with Java.
I have worked on various frameworks like TestNG, JUnit, and Cucumber for test automation.
I have also integrated Selenium with other tools like Jenkins, Maven, and Git for continuous integration and delivery.
I have experience in debugging and troubleshooting issues in Selenium scripts.
I have worked on both web and mobile au...read more
Q143. what is inheritance and its type?
Inheritance is a concept in object-oriented programming where a class inherits properties and behaviors from another class.
Inheritance allows for code reuse and promotes modularity.
There are different types of inheritance: single, multiple, multilevel, and hierarchical.
Example: A 'Car' class can inherit properties and behaviors from a 'Vehicle' class.
Q144. How do you define a composite Primary key?
A composite primary key is a primary key that consists of two or more columns.
A composite primary key is used when a single column cannot uniquely identify a record.
It is created by combining two or more columns that together uniquely identify a record.
Each column in a composite primary key must be unique and not null.
Example: A table of orders may have a composite primary key consisting of order number and customer ID.
Q145. How DAG handle Fault tolerance?
DAGs handle fault tolerance by rerunning failed tasks and maintaining task dependencies.
DAGs rerun failed tasks automatically to ensure completion.
DAGs maintain task dependencies to ensure proper sequencing.
DAGs can be configured to retry failed tasks a certain number of times before marking them as failed.
Q146. what are Design Patters? What is DI?
Design patterns are reusable solutions to common problems in software design. DI stands for Dependency Injection, a design pattern used to inject dependencies into a class.
Design patterns are best practices for solving common software design problems.
DI is a design pattern where dependencies are injected into a class rather than created within the class.
Examples of design patterns include Singleton, Factory, and Observer.
Dependency Injection helps improve code maintainability...read more
Q147. What is foreign key and how you can you can use foreign key in your DBMS system?
Foreign key is a key used to link two tables in a database, enforcing referential integrity.
Foreign key is a column or a set of columns in one table that references the primary key in another table.
It ensures that the values in the foreign key column(s) match the values in the primary key column of the referenced table.
Foreign key constraints help maintain data integrity by preventing actions that would destroy links between tables.
For example, in a database with tables 'Orde...read more
Q148. linux give the command which tells the process status
The command to check process status in Linux is 'ps'.
The 'ps' command displays information about active processes on the system.
It provides details such as process ID (PID), CPU and memory usage, and process status.
Additional options can be used with 'ps' to customize the output, such as 'ps aux' to display all processes.
To continuously monitor process status, 'ps' can be combined with other commands like 'watch' or 'top'.
Q149. Class A{int num=60;} Class B extends A{int num=100; main(){ A a=new B; Sop(a.num);//output}}
Output of a Java program that extends a class and overrides a variable
Class B extends Class A and overrides the variable num with a value of 100
In the main method, an object of Class B is created and assigned to a reference variable of Class A
When the value of num is accessed using the reference variable, the output will be 60 as it is the value of num in Class A
Q150. Internal Working of HashMap
HashMap is a data structure that stores key-value pairs and uses hashing to quickly retrieve values based on keys.
HashMap internally uses an array of linked lists to store key-value pairs.
When a key-value pair is added, the key is hashed to determine the index in the array where it will be stored.
If multiple keys hash to the same index, a linked list is used to handle collisions.
To retrieve a value, the key is hashed again to find the corresponding index and then the linked l...read more
Q151. Explain list slices, starts and ends at.
List slices are a way to extract a portion of a list by specifying start and end indices.
List slices are denoted by using square brackets with start and end indices separated by a colon.
The start index is inclusive and the end index is exclusive.
If the start index is omitted, it defaults to 0. If the end index is omitted, it defaults to the length of the list.
Negative indices can be used to count from the end of the list.
List slices return a new list with the specified portio...read more
Q152. What is difference between List and Tuple in python?
List is mutable, Tuple is immutable in Python.
List can be modified after creation, Tuple cannot be modified.
List uses square brackets [], Tuple uses parentheses ().
List is used for collections of items that may need to be changed, Tuple is used for collections of items that should not change.
Example: list_example = [1, 2, 3], tuple_example = (4, 5, 6)
Q153. Joins in SQL ?
Joins in SQL are used to combine rows from two or more tables based on a related column between them.
Joins are used to retrieve data from multiple tables based on a related column
Common types of joins include INNER JOIN, LEFT JOIN, RIGHT JOIN, and FULL JOIN
INNER JOIN returns rows when there is at least one match in both tables
LEFT JOIN returns all rows from the left table and the matched rows from the right table
RIGHT JOIN returns all rows from the right table and the matched...read more
Q154. Pillars of OOP ?
Pillars of OOP are Inheritance, Encapsulation, Abstraction, and Polymorphism.
Inheritance allows a class to inherit properties and behavior from another class.
Encapsulation restricts access to certain components of an object, protecting its integrity.
Abstraction hides complex implementation details and only shows the necessary features.
Polymorphism allows objects to be treated as instances of their parent class or their own class.
Q155. How Agile process works
Agile process involves iterative development, collaboration, and flexibility in responding to change.
Agile process breaks down projects into smaller, manageable tasks called sprints.
Teams work in short iterations, typically 2-4 weeks, to deliver working software.
Regular meetings like daily stand-ups, sprint planning, and retrospectives help keep the team on track.
Customer feedback is incorporated throughout the development process to ensure the final product meets their needs...read more
Q156. When we use ssis packages? Difference between union merge
SSIS packages are used for ETL processes in SQL Server. Union combines datasets vertically, while merge combines them horizontally.
SSIS packages are used for Extract, Transform, Load (ETL) processes in SQL Server.
Union in SSIS combines datasets vertically, stacking rows on top of each other.
Merge in SSIS combines datasets horizontally, matching rows based on specified columns.
Union All in SSIS combines datasets vertically without removing duplicates.
Merge Join in SSIS combine...read more
Q157. Tell us about Quality Assurance process as I was hired for Quality department
Quality Assurance process involves ensuring products meet standards and customer expectations.
Developing quality standards and procedures
Testing products to identify defects
Implementing corrective actions
Continuous monitoring and improvement
Training staff on quality processes
Q158. How to share data between two components each other
Use props to pass data from parent component to child component, and use state to manage shared data between sibling components.
Pass data from parent to child components using props
Use state management libraries like Redux or Context API to share data between sibling components
Use event emitters or callbacks to communicate between components
Q159. Puzzle on cutting cake in 8 same parts using only three cuts
Q160. Explain ownership of the project approach.
Ownership of the project approach refers to taking responsibility for the project's success and making decisions accordingly.
The owner of the project approach should have a clear understanding of the project's goals and objectives.
They should be able to make informed decisions about the project's direction and prioritize tasks accordingly.
The owner should also be accountable for the project's success or failure and be willing to take corrective action when necessary.
Effective...read more
Q161. Can we use list as dict key?
Yes, but only if the list is immutable.
Lists are mutable and cannot be used as dict keys.
Tuples are immutable and can be used as dict keys.
If a list needs to be used as a key, it can be converted to a tuple.
Q162. What is relation between account and contact?
Account and contact have a parent-child relationship in Salesforce.
An account represents a company or organization, while a contact represents an individual associated with that account.
An account can have multiple contacts, but a contact can only be associated with one account.
Contacts are linked to accounts through a lookup relationship.
Account and contact records can be related using the AccountId field on the contact object.
Q163. write a program on finding a position of number in fabonaci series
Program to find the position of a number in the Fibonacci series.
Create a function that takes a number as input
Initialize variables to store the first two numbers of the Fibonacci series
Use a loop to generate the Fibonacci series until the desired number is found
Return the position of the number in the series
Q164. SQL query to find 2nd highest salary.
SQL query to find 2nd highest salary.
Use ORDER BY to sort the salaries in descending order
Use LIMIT to get the second highest salary
Use subquery to avoid duplicates if multiple employees have the same salary
Q165. Four pillars of OOPs
Encapsulation, Inheritance, Polymorphism, Abstraction
Encapsulation: Bundling data and methods that operate on the data into a single unit
Inheritance: Ability to create a new class that inherits attributes and methods from an existing class
Polymorphism: Ability to present the same interface for different data types
Abstraction: Hiding the complex implementation details and showing only the necessary features
Q166. AOT vs JIT compiler, Agile methodology
AOT and JIT compilers are used to compile code, while Agile methodology is a project management approach.
AOT (Ahead of Time) compiler compiles code before it is executed, while JIT (Just in Time) compiler compiles code during runtime.
AOT is used in languages like C++, while JIT is used in languages like Java.
Agile methodology is a project management approach that emphasizes on iterative development, continuous feedback, and collaboration.
Agile methodology is used in software ...read more
Q167. Java program to count frequency of characters in string
Java program to count frequency of characters in string
Create a HashMap to store character and its frequency
Convert the string to char array
Iterate through the char array and update the frequency in HashMap
Print the HashMap
Q168. What is CI Cd pipeline and string manipulation programs
CI/CD pipeline is a set of automated processes for building, testing, and deploying software. String manipulation programs involve manipulating text data.
CI/CD pipeline automates the process of integrating code changes, testing them, and deploying them to production.
String manipulation programs involve tasks like searching, replacing, and modifying text data.
Examples of string manipulation programs include finding the length of a string, converting text to uppercase, and extr...read more
Q169. What is class components and functional components
Class components and functional components are two ways to create components in React Native.
Class components are created using ES6 class syntax and extend the React.Component class.
Functional components are created using JavaScript functions.
Class components have a state and lifecycle methods, while functional components do not.
Functional components are simpler and easier to test and maintain.
Class components are recommended for complex components with state and lifecycle ne...read more
Q170. Customization tools and details
Customization tools and details are essential for tailoring engineering solutions to specific needs.
Customization tools allow for adjusting parameters to meet unique requirements
Details provide a deeper understanding of the system being engineered
Examples include CAD software for designing custom parts and simulation tools for optimizing performance
Q171. write a star program
A star program prints a pattern of stars in a specific shape.
Use nested loops to control the number of rows and columns
Use if-else statements to determine when to print a star or a space
Example: Print a pyramid of stars with 5 rows
Q172. datatypes in java
Java has various datatypes like int, double, boolean, etc. to store different types of values.
Primitive datatypes include int, double, boolean, char, etc.
Reference datatypes include classes, interfaces, arrays, etc.
Examples: int num = 10; double price = 19.99; boolean isTrue = true;
Q173. 3. Write a program to find duplicates number from list
Program to find duplicates in a list
Create an empty list to store duplicates
Loop through the list and check if the element appears more than once
If yes, add it to the duplicates list
Return the duplicates list
Q174. some applications of different data structures in real life
Q175. What is OOPs, What are OOPs pillers?
OOPs stands for Object-Oriented Programming. The pillars of OOPs are Inheritance, Encapsulation, Abstraction, and Polymorphism.
OOPs is a programming paradigm based on the concept of objects, which can contain data in the form of fields and code in the form of procedures.
The four pillars of OOPs are Inheritance, Encapsulation, Abstraction, and Polymorphism.
Inheritance allows a class to inherit properties and behavior from another class.
Encapsulation refers to the bundling of d...read more
Q176. Write a program to demonstrate virtual function
A program demonstrating virtual function in C++
Create a base class with a virtual function
Create derived classes that override the virtual function
Instantiate objects of derived classes and call the virtual function
Q177. Explain how security can be implemented for .net core
Security in .NET Core can be implemented through various mechanisms such as authentication, authorization, data protection, and secure coding practices.
Use authentication mechanisms like JWT tokens or OAuth for user identity verification
Implement authorization policies to control access to resources based on roles or claims
Utilize data protection APIs to encrypt sensitive data at rest and in transit
Follow secure coding practices to prevent common security vulnerabilities like...read more
Q178. Draw flow diagram for ur project and explain it in brief
Q179. create sql queries for different scenarios
Creating SQL queries for different scenarios
Use SELECT statement to retrieve data from a table
Use WHERE clause to filter data based on specific conditions
Use JOIN clause to combine data from multiple tables
Q180. finding a liked list whether it is looping linked list or general linked list
Q181. What is redux? Which library use for Navigation?
Redux is a predictable state container for JavaScript apps. React Navigation is used for navigation in React Native.
Redux is a state management library commonly used with React to manage application state in a predictable way.
It helps in maintaining a single source of truth for the state of the entire application.
Redux works by having a central store that holds the entire state tree of the application.
React Navigation is a library used for navigation in React Native applicati...read more
Q182. How did you ensure code quality?
Ensured code quality through code reviews, automated testing, and adherence to coding standards.
Conducted regular code reviews to identify and fix any issues
Implemented automated testing to catch errors before deployment
Followed coding standards and best practices to ensure consistency and readability
Used tools like SonarQube to analyze code quality and identify areas for improvement
Q183. What if there is no server in springboot
Spring Boot is designed to be a standalone application, so it can run without a separate server.
Spring Boot includes an embedded server (like Tomcat or Jetty) so it can run independently.
The embedded server is included in the application's JAR file, making it self-contained.
This allows Spring Boot applications to be easily deployed and run without the need for a separate server installation.
Q184. How to install Robot Framework? How to execute multiple testcase using Robot Framework? What are the reporting methods and how to Archive reports?
Q185. How to resolve the system slow issue
To resolve system slow issue, check for malware, clear cache, update drivers, and increase RAM.
Scan for malware and viruses using antivirus software
Clear cache and temporary files
Update drivers for hardware components
Increase RAM if possible
Disable unnecessary startup programs
Defragment hard drive
Check for overheating and clean the system if necessary
Q186. write a program to draw square without using recatangle function in c++
Q187. how we can use cpp methods in java application
It is not possible to directly use C++ methods in a Java application.
C++ and Java are different programming languages with different syntax and runtime environments.
To use C++ methods in a Java application, you would need to create a bridge between the two languages.
One approach is to use Java Native Interface (JNI) to call C++ code from Java.
Another approach is to use a language interoperability framework like SWIG or JNA.
You can also consider rewriting the C++ code in Java ...read more
Q188. Explain Oops concepts and object oriented programming approach.
Object-oriented programming is a programming paradigm that uses objects to represent and manipulate data.
Encapsulation: bundling data and methods together in a class
Inheritance: creating new classes from existing ones
Polymorphism: using a single interface to represent different types
Abstraction: simplifying complex systems by breaking them into smaller, manageable parts
Q189. NodeJs is single threaded but how it achieved multiple threading
NodeJs achieves multiple threading through event loop and asynchronous non-blocking I/O operations.
NodeJs uses event loop to handle multiple requests efficiently without blocking the main thread.
It utilizes asynchronous non-blocking I/O operations to perform tasks concurrently.
NodeJs can also create child processes to handle heavy computational tasks in parallel.
Q190. How to access the Microservice end point
Microservice endpoints can be accessed using HTTP requests with the appropriate URL
Use HTTP methods like GET, POST, PUT, DELETE to interact with the microservice
Construct the URL with the base URL of the microservice and the specific endpoint path
Include any necessary headers or parameters in the request for authentication or data filtering
Q191. What is TSQL and optimization techniques
TSQL is a Microsoft proprietary extension of SQL used for querying and managing relational databases.
TSQL stands for Transact-SQL and is used in Microsoft SQL Server.
Optimization techniques in TSQL include indexing, query tuning, and avoiding unnecessary joins.
Examples of optimization techniques in TSQL include using appropriate indexes on frequently queried columns and avoiding using functions in WHERE clauses.
Q192. What is the full form vga cabel
VGA stands for Video Graphics Array.
VGA is a standard video connection used to connect a computer to a monitor or display.
It is an analog video signal that carries red, green, and blue color information.
VGA cables have 15 pins and are commonly used for older computer systems.
VGA cables are gradually being replaced by digital connections like HDMI and DisplayPort.
Q193. Program to write odd and even by using third variable
A program to write odd and even numbers using a third variable.
Declare three variables: num, even, and odd.
Take input from the user for num.
Use if-else statement to check if num is even or odd.
If even, assign num to even variable, else assign to odd variable.
Print even and odd variables.
Q194. Program to read data from excel
A program to read data from excel.
Use a library like Apache POI or OpenPyXL to read excel files.
Identify the sheet and cell range to read data from.
Parse the data and store it in a suitable data structure.
Handle errors and exceptions that may occur during the process.
Q195. What is the flow of recent project
The recent project flow involved data extraction, transformation, and loading using ETL tools.
The project started with identifying the data sources and requirements.
Then, the data was extracted from various sources using ETL tools like Informatica, Talend, etc.
The extracted data was transformed as per the business rules and requirements.
Finally, the transformed data was loaded into the target system.
The project also involved testing the ETL process and ensuring data accuracy ...read more
Q196. What is interface and why is it used
An interface is a contract between two components that defines the communication between them.
Interfaces provide a way to achieve abstraction and loose coupling in software design.
They allow different components to communicate with each other without knowing the implementation details.
Interfaces are used in object-oriented programming to define a set of methods that a class must implement.
Examples of interfaces in Java include Serializable, Comparable, and Runnable.
Interfaces...read more
Q197. Ingress and how sidecar container works ?
Ingress is a Kubernetes resource that manages external access to services, and a sidecar container is a secondary container that runs alongside the main container in a pod.
Ingress is a Kubernetes resource that acts as an API gateway for incoming traffic to services within the cluster.
Ingress controllers are responsible for implementing the rules specified in the Ingress resource.
Sidecar containers are additional containers within a pod that provide supporting features such as...read more
Q198. Tell me sales cloud sales process?
The sales cloud sales process is a systematic approach to managing and tracking sales activities from lead generation to closing deals.
Lead generation: Identifying potential customers and capturing their information.
Opportunity management: Qualifying leads and converting them into opportunities.
Sales pipeline: Tracking the progress of opportunities through various stages.
Sales forecasting: Predicting future sales based on the pipeline and historical data.
Quote and proposal ma...read more
Q199. What parameters you will consider while design a system
Parameters considered while designing a system
Functional requirements
Performance requirements
Scalability
Security
Maintainability
Cost
User experience
Integration with existing systems
Q200. 5. How you handle dynamic web table
Dynamic web tables can be handled using various methods like XPath, CSS selectors, and Selenium commands.
Identify the table element using its HTML tag and attributes
Use Selenium commands like findElement() and findElements() to locate the table and its rows/columns
Iterate through the rows and columns using loops and extract the required data
Use XPath or CSS selectors to locate specific cells or data within the table
Handle pagination if the table has multiple pages
Verify the a...read more
Top HR Questions asked in null
Interview Process at null
Top Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month