Persistent Systems
400+ Interview Questions and Answers
Q201. 1. Write a code for database connectivity
Code for database connectivity
Import the required database driver
Create a connection object using the driver
Establish connection to the database using connection object
Execute SQL queries using the connection object
Close the connection
Q202. Java 8 features and logical of it
Java 8 introduced several new features such as lambda expressions, streams, and functional interfaces.
Lambda expressions allow for more concise code by enabling functional programming.
Streams provide a way to work with collections in a more functional style, allowing for parallel processing and lazy evaluation.
Functional interfaces are interfaces with a single abstract method, which can be implemented using lambda expressions.
Other features include default methods in interfac...read more
Q203. REST and SOAP examples and design principles
REST and SOAP are web service protocols with different design principles
REST (Representational State Transfer) is an architectural style that uses standard HTTP methods like GET, POST, PUT, DELETE for communication
SOAP (Simple Object Access Protocol) is a protocol that uses XML for message exchange and can work over various transport protocols like HTTP, SMTP, etc.
REST is lightweight, scalable, and easy to use, while SOAP is more rigid and has built-in security features
REST i...read more
Q204. What us sdlc? Use of it.
SDLC stands for Software Development Life Cycle. It is a process used by software development teams to design, develop, and test high-quality software.
SDLC involves planning, designing, coding, testing, and deployment stages.
It helps in ensuring that the software meets the requirements and is delivered on time and within budget.
Examples of SDLC models include Waterfall, Agile, and DevOps.
Each stage of SDLC has specific goals and deliverables to be achieved.
Q205. What is oops? Pilars or oops.
OOPs stands for Object-Oriented Programming. It is based on four main principles: Inheritance, Encapsulation, Abstraction, and Polymorphism.
OOPs is a programming paradigm that focuses on objects and classes.
The four main pillars of OOPs are Inheritance, Encapsulation, Abstraction, and Polymorphism.
Inheritance allows a class to inherit properties and behavior from another class.
Encapsulation refers to the bundling of data and methods that operate on the data into a single unit...read more
Q206. What is devops and why devops?
DevOps is a software development methodology that combines software development (Dev) with IT operations (Ops) to improve collaboration and efficiency.
DevOps aims to automate and streamline the software development process.
It focuses on continuous integration, continuous delivery, and continuous deployment.
DevOps encourages a culture of collaboration, communication, and shared responsibility between development and operations teams.
Tools commonly used in DevOps include Jenkin...read more
Q207. Code on basic trigger
A basic trigger code is used to automatically perform an action when a certain event occurs in a database.
Triggers are written in SQL and can be used to enforce business rules, perform data validation, or maintain data integrity.
Example: CREATE TRIGGER trigger_name BEFORE INSERT ON table_name FOR EACH ROW BEGIN ... END;
Q208. Code programs to solve basic string manipulations
Code programs to solve basic string manipulations
Use built-in string functions like substring, replace, and split
Implement algorithms for reversing a string, checking for palindromes, and counting occurrences of a character
Handle edge cases like empty strings and null inputs
Q209. Difference between PUT and POST methods?
PUT is used to update an existing resource while POST is used to create a new resource.
PUT is idempotent, meaning multiple identical requests will have the same effect as a single request.
POST is not idempotent and can result in multiple resources being created if the request is sent multiple times.
PUT requires the client to send the entire updated resource while POST only requires the necessary fields to create a new resource.
PUT is typically used for updating data while POS...read more
Q210. the presence of network layers in your processor
Q211. One question to convert 1nf to 2nf
To convert 1NF to 2NF, identify partial dependencies and move them to separate tables.
Identify the primary key in the 1NF table
Identify any non-key attributes that are dependent on only part of the primary key
Move these attributes to a new table with a composite key including the partial key and the original primary key
Q212. OOPs concepts, explain polymorphism, inheritance, etc
Polymorphism is the ability of an object to take on many forms. Inheritance is the process of creating new classes from existing ones.
Polymorphism allows objects of different classes to be treated as objects of a common superclass.
Inheritance allows a class to inherit properties and methods from another class.
Polymorphism and inheritance are key concepts in object-oriented programming (OOP).
Example of polymorphism: A superclass Animal with subclasses Dog, Cat, and Bird. They ...read more
Q213. How i can design a login system for client?
Designing a login system for clients involves creating secure authentication methods and user management.
Implement secure password hashing algorithms like bcrypt to store passwords securely.
Use HTTPS to encrypt data transmission between client and server.
Implement multi-factor authentication for added security.
Utilize session management to keep track of user login status.
Consider implementing account lockout mechanisms to prevent brute force attacks.
Q214. diff between c#, Asp.net and mvc
C# is a programming language, ASP.NET is a web framework, and MVC is a design pattern for building web applications.
C# is used to write code for various applications, including web applications.
ASP.NET is a web framework that provides tools and libraries for building web applications.
MVC is a design pattern that separates an application into three components: Model, View, and Controller.
ASP.NET MVC is a web framework that uses the MVC pattern to build web applications using C...read more
Q215. Explain control flow of the automation framework
Control flow of automation framework refers to the sequence in which the test cases are executed.
The framework follows a predefined sequence of steps to execute test cases
It includes steps like test case selection, test data preparation, test case execution, and result reporting
The control flow can be linear or non-linear depending on the framework design
Example: In a linear control flow, test cases are executed one after the other in a predefined order
Q216. Reverse a number in a given string
Reverse a number in a given string
Iterate through the string and identify numbers
Reverse the identified numbers
Join the reversed numbers back to the original string
Q217. SQL query for 2nd highest salary
SQL query to find the 2nd highest salary in a table
Use the ORDER BY clause to sort the salaries in descending order
Use the LIMIT clause to limit the result to the second row
Consider handling cases where there might be ties for the highest salary
Q218. What is dns ,www,http,domain name,ip address,html
DNS, WWW, HTTP, domain name, IP address, and HTML are all fundamental components of the internet.
DNS (Domain Name System) translates domain names into IP addresses.
WWW (World Wide Web) is a system of interlinked hypertext documents accessed via the internet.
HTTP (Hypertext Transfer Protocol) is the protocol used for transmitting data on the web.
A domain name is the human-readable address used to access websites (e.g. google.com).
An IP address is a numerical label assigned to ...read more
Q219. Can we call queueable class from batch class
Yes, we can call queueable class from batch class.
Batch class can call a queueable class to perform additional processing after the batch job completes.
Queueable class can be called from the finish method of the batch class.
This allows for asynchronous processing of data.
Example: Batch class processes records and calls a queueable class to send email notifications.
Q220. what is dependency injection
Dependency injection is a design pattern that allows objects to receive dependencies rather than creating them internally.
It helps to decouple the code and makes it more testable.
It allows for easier maintenance and scalability.
It can be implemented using constructor injection, setter injection, or interface injection.
Example: Instead of creating a database connection object within a class, it can be passed as a dependency through constructor injection.
Q221. explain the constructor and destructor flow in inheritance
Q222. How do Microservices communicate
Microservices communicate with each other through various communication protocols like HTTP, messaging queues, and gRPC.
Microservices can communicate over HTTP using RESTful APIs.
Messaging queues like RabbitMQ or Kafka can be used for asynchronous communication between microservices.
gRPC is a high-performance, open-source RPC framework that can be used for communication between microservices.
Service discovery mechanisms like Eureka or Consul can help microservices locate and ...read more
Q223. Java program for printing repeated characters in a string
Java program to find and print repeated characters in a string
Iterate through each character in the string
Use a HashMap to store the count of each character
Print characters with count greater than 1
Q224. What is encapsulation
Encapsulation is the concept of bundling data and methods that operate on the data into a single unit.
Encapsulation helps in hiding the internal state of an object and restricting access to it.
It allows for better control over the data by preventing direct access from outside the class.
Encapsulation also helps in achieving data abstraction, where the internal details are hidden and only the necessary information is exposed.
Example: In a class representing a bank account, the ...read more
Q225. Explain the Automation framework
Automation framework is a set of guidelines, standards, and tools used for automating software testing.
It provides a structured approach to automate tests
It includes tools for test case management, test data management, and reporting
It helps in reducing manual effort and increasing test coverage
Examples include Selenium, Appium, and TestNG
Q226. sjava8 having stream apis and functional interfaces
Java 8 introduced stream APIs and functional interfaces.
Stream APIs provide a concise and functional way of processing collections.
Functional interfaces allow the use of lambda expressions for more concise code.
Examples of functional interfaces include Predicate, Consumer, and Function.
Examples of stream operations include filter, map, and reduce.
Q227. What is oops concepts?
Object-oriented programming concepts that focus on objects and classes to organize code and improve reusability and maintainability.
Encapsulation: Bundling data and methods that operate on the data into a single unit (class).
Inheritance: Ability of a class to inherit properties and behavior from another class.
Polymorphism: Ability to present the same interface for different data types.
Abstraction: Hiding the complex implementation details and showing only the necessary featur...read more
Q228. What is garbage collection ?
Garbage collection is a process in programming where the system automatically reclaims memory occupied by objects that are no longer in use.
Garbage collection helps in managing memory efficiently by automatically deallocating memory that is no longer needed.
It reduces the risk of memory leaks and helps in preventing bugs related to manual memory management.
Examples of programming languages with garbage collection include Java, C#, and Python.
Q229. What is SCD ??
SCD stands for Slowly Changing Dimension, a concept in data warehousing to track changes in data over time.
SCD is used to maintain historical data in a data warehouse.
There are three types of SCD - Type 1, Type 2, and Type 3.
Type 1 SCD overwrites old data with new data.
Type 2 SCD creates a new record for each change, preserving history.
Type 3 SCD maintains both old and new values in the same record.
SCD is important for tracking changes in dimensions like customer information ...read more
Q230. Nodejs how to scale How does event lop work internally
Node.js scaling involves horizontal scaling and load balancing. Event loop is a single-threaded, non-blocking I/O model.
Node.js scaling involves horizontal scaling and load balancing
Event loop is a single-threaded, non-blocking I/O model
Horizontal scaling involves adding more servers to handle increased traffic
Load balancing distributes incoming requests across multiple servers
Event loop allows Node.js to handle multiple concurrent requests efficiently
Event loop uses an event...read more
Q231. what is use of mutable keyword in cpp
Q232. Explain memory management of python.
Python uses automatic memory management through garbage collection.
Python uses reference counting to keep track of objects in memory.
When an object's reference count reaches zero, it is deleted by the garbage collector.
Python also uses a cyclic garbage collector to detect and delete objects with circular references.
Memory can be managed manually using the ctypes module.
Python's memory management is efficient and transparent to the developer.
Q233. can we change chunk size in batch job
Yes, we can change the chunk size in a batch job.
Chunk size can be changed by setting the batch size parameter in the start method of the batch class.
The default chunk size is 200 records, but it can be increased or decreased based on the requirements.
Changing the chunk size can impact the performance of the batch job, so it should be tested thoroughly.
Example: If you want to process records in batches of 100, you can set the batch size parameter to 100.
Q234. 2)What are SOLID principles?
SOLID principles are a set of five design principles for writing maintainable and scalable code.
S - Single Responsibility Principle: A class should have only one reason to change.
O - Open/Closed Principle: Software entities should be open for extension but closed for modification.
L - Liskov Substitution Principle: Subtypes should be substitutable for their base types.
I - Interface Segregation Principle: Clients should not be forced to depend on interfaces they do not use.
D - ...read more
Q235. What is BERT? Explain the architecture
BERT is a pre-trained natural language processing model developed by Google.
Bidirectional Encoder Representations from Transformers
Utilizes transformer architecture with attention mechanisms
Pre-trained on large corpus of text data for various NLP tasks
Fine-tuned for specific tasks like text classification, question answering, etc.
Q236. What is Drupal and so many
Drupal is a free and open-source content management system (CMS) used to create websites and web applications.
Drupal is written in PHP and uses a MySQL or PostgreSQL database.
It allows users to create and manage content, customize the appearance, and add functionality through modules.
Drupal has a large community of developers and users who contribute to its development and provide support.
Some popular websites built with Drupal include The Economist, NBC, and the White House.
Q237. What is basic in network and router and switches
Q238. How to divide AKS pods based on the load
AKS pods can be divided based on load using horizontal pod autoscaling (HPA) and cluster autoscaler.
Use HPA to automatically scale the number of replicas of a deployment based on CPU or memory usage.
Use cluster autoscaler to add or remove nodes from the AKS cluster based on the demand.
Use resource requests and limits to ensure that pods are scheduled on nodes with sufficient resources.
Consider using node selectors or affinity rules to ensure that pods are scheduled on nodes w...read more
Q239. What is ram and what eeprom
RAM is a volatile memory used for temporary storage while EEPROM is a non-volatile memory used for permanent storage.
RAM stands for Random Access Memory and is used for temporary storage of data and instructions while the computer is running.
EEPROM stands for Electrically Erasable Programmable Read-Only Memory and is used for permanent storage of data that needs to be retained even when the power is turned off.
RAM is volatile, meaning it loses its contents when the power is t...read more
Q240. How you handle container orchestration ?
I handle container orchestration using tools like Kubernetes and Docker Swarm.
Utilize Kubernetes for managing containerized applications
Use Docker Swarm for orchestrating containers across multiple hosts
Implement service discovery and load balancing for efficient orchestration
Q241. What are diff between super and this
super is used to refer immediate parent class instance variable or method, while this is used to refer current class instance variable or method.
super is used to access parent class members, while this is used to access current class members
super keyword is used to invoke parent class constructor, while this keyword is used to invoke current class constructor
super keyword is used to differentiate between parent and child class members with same name, while this keyword is use...read more
Q242. difference between let const and var
let is block scoped, const is constant, var is function scoped
let: block scoped, can be reassigned
const: block scoped, cannot be reassigned, but its properties can be modified
var: function scoped, can be reassigned
Q243. what is Authentication
Authentication is the process of verifying the identity of a user or system.
It ensures that only authorized users have access to a system or application.
Authentication can be achieved through various methods such as passwords, biometrics, and two-factor authentication.
Examples of authentication include logging into a social media account or accessing a secure building with an ID card.
Authentication is often used in conjunction with authorization, which determines what actions...read more
Q244. what is LLMOps? Explain in details
LLMOps stands for Low Latency Model Operations, a process of deploying and managing machine learning models with minimal delay.
LLMOps focuses on reducing the latency in deploying and managing machine learning models.
It involves optimizing the infrastructure and processes to ensure quick and efficient model operations.
Examples include real-time prediction systems, automated model monitoring, and rapid model updates.
LLMOps is crucial for applications requiring fast decision-mak...read more
Q245. Summation of numbers in an IntStream
Summation of numbers in an IntStream
Use the 'sum()' method on the IntStream to calculate the sum of numbers
Ensure the IntStream is properly initialized with numbers before calling 'sum()'
Example: IntStream numbers = IntStream.of(1, 2, 3, 4, 5); int sum = numbers.sum();
Q246. Design patterns in Python?
Design patterns are reusable solutions to common problems in software design.
Design patterns provide a structured approach to solving design problems.
Python has several design patterns such as Singleton, Factory, Observer, etc.
Each design pattern has its own purpose and usage.
Design patterns promote code reusability, maintainability, and scalability.
Understanding design patterns helps in writing cleaner and more efficient code.
Q247. Why persistent systems pvt ltd
Persistent Systems Pvt Ltd is known for its innovative solutions, strong work culture, and opportunities for growth.
Strong reputation for delivering innovative solutions
Positive work culture that fosters growth and learning
Opportunities for career advancement and skill development
Global presence with diverse projects and clients
Q248. Find the longest substring without repeating characters
Find the longest substring without repeating characters in a given string.
Use a sliding window approach to iterate through the string and keep track of the characters seen so far.
Update the start index of the window when a repeating character is encountered.
Keep track of the longest substring length and characters seen in a hashmap.
Q249. Difference between delete and truncate commands?
Delete command removes rows one by one, while truncate command removes all rows at once.
Delete command is slower as it generates a separate transaction for each row deletion
Truncate command is faster as it deallocates the data pages in one go
Delete command can be rolled back, while truncate command cannot be rolled back
Delete command can have a WHERE clause to specify which rows to delete, truncate command deletes all rows
Example: DELETE FROM table_name WHERE condition; TRUNC...read more
Q250. What is the cmos full form
CMOS stands for Complementary Metal-Oxide-Semiconductor.
CMOS is a type of semiconductor technology used in microprocessors, microcontrollers, and other digital logic circuits.
It is known for its low power consumption and high noise immunity.
CMOS is commonly used in devices such as computers, smartphones, and digital cameras.
The CMOS battery on a computer motherboard is responsible for maintaining the system clock and other settings when the computer is turned off.
CMOS sensors...read more
Q251. Explain and Identify Async Coding styles
Async coding styles involve writing code that allows for non-blocking operations and efficient use of resources.
Callbacks: Passing functions as arguments to be executed once an asynchronous operation is completed.
Promises: Representing a value that may be available in the future, allowing chaining of operations.
Async/Await: Syntactic sugar for writing asynchronous code in a synchronous style.
Event Emitters: Using events to signal completion of asynchronous operations.
Q252. What is oops , dsa , encapsulation,java,
OOPs stands for Object-Oriented Programming, DSA stands for Data Structures and Algorithms, Encapsulation is a concept in OOP, Java is a popular programming language.
OOPs is a programming paradigm based on the concept of objects, which can contain data in the form of fields and code in the form of procedures.
DSA involves the study of data structures (like arrays, linked lists, trees) and algorithms (like sorting, searching) for efficient problem-solving.
Encapsulation is the b...read more
Q253. string vs stringbuffer vs stringbuilder
String, StringBuffer, and StringBuilder are classes in Java used for manipulating strings.
String is immutable, meaning its value cannot be changed once created.
StringBuffer is mutable and thread-safe, making it suitable for multi-threaded environments.
StringBuilder is also mutable but not thread-safe, providing better performance in single-threaded scenarios.
Q254. Difference between overloading and overriding
Overloading is having multiple methods with the same name but different parameters. Overriding is having a method in a subclass with the same name and parameters as in the superclass.
Overloading is compile-time polymorphism while overriding is runtime polymorphism.
Overloading is used to provide different ways of calling the same method while overriding is used to provide a specific implementation of a method in a subclass.
Example of overloading: public void print(int num) and...read more
Q255. Non repeating characters in a array
Function to find and return all non-repeating characters in an array of strings.
Iterate through the array and count the occurrences of each character using a HashMap.
Then iterate through the array again and check if the count of each character is 1, if so add it to the result list.
Return the list of non-repeating characters.
Q256. What is your design process
My design process involves research, ideation, prototyping, testing, and iteration.
Research: Gather information about the problem, users, and competition.
Ideation: Brainstorm and sketch out potential solutions.
Prototyping: Create low-fidelity and high-fidelity prototypes.
Testing: Conduct user testing to gather feedback and insights.
Iteration: Use feedback to refine and improve the design.
Q257. What is bios Basic input out system
BIOS stands for Basic Input/Output System. It is a firmware that initializes hardware components during boot-up and provides a runtime interface for operating systems.
BIOS is responsible for performing a Power-On Self Test (POST) to check if all hardware components are functioning properly.
It provides a runtime interface for the operating system to communicate with the hardware components.
BIOS settings can be accessed and modified through a setup utility during boot-up.
BIOS c...read more
Q258. Explain Microservices design pattern?
Microservices is a design pattern where an application is broken down into small, independent services that communicate with each other.
Each service is responsible for a specific task or feature
Services communicate with each other through APIs
Each service can be developed, deployed, and scaled independently
Allows for greater flexibility, agility, and resilience
Requires a strong focus on automation, monitoring, and testing
Q259. WHAT IS ETHERENT,SWITCH,HUB?
Ethernet is a networking technology used for LANs. Switches and hubs are devices used to connect multiple devices to a network.
Ethernet is a protocol used for communication between devices on a network.
A switch is a networking device that connects devices on a network and directs data to its intended recipient.
A hub is a networking device that connects devices on a network and broadcasts data to all connected devices.
Switches are faster and more efficient than hubs.
Ethernet c...read more
Q260. Move all the zeros at last
Move all zeros in an array to the end while maintaining the order of other elements.
Iterate through the array and move all zeros to the end while keeping the order of non-zero elements.
Use two pointers approach to swap elements in-place.
Example: Input [0, 1, 0, 3, 12], Output [1, 3, 12, 0, 0]
Q261. What is Angular test cases
Angular test cases are automated tests written to ensure the functionality of Angular applications.
Angular test cases are written using testing frameworks like Jasmine and Karma.
They test the components, services, and modules of an Angular application.
Test cases can be run automatically during development or deployment to catch errors early.
Examples of test cases include checking if a component renders correctly, if a service returns the expected data, or if a module is impor...read more
Q262. How spring works internally
Spring is a lightweight framework that provides comprehensive infrastructure support for developing Java applications.
Spring works internally by using Inversion of Control (IoC) container to manage Java objects.
It uses Dependency Injection to inject the dependencies of an object at runtime.
Spring also provides Aspect-Oriented Programming (AOP) support for cross-cutting concerns.
It utilizes various modules like Core, Context, AOP, JDBC, ORM, etc., to provide different function...read more
Q263. what is sql injection
SQL injection is a type of cyber attack where malicious SQL code is inserted into input fields to manipulate a database.
SQL injection occurs when a user input is not properly sanitized and allows an attacker to execute malicious SQL commands.
It can lead to unauthorized access to sensitive data, data loss, and even complete server takeover.
Example: Entering ' OR '1'='1' into a login form to bypass authentication and gain access to the system.
Q264. find out duplicate element in array?
Use a HashSet to find duplicate elements in an array of strings.
Create a HashSet to store unique elements.
Iterate through the array and check if the element is already in the HashSet.
If it is, then it is a duplicate element.
Example: String[] array = {"apple", "banana", "apple", "orange"};
Q265. What is Interface and share real example
An interface is a contract that defines a set of methods and properties that a class must implement.
Interfaces provide a way to achieve abstraction and polymorphism in object-oriented programming.
They allow for loose coupling between classes and promote code reusability.
An example of an interface in C# is the IDisposable interface, which defines a method for releasing unmanaged resources.
Another example is the IEnumerable interface, which defines methods for iterating over a ...read more
Q266. Binary search algorithm explanation
Binary search is a divide and conquer algorithm that efficiently finds the target value in a sorted array.
Divide the array in half and compare the target value with the middle element
If the target value is smaller, search the left half. If larger, search the right half
Repeat the process until the target value is found or the subarray is empty
Q267. all sorting alogorithm and their complexity
Q268. Hashmap working internal details
Hashmap is a data structure that stores key-value pairs and uses hashing to map keys to values.
Hashmap uses hashing function to determine the index of the key in the underlying array.
Collision handling is done by chaining or open addressing.
Hashmap provides constant time complexity O(1) for insertion, deletion, and retrieval.
Example: HashMap
map = new HashMap<>(); map.put("key", 123); int value = map.get("key");
Q269. Why we use microservices
Microservices allow for modular, scalable, and flexible software development by breaking down applications into smaller, independent services.
Microservices enable easier maintenance and updates as each service can be developed, deployed, and scaled independently.
They improve fault isolation, as failures in one service do not necessarily affect the entire application.
Microservices promote agility and faster time-to-market by allowing teams to work on different services simulta...read more
Q270. What is 1 nf 2nf
1NF and 2NF are normalization forms in database design to reduce redundancy and improve data integrity.
1NF (First Normal Form) ensures that each column in a table contains atomic values and there are no repeating groups.
2NF (Second Normal Form) builds on 1NF by ensuring that all non-key attributes are fully functional dependent on the primary key.
For example, if we have a table 'Orders' with columns 'OrderID', 'ProductID', 'ProductName', and 'ProductPrice', we can normalize i...read more
Q271. What is soap and fully explained
Q272. Explain how backpropogation works
Backpropagation is a method used in neural networks to update the weights of the network by calculating the gradient of the loss function.
Backpropagation involves calculating the gradient of the loss function with respect to each weight in the network.
The gradients are then used to update the weights in the network in order to minimize the loss function.
This process is repeated iteratively until the network converges to a set of weights that minimize the loss function.
Backpro...read more
Q273. Get min and max from a list without using function
Find min and max from a list without using function
Iterate through the list and compare each element with current min and max values
Update min and max values accordingly
Q274. Before vs After Triggers
Before triggers are executed before the record is saved to the database, while after triggers are executed after the record is saved.
Before triggers are used to validate or modify record values before they are saved.
After triggers are used to perform additional actions after the record is saved.
Before triggers can be used to prevent the record from being saved by throwing an exception.
After triggers can be used to update related records or perform asynchronous operations.
Q275. Program to reverse a string
A program to reverse a string
Iterate through the string from end to start and append each character to a new string
Use built-in functions like reverse() or StringBuilder.reverse() in some programming languages
Convert the string to an array, reverse the array, and then convert it back to a string
Q276. What is NodeJs and why we need to use
Node.js is a runtime environment that allows you to run JavaScript on the server side.
Node.js is built on Chrome's V8 JavaScript engine.
It is lightweight and efficient for building scalable network applications.
Node.js uses an event-driven, non-blocking I/O model, making it ideal for real-time applications like chat apps or streaming services.
Q277. Why agile over water fall ?
Agile is preferred over waterfall due to its flexibility, adaptability, and ability to deliver value incrementally.
Agile allows for continuous feedback and adjustments throughout the project.
Agile promotes collaboration and communication among team members.
Agile enables faster delivery of working software and allows for changes to be made easily.
Agile is better suited for projects with evolving requirements or uncertain outcomes.
Waterfall is more rigid and sequential, making ...read more
Q278. Development about backend and front end
Backend development focuses on server-side logic and databases, while front end development focuses on user interface and client-side functionality.
Backend development involves writing server-side code using languages like Java, Python, or Node.js.
Front end development involves creating user interfaces using HTML, CSS, and JavaScript.
Backend developers work on databases, APIs, and server-side logic.
Front end developers focus on creating visually appealing and interactive user...read more
Q279. What is ssis? How we use
SSIS stands for SQL Server Integration Services, a tool provided by Microsoft for data integration and workflow applications.
SSIS is a platform for building high-performance data integration and workflow solutions.
It allows you to create packages that move data from various sources to destinations.
SSIS includes a visual design interface for creating, monitoring, and managing data integration processes.
You can use SSIS to automate tasks such as data extraction, transformation,...read more
Q280. what is polymorphism
Polymorphism is the ability of an object to take on many forms. It allows objects of different classes to be treated as the same type.
Polymorphism is a fundamental concept in object-oriented programming.
It enables code reusability and flexibility.
Polymorphism can be achieved through method overriding and method overloading.
Example: A parent class Animal can have multiple child classes like Dog, Cat, and Bird. They can all be treated as Animals.
Polymorphism allows for the use ...read more
Q281. write a program reverse the integer no
This program reverses an integer number.
Convert the integer to a string
Reverse the string
Convert the reversed string back to an integer
Q282. Explain Django life cycle.
Django life cycle involves request processing, URL routing, view function execution, template rendering, and response generation.
When a request is made, Django checks the URL patterns defined in urls.py file.
If a match is found, the corresponding view function is executed.
The view function processes the request and returns a response.
The response is rendered using a template, if applicable.
The final response is sent back to the client.
Q283. what is Custom exception?
Custom exception is a user-defined exception that extends the functionality of the built-in exceptions in Java.
Custom exceptions are created by extending the Exception class or one of its subclasses.
They allow developers to define their own exception types for specific scenarios.
Custom exceptions can include additional methods and fields to provide more information about the exception.
Example: public class CustomException extends Exception { // custom exception code here }
Q284. how to allocatte dynamic memory
Q285. what is MDM And is features in windows
Q286. What is context, What is hooks
Context is a feature in React that allows data to be passed down the component tree without manually passing props. Hooks are functions that allow you to use state and other React features in functional components.
Context is used to share data between components without passing props explicitly
Hooks are functions that allow you to use state and other React features in functional components
Context provides a way to pass data through the component tree without having to pass pr...read more
Q287. How do you save data transfer cost
Optimize data transfer by compressing data, using caching, minimizing unnecessary transfers, and utilizing efficient protocols.
Utilize data compression techniques to reduce the size of data being transferred
Implement caching mechanisms to store frequently accessed data locally and reduce the need for repeated transfers
Minimize unnecessary data transfers by only sending essential data and avoiding redundant transfers
Utilize efficient protocols such as HTTP/2 or QUIC to optimiz...read more
Q288. Optimization techniques for react
Optimization techniques for React include code splitting, lazy loading, memoization, and virtualization.
Code splitting: Break down the code into smaller chunks to load only what is necessary for each page.
Lazy loading: Load components only when they are needed, improving initial load time.
Memoization: Cache the results of expensive function calls to avoid redundant calculations.
Virtualization: Render only the visible elements in a list, improving performance for large dataset...read more
Q289. What is oops, Jruby GIThub command
OOPs stands for Object-Oriented Programming, JRuby is a Ruby implementation on the Java Virtual Machine, and GitHub commands are used for version control.
OOPs is a programming paradigm based on the concept of objects, which can contain data in the form of fields and code in the form of procedures.
JRuby is a Ruby implementation that runs on the Java Virtual Machine, allowing Ruby code to interact with Java libraries.
GitHub commands are used to interact with repositories on the...read more
Q290. .Net Core design pattern and life time
Design patterns in .Net Core help in structuring code for better maintainability and scalability.
Design patterns like Singleton, Factory, and Dependency Injection are commonly used in .Net Core.
They help in separating concerns, improving code reusability, and making code more testable.
Lifetime management in .Net Core refers to how long an object should exist in the application.
Transient, Scoped, and Singleton are the three main lifetime options in .Net Core.
For example, a Sin...read more
Q291. List all the azure cloud services you know
Azure cloud services are a collection of integrated cloud services that developers and IT professionals use to build, deploy, and manage applications through Microsoft's global network of datacenters.
Azure Virtual Machines
Azure App Services
Azure SQL Database
Azure Blob Storage
Azure Functions
Q292. What is data security
Data security refers to the protection of digital data from unauthorized access, use, disclosure, disruption, modification, or destruction.
Ensuring data confidentiality by encrypting sensitive information
Implementing access controls to restrict unauthorized users from accessing data
Regularly updating security measures to protect against evolving threats
Backing up data to prevent loss in case of a security breach
Q293. What is state file?
A state file is a file used to store the current state of a system or application.
State files are commonly used in software development to save the current state of an application for later retrieval.
They can be used to store variables, configurations, or other data that needs to persist between sessions.
State files are often used in configuration management tools like Terraform to track the state of infrastructure resources.
Examples of state files include .tfstate files in T...read more
Q294. Difference between Smoke and SanityTesting?
Smoke testing is a quick test to check if the software build is stable for further testing, while sanity testing is a subset of regression testing to verify specific functionality after changes.
Smoke testing is done to ensure the critical functionalities of the software are working fine before detailed testing, while sanity testing is done to check specific areas of the application after changes.
Smoke testing is a shallow and wide approach to testing, covering all major areas...read more
Q295. Opps concepts with one live example
OOPs concepts are the pillars of Java programming. Encapsulation, Inheritance, Polymorphism, and Abstraction are the four main concepts.
Encapsulation - Wrapping data and methods into a single unit. Example - Class
Inheritance - Acquiring properties of one class by another. Example - Parent and Child class
Polymorphism - Ability of an object to take many forms. Example - Method Overloading and Overriding
Abstraction - Hiding implementation details and showing only functionality. ...read more
Q296. Explain Threading of Python.
Threading in Python allows multiple threads of execution to run concurrently within a single process.
Python's threading module provides a way to create and manage threads.
Threads share the same memory space and can access the same variables and data structures.
Threading can improve performance for I/O-bound tasks, but not for CPU-bound tasks.
Python's Global Interpreter Lock (GIL) limits true parallelism in multi-threaded programs.
Thread synchronization can be achieved using l...read more
Q297. Underlying structure of Databricks
Databricks is built on Apache Spark, a unified analytics engine for big data processing.
Databricks is built on top of Apache Spark, which provides a unified analytics engine for big data processing.
It offers a collaborative platform for data scientists, data engineers, and business analysts to work together.
Databricks provides tools for data ingestion, data processing, machine learning, and visualization.
It supports multiple programming languages like Python, Scala, SQL, and ...read more
Q298. how to perform Tunnig in LLMs?
Tuning in LLMs involves adjusting hyperparameters to optimize model performance.
Perform grid search or random search to find the best hyperparameters
Use cross-validation to evaluate different hyperparameter combinations
Consider using automated hyperparameter tuning tools like Optuna or Hyperopt
Q299. multithreading working in java
Multithreading is a concept in Java that allows concurrent execution of multiple threads.
Multithreading improves performance by utilizing multiple threads to execute tasks concurrently.
Java provides built-in support for multithreading through the Thread class and Runnable interface.
Threads can be created by extending the Thread class or implementing the Runnable interface.
Synchronization mechanisms like locks and semaphores can be used to control access to shared resources.
Th...read more
Q300. Explain your automation framework
Our automation framework is a hybrid framework that combines data-driven and keyword-driven approaches.
We use Excel sheets to store test data and test cases.
We have a set of reusable functions that are stored in a separate library.
We use Selenium WebDriver for web automation and Appium for mobile automation.
We have a reporting mechanism that generates reports in HTML format.
We use Jenkins for continuous integration and continuous deployment.
We have implemented parallel execut...read more
Top HR Questions asked in null
Interview Process at null
Top Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month