Premium Employer

Persistent Systems

3.5
based on 3.6k Reviews
Filter interviews by

400+ Interview Questions and Answers

Updated 10 Dec 2024
Popular Designations

Q201. 1. Write a code for database connectivity

Ans.

Code for database connectivity

  • Import the required database driver

  • Create a connection object using the driver

  • Establish connection to the database using connection object

  • Execute SQL queries using the connection object

  • Close the connection

Add your answer

Q202. Java 8 features and logical of it

Ans.

Java 8 introduced several new features such as lambda expressions, streams, and functional interfaces.

  • Lambda expressions allow for more concise code by enabling functional programming.

  • Streams provide a way to work with collections in a more functional style, allowing for parallel processing and lazy evaluation.

  • Functional interfaces are interfaces with a single abstract method, which can be implemented using lambda expressions.

  • Other features include default methods in interfac...read more

Add your answer

Q203. REST and SOAP examples and design principles

Ans.

REST and SOAP are web service protocols with different design principles

  • REST (Representational State Transfer) is an architectural style that uses standard HTTP methods like GET, POST, PUT, DELETE for communication

  • SOAP (Simple Object Access Protocol) is a protocol that uses XML for message exchange and can work over various transport protocols like HTTP, SMTP, etc.

  • REST is lightweight, scalable, and easy to use, while SOAP is more rigid and has built-in security features

  • REST i...read more

Add your answer

Q204. What us sdlc? Use of it.

Ans.

SDLC stands for Software Development Life Cycle. It is a process used by software development teams to design, develop, and test high-quality software.

  • SDLC involves planning, designing, coding, testing, and deployment stages.

  • It helps in ensuring that the software meets the requirements and is delivered on time and within budget.

  • Examples of SDLC models include Waterfall, Agile, and DevOps.

  • Each stage of SDLC has specific goals and deliverables to be achieved.

Add your answer
Discover null interview dos and don'ts from real experiences

Q205. What is oops? Pilars or oops.

Ans.

OOPs stands for Object-Oriented Programming. It is based on four main principles: Inheritance, Encapsulation, Abstraction, and Polymorphism.

  • OOPs is a programming paradigm that focuses on objects and classes.

  • The four main pillars of OOPs are Inheritance, Encapsulation, Abstraction, and Polymorphism.

  • Inheritance allows a class to inherit properties and behavior from another class.

  • Encapsulation refers to the bundling of data and methods that operate on the data into a single unit...read more

Add your answer

Q206. What is devops and why devops?

Ans.

DevOps is a software development methodology that combines software development (Dev) with IT operations (Ops) to improve collaboration and efficiency.

  • DevOps aims to automate and streamline the software development process.

  • It focuses on continuous integration, continuous delivery, and continuous deployment.

  • DevOps encourages a culture of collaboration, communication, and shared responsibility between development and operations teams.

  • Tools commonly used in DevOps include Jenkin...read more

Add your answer
Are these interview questions helpful?

Q207. Code on basic trigger

Ans.

A basic trigger code is used to automatically perform an action when a certain event occurs in a database.

  • Triggers are written in SQL and can be used to enforce business rules, perform data validation, or maintain data integrity.

  • Example: CREATE TRIGGER trigger_name BEFORE INSERT ON table_name FOR EACH ROW BEGIN ... END;

Add your answer

Q208. Code programs to solve basic string manipulations

Ans.

Code programs to solve basic string manipulations

  • Use built-in string functions like substring, replace, and split

  • Implement algorithms for reversing a string, checking for palindromes, and counting occurrences of a character

  • Handle edge cases like empty strings and null inputs

Add your answer
Share interview questions and help millions of jobseekers 🌟

Q209. Difference between PUT and POST methods?

Ans.

PUT is used to update an existing resource while POST is used to create a new resource.

  • PUT is idempotent, meaning multiple identical requests will have the same effect as a single request.

  • POST is not idempotent and can result in multiple resources being created if the request is sent multiple times.

  • PUT requires the client to send the entire updated resource while POST only requires the necessary fields to create a new resource.

  • PUT is typically used for updating data while POS...read more

Add your answer

Q210. the presence of network layers in your processor

Add your answer

Q211. One question to convert 1nf to 2nf

Ans.

To convert 1NF to 2NF, identify partial dependencies and move them to separate tables.

  • Identify the primary key in the 1NF table

  • Identify any non-key attributes that are dependent on only part of the primary key

  • Move these attributes to a new table with a composite key including the partial key and the original primary key

Add your answer

Q212. OOPs concepts, explain polymorphism, inheritance, etc

Ans.

Polymorphism is the ability of an object to take on many forms. Inheritance is the process of creating new classes from existing ones.

  • Polymorphism allows objects of different classes to be treated as objects of a common superclass.

  • Inheritance allows a class to inherit properties and methods from another class.

  • Polymorphism and inheritance are key concepts in object-oriented programming (OOP).

  • Example of polymorphism: A superclass Animal with subclasses Dog, Cat, and Bird. They ...read more

Add your answer
Asked in
SDE Interview

Q213. How i can design a login system for client?

Ans.

Designing a login system for clients involves creating secure authentication methods and user management.

  • Implement secure password hashing algorithms like bcrypt to store passwords securely.

  • Use HTTPS to encrypt data transmission between client and server.

  • Implement multi-factor authentication for added security.

  • Utilize session management to keep track of user login status.

  • Consider implementing account lockout mechanisms to prevent brute force attacks.

Add your answer

Q214. diff between c#, Asp.net and mvc

Ans.

C# is a programming language, ASP.NET is a web framework, and MVC is a design pattern for building web applications.

  • C# is used to write code for various applications, including web applications.

  • ASP.NET is a web framework that provides tools and libraries for building web applications.

  • MVC is a design pattern that separates an application into three components: Model, View, and Controller.

  • ASP.NET MVC is a web framework that uses the MVC pattern to build web applications using C...read more

Add your answer

Q215. Explain control flow of the automation framework

Ans.

Control flow of automation framework refers to the sequence in which the test cases are executed.

  • The framework follows a predefined sequence of steps to execute test cases

  • It includes steps like test case selection, test data preparation, test case execution, and result reporting

  • The control flow can be linear or non-linear depending on the framework design

  • Example: In a linear control flow, test cases are executed one after the other in a predefined order

Add your answer

Q216. Reverse a number in a given string

Ans.

Reverse a number in a given string

  • Iterate through the string and identify numbers

  • Reverse the identified numbers

  • Join the reversed numbers back to the original string

Add your answer

Q217. SQL query for 2nd highest salary

Ans.

SQL query to find the 2nd highest salary in a table

  • Use the ORDER BY clause to sort the salaries in descending order

  • Use the LIMIT clause to limit the result to the second row

  • Consider handling cases where there might be ties for the highest salary

Add your answer

Q218. What is dns ,www,http,domain name,ip address,html

Ans.

DNS, WWW, HTTP, domain name, IP address, and HTML are all fundamental components of the internet.

  • DNS (Domain Name System) translates domain names into IP addresses.

  • WWW (World Wide Web) is a system of interlinked hypertext documents accessed via the internet.

  • HTTP (Hypertext Transfer Protocol) is the protocol used for transmitting data on the web.

  • A domain name is the human-readable address used to access websites (e.g. google.com).

  • An IP address is a numerical label assigned to ...read more

Add your answer

Q219. Can we call queueable class from batch class

Ans.

Yes, we can call queueable class from batch class.

  • Batch class can call a queueable class to perform additional processing after the batch job completes.

  • Queueable class can be called from the finish method of the batch class.

  • This allows for asynchronous processing of data.

  • Example: Batch class processes records and calls a queueable class to send email notifications.

Add your answer

Q220. what is dependency injection

Ans.

Dependency injection is a design pattern that allows objects to receive dependencies rather than creating them internally.

  • It helps to decouple the code and makes it more testable.

  • It allows for easier maintenance and scalability.

  • It can be implemented using constructor injection, setter injection, or interface injection.

  • Example: Instead of creating a database connection object within a class, it can be passed as a dependency through constructor injection.

Add your answer

Q221. explain the constructor and destructor flow in inheritance

Add your answer

Q222. How do Microservices communicate

Ans.

Microservices communicate with each other through various communication protocols like HTTP, messaging queues, and gRPC.

  • Microservices can communicate over HTTP using RESTful APIs.

  • Messaging queues like RabbitMQ or Kafka can be used for asynchronous communication between microservices.

  • gRPC is a high-performance, open-source RPC framework that can be used for communication between microservices.

  • Service discovery mechanisms like Eureka or Consul can help microservices locate and ...read more

Add your answer

Q223. Java program for printing repeated characters in a string

Ans.

Java program to find and print repeated characters in a string

  • Iterate through each character in the string

  • Use a HashMap to store the count of each character

  • Print characters with count greater than 1

Add your answer

Q224. What is encapsulation

Ans.

Encapsulation is the concept of bundling data and methods that operate on the data into a single unit.

  • Encapsulation helps in hiding the internal state of an object and restricting access to it.

  • It allows for better control over the data by preventing direct access from outside the class.

  • Encapsulation also helps in achieving data abstraction, where the internal details are hidden and only the necessary information is exposed.

  • Example: In a class representing a bank account, the ...read more

Add your answer

Q225. Explain the Automation framework

Ans.

Automation framework is a set of guidelines, standards, and tools used for automating software testing.

  • It provides a structured approach to automate tests

  • It includes tools for test case management, test data management, and reporting

  • It helps in reducing manual effort and increasing test coverage

  • Examples include Selenium, Appium, and TestNG

Add your answer

Q226. sjava8 having stream apis and functional interfaces

Ans.

Java 8 introduced stream APIs and functional interfaces.

  • Stream APIs provide a concise and functional way of processing collections.

  • Functional interfaces allow the use of lambda expressions for more concise code.

  • Examples of functional interfaces include Predicate, Consumer, and Function.

  • Examples of stream operations include filter, map, and reduce.

Add your answer

Q227. What is oops concepts?

Ans.

Object-oriented programming concepts that focus on objects and classes to organize code and improve reusability and maintainability.

  • Encapsulation: Bundling data and methods that operate on the data into a single unit (class).

  • Inheritance: Ability of a class to inherit properties and behavior from another class.

  • Polymorphism: Ability to present the same interface for different data types.

  • Abstraction: Hiding the complex implementation details and showing only the necessary featur...read more

Add your answer

Q228. What is garbage collection ?

Ans.

Garbage collection is a process in programming where the system automatically reclaims memory occupied by objects that are no longer in use.

  • Garbage collection helps in managing memory efficiently by automatically deallocating memory that is no longer needed.

  • It reduces the risk of memory leaks and helps in preventing bugs related to manual memory management.

  • Examples of programming languages with garbage collection include Java, C#, and Python.

Add your answer

Q229. What is SCD ??

Ans.

SCD stands for Slowly Changing Dimension, a concept in data warehousing to track changes in data over time.

  • SCD is used to maintain historical data in a data warehouse.

  • There are three types of SCD - Type 1, Type 2, and Type 3.

  • Type 1 SCD overwrites old data with new data.

  • Type 2 SCD creates a new record for each change, preserving history.

  • Type 3 SCD maintains both old and new values in the same record.

  • SCD is important for tracking changes in dimensions like customer information ...read more

Add your answer

Q230. Nodejs how to scale How does event lop work internally

Ans.

Node.js scaling involves horizontal scaling and load balancing. Event loop is a single-threaded, non-blocking I/O model.

  • Node.js scaling involves horizontal scaling and load balancing

  • Event loop is a single-threaded, non-blocking I/O model

  • Horizontal scaling involves adding more servers to handle increased traffic

  • Load balancing distributes incoming requests across multiple servers

  • Event loop allows Node.js to handle multiple concurrent requests efficiently

  • Event loop uses an event...read more

Add your answer

Q231. what is use of mutable keyword in cpp

Add your answer

Q232. Explain memory management of python.

Ans.

Python uses automatic memory management through garbage collection.

  • Python uses reference counting to keep track of objects in memory.

  • When an object's reference count reaches zero, it is deleted by the garbage collector.

  • Python also uses a cyclic garbage collector to detect and delete objects with circular references.

  • Memory can be managed manually using the ctypes module.

  • Python's memory management is efficient and transparent to the developer.

Add your answer

Q233. can we change chunk size in batch job

Ans.

Yes, we can change the chunk size in a batch job.

  • Chunk size can be changed by setting the batch size parameter in the start method of the batch class.

  • The default chunk size is 200 records, but it can be increased or decreased based on the requirements.

  • Changing the chunk size can impact the performance of the batch job, so it should be tested thoroughly.

  • Example: If you want to process records in batches of 100, you can set the batch size parameter to 100.

Add your answer

Q234. 2)What are SOLID principles?

Ans.

SOLID principles are a set of five design principles for writing maintainable and scalable code.

  • S - Single Responsibility Principle: A class should have only one reason to change.

  • O - Open/Closed Principle: Software entities should be open for extension but closed for modification.

  • L - Liskov Substitution Principle: Subtypes should be substitutable for their base types.

  • I - Interface Segregation Principle: Clients should not be forced to depend on interfaces they do not use.

  • D - ...read more

Add your answer

Q235. What is BERT? Explain the architecture

Ans.

BERT is a pre-trained natural language processing model developed by Google.

  • Bidirectional Encoder Representations from Transformers

  • Utilizes transformer architecture with attention mechanisms

  • Pre-trained on large corpus of text data for various NLP tasks

  • Fine-tuned for specific tasks like text classification, question answering, etc.

Add your answer

Q236. What is Drupal and so many

Ans.

Drupal is a free and open-source content management system (CMS) used to create websites and web applications.

  • Drupal is written in PHP and uses a MySQL or PostgreSQL database.

  • It allows users to create and manage content, customize the appearance, and add functionality through modules.

  • Drupal has a large community of developers and users who contribute to its development and provide support.

  • Some popular websites built with Drupal include The Economist, NBC, and the White House.

Add your answer

Q237. What is basic in network and router and switches

Add your answer

Q238. How to divide AKS pods based on the load

Ans.

AKS pods can be divided based on load using horizontal pod autoscaling (HPA) and cluster autoscaler.

  • Use HPA to automatically scale the number of replicas of a deployment based on CPU or memory usage.

  • Use cluster autoscaler to add or remove nodes from the AKS cluster based on the demand.

  • Use resource requests and limits to ensure that pods are scheduled on nodes with sufficient resources.

  • Consider using node selectors or affinity rules to ensure that pods are scheduled on nodes w...read more

Add your answer

Q239. What is ram and what eeprom

Ans.

RAM is a volatile memory used for temporary storage while EEPROM is a non-volatile memory used for permanent storage.

  • RAM stands for Random Access Memory and is used for temporary storage of data and instructions while the computer is running.

  • EEPROM stands for Electrically Erasable Programmable Read-Only Memory and is used for permanent storage of data that needs to be retained even when the power is turned off.

  • RAM is volatile, meaning it loses its contents when the power is t...read more

Add your answer

Q240. How you handle container orchestration ?

Ans.

I handle container orchestration using tools like Kubernetes and Docker Swarm.

  • Utilize Kubernetes for managing containerized applications

  • Use Docker Swarm for orchestrating containers across multiple hosts

  • Implement service discovery and load balancing for efficient orchestration

Add your answer

Q241. What are diff between super and this

Ans.

super is used to refer immediate parent class instance variable or method, while this is used to refer current class instance variable or method.

  • super is used to access parent class members, while this is used to access current class members

  • super keyword is used to invoke parent class constructor, while this keyword is used to invoke current class constructor

  • super keyword is used to differentiate between parent and child class members with same name, while this keyword is use...read more

Add your answer

Q242. difference between let const and var

Ans.

let is block scoped, const is constant, var is function scoped

  • let: block scoped, can be reassigned

  • const: block scoped, cannot be reassigned, but its properties can be modified

  • var: function scoped, can be reassigned

Add your answer

Q243. what is Authentication

Ans.

Authentication is the process of verifying the identity of a user or system.

  • It ensures that only authorized users have access to a system or application.

  • Authentication can be achieved through various methods such as passwords, biometrics, and two-factor authentication.

  • Examples of authentication include logging into a social media account or accessing a secure building with an ID card.

  • Authentication is often used in conjunction with authorization, which determines what actions...read more

Add your answer

Q244. what is LLMOps? Explain in details

Ans.

LLMOps stands for Low Latency Model Operations, a process of deploying and managing machine learning models with minimal delay.

  • LLMOps focuses on reducing the latency in deploying and managing machine learning models.

  • It involves optimizing the infrastructure and processes to ensure quick and efficient model operations.

  • Examples include real-time prediction systems, automated model monitoring, and rapid model updates.

  • LLMOps is crucial for applications requiring fast decision-mak...read more

Add your answer

Q245. Summation of numbers in an IntStream

Ans.

Summation of numbers in an IntStream

  • Use the 'sum()' method on the IntStream to calculate the sum of numbers

  • Ensure the IntStream is properly initialized with numbers before calling 'sum()'

  • Example: IntStream numbers = IntStream.of(1, 2, 3, 4, 5); int sum = numbers.sum();

Add your answer

Q246. Design patterns in Python?

Ans.

Design patterns are reusable solutions to common problems in software design.

  • Design patterns provide a structured approach to solving design problems.

  • Python has several design patterns such as Singleton, Factory, Observer, etc.

  • Each design pattern has its own purpose and usage.

  • Design patterns promote code reusability, maintainability, and scalability.

  • Understanding design patterns helps in writing cleaner and more efficient code.

View 1 answer

Q247. Why persistent systems pvt ltd

Ans.

Persistent Systems Pvt Ltd is known for its innovative solutions, strong work culture, and opportunities for growth.

  • Strong reputation for delivering innovative solutions

  • Positive work culture that fosters growth and learning

  • Opportunities for career advancement and skill development

  • Global presence with diverse projects and clients

Add your answer

Q248. Find the longest substring without repeating characters

Ans.

Find the longest substring without repeating characters in a given string.

  • Use a sliding window approach to iterate through the string and keep track of the characters seen so far.

  • Update the start index of the window when a repeating character is encountered.

  • Keep track of the longest substring length and characters seen in a hashmap.

Add your answer

Q249. Difference between delete and truncate commands?

Ans.

Delete command removes rows one by one, while truncate command removes all rows at once.

  • Delete command is slower as it generates a separate transaction for each row deletion

  • Truncate command is faster as it deallocates the data pages in one go

  • Delete command can be rolled back, while truncate command cannot be rolled back

  • Delete command can have a WHERE clause to specify which rows to delete, truncate command deletes all rows

  • Example: DELETE FROM table_name WHERE condition; TRUNC...read more

Add your answer

Q250. What is the cmos full form

Ans.

CMOS stands for Complementary Metal-Oxide-Semiconductor.

  • CMOS is a type of semiconductor technology used in microprocessors, microcontrollers, and other digital logic circuits.

  • It is known for its low power consumption and high noise immunity.

  • CMOS is commonly used in devices such as computers, smartphones, and digital cameras.

  • The CMOS battery on a computer motherboard is responsible for maintaining the system clock and other settings when the computer is turned off.

  • CMOS sensors...read more

Add your answer

Q251. Explain and Identify Async Coding styles

Ans.

Async coding styles involve writing code that allows for non-blocking operations and efficient use of resources.

  • Callbacks: Passing functions as arguments to be executed once an asynchronous operation is completed.

  • Promises: Representing a value that may be available in the future, allowing chaining of operations.

  • Async/Await: Syntactic sugar for writing asynchronous code in a synchronous style.

  • Event Emitters: Using events to signal completion of asynchronous operations.

Add your answer

Q252. What is oops , dsa , encapsulation,java,

Ans.

OOPs stands for Object-Oriented Programming, DSA stands for Data Structures and Algorithms, Encapsulation is a concept in OOP, Java is a popular programming language.

  • OOPs is a programming paradigm based on the concept of objects, which can contain data in the form of fields and code in the form of procedures.

  • DSA involves the study of data structures (like arrays, linked lists, trees) and algorithms (like sorting, searching) for efficient problem-solving.

  • Encapsulation is the b...read more

Add your answer

Q253. string vs stringbuffer vs stringbuilder

Ans.

String, StringBuffer, and StringBuilder are classes in Java used for manipulating strings.

  • String is immutable, meaning its value cannot be changed once created.

  • StringBuffer is mutable and thread-safe, making it suitable for multi-threaded environments.

  • StringBuilder is also mutable but not thread-safe, providing better performance in single-threaded scenarios.

Add your answer

Q254. Difference between overloading and overriding

Ans.

Overloading is having multiple methods with the same name but different parameters. Overriding is having a method in a subclass with the same name and parameters as in the superclass.

  • Overloading is compile-time polymorphism while overriding is runtime polymorphism.

  • Overloading is used to provide different ways of calling the same method while overriding is used to provide a specific implementation of a method in a subclass.

  • Example of overloading: public void print(int num) and...read more

Add your answer

Q255. Non repeating characters in a array

Ans.

Function to find and return all non-repeating characters in an array of strings.

  • Iterate through the array and count the occurrences of each character using a HashMap.

  • Then iterate through the array again and check if the count of each character is 1, if so add it to the result list.

  • Return the list of non-repeating characters.

Add your answer

Q256. What is your design process

Ans.

My design process involves research, ideation, prototyping, testing, and iteration.

  • Research: Gather information about the problem, users, and competition.

  • Ideation: Brainstorm and sketch out potential solutions.

  • Prototyping: Create low-fidelity and high-fidelity prototypes.

  • Testing: Conduct user testing to gather feedback and insights.

  • Iteration: Use feedback to refine and improve the design.

Add your answer

Q257. What is bios Basic input out system

Ans.

BIOS stands for Basic Input/Output System. It is a firmware that initializes hardware components during boot-up and provides a runtime interface for operating systems.

  • BIOS is responsible for performing a Power-On Self Test (POST) to check if all hardware components are functioning properly.

  • It provides a runtime interface for the operating system to communicate with the hardware components.

  • BIOS settings can be accessed and modified through a setup utility during boot-up.

  • BIOS c...read more

Add your answer

Q258. Explain Microservices design pattern?

Ans.

Microservices is a design pattern where an application is broken down into small, independent services that communicate with each other.

  • Each service is responsible for a specific task or feature

  • Services communicate with each other through APIs

  • Each service can be developed, deployed, and scaled independently

  • Allows for greater flexibility, agility, and resilience

  • Requires a strong focus on automation, monitoring, and testing

Add your answer

Q259. WHAT IS ETHERENT,SWITCH,HUB?

Ans.

Ethernet is a networking technology used for LANs. Switches and hubs are devices used to connect multiple devices to a network.

  • Ethernet is a protocol used for communication between devices on a network.

  • A switch is a networking device that connects devices on a network and directs data to its intended recipient.

  • A hub is a networking device that connects devices on a network and broadcasts data to all connected devices.

  • Switches are faster and more efficient than hubs.

  • Ethernet c...read more

Add your answer

Q260. Move all the zeros at last

Ans.

Move all zeros in an array to the end while maintaining the order of other elements.

  • Iterate through the array and move all zeros to the end while keeping the order of non-zero elements.

  • Use two pointers approach to swap elements in-place.

  • Example: Input [0, 1, 0, 3, 12], Output [1, 3, 12, 0, 0]

Add your answer

Q261. What is Angular test cases

Ans.

Angular test cases are automated tests written to ensure the functionality of Angular applications.

  • Angular test cases are written using testing frameworks like Jasmine and Karma.

  • They test the components, services, and modules of an Angular application.

  • Test cases can be run automatically during development or deployment to catch errors early.

  • Examples of test cases include checking if a component renders correctly, if a service returns the expected data, or if a module is impor...read more

Add your answer

Q262. How spring works internally

Ans.

Spring is a lightweight framework that provides comprehensive infrastructure support for developing Java applications.

  • Spring works internally by using Inversion of Control (IoC) container to manage Java objects.

  • It uses Dependency Injection to inject the dependencies of an object at runtime.

  • Spring also provides Aspect-Oriented Programming (AOP) support for cross-cutting concerns.

  • It utilizes various modules like Core, Context, AOP, JDBC, ORM, etc., to provide different function...read more

Add your answer

Q263. what is sql injection

Ans.

SQL injection is a type of cyber attack where malicious SQL code is inserted into input fields to manipulate a database.

  • SQL injection occurs when a user input is not properly sanitized and allows an attacker to execute malicious SQL commands.

  • It can lead to unauthorized access to sensitive data, data loss, and even complete server takeover.

  • Example: Entering ' OR '1'='1' into a login form to bypass authentication and gain access to the system.

Add your answer

Q264. find out duplicate element in array?

Ans.

Use a HashSet to find duplicate elements in an array of strings.

  • Create a HashSet to store unique elements.

  • Iterate through the array and check if the element is already in the HashSet.

  • If it is, then it is a duplicate element.

  • Example: String[] array = {"apple", "banana", "apple", "orange"};

Add your answer

Q265. What is Interface and share real example

Ans.

An interface is a contract that defines a set of methods and properties that a class must implement.

  • Interfaces provide a way to achieve abstraction and polymorphism in object-oriented programming.

  • They allow for loose coupling between classes and promote code reusability.

  • An example of an interface in C# is the IDisposable interface, which defines a method for releasing unmanaged resources.

  • Another example is the IEnumerable interface, which defines methods for iterating over a ...read more

Add your answer

Q266. Binary search algorithm explanation

Ans.

Binary search is a divide and conquer algorithm that efficiently finds the target value in a sorted array.

  • Divide the array in half and compare the target value with the middle element

  • If the target value is smaller, search the left half. If larger, search the right half

  • Repeat the process until the target value is found or the subarray is empty

Add your answer

Q267. all sorting alogorithm and their complexity

Add your answer

Q268. Hashmap working internal details

Ans.

Hashmap is a data structure that stores key-value pairs and uses hashing to map keys to values.

  • Hashmap uses hashing function to determine the index of the key in the underlying array.

  • Collision handling is done by chaining or open addressing.

  • Hashmap provides constant time complexity O(1) for insertion, deletion, and retrieval.

  • Example: HashMap map = new HashMap<>(); map.put("key", 123); int value = map.get("key");

Add your answer

Q269. Why we use microservices

Ans.

Microservices allow for modular, scalable, and flexible software development by breaking down applications into smaller, independent services.

  • Microservices enable easier maintenance and updates as each service can be developed, deployed, and scaled independently.

  • They improve fault isolation, as failures in one service do not necessarily affect the entire application.

  • Microservices promote agility and faster time-to-market by allowing teams to work on different services simulta...read more

Add your answer

Q270. What is 1 nf 2nf

Ans.

1NF and 2NF are normalization forms in database design to reduce redundancy and improve data integrity.

  • 1NF (First Normal Form) ensures that each column in a table contains atomic values and there are no repeating groups.

  • 2NF (Second Normal Form) builds on 1NF by ensuring that all non-key attributes are fully functional dependent on the primary key.

  • For example, if we have a table 'Orders' with columns 'OrderID', 'ProductID', 'ProductName', and 'ProductPrice', we can normalize i...read more

Add your answer

Q271. What is soap and fully explained

Add your answer

Q272. Explain how backpropogation works

Ans.

Backpropagation is a method used in neural networks to update the weights of the network by calculating the gradient of the loss function.

  • Backpropagation involves calculating the gradient of the loss function with respect to each weight in the network.

  • The gradients are then used to update the weights in the network in order to minimize the loss function.

  • This process is repeated iteratively until the network converges to a set of weights that minimize the loss function.

  • Backpro...read more

Add your answer

Q273. Get min and max from a list without using function

Ans.

Find min and max from a list without using function

  • Iterate through the list and compare each element with current min and max values

  • Update min and max values accordingly

Add your answer

Q274. Before vs After Triggers

Ans.

Before triggers are executed before the record is saved to the database, while after triggers are executed after the record is saved.

  • Before triggers are used to validate or modify record values before they are saved.

  • After triggers are used to perform additional actions after the record is saved.

  • Before triggers can be used to prevent the record from being saved by throwing an exception.

  • After triggers can be used to update related records or perform asynchronous operations.

View 1 answer

Q275. Program to reverse a string

Ans.

A program to reverse a string

  • Iterate through the string from end to start and append each character to a new string

  • Use built-in functions like reverse() or StringBuilder.reverse() in some programming languages

  • Convert the string to an array, reverse the array, and then convert it back to a string

Add your answer

Q276. What is NodeJs and why we need to use

Ans.

Node.js is a runtime environment that allows you to run JavaScript on the server side.

  • Node.js is built on Chrome's V8 JavaScript engine.

  • It is lightweight and efficient for building scalable network applications.

  • Node.js uses an event-driven, non-blocking I/O model, making it ideal for real-time applications like chat apps or streaming services.

Add your answer

Q277. Why agile over water fall ?

Ans.

Agile is preferred over waterfall due to its flexibility, adaptability, and ability to deliver value incrementally.

  • Agile allows for continuous feedback and adjustments throughout the project.

  • Agile promotes collaboration and communication among team members.

  • Agile enables faster delivery of working software and allows for changes to be made easily.

  • Agile is better suited for projects with evolving requirements or uncertain outcomes.

  • Waterfall is more rigid and sequential, making ...read more

Add your answer

Q278. Development about backend and front end

Ans.

Backend development focuses on server-side logic and databases, while front end development focuses on user interface and client-side functionality.

  • Backend development involves writing server-side code using languages like Java, Python, or Node.js.

  • Front end development involves creating user interfaces using HTML, CSS, and JavaScript.

  • Backend developers work on databases, APIs, and server-side logic.

  • Front end developers focus on creating visually appealing and interactive user...read more

Add your answer

Q279. What is ssis? How we use

Ans.

SSIS stands for SQL Server Integration Services, a tool provided by Microsoft for data integration and workflow applications.

  • SSIS is a platform for building high-performance data integration and workflow solutions.

  • It allows you to create packages that move data from various sources to destinations.

  • SSIS includes a visual design interface for creating, monitoring, and managing data integration processes.

  • You can use SSIS to automate tasks such as data extraction, transformation,...read more

Add your answer

Q280. what is polymorphism

Ans.

Polymorphism is the ability of an object to take on many forms. It allows objects of different classes to be treated as the same type.

  • Polymorphism is a fundamental concept in object-oriented programming.

  • It enables code reusability and flexibility.

  • Polymorphism can be achieved through method overriding and method overloading.

  • Example: A parent class Animal can have multiple child classes like Dog, Cat, and Bird. They can all be treated as Animals.

  • Polymorphism allows for the use ...read more

Add your answer

Q281. write a program reverse the integer no

Ans.

This program reverses an integer number.

  • Convert the integer to a string

  • Reverse the string

  • Convert the reversed string back to an integer

Add your answer

Q282. Explain Django life cycle.

Ans.

Django life cycle involves request processing, URL routing, view function execution, template rendering, and response generation.

  • When a request is made, Django checks the URL patterns defined in urls.py file.

  • If a match is found, the corresponding view function is executed.

  • The view function processes the request and returns a response.

  • The response is rendered using a template, if applicable.

  • The final response is sent back to the client.

Add your answer

Q283. what is Custom exception?

Ans.

Custom exception is a user-defined exception that extends the functionality of the built-in exceptions in Java.

  • Custom exceptions are created by extending the Exception class or one of its subclasses.

  • They allow developers to define their own exception types for specific scenarios.

  • Custom exceptions can include additional methods and fields to provide more information about the exception.

  • Example: public class CustomException extends Exception { // custom exception code here }

Add your answer

Q284. how to allocatte dynamic memory

Add your answer

Q285. what is MDM And is features in windows

Add your answer

Q286. What is context, What is hooks

Ans.

Context is a feature in React that allows data to be passed down the component tree without manually passing props. Hooks are functions that allow you to use state and other React features in functional components.

  • Context is used to share data between components without passing props explicitly

  • Hooks are functions that allow you to use state and other React features in functional components

  • Context provides a way to pass data through the component tree without having to pass pr...read more

Add your answer

Q287. How do you save data transfer cost

Ans.

Optimize data transfer by compressing data, using caching, minimizing unnecessary transfers, and utilizing efficient protocols.

  • Utilize data compression techniques to reduce the size of data being transferred

  • Implement caching mechanisms to store frequently accessed data locally and reduce the need for repeated transfers

  • Minimize unnecessary data transfers by only sending essential data and avoiding redundant transfers

  • Utilize efficient protocols such as HTTP/2 or QUIC to optimiz...read more

Add your answer

Q288. Optimization techniques for react

Ans.

Optimization techniques for React include code splitting, lazy loading, memoization, and virtualization.

  • Code splitting: Break down the code into smaller chunks to load only what is necessary for each page.

  • Lazy loading: Load components only when they are needed, improving initial load time.

  • Memoization: Cache the results of expensive function calls to avoid redundant calculations.

  • Virtualization: Render only the visible elements in a list, improving performance for large dataset...read more

Add your answer

Q289. What is oops, Jruby GIThub command

Ans.

OOPs stands for Object-Oriented Programming, JRuby is a Ruby implementation on the Java Virtual Machine, and GitHub commands are used for version control.

  • OOPs is a programming paradigm based on the concept of objects, which can contain data in the form of fields and code in the form of procedures.

  • JRuby is a Ruby implementation that runs on the Java Virtual Machine, allowing Ruby code to interact with Java libraries.

  • GitHub commands are used to interact with repositories on the...read more

Add your answer

Q290. .Net Core design pattern and life time

Ans.

Design patterns in .Net Core help in structuring code for better maintainability and scalability.

  • Design patterns like Singleton, Factory, and Dependency Injection are commonly used in .Net Core.

  • They help in separating concerns, improving code reusability, and making code more testable.

  • Lifetime management in .Net Core refers to how long an object should exist in the application.

  • Transient, Scoped, and Singleton are the three main lifetime options in .Net Core.

  • For example, a Sin...read more

Add your answer

Q291. List all the azure cloud services you know

Ans.

Azure cloud services are a collection of integrated cloud services that developers and IT professionals use to build, deploy, and manage applications through Microsoft's global network of datacenters.

  • Azure Virtual Machines

  • Azure App Services

  • Azure SQL Database

  • Azure Blob Storage

  • Azure Functions

Add your answer

Q292. What is data security

Ans.

Data security refers to the protection of digital data from unauthorized access, use, disclosure, disruption, modification, or destruction.

  • Ensuring data confidentiality by encrypting sensitive information

  • Implementing access controls to restrict unauthorized users from accessing data

  • Regularly updating security measures to protect against evolving threats

  • Backing up data to prevent loss in case of a security breach

Add your answer

Q293. What is state file?

Ans.

A state file is a file used to store the current state of a system or application.

  • State files are commonly used in software development to save the current state of an application for later retrieval.

  • They can be used to store variables, configurations, or other data that needs to persist between sessions.

  • State files are often used in configuration management tools like Terraform to track the state of infrastructure resources.

  • Examples of state files include .tfstate files in T...read more

Add your answer

Q294. Difference between Smoke and SanityTesting?

Ans.

Smoke testing is a quick test to check if the software build is stable for further testing, while sanity testing is a subset of regression testing to verify specific functionality after changes.

  • Smoke testing is done to ensure the critical functionalities of the software are working fine before detailed testing, while sanity testing is done to check specific areas of the application after changes.

  • Smoke testing is a shallow and wide approach to testing, covering all major areas...read more

Add your answer

Q295. Opps concepts with one live example

Ans.

OOPs concepts are the pillars of Java programming. Encapsulation, Inheritance, Polymorphism, and Abstraction are the four main concepts.

  • Encapsulation - Wrapping data and methods into a single unit. Example - Class

  • Inheritance - Acquiring properties of one class by another. Example - Parent and Child class

  • Polymorphism - Ability of an object to take many forms. Example - Method Overloading and Overriding

  • Abstraction - Hiding implementation details and showing only functionality. ...read more

Add your answer

Q296. Explain Threading of Python.

Ans.

Threading in Python allows multiple threads of execution to run concurrently within a single process.

  • Python's threading module provides a way to create and manage threads.

  • Threads share the same memory space and can access the same variables and data structures.

  • Threading can improve performance for I/O-bound tasks, but not for CPU-bound tasks.

  • Python's Global Interpreter Lock (GIL) limits true parallelism in multi-threaded programs.

  • Thread synchronization can be achieved using l...read more

Add your answer

Q297. Underlying structure of Databricks

Ans.

Databricks is built on Apache Spark, a unified analytics engine for big data processing.

  • Databricks is built on top of Apache Spark, which provides a unified analytics engine for big data processing.

  • It offers a collaborative platform for data scientists, data engineers, and business analysts to work together.

  • Databricks provides tools for data ingestion, data processing, machine learning, and visualization.

  • It supports multiple programming languages like Python, Scala, SQL, and ...read more

Add your answer

Q298. how to perform Tunnig in LLMs?

Ans.

Tuning in LLMs involves adjusting hyperparameters to optimize model performance.

  • Perform grid search or random search to find the best hyperparameters

  • Use cross-validation to evaluate different hyperparameter combinations

  • Consider using automated hyperparameter tuning tools like Optuna or Hyperopt

Add your answer

Q299. multithreading working in java

Ans.

Multithreading is a concept in Java that allows concurrent execution of multiple threads.

  • Multithreading improves performance by utilizing multiple threads to execute tasks concurrently.

  • Java provides built-in support for multithreading through the Thread class and Runnable interface.

  • Threads can be created by extending the Thread class or implementing the Runnable interface.

  • Synchronization mechanisms like locks and semaphores can be used to control access to shared resources.

  • Th...read more

Add your answer

Q300. Explain your automation framework

Ans.

Our automation framework is a hybrid framework that combines data-driven and keyword-driven approaches.

  • We use Excel sheets to store test data and test cases.

  • We have a set of reusable functions that are stored in a separate library.

  • We use Selenium WebDriver for web automation and Appium for mobile automation.

  • We have a reporting mechanism that generates reports in HTML format.

  • We use Jenkins for continuous integration and continuous deployment.

  • We have implemented parallel execut...read more

Add your answer
1
2
3
4
5
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos

Interview Process at null

based on 285 interviews in the last 1 year
Interview experience
3.9
Good
View more
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Interview Questions from Similar Companies

3.8
 • 2.9k Interview Questions
3.8
 • 356 Interview Questions
4.0
 • 147 Interview Questions
3.7
 • 143 Interview Questions
3.7
 • 142 Interview Questions
3.7
 • 135 Interview Questions
View all
Top Persistent Systems Interview Questions And Answers
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
70 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions
Get AmbitionBox app

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter