Premium Employer

Persistent Systems

3.5
based on 4.1k Reviews
Filter interviews by

400+ Yes Bank Interview Questions and Answers

Updated 28 Mar 2025
Popular Designations

Q301. Get min and max from a list without using function

Ans.

Find min and max from a list without using function

  • Iterate through the list and compare each element with current min and max values

  • Update min and max values accordingly

Add your answer

Q302. Development about backend and front end

Ans.

Backend development focuses on server-side logic and databases, while front end development focuses on user interface and client-side functionality.

  • Backend development involves writing server-side code using languages like Java, Python, or Node.js.

  • Front end development involves creating user interfaces using HTML, CSS, and JavaScript.

  • Backend developers work on databases, APIs, and server-side logic.

  • Front end developers focus on creating visually appealing and interactive user...read more

Add your answer

Q303. Why agile over water fall ?

Ans.

Agile is preferred over waterfall due to its flexibility, adaptability, and ability to deliver value incrementally.

  • Agile allows for continuous feedback and adjustments throughout the project.

  • Agile promotes collaboration and communication among team members.

  • Agile enables faster delivery of working software and allows for changes to be made easily.

  • Agile is better suited for projects with evolving requirements or uncertain outcomes.

  • Waterfall is more rigid and sequential, making ...read more

Add your answer

Q304. What is ssis? How we use

Ans.

SSIS stands for SQL Server Integration Services, a tool provided by Microsoft for data integration and workflow applications.

  • SSIS is a platform for building high-performance data integration and workflow solutions.

  • It allows you to create packages that move data from various sources to destinations.

  • SSIS includes a visual design interface for creating, monitoring, and managing data integration processes.

  • You can use SSIS to automate tasks such as data extraction, transformation,...read more

Add your answer
Discover Yes Bank interview dos and don'ts from real experiences

Q305. what is polymorphism

Ans.

Polymorphism is the ability of an object to take on many forms. It allows objects of different classes to be treated as the same type.

  • Polymorphism is a fundamental concept in object-oriented programming.

  • It enables code reusability and flexibility.

  • Polymorphism can be achieved through method overriding and method overloading.

  • Example: A parent class Animal can have multiple child classes like Dog, Cat, and Bird. They can all be treated as Animals.

  • Polymorphism allows for the use ...read more

Add your answer

Q306. write a program reverse the integer no

Ans.

This program reverses an integer number.

  • Convert the integer to a string

  • Reverse the string

  • Convert the reversed string back to an integer

Add your answer
Are these interview questions helpful?

Q307. What is NodeJs and why we need to use

Ans.

Node.js is a runtime environment that allows you to run JavaScript on the server side.

  • Node.js is built on Chrome's V8 JavaScript engine.

  • It is lightweight and efficient for building scalable network applications.

  • Node.js uses an event-driven, non-blocking I/O model, making it ideal for real-time applications like chat apps or streaming services.

Add your answer

Q308. what is Authentication

Ans.

Authentication is the process of verifying the identity of a user or system.

  • It ensures that only authorized users have access to a system or application.

  • Authentication can be achieved through various methods such as passwords, biometrics, and two-factor authentication.

  • Examples of authentication include logging into a social media account or accessing a secure building with an ID card.

  • Authentication is often used in conjunction with authorization, which determines what actions...read more

Add your answer
Share interview questions and help millions of jobseekers 🌟

Q309. what is Custom exception?

Ans.

Custom exception is a user-defined exception that extends the functionality of the built-in exceptions in Java.

  • Custom exceptions are created by extending the Exception class or one of its subclasses.

  • They allow developers to define their own exception types for specific scenarios.

  • Custom exceptions can include additional methods and fields to provide more information about the exception.

  • Example: public class CustomException extends Exception { // custom exception code here }

Add your answer

Q310. how to allocatte dynamic memory

Add your answer

Q311. Design patterns in Python?

Ans.

Design patterns are reusable solutions to common problems in software design.

  • Design patterns provide a structured approach to solving design problems.

  • Python has several design patterns such as Singleton, Factory, Observer, etc.

  • Each design pattern has its own purpose and usage.

  • Design patterns promote code reusability, maintainability, and scalability.

  • Understanding design patterns helps in writing cleaner and more efficient code.

View 1 answer

Q312. what is MDM And is features in windows

Add your answer

Q313. What is context, What is hooks

Ans.

Context is a feature in React that allows data to be passed down the component tree without manually passing props. Hooks are functions that allow you to use state and other React features in functional components.

  • Context is used to share data between components without passing props explicitly

  • Hooks are functions that allow you to use state and other React features in functional components

  • Context provides a way to pass data through the component tree without having to pass pr...read more

Add your answer

Q314. What is oops, Jruby GIThub command

Ans.

OOPs stands for Object-Oriented Programming, JRuby is a Ruby implementation on the Java Virtual Machine, and GitHub commands are used for version control.

  • OOPs is a programming paradigm based on the concept of objects, which can contain data in the form of fields and code in the form of procedures.

  • JRuby is a Ruby implementation that runs on the Java Virtual Machine, allowing Ruby code to interact with Java libraries.

  • GitHub commands are used to interact with repositories on the...read more

Add your answer

Q315. .Net Core design pattern and life time

Ans.

Design patterns in .Net Core help in structuring code for better maintainability and scalability.

  • Design patterns like Singleton, Factory, and Dependency Injection are commonly used in .Net Core.

  • They help in separating concerns, improving code reusability, and making code more testable.

  • Lifetime management in .Net Core refers to how long an object should exist in the application.

  • Transient, Scoped, and Singleton are the three main lifetime options in .Net Core.

  • For example, a Sin...read more

Add your answer

Q316. List all the azure cloud services you know

Ans.

Azure cloud services are a collection of integrated cloud services that developers and IT professionals use to build, deploy, and manage applications through Microsoft's global network of datacenters.

  • Azure Virtual Machines

  • Azure App Services

  • Azure SQL Database

  • Azure Blob Storage

  • Azure Functions

Add your answer

Q317. Optimization techniques for react

Ans.

Optimization techniques for React include code splitting, lazy loading, memoization, and virtualization.

  • Code splitting: Break down the code into smaller chunks to load only what is necessary for each page.

  • Lazy loading: Load components only when they are needed, improving initial load time.

  • Memoization: Cache the results of expensive function calls to avoid redundant calculations.

  • Virtualization: Render only the visible elements in a list, improving performance for large dataset...read more

Add your answer

Q318. How do you save data transfer cost

Ans.

Optimize data transfer by compressing data, using caching, minimizing unnecessary transfers, and utilizing efficient protocols.

  • Utilize data compression techniques to reduce the size of data being transferred

  • Implement caching mechanisms to store frequently accessed data locally and reduce the need for repeated transfers

  • Minimize unnecessary data transfers by only sending essential data and avoiding redundant transfers

  • Utilize efficient protocols such as HTTP/2 or QUIC to optimiz...read more

Add your answer

Q319. What is data security

Ans.

Data security refers to the protection of digital data from unauthorized access, use, disclosure, disruption, modification, or destruction.

  • Ensuring data confidentiality by encrypting sensitive information

  • Implementing access controls to restrict unauthorized users from accessing data

  • Regularly updating security measures to protect against evolving threats

  • Backing up data to prevent loss in case of a security breach

Add your answer

Q320. Difference between Smoke and SanityTesting?

Ans.

Smoke testing is a quick test to check if the software build is stable for further testing, while sanity testing is a subset of regression testing to verify specific functionality after changes.

  • Smoke testing is done to ensure the critical functionalities of the software are working fine before detailed testing, while sanity testing is done to check specific areas of the application after changes.

  • Smoke testing is a shallow and wide approach to testing, covering all major areas...read more

Add your answer

Q321. Opps concepts with one live example

Ans.

OOPs concepts are the pillars of Java programming. Encapsulation, Inheritance, Polymorphism, and Abstraction are the four main concepts.

  • Encapsulation - Wrapping data and methods into a single unit. Example - Class

  • Inheritance - Acquiring properties of one class by another. Example - Parent and Child class

  • Polymorphism - Ability of an object to take many forms. Example - Method Overloading and Overriding

  • Abstraction - Hiding implementation details and showing only functionality. ...read more

Add your answer

Q322. What is state file?

Ans.

A state file is a file used to store the current state of a system or application.

  • State files are commonly used in software development to save the current state of an application for later retrieval.

  • They can be used to store variables, configurations, or other data that needs to persist between sessions.

  • State files are often used in configuration management tools like Terraform to track the state of infrastructure resources.

  • Examples of state files include .tfstate files in T...read more

Add your answer

Q323. What is Angular test cases

Ans.

Angular test cases are automated tests written to ensure the functionality of Angular applications.

  • Angular test cases are written using testing frameworks like Jasmine and Karma.

  • They test the components, services, and modules of an Angular application.

  • Test cases can be run automatically during development or deployment to catch errors early.

  • Examples of test cases include checking if a component renders correctly, if a service returns the expected data, or if a module is impor...read more

Add your answer

Q324. Underlying structure of Databricks

Ans.

Databricks is built on Apache Spark, a unified analytics engine for big data processing.

  • Databricks is built on top of Apache Spark, which provides a unified analytics engine for big data processing.

  • It offers a collaborative platform for data scientists, data engineers, and business analysts to work together.

  • Databricks provides tools for data ingestion, data processing, machine learning, and visualization.

  • It supports multiple programming languages like Python, Scala, SQL, and ...read more

Add your answer

Q325. to write a program to create linked list

Ans.

A program to create a linked list in C++

  • Define a Node struct with data and next pointer

  • Create functions to insert, delete, and display nodes

  • Initialize a head pointer to start the linked list

  • Example: Node struct { int data; Node* next; }

  • Example: Insert function to add nodes at the end of the list

Add your answer

Q326. how to perform Tunnig in LLMs?

Ans.

Tuning in LLMs involves adjusting hyperparameters to optimize model performance.

  • Perform grid search or random search to find the best hyperparameters

  • Use cross-validation to evaluate different hyperparameter combinations

  • Consider using automated hyperparameter tuning tools like Optuna or Hyperopt

Add your answer

Q327. multithreading working in java

Ans.

Multithreading is a concept in Java that allows concurrent execution of multiple threads.

  • Multithreading improves performance by utilizing multiple threads to execute tasks concurrently.

  • Java provides built-in support for multithreading through the Thread class and Runnable interface.

  • Threads can be created by extending the Thread class or implementing the Runnable interface.

  • Synchronization mechanisms like locks and semaphores can be used to control access to shared resources.

  • Th...read more

Add your answer

Q328. Explain your automation framework

Ans.

Our automation framework is a hybrid framework that combines data-driven and keyword-driven approaches.

  • We use Excel sheets to store test data and test cases.

  • We have a set of reusable functions that are stored in a separate library.

  • We use Selenium WebDriver for web automation and Appium for mobile automation.

  • We have a reporting mechanism that generates reports in HTML format.

  • We use Jenkins for continuous integration and continuous deployment.

  • We have implemented parallel execut...read more

Add your answer

Q329. what isnetworking,what is dbms queries

Ans.

Networking is the practice of connecting computers and other devices to share resources. DBMS queries are commands used to retrieve data from a database.

  • Networking involves connecting computers and devices to share information and resources.

  • DBMS queries are commands used to retrieve specific data from a database.

  • Networking can be wired or wireless, such as Ethernet or Wi-Fi.

  • Examples of DBMS queries include SELECT, INSERT, UPDATE, and DELETE.

Add your answer

Q330. How to reverse string

Ans.

To reverse a string, we can use the StringBuilder class or convert the string to a character array and swap the characters.

  • Create a StringBuilder object and use its reverse() method to reverse the string.

  • Convert the string to a character array, swap the characters from start and end using a loop, and convert the array back to a string.

  • Use recursion to reverse the string by swapping the first and last characters and calling the function recursively on the remaining substring.

Add your answer

Q331. Integration based on TIBCO and MULESOFT

Ans.

TIBCO and MULESOFT are integration platforms used to connect different systems and applications.

  • TIBCO and MULESOFT are both popular integration platforms used to connect different systems and applications

  • TIBCO offers a wide range of integration products including TIBCO BusinessWorks, TIBCO EMS, and TIBCO FTL

  • MULESOFT offers a comprehensive integration platform called Anypoint Platform, which includes Anypoint Studio, Anypoint Connectors, and Anypoint Management Center

  • Both TIBC...read more

Add your answer

Q332. When you are joine

Ans.

Joining a new team requires understanding the team dynamics and culture.

  • Take time to observe and learn about the team's communication style and work processes.

  • Be open to feedback and willing to adapt to the team's way of doing things.

  • Build relationships with team members and establish trust through open communication.

  • Ask questions and seek clarification to ensure a clear understanding of expectations and goals.

  • Contribute your skills and expertise to the team while also being ...read more

Add your answer

Q333. difference between role of BA and PO

Ans.

BA focuses on analyzing business needs and requirements, while PO focuses on defining product features and priorities.

  • BA works closely with stakeholders to gather and analyze requirements

  • PO defines product features, prioritizes them, and works closely with development team

  • BA focuses on understanding business processes and identifying areas for improvement

  • PO ensures that the product meets the needs of the stakeholders and aligns with the overall business goals

Add your answer

Q334. code a counter without using useState?

Add your answer

Q335. Explain Django life cycle.

Ans.

Django life cycle involves request processing, URL routing, view function execution, template rendering, and response generation.

  • When a request is made, Django checks the URL patterns defined in urls.py file.

  • If a match is found, the corresponding view function is executed.

  • The view function processes the request and returns a response.

  • The response is rendered using a template, if applicable.

  • The final response is sent back to the client.

Add your answer

Q336. what is closure

Ans.

Closure is a function that has access to variables in its outer scope, even after the outer function has returned.

  • A closure is created when a function is defined inside another function.

  • The inner function can access variables in the outer function, even after the outer function has returned.

  • Closures are commonly used to create private variables and functions in JavaScript.

  • Example: function outer() { var x = 10; function inner() { console.log(x); } return inner; } var closure ...read more

Add your answer

Q337. how servlet is loaded

Ans.

Servlets are loaded by the servlet container during the initialization phase of the web application.

  • Servlets are Java classes that extend the javax.servlet.http.HttpServlet class.

  • The servlet container loads servlets by creating an instance of the servlet class.

  • The container then calls the init() method of the servlet to initialize it.

  • The servlet container manages the lifecycle of servlets, loading them when needed and unloading them when not in use.

  • Servlets can be loaded auto...read more

Add your answer

Q338. what are the hooks in angular

Ans.

Hooks in Angular are functions that allow developers to execute code at specific points in the component's lifecycle.

  • Hooks are used to perform tasks like initialization, change detection, and destruction in Angular components.

  • Examples of hooks in Angular include ngOnInit, ngOnChanges, ngOnDestroy, etc.

Add your answer

Q339. What is SAFe Explain it?

Ans.

SAFe (Scaled Agile Framework) is a framework for scaling agile practices across an organization.

  • SAFe provides a structured approach to scaling agile practices beyond individual teams to the entire organization.

  • It includes roles, ceremonies, and artifacts to help coordinate work across multiple teams.

  • SAFe is based on principles of Lean, Agile, and DevOps, aiming to improve collaboration, alignment, and delivery.

  • Examples of SAFe roles include Release Train Engineer, Product Own...read more

Add your answer

Q340. SQL Queries using JOINS

Ans.

SQL queries using JOINs are used to combine rows from two or more tables based on a related column between them.

  • Use INNER JOIN to return rows when there is at least one match in both tables.

  • Use LEFT JOIN to return all rows from the left table and the matched rows from the right table.

  • Use RIGHT JOIN to return all rows from the right table and the matched rows from the left table.

  • Use FULL JOIN to return rows when there is a match in one of the tables.

  • Example: SELECT * FROM tabl...read more

Add your answer

Q341. Flat an array without using flat in Js

Ans.

Flattening an array involves converting a multi-dimensional array into a single-dimensional array without using the flat method.

  • Use reduce: You can use the reduce method to iterate through the array and concatenate elements. Example: `arr.reduce((acc, val) => acc.concat(val), [])`.

  • Use recursion: Create a function that checks if an element is an array and flattens it recursively. Example: `function flatten(arr) { return arr.reduce((acc, val) => acc.concat(Array.isArray(val) ? ...read more

Add your answer

Q342. CMOS is complementary semi conductor

Ans.

CMOS is a type of semiconductor technology.

  • CMOS stands for Complementary Metal-Oxide-Semiconductor.

  • It is widely used in digital circuits and microprocessors.

  • It consumes very low power and generates less heat compared to other technologies.

  • Examples of CMOS-based devices include smartphones, laptops, and digital cameras.

Add your answer

Q343. Merge sort algorithm working

Ans.

Merge sort is a divide and conquer algorithm that divides the input array into two halves, sorts them recursively, and then merges the sorted halves.

  • Divide the input array into two halves

  • Recursively sort the two halves

  • Merge the sorted halves back together

Add your answer

Q344. What is infrastructure ?

Ans.

Infrastructure refers to the basic physical and organizational structures needed for the operation of a society or enterprise.

  • Infrastructure includes roads, bridges, buildings, power grids, water supply systems, and communication networks.

  • It is essential for the functioning of a society or enterprise.

  • Infrastructure can be public or private.

  • Examples of public infrastructure include highways, airports, and public transportation systems.

  • Examples of private infrastructure include...read more

Add your answer

Q345. What is functional programming

Ans.

Functional programming is a programming paradigm that treats computation as the evaluation of mathematical functions and avoids changing state and mutable data.

  • Focuses on pure functions that do not have side effects

  • Emphasizes immutability and avoids changing state

  • Supports higher-order functions and function composition

  • Examples include languages like Haskell, Scala, and Clojure

Add your answer

Q346. Architecture of the prev project

Ans.

The architecture of the previous project was based on a microservices approach.

  • The project was divided into smaller, independent services that communicated with each other through APIs.

  • Each service had its own database and could be developed and deployed independently.

  • The architecture allowed for better scalability and fault tolerance.

  • Examples of microservices used in the project include user authentication, payment processing, and order management.

Add your answer

Q347. how do you prioritize roadmap

Ans.

Prioritizing the roadmap involves considering customer needs, business goals, and resource constraints.

  • Understand customer needs and pain points through user research and feedback.

  • Align roadmap with business goals and objectives.

  • Consider resource availability and constraints.

  • Evaluate potential impact and value of each feature or enhancement.

  • Prioritize based on urgency, importance, and potential ROI.

  • Collaborate with cross-functional teams to gather input and make informed deci...read more

Add your answer

Q348. Explain Threading of Python.

Ans.

Threading in Python allows multiple threads of execution to run concurrently within a single process.

  • Python's threading module provides a way to create and manage threads.

  • Threads share the same memory space and can access the same variables and data structures.

  • Threading can improve performance for I/O-bound tasks, but not for CPU-bound tasks.

  • Python's Global Interpreter Lock (GIL) limits true parallelism in multi-threaded programs.

  • Thread synchronization can be achieved using l...read more

Add your answer

Q349. Reverse a number without using loop

Ans.

Reverse a number without loop

  • Convert the number to a string

  • Use string slicing to reverse the string

  • Convert the reversed string back to a number

Add your answer

Q350. What is .net core

Ans.

.NET Core is a free, open-source, cross-platform framework for building modern applications.

  • Developed by Microsoft

  • Supports multiple programming languages

  • Can be used to build web, desktop, and mobile applications

  • Provides high performance and scalability

  • Compatible with Windows, Linux, and macOS

Add your answer

Q351. Define SOLID Principles

Ans.

SOLID principles are a set of five design principles that help make software designs more understandable, flexible, and maintainable.

  • Single Responsibility Principle (SRP) - A class should have only one reason to change.

  • Open/Closed Principle (OCP) - Software entities should be open for extension but closed for modification.

  • Liskov Substitution Principle (LSP) - Objects of a superclass should be replaceable with objects of its subclasses without affecting the functionality.

  • Inter...read more

Add your answer

Q352. What is AI and chat gpt

Ans.

AI stands for Artificial Intelligence, which refers to the simulation of human intelligence in machines. Chat GPT is a chatbot powered by AI.

  • AI is the development of computer systems that can perform tasks that typically require human intelligence, such as visual perception, speech recognition, decision-making, and language translation.

  • Chat GPT is a chatbot powered by OpenAI's GPT-3 model, which uses natural language processing to generate human-like responses in conversation...read more

Add your answer

Q353. What RE-Framework

Ans.

RE-Framework is a Robotic Enterprise Framework for automating business processes using UiPath.

  • RE-Framework is a template designed by UiPath for building scalable and efficient automation projects.

  • It includes pre-built workflows for exception handling, logging, and reusability of components.

  • RE-Framework follows a state machine design pattern to manage the flow of automation.

  • It allows for easy integration of new processes and activities into the automation project.

Add your answer

Q354. check palindrome in python

Ans.

Check if a string is a palindrome in Python

  • Use string slicing to reverse the string and compare with the original string

  • Remove spaces and convert to lowercase for accurate comparison

  • Use a for loop to iterate through the string and check if it is a palindrome

Add your answer

Q355. Checked and unchecked exception

Ans.

Checked exceptions are checked at compile-time while unchecked exceptions are not.

  • Checked exceptions are those that are checked at compile-time and must be handled by the programmer using try-catch or throws clause.

  • Unchecked exceptions are those that are not checked at compile-time and can be handled at runtime.

  • Examples of checked exceptions include IOException, ClassNotFoundException, and SQLException.

  • Examples of unchecked exceptions include NullPointerException, ArrayIndexO...read more

Add your answer

Q356. what is big O notation

Add your answer

Q357. what is servlet life cycle

Add your answer

Q358. what is virtual function

Add your answer

Q359. what is virtual destructor

Add your answer

Q360. 1Code on Palindrome

Ans.

A palindrome is a word, phrase, number, or other sequence of characters that reads the same forward and backward.

  • Check if the string is equal to its reverse to determine if it is a palindrome.

  • Ignore spaces and punctuation when checking for palindromes.

  • Examples: 'racecar', 'madam', '12321'

Add your answer

Q361. What are oops concepts

Ans.

Object-oriented programming concepts that focus on data encapsulation, inheritance, polymorphism, and abstraction.

  • Encapsulation: Bundling data and methods that operate on the data into a single unit (class).

  • Inheritance: Ability of a class to inherit properties and behavior from another class.

  • Polymorphism: Ability to present the same interface for different data types.

  • Abstraction: Hiding the complex implementation details and showing only the necessary features to the outside ...read more

Add your answer

Q362. What is the cpu c

Ans.

CPU stands for Central Processing Unit, which is the primary component of a computer that performs most of the processing.

  • CPU is also known as the brain of the computer

  • It is responsible for executing instructions and performing calculations

  • CPU speed is measured in GHz

  • Examples of popular CPU brands include Intel and AMD

Add your answer

Q363. What is stereo annotation ?

Ans.

Stereo annotation is the process of labeling or tagging images or videos with depth information to create a 3D effect.

  • Stereo annotation involves identifying corresponding points in a pair of images or frames to determine depth perception.

  • It is commonly used in computer vision tasks such as object detection, tracking, and scene understanding.

  • Examples of stereo annotation include creating depth maps for autonomous driving systems or virtual reality applications.

Add your answer

Q364. .net core middleware example

Ans.

An example of .NET Core middleware

  • Middleware is software that sits between the application and the server

  • In .NET Core, middleware can be used to handle requests and responses

  • An example of .NET Core middleware is the UseRouting method, which sets up routing for the application

Add your answer

Q365. difference between ArrayList and LinkedList

Ans.

ArrayList is implemented using resizable array while LinkedList is implemented using doubly linked list.

  • ArrayList provides fast random access but slow insertion and deletion at middle. LinkedList provides fast insertion and deletion but slow random access.

  • ArrayList uses less memory overhead compared to LinkedList.

  • Example: ArrayList is suitable for scenarios where frequent access and less frequent insertion/deletion is required. LinkedList is suitable for scenarios where frequ...read more

Add your answer

Q366. what is decorators

Ans.

Decorators are functions that modify the behavior of other functions or classes without changing their source code.

  • Decorators are denoted by the '@' symbol in Python.

  • They can be used to add functionality to a function or class, such as logging or timing.

  • Decorators can also be used to create class decorators, which modify the behavior of a class.

  • Examples of decorators include @staticmethod, @classmethod, and @property in Python.

  • Decorators can be chained together to apply multi...read more

Add your answer

Q367. Internal working of hashmap

Ans.

HashMap in Java is a data structure that stores key-value pairs and uses hashing to efficiently retrieve values based on keys.

  • HashMap uses an array of buckets to store key-value pairs.

  • Keys are hashed to determine the index in the array where the key-value pair will be stored.

  • In case of hash collisions, a linked list or a balanced tree is used to store multiple key-value pairs in the same bucket.

  • HashMap allows null keys and values, but only one null key.

  • Example: HashMap<String...read more

Add your answer

Q368. Controller vs restcontroller

Ans.

The main difference is that @RestController is a specialized version of @Controller that is used for RESTful web services.

  • Both @Controller and @RestController are used in Spring MVC to handle HTTP requests, but @RestController is specifically used for RESTful web services.

  • @Controller is used to create web pages, while @RestController is used to return data in JSON or XML format.

  • @RestController is a convenience annotation that combines @Controller and @ResponseBody, making it ...read more

Add your answer

Q369. Oops concepts with examples

Ans.

OOP concepts include inheritance, encapsulation, polymorphism, and abstraction.

  • Inheritance: Allows a class to inherit properties and behavior from another class. Example: class Dog extends Animal.

  • Encapsulation: Bundling data and methods that operate on the data into a single unit. Example: private variables with public getter and setter methods.

  • Polymorphism: Ability for objects to be treated as instances of their parent class. Example: Animal class with different subclasses l...read more

Add your answer

Q370. what is ngModule

Ans.

NgModule is a decorator that defines a module in Angular.

  • NgModule is used to group related components, directives, and services.

  • It helps to organize the application into smaller, manageable pieces.

  • It can import other modules and export its own components, directives, and services.

  • It can also provide configuration for dependency injection.

  • Example: @NgModule({ imports: [CommonModule], declarations: [AppComponent], exports: [AppComponent] })

Add your answer

Q371. what are the types

Ans.

Types of what? Please provide more context.

  • Please provide more context for a specific answer.

  • Types can refer to various things such as types of animals, types of cars, types of diseases, etc.

Add your answer

Q372. Reporting used in framework

Ans.

Reporting is an essential part of any framework to track and analyze test results.

  • Reporting helps in identifying the test cases that have failed and the reasons behind the failure.

  • It also helps in tracking the progress of testing and identifying areas that need improvement.

  • Reporting can be done using various tools such as TestNG, JUnit, Extent Reports, etc.

  • Reports can be generated in various formats such as HTML, PDF, Excel, etc.

  • Reports can also be customized to include speci...read more

Add your answer

Q373. software development life cycle

Ans.

Software development life cycle is a process of planning, designing, developing, testing, and deploying software.

  • SDLC is a framework that helps in the development of software.

  • It consists of several phases such as planning, designing, coding, testing, and deployment.

  • Each phase has its own set of activities and deliverables.

  • SDLC models include Waterfall, Agile, and DevOps.

  • The choice of model depends on the project requirements and team's preference.

Add your answer

Q374. Implement convolution working in c++

Ans.

Implementing convolution in C++

  • Use nested loops to iterate over the input and kernel matrices

  • Apply the convolution operation by multiplying corresponding elements and summing them up

  • Handle edge cases by padding the input matrix if necessary

  • Consider using libraries like OpenCV for optimized implementations

Add your answer

Q375. What are microservices

Ans.

Microservices are a software development technique where applications are composed of small, independent services that communicate with each other.

  • Microservices are small, independent services that focus on specific business functions.

  • Each microservice runs its own process and communicates with other services through APIs.

  • Microservices can be developed, deployed, and scaled independently.

  • Examples of companies using microservices include Netflix, Amazon, and Uber.

Add your answer

Q376. What is containerisation

Ans.

Containerisation is a method of packaging, distributing, and running applications in isolated environments called containers.

  • Containers are lightweight, portable, and efficient units that encapsulate an application and its dependencies.

  • They provide a consistent environment for applications to run across different platforms.

  • Popular containerization platforms include Docker and Kubernetes.

  • Containerisation helps in achieving scalability, flexibility, and faster deployment of app...read more

Add your answer

Q377. What is 4 pillar of oops

Add your answer

Q378. Write class to accept details of student

Ans.

Class to accept details of student

  • Create a class named Student with attributes like name, age, grade, etc.

  • Include a method to input details of the student.

  • Use constructor to initialize the attributes with input values.

Add your answer

Q379. Explain the Kubernetes Architecture ?

Ans.

Kubernetes Architecture is a container orchestration platform that manages the deployment, scaling, and operation of application containers.

  • Kubernetes follows a master-slave architecture with a master node and multiple worker nodes.

  • The master node controls the cluster and schedules workloads, while the worker nodes run the actual containers.

  • Key components of Kubernetes architecture include Pods, Nodes, Services, and Controllers.

  • Pods are the smallest deployable units in Kubern...read more

Add your answer

Q380. How services works in k8s

Ans.

Services in k8s are abstractions that define a set of pods and a policy for accessing them.

  • Services allow communication between different parts of an application within a Kubernetes cluster.

  • They provide a stable endpoint for accessing a set of pods, even if the pods are scaled up or down.

  • Services can be of different types such as ClusterIP, NodePort, LoadBalancer, and ExternalName.

  • ClusterIP services expose the service on an internal IP within the cluster.

  • NodePort services exp...read more

Add your answer

Q381. What is a constructor?

Ans.

A constructor is a special method in a class that is automatically called when an instance of the class is created.

  • Constructors have the same name as the class they belong to.

  • They can be used to initialize the object's state or perform any necessary setup.

  • Constructors do not have a return type.

  • Example: public class Person { public Person() { // constructor code here } }

Add your answer

Q382. What is React Native

Ans.

React Native is a framework for building mobile applications using JavaScript and React.

  • React Native is a cross-platform framework developed by Facebook.

  • It allows developers to build mobile apps using JavaScript and React.

  • It uses native components to render UI elements, resulting in a native-like performance.

  • Code written in React Native can be shared between iOS and Android platforms.

  • It provides a rich set of pre-built components and APIs for faster development.

  • React Native a...read more

View 1 answer

Q383. Explain master detail?

Ans.

Master-detail is a relationship between two objects where the detail object is dependent on the master object.

  • Master-detail is a one-to-many relationship.

  • The master object controls certain behaviors of the detail object.

  • Deleting the master record automatically deletes the detail records.

  • Security and sharing settings of the master record are inherited by the detail records.

  • Roll-up summary fields can be created on the master object to display aggregated data from the detail rec...read more

Add your answer

Q384. Current project architecture

Ans.

Our current project architecture follows a microservices approach.

  • We use Docker containers to deploy and manage our microservices.

  • We have implemented service discovery using Consul.

  • We use Kubernetes for orchestration and scaling.

  • We have a centralized logging system using ELK stack.

  • We use Prometheus for monitoring and alerting.

  • We have implemented a CI/CD pipeline using Jenkins.

  • We follow the 12-factor app methodology for building and deploying our microservices.

Add your answer

Q385. C++ programs snipet to tell output

Ans.

C++ program snippet to show output

  • Use cout to print output to console

  • Use endl to add a new line

  • Use << operator to concatenate output

  • Use cin to get input from user

Add your answer

Q386. Explain process of UX?

Ans.

UX process involves understanding user needs, designing solutions, and testing them for usability.

  • Research user needs and behaviors

  • Create user personas and scenarios

  • Design user interfaces and interactions

  • Test and iterate designs based on user feedback

  • Implement and launch the final product

  • Continuously gather user feedback and make improvements

  • Examples: user interviews, wireframing, prototyping, usability testing

Add your answer

Q387. Explain GIL python.

Ans.

GIL stands for Global Interpreter Lock, which is a mechanism used in CPython to ensure thread safety.

  • GIL is a mutex that allows only one thread to execute Python bytecode at a time.

  • It is necessary because CPython's memory management is not thread-safe.

  • GIL can cause performance issues in CPU-bound multi-threaded applications.

  • However, it does not affect I/O-bound or multi-process applications.

  • Alternative Python implementations like Jython and IronPython do not have GIL.

Add your answer

Q388. Explain iterator, generator and lambdas

Ans.

Iterators are objects that allow iteration over a sequence, generators are functions that yield values one at a time, and lambdas are anonymous functions.

  • Iterators are objects that implement the iterator protocol, with methods like __iter__() and __next__().

  • Generators are functions that use the yield keyword to return values one at a time, pausing execution between each yield.

  • Lambdas are anonymous functions defined using the lambda keyword, typically used for simple, one-line...read more

Add your answer

Q389. What's is **kwargs in python

Ans.

kwargs in Python is a special syntax that allows you to pass a variable number of keyword arguments to a function.

  • kwargs stands for keyword arguments.

  • It is used in Python functions to accept a variable number of keyword arguments.

  • kwargs is represented by a double asterisk (**).

  • Example: def my_func(**kwargs):

Add your answer

Q390. What are magical methods

Ans.

Magical methods are special methods in Python that begin and end with double underscores, used for operator overloading and other special behaviors.

  • Magical methods are also known as dunder methods, short for 'double underscore'.

  • They are used to define how objects of a class behave when certain operations are performed on them, such as addition, subtraction, comparison, etc.

  • Examples of magical methods include __init__ for object initialization, __add__ for addition, __str__ fo...read more

Add your answer

Q391. How to enable data factory

Ans.

To enable data factory, you need to create a data factory resource in Azure and configure it with linked services, datasets, and pipelines.

  • Create a data factory resource in Azure portal

  • Configure linked services to connect to data sources and destinations

  • Define datasets to represent the data you want to process

  • Create pipelines to orchestrate the movement and transformation of data

  • Monitor and manage the data factory using Azure portal or PowerShell commands

Add your answer

Q392. How to disable data factory

Ans.

To disable data factory, you can stop or delete the data factory resources.

  • Stop or delete the data factory pipelines and triggers

  • Deallocate or delete the data factory linked services

  • Disable or delete the data factory datasets and data flows

Add your answer

Q393. TYPES OF JOIN IN DBMS

Ans.

Types of join in DBMS

  • Inner join: returns only the matching rows from both tables

  • Left join: returns all the rows from the left table and matching rows from the right table

  • Right join: returns all the rows from the right table and matching rows from the left table

  • Full outer join: returns all the rows from both tables, with NULL values in the columns where there is no match

  • Cross join: returns the Cartesian product of both tables

Add your answer

Q394. PATTERN CODING PROBLEM

Ans.

Write a pattern coding problem using an array of strings.

  • Use loops to iterate through the array and print the pattern.

  • The pattern can be any shape or design.

  • Make sure to use proper spacing and formatting.

Add your answer

Q395. how to deal with priorities

Ans.

Prioritizing tasks based on importance and deadlines is key. Use tools like Eisenhower Matrix or MoSCoW method.

  • Identify and categorize tasks based on urgency and importance

  • Use tools like Eisenhower Matrix to prioritize tasks into four quadrants: urgent and important, important but not urgent, urgent but not important, neither urgent nor important

  • Consider using the MoSCoW method to categorize tasks as Must have, Should have, Could have, Won't have

  • Regularly review and adjust pr...read more

Add your answer

Q396. what is batch job

Ans.

A batch job is a process that runs in the background to process large volumes of data in chunks.

  • Batch jobs are used in Salesforce to handle large data volumes efficiently.

  • They are typically scheduled to run at off-peak times to minimize impact on system performance.

  • Batch jobs can be used for data cleansing, data migration, and other data processing tasks.

  • Example: A batch job that updates all customer records with a new discount percentage.

Add your answer

Q397. Plan for higher education

Ans.

I plan to pursue a Bachelor's degree in Computer Science followed by a Master's degree in Data Science.

  • Research universities with strong programs in Computer Science and Data Science

  • Apply for scholarships and financial aid to help cover tuition costs

  • Consider internships or co-op programs to gain practical experience

  • Connect with alumni or professionals in the field for advice and networking opportunities

Add your answer

Q398. what is user story

Ans.

A user story is a concise description of a feature told from the perspective of the end user.

  • Describes the desired functionality from the user's point of view

  • Written in non-technical language

  • Follows a specific format: As a [role], I want [feature], so that [benefit]

  • Used in Agile development to capture requirements

Add your answer

Q399. Aws sevices you have worked on

Ans.

I have worked on various AWS services including S3, EC2, Lambda, Glue, and Redshift.

  • S3 - Used for storing and retrieving data

  • EC2 - Used for running virtual servers

  • Lambda - Used for serverless computing

  • Glue - Used for ETL (Extract, Transform, Load) processes

  • Redshift - Used for data warehousing and analytics

Add your answer

Q400. What is subnetting.

Ans.

Subnetting is the process of dividing a network into smaller subnetworks.

  • Subnetting helps in efficient utilization of IP addresses.

  • It improves network performance and security.

  • Subnetting is done by borrowing bits from the host portion of an IP address.

  • CIDR notation is used to represent subnet masks.

  • Example: 192.168.1.0/24 represents a network with 256 IP addresses.

Add your answer
1
2
3
4
5
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos

Interview Process at Yes Bank

based on 564 interviews
Interview experience
3.9
Good
View more
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Interview Questions from Similar Companies

3.1
 • 690 Interview Questions
3.7
 • 430 Interview Questions
4.0
 • 235 Interview Questions
3.6
 • 193 Interview Questions
3.5
 • 193 Interview Questions
3.8
 • 189 Interview Questions
View all
Top Persistent Systems Interview Questions And Answers
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
75 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter