Premium Employer

Publicis Sapient

3.5
based on 3.1k Reviews
Filter interviews by

400+ Aravind Eye Hospital Interview Questions and Answers

Updated 13 Jan 2025
Popular Designations

Q201. Deep copy vs Shallow copy.

Ans.

Deep copy creates a new object with its own memory, while shallow copy creates a new reference to the same memory.

  • Deep copy duplicates the object and all of its contents, while shallow copy only duplicates the object itself.

  • Deep copy is more memory-intensive than shallow copy.

  • In Python, deep copy can be achieved using the copy.deepcopy() method, while shallow copy can be achieved using the copy.copy() method.

Add your answer

Q202. 1.What are transformations and actions in spark 2.How to reduce shuffling 3.Questions related to project

Ans.

Transformations and actions in Spark, reducing shuffling, and project-related questions.

  • Transformations in Spark are operations that create a new RDD from an existing one, while actions are operations that return a value to the driver program.

  • Examples of transformations include map, filter, and reduceByKey, while examples of actions include count, collect, and saveAsTextFile.

  • To reduce shuffling in Spark, you can use techniques like partitioning, caching, and using appropriate...read more

Add your answer

Q203. let val = {a: {b: 5}}, display the value 5 and freeze the val so that it cannot be changed to another number.

Add your answer

Q204. Sematic elements in HTML? What is Sass, SCSS, LESS and more about CSS? Design a HTML form? Test cases in javascript How you will implement security on a banking website.

Ans.

Semantic elements in HTML are used to give meaning to the content, making it more accessible and SEO-friendly.

  • Semantic elements like <header>, <footer>, <nav>, <article>, <section>, <aside>, <main>, <figure>, <figcaption>, <details>, <summary>, etc., provide structure and meaning to the content.

  • They help search engines understand the content better, improving SEO.

  • Using semantic elements also enhances accessibility for users with disabilities, as screen readers can interpret t...read more

Add your answer
Discover Aravind Eye Hospital interview dos and don'ts from real experiences

Q205. How to address data inconsistency in micro service architecture?

Ans.

Data inconsistency in micro service architecture can be addressed by implementing event-driven architecture, using distributed transactions, and ensuring eventual consistency.

  • Implement event-driven architecture to propagate changes across services in a consistent manner

  • Use distributed transactions to ensure atomicity and consistency across multiple services

  • Ensure eventual consistency by designing services to handle eventual consistency and resolving conflicts when they arise

Add your answer

Q206. What do you put in FRD

Ans.

FRD (Functional Requirements Document) includes detailed specifications of the functional requirements of a system.

  • FRD includes a description of the system's functionality and features.

  • It outlines the specific requirements that the system must meet.

  • It includes use cases, user stories, and functional specifications.

  • FRD may also include non-functional requirements such as performance, security, and usability.

  • It serves as a communication tool between stakeholders and the develop...read more

Add your answer
Are these interview questions helpful?

Q207. What is the difference between General Ledger and Sub-Ledger?

Ans.

General Ledger is a record of all financial transactions of a company, while Sub-Ledger contains details of specific accounts within the General Ledger.

  • General Ledger summarizes all financial transactions in one place, while Sub-Ledger provides detailed information for specific accounts.

  • General Ledger is used for preparing financial statements, while Sub-Ledger helps in tracking individual account balances.

  • Examples: General Ledger may show total sales revenue for the company,...read more

Add your answer

Q208. Coding question - Flatten 3 integer lists into one single list using streams and flatmap

Ans.

Flatten 3 integer lists into one using streams and flatmap.

  • Use flatMap to transform each list into a stream of integers

  • Collect all the integers into a single list using the collect method

Add your answer
Share interview questions and help millions of jobseekers 🌟

Q209. How will you handle synchronization issues in selenium

Add your answer

Q210. Write a program to find sum of any two elements in an array is equal to x?(x=-1)

Ans.

Program to find sum of any two elements in an array equal to -1

  • Iterate through the array and for each element, check if there exists another element whose sum is equal to -1

  • Use a hashmap to store the elements and their indices for faster lookup

  • Handle edge cases like empty array or array with less than 2 elements

  • Example: For array [-2, 3, 5, -3, 8], the pairs (-2, 1) and (3, -3) have sum equal to -1

Add your answer

Q211. Best deployment strategy to use for kubernetes deployments?

Ans.

The best deployment strategy for Kubernetes deployments is to use rolling updates.

  • Rolling updates allow for zero downtime deployment by gradually updating pods.

  • Canary deployments can also be used to test new versions on a small subset of users.

  • Blue-green deployments can be used to switch between two identical environments.

  • Deployment strategies should be chosen based on the specific needs of the application.

  • Other strategies include A/B testing and feature flags.

Add your answer

Q212. What is the difference between debounce and throttling

Ans.

Debounce delays the execution of a function until after a specified time period, while throttling limits the rate at which a function can be executed.

  • Debounce waits for a specified time period of inactivity before executing the function, while throttling limits the rate at which the function can be called.

  • Debounce is useful for scenarios like search bars where you want to wait for the user to finish typing before making an API call, while throttling is useful for scenarios li...read more

Add your answer

Q213. Design a product catalogue to view and book order and update the stock

Ans.

A product catalogue system for viewing, booking orders, and updating stock

  • Create a database to store product information, stock levels, and orders

  • Design a user-friendly interface for browsing products and placing orders

  • Implement functionality for updating stock levels after orders are placed

  • Include features for tracking order status and managing inventory

  • Consider implementing search and filter options for easy navigation

Add your answer

Q214. Why to use uncontrolled components instead of controlled

Ans.

Uncontrolled components are useful for simple forms where you don't need to track every change in real-time.

  • Uncontrolled components are easier to set up and require less code compared to controlled components.

  • They are useful for forms with a large number of inputs where tracking every change is not necessary.

  • Uncontrolled components can be faster for rendering large forms as they do not need to re-render on every change.

Add your answer

Q215. Explain design system in JS with one example

Ans.

A design system in JS is a collection of reusable components and guidelines for consistent UI design.

  • Design systems help maintain consistency and efficiency in UI development.

  • Components in a design system can include buttons, forms, typography, etc.

  • One example is Material-UI, a popular design system for React applications.

Add your answer

Q216. Write code for giving output as day of week for a given date

Add your answer

Q217. What do you mean by GPRS

Ans.

GPRS stands for General Packet Radio Service, a mobile data service that allows users to access the internet on their mobile devices.

  • GPRS is a 2G technology that enables data transfer over cellular networks

  • It uses packet switching to transmit data, allowing for more efficient use of network resources

  • GPRS is slower than 3G and 4G technologies, with typical speeds ranging from 56-114 kbps

  • Examples of GPRS-enabled devices include early smartphones and feature phones with internet...read more

Add your answer

Q218. What is a Requirement creep?

Ans.

Requirement creep refers to the continuous addition of new requirements during the development process.

  • Requirement creep occurs when new features or functionalities are added to a project without proper evaluation or consideration of the impact on the project timeline, budget, and resources.

  • It often happens due to poor communication, lack of clear project scope, or changing business needs.

  • Requirement creep can lead to project delays, increased costs, and decreased customer sa...read more

Add your answer

Q219. Java program to find the missing number from array.

Ans.

Java program to find the missing number from array.

  • Create an array of integers.

  • Calculate the sum of all the integers in the array.

  • Calculate the sum of first n natural numbers where n is the length of the array.

  • Subtract the sum of array from the sum of first n natural numbers to get the missing number.

Add your answer

Q220. Explain Paging and Segmentation

Ans.

Paging and Segmentation are memory management techniques used by operating systems.

  • Paging divides memory into fixed-size pages and stores them in physical memory.

  • Segmentation divides memory into logical segments and stores them in physical memory.

  • Paging allows for efficient use of physical memory and reduces fragmentation.

  • Segmentation allows for protection and sharing of memory between processes.

  • Examples of operating systems that use paging and segmentation are Windows and Li...read more

Add your answer

Q221. How can we make a class immutable?

Ans.

To make a class immutable, we can use final keyword for class, fields, and methods, make fields private, and avoid setters.

  • Use final keyword for class to prevent inheritance

  • Make fields private to restrict direct access

  • Avoid providing setter methods for fields

  • If fields are mutable objects, return a copy of the object instead of the original

Add your answer

Q222. How you provide the consultation on the branding?

Ans.

I provide consultation on branding by conducting research, understanding the target audience, creating brand guidelines, and collaborating with stakeholders.

  • Conduct research to understand the market and competitors

  • Identify the target audience and their needs

  • Create brand guidelines to ensure consistency in branding

  • Collaborate with stakeholders to align on brand strategy

Add your answer

Q223. how routing is performed in asp.net core api

Ans.

Routing in ASP.NET Core API is performed using the built-in middleware called Endpoint Routing.

  • Endpoint Routing is responsible for mapping incoming requests to the appropriate action methods in the controller.

  • It uses the HTTP verb, URL pattern, and route data to determine the correct action method.

  • Routes can be defined using attributes on the controller and action methods or in the Startup.cs file.

  • Middleware like authentication and authorization can be added to the routing pi...read more

Add your answer

Q224. What is X-ray Search?

Ans.

X-ray search is a process of examining an object or a person using X-rays to reveal its internal structure.

  • X-ray search is commonly used in medical imaging to diagnose and treat various conditions.

  • It can also be used in security screening to detect hidden objects or weapons.

  • X-ray search involves exposing the object or person to a controlled amount of radiation and capturing the resulting image.

  • The image can then be analyzed by a trained professional to identify any abnormalit...read more

Add your answer

Q225. Write the C code to implement a Stack using linked list

Add your answer

Q226. Write Lambda expression for Sorting , PartitionBy in Java 8.

Ans.

Lambda expressions in Java 8 for Sorting and PartitionBy

  • Use Comparator interface with lambda expression for sorting

  • Use Collectors.partitioningBy() method with lambda expression for PartitionBy

Add your answer

Q227. What is difference between List and tuple

Ans.

List is mutable, tuple is immutable in Python.

  • List can be modified after creation, tuple cannot.

  • List is defined using square brackets [], tuple using parentheses ().

  • List is slower than tuple due to mutability.

  • Example: list_example = [1, 2, 3], tuple_example = (1, 2, 3)

Add your answer

Q228. write a program to print occurrence of character from a given string

Ans.

Program to print occurrence of characters in a given string

  • Create a map to store characters and their counts

  • Iterate through the string and update the counts in the map

  • Print the characters and their counts from the map

Add your answer

Q229. How you handle security in your application?

Add your answer

Q230. What is a class?

Ans.

A class is a blueprint for creating objects that have similar attributes and behaviors.

  • Classes are used in object-oriented programming.

  • They define the properties and methods that objects of that class will have.

  • Objects are instances of a class.

  • Classes can inherit properties and methods from other classes.

  • Examples of classes include 'Person', 'Car', and 'Animal'.

Add your answer

Q231. What is an object?

Ans.

An object is a self-contained entity that contains data and behavior.

  • An object is an instance of a class.

  • It has attributes (data) and methods (behavior).

  • Objects can interact with each other through their methods.

  • Examples include a car object with attributes like color and model, and methods like start and stop.

  • Another example is a person object with attributes like name and age, and methods like walk and talk.

Add your answer

Q232. What are pointers?

Ans.

Pointers are variables that store memory addresses of other variables.

  • Pointers allow for dynamic memory allocation and manipulation.

  • They are commonly used in programming languages like C and C++.

  • Example: int *ptr; // declares a pointer to an integer variable

  • Example: ptr = # // assigns the memory address of num to ptr

  • Example: *ptr = 5; // assigns the value 5 to the variable pointed to by ptr

Add your answer

Q233. what are structures?

Ans.

Structures are arrangements of elements that form a framework or framework-like support.

  • Structures can be found in various fields such as engineering, architecture, and biology.

  • They can be made of different materials such as steel, wood, or bone.

  • Examples include bridges, buildings, and the skeletal system.

  • Structures can be designed to withstand different types of forces such as compression, tension, or bending.

Add your answer

Q234. What is union?

Ans.

A union is an organization formed by workers to protect their rights and interests in the workplace.

  • Unions negotiate with employers for better wages, benefits, and working conditions.

  • They also provide support and representation for workers in disputes with management.

  • Membership in a union is voluntary, but members pay dues to support the union's activities.

  • Unions can be industry-specific, such as the United Auto Workers, or general, such as the AFL-CIO.

  • Unions have played a si...read more

Add your answer

Q235. Exception Handling in Python Programming in case of class with subclass

Ans.

Exception handling in Python for classes with subclasses involves using try-except blocks to catch and handle errors.

  • Use try-except blocks to catch exceptions in both parent and subclass methods

  • Handle specific exceptions using multiple except blocks

  • Use super() to call parent class methods within subclass methods

  • Reraise exceptions if necessary using 'raise'

Add your answer

Q236. What is grn ? What is 3 way matching .

Ans.

GRN stands for Goods Receipt Note. 3 way matching is a process of matching the purchase order, GRN and invoice.

  • GRN is a document that records the receipt of goods from a supplier.

  • It contains details such as the quantity, description, and condition of the goods received.

  • 3 way matching is a process of matching the purchase order, GRN and invoice to ensure that the goods received match the order placed and the invoice raised.

  • This helps to prevent errors, fraud, and discrepancies...read more

View 1 answer

Q237. Write a code of palindrome of a string ?

Ans.

This code checks if a given string is a palindrome or not.

  • Iterate through the string from both ends and compare the characters.

  • If any pair of characters doesn't match, it's not a palindrome.

  • If all pairs match, it's a palindrome.

  • Consider handling cases and ignoring non-alphanumeric characters if required.

View 1 answer

Q238. How to prevent memory leak?

Ans.

Prevent memory leaks by properly managing memory allocation and deallocation.

  • Use smart pointers instead of raw pointers.

  • Avoid circular references.

  • Free memory when it is no longer needed.

  • Use tools like valgrind to detect memory leaks.

  • Avoid global variables.

  • Use RAII (Resource Acquisition Is Initialization) technique.

  • Avoid using malloc and free directly.

  • Use a garbage collector if appropriate.

View 1 answer

Q239. Where SQL Indexes are stored?

Ans.

SQL indexes are stored in the database's file system.

  • Indexes are stored in the same filegroup as the table or in a separate filegroup.

  • They can be stored in the same physical file as the table or in a separate file.

  • Indexes can also be stored in memory, such as in the buffer pool.

  • The location of the index storage can affect performance.

  • Examples of index storage options include clustered, nonclustered, and full-text indexes.

View 1 answer

Q240. Open any eommerce website and write xpath for a certain element

Add your answer

Q241. Full Working Code for merge Sort

Ans.

Merge Sort is a popular sorting algorithm that divides the array into two halves, sorts them separately, and then merges them back together.

  • Divide the array into two halves recursively

  • Sort each half separately using merge sort

  • Merge the sorted halves back together

Add your answer

Q242. Explain Network Layers?

Ans.

Network layers are a hierarchical way of organizing communication protocols.

  • Network layers provide a modular approach to networking.

  • Each layer has a specific function and communicates with adjacent layers.

  • The OSI model has 7 layers, while the TCP/IP model has 4 layers.

  • Examples of layers include the physical layer, data link layer, network layer, transport layer, and application layer.

Add your answer

Q243. How you tackle various problems

Ans.

I tackle various problems by breaking them down into smaller tasks, conducting research, collaborating with team members, and seeking feedback.

  • Break down the problem into smaller tasks to make it more manageable

  • Conduct research to gather relevant information and insights

  • Collaborate with team members to brainstorm ideas and solutions

  • Seek feedback from peers and mentors to improve problem-solving approach

Add your answer

Q244. Scala-Spark code to perform some extract, transform and load data.

Add your answer

Q245. Why bundling in MVC is needed?

Ans.

Bundling in MVC is needed to improve performance by reducing the number of HTTP requests.

  • Bundling combines multiple files into a single file to reduce the number of HTTP requests.

  • This improves performance by reducing the time it takes to load a page.

  • Bundling also allows for minification, which reduces the size of the files being sent to the client.

  • Examples of files that can be bundled include CSS, JavaScript, and images.

Add your answer

Q246. what is the importance of knowing js internals

Ans.

Understanding JavaScript internals is important for optimizing performance, debugging, and writing efficient code.

  • Helps in optimizing performance by understanding how JavaScript engines work under the hood

  • Aids in debugging by knowing how different data types are stored and manipulated

  • Enables writing efficient code by understanding concepts like event loop, closures, and prototypes

Add your answer

Q247. React Native Unit Testing and What is TDD ?

Ans.

React Native Unit Testing involves testing individual components or functions in isolation. TDD stands for Test-Driven Development, a practice where tests are written before the actual code.

  • React Native Unit Testing involves writing tests to verify the behavior of individual components or functions.

  • TDD (Test-Driven Development) is a software development practice where tests are written before the actual code.

  • TDD helps in ensuring that the code meets the requirements and is ea...read more

Add your answer

Q248. Design a car parking structure in oops Trie data structure C++ DBMS Projects

Ans.

Design a car parking structure using OOPs and Trie data structure in C++ with DBMS integration and project examples.

  • Use OOPs concepts to create classes for parking lot, parking spot, and vehicle

  • Implement Trie data structure to efficiently search for available parking spots

  • Integrate DBMS to store information about parked vehicles and their owners

  • Examples: Parking lot management system, automated parking system

Add your answer

Q249. How many Invoices have you processed in a day?

Ans.

I have processed an average of 50 invoices per day.

  • On average, I process around 50 invoices per day.

  • During peak times, I have processed up to 100 invoices in a day.

  • I use automated tools to streamline the invoice processing workflow.

Add your answer

Q250. Oops concepts with example and use of interface over abstract class

Ans.

Oops concepts and use of interface over abstract class

  • Oops concepts are fundamental to object-oriented programming

  • Encapsulation, Inheritance, Polymorphism, and Abstraction are the four pillars of OOP

  • Interface is a contract that specifies the behavior of a class

  • Abstract class is a class that cannot be instantiated and can have both abstract and non-abstract methods

  • Interface is preferred over abstract class when multiple inheritance is required

Add your answer

Q251. Lifecycle of react class based components, hooks, pure &amp; impure components

Add your answer

Q252. Use of Vaccum in delta tables in terms of performance

Ans.

Vaccum in delta tables helps improve performance by reclaiming space and optimizing file sizes.

  • Vaccum operation helps optimize file sizes by removing small files and compacting larger files.

  • It helps improve query performance by reducing the amount of data that needs to be scanned.

  • Vaccum operation can be scheduled to run periodically to maintain optimal performance.

  • It is recommended to run Vaccum on delta tables after major data deletions or updates.

  • Example: VACCUM delta.`tabl...read more

Add your answer

Q253. What is a Dead Lock?

Ans.

Deadlock is a situation where two or more processes are unable to proceed because they are waiting for each other to release resources.

  • Occurs in multi-threaded/multi-process environments

  • Can lead to system freeze or crash

  • Prevention techniques include resource ordering and timeouts

  • Example: Process A holds resource X and waits for resource Y, while Process B holds resource Y and waits for resource X

Add your answer

Q254. Collections and difference between the different collections, hashmap

Ans.

Explanation of collections and difference between them, with focus on hashmap.

  • Collections are data structures that store and manipulate groups of objects.

  • ArrayList, LinkedList, HashSet, and TreeMap are some examples of collections.

  • HashMap is a collection that stores key-value pairs and allows for fast retrieval of values based on their keys.

  • HashMap uses hashing to store and retrieve values, while TreeMap uses a red-black tree.

  • HashMap allows for null values and keys, while Tre...read more

Add your answer

Q255. Exceptions handling in java?

Ans.

Exceptions handling is a mechanism to handle runtime errors in Java programs.

  • Exceptions are objects that are thrown at runtime when an error occurs

  • Java provides try-catch-finally blocks to handle exceptions

  • Checked exceptions must be handled or declared in the method signature

  • Unchecked exceptions can be handled or left unhandled

  • Custom exceptions can be created by extending the Exception class

Add your answer

Q256. Implement stack and queue using array

Ans.

Implement stack and queue using array of strings

  • For stack, use push() and pop() methods to add and remove elements respectively

  • For queue, use push() to add elements and shift() to remove elements

  • Make sure to handle edge cases like empty stack/queue

  • Example: Stack - ['a', 'b', 'c'] -> push('d') -> ['a', 'b', 'c', 'd'] -> pop() -> ['a', 'b', 'c']

  • Example: Queue - ['a', 'b', 'c'] -> push('d') -> ['a', 'b', 'c', 'd'] -> shift() -> ['b', 'c', 'd']

Add your answer

Q257. How would you use data science in your field

Ans.

Data science can be used in quality engineering to analyze large datasets, identify trends, predict failures, and optimize processes.

  • Utilize data analytics to identify patterns and trends in quality control data

  • Implement predictive modeling to anticipate potential failures in manufacturing processes

  • Optimize quality control processes using machine learning algorithms

  • Utilize statistical analysis to improve product quality and reduce defects

  • Implement data visualization technique...read more

Add your answer

Q258. Find output related to inheritance program

Ans.

Inheritance program output

  • Inheritance allows a subclass to inherit properties and methods from a superclass

  • The output of an inheritance program will depend on the specific implementation

  • The program may output the values of inherited properties or the results of inherited methods

Add your answer

Q259. What is “stat” in dispatcher?

Ans.

Stat is a command in dispatcher that displays statistics about the current state of the system.

  • Stat is a command used in dispatcher to display statistics about the current state of the system.

  • It can be used to view information about the CPU, memory, and disk usage.

  • For example, 'stat -u' displays CPU usage statistics.

  • Another example is 'stat -m' which displays memory usage statistics.

Add your answer

Q260. AAS vs PAS vs IAS in Azure

Ans.

AAS, PAS, and IAS are different types of authentication services in Azure.

  • AAS (Azure Active Directory Authentication) is used for authenticating users and applications in Azure AD.

  • PAS (Managed Service Identity) is used for authenticating resources within Azure services.

  • IAS (Identity Provider Authentication) is used for authenticating users through external identity providers like Facebook or Google.

  • Each service has its own use case and can be used in combination with others f...read more

Add your answer
Q261. Puzzle

Two wire burning puzzle

Add your answer
Q262. Puzzle

3 Ants and Triangle

Add your answer

Q263. How to implement DWH n why

Ans.

A data warehouse (DWH) is implemented to centralize and integrate data from various sources for analysis and reporting purposes.

  • DWH helps in improving data quality and consistency by integrating data from multiple sources.

  • It provides a single source of truth for decision-making by consolidating data into a unified view.

  • DWH enables historical analysis and trend identification by storing large volumes of data over time.

  • It supports complex queries and ad-hoc reporting by optimiz...read more

Add your answer

Q264. How Workload Identity Federation works in GCP

Ans.

Workload Identity Federation in GCP allows workloads running on GCP to authenticate using external identity providers.

  • Workload Identity Federation enables workloads to use external identity providers like Active Directory or LDAP for authentication.

  • It allows workloads to obtain short-lived credentials from GCP's Security Token Service (STS) using their external identity provider's credentials.

  • This helps in centralizing identity management and simplifying access control for wo...read more

Add your answer

Q265. Simple task to fetch characters and their movies

Ans.

Fetch characters and their movies

  • Use API like IMDb or The Movie Database to fetch movie data

  • Parse the data to extract characters and their associated movies

  • Store the characters and movies in an array of strings

Add your answer
Q266. SQL Question

Explain JOINS in SQL.

Add your answer

Q267. Do you create DFD?

Ans.

Yes, as a Senior Business Analyst, I create DFDs (Data Flow Diagrams) to visually represent the flow of data within a system.

  • DFDs are used to analyze and document the processes, inputs, outputs, and data flows within a system.

  • They help in understanding the system's architecture and identifying potential areas for improvement or optimization.

  • DFDs can be created using various tools like Microsoft Visio, Lucidchart, or even pen and paper.

  • They are commonly used in software develo...read more

Add your answer

Q268. Serial and parallel stream in java

Ans.

Serial and parallel streams in Java are used for processing collections of data in a sequential or parallel manner.

  • Serial streams process elements in a single thread, while parallel streams use multiple threads for faster processing.

  • Parallel streams can improve performance for large datasets by utilizing multiple cores of the processor.

  • Serial streams are suitable for smaller datasets or when order of processing is important.

  • Use parallel streams with caution as they may introd...read more

Add your answer

Q269. What is api and why do we use it

Ans.

API is a set of protocols and tools for building software applications. It allows different applications to communicate with each other.

  • API stands for Application Programming Interface

  • It defines how different software components should interact with each other

  • APIs can be used to access data or functionality from other applications or services

  • Examples of APIs include Google Maps API, Twitter API, and Facebook API

Add your answer

Q270. How to monitor k8s Prod instance

Ans.

To monitor k8s Prod instance, use monitoring tools like Prometheus, Grafana, and Kubernetes Dashboard.

  • Use Prometheus to collect metrics from Kubernetes API server and nodes

  • Visualize the collected data using Grafana dashboards

  • Use Kubernetes Dashboard to monitor the health of the cluster and its resources

  • Set up alerts to notify when certain thresholds are reached

  • Monitor logs using tools like Fluentd or Elasticsearch

  • Perform regular health checks and audits to ensure the cluster ...read more

Add your answer

Q271. What is nodejs, explain the event loop.

Ans.

Node.js is a JavaScript runtime built on Chrome's V8 JavaScript engine. It allows developers to run JavaScript on the server-side.

  • Node.js is event-driven and non-blocking I/O model.

  • It uses an event loop to handle asynchronous operations.

  • The event loop is a continuously running process that waits for events and executes callbacks.

  • Callbacks are functions that are called when an event occurs, such as a request completing or a file being read.

  • Node.js uses the libuv library to han...read more

Add your answer

Q272. Count the number of occurrences of a given alphabet in a given word

Add your answer

Q273. What is memory management?

Ans.

Memory management is the process of managing computer memory to allocate and deallocate memory resources.

  • Memory management involves allocating memory to processes that need it and deallocating memory that is no longer needed.

  • It also involves managing memory fragmentation and ensuring efficient use of memory.

  • Examples of memory management techniques include paging, segmentation, and virtual memory.

  • Memory leaks can occur when memory is not properly managed, leading to performanc...read more

Add your answer

Q274. how does hashmap works internally

Ans.

HashMap works internally by using a hash function to map keys to their corresponding values in an array of linked lists.

  • HashMap uses a hash function to determine the index of the array where the key-value pair will be stored.

  • In case of hash collisions, where multiple keys map to the same index, a linked list is used to store multiple entries at that index.

  • When retrieving a value, the hash function is used to find the correct index and then the linked list is searched for the ...read more

Add your answer

Q275. How can you help to publicis sapient..?

Ans.

I can contribute to Publicis Sapient by utilizing my AEM development skills and experience to deliver high-quality solutions.

  • I can work on AEM projects and deliver them on time and within budget.

  • I can collaborate with cross-functional teams to ensure seamless integration of AEM with other systems.

  • I can provide technical guidance and support to junior developers.

  • I can stay up-to-date with the latest AEM trends and technologies to ensure that Publicis Sapient remains competitiv...read more

Add your answer

Q276. What is pure component

Ans.

A pure component is a component in thermodynamics that is made up of a single substance or chemical element.

  • A pure component has a fixed chemical composition and distinct physical properties.

  • It cannot be separated into simpler substances by physical means.

  • Examples include water, oxygen, and gold.

Add your answer

Q277. What is prototype in JS

Ans.

Prototype in JS is an object that every function in JS has, which allows for inheritance and sharing of properties and methods.

  • Prototype is an object that every function in JS has.

  • It allows for inheritance and sharing of properties and methods.

  • You can access an object's prototype using the __proto__ property.

Add your answer

Q278. Difference between GSM and CDMA

Ans.

GSM and CDMA are two different technologies used in mobile communication. GSM uses SIM cards while CDMA doesn't.

  • GSM stands for Global System for Mobile Communications while CDMA stands for Code Division Multiple Access.

  • GSM uses SIM cards to store user information while CDMA uses embedded chips.

  • GSM allows for easy switching of phones while CDMA requires carrier activation.

  • GSM is more widely used globally while CDMA is more common in the US.

  • GSM has better voice quality while CD...read more

Add your answer

Q279. What is selenium and core java ?

Ans.

Selenium is a tool used for automating web applications and Core Java is a programming language used for developing applications.

  • Selenium is an open-source tool used for automating web applications.

  • It supports various programming languages like Java, Python, C#, etc.

  • Core Java is a programming language used for developing applications.

  • It is widely used for developing desktop, web, and mobile applications.

  • Selenium with Java is a popular combination for automation testing.

  • Core J...read more

Add your answer

Q280. What is Event loop? What is higher order components?

Ans.

Event loop is a mechanism that allows JavaScript to perform non-blocking I/O operations.

  • Event loop is a part of JavaScript runtime that continuously checks the call stack and the task queue.

  • It processes the tasks in the task queue one by one and pushes them to the call stack.

  • Higher order components are functions that take a component and return a new component with additional functionality.

  • They are commonly used in React to share code between components and add reusable logic...read more

Add your answer

Q281. How can you make your class immutable?

Add your answer

Q282. default case in switch case

Ans.

Default case in switch case statement

  • Default case is executed when no other case matches the switch expression

  • It is optional and can be placed anywhere in the switch statement

  • It is often used to handle unexpected input or errors

  • It should always be the last case in the switch statement

Add your answer

Q283. writing a recursion program

Ans.

Recursion program is a function that calls itself until a base condition is met.

  • Identify the base case and write the code to handle it

  • Write the code to call the function recursively

  • Ensure that the recursion terminates eventually

  • Examples: factorial, Fibonacci sequence, binary search

Add your answer

Q284. Why runtime exceptions were created by java

Ans.

Java created runtime exceptions to handle unexpected errors during program execution.

  • Runtime exceptions are unchecked exceptions that occur during program execution

  • They are not required to be caught or declared in a method's throws clause

  • They are created to handle unexpected errors such as division by zero or null pointer exceptions

  • They allow for more concise and readable code as developers do not need to handle every possible exception

  • Examples include ArithmeticException, Nu...read more

Add your answer

Q285. A scenario to automate and check if iframe is displayed.

Ans.

Automate scenario to check if iframe is displayed

  • Identify the iframe element using its locator (id, class, xpath, etc.)

  • Switch to the iframe using driver.switchTo().frame() method

  • Verify if the iframe is displayed using driver.findElement() method

Add your answer

Q286. Design pattern that you have used.

Ans.

I have used the Singleton design pattern in my previous projects.

  • Singleton pattern ensures a class has only one instance and provides a global point of access to it.

  • It is useful when you want to control the number of instances that can be created.

  • Example: Creating a Logger class that should have only one instance throughout the application.

Add your answer

Q287. How to call multiple API calls?

Add your answer

Q288. What is TCP dump ? DNS and DHCP

Ans.

TCP dump is a command-line packet analyzer that captures and displays network traffic.

  • TCP dump is used to monitor and troubleshoot network traffic.

  • It captures packets and displays them in real-time or saves them to a file for later analysis.

  • DNS (Domain Name System) is a protocol used to translate domain names into IP addresses.

  • DHCP (Dynamic Host Configuration Protocol) is used to assign IP addresses to devices on a network.

  • TCP dump can be used to analyze DNS and DHCP traffic ...read more

Add your answer

Q289. command to copy the data from AWS s3 to redshift

Ans.

Use the COPY command in Redshift to load data from AWS S3.

  • Use the COPY command in Redshift to load data from S3 bucket.

  • Specify the IAM role with necessary permissions in the COPY command.

  • Provide the S3 file path and Redshift table name in the COPY command.

  • Ensure the Redshift cluster has the necessary permissions to access S3.

Add your answer

Q290. Explain the cost cutting process?

Ans.

Cost cutting process involves identifying and reducing unnecessary expenses to improve profitability.

  • Analyze current expenses and identify areas where costs can be reduced

  • Implement cost-saving measures such as negotiating better prices with suppliers or reducing energy consumption

  • Monitor and track expenses regularly to ensure cost-cutting measures are effective

  • Communicate with stakeholders about the cost-cutting process and the benefits it will bring

  • Evaluate the impact of cos...read more

Add your answer

Q291. What is an array

Ans.

An array is a data structure that stores a collection of elements of the same type in a contiguous block of memory.

  • Arrays can be of any data type, including strings.

  • Elements in an array are accessed using an index starting from 0.

  • Arrays have a fixed size, which is determined at the time of declaration.

  • Arrays can be multidimensional, allowing for the storage of data in multiple dimensions.

  • Example: ['apple', 'banana', 'orange']

Add your answer

Q292. What is the coroutines? Lazy and lateint Sealed classes

Ans.

Coroutines are a way to perform asynchronous programming in a more structured and readable manner in Android development.

  • Coroutines are lightweight threads that can be used to perform long-running tasks without blocking the main thread.

  • They simplify asynchronous programming by allowing developers to write code that looks synchronous, making it easier to understand and maintain.

  • Coroutines can be used for tasks like network requests, database operations, and other IO-bound oper...read more

Add your answer

Q293. whats the technolies ,you want to work on

Add your answer

Q294. Difference between structure and union

Ans.

Structure is a collection of variables of different data types while union is a collection of variables of same data type.

  • Structure allocates memory for all its variables while union allocates memory for only one variable at a time.

  • Structure is used when we want to store different types of data while union is used when we want to store only one type of data.

  • Structure is accessed using dot (.) operator while union is accessed using arrow (->) operator.

  • Example of structure: str...read more

Add your answer

Q295. what is the role of libuv ?

Ans.

libuv is a multi-platform support library with a focus on asynchronous I/O.

  • libuv provides event loop, thread pool, timer, and file system APIs.

  • It is used by Node.js to handle I/O operations in a non-blocking way.

  • libuv abstracts the differences between operating systems and provides a consistent API.

  • It also supports network programming and inter-process communication.

  • Examples of libuv-based applications include Node.js, Atom, and Visual Studio Code.

Add your answer

Q296. solid principles where do they apply

Ans.

Solid principles are a set of design principles for writing maintainable and scalable code.

  • Solid principles apply to object-oriented programming.

  • They help in writing code that is easy to maintain, extend and test.

  • Examples of solid principles are Single Responsibility Principle, Open-Closed Principle, Liskov Substitution Principle, Interface Segregation Principle, and Dependency Inversion Principle.

Add your answer

Q297. Difference between string buffer and string builder

Ans.

String buffer is synchronized and thread-safe, while string builder is not synchronized and faster.

  • String buffer is synchronized, making it thread-safe for use in multi-threaded environments.

  • String builder is not synchronized, making it faster but not thread-safe.

  • String builder is preferred for single-threaded operations due to its faster performance.

  • String buffer is used when thread safety is required, even though it may be slower in some cases.

Add your answer

Q298. Design a process for bakery to track each vehicles speed

Ans.

Implement a process to track vehicles speed in a bakery

  • Install GPS trackers in each vehicle to monitor speed in real-time

  • Set up a central monitoring system to receive and analyze speed data

  • Implement speed limits and alerts for drivers exceeding limits

  • Regularly review speed data to identify trends and areas for improvement

Add your answer

Q299. microservices various design patterns

Ans.

Microservices design patterns are architectural patterns used to design and implement microservices-based applications.

  • Some common microservices design patterns include API Gateway, Service Registry, Circuit Breaker, and Saga Pattern.

  • API Gateway pattern acts as a single entry point for clients to access multiple microservices.

  • Service Registry pattern helps in service discovery and registration of microservices.

  • Circuit Breaker pattern prevents cascading failures by failing fas...read more

Add your answer

Q300. How .net manages memory?

Ans.

Memory management in .NET

  • Garbage Collector manages memory by freeing up unused objects

  • Memory is allocated on the heap and managed by the CLR

  • Finalizers are used to release unmanaged resources

  • Memory leaks can occur if objects are not properly disposed

  • Value types are stored on the stack and are automatically managed

Add your answer
1
2
3
4
5
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos

Interview Process at Aravind Eye Hospital

based on 296 interviews in the last 1 year
Interview experience
4.1
Good
View more
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Interview Questions from Similar Companies

3.7
 • 4.4k Interview Questions
3.5
 • 425 Interview Questions
3.5
 • 373 Interview Questions
3.4
 • 254 Interview Questions
4.2
 • 144 Interview Questions
3.8
 • 130 Interview Questions
View all
Top Publicis Sapient Interview Questions And Answers
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
70 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions
Get AmbitionBox app

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter