Premium Employer

Publicis Sapient

3.5
based on 3.1k Reviews
Filter interviews by

400+ Zepto Interview Questions and Answers

Updated 13 Jan 2025
Popular Designations

Q301. Explain MVVM and LiveData

Ans.

MVVM is a design pattern that separates UI from business logic. LiveData is a data holder class that is lifecycle-aware.

  • MVVM stands for Model-View-ViewModel

  • Model represents the data and business logic

  • View represents the UI

  • ViewModel acts as a mediator between Model and View

  • LiveData is an observable data holder class

  • LiveData is lifecycle-aware and only updates the UI when the app is in the foreground

  • LiveData automatically manages the lifecycle of the data

  • LiveData can be used to...read more

Add your answer

Q302. Which reporting tool have you worked on

Add your answer

Q303. Code Inheritance in Javascript using parent child concept

Add your answer

Q304. What is Application Master in Spark

Ans.

Application Master in Spark is responsible for negotiating resources with the ResourceManager and executing tasks on the cluster.

  • Responsible for negotiating resources with the ResourceManager

  • Manages the execution of tasks on the cluster

  • Monitors the progress of tasks and reports back to the driver program

Add your answer
Discover Zepto interview dos and don'ts from real experiences

Q305. Explain bean Lifecyle and scope in SpringBoot.

Ans.

Bean Lifecycle and scope in SpringBoot refers to the creation, initialization, and destruction of beans along with their visibility and accessibility.

  • Bean Lifecycle consists of bean creation, initialization, and destruction phases.

  • Bean Scope determines the visibility and accessibility of beans within the application context.

  • Common bean scopes in SpringBoot include Singleton, Prototype, Request, Session, and Application.

Add your answer

Q306. Write a program to remove duplicate from an array

Ans.

Program to remove duplicates from an array of strings

  • Iterate through the array and store unique elements in a new array

  • Use a set data structure to efficiently remove duplicates

  • Return the new array without duplicates

Add your answer
Are these interview questions helpful?

Q307. coding question to find next greatest number

Ans.

Coding question to find next greatest number

  • Iterate from right to left and find the first digit that is smaller than the digit next to it

  • Swap this digit with the smallest digit on its right side that is greater than it

  • Sort the digits to the right of the swapped digit in ascending order

  • If no such digit exists, return the input number as it is

Add your answer

Q308. How Dictionary stores data

Ans.

A dictionary stores data in key-value pairs.

  • Each key is unique and maps to a specific value.

  • Keys are used to retrieve values from the dictionary.

  • Data can be added, removed, or updated in the dictionary.

  • Examples include Python's dict and Java's HashMap.

Add your answer
Share interview questions and help millions of jobseekers 🌟

Q309. Difference between monolithic and microservices?

Ans.

Monolithic architecture is a single unified unit, while microservices architecture breaks down the application into smaller, independent services.

  • Monolithic architecture is a single, indivisible unit where all components are interconnected and interdependent.

  • Microservices architecture breaks down the application into smaller, independent services that communicate with each other through APIs.

  • Monolithic applications are typically easier to develop and test, but can be harder t...read more

Add your answer

Q310. Interface vs Abstract

Ans.

Interface defines a contract while abstract class provides partial implementation.

  • Interface only contains method signatures while abstract class can have both abstract and non-abstract methods.

  • A class can implement multiple interfaces but can only inherit from one abstract class.

  • Interfaces are used for loose coupling while abstract classes are used for code reusability.

  • Example of interface: Comparable interface in Java.

  • Example of abstract class: Animal class with abstract met...read more

Add your answer

Q311. Difference between interface and abstract class

Ans.

Interface defines only method signatures while abstract class can have method implementations.

  • An interface can be implemented by multiple classes while an abstract class can only be extended by one class.

  • An abstract class can have constructors while an interface cannot.

  • An abstract class can have instance variables while an interface cannot.

  • An abstract class can provide default implementations for some methods while an interface cannot.

  • An abstract class can be used to define a...read more

Add your answer

Q312. Explain “this” keyword.

Ans.

The 'this' keyword refers to the current object or instance in which it is used.

  • Used to refer to the current object or instance in which it is used

  • Can be used in methods, constructors, and inner classes

  • Can be used to differentiate between local and instance variables

  • Example: this.variableName

  • Example: this.methodName()

View 1 answer

Q313. Use of Controller in WebApi

Ans.

Controllers in WebApi are used to handle incoming HTTP requests and provide appropriate responses.

  • Controllers are responsible for handling specific HTTP requests and returning appropriate responses.

  • They contain action methods that are invoked when a specific HTTP request is received.

  • Controllers can also be used to implement authorization and authentication logic.

  • Example: A UserController can handle HTTP requests related to user management such as creating, updating, and delet...read more

Add your answer

Q314. write a vba code convert 2/2/2022 in text

Ans.

Use VBA code to convert 2/2/2022 into text format.

  • Use the Format function in VBA to convert the date into text.

  • Specify the desired format within the Format function.

  • Example: Format(#2/2/2022#, "mmmm d, yyyy") will convert 2/2/2022 to February 2, 2022.

Add your answer

Q315. Finding second largest number in an array

Ans.

Find the second largest number in an array

  • Sort the array in descending order

  • Return the element at index 1

Add your answer

Q316. What is synchronisation

Ans.

Synchronization is the coordination of multiple processes or threads to ensure their orderly execution.

  • Synchronization is used to prevent race conditions and ensure data consistency.

  • It involves using locks, semaphores, or other mechanisms to control access to shared resources.

  • Examples of synchronization include mutual exclusion, critical sections, and inter-process communication.

  • Synchronization can also be achieved through synchronization primitives like mutexes and condition...read more

View 1 answer

Q317. What is referential integrity?

Add your answer

Q318. Project explanation and day to day activities

Add your answer

Q319. How to handle dynamic table on webpage

Ans.

Use XPath or CSS selectors to locate elements and extract data from the table dynamically.

  • Identify unique attributes of the table such as class, id, or structure

  • Use XPath or CSS selectors to locate the table and its elements

  • Iterate through rows and columns to extract data dynamically

  • Handle pagination or lazy loading if applicable

Add your answer

Q320. What is Aem component

Ans.

An AEM component is a reusable building block used to create web pages in Adobe Experience Manager.

  • AEM components are used to define the structure and layout of web pages.

  • They can include HTML, CSS, JavaScript, and server-side logic.

  • Examples of AEM components include image carousels, navigation menus, and contact forms.

Add your answer

Q321. Design patterns you have used in your project

Add your answer

Q322. How does SSL pinning works?

Ans.

SSL pinning is a security technique that ensures a client only communicates with a server using a pre-defined public key.

  • SSL pinning involves hardcoding the server's public key in the client's code or configuration.

  • During the SSL handshake, the client checks if the server's public key matches the pinned key.

  • If the keys match, the connection is established; otherwise, it is rejected.

  • Pinning prevents man-in-the-middle attacks by verifying the server's identity.

Add your answer

Q323. Where to save encription key?

Ans.

Encryption keys should be securely stored in a separate key management system.

  • Encryption keys should not be stored alongside the encrypted data.

  • Use a dedicated key management system (KMS) to store and manage encryption keys.

  • Implement strong access controls and authentication mechanisms for the KMS.

  • Consider using hardware security modules (HSMs) for added security.

  • Regularly rotate encryption keys to minimize the impact of a potential compromise.

Add your answer

Q324. explain the importance of uuid in serialization

Ans.

UUID ensures unique identification of objects during serialization process.

  • UUID helps prevent data duplication and ensures each object has a unique identifier.

  • It is especially important when serializing complex data structures to maintain integrity.

  • UUIDs are commonly used in distributed systems to uniquely identify objects across different nodes.

  • Example: When serializing a list of user profiles, using UUIDs for each profile ensures no two profiles have the same identifier.

Add your answer

Q325. Difference between C and C++

Add your answer

Q326. Solid principle with examples

Ans.

SOLID principles are a set of guidelines for writing maintainable and scalable code.

  • Single Responsibility Principle - A class should have only one reason to change.

  • Open/Closed Principle - A class should be open for extension but closed for modification.

  • Liskov Substitution Principle - Subtypes should be substitutable for their base types.

  • Interface Segregation Principle - A client should not be forced to depend on methods it does not use.

  • Dependency Inversion Principle - High-le...read more

Add your answer

Q327. Use case to create a DHA

Ans.

A DHA (Data Handling Application) is created to manage and process data efficiently.

  • Identify the data sources and types of data to be handled

  • Design a data model and schema for organizing the data

  • Implement data collection and storage mechanisms

  • Develop data processing algorithms and workflows

  • Ensure data security and privacy measures

  • Create user-friendly interfaces for data input and retrieval

  • Perform regular data quality checks and maintenance

  • Integrate with other systems or appli...read more

Add your answer

Q328. How you manage pressure

Ans.

I manage pressure by prioritizing tasks, staying organized, taking breaks, and seeking support when needed.

  • Prioritize tasks based on deadlines and importance

  • Stay organized with to-do lists and calendars

  • Take breaks to recharge and avoid burnout

  • Seek support from colleagues or supervisors when feeling overwhelmed

Add your answer

Q329. How to change the world with technology

Ans.

Technology has the power to change the world by improving efficiency, communication, access to information, and solving complex problems.

  • Developing innovative solutions to global challenges such as climate change, poverty, and healthcare

  • Improving communication and connectivity through social media, video conferencing, and instant messaging

  • Increasing access to education and information through online platforms and digital libraries

  • Enhancing efficiency and productivity in vario...read more

Add your answer

Q330. Locking and transactions in Spring data

Ans.

Spring Data provides support for locking and transactions to ensure data consistency and integrity.

  • Spring Data JPA supports optimistic locking and pessimistic locking mechanisms.

  • Optimistic locking is based on versioning where each entity has a version attribute that is checked before updating.

  • Pessimistic locking locks the database row for a transaction to prevent other transactions from modifying it.

  • Spring Data also supports declarative transaction management using @Transacti...read more

Add your answer

Q331. describe the approach taken for assignment

Ans.

I approach assignments by breaking them down into smaller tasks, setting deadlines, and regularly checking progress.

  • Break down the assignment into smaller tasks to make it more manageable

  • Set deadlines for each task to stay on track

  • Regularly check progress to ensure everything is on schedule

  • Seek feedback from colleagues or supervisors to improve the quality of work

Add your answer

Q332. Key business risks in recent project

Ans.

Key business risks in recent project include budget overruns, scope creep, resource constraints, and stakeholder conflicts.

  • Budget overruns can lead to financial losses and impact project timelines.

  • Scope creep may result in project delays and increased costs.

  • Resource constraints can hinder project progress and quality of deliverables.

  • Stakeholder conflicts can lead to communication breakdowns and project failure.

Add your answer

Q333. What is OpenID vs OAuth.20

Ans.

OpenID is for authentication, OAuth is for authorization.

  • OpenID is used to verify the identity of a user, while OAuth is used to grant access to resources.

  • OpenID is often used for single sign-on (SSO) purposes, while OAuth is used for granting access to APIs.

  • OpenID is based on the concept of identity providers (IDPs), while OAuth is based on the concept of authorization servers (AS).

Add your answer

Q334. Explain the difference between 2G and 3G

Add your answer

Q335. What is SOLID principles?

Ans.

SOLID principles are a set of five design principles that help make software designs more understandable, flexible, and maintainable.

  • S - Single Responsibility Principle: A class should have only one reason to change.

  • O - Open/Closed Principle: Software entities should be open for extension but closed for modification.

  • L - Liskov Substitution Principle: Objects of a superclass should be replaceable with objects of its subclasses without affecting the functionality.

  • I - Interface ...read more

Add your answer

Q336. What is custom function in VBA

Ans.

A custom function in VBA is a user-defined function that performs a specific task or calculation.

  • Custom functions are created by the user to extend the functionality of Excel or other Office applications.

  • They can be used to perform complex calculations, manipulate data, or automate tasks.

  • Custom functions are written in VBA code and can be called from within Excel formulas.

  • For example, a custom function could be created to calculate the average of a range of cells or to format...read more

Add your answer

Q337. Explain react life cycle

Ans.

React life cycle refers to the series of methods that are invoked in the process of creating, updating, and destroying a component.

  • Mounting phase: constructor, render, componentDidMount

  • Updating phase: shouldComponentUpdate, render, componentDidUpdate

  • Unmounting phase: componentWillUnmount

Add your answer

Q338. internals of dictionary

Ans.

A dictionary is a data structure that stores key-value pairs for efficient lookups.

  • Key-value pairs are stored in dictionaries.

  • Keys must be unique within a dictionary.

  • Values can be accessed using keys.

  • Dictionaries are mutable and can be modified.

  • Example: {'name': 'John', 'age': 30}

Add your answer

Q339. Solutioning of assignment

Ans.

Solutioning of assignment

  • Understand the problem statement thoroughly

  • Identify the requirements and constraints

  • Brainstorm possible solutions

  • Evaluate and select the best solution

  • Create a detailed plan of action

  • Implement the solution and test it

  • Document the solution and present it to stakeholders

Add your answer

Q340. Difference between Defect masking and Cascading

Ans.

Defect masking occurs when a major defect hides a minor defect, while cascading is when one defect triggers multiple defects.

  • Defect masking occurs when a major defect prevents the detection of a minor defect.

  • Cascading is when one defect triggers a series of other defects.

  • Defect masking can lead to overlooking important issues, while cascading can result in a chain reaction of defects.

  • Example of defect masking: A critical bug in the login functionality prevents testers from no...read more

Add your answer

Q341. How to handle security in api.

Ans.

Security in APIs is crucial for protecting sensitive data and preventing unauthorized access.

  • Use authentication methods such as OAuth or API keys to verify the identity of users accessing the API.

  • Implement encryption to secure data transmission between clients and servers.

  • Set up rate limiting to prevent abuse and protect against denial of service attacks.

  • Regularly update and patch the API to address security vulnerabilities.

  • Monitor API usage and logs for suspicious activity t...read more

Add your answer

Q342. Write the implementation for list in Scala

Ans.

Implementation of list in Scala

  • Use the List class in Scala to create a list

  • Lists are immutable and can hold elements of the same type

  • Example: val myList = List(1, 2, 3, 4, 5)

Add your answer

Q343. What was used before Rest APIs

Ans.

SOAP (Simple Object Access Protocol) was used before Rest APIs for web services communication.

  • SOAP was a protocol for exchanging structured information in the implementation of web services.

  • SOAP used XML for message format and relied heavily on HTTP for communication.

  • SOAP was more rigid and complex compared to Rest APIs, which are more lightweight and flexible.

  • Examples of SOAP-based web services include Microsoft's .NET Framework and Java EE.

Add your answer

Q344. You hashmap works internally in Java 8

Ans.

HashMap in Java 8 uses an array of linked lists to store key-value pairs.

  • HashMap uses an array of linked lists to handle collisions

  • Each key-value pair is stored in a Node object within the linked list

  • Hashing algorithm is used to determine the index of the array where the key-value pair is stored

Add your answer

Q345. What are solid principles

Ans.

SOLID principles are a set of design principles for writing maintainable and scalable software.

  • S - Single Responsibility Principle

  • O - Open/Closed Principle

  • L - Liskov Substitution Principle

  • I - Interface Segregation Principle

  • D - Dependency Inversion Principle

Add your answer

Q346. difference between remember and rememberSaveable

Ans.

remember is used to store a value in a composable function, while rememberSaveable is used to store a value that survives configuration changes.

  • remember is used to store a value that does not survive configuration changes

  • rememberSaveable is used to store a value that survives configuration changes, such as rotation of the device

  • rememberSaveable is typically used for storing view model data in Jetpack Compose

Add your answer

Q347. What's black box and white box testing

Ans.

Black box testing is testing without knowledge of internal workings, while white box testing is testing with knowledge of internal workings.

  • Black box testing focuses on testing the functionality of the system without knowing the internal code or structure.

  • White box testing focuses on testing the internal code and structure of the system.

  • Black box testing is typically done by end-users or testers who do not have knowledge of the internal workings of the system.

  • White box testin...read more

Add your answer

Q348. What is Adobe Analytics...?

Ans.

Adobe Analytics is a web analytics tool that helps businesses track and analyze website traffic and user behavior.

  • Provides real-time data on website traffic, user behavior, and conversion rates

  • Allows businesses to create custom reports and dashboards

  • Integrates with other Adobe products like Adobe Experience Manager

  • Helps businesses optimize their website and marketing strategies based on data insights

Add your answer

Q349. Write Custom Concurrent Modification Exception

Ans.

Custom exception to handle concurrent modification of a collection

  • Extend the RuntimeException class to create a custom exception for concurrent modification

  • Include a message to provide context on the cause of the exception

  • Throw the custom exception when detecting concurrent modification in a collection

Add your answer

Q350. What is thread ? Oops concepts

Ans.

A thread is a lightweight process that can run concurrently with other threads within a program.

  • Threads allow for parallelism and can improve performance in certain situations.

  • Threads share the same memory space as the parent process.

  • Threads can communicate with each other through shared memory or message passing.

  • Thread safety is important to prevent race conditions and other concurrency issues.

  • Examples of multi-threaded programs include web servers, video games, and image pr...read more

Add your answer

Q351. What are Extended method

Ans.

Extended methods are a way to add new functionality to existing classes without modifying their source code.

  • Extended methods allow developers to add new methods to existing classes without inheritance.

  • They are commonly used in languages like C# and Kotlin.

  • Extended methods can improve code readability and maintainability by keeping related functionality together.

Add your answer

Q352. Implement Observer Pattern

Ans.

The Observer Pattern is a behavioral design pattern where an object (subject) maintains a list of dependents (observers) that are notified of any state changes.

  • Create an interface for the observer with methods like update()

  • Create a subject class with methods to add, remove, and notify observers

  • Implement concrete observer classes that implement the observer interface

  • When the state of the subject changes, notify all observers by calling their update() method

Add your answer

Q353. Implement Fork Join Framework

Ans.

Fork Join Framework is a feature in Java for parallelizing tasks.

  • ForkJoinPool class is used to create and manage ForkJoinTasks.

  • ForkJoinTask class represents a task that can be forked and joined.

  • Use fork() method to asynchronously execute a subtask.

  • Use join() method to wait for the result of a subtask.

Add your answer

Q354. Create a todolist using plain javascript

Ans.

Create a todolist using plain javascript

  • Create an input field for adding tasks

  • Use an array to store the tasks

  • Display the tasks in a list on the webpage

  • Add functionality to mark tasks as completed or delete them

Add your answer

Q355. difference between shared mailbox and DL

Ans.

Shared mailbox is a mailbox that multiple users can access and manage, while DL is a group email address that sends emails to multiple recipients.

  • Shared mailbox allows multiple users to access and manage the same mailbox, while DL is a group email address that sends emails to multiple recipients.

  • Shared mailbox can be used for collaboration and sharing information, while DL is used for sending emails to a group of people.

  • Examples of shared mailbox include team mailbox, departm...read more

Add your answer

Q356. Talk about SOLID Principles

Ans.

SOLID principles are a set of five design principles in object-oriented programming to make software designs more understandable, flexible, and maintainable.

  • S - Single Responsibility Principle: A class should have only one reason to change.

  • O - Open/Closed Principle: Software entities should be open for extension but closed for modification.

  • L - Liskov Substitution Principle: Objects of a superclass should be replaceable with objects of its subclasses without affecting the func...read more

Add your answer

Q357. Talk about Concurrent API

Ans.

Concurrent API allows multiple tasks to be executed simultaneously, improving efficiency and performance.

  • Concurrent API enables parallel processing of multiple requests at the same time.

  • It helps in reducing latency and improving overall system performance.

  • Examples include Java's CompletableFuture class for asynchronous programming and Node.js's cluster module for parallel processing.

Add your answer

Q358. Diff between elt vs etl

Ans.

ELT stands for Extract, Load, Transform while ETL stands for Extract, Transform, Load.

  • ELT focuses on extracting data from the source, loading it into a target system, and then transforming it within the target system.

  • ETL focuses on extracting data from the source, transforming it, and then loading it into a target system.

  • In ELT, the target system has the processing power to handle the transformation tasks.

  • In ETL, the transformation tasks are performed by a separate system or ...read more

Add your answer

Q359. Diff between oltp vs olap

Ans.

OLTP is a transactional system that handles real-time data processing, while OLAP is an analytical system that deals with historical data analysis.

  • OLTP focuses on day-to-day operations and supports high transaction volumes.

  • OLAP focuses on complex queries and data analysis for decision-making.

  • OLTP databases are normalized for efficient transaction processing.

  • OLAP databases are denormalized for faster query performance.

  • OLTP systems are designed for concurrent access and data in...read more

Add your answer

Q360. What is one to many

Ans.

One to many refers to a relationship between two entities where one entity can have multiple instances of the other entity.

  • One to many is a common relationship in database design.

  • For example, one customer can have multiple orders in an e-commerce system.

  • In Java, one to many can be implemented using collections such as List or Set.

  • In microservices architecture, one service can communicate with multiple other services.

Add your answer

Q361. Write a program to reverse a sentence

Add your answer

Q362. What is event loop ?

Ans.

Event loop is a mechanism that allows Node.js to perform non-blocking I/O operations.

  • Event loop is a single-threaded loop that constantly checks for new events in the event queue.

  • It executes the callback functions associated with the events in the queue.

  • It allows Node.js to handle multiple requests simultaneously without blocking the execution of other requests.

  • It is responsible for managing the order of execution of the callback functions.

  • It is a key feature of Node.js that ...read more

Add your answer

Q363. Java program to camel case strings

Ans.

Java program to convert strings to camel case

  • Use a loop to iterate through each word in the array

  • For each word, capitalize the first letter and make the rest lowercase

  • Join the words back together to form the camel case string

Add your answer

Q364. rerun cucumber failed test case

Ans.

To rerun a failed Cucumber test case, use the cucumber command with the --tags option.

  • Identify the failed test case by reviewing the test results or logs.

  • Add a unique tag to the failed test case in the feature file.

  • Run the cucumber command with the --tags option and specify the tag of the failed test case.

  • The cucumber command will rerun only the failed test case.

View 1 answer

Q365. What is iap tunneling

Ans.

IAP tunneling refers to the process of securely accessing internal resources from outside a network using Identity-Aware Proxy.

  • IAP tunneling allows users to securely access internal resources without exposing them to the public internet.

  • It uses Identity-Aware Proxy to authenticate and authorize users before granting access to the resources.

  • This helps organizations maintain a secure network environment while enabling remote access for authorized users.

Add your answer

Q366. What is canary deployment

Ans.

Canary deployment is a technique used to reduce risk by rolling out new features to a small subset of users before a full release.

  • Canary deployment involves gradually rolling out a new version of software to a small subset of users or servers.

  • This allows for monitoring of the new version's performance and stability before a full release.

  • If the canary deployment is successful, the new version can be gradually rolled out to more users or servers.

  • If issues are detected during th...read more

Add your answer

Q367. Software development lifecycles

Ans.

Software development lifecycles are a set of processes used to design, develop, and maintain software.

  • There are several software development lifecycles, including Waterfall, Agile, and DevOps.

  • Each lifecycle has its own set of phases, such as planning, design, development, testing, and deployment.

  • The choice of lifecycle depends on the project requirements, team size, and other factors.

  • Agile methodologies are becoming increasingly popular due to their flexibility and ability to...read more

Add your answer

Q368. What is dependency injection

Ans.

Dependency injection is a design pattern in which components are given their dependencies rather than creating them internally.

  • Allows for easier testing and swapping of dependencies

  • Promotes loose coupling between components

  • Commonly used in object-oriented programming and frameworks like Spring in Java

Add your answer

Q369. Internal working of a hashmap

Ans.

A hashmap is a data structure that allows for efficient retrieval of values based on their associated keys.

  • A hashmap uses a hash function to convert keys into array indices.

  • Collisions can occur when multiple keys hash to the same index.

  • To handle collisions, a hashmap typically uses linked lists or other data structures to store multiple values at the same index.

  • When retrieving a value, the hashmap uses the hash function to find the corresponding index and then searches the li...read more

Add your answer

Q370. Java program to reverse a string

Ans.

Java program to reverse a string

  • Create a char array from the input string

  • Use two pointers to swap characters from start and end of the array

  • Repeat until the pointers meet in the middle

Add your answer

Q371. Modular coding approach

Ans.

Modular coding approach involves breaking down a program into smaller, manageable modules for easier development and maintenance.

  • Modular coding promotes reusability of code

  • Each module focuses on a specific task or functionality

  • Modules can be easily tested and debugged independently

  • Improves code readability and maintainability

  • Examples: Using separate modules for user authentication, database operations, and UI components

Add your answer

Q372. Memory manaagement in java.

Ans.

Memory management in Java involves automatic memory allocation and garbage collection.

  • Java uses automatic memory management through garbage collection to allocate and deallocate memory.

  • Memory is divided into stack and heap. Stack stores primitive types and references to objects, while heap stores objects.

  • Garbage collection in Java identifies and removes objects that are no longer needed, freeing up memory for new objects.

  • Developers can manually manage memory using features li...read more

Add your answer

Q373. Graphql , Web workers vs Service workers

Ans.

GraphQL is a query language for APIs, Web workers run scripts in background threads, Service workers are scripts that run in the background and can intercept network requests.

  • GraphQL is a query language for APIs that allows clients to request only the data they need.

  • Web workers run scripts in background threads separate from the main browser thread, improving performance by handling tasks concurrently.

  • Service workers are scripts that run in the background and can intercept ne...read more

Add your answer

Q374. what are pillars of OOPS

Ans.

The pillars of OOPS (Object-Oriented Programming) are Inheritance, Encapsulation, Polymorphism, and Abstraction.

  • Inheritance allows a class to inherit properties and behavior from another class. For example, a 'Car' class can inherit from a 'Vehicle' class.

  • Encapsulation refers to the bundling of data with the methods that operate on that data. It restricts access to some of an object's components. For example, using private variables in a class.

  • Polymorphism allows methods to d...read more

Add your answer

Q375. Flatten a json file

Ans.

Flatten a JSON file by converting nested objects into a single level structure.

  • Use recursion to iterate through the JSON file and flatten nested objects.

  • Combine keys from nested objects with parent keys to create unique keys for the flattened structure.

  • Handle arrays by converting them into separate objects with numerical keys.

Add your answer

Q376. Finding dulpicates char in string

Ans.

The question is about finding duplicate characters in a string.

  • Iterate through each character in the string.

  • Use a hash table or an array to keep track of the count of each character.

  • If the count of a character is greater than 1, it is a duplicate.

Add your answer

Q377. Difference between truncate and delete

Ans.

Truncate removes all records from a table, while delete removes specific records.

  • Truncate is faster as it does not log individual row deletions

  • Delete is slower as it logs each row deletion

  • Truncate resets identity column values, delete does not

  • Truncate cannot be rolled back, delete can be rolled back using transactions

Add your answer

Q378. New technologies that you are aware

Ans.

I am aware of new technologies such as artificial intelligence, blockchain, Internet of Things, and virtual reality.

  • Artificial intelligence (AI) - machine learning, natural language processing

  • Blockchain - decentralized digital ledger technology

  • Internet of Things (IoT) - interconnected devices and sensors

  • Virtual reality (VR) - immersive digital experiences

Add your answer

Q379. Web performance and optimization

Ans.

Web performance and optimization are crucial for user experience and SEO.

  • Minimize HTTP requests

  • Optimize images and videos

  • Use a content delivery network (CDN)

  • Minimize server response time

  • Enable browser caching

  • Use Gzip compression

  • Minimize CSS and JavaScript files

  • Use lazy loading for images and videos

Add your answer

Q380. Types of design patterns

Ans.

Design patterns are reusable solutions to common software problems.

  • Creational patterns: Singleton, Factory, Abstract Factory, Builder, Prototype

  • Structural patterns: Adapter, Bridge, Composite, Decorator, Facade, Flyweight, Proxy

  • Behavioral patterns: Chain of Responsibility, Command, Interpreter, Iterator, Mediator, Memento, Observer, State, Strategy, Template Method, Visitor

Add your answer

Q381. Insert element in between a linked list

Add your answer

Q382. What is software testing

Ans.

Software testing is the process of evaluating a software application to ensure it meets specified requirements and functions correctly.

  • Software testing involves executing the software with the intent of finding defects or bugs.

  • It helps in identifying errors, gaps, or missing requirements in the software.

  • Types of software testing include unit testing, integration testing, system testing, and acceptance testing.

  • Examples of software testing tools include Selenium, JUnit, and Tes...read more

Add your answer

Q383. Hands on custom hooks

Ans.

Custom hooks are reusable functions that allow you to extract component logic into separate functions for better reusability and readability.

  • Custom hooks are created by prefixing the function name with 'use' (e.g. useCustomHook)

  • They can be used to share logic between components without repeating code

  • Custom hooks can be used for data fetching, state management, and more

Add your answer

Q384. Explain Safe Agile and kanban

Ans.

SAFe Agile is a framework for scaling Agile practices to enterprise level. Kanban is a visual management tool for Agile teams.

  • SAFe Agile involves organizing teams into Agile Release Trains (ARTs) and implementing Lean-Agile practices across the organization.

  • Kanban involves visualizing the workflow on a board and limiting work in progress to improve flow and delivery.

  • SAFe Agile and Kanban can be used together to implement Agile practices at scale while maintaining visibility a...read more

Add your answer

Q385. What is skewness

Ans.

Skewness is a measure of the asymmetry of a probability distribution.

  • Positive skewness means the tail of the distribution is longer on the positive side.

  • Negative skewness means the tail of the distribution is longer on the negative side.

  • A perfectly symmetrical distribution has a skewness of 0.

  • Skewness can affect the interpretation of statistical analyses.

Add your answer

Q386. Find xpath for a given element

Ans.

Use browser developer tools to inspect element and generate xpath

  • Inspect element using browser developer tools

  • Right click on element and select 'Copy' -> 'Copy XPath'

  • Modify generated xpath if needed to make it more robust

Add your answer

Q387. Selenium broken link program

Ans.

Selenium program to identify broken links on a webpage

  • Use Selenium WebDriver to navigate to the webpage

  • Find all the links on the page using findElements() method

  • Iterate through each link and check if it returns a valid HTTP response code

  • Report any broken links with their corresponding HTTP response code

Add your answer

Q388. Explain about garbage collection

Ans.

Garbage collection is a process in programming where the system automatically reclaims memory occupied by objects that are no longer in use.

  • Garbage collection helps prevent memory leaks by freeing up memory that is no longer needed.

  • It is commonly used in languages like Java, C#, and Python.

  • There are different types of garbage collection algorithms such as mark and sweep, reference counting, and generational garbage collection.

Add your answer

Q389. Explain case study with PPT

Ans.

A case study is explained using a PowerPoint presentation.

  • Create a slide for each section of the case study (background, problem, solution, results)

  • Use visuals like charts, graphs, and images to enhance understanding

  • Include key data points and analysis in the slides

  • Present the case study in a clear and concise manner

  • Allow time for questions and discussion at the end

Add your answer

Q390. Explain about Sitecore JSS architecture

Ans.

Sitecore JSS architecture allows developers to build dynamic websites using JavaScript frameworks like React or Angular.

  • Sitecore JSS separates the presentation layer from the content management system, allowing for easier development and maintenance.

  • It uses a headless architecture, where the front-end is decoupled from the back-end, enabling faster performance and flexibility.

  • Developers can use their preferred JavaScript frameworks like React or Angular to build the front-end...read more

Add your answer

Q391. Types of billing used

Ans.

There are various types of billing used in PMO consulting, including hourly rates, fixed fees, and value-based pricing.

  • Hourly rates: charging a set amount per hour worked

  • Fixed fees: charging a set amount for a specific project or service

  • Value-based pricing: charging based on the value delivered to the client

  • Retainer fees: charging a set amount for ongoing services

  • Blended rates: a combination of hourly rates and fixed fees

  • Cost-plus pricing: charging the cost of the project plu...read more

Add your answer

Q392. Advantage of mvp over mvc.

Ans.

MVP offers better separation of concerns and easier unit testing compared to MVC.

  • MVP separates the presentation layer from the business logic, making it easier to maintain and modify the codebase.

  • MVP allows for easier unit testing as the presenter can be tested independently from the view.

  • MVP provides better decoupling between components, enabling easier code reuse and scalability.

  • MVP promotes a clear separation of concerns, making the codebase more modular and maintainable.

  • I...read more

Add your answer

Q393. Agile and waterfall difference

Ans.

Agile is iterative and flexible, while waterfall is sequential and rigid.

  • Agile involves breaking projects into smaller tasks and adapting to changes quickly.

  • Waterfall follows a linear approach with distinct phases like planning, design, development, testing, and deployment.

  • Agile is more suitable for projects with evolving requirements, while waterfall is better for projects with fixed requirements.

  • Agile promotes collaboration and customer feedback throughout the project, whil...read more

Add your answer

Q394. Stack using Link list

Ans.

Implementing a stack using a linked list data structure.

  • Create a Node class with data and next pointer

  • Implement push() to add elements to the top of the stack

  • Implement pop() to remove and return the top element

  • Implement peek() to return the top element without removing it

Add your answer

Q395. Program on collection framework

Ans.

The collection framework in Java provides a set of classes and interfaces to store and manipulate groups of objects.

  • The collection framework includes interfaces like List, Set, and Map, along with classes like ArrayList, HashSet, and HashMap.

  • Collections can store objects of any type, including custom classes.

  • Collections provide methods for adding, removing, and accessing elements, as well as for sorting and searching.

  • Iterators are used to traverse through collections and perf...read more

Add your answer

Q396. Define a micro service architecture.

Ans.

Microservice architecture is an architectural style that structures an application as a collection of loosely coupled services.

  • Each service is self-contained and can be independently deployed, scaled, and maintained.

  • Services communicate with each other over lightweight protocols like HTTP or messaging queues.

  • Each service is responsible for a specific business function and can be developed using different technologies.

  • Microservices enable agility, scalability, and resilience i...read more

Add your answer

Q397. React with typescript, Test case

Ans.

React with TypeScript and test case integration for ensuring code quality and functionality.

  • Use Jest and Enzyme for writing test cases in React with TypeScript.

  • Utilize TypeScript's static type checking to catch errors early in development.

  • Mock external dependencies in test cases to isolate components for testing.

  • Ensure test coverage for all components and functions in the codebase.

  • Use tools like React Testing Library for testing React components.

  • Integrate continuous integrati...read more

Add your answer

Q398. A puzzle of bucket fill

Ans.

Bucket fill puzzle involves filling buckets of different sizes with water using a larger bucket.

  • The larger bucket is used to fill the smaller buckets.

  • The goal is to fill a specific amount of water using the available buckets.

  • The process involves pouring water from one bucket to another until the desired amount is reached.

  • The size of the buckets and the amount of water needed can vary.

  • This puzzle can be solved using mathematical equations and logical reasoning.

Add your answer

Q399. Design a life management system

Ans.

A life management system is a tool or platform that helps individuals organize and prioritize tasks, goals, and responsibilities in various aspects of their life.

  • Include features for task management, goal setting, calendar integration, and reminders

  • Allow users to categorize tasks and goals by priority, deadline, and importance

  • Provide analytics and insights on productivity and time management

  • Integrate with wearable devices for health and fitness tracking

  • Offer customization opt...read more

Add your answer

Q400. Test cases on eCommerce platform

Ans.

Test cases for eCommerce platform

  • Verify user can successfully add items to cart

  • Test checkout process with different payment methods

  • Check for proper error messages when entering invalid information

  • Test search functionality for products

  • Verify discounts and promotions are applied correctly

Add your answer
1
2
3
4
5
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos

Interview Process at Zepto

based on 296 interviews in the last 1 year
Interview experience
4.1
Good
View more
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Interview Questions from Similar Companies

3.7
 • 4.4k Interview Questions
3.5
 • 425 Interview Questions
3.5
 • 373 Interview Questions
3.4
 • 254 Interview Questions
4.2
 • 144 Interview Questions
3.8
 • 130 Interview Questions
View all
Top Publicis Sapient Interview Questions And Answers
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
70 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions
Get AmbitionBox app

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter