Publicis Sapient
400+ Zepto Interview Questions and Answers
Q301. Explain MVVM and LiveData
MVVM is a design pattern that separates UI from business logic. LiveData is a data holder class that is lifecycle-aware.
MVVM stands for Model-View-ViewModel
Model represents the data and business logic
View represents the UI
ViewModel acts as a mediator between Model and View
LiveData is an observable data holder class
LiveData is lifecycle-aware and only updates the UI when the app is in the foreground
LiveData automatically manages the lifecycle of the data
LiveData can be used to...read more
Q302. Which reporting tool have you worked on
Q303. Code Inheritance in Javascript using parent child concept
Q304. What is Application Master in Spark
Application Master in Spark is responsible for negotiating resources with the ResourceManager and executing tasks on the cluster.
Responsible for negotiating resources with the ResourceManager
Manages the execution of tasks on the cluster
Monitors the progress of tasks and reports back to the driver program
Q305. Explain bean Lifecyle and scope in SpringBoot.
Bean Lifecycle and scope in SpringBoot refers to the creation, initialization, and destruction of beans along with their visibility and accessibility.
Bean Lifecycle consists of bean creation, initialization, and destruction phases.
Bean Scope determines the visibility and accessibility of beans within the application context.
Common bean scopes in SpringBoot include Singleton, Prototype, Request, Session, and Application.
Q306. Write a program to remove duplicate from an array
Program to remove duplicates from an array of strings
Iterate through the array and store unique elements in a new array
Use a set data structure to efficiently remove duplicates
Return the new array without duplicates
Q307. coding question to find next greatest number
Coding question to find next greatest number
Iterate from right to left and find the first digit that is smaller than the digit next to it
Swap this digit with the smallest digit on its right side that is greater than it
Sort the digits to the right of the swapped digit in ascending order
If no such digit exists, return the input number as it is
Q308. How Dictionary stores data
A dictionary stores data in key-value pairs.
Each key is unique and maps to a specific value.
Keys are used to retrieve values from the dictionary.
Data can be added, removed, or updated in the dictionary.
Examples include Python's dict and Java's HashMap.
Q309. Difference between monolithic and microservices?
Monolithic architecture is a single unified unit, while microservices architecture breaks down the application into smaller, independent services.
Monolithic architecture is a single, indivisible unit where all components are interconnected and interdependent.
Microservices architecture breaks down the application into smaller, independent services that communicate with each other through APIs.
Monolithic applications are typically easier to develop and test, but can be harder t...read more
Q310. Interface vs Abstract
Interface defines a contract while abstract class provides partial implementation.
Interface only contains method signatures while abstract class can have both abstract and non-abstract methods.
A class can implement multiple interfaces but can only inherit from one abstract class.
Interfaces are used for loose coupling while abstract classes are used for code reusability.
Example of interface: Comparable interface in Java.
Example of abstract class: Animal class with abstract met...read more
Q311. Difference between interface and abstract class
Interface defines only method signatures while abstract class can have method implementations.
An interface can be implemented by multiple classes while an abstract class can only be extended by one class.
An abstract class can have constructors while an interface cannot.
An abstract class can have instance variables while an interface cannot.
An abstract class can provide default implementations for some methods while an interface cannot.
An abstract class can be used to define a...read more
Q312. Explain “this†keyword.
The 'this' keyword refers to the current object or instance in which it is used.
Used to refer to the current object or instance in which it is used
Can be used in methods, constructors, and inner classes
Can be used to differentiate between local and instance variables
Example: this.variableName
Example: this.methodName()
Q313. Use of Controller in WebApi
Controllers in WebApi are used to handle incoming HTTP requests and provide appropriate responses.
Controllers are responsible for handling specific HTTP requests and returning appropriate responses.
They contain action methods that are invoked when a specific HTTP request is received.
Controllers can also be used to implement authorization and authentication logic.
Example: A UserController can handle HTTP requests related to user management such as creating, updating, and delet...read more
Q314. write a vba code convert 2/2/2022 in text
Use VBA code to convert 2/2/2022 into text format.
Use the Format function in VBA to convert the date into text.
Specify the desired format within the Format function.
Example: Format(#2/2/2022#, "mmmm d, yyyy") will convert 2/2/2022 to February 2, 2022.
Q315. Finding second largest number in an array
Find the second largest number in an array
Sort the array in descending order
Return the element at index 1
Q316. What is synchronisation
Synchronization is the coordination of multiple processes or threads to ensure their orderly execution.
Synchronization is used to prevent race conditions and ensure data consistency.
It involves using locks, semaphores, or other mechanisms to control access to shared resources.
Examples of synchronization include mutual exclusion, critical sections, and inter-process communication.
Synchronization can also be achieved through synchronization primitives like mutexes and condition...read more
Q317. What is referential integrity?
Q318. Project explanation and day to day activities
Q319. How to handle dynamic table on webpage
Use XPath or CSS selectors to locate elements and extract data from the table dynamically.
Identify unique attributes of the table such as class, id, or structure
Use XPath or CSS selectors to locate the table and its elements
Iterate through rows and columns to extract data dynamically
Handle pagination or lazy loading if applicable
Q320. What is Aem component
An AEM component is a reusable building block used to create web pages in Adobe Experience Manager.
AEM components are used to define the structure and layout of web pages.
They can include HTML, CSS, JavaScript, and server-side logic.
Examples of AEM components include image carousels, navigation menus, and contact forms.
Q321. Design patterns you have used in your project
Q322. How does SSL pinning works?
SSL pinning is a security technique that ensures a client only communicates with a server using a pre-defined public key.
SSL pinning involves hardcoding the server's public key in the client's code or configuration.
During the SSL handshake, the client checks if the server's public key matches the pinned key.
If the keys match, the connection is established; otherwise, it is rejected.
Pinning prevents man-in-the-middle attacks by verifying the server's identity.
Q323. Where to save encription key?
Encryption keys should be securely stored in a separate key management system.
Encryption keys should not be stored alongside the encrypted data.
Use a dedicated key management system (KMS) to store and manage encryption keys.
Implement strong access controls and authentication mechanisms for the KMS.
Consider using hardware security modules (HSMs) for added security.
Regularly rotate encryption keys to minimize the impact of a potential compromise.
Q324. explain the importance of uuid in serialization
UUID ensures unique identification of objects during serialization process.
UUID helps prevent data duplication and ensures each object has a unique identifier.
It is especially important when serializing complex data structures to maintain integrity.
UUIDs are commonly used in distributed systems to uniquely identify objects across different nodes.
Example: When serializing a list of user profiles, using UUIDs for each profile ensures no two profiles have the same identifier.
Q325. Difference between C and C++
Q326. Solid principle with examples
SOLID principles are a set of guidelines for writing maintainable and scalable code.
Single Responsibility Principle - A class should have only one reason to change.
Open/Closed Principle - A class should be open for extension but closed for modification.
Liskov Substitution Principle - Subtypes should be substitutable for their base types.
Interface Segregation Principle - A client should not be forced to depend on methods it does not use.
Dependency Inversion Principle - High-le...read more
Q327. Use case to create a DHA
A DHA (Data Handling Application) is created to manage and process data efficiently.
Identify the data sources and types of data to be handled
Design a data model and schema for organizing the data
Implement data collection and storage mechanisms
Develop data processing algorithms and workflows
Ensure data security and privacy measures
Create user-friendly interfaces for data input and retrieval
Perform regular data quality checks and maintenance
Integrate with other systems or appli...read more
Q328. How you manage pressure
I manage pressure by prioritizing tasks, staying organized, taking breaks, and seeking support when needed.
Prioritize tasks based on deadlines and importance
Stay organized with to-do lists and calendars
Take breaks to recharge and avoid burnout
Seek support from colleagues or supervisors when feeling overwhelmed
Q329. How to change the world with technology
Technology has the power to change the world by improving efficiency, communication, access to information, and solving complex problems.
Developing innovative solutions to global challenges such as climate change, poverty, and healthcare
Improving communication and connectivity through social media, video conferencing, and instant messaging
Increasing access to education and information through online platforms and digital libraries
Enhancing efficiency and productivity in vario...read more
Q330. Locking and transactions in Spring data
Spring Data provides support for locking and transactions to ensure data consistency and integrity.
Spring Data JPA supports optimistic locking and pessimistic locking mechanisms.
Optimistic locking is based on versioning where each entity has a version attribute that is checked before updating.
Pessimistic locking locks the database row for a transaction to prevent other transactions from modifying it.
Spring Data also supports declarative transaction management using @Transacti...read more
Q331. describe the approach taken for assignment
I approach assignments by breaking them down into smaller tasks, setting deadlines, and regularly checking progress.
Break down the assignment into smaller tasks to make it more manageable
Set deadlines for each task to stay on track
Regularly check progress to ensure everything is on schedule
Seek feedback from colleagues or supervisors to improve the quality of work
Q332. Key business risks in recent project
Key business risks in recent project include budget overruns, scope creep, resource constraints, and stakeholder conflicts.
Budget overruns can lead to financial losses and impact project timelines.
Scope creep may result in project delays and increased costs.
Resource constraints can hinder project progress and quality of deliverables.
Stakeholder conflicts can lead to communication breakdowns and project failure.
Q333. What is OpenID vs OAuth.20
OpenID is for authentication, OAuth is for authorization.
OpenID is used to verify the identity of a user, while OAuth is used to grant access to resources.
OpenID is often used for single sign-on (SSO) purposes, while OAuth is used for granting access to APIs.
OpenID is based on the concept of identity providers (IDPs), while OAuth is based on the concept of authorization servers (AS).
Q334. Explain the difference between 2G and 3G
Q335. What is SOLID principles?
SOLID principles are a set of five design principles that help make software designs more understandable, flexible, and maintainable.
S - Single Responsibility Principle: A class should have only one reason to change.
O - Open/Closed Principle: Software entities should be open for extension but closed for modification.
L - Liskov Substitution Principle: Objects of a superclass should be replaceable with objects of its subclasses without affecting the functionality.
I - Interface ...read more
Q336. What is custom function in VBA
A custom function in VBA is a user-defined function that performs a specific task or calculation.
Custom functions are created by the user to extend the functionality of Excel or other Office applications.
They can be used to perform complex calculations, manipulate data, or automate tasks.
Custom functions are written in VBA code and can be called from within Excel formulas.
For example, a custom function could be created to calculate the average of a range of cells or to format...read more
Q337. Explain react life cycle
React life cycle refers to the series of methods that are invoked in the process of creating, updating, and destroying a component.
Mounting phase: constructor, render, componentDidMount
Updating phase: shouldComponentUpdate, render, componentDidUpdate
Unmounting phase: componentWillUnmount
Q338. internals of dictionary
A dictionary is a data structure that stores key-value pairs for efficient lookups.
Key-value pairs are stored in dictionaries.
Keys must be unique within a dictionary.
Values can be accessed using keys.
Dictionaries are mutable and can be modified.
Example: {'name': 'John', 'age': 30}
Q339. Solutioning of assignment
Solutioning of assignment
Understand the problem statement thoroughly
Identify the requirements and constraints
Brainstorm possible solutions
Evaluate and select the best solution
Create a detailed plan of action
Implement the solution and test it
Document the solution and present it to stakeholders
Q340. Difference between Defect masking and Cascading
Defect masking occurs when a major defect hides a minor defect, while cascading is when one defect triggers multiple defects.
Defect masking occurs when a major defect prevents the detection of a minor defect.
Cascading is when one defect triggers a series of other defects.
Defect masking can lead to overlooking important issues, while cascading can result in a chain reaction of defects.
Example of defect masking: A critical bug in the login functionality prevents testers from no...read more
Q341. How to handle security in api.
Security in APIs is crucial for protecting sensitive data and preventing unauthorized access.
Use authentication methods such as OAuth or API keys to verify the identity of users accessing the API.
Implement encryption to secure data transmission between clients and servers.
Set up rate limiting to prevent abuse and protect against denial of service attacks.
Regularly update and patch the API to address security vulnerabilities.
Monitor API usage and logs for suspicious activity t...read more
Q342. Write the implementation for list in Scala
Implementation of list in Scala
Use the List class in Scala to create a list
Lists are immutable and can hold elements of the same type
Example: val myList = List(1, 2, 3, 4, 5)
Q343. What was used before Rest APIs
SOAP (Simple Object Access Protocol) was used before Rest APIs for web services communication.
SOAP was a protocol for exchanging structured information in the implementation of web services.
SOAP used XML for message format and relied heavily on HTTP for communication.
SOAP was more rigid and complex compared to Rest APIs, which are more lightweight and flexible.
Examples of SOAP-based web services include Microsoft's .NET Framework and Java EE.
Q344. You hashmap works internally in Java 8
HashMap in Java 8 uses an array of linked lists to store key-value pairs.
HashMap uses an array of linked lists to handle collisions
Each key-value pair is stored in a Node object within the linked list
Hashing algorithm is used to determine the index of the array where the key-value pair is stored
Q345. What are solid principles
SOLID principles are a set of design principles for writing maintainable and scalable software.
S - Single Responsibility Principle
O - Open/Closed Principle
L - Liskov Substitution Principle
I - Interface Segregation Principle
D - Dependency Inversion Principle
Q346. difference between remember and rememberSaveable
remember is used to store a value in a composable function, while rememberSaveable is used to store a value that survives configuration changes.
remember is used to store a value that does not survive configuration changes
rememberSaveable is used to store a value that survives configuration changes, such as rotation of the device
rememberSaveable is typically used for storing view model data in Jetpack Compose
Q347. What's black box and white box testing
Black box testing is testing without knowledge of internal workings, while white box testing is testing with knowledge of internal workings.
Black box testing focuses on testing the functionality of the system without knowing the internal code or structure.
White box testing focuses on testing the internal code and structure of the system.
Black box testing is typically done by end-users or testers who do not have knowledge of the internal workings of the system.
White box testin...read more
Q348. What is Adobe Analytics...?
Adobe Analytics is a web analytics tool that helps businesses track and analyze website traffic and user behavior.
Provides real-time data on website traffic, user behavior, and conversion rates
Allows businesses to create custom reports and dashboards
Integrates with other Adobe products like Adobe Experience Manager
Helps businesses optimize their website and marketing strategies based on data insights
Q349. Write Custom Concurrent Modification Exception
Custom exception to handle concurrent modification of a collection
Extend the RuntimeException class to create a custom exception for concurrent modification
Include a message to provide context on the cause of the exception
Throw the custom exception when detecting concurrent modification in a collection
Q350. What is thread ? Oops concepts
A thread is a lightweight process that can run concurrently with other threads within a program.
Threads allow for parallelism and can improve performance in certain situations.
Threads share the same memory space as the parent process.
Threads can communicate with each other through shared memory or message passing.
Thread safety is important to prevent race conditions and other concurrency issues.
Examples of multi-threaded programs include web servers, video games, and image pr...read more
Q351. What are Extended method
Extended methods are a way to add new functionality to existing classes without modifying their source code.
Extended methods allow developers to add new methods to existing classes without inheritance.
They are commonly used in languages like C# and Kotlin.
Extended methods can improve code readability and maintainability by keeping related functionality together.
Q352. Implement Observer Pattern
The Observer Pattern is a behavioral design pattern where an object (subject) maintains a list of dependents (observers) that are notified of any state changes.
Create an interface for the observer with methods like update()
Create a subject class with methods to add, remove, and notify observers
Implement concrete observer classes that implement the observer interface
When the state of the subject changes, notify all observers by calling their update() method
Q353. Implement Fork Join Framework
Fork Join Framework is a feature in Java for parallelizing tasks.
ForkJoinPool class is used to create and manage ForkJoinTasks.
ForkJoinTask class represents a task that can be forked and joined.
Use fork() method to asynchronously execute a subtask.
Use join() method to wait for the result of a subtask.
Q354. Create a todolist using plain javascript
Create a todolist using plain javascript
Create an input field for adding tasks
Use an array to store the tasks
Display the tasks in a list on the webpage
Add functionality to mark tasks as completed or delete them
Q355. difference between shared mailbox and DL
Shared mailbox is a mailbox that multiple users can access and manage, while DL is a group email address that sends emails to multiple recipients.
Shared mailbox allows multiple users to access and manage the same mailbox, while DL is a group email address that sends emails to multiple recipients.
Shared mailbox can be used for collaboration and sharing information, while DL is used for sending emails to a group of people.
Examples of shared mailbox include team mailbox, departm...read more
Q356. Talk about SOLID Principles
SOLID principles are a set of five design principles in object-oriented programming to make software designs more understandable, flexible, and maintainable.
S - Single Responsibility Principle: A class should have only one reason to change.
O - Open/Closed Principle: Software entities should be open for extension but closed for modification.
L - Liskov Substitution Principle: Objects of a superclass should be replaceable with objects of its subclasses without affecting the func...read more
Q357. Talk about Concurrent API
Concurrent API allows multiple tasks to be executed simultaneously, improving efficiency and performance.
Concurrent API enables parallel processing of multiple requests at the same time.
It helps in reducing latency and improving overall system performance.
Examples include Java's CompletableFuture class for asynchronous programming and Node.js's cluster module for parallel processing.
Q358. Diff between elt vs etl
ELT stands for Extract, Load, Transform while ETL stands for Extract, Transform, Load.
ELT focuses on extracting data from the source, loading it into a target system, and then transforming it within the target system.
ETL focuses on extracting data from the source, transforming it, and then loading it into a target system.
In ELT, the target system has the processing power to handle the transformation tasks.
In ETL, the transformation tasks are performed by a separate system or ...read more
Q359. Diff between oltp vs olap
OLTP is a transactional system that handles real-time data processing, while OLAP is an analytical system that deals with historical data analysis.
OLTP focuses on day-to-day operations and supports high transaction volumes.
OLAP focuses on complex queries and data analysis for decision-making.
OLTP databases are normalized for efficient transaction processing.
OLAP databases are denormalized for faster query performance.
OLTP systems are designed for concurrent access and data in...read more
Q360. What is one to many
One to many refers to a relationship between two entities where one entity can have multiple instances of the other entity.
One to many is a common relationship in database design.
For example, one customer can have multiple orders in an e-commerce system.
In Java, one to many can be implemented using collections such as List or Set.
In microservices architecture, one service can communicate with multiple other services.
Q361. Write a program to reverse a sentence
Q362. What is event loop ?
Event loop is a mechanism that allows Node.js to perform non-blocking I/O operations.
Event loop is a single-threaded loop that constantly checks for new events in the event queue.
It executes the callback functions associated with the events in the queue.
It allows Node.js to handle multiple requests simultaneously without blocking the execution of other requests.
It is responsible for managing the order of execution of the callback functions.
It is a key feature of Node.js that ...read more
Q363. Java program to camel case strings
Java program to convert strings to camel case
Use a loop to iterate through each word in the array
For each word, capitalize the first letter and make the rest lowercase
Join the words back together to form the camel case string
Q364. rerun cucumber failed test case
To rerun a failed Cucumber test case, use the cucumber command with the --tags option.
Identify the failed test case by reviewing the test results or logs.
Add a unique tag to the failed test case in the feature file.
Run the cucumber command with the --tags option and specify the tag of the failed test case.
The cucumber command will rerun only the failed test case.
Q365. What is iap tunneling
IAP tunneling refers to the process of securely accessing internal resources from outside a network using Identity-Aware Proxy.
IAP tunneling allows users to securely access internal resources without exposing them to the public internet.
It uses Identity-Aware Proxy to authenticate and authorize users before granting access to the resources.
This helps organizations maintain a secure network environment while enabling remote access for authorized users.
Q366. What is canary deployment
Canary deployment is a technique used to reduce risk by rolling out new features to a small subset of users before a full release.
Canary deployment involves gradually rolling out a new version of software to a small subset of users or servers.
This allows for monitoring of the new version's performance and stability before a full release.
If the canary deployment is successful, the new version can be gradually rolled out to more users or servers.
If issues are detected during th...read more
Q367. Software development lifecycles
Software development lifecycles are a set of processes used to design, develop, and maintain software.
There are several software development lifecycles, including Waterfall, Agile, and DevOps.
Each lifecycle has its own set of phases, such as planning, design, development, testing, and deployment.
The choice of lifecycle depends on the project requirements, team size, and other factors.
Agile methodologies are becoming increasingly popular due to their flexibility and ability to...read more
Q368. What is dependency injection
Dependency injection is a design pattern in which components are given their dependencies rather than creating them internally.
Allows for easier testing and swapping of dependencies
Promotes loose coupling between components
Commonly used in object-oriented programming and frameworks like Spring in Java
Q369. Internal working of a hashmap
A hashmap is a data structure that allows for efficient retrieval of values based on their associated keys.
A hashmap uses a hash function to convert keys into array indices.
Collisions can occur when multiple keys hash to the same index.
To handle collisions, a hashmap typically uses linked lists or other data structures to store multiple values at the same index.
When retrieving a value, the hashmap uses the hash function to find the corresponding index and then searches the li...read more
Q370. Java program to reverse a string
Java program to reverse a string
Create a char array from the input string
Use two pointers to swap characters from start and end of the array
Repeat until the pointers meet in the middle
Q371. Modular coding approach
Modular coding approach involves breaking down a program into smaller, manageable modules for easier development and maintenance.
Modular coding promotes reusability of code
Each module focuses on a specific task or functionality
Modules can be easily tested and debugged independently
Improves code readability and maintainability
Examples: Using separate modules for user authentication, database operations, and UI components
Q372. Memory manaagement in java.
Memory management in Java involves automatic memory allocation and garbage collection.
Java uses automatic memory management through garbage collection to allocate and deallocate memory.
Memory is divided into stack and heap. Stack stores primitive types and references to objects, while heap stores objects.
Garbage collection in Java identifies and removes objects that are no longer needed, freeing up memory for new objects.
Developers can manually manage memory using features li...read more
Q373. Graphql , Web workers vs Service workers
GraphQL is a query language for APIs, Web workers run scripts in background threads, Service workers are scripts that run in the background and can intercept network requests.
GraphQL is a query language for APIs that allows clients to request only the data they need.
Web workers run scripts in background threads separate from the main browser thread, improving performance by handling tasks concurrently.
Service workers are scripts that run in the background and can intercept ne...read more
Q374. what are pillars of OOPS
The pillars of OOPS (Object-Oriented Programming) are Inheritance, Encapsulation, Polymorphism, and Abstraction.
Inheritance allows a class to inherit properties and behavior from another class. For example, a 'Car' class can inherit from a 'Vehicle' class.
Encapsulation refers to the bundling of data with the methods that operate on that data. It restricts access to some of an object's components. For example, using private variables in a class.
Polymorphism allows methods to d...read more
Q375. Flatten a json file
Flatten a JSON file by converting nested objects into a single level structure.
Use recursion to iterate through the JSON file and flatten nested objects.
Combine keys from nested objects with parent keys to create unique keys for the flattened structure.
Handle arrays by converting them into separate objects with numerical keys.
Q376. Finding dulpicates char in string
The question is about finding duplicate characters in a string.
Iterate through each character in the string.
Use a hash table or an array to keep track of the count of each character.
If the count of a character is greater than 1, it is a duplicate.
Q377. Difference between truncate and delete
Truncate removes all records from a table, while delete removes specific records.
Truncate is faster as it does not log individual row deletions
Delete is slower as it logs each row deletion
Truncate resets identity column values, delete does not
Truncate cannot be rolled back, delete can be rolled back using transactions
Q378. New technologies that you are aware
I am aware of new technologies such as artificial intelligence, blockchain, Internet of Things, and virtual reality.
Artificial intelligence (AI) - machine learning, natural language processing
Blockchain - decentralized digital ledger technology
Internet of Things (IoT) - interconnected devices and sensors
Virtual reality (VR) - immersive digital experiences
Q379. Web performance and optimization
Web performance and optimization are crucial for user experience and SEO.
Minimize HTTP requests
Optimize images and videos
Use a content delivery network (CDN)
Minimize server response time
Enable browser caching
Use Gzip compression
Minimize CSS and JavaScript files
Use lazy loading for images and videos
Q380. Types of design patterns
Design patterns are reusable solutions to common software problems.
Creational patterns: Singleton, Factory, Abstract Factory, Builder, Prototype
Structural patterns: Adapter, Bridge, Composite, Decorator, Facade, Flyweight, Proxy
Behavioral patterns: Chain of Responsibility, Command, Interpreter, Iterator, Mediator, Memento, Observer, State, Strategy, Template Method, Visitor
Q381. Insert element in between a linked list
Q382. What is software testing
Software testing is the process of evaluating a software application to ensure it meets specified requirements and functions correctly.
Software testing involves executing the software with the intent of finding defects or bugs.
It helps in identifying errors, gaps, or missing requirements in the software.
Types of software testing include unit testing, integration testing, system testing, and acceptance testing.
Examples of software testing tools include Selenium, JUnit, and Tes...read more
Q383. Hands on custom hooks
Custom hooks are reusable functions that allow you to extract component logic into separate functions for better reusability and readability.
Custom hooks are created by prefixing the function name with 'use' (e.g. useCustomHook)
They can be used to share logic between components without repeating code
Custom hooks can be used for data fetching, state management, and more
Q384. Explain Safe Agile and kanban
SAFe Agile is a framework for scaling Agile practices to enterprise level. Kanban is a visual management tool for Agile teams.
SAFe Agile involves organizing teams into Agile Release Trains (ARTs) and implementing Lean-Agile practices across the organization.
Kanban involves visualizing the workflow on a board and limiting work in progress to improve flow and delivery.
SAFe Agile and Kanban can be used together to implement Agile practices at scale while maintaining visibility a...read more
Q385. What is skewness
Skewness is a measure of the asymmetry of a probability distribution.
Positive skewness means the tail of the distribution is longer on the positive side.
Negative skewness means the tail of the distribution is longer on the negative side.
A perfectly symmetrical distribution has a skewness of 0.
Skewness can affect the interpretation of statistical analyses.
Q386. Find xpath for a given element
Use browser developer tools to inspect element and generate xpath
Inspect element using browser developer tools
Right click on element and select 'Copy' -> 'Copy XPath'
Modify generated xpath if needed to make it more robust
Q387. Selenium broken link program
Selenium program to identify broken links on a webpage
Use Selenium WebDriver to navigate to the webpage
Find all the links on the page using findElements() method
Iterate through each link and check if it returns a valid HTTP response code
Report any broken links with their corresponding HTTP response code
Q388. Explain about garbage collection
Garbage collection is a process in programming where the system automatically reclaims memory occupied by objects that are no longer in use.
Garbage collection helps prevent memory leaks by freeing up memory that is no longer needed.
It is commonly used in languages like Java, C#, and Python.
There are different types of garbage collection algorithms such as mark and sweep, reference counting, and generational garbage collection.
Q389. Explain case study with PPT
A case study is explained using a PowerPoint presentation.
Create a slide for each section of the case study (background, problem, solution, results)
Use visuals like charts, graphs, and images to enhance understanding
Include key data points and analysis in the slides
Present the case study in a clear and concise manner
Allow time for questions and discussion at the end
Q390. Explain about Sitecore JSS architecture
Sitecore JSS architecture allows developers to build dynamic websites using JavaScript frameworks like React or Angular.
Sitecore JSS separates the presentation layer from the content management system, allowing for easier development and maintenance.
It uses a headless architecture, where the front-end is decoupled from the back-end, enabling faster performance and flexibility.
Developers can use their preferred JavaScript frameworks like React or Angular to build the front-end...read more
Q391. Types of billing used
There are various types of billing used in PMO consulting, including hourly rates, fixed fees, and value-based pricing.
Hourly rates: charging a set amount per hour worked
Fixed fees: charging a set amount for a specific project or service
Value-based pricing: charging based on the value delivered to the client
Retainer fees: charging a set amount for ongoing services
Blended rates: a combination of hourly rates and fixed fees
Cost-plus pricing: charging the cost of the project plu...read more
Q392. Advantage of mvp over mvc.
MVP offers better separation of concerns and easier unit testing compared to MVC.
MVP separates the presentation layer from the business logic, making it easier to maintain and modify the codebase.
MVP allows for easier unit testing as the presenter can be tested independently from the view.
MVP provides better decoupling between components, enabling easier code reuse and scalability.
MVP promotes a clear separation of concerns, making the codebase more modular and maintainable.
I...read more
Q393. Agile and waterfall difference
Agile is iterative and flexible, while waterfall is sequential and rigid.
Agile involves breaking projects into smaller tasks and adapting to changes quickly.
Waterfall follows a linear approach with distinct phases like planning, design, development, testing, and deployment.
Agile is more suitable for projects with evolving requirements, while waterfall is better for projects with fixed requirements.
Agile promotes collaboration and customer feedback throughout the project, whil...read more
Q394. Stack using Link list
Implementing a stack using a linked list data structure.
Create a Node class with data and next pointer
Implement push() to add elements to the top of the stack
Implement pop() to remove and return the top element
Implement peek() to return the top element without removing it
Q395. Program on collection framework
The collection framework in Java provides a set of classes and interfaces to store and manipulate groups of objects.
The collection framework includes interfaces like List, Set, and Map, along with classes like ArrayList, HashSet, and HashMap.
Collections can store objects of any type, including custom classes.
Collections provide methods for adding, removing, and accessing elements, as well as for sorting and searching.
Iterators are used to traverse through collections and perf...read more
Q396. Define a micro service architecture.
Microservice architecture is an architectural style that structures an application as a collection of loosely coupled services.
Each service is self-contained and can be independently deployed, scaled, and maintained.
Services communicate with each other over lightweight protocols like HTTP or messaging queues.
Each service is responsible for a specific business function and can be developed using different technologies.
Microservices enable agility, scalability, and resilience i...read more
Q397. React with typescript, Test case
React with TypeScript and test case integration for ensuring code quality and functionality.
Use Jest and Enzyme for writing test cases in React with TypeScript.
Utilize TypeScript's static type checking to catch errors early in development.
Mock external dependencies in test cases to isolate components for testing.
Ensure test coverage for all components and functions in the codebase.
Use tools like React Testing Library for testing React components.
Integrate continuous integrati...read more
Q398. A puzzle of bucket fill
Bucket fill puzzle involves filling buckets of different sizes with water using a larger bucket.
The larger bucket is used to fill the smaller buckets.
The goal is to fill a specific amount of water using the available buckets.
The process involves pouring water from one bucket to another until the desired amount is reached.
The size of the buckets and the amount of water needed can vary.
This puzzle can be solved using mathematical equations and logical reasoning.
Q399. Design a life management system
A life management system is a tool or platform that helps individuals organize and prioritize tasks, goals, and responsibilities in various aspects of their life.
Include features for task management, goal setting, calendar integration, and reminders
Allow users to categorize tasks and goals by priority, deadline, and importance
Provide analytics and insights on productivity and time management
Integrate with wearable devices for health and fitness tracking
Offer customization opt...read more
Q400. Test cases on eCommerce platform
Test cases for eCommerce platform
Verify user can successfully add items to cart
Test checkout process with different payment methods
Check for proper error messages when entering invalid information
Test search functionality for products
Verify discounts and promotions are applied correctly
Top HR Questions asked in Zepto
Interview Process at Zepto
Top Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month