QualiZeal
20+ Vegapay Interview Questions and Answers
Q1. What are the constraints faced in Data Validation. explain each of them with illustration.
Constraints faced in Data Validation with illustrations
1. Format constraints: Ensuring data follows a specific format (e.g. date in MM/DD/YYYY format)
2. Range constraints: Validating data falls within a specified range (e.g. age between 18-65)
3. Mandatory constraints: Ensuring required fields are not empty (e.g. email address field)
4. Consistency constraints: Checking data consistency across multiple fields (e.g. start date before end date)
5. Uniqueness constraints: Verifying...read more
Q2. What are the different validations performed in your Testing
Different validations in testing include input validation, boundary validation, error handling validation, and data validation.
Input validation ensures that the system accepts only valid inputs.
Boundary validation checks the system's behavior at the boundaries of valid input ranges.
Error handling validation verifies that the system handles errors gracefully.
Data validation ensures that the data processed by the system is accurate and consistent.
Q3. Write SQL query to find duplicate values from the given scenario
SQL query to find duplicate values in a scenario
Use the GROUP BY clause to group the values
Use the HAVING clause to filter out groups with count greater than 1
Select the columns with duplicate values
Q4. Write the outputs for the given tables for all joins from the given scenario
The candidate is asked to write the outputs for all joins from a given scenario.
Inner join: Returns rows when there is a match in both tables
Left join: Returns all rows from the left table and the matched rows from the right table
Right join: Returns all rows from the right table and the matched rows from the left table
Full outer join: Returns all rows when there is a match in either table
Q5. Write SQL query to DELETE duplicate values in the given scenario
Use SQL query with GROUP BY and HAVING clause to delete duplicate values
Use GROUP BY clause to group the records based on the columns that should not have duplicates
Use HAVING clause to filter out the groups that have more than one record
Use DELETE statement to remove the duplicate records
Q6. SQL syntax to find NULL or BLANK values from the given scenario
Use IS NULL or = '' to find NULL or BLANK values in SQL
Use IS NULL to find NULL values in a column
Use = '' to find BLANK values in a column
Example: SELECT * FROM table_name WHERE column_name IS NULL OR column_name = ''
Q7. What are the set operators and explain them
Set operators are used in SQL to perform operations on sets of data, such as union, intersect, and except.
Union - combines the results of two or more SELECT statements, removing duplicates
Intersect - returns the common rows between two SELECT statements
Except - returns the rows that are in the first SELECT statement but not in the second SELECT statement
Q8. Explain different Agile ceremonies in Agile Methodology
Agile ceremonies are regular meetings or events in Agile methodology to facilitate communication and collaboration within the team.
Sprint Planning: Plan the work to be done in the upcoming sprint.
Daily Standup: Daily meeting to discuss progress, challenges, and plans for the day.
Sprint Review: Demo of completed work to stakeholders for feedback.
Sprint Retrospective: Reflect on the sprint and identify areas for improvement.
Backlog Refinement: Review and prioritize items in the...read more
Q9. What is transactional and Mater Data
Transactional data refers to real-time data related to business transactions, while Master Data is the core data that is essential to operations.
Transactional data is dynamic and changes frequently, such as sales orders, invoices, and payments.
Master Data is static and remains unchanged over time, such as customer information, product details, and employee records.
Q10. Difference between DELETE , DROP and TRUNCATE
DELETE removes specific rows from a table, DROP removes entire table, TRUNCATE removes all rows from a table.
DELETE is a DML command used to remove specific rows from a table based on a condition.
DROP is a DDL command used to remove an entire table along with its structure and data.
TRUNCATE is a DDL command used to remove all rows from a table but keeps the table structure intact.
DELETE is slower than TRUNCATE and DROP as it maintains logs for rollback.
DROP is faster than DEL...read more
Q11. Explain your project with suitable illustrations
Developed a test automation framework using Selenium for web application testing
Created test scripts in Java to automate regression testing
Integrated with Jenkins for continuous integration
Used Page Object Model design pattern for better code maintenance
Q12. What is Test Improvement Process
Test Improvement Process is a systematic approach to enhancing the efficiency and effectiveness of software testing.
Identifying areas of improvement in the testing process
Implementing changes to address the identified issues
Measuring the impact of the changes on testing outcomes
Continuously iterating and refining the testing process
Examples: introducing automation, improving test coverage, enhancing test data management
Q13. What is CRUD in API Testing
CRUD stands for Create, Read, Update, Delete - the four basic functions of persistent storage.
Create - testing the ability to create new resources through API calls
Read - testing the ability to retrieve existing resources from the API
Update - testing the ability to modify existing resources through API calls
Delete - testing the ability to remove resources from the API
Q14. Explain order of execution of SQL query
SQL queries are executed in a specific order to ensure accurate results.
SQL query is parsed to check syntax errors
Query optimizer creates an execution plan
Data is retrieved from tables based on the execution plan
Filters and joins are applied to the retrieved data
Aggregations and sorting are performed on the data
Results are returned to the user
Q15. What is Not malization
Normalization is the process of organizing data in a database to reduce redundancy and improve data integrity.
Normalization involves breaking down data into smaller, more manageable parts.
It helps in reducing data redundancy by storing data in a structured manner.
Normalization ensures data integrity by avoiding anomalies like insertion, update, and deletion anomalies.
There are different normal forms like 1NF, 2NF, 3NF, BCNF, etc.
For example, in a database table, instead of st...read more
Q16. What is referential Integrity
Referential integrity is a database concept that ensures relationships between tables are maintained.
It ensures that foreign key values in one table match primary key values in another table.
It prevents orphaned records by enforcing constraints on relationships.
It helps maintain data consistency and accuracy.
Example: If a customer places an order, the customer ID in the orders table must exist in the customers table.
Q17. What is data acquisition
Data acquisition is the process of collecting and measuring information from various sources for analysis and storage.
Involves capturing data from sensors, instruments, or other devices
Can include sampling, digitizing, and processing data
Common in fields like scientific research, industrial automation, and environmental monitoring
Q18. Difference between OLAP and OLTP
OLAP is used for analyzing and reporting complex data, while OLTP is used for transaction processing.
OLAP stands for Online Analytical Processing, used for data analysis and reporting.
OLTP stands for Online Transaction Processing, used for transactional operations.
OLAP deals with historical data and is read-heavy, while OLTP deals with current data and is write-heavy.
OLAP databases are optimized for complex queries and aggregations, while OLTP databases are optimized for fast...read more
Q19. Explain DDL, DML, DCL, and TCL
DDL, DML, DCL, and TCL are different types of SQL commands used for database management.
DDL (Data Definition Language) is used to define the structure of database objects like tables, indexes, etc. Examples: CREATE, ALTER, DROP.
DML (Data Manipulation Language) is used to manipulate data in the database. Examples: INSERT, UPDATE, DELETE.
DCL (Data Control Language) is used to control access to data in the database. Examples: GRANT, REVOKE.
TCL (Transaction Control Language) is u...read more
Q20. Difference between ELT and ETL
ETL stands for Extract, Transform, Load while ELT stands for Extract, Load, Transform.
ETL involves extracting data from source systems, transforming it, and then loading it into a data warehouse or data lake.
ELT involves extracting data from source systems, loading it into a data lake or data warehouse, and then transforming it as needed.
ETL is suitable for structured data while ELT is suitable for unstructured data.
ETL requires a separate transformation engine while ELT leve...read more
Q21. Explain windows Functions
Windows Functions are built-in functions in SQL Server that perform operations on a set of rows and return a single aggregated value.
Used for performing calculations on a set of rows in a table
Commonly used functions include SUM, AVG, COUNT, MIN, MAX
Can be used with GROUP BY clause to group results based on a specific column
Example: SELECT SUM(sales) FROM sales_table WHERE year = 2021
Q22. Explain Defect Life Cycle
Defect Life Cycle is the process of identifying, reporting, fixing, retesting, and closing software defects.
Defect Identification: Defects are identified through testing or user feedback.
Defect Reporting: Defects are reported in a defect tracking tool with details like steps to reproduce, severity, and priority.
Defect Fixing: Developers fix the reported defects based on the information provided.
Defect Retesting: Testers verify that the fixed defects are indeed resolved.
Defect...read more
Q23. Codd’s rules of DBMS
Codd's rules are a set of 12 rules proposed by Edgar F. Codd to define what is required from a database management system to be considered relational.
Codd's rules were created to ensure that a database management system is truly relational.
Some of the key rules include the rule of data independence, rule of guaranteed access, and rule of comprehensive data sub-language.
An example of a Codd's rule is the rule of view updating, which states that all views that are theoretically...read more
More about working at QualiZeal
Top Softwaretest Engineer Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month