Quantiphi Analytics Solutions Private Limited
90+ DigiSME Interview Questions and Answers
There are ‘n’ fruit trees that are planted along a road. The trees are numbered from 0 to n-1. The type of fruit each tree bears is represented by an uppercase character of the English alphabe...read more
The problem is to find the maximum number of fruits the Ninja can put in both baskets after satisfying given conditions.
The Ninja can start at any tree and end at any tree, but cannot skip a tree.
He can pick one fruit from each tree until he cannot, i.e., when he has to pick a fruit of the third type.
The restriction is that each basket can have only one type of fruit.
We need to find the maximum number of fruits that can be put in both baskets.
You have been given an integer array/list(ARR) of size 'N'. It only contains 0s, 1s and 2s. Write a solution to sort this array/list.
Note :
Try to solve the problem in 'Single Scan'. ' Single Scan' r...read more
The problem requires sorting an array of 0s, 1s, and 2s in a single scan.
Use three pointers to keep track of the positions of 0s, 1s, and 2s.
Initialize the low pointer at the beginning of the array and the high pointer at the end.
Iterate through the array using a current pointer and swap elements based on their values.
Move the pointers accordingly until the array is sorted.
The time complexity of this solution is O(N) as we only iterate through the array once.
Two trains A and B travelling at speed X and Y respectively. Now imagine when distance between them is D a bee that can fly at speed Z begins to fly from A to B and then B to A until both tra...read more
The distance traveled by the bee can be calculated using the formula: distance = (X + Y) * (D / (X + Y + Z))
The bee starts flying from train A to train B and then back to train A until they collide
The total distance traveled by the bee can be calculated using the formula: distance = (X + Y) * (D / (X + Y + Z))
X and Y are the speeds of trains A and B respectively, and Z is the speed of the bee
D is the initial distance between the trains
Q4. What are the Different types of Learning?
Different types of learning include supervised learning, unsupervised learning, semi-supervised learning, reinforcement learning, and transfer learning.
Supervised learning: Training a model using labeled data to make predictions or classifications.
Unsupervised learning: Training a model on unlabeled data to discover patterns or relationships.
Semi-supervised learning: Combining labeled and unlabeled data for training.
Reinforcement learning: Training a model to make decisions b...read more
1. Do you know cloud computing? (A. No, but I have recently enrolled in a course on Cloud Computing)
2. What cloud platforms are you aware of? (A. AWS, GCP, Azure)
3. Which is the best am...read more
Yes
I have recently enrolled in a course on Cloud Computing
I am aware of cloud platforms like AWS, GCP, and Azure
I have used the Places API from GCP in my projects PharmaQuick and Suraksha
I am not familiar with networking commands in Linux
The interview started by greeting each other and followed by which the panelist asked me to introduce myself. I had also mentioned my hobbies in my introduction. So we had a good discussion on...read more
Yes
I am most inclined towards Software Development because I enjoy creating and building software solutions.
I have a strong background in programming languages and software development methodologies.
I have experience in designing and implementing scalable and efficient software solutions.
I enjoy the challenge of solving complex problems and finding innovative solutions through software development.
I have worked on various software development projects and have a good understa...read more
Q7. Name some evaluation metrics? What is precision and recall? Give some examples. What is Entropy and Gini impurity What are bagging techniques What are boosting techniques Difference between validation and test ...
read moreExplanation of evaluation metrics, precision, recall, entropy, Gini impurity, bagging, boosting, validation vs test data, LSTM, GRU, K-means clustering, and importing CSV datasets.
Evaluation metrics: used to measure the performance of machine learning models (e.g., accuracy, precision, recall, F1 score)
Precision: ratio of true positive predictions to the total predicted positives (TP / (TP + FP))
Recall: ratio of true positive predictions to the total actual positives (TP / (T...read more
Q8. What are Different ML algorithms?
ML algorithms are techniques used to train models to make predictions or decisions based on data.
Supervised learning algorithms: Linear regression, logistic regression, decision trees, random forests, support vector machines, k-nearest neighbors
Unsupervised learning algorithms: K-means clustering, hierarchical clustering, principal component analysis
Reinforcement learning algorithms: Q-learning, SARSA
Deep learning algorithms: Convolutional neural networks, recurrent neural ne...read more
Q9. Why do you believe IPhone is still a niche product in India?
IPhone is still a niche product in India due to its high price and availability of cheaper alternatives.
IPhone is considered a luxury item in India due to its high price.
There are many cheaper alternatives available in the Indian market.
The Indian market is dominated by budget and mid-range smartphones.
IPhone's market share in India is only around 2%.
IPhone's high price also makes it less attractive to price-sensitive Indian consumers.
Q10. How will u count the Number of white vehicles from Patna to kanpur
Counting white vehicles from Patna to Kanpur involves visually identifying and tallying them along the route.
Observe vehicles passing by on the route
Note down the count of white vehicles
Repeat the process until reaching Kanpur
Use technology like cameras or drones for accurate counting if needed
Q11. How do you go about creating user stories, how do you allocate the points
User stories are created by collaborating with stakeholders and allocating points based on complexity and effort required.
Collaborate with stakeholders to gather requirements and understand user needs
Break down features into smaller, manageable user stories
Prioritize user stories based on business value and dependencies
Allocate points based on complexity, effort, and risk involved
Use techniques like Planning Poker to assign points collaboratively
Q12. How proficient are you with using tools such as Jira, Cofluence, SQL
I am highly proficient in using Jira, Confluence, and SQL for various business analysis tasks.
I have extensive experience using Jira for project management, issue tracking, and agile development.
I am skilled in using Confluence for documentation, collaboration, and knowledge sharing within teams.
I have strong SQL skills for data analysis, querying databases, and generating reports.
I have used these tools in previous projects to streamline processes, improve communication, and...read more
Q13. Guesstimate on Electronics and Fashion Industry in my city: Parameters to estimate the Amazon services to these businesses
Estimating Amazon services for Electronics and Fashion Industry in my city
Analyze the market size and growth rate of both industries in the city
Identify the major players and their online presence
Evaluate the demand for online shopping in the city
Assess the delivery infrastructure and logistics in the city
Consider the pricing strategy and discounts offered by Amazon
Look into the customer reviews and ratings of Amazon services in the city
Q14. How will you convince a company to buy your product
I will showcase the unique features and benefits of the product and provide evidence of its success in the market.
Identify the pain points of the company and show how the product can solve them
Highlight the unique features and benefits of the product
Provide evidence of the product's success in the market through case studies and testimonials
Offer a trial period or demo to allow the company to test the product before committing to a purchase
Address any concerns or objections t...read more
Second highest salary
Different join and order by conditions
Find the second highest salary using SQL.
Use the SELECT statement to retrieve the salary column from the table.
Order the results in descending order using the ORDER BY clause.
Use the LIMIT clause to limit the result to the second row.
Combine the above steps in a single SQL query.
Q16. What is the SOP while creating a requirement gathering doc
The SOP for creating a requirement gathering doc involves planning, interviewing stakeholders, documenting requirements, and obtaining approval.
Plan the requirement gathering process by identifying stakeholders and their needs
Conduct interviews with stakeholders to gather detailed requirements
Document the requirements in a clear and organized manner
Obtain approval from stakeholders to ensure alignment with business goals
Q17. What is Naive Bayes in ML?
Naive Bayes is a probabilistic algorithm that uses Bayes' theorem to classify data based on prior knowledge.
Naive Bayes assumes that all features are independent of each other.
It is commonly used for text classification and spam filtering.
There are three types of Naive Bayes classifiers: Gaussian, Multinomial, and Bernoulli.
It is a fast and simple algorithm that works well with high-dimensional datasets.
Naive Bayes can handle missing data and is not affected by irrelevant fea...read more
Q18. Spark: Repartition and coalesce MLflow in Spark Partitioning of data map and map partition
The question covers various topics related to Spark, including repartitioning, coalescing, MLflow, partitioning of data, map, and map partition.
Repartitioning and coalescing are used to change the number of partitions in an RDD/DataFrame.
MLflow is an open-source platform for managing machine learning lifecycle.
Partitioning of data is the process of dividing data into smaller, more manageable parts.
Map and map partition are transformations in Spark used to apply a function to ...read more
Q19. What are service principals and key vaults
Service principals are identities used by applications and services to access resources, while key vaults are secure storage for keys, secrets, and certificates.
Service principals are used to authenticate and authorize applications and services to access resources in Azure
Key vaults provide a secure and centralized location to store and manage cryptographic keys, secrets, and certificates
Service principals can be granted access to key vaults to retrieve secrets or keys
Key vau...read more
Q20. Explain the transformer architecture and positional encoders?
Transformer architecture is a neural network architecture used for natural language processing tasks. Positional encoders are used to encode the position of words in a sentence.
Transformer architecture is based on the self-attention mechanism.
It consists of an encoder and a decoder.
Positional encoders are added to the input embeddings to encode the position of words in a sentence.
They are computed using sine and cosine functions of different frequencies.
Positional encoders he...read more
Q21. How do you deduce a complex problem statement
By breaking down the problem into smaller components and analyzing each part individually
Identify the key components of the problem statement
Break down the problem into smaller, more manageable parts
Analyze each part individually to understand its impact on the overall problem
Consider different perspectives and potential solutions
Collaborate with team members or stakeholders to gain additional insights
Q22. What are the different types of project management techniques?
Different types of project management techniques include Agile, Waterfall, Scrum, Kanban, and Lean.
Agile: Iterative approach, adaptive planning, continuous improvement.
Waterfall: Sequential approach, rigid structure, defined phases.
Scrum: Iterative and incremental approach, daily stand-up meetings, sprints.
Kanban: Visual management method, focus on workflow efficiency, limit work in progress.
Lean: Focus on maximizing value and minimizing waste, continuous improvement.
Q23. Reading files using spark from different locations. (write code snippet)
Reading files from different locations using Spark
Use SparkSession to create a DataFrameReader
Use the .option() method to specify the file location and format
Use the .load() method to read the file into a DataFrame
Q24. What is Regression?
Regression is a statistical method used to analyze the relationship between a dependent variable and one or more independent variables.
Regression is used to predict continuous numerical values.
It helps in identifying the strength and direction of the relationship between variables.
Linear regression is a common type of regression used to model the relationship between two variables.
Examples of regression include predicting housing prices based on square footage and predicting ...read more
Q25. Azure storage BLOB vs ADLS Gen2
Azure storage BLOB is a general-purpose object storage solution, while ADLS Gen2 is optimized for big data analytics workloads.
Azure storage BLOB is suitable for storing unstructured data like images, videos, and documents.
ADLS Gen2 is designed for big data workloads and provides features like hierarchical namespace and optimized performance for analytics.
Azure storage BLOB supports hot, cool, and archive storage tiers, while ADLS Gen2 only supports hot and cool tiers.
ADLS Ge...read more
Q26. Daily day to day activities in personal & professional life, Work life balance, Indian IT industries
Maintaining work-life balance is crucial for personal and professional growth in Indian IT industries.
Prioritizing tasks and time management is important for a balanced routine.
Taking breaks and engaging in physical activities can help reduce stress and improve productivity.
Setting boundaries and communicating with colleagues and family members can help maintain a healthy work-life balance.
Indian IT industries are known for their demanding work culture, but companies are now ...read more
1. OSI layers along with functions of each layer.
2. Differentiate between TCP and UDP.
3. DNS.
The answer to the networking questions asked in the interview.
1. OSI layers: Physical, Data Link, Network, Transport, Session, Presentation, Application.
2. TCP: reliable, connection-oriented, error-checking, sequencing. UDP: unreliable, connectionless, faster.
3. DNS: Domain Name System translates domain names to IP addresses.
Q28. How do you go about SDLC process
I follow the Software Development Life Cycle (SDLC) process to ensure successful project delivery.
I start with requirements gathering and analysis to understand the project scope and objectives.
I then move on to design, where I create a detailed plan for how the system will be built.
Next, I proceed to development, where the actual coding and implementation of the system takes place.
After development, I conduct thorough testing to identify and fix any bugs or issues.
Finally, I...read more
Q29. What values do you look in a collegue
I look for values such as integrity, teamwork, communication, and adaptability in a colleague.
Integrity - honesty, trustworthiness, and ethical behavior
Teamwork - collaboration, support, and willingness to help others
Communication - clear and effective communication skills
Adaptability - ability to adjust to changing circumstances and problem-solve
Q30. Name different tools used to maintain project timeline?
Some tools used to maintain project timeline include Gantt charts, project management software, and milestone tracking tools.
Gantt charts: Visual representation of project tasks and timelines.
Project management software: Helps in scheduling, resource allocation, and tracking progress.
Milestone tracking tools: Monitor key project milestones and deadlines.
Calendar tools: Helps in scheduling and setting deadlines.
Time tracking software: Tracks time spent on tasks to ensure proje...read more
Q31. Airflow operators and what is the use of Airflow python operator
Airflow operators are used to define tasks in a workflow. The Airflow Python operator is used to execute Python functions as tasks.
Airflow operators are used to define individual tasks in a workflow
The Airflow Python operator is specifically used to execute Python functions as tasks
It allows for flexibility in defining custom tasks using Python code
Example: PythonOperator(task_id='my_task', python_callable=my_python_function)
Q32. What is PCA, how to do feature selection
PCA is a dimensionality reduction technique used to reduce the number of features in a dataset while preserving the most important information.
PCA stands for Principal Component Analysis
It works by finding the directions (principal components) in which the data varies the most
These principal components are orthogonal to each other and capture the maximum variance in the data
Feature selection can be done by selecting the top principal components that explain most of the varian...read more
Q33. Explain the difference between BRD and FRD
BRD is a document that outlines business requirements, while FRD is a document that details functional requirements.
BRD focuses on what the business needs, while FRD focuses on how those needs will be met.
BRD is high-level and non-technical, while FRD is detailed and technical.
BRD is created before FRD in the project lifecycle.
Example: BRD may state the need for a customer relationship management system, while FRD will detail the specific features and functionalities required...read more
Q34. Breakdown of Apple IPhone market in India?
Apple iPhone market in India is dominated by premium segment with a growing demand for mid-range models.
Apple has a market share of around 2% in India
The premium segment (above INR 50,000) accounts for around 25% of the total iPhone sales in India
The mid-range segment (INR 20,000 - INR 50,000) is growing rapidly due to the launch of iPhone SE and iPhone XR
Apple has started manufacturing some of its models in India to reduce costs and increase affordability
Q35. How do you present insights to higher management?
I present insights to higher management through clear and concise reports, visualizations, and presentations.
Create visually appealing charts and graphs to highlight key insights
Summarize findings in a clear and concise manner
Use storytelling techniques to make the data relatable and impactful
Provide recommendations based on the insights gathered
Tailor the presentation to the audience's level of understanding and interest
Q36. Do you have knowledge of SAP?
Yes, I have knowledge of SAP.
I have experience working with SAP modules such as FI/CO, MM, and SD.
I have created reports using SAP Business Objects.
I have worked on SAP implementation projects.
I have knowledge of SAP HANA database.
I have completed SAP certification courses.
Q37. Text cases for your projects and how do you test your projects
I create test cases based on project requirements and use automation tools to test the projects.
Identify test scenarios based on project requirements
Create test cases for positive and negative scenarios
Use automation tools like Selenium or Appium to execute test cases
Analyze test results and report any issues found
Q38. Describe a problem where you learned from failure
Failed to implement a new project management tool due to lack of user training
Implemented a new project management tool without providing sufficient user training
Users struggled to adapt to the new tool and productivity decreased
Realized the importance of user training and communication in successful project implementations
Q39. What is overfitting and underfitting?
Overfitting occurs when a model learns the training data too well, leading to poor generalization. Underfitting happens when a model is too simple to capture the underlying patterns.
Overfitting: Model performs well on training data but poorly on unseen data. Can be caused by a model being too complex or training for too long.
Underfitting: Model is too simple to capture the underlying patterns in the data. Results in poor performance on both training and unseen data.
Examples: ...read more
Q40. What are some advantages of using OOPS? What are the four pillars of OOP? What are the various types of Constructors in C++? Explain inheritance and polymorphism with examples. What is Django Framework? What is...
read moreQ41. how to over come over fitting
To overcome overfitting, use techniques like cross-validation, regularization, early stopping, and increasing training data.
Use cross-validation to evaluate model performance on different subsets of data.
Apply regularization techniques like L1 or L2 regularization to penalize large coefficients.
Implement early stopping to stop training when validation error starts to increase.
Increase training data to provide more diverse examples for the model to learn from.
Q42. how to do EDA of dataset using python (df.describe)
Exploratory Data Analysis (EDA) of a dataset using Python's df.describe function.
Use df.describe() to get summary statistics of the dataset.
Check for missing values, outliers, and distribution of data.
Visualize the data using plots like histograms, box plots, and scatter plots.
Use additional libraries like matplotlib and seaborn for more advanced visualizations.
Q43. What is the main difference in docker swarm and Kubernates
Docker Swarm is simpler and easier to set up, while Kubernetes is more powerful and feature-rich for complex deployments.
Docker Swarm is easier to set up and manage for smaller deployments
Kubernetes is more powerful and feature-rich, suitable for complex deployments and scaling
Kubernetes has a larger community and ecosystem support compared to Docker Swarm
Kubernetes provides more advanced features like auto-scaling, self-healing, and rolling updates
Docker Swarm is more lightw...read more
Q44. Challenges faced in AI ML projects worked on in current role and how it was mitigated.
Challenges faced in AI ML projects and mitigation strategies
Data quality issues leading to inaccurate predictions
Lack of domain expertise affecting model performance
Difficulty in explaining AI ML models to stakeholders
Overfitting or underfitting of models
Limited computational resources impacting model training
Q45. Types of machine learning and difference between ML and deep learning
Types of machine learning include supervised, unsupervised, and reinforcement learning. Deep learning is a subset of ML using neural networks.
Supervised learning: Uses labeled data to make predictions, such as classification or regression.
Unsupervised learning: Finds patterns in unlabeled data, like clustering or dimensionality reduction.
Reinforcement learning: Learns through trial and error to maximize rewards, commonly used in gaming or robotics.
Deep learning: Utilizes neur...read more
Q46. how word2vec works, how gensim works. what is tf-idf
word2vec is a technique to create word embeddings, gensim is a Python library for topic modeling and similarity detection, tf-idf is a method to represent the importance of a word in a document.
word2vec is a neural network model that learns word embeddings by predicting the context of a word based on its surrounding words.
Gensim is a Python library for topic modeling, document similarity analysis, and other natural language processing tasks.
tf-idf stands for term frequency-in...read more
Q47. Types of dimensions, Different SCDs and use cases,
Types of dimensions and slowly changing dimensions (SCDs) with use cases
Types of dimensions include conformed, junk, degenerate, and role-playing dimensions
SCD Type 1: Overwrite existing data, useful for correcting errors
SCD Type 2: Create new records for changes, useful for tracking historical data
SCD Type 3: Add new columns for changes, useful for limited historical tracking
SCD Type 4: Create separate tables for historical data, useful for large dimensions
Q48. What are indexes in DBMS
Indexes in DBMS are data structures that improve the speed of data retrieval operations on a database table.
Indexes are used to quickly locate data without having to search every row in a table.
They are created on columns in a table to speed up SELECT queries.
Examples of indexes include primary keys, unique keys, and non-unique indexes.
Q49. Which coding language is better and why?
There is no one 'better' coding language, as it depends on the specific use case and requirements.
The best coding language depends on the project requirements, team expertise, and ecosystem support.
For data engineering, languages like Python, Scala, and SQL are commonly used for their data processing capabilities.
Python is popular for its simplicity and extensive libraries like Pandas and NumPy, while Scala is known for its performance in distributed computing with tools like...read more
Q50. what is difference between precision and recall
Precision is the ratio of correctly predicted positive observations to the total predicted positive observations, while recall is the ratio of correctly predicted positive observations to the all observations in actual class.
Precision focuses on the accuracy of positive predictions, while recall focuses on the proportion of actual positives that were correctly identified.
Precision = TP / (TP + FP), Recall = TP / (TP + FN)
For example, in a spam email detection system, precisio...read more
Q51. What is k value in k means clustering
k value in k means clustering represents the number of clusters to be formed in the data set.
The k value is a hyperparameter that needs to be specified by the user before running the algorithm.
It determines the number of centroids to be initialized in the data set.
Choosing the right k value is crucial for the performance of the clustering algorithm.
For example, if we set k=3 in k means clustering, the algorithm will try to partition the data into 3 clusters.
Q52. what do we do if scope are full on DHCP server
If scope are full on DHCP server, you can either expand the scope or delete inactive leases to make room for new ones.
Expand the scope by increasing the range of IP addresses available for lease
Delete inactive leases to free up space for new leases
Check for any misconfigured devices causing IP address conflicts
Q53. What is treeset and weakhashmap?
TreeSet is a sorted set implementation in Java. WeakHashMap is a hash table-based Map implementation with weak keys.
TreeSet is implemented using a tree structure and maintains elements in sorted order.
WeakHashMap is a Map implementation that allows keys to be garbage collected when they are no longer referenced.
WeakHashMap is useful for caching or memoization where the keys are not always needed and can be garbage collected to free up memory.
Q54. What is comparable and comparator?
Comparable and Comparator are interfaces used for sorting objects in Java.
Comparable interface is used to define the natural ordering of objects based on their own class.
Comparator interface is used to define the ordering of objects based on a separate class.
Comparable interface has compareTo() method while Comparator interface has compare() method.
Comparable interface is implemented by the class whose objects need to be sorted while Comparator interface is implemented by a s...read more
Q55. OOPs, 4 pillars of OOPs
OOPs stands for Object-Oriented Programming and its 4 pillars are Inheritance, Encapsulation, Abstraction, and Polymorphism.
Inheritance allows a class to inherit properties and behavior from another class.
Encapsulation restricts access to certain components of an object, protecting its integrity.
Abstraction hides complex implementation details and only shows the necessary features.
Polymorphism allows objects to be treated as instances of their parent class, enabling flexibili...read more
Q56. different scores for model evaluations, embedding models
Different scores like accuracy, precision, recall, F1 for evaluating embedding models
Common evaluation metrics for embedding models include accuracy, precision, recall, and F1 score
Accuracy measures overall correctness of the model's predictions
Precision measures the proportion of true positive predictions among all positive predictions
Recall measures the proportion of true positive predictions among all actual positives
F1 score is the harmonic mean of precision and recall, p...read more
Q57. What are different types of locators in selenium
Different types of locators in Selenium include ID, Name, Class Name, Tag Name, Link Text, Partial Link Text, XPath, and CSS Selector.
ID - locates elements by their id attribute
Name - locates elements by their name attribute
Class Name - locates elements by their class attribute
Tag Name - locates elements by their tag name
Link Text - locates elements by the exact text of a link
Partial Link Text - locates elements by a partial match of link text
XPath - locates elements using XM...read more
Q58. What is OOPS? What is multiple Inheritance? Why do you want to join an IT Company? Why Quantiphi?
Q59. Why not SAP? What are its limitations
SAP has limitations in terms of flexibility and customization.
SAP is a complex system that can be difficult to customize to specific business needs.
It can be expensive to implement and maintain.
SAP may not be the best fit for smaller businesses with limited resources.
It may not integrate well with other systems or software.
SAP can be slow to adapt to new technologies and trends.
For example, if a company wants to implement a unique pricing model, it may be difficult to do so w...read more
Q60. Experience on Google Cloud and Projects
I have experience working on Google Cloud Platform and have completed multiple projects on it.
I have worked on Google Cloud Storage to store and retrieve data.
I have used Google BigQuery for data warehousing and analysis.
I have implemented data pipelines using Google Cloud Dataflow.
I have used Google Cloud Pub/Sub for real-time messaging and streaming data processing.
I have worked on Google Cloud Machine Learning Engine for building and deploying machine learning models.
One o...read more
Q61. what is the difference between L2 and L3 switch
L2 switches operate at the data link layer and make forwarding decisions based on MAC addresses, while L3 switches operate at the network layer and make forwarding decisions based on IP addresses.
L2 switches operate at the data link layer of the OSI model
L2 switches make forwarding decisions based on MAC addresses
L3 switches operate at the network layer of the OSI model
L3 switches make forwarding decisions based on IP addresses
L3 switches are capable of routing between differ...read more
Q62. Filters in Tableau,sql
Filters in Tableau and SQL are used to narrow down data based on specific criteria.
Filters in Tableau can be applied to individual worksheets or the entire dashboard
SQL filters can be applied using the WHERE clause
Tableau filters can be based on dimensions or measures
SQL filters can be based on any column in the table
Tableau filters can be interactive, allowing users to adjust the criteria
SQL filters can be combined with other clauses like JOIN and GROUP BY
Q63. ACID propwrties in DBMS
ACID properties in DBMS refer to the key characteristics of a transaction: Atomicity, Consistency, Isolation, and Durability.
Atomicity ensures that all operations in a transaction are completed successfully or none at all.
Consistency ensures that the database remains in a consistent state before and after the transaction.
Isolation ensures that the execution of multiple transactions concurrently does not interfere with each other.
Durability ensures that once a transaction is c...read more
Q64. SQL queries of duplicate
How to write SQL queries to find duplicates?
Use GROUP BY and HAVING clause to identify duplicates
Use COUNT() function to count the number of occurrences
Use DISTINCT keyword to remove duplicates
Use INNER JOIN to compare tables and find duplicates
Q65. Different Functionalities of tableau.
Tableau is a data visualization tool that offers various functionalities to create interactive dashboards and reports.
Data blending and joining
Data aggregation and filtering
Creating calculated fields and parameters
Mapping and geospatial analysis
Dashboard and report creation
Collaboration and sharing
Integration with other tools and platforms
Q66. what is the SAP Implementation roadmap
SAP Implementation roadmap is a step-by-step process to implement SAP software in an organization.
The roadmap starts with planning and scoping the project.
Next, the organization needs to define the business processes and requirements.
Then, the SAP software is configured and customized to meet the organization's needs.
After that, the system is tested and data is migrated.
Finally, the system is deployed and users are trained.
The roadmap also includes post-implementation support...read more
Q67. oops concept, explain each of them
Object-oriented programming concepts that help in organizing and structuring code.
Encapsulation: Bundling data and methods that operate on the data into a single unit (class).
Inheritance: Allowing a class to inherit properties and behavior from another class.
Polymorphism: Ability to present the same interface for different data types.
Abstraction: Hiding the complex implementation details and showing only the necessary features of an object.
Q68. What is machine learning
Machine learning is a subset of artificial intelligence that involves the development of algorithms and statistical models to perform specific tasks without explicit instructions.
Machine learning is a subset of artificial intelligence.
It involves the development of algorithms and statistical models.
These models are trained on data to make predictions or decisions.
Examples include image recognition, natural language processing, and recommendation systems.
Q69. REST API for User CRUD
Design a RESTful API for CRUD operations on user resources.
Use HTTP methods like GET, POST, PUT, DELETE for CRUD operations
Create endpoints like /users for listing all users, /users/{id} for specific user
Use status codes like 200 for success, 404 for not found, 400 for bad request
Implement authentication and authorization mechanisms for security
Include request and response body formats like JSON or XML
Q70. What is pip freeze?
pip freeze is a command in Python that lists all installed packages and their versions in a requirements.txt format.
Used to freeze the current state of installed packages for reproducibility
Helps in sharing the list of dependencies with others
Commonly used in virtual environments
Q71. Explain about tree boosted algorithms
Tree boosted algorithms are ensemble learning methods that combine multiple decision trees to improve predictive accuracy.
Tree boosted algorithms, such as Gradient Boosting and XGBoost, work by sequentially adding decision trees to correct the errors made by the previous trees.
They are popular in machine learning competitions due to their high predictive accuracy and ability to handle complex relationships in data.
Boosting algorithms like AdaBoost and LightGBM are also exampl...read more
Q72. Explain Kubernates Architecture
Kubernetes is an open-source container orchestration platform that automates the deployment, scaling, and management of containerized applications.
Kubernetes follows a master-slave architecture with a master node and multiple worker nodes.
Master node components include API server, scheduler, controller manager, and etcd.
Worker node components include kubelet, kube-proxy, and container runtime (e.g. Docker).
Kubernetes uses Pods as the smallest deployable units, which can conta...read more
Q73. how embedding models work
Embedding models learn to represent words or entities as dense vectors in a continuous vector space.
Embedding models map words or entities to high-dimensional vectors where similar words have similar vectors.
These models are trained using neural networks to learn the relationships between words based on their context.
Popular embedding models include Word2Vec, GloVe, and FastText.
Embedding models are commonly used in natural language processing tasks like sentiment analysis, m...read more
Q74. Explain bagging and boosting
Bagging and boosting are ensemble learning techniques used to improve the performance of machine learning models by combining multiple weak learners.
Bagging (Bootstrap Aggregating) involves training multiple instances of the same model on different subsets of the training data and then averaging the predictions to reduce variance.
Boosting involves training multiple weak learners sequentially, with each learner focusing on the mistakes made by the previous ones. The final pred...read more
Q75. SQL QUESTION FIND N TH HIGHEST SALARY
Use SQL query with ORDER BY and LIMIT to find the Nth highest salary.
Use ORDER BY clause to sort salaries in descending order
Use LIMIT to specify the Nth highest salary
Example: SELECT salary FROM employees ORDER BY salary DESC LIMIT N,1
Q76. Diff between parquet and avro?
Parquet is columnar storage format while Avro is row-based storage format.
Parquet is optimized for analytics and is efficient for reading large datasets.
Avro is optimized for serialization and is efficient for writing data to disk.
Parquet supports compression and encoding schemes while Avro supports schema evolution.
Parquet is used in Hadoop ecosystem while Avro is used in Kafka and Hadoop ecosystem.
Q77. Wether number is prime or not
A prime number is a number greater than 1 that has no positive divisors other than 1 and itself.
Check if the number is greater than 1
Iterate from 2 to the square root of the number and check if it is divisible by any number
If it is not divisible by any number, then it is a prime number
Q78. Approach towards handling project
My approach towards handling projects involves thorough planning, effective communication, proactive problem-solving, and continuous monitoring of progress.
Develop a detailed project plan outlining goals, timelines, resources, and responsibilities
Maintain open and clear communication with team members, stakeholders, and clients
Anticipate and address potential issues or roadblocks before they escalate
Regularly track and evaluate project progress to ensure milestones are met
Adj...read more
Q79. What is decision tree
A decision tree is a flowchart-like structure where each internal node represents a feature, each branch represents a decision, and each leaf node represents an outcome.
Decision trees are a popular machine learning algorithm used for classification and regression tasks.
They are easy to interpret and visualize, making them useful for understanding the decision-making process.
Decision trees work by recursively splitting the data based on the most significant feature at each nod...read more
Q80. wh lan is faster and wifi?
Wired LAN is faster than WiFi.
Wired LAN typically offers faster and more stable connection speeds compared to WiFi.
WiFi speeds can be affected by interference, distance from the router, and the number of devices connected.
Examples of wired LAN technologies include Ethernet and Powerline adapters.
Q81. Explain about migration
Migration refers to the movement of people or animals from one place to another, often for better opportunities or living conditions.
Migration can be voluntary or forced, such as due to war, natural disasters, or economic reasons.
It can be internal (within a country) or international (between countries).
Migration can have social, economic, and political impacts on both the place of origin and the destination.
Examples include the Syrian refugee crisis, the Great Migration of A...read more
Q82. Describe 1 case study
Implemented a data-driven marketing campaign for a retail client resulting in a 20% increase in sales.
Identified target audience through data analysis
Created personalized marketing materials
Analyzed campaign performance and made adjustments as needed
Q83. Explain about cloud migration
Cloud migration is the process of moving data, applications, and other business elements to a cloud computing environment.
Cloud migration involves transferring data, applications, and IT processes from on-premises infrastructure to a cloud environment.
It can help organizations reduce costs, improve scalability, and increase flexibility.
Common cloud migration strategies include rehosting, refactoring, rearchitecting, and rebuilding.
Examples of popular cloud migration tools inc...read more
Q84. Challenging situation faced
Managing a project with tight deadlines and limited resources
Prioritized tasks based on importance and urgency
Communicated effectively with team members to ensure alignment
Negotiated with stakeholders for additional resources or extended deadlines
Q85. Project explanation in detail
The project involves developing a new marketing strategy for a client in the technology industry.
Conduct market research to understand target audience and competitors
Develop a comprehensive marketing plan including digital and traditional channels
Implement and track the effectiveness of the marketing strategy
Regularly communicate with the client to provide updates and gather feedback
Q86. Any plan for further studies?
Yes, I plan to pursue a master's degree in Computer Science.
I want to deepen my knowledge in computer science
I am interested in exploring new technologies and advancements
I believe a master's degree will help me advance in my career
I am considering online programs to balance work and studies
Q87. Tensorflow cnn using tensorflow
TensorFlow CNN (Convolutional Neural Network) using TensorFlow for image classification tasks.
Build a CNN model using TensorFlow's high-level API, Keras.
Define the model architecture with convolutional layers, pooling layers, and fully connected layers.
Compile the model with appropriate loss function and optimizer.
Train the model on a dataset of images and evaluate its performance.
Use TensorFlow's tools for data preprocessing, model evaluation, and deployment.
Example: Buildin...read more
Q88. What is boosting
Boosting is a machine learning ensemble technique that combines multiple weak learners to create a strong learner.
Boosting iteratively improves the performance of a model by focusing on the mistakes made by previous models.
Popular boosting algorithms include AdaBoost, Gradient Boosting, and XGBoost.
Boosting is often used in classification and regression problems to improve accuracy and reduce bias.
Q89. Share 1 case study
Implemented a successful digital marketing campaign for a retail client
Identified target audience and created personalized content
Utilized social media platforms and email marketing to reach customers
Analyzed campaign performance and made adjustments for optimal results
Q90. Explain Loss function
Q91. 4 pillars of oops
Encapsulation, Inheritance, Polymorphism, Abstraction are the 4 pillars of OOPs
Encapsulation: Bundling data and methods that operate on the data into a single unit. Example: Class in Java
Inheritance: Ability of a class to inherit properties and behavior from another class. Example: Subclass extending a superclass
Polymorphism: Ability to present the same interface for different data types. Example: Method overloading in Java
Abstraction: Hiding the complex implementation detail...read more
Top HR Questions asked in DigiSME
Interview Process at DigiSME
Top Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month