Add office photos
Engaged Employer

R Systems International

3.3
based on 991 Reviews
Filter interviews by

80+ Gamaya Enterprises Interview Questions and Answers

Updated 11 Dec 2024
Popular Designations

Q1. PowerBuilder 1. How to build app in one click? 2. How to read data from web page? 3. Have you used any PDF tools 4. How to save data from datawindow to XML 5. How to read mail from Outlook 6. How you migrate to...

read more
Ans.

Answers to technical questions related to PowerBuilder and SQL

  • To build app in one click, use the Build menu and select the appropriate option

  • To read data from web page, use the Web DataWindow control

  • PDF tools like iTextSharp can be used to manipulate PDF files

  • To save data from datawindow to XML, use the SaveAsXML method

  • To read mail from Outlook, use the Outlook Object Model

  • To migrate to new version .NET, use the Migration Assistant tool

  • For performance tuning in store procedur...read more

Add your answer

Q2. In SQL, we have a table casting, which maps actor_id with movie_id. Find the pair of actors, who acted together for the most time. if you have multiple combos, you can return any of them.

Ans.

Find the pair of actors who acted together for the most time in a SQL table.

  • Join the casting table with itself on movie_id to get pairs of actors who acted together.

  • Calculate the total time they acted together by summing the durations of their movies.

  • Order the results by total time and return the pair with the highest duration.

Add your answer

Q3. 1. What is Ajax? 2. Write JS code to implement AJAX. 3. What is hoisting? 4. Questions regarding this keywords.

Ans.

Questions on Ajax, JS code for AJAX, hoisting, and related keywords for Senior Software Engineer role.

  • Ajax is a technique for creating fast and dynamic web pages without reloading the entire page.

  • JS code for AJAX involves creating an XMLHttpRequest object, defining a callback function, and sending a request to the server.

  • Hoisting is a JS mechanism where variables and function declarations are moved to the top of their scope.

  • Related keywords include let, const, var, function, ...read more

Add your answer

Q4. Dependency injection- what is it and any use case where to use?

Ans.

Dependency injection is a design pattern where components are provided with their dependencies rather than creating them internally.

  • Dependency injection helps in achieving loose coupling between components.

  • It makes components easier to test by allowing for easier mocking of dependencies.

  • Use cases include injecting database connections, logging services, and external API clients into components.

Add your answer
Discover Gamaya Enterprises interview dos and don'ts from real experiences

Q5. Data seeding in entity framework and how to map tables with entity?

Ans.

Data seeding in Entity Framework involves pre-populating database tables with initial data. Mapping tables with entities involves defining relationships between database tables and entity classes.

  • Data seeding in Entity Framework can be done using the 'Seed' method in the 'Configuration' class of the DbContext.

  • To map tables with entities, use data annotations or Fluent API to define relationships between entities and database tables.

  • For example, using data annotations like [Ta...read more

Add your answer

Q6. Implement a React JS program to change background colour of div if box input of both of the two input boxes is greater than 10.

Ans.

React program to change div background color if both input boxes > 10

  • Create a state for each input box

  • Add onChange event to each input box to update state

  • Use useEffect to check if both input values are greater than 10

  • If true, update state to change div background color

Add your answer
Are these interview questions helpful?

Q7. Why do we use SOLID principle, SRP and OCP violation?

Ans.

SOLID principles help in creating maintainable, scalable, and flexible software.

  • SOLID principles help in creating software that is easier to maintain and extend.

  • Single Responsibility Principle (SRP) ensures that a class has only one reason to change, leading to more modular and cohesive code.

  • Open/Closed Principle (OCP) states that a class should be open for extension but closed for modification, allowing for easy changes and additions without altering existing code.

  • Violating ...read more

Add your answer

Q8. What is singleton design pattern and how to implement it?

Ans.

Singleton design pattern ensures a class has only one instance and provides a global point of access to it.

  • Create a private static instance of the class within the class itself.

  • Provide a public static method to access the instance.

  • Ensure the constructor of the class is private to prevent instantiation from outside the class.

  • Example: Singleton pattern is commonly used in database connections to ensure only one connection is established.

Add your answer
Share interview questions and help millions of jobseekers 🌟

Q9. What is oAuth, what method did you use for Authentication/ Authorisation is your project?

Ans.

oAuth is an open standard for authorization. In my project, I used the oAuth 2.0 protocol for authentication and authorization.

  • oAuth is a protocol that allows users to grant limited access to their resources on one website to another website without sharing their credentials.

  • It provides a secure way for users to authenticate and authorize third-party applications to access their data.

  • oAuth 2.0 is the most widely used version of the protocol, which uses access tokens for authe...read more

Add your answer

Q10. If the data in a table is already normalized, what can we do to further optimize is?

Ans.

Further optimization of normalized data can be achieved through indexing, denormalization, and caching.

  • Create appropriate indexes on frequently queried columns to improve query performance.

  • Consider denormalizing the data by combining related tables to reduce the number of joins required.

  • Implement caching mechanisms to store frequently accessed data in memory for faster retrieval.

  • Use materialized views or summary tables to precompute and store aggregated data for complex queri...read more

Add your answer

Q11. How do you perform indexing in a database, which column you use for indexing?

Ans.

Indexing in a database improves query performance by creating a data structure that allows for faster data retrieval.

  • Indexing involves creating an index on one or more columns of a database table.

  • The column used for indexing should be chosen based on the frequency of data retrieval and the cardinality of the column.

  • Columns with high selectivity and frequent data retrieval are good candidates for indexing.

  • Examples of commonly indexed columns include primary keys, foreign keys,...read more

Add your answer

Q12. How can we debug the any published dll?

Ans.

Debugging a published dll involves using tools like Visual Studio debugger and logging mechanisms.

  • Use Visual Studio debugger to attach to the process using the published dll

  • Set breakpoints in the code to pause execution and inspect variables

  • Use logging mechanisms to track the flow of execution and identify issues

  • Check for any exceptions or errors thrown by the dll

Add your answer

Q13. Wat is Dependency Injection? Explain with an example.

Ans.

Dependency Injection is a design pattern used to remove hard-coded dependencies and make code more flexible.

  • It allows objects to be created with their dependencies rather than creating them inside the object.

  • It makes code more testable and maintainable.

  • Example: Instead of creating a database connection inside a class, pass it as a parameter during object creation.

Add your answer

Q14. Custom key for hashmap, should it be immutable?

Ans.

Yes, it should be immutable.

  • Immutable keys ensure that the hashcode of the key remains constant, which is important for efficient hashmap operations.

  • If a key is mutable, its hashcode can change during its lifetime, leading to unexpected behavior in the hashmap.

  • Examples of immutable keys include String, Integer, and other wrapper classes.

Add your answer

Q15. Difference between lambda and method reference.

Ans.

Lambda is an anonymous function while method reference refers to an existing method.

  • Lambda expressions are used to create anonymous functions that can be passed as arguments to methods or stored in variables.

  • Method references are used to refer to an existing method by name instead of defining a new lambda expression.

  • Lambda expressions are more flexible and can be used to create functions with any number of parameters, while method references can only refer to methods with mat...read more

Add your answer

Q16. How much experience do you have in SQL and Node JS.

Ans.

I have 5 years of experience in SQL and Node JS.

  • I have worked extensively with SQL databases, writing complex queries and optimizing performance.

  • I am proficient in using Node JS for server-side development, building RESTful APIs and handling database operations.

  • I have experience in integrating SQL databases with Node JS applications using libraries like Sequelize or Knex.

  • I have successfully delivered projects that involve data modeling, database design, and implementing busin...read more

Add your answer

Q17. What are design principles and design pattern

Ans.

Design principles are guidelines for designing software solutions, while design patterns are reusable solutions to common design problems.

  • Design principles are high-level guidelines that help in designing software solutions that are scalable, maintainable, and efficient.

  • Design patterns are reusable solutions to common design problems that have been proven to be effective in various scenarios.

  • Examples of design principles include SOLID principles, DRY (Don't Repeat Yourself), ...read more

Add your answer

Q18. What are the different types of Normalization in DBMS?

Ans.

Normalization is a process in DBMS that eliminates data redundancy and ensures data integrity.

  • Normalization is used to organize data in a database efficiently.

  • There are different normal forms, such as 1NF, 2NF, 3NF, BCNF, and 4NF.

  • Each normal form has specific rules and dependencies to achieve data normalization.

  • Normalization helps in reducing data duplication, improving data consistency, and simplifying database maintenance.

  • Example: 1NF ensures atomicity by eliminating repeat...read more

Add your answer

Q19. What is the difference between Webtokens and APIs?

Ans.

Webtokens and APIs are both used in web development, but they serve different purposes.

  • Webtokens are used for authentication and authorization, providing a secure way to transmit user information between client and server.

  • APIs (Application Programming Interfaces) are sets of rules and protocols that allow different software applications to communicate and interact with each other.

  • Webtokens are often used within APIs to authenticate and authorize requests.

  • Webtokens are typical...read more

Add your answer

Q20. Difference between static and volatile

Ans.

Static variables are shared among all instances of a class, while volatile variables are used for synchronization.

  • Static variables are declared with the 'static' keyword and retain their value across multiple function calls.

  • Volatile variables are used to indicate that a variable's value can be modified by multiple threads.

  • Static variables are stored in the data segment of memory, while volatile variables are stored in the stack or heap.

  • Static variables are initialized only on...read more

View 1 answer

Q21. What does JWT stand for? How do we use them?

Ans.

JWT stands for JSON Web Token. It is a compact, URL-safe means of representing claims between two parties.

  • JWT is used for authentication and authorization purposes in web applications.

  • It consists of three parts: header, payload, and signature.

  • The header contains the algorithm used to sign the token.

  • The payload contains the claims or information about the user.

  • The signature is used to verify the integrity of the token.

  • JWTs are typically sent in the Authorization header of HTTP...read more

Add your answer

Q22. Tell me something about Internet of Things.

Ans.

Internet of Things (IoT) refers to the network of physical devices, vehicles, appliances, and other objects embedded with sensors, software, and connectivity.

  • IoT enables devices to collect and exchange data over the internet.

  • It allows for remote monitoring and control of devices and systems.

  • IoT has applications in various industries such as healthcare, transportation, agriculture, and smart homes.

  • Examples of IoT devices include smart thermostats, wearable fitness trackers, an...read more

Add your answer

Q23. How in recent times technology is changing the life

Ans.

Technology is rapidly changing our lives by improving communication, efficiency, and convenience.

  • Communication has been revolutionized with the rise of smartphones and social media platforms.

  • Automation and artificial intelligence are increasing efficiency in various industries.

  • Convenience is enhanced through services like online shopping, streaming platforms, and smart home devices.

Add your answer

Q24. Oops concepts in real life.

Ans.

Oops concepts in real life refer to the principles of object-oriented programming applied to everyday scenarios.

  • Encapsulation: Keeping related data and methods together to protect them from outside interference. Example: A car's engine is encapsulated within the car's body.

  • Inheritance: Allowing a new class to inherit properties and behaviors from an existing class. Example: A child inheriting traits from their parents.

  • Polymorphism: Objects of different classes can be treated ...read more

Add your answer

Q25. What do you know about Views in mySQL?

Ans.

Views in mySQL are virtual tables that are based on the result of a query. They can be used to simplify complex queries and provide a layer of abstraction.

  • Views are created using the CREATE VIEW statement.

  • They are stored in the database and can be accessed like regular tables.

  • Views can be used to hide complexity by encapsulating complex queries into a single view.

  • They can also be used to restrict access to certain columns or rows of a table.

  • Views are updated automatically whe...read more

Add your answer

Q26. What Response. Write () do in respect to a web page?

Ans.

Response.Write() is a method in ASP.NET that writes output to a web page.

  • It can be used to display dynamic content on a web page.

  • It can also be used to write HTML or JavaScript code to a web page.

  • Example: Response.Write("Hello World!");

Add your answer

Q27. Difference between MVC and WebAPI?

Ans.

MVC is a design pattern for organizing code in a web application, while WebAPI is a framework for building HTTP services.

  • MVC stands for Model-View-Controller and is used for structuring code in a web application

  • WebAPI is a framework for building HTTP services that can be accessed by various clients

  • MVC is typically used for creating web applications with user interfaces, while WebAPI is used for creating APIs that can be consumed by different clients

  • MVC is more focused on the ...read more

Add your answer

Q28. What is factory pattern

Ans.

Factory pattern is a creational design pattern that provides an interface for creating objects in a superclass, but allows subclasses to alter the type of objects that will be created.

  • Factory pattern is used to create objects without specifying the exact class of object that will be created.

  • It provides a way to delegate the instantiation logic to child classes.

  • Commonly used in situations where a class can't anticipate the class of objects it must create.

  • Examples include GUI f...read more

Add your answer

Q29. What is dependency injection

Ans.

Dependency injection is a design pattern where components are given their dependencies rather than creating them internally.

  • Allows for better code reusability and testability

  • Reduces coupling between components

  • Promotes separation of concerns

  • Examples: Constructor injection, Setter injection, Interface injection

Add your answer

Q30. Explain about the known which is used in anesthesia coding

Ans.

Known anesthesia codes are used to bill for anesthesia services provided during a medical procedure.

  • Anesthesia codes are based on the type of procedure, the patient's health status, and the time spent providing anesthesia.

  • Codes are categorized by anesthesia type (general, regional, local) and by the complexity of the procedure.

  • Examples of anesthesia codes include 00100 for anesthesia for procedures on the eye and 00300 for anesthesia for procedures on the upper abdomen.

Add your answer

Q31. How is product management different from project management?

Ans.

Product management focuses on the development and marketing of a specific product, while project management involves overseeing a specific project from start to finish.

  • Product management is focused on the entire lifecycle of a product, from ideation to launch and beyond.

  • Project management is focused on the successful completion of a specific project within a set timeframe and budget.

  • Product managers work closely with cross-functional teams to define product requirements and p...read more

Add your answer

Q32. Use of serialversionuid

Ans.

serialversionuid is a unique identifier used for serialization and deserialization of Java objects.

  • serialversionuid is a static field in a class that implements Serializable interface

  • It is used to ensure that the same class is used for deserialization as was used for serialization

  • If serialversionuid is not specified, JVM generates it based on class structure which can cause issues if class structure changes

  • It is recommended to specify serialversionuid for all Serializable cla...read more

Add your answer

Q33. Cyclic dependency in spring

Ans.

Cyclic dependency in Spring

  • Cyclic dependency occurs when two or more beans depend on each other directly or indirectly

  • It can cause runtime errors like StackOverflowError or BeanCurrentlyInCreationException

  • To resolve, use setter injection or constructor injection instead of field injection

  • Use @Lazy annotation to delay bean initialization

  • Use @Autowired(required = false) to break the cycle

Add your answer

Q34. What are the loops in power shell

Ans.

PowerShell has four types of loops: For, ForEach, While, and Do-While.

  • For loop is used to iterate a specific number of times.

  • ForEach loop is used to iterate through each element in a collection.

  • While loop is used to execute a block of code repeatedly as long as the condition is true.

  • Do-While loop is similar to While loop, but it executes the block of code at least once before checking the condition.

Add your answer

Q35. What are profiles and permission set in salesforce?

Ans.

Profiles and permission sets are used to control access to data and functionality in Salesforce.

  • Profiles are a collection of settings and permissions that determine what a user can see and do in Salesforce.

  • Permission sets are used to grant additional permissions to users who need access to specific functionality.

  • Profiles and permission sets can be assigned to individual users or groups of users.

  • Profiles and permission sets can be customized to meet the specific needs of an or...read more

Add your answer

Q36. What is Index in SQL?

Ans.

Indexes in SQL are data structures that improve the speed of data retrieval operations on database tables.

  • Indexes are created on one or more columns of a table to allow faster searching and sorting of data.

  • They work similar to the index of a book, allowing the database engine to quickly locate the data.

  • Indexes can be created on primary keys, foreign keys, or any other frequently searched columns.

  • They reduce the amount of data that needs to be scanned, improving query performa...read more

Add your answer

Q37. What are Stored Procedures?

Ans.

Stored Procedures are precompiled database objects that contain a set of SQL statements and can be executed with a single call.

  • Stored Procedures are used to encapsulate and execute frequently used SQL statements.

  • They improve performance by reducing network traffic and optimizing query execution.

  • They can accept input parameters and return output values.

  • Stored Procedures can be used for data manipulation, data retrieval, and other database operations.

  • Examples include procedures...read more

Add your answer

Q38. What is singleton design pattern , write code for it.

Ans.

Singleton design pattern ensures that a class has only one instance and provides a global point of access to it.

  • Singleton pattern restricts the instantiation of a class to a single object.

  • It is useful when only one instance of a class is needed to control actions throughout the system.

  • The singleton class provides a way to access its unique instance globally.

  • The instance is created only if it doesn't exist, otherwise, it returns the existing instance.

  • The singleton class should...read more

View 1 answer

Q39. What is agile methodologies

Ans.

Agile methodologies are iterative and incremental approaches to software development that prioritize flexibility and customer satisfaction.

  • Agile methodologies prioritize individuals and interactions over processes and tools

  • They emphasize working software over comprehensive documentation

  • They value customer collaboration and respond to change over following a plan

  • Examples of agile methodologies include Scrum, Kanban, and Extreme Programming (XP)

Add your answer

Q40. What you know about the US healthcare process

Ans.

The US healthcare process is complex and involves multiple stakeholders including patients, healthcare providers, insurance companies, and government agencies.

  • The US healthcare system is primarily based on private insurance, with some government-funded programs like Medicare and Medicaid

  • Patients have the freedom to choose their healthcare providers and treatments, but costs can be high without insurance

  • Insurance companies negotiate rates with healthcare providers and may deny...read more

Add your answer

Q41. SOLID designed Principle

Ans.

SOLID is a set of design principles to make software more maintainable, scalable, and flexible.

  • S - Single Responsibility Principle: A class should have only one reason to change.

  • O - Open/Closed Principle: Software entities should be open for extension but closed for modification.

  • L - Liskov Substitution Principle: Subtypes should be substitutable for their base types.

  • I - Interface Segregation Principle: Clients should not be forced to depend on interfaces they do not use.

  • D - D...read more

Add your answer

Q42. Wat is Dependency Injection

Ans.

Dependency Injection is a design pattern that allows objects to receive dependencies from an external source rather than creating them themselves.

  • It separates the creation of objects from the objects that use them

  • It makes code more modular and easier to test

  • It can be implemented using constructor injection, setter injection, or interface injection

  • Example: Instead of creating a database connection object inside a class, the object is passed in as a parameter from outside the c...read more

Add your answer

Q43. 3.what are issues faced and how to solve.

Ans.

Issues faced in software testing and their solutions

  • Issues with test environment setup - ensure proper configuration and compatibility

  • Issues with test data - ensure relevant and accurate data is used

  • Issues with test case design - ensure comprehensive and effective test cases

  • Issues with communication - ensure clear communication with team members and stakeholders

  • Issues with automation - ensure proper selection and implementation of automation tools

  • Issues with regression testin...read more

Add your answer

Q44. Tell me how will code CABG procedure

Ans.

CABG procedure involves creating new routes for blood flow to the heart muscle by bypassing blocked arteries.

  • Identify the blocked arteries in the heart

  • Harvest healthy blood vessels from another part of the body

  • Create new routes for blood flow by attaching the harvested vessels to the heart

  • Ensure proper blood flow and function post-procedure

Add your answer

Q45. Lazy vs eager loading?

Ans.

Lazy loading defers loading of non-critical resources until needed, while eager loading loads all resources upfront.

  • Lazy loading improves page load time and reduces server load.

  • Eager loading is useful for small datasets or when all data is needed upfront.

  • Lazy loading is commonly used for images, videos, and other large files.

  • Eager loading is commonly used for small datasets like dropdown menus or navigation bars.

Add your answer

Q46. How you define the sales process in salesforce?

Ans.

Sales process in Salesforce is a systematic approach to selling that involves a series of steps to move a prospect from lead to customer.

  • The sales process in Salesforce typically includes stages such as lead generation, qualification, needs analysis, proposal, negotiation, and closing.

  • Each stage of the sales process is tracked in Salesforce using various tools such as lead and opportunity management, forecasting, and reporting.

  • Salesforce also allows for customization of the s...read more

Add your answer

Q47. 1.Difference in fill() and type() 2.What is config file in playwright 3.What is playwright 4.Program to remove special characters from email. 5.Locators in playwright 6.Selectors in playwright

Add your answer

Q48. template vs directives?

Ans.

Templates are pre-designed formats while directives are instructions for specific actions.

  • Templates are used for consistency and efficiency in design and formatting.

  • Directives provide specific instructions for actions to be taken.

  • Templates are often used in graphic design and web development.

  • Directives are commonly used in programming languages like AngularJS.

  • Templates can be modified to fit specific needs while directives are more rigid in their implementation.

Add your answer

Q49. What is Internet Information Services ?

Ans.

Internet Information Services (IIS) is a web server software created by Microsoft for Windows servers.

  • IIS is used to host and manage websites, web applications, and services on Windows servers.

  • It supports various protocols such as HTTP, HTTPS, FTP, SMTP, and NNTP.

  • IIS provides features like authentication, authorization, caching, and logging.

  • It can be managed through a graphical user interface (GUI) or command-line tools.

  • Examples of websites hosted on IIS include Microsoft.com...read more

Add your answer

Q50. What is storage specifier in c?

Ans.

Storage specifiers in C are keywords that define the scope and lifetime of variables.

  • There are three storage specifiers in C: auto, static, and extern.

  • Auto variables are local to a block and have automatic storage duration.

  • Static variables have a lifetime that extends throughout the program and can be local or global.

  • Extern variables are declared outside of any function and can be accessed by any function in the program.

  • Example: int x; //declares a global variable with static...read more

Add your answer

Q51. Promise vs Observables?

Ans.

Promises and Observables are both used for handling asynchronous operations in JavaScript.

  • Promises are used for handling a single asynchronous operation and can have only one eventual value.

  • Observables are used for handling multiple asynchronous operations and can have multiple values over time.

  • Promises are eager and start executing as soon as they are created, while Observables are lazy and only start executing when subscribed to.

  • Promises can be converted to Observables usin...read more

Add your answer

Q52. What kind of testing you have performed?

Ans.

I have performed various types of testing including functional, regression, performance, and user acceptance testing.

  • Conducted functional testing to ensure the software meets the requirements

  • Performed regression testing to ensure new features do not break existing functionality

  • Conducted performance testing to ensure the software can handle expected user load

  • Performed user acceptance testing to ensure the software meets user expectations

  • Used automated testing tools such as Sel...read more

Add your answer

Q53. 4. What are the samplers you have used

Ans.

I have used various samplers including JMeter, LoadRunner, and Gatling.

  • JMeter for load testing web applications

  • LoadRunner for performance testing client-server applications

  • Gatling for stress testing REST APIs

Add your answer

Q54. How do you make story points?

Ans.

Story points are estimates used in Agile methodology to measure the complexity and effort required for a task.

  • Story points are typically assigned based on the perceived complexity, risk, and effort involved in a user story or task.

  • They are not based on time, but rather on relative sizing compared to other tasks.

  • Common scales for story points include Fibonacci sequence (1, 2, 3, 5, 8, 13, etc.) or t-shirt sizes (XS, S, M, L, XL).

  • Team members collaborate to discuss and assign s...read more

Add your answer

Q55. Create low-level design for company employee management.

Ans.

Design a system for managing company employees.

  • Identify the required employee information to be stored, such as name, contact details, job title, department, etc.

  • Create a database schema to store employee data, including tables for employees, departments, job titles, etc.

  • Implement user authentication and authorization to ensure secure access to employee information.

  • Develop a user-friendly interface for adding, editing, and deleting employee records.

  • Include features for search...read more

Add your answer

Q56. Past experience and introduce me the rsystem environment

Ans.

I have 5 years of experience in billing and have worked in the rsystem environment.

  • I have experience in handling billing processes for various clients

  • I am familiar with the rsystem environment and its tools

  • I have worked with teams to ensure timely and accurate billing

  • I have experience in resolving billing discrepancies and issues

  • I have knowledge of billing regulations and compliance standards

Add your answer

Q57. What are scrum ceremonies?

Ans.

Scrum ceremonies are regular meetings held in Agile project management to facilitate communication and collaboration among team members.

  • Sprint Planning: Setting goals and planning tasks for the upcoming sprint.

  • Daily Stand-up: Short daily meetings to discuss progress, roadblocks, and plans for the day.

  • Sprint Review: Demo of completed work to stakeholders for feedback.

  • Sprint Retrospective: Reflection on what went well, what could be improved, and action items for the next sprin...read more

Add your answer

Q58. How do you define sprint?

Ans.

A sprint is a time-boxed period during which a specific amount of work must be completed.

  • Sprints are typically 2-4 weeks long in Agile methodology

  • At the beginning of a sprint, the team plans the work to be done and commits to completing it by the end of the sprint

  • Sprints end with a review and retrospective to discuss what went well and what could be improved for the next sprint

Add your answer

Q59. rank where 2 people have same marks

Ans.

Ranking where 2 people have the same marks in a dataset.

  • Identify the individuals with the same marks.

  • Assign them the same rank.

  • Adjust the subsequent ranks accordingly.

Add your answer

Q60. 2.difference between findelement and findelements

Ans.

findelement returns the first matching element while findelements returns a list of all matching elements.

  • findelement is used to find the first matching element on a web page

  • findelements is used to find all matching elements on a web page

  • findelement throws NoSuchElementException if no matching element is found

  • findelements returns an empty list if no matching element is found

Add your answer

Q61. How to handle memory leakage

Ans.

Best practices for handling memory leaks in iOS development

  • Use Instruments to identify memory leaks

  • Avoid strong reference cycles with weak or unowned references

  • Use autorelease pools for temporary objects

  • Implement proper memory management with ARC (Automatic Reference Counting)

Add your answer

Q62. What is data structure?

Ans.

Data structure is a way of organizing and storing data in a computer so that it can be accessed and used efficiently.

  • Data structures are used to manage large amounts of data efficiently.

  • They provide a way to organize data so that it can be easily searched, sorted, and manipulated.

  • Examples of data structures include arrays, linked lists, stacks, queues, trees, and graphs.

Add your answer

Q63. Tool used for automating test cases

Add your answer

Q64. Left join vs inner join on a given dataset

Ans.

Left join includes all records from the left table and matching records from the right table, while inner join only includes matching records from both tables.

  • Left join retains all records from the left table, even if there are no matches in the right table.

  • Inner join only includes records that have matching values in both tables.

  • Left join is useful for including all data from one table, while inner join is used to only include matching data from both tables.

Add your answer

Q65. Array list of javascript

Ans.

Array list in JavaScript is a dynamic data structure that can store multiple strings.

  • Use square brackets [] to define an array list.

  • Access elements in the array using index starting from 0.

  • Add elements to the array using push() method.

  • Remove elements from the array using splice() method.

Add your answer

Q66. Approach followed for testing activities

Add your answer

Q67. Python Interpreter vs Java Interpreter?

Ans.

Python interpreter is more flexible and easier to learn, while Java interpreter is faster and more secure.

  • Python interpreter is dynamically typed, while Java interpreter is statically typed.

  • Python interpreter is more suitable for scripting and rapid prototyping, while Java interpreter is better for large-scale enterprise applications.

  • Python interpreter has a simpler syntax and is easier to learn, while Java interpreter has a more complex syntax and requires more experience.

  • Ja...read more

Add your answer
Asked in
SSE Interview

Q68. How good are you in coding

Ans.

I am proficient in coding with experience in various programming languages and projects.

  • Proficient in multiple programming languages such as Java, Python, and C++

  • Experience in developing web applications using HTML, CSS, and JavaScript

  • Completed coding projects involving data structures and algorithms

  • Participated in coding competitions and hackathons

Add your answer

Q69. what is ddl?

Ans.

DDL stands for Data Definition Language. It is a set of SQL commands used to define and manage the structure of a database.

  • DDL is used to create, modify, and delete database objects such as tables, indexes, and views.

  • Examples of DDL commands include CREATE, ALTER, and DROP.

  • DDL statements are not used to manipulate or retrieve data, but rather to define the structure and organization of the data.

  • DDL is an important component of database management systems.

  • DDL is different from...read more

Add your answer

Q70. What is design pattern

Ans.

Design pattern is a reusable solution to a commonly occurring problem in software design.

  • Design patterns help in creating efficient, scalable, and maintainable software.

  • They provide a common language for developers to communicate and understand each other's code.

  • Examples of design patterns include Singleton, Factory, Observer, and Strategy patterns.

Add your answer

Q71. HTTP error code : 203 ?

Ans.

HTTP error code 203 indicates that the server successfully processed the request, but is returning information that may be from another source.

  • HTTP 203 is a non-standard error code that is not defined in the HTTP/1.1 standard.

  • It is typically used to indicate that the server successfully processed the request, but is returning information from a different source.

  • This status code is not commonly used and may not be supported by all servers or clients.

Add your answer

Q72. what is dml?

Add your answer

Q73. what is middleware

Ans.

Middleware is software that acts as a bridge between different applications or components, facilitating communication and data exchange.

  • Middleware enables interoperability between software systems

  • It provides a layer of abstraction, allowing components to communicate without knowing the details of each other

  • Examples of middleware include message queues, web servers, and API gateways

View 1 answer

Q74. Codes of Medical Billing

Ans.

Medical billing codes are used to identify medical procedures and services for billing purposes.

  • Medical billing codes are standardized codes used to identify medical procedures and services for billing purposes.

  • These codes are used by healthcare providers to submit claims to insurance companies and government programs such as Medicare and Medicaid.

  • The most commonly used medical billing code set is the Current Procedural Terminology (CPT) code set, which is maintained by the A...read more

Add your answer

Q75. 1.whàt is regular expression

Ans.

Regular expression is a sequence of characters that define a search pattern.

  • Used for pattern matching and text processing

  • Can be used in programming languages, text editors, and command-line interpreters

  • Examples: /hello/ matches 'hello' in a string, /[0-9]+/ matches one or more digits

Add your answer

Q76. Difference between MVP and mvvm

Ans.

MVP focuses on separating concerns by having a presenter handle logic, while MVVM uses data binding to connect view and view model.

  • MVP stands for Model-View-Presenter, where the presenter handles logic and updates the view. MVVM stands for Model-View-ViewModel, where data binding connects the view and view model.

  • In MVP, the view has a reference to the presenter, while in MVVM, the view model does not have a reference to the view.

  • MVVM allows for easier testing as the view mode...read more

Add your answer

Q77. code for prime number

Ans.

Code to check if a number is prime or not

  • Create a function that takes a number as input

  • Check if the number is less than 2, return false

  • Iterate from 2 to the square root of the number and check for divisibility

  • If the number is divisible by any number other than 1 and itself, return false

  • Otherwise, return true

Add your answer

Q78. SIP Call flow with headers

Ans.

SIP call flow involves signaling and media exchange between SIP devices with headers containing important information.

  • SIP INVITE message is sent to initiate a call

  • SIP 1xx responses indicate call progress

  • SIP 2xx response confirms call establishment

  • SIP ACK message acknowledges call setup

  • SIP BYE message terminates the call

Add your answer

Q79. arraylist vs linklist

Ans.

ArrayList is a resizable array implementation, LinkedList is a doubly linked list implementation.

  • ArrayList is faster for accessing elements by index, LinkedList is faster for adding/removing elements in the middle.

  • ArrayList uses less memory as it only stores elements, LinkedList uses more memory as it stores elements and pointers.

  • ArrayList is better for random access, LinkedList is better for sequential access.

  • Example: ArrayList arrList = new ArrayList<>(); LinkedList linkLis...read more

Add your answer

Q80. Last CTC (In hand)

Ans.

My last CTC was $80,000 per annum.

  • My last CTC was $80,000 per annum

  • CTC stands for Cost to Company

  • It includes salary, bonuses, benefits, and any other perks

Add your answer

Q81. What is abstraction

Add your answer

Q82. Python code with funticion

Ans.

Python code with function

  • Define a function using 'def' keyword

  • Include parameters inside parentheses

  • Use 'return' statement to return a value from the function

Add your answer

Q83. K8's Deployment

Ans.

K8's Deployment refers to the deployment of applications on Kubernetes clusters.

  • Kubernetes (K8s) is an open-source container orchestration platform used for automating deployment, scaling, and management of containerized applications.

  • K8s Deployment involves defining the desired state of the application, creating deployment configurations, and managing the deployment process.

  • Deployment resources in K8s include Pods, ReplicaSets, Deployments, and Services.

  • K8s Deployment allows ...read more

Add your answer

Q84. diff var let const

Ans.

diff var let const

  • var is function-scoped, let and const are block-scoped

  • var can be redeclared and reassigned, let can be reassigned but not redeclared, const cannot be reassigned or redeclared

  • const must be initialized during declaration, let and var can be declared without initialization

Add your answer
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos

Interview Process at Gamaya Enterprises

based on 91 interviews
Interview experience
3.8
Good
View more
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Interview Questions from Similar Companies

3.7
 • 2.8k Interview Questions
4.0
 • 616 Interview Questions
3.9
 • 530 Interview Questions
4.0
 • 400 Interview Questions
4.4
 • 247 Interview Questions
3.9
 • 138 Interview Questions
View all
Top R Systems International Interview Questions And Answers
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
70 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter