R Systems International
40+ Birla Century Interview Questions and Answers
Q1. In SQL, we have a table casting, which maps actor_id with movie_id. Find the pair of actors, who acted together for the most time. if you have multiple combos, you can return any of them.
Find the pair of actors who acted together for the most time in a SQL table.
Join the casting table with itself on movie_id to get pairs of actors who acted together.
Calculate the total time they acted together by summing the durations of their movies.
Order the results by total time and return the pair with the highest duration.
Q2. 1. What is Ajax? 2. Write JS code to implement AJAX. 3. What is hoisting? 4. Questions regarding this keywords.
Questions on Ajax, JS code for AJAX, hoisting, and related keywords for Senior Software Engineer role.
Ajax is a technique for creating fast and dynamic web pages without reloading the entire page.
JS code for AJAX involves creating an XMLHttpRequest object, defining a callback function, and sending a request to the server.
Hoisting is a JS mechanism where variables and function declarations are moved to the top of their scope.
Related keywords include let, const, var, function, ...read more
Q3. PowerBuilder 1. How to build app in one click? 2. How to read data from web page? 3. Have you used any PDF tools 4. How to save data from datawindow to XML 5. How to read mail from Outlook 6. How you migrate to...
read moreAnswers to technical questions related to PowerBuilder and SQL
To build app in one click, use the Build menu and select the appropriate option
To read data from web page, use the Web DataWindow control
PDF tools like iTextSharp can be used to manipulate PDF files
To save data from datawindow to XML, use the SaveAsXML method
To read mail from Outlook, use the Outlook Object Model
To migrate to new version .NET, use the Migration Assistant tool
For performance tuning in store procedur...read more
Q4. Implement a React JS program to change background colour of div if box input of both of the two input boxes is greater than 10.
React program to change div background color if both input boxes > 10
Create a state for each input box
Add onChange event to each input box to update state
Use useEffect to check if both input values are greater than 10
If true, update state to change div background color
Q5. Custom key for hashmap, should it be immutable?
Yes, it should be immutable.
Immutable keys ensure that the hashcode of the key remains constant, which is important for efficient hashmap operations.
If a key is mutable, its hashcode can change during its lifetime, leading to unexpected behavior in the hashmap.
Examples of immutable keys include String, Integer, and other wrapper classes.
Q6. Difference between lambda and method reference.
Lambda is an anonymous function while method reference refers to an existing method.
Lambda expressions are used to create anonymous functions that can be passed as arguments to methods or stored in variables.
Method references are used to refer to an existing method by name instead of defining a new lambda expression.
Lambda expressions are more flexible and can be used to create functions with any number of parameters, while method references can only refer to methods with mat...read more
Q7. Difference between static and volatile
Static variables are shared among all instances of a class, while volatile variables are used for synchronization.
Static variables are declared with the 'static' keyword and retain their value across multiple function calls.
Volatile variables are used to indicate that a variable's value can be modified by multiple threads.
Static variables are stored in the data segment of memory, while volatile variables are stored in the stack or heap.
Static variables are initialized only on...read more
Q8. What is oAuth, what method did you use for Authentication/ Authorisation is your project?
oAuth is an open standard for authorization. In my project, I used the oAuth 2.0 protocol for authentication and authorization.
oAuth is a protocol that allows users to grant limited access to their resources on one website to another website without sharing their credentials.
It provides a secure way for users to authenticate and authorize third-party applications to access their data.
oAuth 2.0 is the most widely used version of the protocol, which uses access tokens for authe...read more
Q9. If the data in a table is already normalized, what can we do to further optimize is?
Further optimization of normalized data can be achieved through indexing, denormalization, and caching.
Create appropriate indexes on frequently queried columns to improve query performance.
Consider denormalizing the data by combining related tables to reduce the number of joins required.
Implement caching mechanisms to store frequently accessed data in memory for faster retrieval.
Use materialized views or summary tables to precompute and store aggregated data for complex queri...read more
Q10. How do you perform indexing in a database, which column you use for indexing?
Indexing in a database improves query performance by creating a data structure that allows for faster data retrieval.
Indexing involves creating an index on one or more columns of a database table.
The column used for indexing should be chosen based on the frequency of data retrieval and the cardinality of the column.
Columns with high selectivity and frequent data retrieval are good candidates for indexing.
Examples of commonly indexed columns include primary keys, foreign keys,...read more
Q11. Use of serialversionuid
serialversionuid is a unique identifier used for serialization and deserialization of Java objects.
serialversionuid is a static field in a class that implements Serializable interface
It is used to ensure that the same class is used for deserialization as was used for serialization
If serialversionuid is not specified, JVM generates it based on class structure which can cause issues if class structure changes
It is recommended to specify serialversionuid for all Serializable cla...read more
Q12. Cyclic dependency in spring
Cyclic dependency in Spring
Cyclic dependency occurs when two or more beans depend on each other directly or indirectly
It can cause runtime errors like StackOverflowError or BeanCurrentlyInCreationException
To resolve, use setter injection or constructor injection instead of field injection
Use @Lazy annotation to delay bean initialization
Use @Autowired(required = false) to break the cycle
Q13. How much experience do you have in SQL and Node JS.
I have 5 years of experience in SQL and Node JS.
I have worked extensively with SQL databases, writing complex queries and optimizing performance.
I am proficient in using Node JS for server-side development, building RESTful APIs and handling database operations.
I have experience in integrating SQL databases with Node JS applications using libraries like Sequelize or Knex.
I have successfully delivered projects that involve data modeling, database design, and implementing busin...read more
Q14. What are the different types of Normalization in DBMS?
Normalization is a process in DBMS that eliminates data redundancy and ensures data integrity.
Normalization is used to organize data in a database efficiently.
There are different normal forms, such as 1NF, 2NF, 3NF, BCNF, and 4NF.
Each normal form has specific rules and dependencies to achieve data normalization.
Normalization helps in reducing data duplication, improving data consistency, and simplifying database maintenance.
Example: 1NF ensures atomicity by eliminating repeat...read more
Q15. What is the difference between Webtokens and APIs?
Webtokens and APIs are both used in web development, but they serve different purposes.
Webtokens are used for authentication and authorization, providing a secure way to transmit user information between client and server.
APIs (Application Programming Interfaces) are sets of rules and protocols that allow different software applications to communicate and interact with each other.
Webtokens are often used within APIs to authenticate and authorize requests.
Webtokens are typical...read more
Q16. SOLID designed Principle
SOLID is a set of design principles to make software more maintainable, scalable, and flexible.
S - Single Responsibility Principle: A class should have only one reason to change.
O - Open/Closed Principle: Software entities should be open for extension but closed for modification.
L - Liskov Substitution Principle: Subtypes should be substitutable for their base types.
I - Interface Segregation Principle: Clients should not be forced to depend on interfaces they do not use.
D - D...read more
Q17. What does JWT stand for? How do we use them?
JWT stands for JSON Web Token. It is a compact, URL-safe means of representing claims between two parties.
JWT is used for authentication and authorization purposes in web applications.
It consists of three parts: header, payload, and signature.
The header contains the algorithm used to sign the token.
The payload contains the claims or information about the user.
The signature is used to verify the integrity of the token.
JWTs are typically sent in the Authorization header of HTTP...read more
Q18. Tell me something about Internet of Things.
Internet of Things (IoT) refers to the network of physical devices, vehicles, appliances, and other objects embedded with sensors, software, and connectivity.
IoT enables devices to collect and exchange data over the internet.
It allows for remote monitoring and control of devices and systems.
IoT has applications in various industries such as healthcare, transportation, agriculture, and smart homes.
Examples of IoT devices include smart thermostats, wearable fitness trackers, an...read more
Q19. How in recent times technology is changing the life
Technology is rapidly changing our lives by improving communication, efficiency, and convenience.
Communication has been revolutionized with the rise of smartphones and social media platforms.
Automation and artificial intelligence are increasing efficiency in various industries.
Convenience is enhanced through services like online shopping, streaming platforms, and smart home devices.
Q20. What do you know about Views in mySQL?
Views in mySQL are virtual tables that are based on the result of a query. They can be used to simplify complex queries and provide a layer of abstraction.
Views are created using the CREATE VIEW statement.
They are stored in the database and can be accessed like regular tables.
Views can be used to hide complexity by encapsulating complex queries into a single view.
They can also be used to restrict access to certain columns or rows of a table.
Views are updated automatically whe...read more
Q21. What is Index in SQL?
Indexes in SQL are data structures that improve the speed of data retrieval operations on database tables.
Indexes are created on one or more columns of a table to allow faster searching and sorting of data.
They work similar to the index of a book, allowing the database engine to quickly locate the data.
Indexes can be created on primary keys, foreign keys, or any other frequently searched columns.
They reduce the amount of data that needs to be scanned, improving query performa...read more
Q22. What are Stored Procedures?
Stored Procedures are precompiled database objects that contain a set of SQL statements and can be executed with a single call.
Stored Procedures are used to encapsulate and execute frequently used SQL statements.
They improve performance by reducing network traffic and optimizing query execution.
They can accept input parameters and return output values.
Stored Procedures can be used for data manipulation, data retrieval, and other database operations.
Examples include procedures...read more
Q23. Lazy vs eager loading?
Lazy loading defers loading of non-critical resources until needed, while eager loading loads all resources upfront.
Lazy loading improves page load time and reduces server load.
Eager loading is useful for small datasets or when all data is needed upfront.
Lazy loading is commonly used for images, videos, and other large files.
Eager loading is commonly used for small datasets like dropdown menus or navigation bars.
Q24. template vs directives?
Templates are pre-designed formats while directives are instructions for specific actions.
Templates are used for consistency and efficiency in design and formatting.
Directives provide specific instructions for actions to be taken.
Templates are often used in graphic design and web development.
Directives are commonly used in programming languages like AngularJS.
Templates can be modified to fit specific needs while directives are more rigid in their implementation.
Q25. Promise vs Observables?
Promises and Observables are both used for handling asynchronous operations in JavaScript.
Promises are used for handling a single asynchronous operation and can have only one eventual value.
Observables are used for handling multiple asynchronous operations and can have multiple values over time.
Promises are eager and start executing as soon as they are created, while Observables are lazy and only start executing when subscribed to.
Promises can be converted to Observables usin...read more
Q26. What are profiles and permission set in salesforce?
Profiles and permission sets are used to control access to data and functionality in Salesforce.
Profiles are a collection of settings and permissions that determine what a user can see and do in Salesforce.
Permission sets are used to grant additional permissions to users who need access to specific functionality.
Profiles and permission sets can be assigned to individual users or groups of users.
Profiles and permission sets can be customized to meet the specific needs of an or...read more
Q27. What is singleton design pattern , write code for it.
Singleton design pattern ensures that a class has only one instance and provides a global point of access to it.
Singleton pattern restricts the instantiation of a class to a single object.
It is useful when only one instance of a class is needed to control actions throughout the system.
The singleton class provides a way to access its unique instance globally.
The instance is created only if it doesn't exist, otherwise, it returns the existing instance.
The singleton class should...read more
Q28. Array list of javascript
Array list in JavaScript is a dynamic data structure that can store multiple strings.
Use square brackets [] to define an array list.
Access elements in the array using index starting from 0.
Add elements to the array using push() method.
Remove elements from the array using splice() method.
Q29. 3.what are issues faced and how to solve.
Issues faced in software testing and their solutions
Issues with test environment setup - ensure proper configuration and compatibility
Issues with test data - ensure relevant and accurate data is used
Issues with test case design - ensure comprehensive and effective test cases
Issues with communication - ensure clear communication with team members and stakeholders
Issues with automation - ensure proper selection and implementation of automation tools
Issues with regression testin...read more
Q30. How you define the sales process in salesforce?
Sales process in Salesforce is a systematic approach to selling that involves a series of steps to move a prospect from lead to customer.
The sales process in Salesforce typically includes stages such as lead generation, qualification, needs analysis, proposal, negotiation, and closing.
Each stage of the sales process is tracked in Salesforce using various tools such as lead and opportunity management, forecasting, and reporting.
Salesforce also allows for customization of the s...read more
Q31. What kind of testing you have performed?
I have performed various types of testing including functional, regression, performance, and user acceptance testing.
Conducted functional testing to ensure the software meets the requirements
Performed regression testing to ensure new features do not break existing functionality
Conducted performance testing to ensure the software can handle expected user load
Performed user acceptance testing to ensure the software meets user expectations
Used automated testing tools such as Sel...read more
Q32. 4. What are the samplers you have used
I have used various samplers including JMeter, LoadRunner, and Gatling.
JMeter for load testing web applications
LoadRunner for performance testing client-server applications
Gatling for stress testing REST APIs
Q33. 2.difference between findelement and findelements
findelement returns the first matching element while findelements returns a list of all matching elements.
findelement is used to find the first matching element on a web page
findelements is used to find all matching elements on a web page
findelement throws NoSuchElementException if no matching element is found
findelements returns an empty list if no matching element is found
Q34. Create low-level design for company employee management.
Design a system for managing company employees.
Identify the required employee information to be stored, such as name, contact details, job title, department, etc.
Create a database schema to store employee data, including tables for employees, departments, job titles, etc.
Implement user authentication and authorization to ensure secure access to employee information.
Develop a user-friendly interface for adding, editing, and deleting employee records.
Include features for search...read more
Q35. Past experience and introduce me the rsystem environment
I have 5 years of experience in billing and have worked in the rsystem environment.
I have experience in handling billing processes for various clients
I am familiar with the rsystem environment and its tools
I have worked with teams to ensure timely and accurate billing
I have experience in resolving billing discrepancies and issues
I have knowledge of billing regulations and compliance standards
Q36. Python Interpreter vs Java Interpreter?
Python interpreter is more flexible and easier to learn, while Java interpreter is faster and more secure.
Python interpreter is dynamically typed, while Java interpreter is statically typed.
Python interpreter is more suitable for scripting and rapid prototyping, while Java interpreter is better for large-scale enterprise applications.
Python interpreter has a simpler syntax and is easier to learn, while Java interpreter has a more complex syntax and requires more experience.
Ja...read more
Q37. Tool used for automating test cases
Q38. Approach followed for testing activities
Q39. What is design pattern
Design pattern is a reusable solution to a commonly occurring problem in software design.
Design patterns help in creating efficient, scalable, and maintainable software.
They provide a common language for developers to communicate and understand each other's code.
Examples of design patterns include Singleton, Factory, Observer, and Strategy patterns.
Q40. what is middleware
Middleware is software that acts as a bridge between different applications or components, facilitating communication and data exchange.
Middleware enables interoperability between software systems
It provides a layer of abstraction, allowing components to communicate without knowing the details of each other
Examples of middleware include message queues, web servers, and API gateways
Q41. 1.whàt is regular expression
Regular expression is a sequence of characters that define a search pattern.
Used for pattern matching and text processing
Can be used in programming languages, text editors, and command-line interpreters
Examples: /hello/ matches 'hello' in a string, /[0-9]+/ matches one or more digits
More about working at R Systems International
Top HR Questions asked in Birla Century
Interview Process at Birla Century
Top Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month