Salesforce
100+ Interview Questions and Answers
Q1. Admin Questions :- What is Relationships what are types of relationships
Relationships in databases define how entities are related to each other. Types include one-to-one, one-to-many, and many-to-many.
One-to-one relationship: Each record in one table is related to only one record in another table.
One-to-many relationship: Each record in one table can be related to multiple records in another table.
Many-to-many relationship: Multiple records in one table can be related to multiple records in another table.
Examples: A customer can have multiple or...read more
Q2. How you will get contact of account with name starting with abc.
To get contact of account with name starting with abc, use Salesforce's SOQL query language.
Use the Salesforce Object Query Language (SOQL) to query the Account object
Use the 'LIKE' operator to search for account names starting with 'abc'
Example query: SELECT Id, Name, Phone FROM Account WHERE Name LIKE 'abc%'
You are Harshad Mehta’s friend. He told you the price of a particular stock for the next ‘N’ days. You can either buy or sell a stock. Also, you can only complete at most 2-transactions. Find ...read more
You are given a positive integer N. Your task is to find the smallest number whose factorial contains at least N trailing zeroes.
Example :
Let N = 1. ...read more
Given a singly linked list of integers. Your task is to return the head of the reversed linked list.
For example:
The given linked list is 1 -> 2 -> 3 -> 4-> NULL. Then the reverse linked li...read more
You and your friend Ninjax are playing a game of coins. Ninjax place the 'N' number of coins in a straight line.
The rule of the game is as follows:
1. Each coin has a value associate...read more
Given an integer ‘N’ representing the number of pairs of parentheses, Find all the possible combinations of balanced parentheses with the given number of pairs of parentheses.
Note :
Conditi...read more
Ninja likes to play with strings, and he calls a string ‘S’ Happy if it only contains letters ‘a’, ‘b’, and ‘c’, and no three consecutive letters in the string are the same. For example, ‘aa...read more
Q9. What is MFA multifactor authentication ?
MFA is a security process that requires multiple forms of verification to access an account or system.
MFA combines two or more authentication factors such as passwords, biometrics, security tokens, etc.
It provides an extra layer of security to prevent unauthorized access.
Examples of MFA include using a password along with a fingerprint scan or receiving a code on your phone to log in.
MFA is commonly used in online banking, email accounts, and other sensitive systems.
You have been given three numbers ‘X’, ’Y’ and ‘Z’. You have to find the sum of all the numbers formed by the combination of the digits 3, 4 and 5. You can use 3 at most ‘X’ times, 4 at most ‘Y’ ...read more
Q11. How to handle hot customers How to prioritize P1 ,P2 ticket
Handling hot customers and prioritizing P1, P2 tickets
Listen actively and empathize with the customer's frustration
Remain calm and professional, avoid taking things personally
Offer solutions and follow up promptly
Prioritize P1 tickets based on severity and impact on business operations
Assign P2 tickets based on urgency and customer impact
Communicate clearly with customers about ticket status and resolution timelines
You are given a Weighted Directed Acyclic Graph (DAG) consisting of ‘N’ nodes and ‘E’ directed edges. Nodes are numbered from 0 to ’N’-1. You are also given a source node ‘Src’ in ...read more
You are given a binary tree with 'N' nodes. Your task is to return the size of the largest subtree of the binary tree which is also a BST.
A binary search tree (BST) is a binary tree data str...read more
Q14. What profile and permissions set ?
Profile and permissions set determine the level of access and capabilities a Technical Support Engineer has within a system.
Profile defines the roles and responsibilities of the Technical Support Engineer within the organization.
Permissions set specifies what actions the Technical Support Engineer can perform within the system.
Examples of permissions include read-only access, write access, delete access, etc.
You are given a N x M matrix of integers, return the spiral path of the matrix
Example Of Spiral Path
Input Format:
The first line contains an integer 'T' which denotes the number of test cases or...read more
You are given a graph with ‘N’ nodes and ‘M’ unidirectional edges. Also you are given two integers ‘S’ and ‘D’ denoting the source and destination. Your task is to find all the paths from ‘S’ to ...read more
Q17. Difference between screen flow and record trigger flow ?
Screen flow is user interface driven while record trigger flow is backend logic driven.
Screen flow is used to create user interfaces for users to interact with, while record trigger flow is used to automate processes and perform actions in the background.
Screen flow is typically used for creating visual workflows with screens, fields, and buttons, while record trigger flow is used for executing logic based on record changes or events.
Screen flow can be used to guide users thr...read more
You have given a Singly Linked List of integers, determine if it forms a cycle or not.
A cycle occurs when a node's next points back to a previous node in the list. The li...read more
Ninja is given a task to implement a priority queue using Heap data structure. The Ninja is busying preparing for the tournament., So he asked for your help.
Your task is to use the cl...read more
Given an array 'arr' of size 'N', find the minimum number of swaps required to be made between any two elements to sort the array in ascending order. The array does not contain duplic...read more
Q21. Sharing security scenario and explain OWD organisation wide default ?
OWD determines the default level of access users have to records in an organization.
OWD settings control who can view, edit, and delete records in Salesforce
OWD can be set to private, public read-only, public read/write, or controlled by parent
OWD can be further customized with sharing rules and manual sharing
Example: Setting OWD to private means only record owners and users above them in the role hierarchy can access the records
Ninja is hungry and wants to eat his favorite chocolates but his mother won’t let him eat since he has already eaten enough chocolates. There are ‘N’ jars filled with chocolates. His mother ...read more
Q23. What is TCP Handshake, explain in detail
TCP Handshake is a process of establishing a connection between two devices over a network.
TCP Handshake involves three-way communication between the client and server
The client sends a SYN packet to the server to initiate the connection
The server responds with a SYN-ACK packet to acknowledge the request
Finally, the client sends an ACK packet to confirm the connection
This process ensures reliable and error-free communication between devices
You are given the ‘root’ of a Balanced Binary Search Tree and an integer ‘target,’ you have to tell if there exists any pair of nodes such that the sum of their value is equ...read more
Q25. Assignments rule and their types ?
Assignments rule and their types in technical support engineering.
Assignments rule determines how assignments are made in a system.
Types of assignments rules include assignment rules based on skills, round robin, load balancing, etc.
For example, in a technical support team, assignments rule based on skills may assign tickets to agents with specific expertise.
Round robin assignments rule distributes assignments evenly among team members.
Load balancing assignments rule distribu...read more
Q26. What is workflow and process builder ?
Workflow and Process Builder are tools in Salesforce that automate business processes without code.
Workflow is a declarative automation tool that allows you to set up automated rules to perform actions based on certain criteria.
Process Builder is a more advanced tool that allows you to create more complex processes with multiple criteria and actions.
Both tools help streamline and automate business processes in Salesforce.
Examples: Using Workflow to automatically assign a lead...read more
You are given a positive integer N. Your task is to create the lexicographically largest sequence of length 2*N - 1 containing integers between 1 to N such ...read more
Q28. Difference between workflow and process builder?
Workflow automates simple processes, while Process Builder allows for more complex processes with multiple criteria and actions.
Workflow is used for automating simple tasks based on criteria and actions.
Process Builder allows for more complex processes with multiple criteria and actions.
Workflow is limited in functionality compared to Process Builder.
Process Builder can update related records, send emails, create records, etc.
Process Builder can evaluate multiple criteria bef...read more
Q29. What is mixed dml error
Mixed DML error occurs when DML operations on setup and non-setup objects are mixed in a single transaction.
Occurs when DML operations on setup and non-setup objects are mixed
Setup objects include User, Profile, PermissionSet, etc.
Non-setup objects include custom objects, standard objects, etc.
You have several balls on the table in the form of a string named 'BOARD'. The colors of the balls can be red(R), blue(B), green(G), white(W), and yellow(Y). You also have several balls in your hand in...read more
Q31. How to handle escalations/ your approach to solve any issues/ why do you want to join support when already you are working on development
Handling escalations and approach to issue resolution in support as a developer
I understand the importance of timely resolution of issues and the impact it has on customer satisfaction
My approach is to first gather all necessary information and analyze the root cause of the issue
I then prioritize the issue based on its severity and impact on the customer
I communicate effectively with the customer and keep them updated on the progress of the resolution
If necessary, I escalate ...read more
Q32. What is SSL VPN in detailed
SSL VPN is a secure way to remotely access a private network over the internet using SSL encryption.
SSL VPN uses SSL/TLS encryption to secure the connection between the remote user and the private network
It allows remote users to access resources on the private network as if they were physically present on the network
SSL VPN can be clientless or require a client software to be installed on the remote device
Examples of SSL VPN solutions include Cisco AnyConnect, Pulse Secure, ...read more
Q33. How will you handle cases with customers of bad temeament?
I will remain calm, empathetic, and professional while actively listening to the customer's concerns and finding a solution.
Remain calm and composed
Listen actively to understand the customer's concerns
Show empathy towards the customer's frustrations
Maintain a professional demeanor throughout the interaction
Focus on finding a solution to the customer's issue
Avoid taking the customer's behavior personally
Q34. Reverse a string and check if it's a palindrome program
The program reverses a given string and checks if it is a palindrome.
Use a loop to iterate through the characters of the string and build a reversed string.
Compare the reversed string with the original string to check if they are the same.
If they are the same, the string is a palindrome.
Q35. Are you flexible and adaptive?
Yes, I am flexible and adaptive.
I am always willing to learn new things and adapt to changes in technology.
I can work in different environments and adjust to different work styles.
I am open to feedback and can adjust my approach accordingly.
For example, in my previous job, I had to quickly learn a new software program and adapt to a new team dynamic.
I am also able to prioritize tasks and adjust my schedule to meet deadlines.
Q36. Write an asnchronous apex to return opportunities groupby AccountId
Asynchronous Apex code to group opportunities by AccountId
Create a Queueable Apex class to handle the asynchronous processing
Query the opportunities and group them by AccountId using a Map
Implement the execute method to process the opportunities and return the grouped data
Q37. Validation rules Before Insert Validation rules After Insert
Validation rules are used to enforce data integrity in a database before and after insertion.
Validation rules before insert are used to check data integrity before adding a new record to the database.
Validation rules after insert are used to verify data integrity after a new record has been added.
Examples: Before insert - checking if a required field is filled, after insert - verifying if the data meets certain criteria.
What is Early Binding and Late Binding in C++ ?
Q39. How do you manage difficult tasks?
I break down the task into smaller steps, prioritize them, seek help if needed, and stay organized.
Break down the task into smaller, manageable steps
Prioritize the steps based on urgency and importance
Seek help or guidance from colleagues or supervisors if necessary
Stay organized by keeping track of progress and deadlines
Q40. How dns works and record of dns
DNS (Domain Name System) is a system that translates domain names to IP addresses.
DNS works by translating human-readable domain names (like google.com) to IP addresses (like 172.217.3.206).
DNS records include A records (for IPv4 addresses), AAAA records (for IPv6 addresses), CNAME records (for aliases), MX records (for mail servers), and more.
DNS queries are sent from client devices to DNS servers, which then resolve the domain name to the corresponding IP address.
DNS operat...read more
Q41. Ajax and asynchronous functions in JavaScript
Ajax allows for asynchronous communication between the client and server in JavaScript.
Ajax stands for Asynchronous JavaScript and XML.
It allows for making requests to the server without reloading the entire page.
Asynchronous functions in JavaScript allow for non-blocking code execution.
Examples of asynchronous functions include setTimeout, setInterval, and fetch API.
Q42. A scenario for grand parent child trigger
A grand parent child trigger scenario involves triggering an action in a child record based on changes in a grandparent record.
Create a trigger on the grandparent object to monitor changes
Use a trigger handler class to handle the logic for updating child records
Consider using trigger context variables to pass data between the grandparent and child triggers
Q43. Write a SOQL query Accounts and it's related contact.
SOQL query to retrieve Accounts and their related Contacts.
Use the relationship field 'Contacts' on the Account object to retrieve related contacts.
Use the SELECT statement to specify the fields to retrieve.
Use the WHERE clause to filter the results based on specific criteria.
Example: SELECT Id, Name, (SELECT Id, Name FROM Contacts) FROM Account WHERE Industry = 'Technology'
What is meant by Multitasking and Multithreading in OS?
Q45. How can you handle the bulk number of support cases at a time?
I prioritize cases based on urgency, utilize efficient troubleshooting techniques, and delegate tasks when necessary.
Prioritize cases based on urgency to ensure critical issues are addressed first
Utilize efficient troubleshooting techniques to quickly resolve common issues
Delegate tasks to team members to handle multiple cases simultaneously
What is deadlock? How to prevent deadlock?
Q47. Integration in real life scenario .
Integration in real life scenario involves combining different systems or components to work together seamlessly.
Integration of payment gateway with an e-commerce website
Integration of CRM system with email marketing platform
Integration of GPS tracking system with fleet management software
Q48. In how many ways we can share a record to the user in salesforce
There are multiple ways to share a record with a user in Salesforce.
Sharing rules
Manual sharing
Role hierarchy
Criteria-based sharing rules
Team sharing
Q49. Write trigger code for given scenario
Trigger code to update a field in a table when a new record is inserted
Create a trigger on the table for INSERT events
Use the NEW keyword to access the newly inserted record
Update the desired field in the table using the NEW values
Which of the HTML5 elements support media content?
Q51. Rewrite a paragraph after reading the given paragraph in 5 min
Rewrite a paragraph in 5 minutes for an interview question
Read the paragraph carefully to understand the main idea
Identify key points and rephrase them in your own words
Ensure the rewritten paragraph maintains the original meaning and flow
Use synonyms and different sentence structures to convey the message
Proofread for grammar and clarity before submitting
Q52. How would you save attrition when a customer is not happy with product roadmap?
To save attrition when a customer is not happy with the product roadmap, it is important to address their concerns and provide alternative solutions.
Listen to the customer's concerns and understand their specific issues with the product roadmap.
Offer personalized solutions or alternatives that align with the customer's needs and expectations.
Engage in open and transparent communication to build trust and demonstrate a commitment to addressing their concerns.
Provide regular up...read more
Q53. How will u allocate resources (Steps) what do we need to consider beforce allocation ?
Resource allocation requires careful planning and consideration of various factors.
Identify the goals and objectives of the project
Assess the available resources and their capabilities
Prioritize the tasks and allocate resources accordingly
Consider the timeline and deadlines
Monitor and adjust the allocation as needed
Q54. What tool tableau use for optimization of deployments?
Tableau uses Tableau Server for optimization of deployments.
Tableau Server provides centralized management and scalability for Tableau deployments.
It allows for easy sharing and collaboration of dashboards and data sources.
Tableau Server also offers features such as load balancing, failover, and backup and recovery.
It can be deployed on-premises or in the cloud, depending on the organization's needs.
Tableau also offers a tool called Tableau Prep Conductor for managing data pr...read more
Q55. How can you debug an issue which is caused because of LWC component
To debug an issue caused by a LWC component, use browser developer tools, check console logs, use debugger statements, and review code for errors.
Use browser developer tools to inspect network requests, console logs, and component hierarchy
Check console logs for any error messages or warnings related to the LWC component
Use debugger statements in the component code to pause execution and inspect variables
Review the LWC component code for syntax errors, logic issues, or incorr...read more
Q56. How Authorization and authentication different?
Authentication is the process of verifying the identity of a user, while authorization is the process of granting access to specific resources.
Authentication confirms the identity of a user through credentials such as username and password.
Authorization determines what resources a user can access based on their authenticated identity.
Authentication is the first step in the authorization process.
Examples of authentication include biometric identification, two-factor authentica...read more
Design Splitwise and change 3 features that you dont like about it.
How can you reduce page loading time?
Q59. Difference between dynamic and static dashboards and use case for both of them
Dynamic dashboards update in real-time with live data, while static dashboards display fixed data snapshots.
Dynamic dashboards are interactive and update automatically with real-time data
Static dashboards display fixed data snapshots and do not update automatically
Use dynamic dashboards for monitoring real-time metrics like website traffic or sales performance
Use static dashboards for historical data analysis or monthly reports
Q60. Tell me about Asynchronous Apex? Difference between Batch Apex and Queueable Apex
Asynchronous Apex allows you to run processes in the background, without user interaction. Batch Apex and Queueable Apex are two types of Asynchronous Apex.
Asynchronous Apex allows you to process large amounts of data asynchronously, without impacting the user interface.
Batch Apex is used to process large data sets that can be divided into smaller batches for processing.
Queueable Apex allows you to submit jobs for asynchronous processing, similar to future methods but with mo...read more
Q61. Explain 3 way handshake
Three-way handshake is a method used in TCP/IP network to establish a connection between a client and server.
Client sends a SYN packet to the server to initiate a connection
Server responds with a SYN-ACK packet to acknowledge the request
Client sends an ACK packet back to the server to confirm the connection
Q62. What is bucket field in reports?
Bucket field in reports is a way to group data into categories for easier analysis.
Bucket field allows you to categorize data based on specific criteria
It helps in organizing and summarizing data in reports
Examples of bucket fields include grouping sales data by region or categorizing leads by source
Q63. Explain Future method? and why we need (Callout= true) along with that annotation?
Future method is used to run code asynchronously. Callout=true is needed to make HTTP callouts from future methods.
Future methods are used to run code asynchronously in Salesforce.
They are annotated with @future annotation.
Callout=true is needed to make HTTP callouts from future methods.
Without Callout=true, making HTTP callouts from future methods is not allowed.
Q64. Different types of sandbox’s and refresh cycle of each sandbox
Different types of sandboxes include developer sandbox, configuration sandbox, and full sandbox. Each sandbox has a different refresh cycle.
Developer sandbox: used for coding and testing, refreshes every 5 days
Configuration sandbox: used for configuration changes, refreshes every 1 month
Full sandbox: replica of production environment, refreshes every 29 days
Q65. Imagine you are selling to a CEO. How will you sell our solutions?
I would tailor my pitch to focus on the ROI and strategic benefits of our solutions for the CEO.
Highlight how our solutions can drive revenue growth and cost savings for the company
Emphasize the competitive advantage and market differentiation our solutions can provide
Discuss the long-term strategic impact of implementing our solutions, such as improved efficiency and scalability
Provide case studies or success stories of other CEOs who have seen positive results from using ou...read more
Design linkedin kind platform
Q67. Can we implement skill based routing as queue based routing.
Virtual memory ? Usage , example4
Threads, Processes , differences.
Virtual function and abstract class
Q70. 3) Write a trigger on child if the all related child status is closed then update that in parent object
Create a trigger on child object to update parent object when all related child records have a closed status.
Create a trigger on the child object to run before insert and update events.
Query all related child records in the trigger context.
Check if all child records have a closed status.
Update the parent object if all child records have a closed status.
Q71. Apex trigger with best practices
Best practices for writing Apex triggers
Use trigger handler pattern to separate logic from trigger
Avoid SOQL queries and DML statements inside loops
Bulkify triggers to handle multiple records efficiently
Use trigger context variables to access old and new record data
Write test classes to achieve code coverage
Q73. Why should we invest in this product? How we can train our employe on sales force ? What other solution do you have apart from the sales software?
Investing in this product will increase sales revenue and streamline sales processes. We can train employees on sales force through hands-on training and online resources. In addition to the sales software, we offer consulting services and customized solutions.
Increased sales revenue
Streamlined sales processes
Hands-on training
Online resources
Consulting services
Customized solutions
Q74. How do you design the schema which can scale upto billions of rows?
To design a schema that can scale up to billions of rows, consider partitioning, indexing, denormalization, and distributed systems.
Partition the data to distribute it across multiple servers or shards.
Use indexing techniques to optimize query performance.
Consider denormalizing the schema to reduce joins and improve read performance.
Utilize distributed systems and parallel processing to handle large data volumes.
Implement data compression and caching strategies to optimize st...read more
Q75. difference between custom Metadata and custom settings
Custom metadata is customizable, deployable, and upgradeable application metadata, while custom settings are application settings that can be accessed using Apex code.
Custom metadata is deployable and upgradeable, while custom settings are not
Custom metadata is customizable at the field level, while custom settings are not
Custom metadata can be accessed in Apex using SOQL queries, while custom settings can be accessed using Apex code
Q76. Can you explain about Platform Events?
Platform Events are a feature in Salesforce that allow developers to deliver secure, scalable, and customizable event notifications.
Platform Events are based on the publish-subscribe model, where publishers send events and subscribers receive them.
They are used to communicate changes in Salesforce data or custom events within an organization.
Developers can define custom event objects and trigger events using Apex or declaratively through Process Builder or Flow.
Subscribers ca...read more
Q77. persistent in memory key value store optimized for write heavy workloads(use: sstables,compaction )
Apache Cassandra is a persistent in-memory key-value store optimized for write-heavy workloads using SSTables and compaction.
Apache Cassandra is a popular choice for write-heavy workloads due to its distributed architecture and support for SSTables.
SSTables (Sorted String Tables) are used to store data on disk in a sorted manner, allowing for efficient read and write operations.
Compaction in Apache Cassandra helps to merge and organize SSTables, reducing disk space usage and ...read more
Q78. What is the command used for clear cookies
The command used for clearing cookies varies depending on the web browser being used.
In Google Chrome, the command is 'chrome://settings/clearBrowserData'
In Mozilla Firefox, the command is 'Options > Privacy & Security > Cookies and Site Data > Clear Data'
In Microsoft Edge, the command is 'Settings > Privacy, search, and services > Clear browsing data > Choose what to clear'
In Safari, the command is 'Safari > Preferences > Privacy > Manage Website Data > Remove All'
Q79. What is decorator? Types of flow Difference between role and profile
A decorator is a design pattern in Salesforce that allows you to add behavior to objects dynamically.
Decorators are used to modify the behavior of objects at runtime without changing their actual code
They are commonly used in Salesforce to extend the functionality of standard objects or fields
Decorators can be used to add validation rules, trigger logic, or custom UI components to Salesforce objects
Q80. what is java and how to slove concurrency error
Java is a popular programming language used for developing various applications. Concurrency errors occur when multiple threads access shared resources simultaneously.
Java is a high-level, object-oriented programming language known for its platform independence.
Concurrency errors in Java can be solved using synchronization mechanisms like synchronized blocks, locks, and atomic variables.
Examples of solving concurrency errors in Java include using synchronized keyword to prote...read more
Q81. Write a program to remove all the space from the sentence .
Program to remove all spaces from a sentence
Iterate through each character in the sentence
If the character is not a space, add it to a new string
Return the new string without spaces
Q82. Soql limits- max. time for a soql query to run.
Q83. 1) Custom Settings & Custom Meta data difference
Custom Settings are hierarchical data that can be accessed using Apex code, while Custom Metadata are records that can be accessed using SOQL queries.
Custom Settings are hierarchical data that can be accessed using Apex code, while Custom Metadata are records that can be accessed using SOQL queries.
Custom Settings are used to store data that is organization-specific, while Custom Metadata is used to store metadata that can be deployed between orgs.
Custom Settings can be acces...read more
Q84. Can we call Aura from LWC
Yes, Aura can be called from LWC using the lightning namespace
Aura can be called from LWC using the 'lightning' namespace
You can use 'lightning/navigation' to navigate to a record page or URL
You can also use 'lightning/messageService' to communicate between components
Q85. Communities in depth
Communities are groups of people with shared interests or goals who come together to support each other and achieve their objectives.
Communities can be based on various factors such as location, profession, hobbies, religion, etc.
They provide a platform for individuals to connect, share knowledge and experiences, and collaborate on projects.
Online communities have become increasingly popular with the rise of social media platforms.
Examples of communities include professional ...read more
Q86. Data Security in Salesforce and types in it.
Data security in Salesforce involves various types of security measures to protect sensitive information.
Salesforce provides various security features such as user authentication, data encryption, and access controls.
Types of data security in Salesforce include object-level security, field-level security, and record-level security.
Salesforce also offers tools like Salesforce Shield for enhanced data security and compliance.
Regular security audits and monitoring help ensure da...read more
Q87. How to manage stakeholders
Managing stakeholders involves identifying their needs, communicating effectively, and building strong relationships.
Identify key stakeholders and their interests
Communicate regularly and transparently
Build trust and rapport through active listening and responsiveness
Address concerns and conflicts proactively
Involve stakeholders in decision-making processes
Monitor and evaluate stakeholder engagement
Adjust strategies as needed to meet stakeholder needs
Q88. how to handle dynamic web elements
Handle dynamic web elements by using techniques like waiting, locating by attributes, and using explicit waits.
Use implicit waits to wait for elements to load before interacting with them
Locate elements by attributes like ID, class name, xpath, etc.
Use explicit waits to wait for specific conditions before proceeding
Handle dynamic elements by using dynamic locators or regular expressions
Use frameworks like Selenium for handling dynamic web elements
Q89. 2) Diff bn Queable and future apex
Queueable and Future Apex are both ways to run processes asynchronously in Salesforce, but they have some key differences.
Queueable allows chaining of jobs and implements the Queueable interface, while Future Apex does not support chaining.
Queueable jobs can be monitored and managed through the Apex Jobs page in Salesforce, while Future Apex jobs cannot be monitored in the same way.
Queueable jobs have a limit of 50 jobs in the queue per transaction, while Future Apex has a li...read more
Q90. Explanation of process and matching our experience
The process involves explaining how our experience matches the requirements of the position.
Start by discussing the specific tasks and responsibilities of the position
Explain how your previous experience aligns with these tasks
Provide examples of projects or tasks you have completed that demonstrate your skills and abilities
Highlight any relevant certifications or training you have received
Q91. Type used f testing you do
I use various types of testing such as functional, regression, integration, and user acceptance testing.
Functional testing to ensure the system meets the requirements
Regression testing to ensure changes don't break existing functionality
Integration testing to ensure different components work together
User acceptance testing to ensure the system meets user needs
Exploratory testing to find defects that may not be covered by other types of testing
Q92. Deep diving into current project works
I am currently working on developing a new feature for our company's website to improve user experience.
Researching user feedback and analyzing data to identify areas for improvement
Collaborating with designers and developers to create wireframes and prototypes
Implementing and testing the new feature to ensure functionality and usability
Gathering feedback from users through surveys and usability testing
Iterating on the feature based on feedback and data analysis
Q93. How would you improve it?
Q94. What is null pointer exception
A null pointer exception occurs when a program tries to access a memory address that is null or invalid.
Occurs in programming languages like Java when trying to access an object or variable that is null
Can be caused by not properly initializing a variable before using it
Example: int[] arr = null; int x = arr.length; // This will throw a null pointer exception
Q95. Explain the SOC in your words
SOC stands for Security Operations Center. It is a centralized unit that monitors and manages an organization's security posture.
SOC is responsible for detecting, analyzing, and responding to security incidents.
It uses various tools and technologies to monitor the organization's network, systems, and applications.
SOC analysts investigate security alerts and incidents to determine their severity and impact.
They also develop and implement security policies and procedures to pre...read more
Q96. Pitch product of choice
Our product is a cloud-based project management software that streamlines team collaboration and increases productivity.
Our software offers real-time communication and task tracking features.
It allows for easy delegation of tasks and project timelines.
Integrates with popular tools like Slack and Trello.
Customizable dashboards and reporting for project progress.
Affordable pricing plans for businesses of all sizes.
Q97. HLD - Design a live streaming platform
Design a live streaming platform for seamless video streaming experience.
Implement a robust video encoding and transcoding system to support various devices and internet speeds.
Utilize a content delivery network (CDN) to reduce latency and ensure high-quality streaming.
Incorporate adaptive bitrate streaming to adjust video quality based on user's internet connection.
Include features like live chat, viewer analytics, and monetization options for content creators.
Ensure scalabi...read more
Q98. Nearest K nodes in a Binary tree
Q99. Histogram area Kth largest
The question is about finding the area of a histogram and the Kth largest value.
Calculate the area of the histogram by multiplying the width and height of each bar and summing them up.
Find the Kth largest value by sorting the data and selecting the Kth element.
The Kth largest value can also be found using a heap data structure.
Example: Histogram area of [2, 3, 1, 4, 5] with bar width of 1 is 15. The 3rd largest value is 3.
Q100. Kth largest element in array
Finding the Kth largest element in an array.
Sort the array and return the Kth element from the end
Use a max heap to keep track of the K largest elements
Use quickselect algorithm to find the Kth largest element
More about working at Salesforce
Top HR Questions asked in null
Interview Process at null
Top Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month