Add office photos
Engaged Employer

SAP

4.2
based on 1.6k Reviews
Video summary
Proud winner of ABECA 2024 - AmbitionBox Employee Choice Awards
Filter interviews by

300+ Axens India Interview Questions and Answers

Updated 2 Feb 2025
Popular Designations

Q1. Duplicate Integer in Array

Given an array ARR of size N, containing each number between 1 and N-1 at least once, identify the single integer that appears twice.

Input:

The first line contains an integer, 'T', r...read more
Add your answer

Q2. Given a 10 digit number, sort the individual digits of the number.

Ans.

Sort the individual digits of a 10 digit number.

  • Convert the number to a string to access individual digits

  • Use a sorting algorithm to sort the digits

  • Convert the sorted digits back to a number

View 4 more answers

Q3. Reverse Linked List Problem Statement

Given a singly linked list of integers, return the head of the reversed linked list.

Example:

Initial linked list: 1 -> 2 -> 3 -> 4 -> NULL
Reversed linked list: 4 -> 3 -> 2...read more
Add your answer

Q4. Multilevel Inheritance Implementation

Create a series of classes to demonstrate multilevel inheritance.

Explanation:

Create three classes to illustrate multilevel inheritance.

  • GrandFather: This class should ha...read more
Add your answer
Discover Axens India interview dos and don'ts from real experiences

Q5. Longest Substring Without Repeating Characters Problem Statement

Given a string S of length L, determine the length of the longest substring that contains no repeating characters.

Example:

Input:
"abacb"
Output...read more
Add your answer

Q6. Subset Sum Problem Statement

Given an array of integers, find the sum of all subsets in non-decreasing order of the given array.

Example:

Input:
N = 3, array = [1, 2]
Output:
[0, 1, 2, 3]
Explanation:

The subse...read more

Add your answer
Are these interview questions helpful?

Q7. Overlapping Intervals Problem Statement

You are given the start and end times of 'N' intervals. Write a function to determine if any two intervals overlap.

Note:

If an interval ends at time T and another interv...read more

Add your answer

Q8. Factorial of a Number Problem Statement

You are provided with an integer 'N'. Your task is to calculate and print the factorial of 'N'. The factorial of a number 'N', denoted as N!, is the product of all positi...read more

Add your answer
Share interview questions and help millions of jobseekers 🌟

Q9. Zig-Zag String Problem Statement

Given a string STR of size N and an integer M representing the number of rows in the zig-zag pattern, return the string formed by concatenating all rows when the string STR is w...read more

Add your answer

Q10. Maximum of All Subarrays of Size k

Given an array of 'N' non-negative integers and an integer 'K', your task is to find the maximum elements for each subarray of size 'K'.

Input:

The first line contains an inte...read more
Add your answer

Q11. Level Order Traversal Problem Statement

Given a binary tree of integers, return the level order traversal of the binary tree.

Input:

The first line contains an integer 'T', representing the number of test cases...read more
Add your answer

Q12. Covid Vaccination Distribution Problem

As the Government ramps up vaccination drives to combat the second wave of Covid-19, you are tasked with helping plan an effective vaccination schedule. Your goal is to ma...read more

Add your answer

Q13. Longest Increasing Subsequence Problem Statement

Given 'N' students standing in a row with specific heights, your task is to find the length of the longest strictly increasing subsequence of their heights, ensu...read more

Add your answer

Q14. Prime Numbers Identification

Given a positive integer N, your task is to identify all prime numbers less than or equal to N.

Explanation:

A prime number is a natural number greater than 1 that has no positive d...read more

Add your answer

Q15. Longest Unique Substring Problem Statement

Given a string input of length 'n', your task is to determine the length of the longest substring that contains no repeating characters.

Explanation:

A substring is a ...read more

Add your answer

Q16. LCA of Binary Tree Problem Statement

You are given a binary tree consisting of distinct integers and two nodes, X and Y. Your task is to find and return the Lowest Common Ancestor (LCA) of these two nodes.

The ...read more

Add your answer

Q17. Next Permutation Problem Statement

You are given a permutation of 'N' integers. A sequence of 'N' integers is considered a permutation if it includes all integers from 1 to 'N' exactly once. Your task is to rea...read more

Add your answer

Q18. BFS Traversal in a Graph

Given an undirected and disconnected graph G(V, E) where V vertices are numbered from 0 to V-1, and E represents edges, your task is to output the BFS traversal starting from the 0th ve...read more

Add your answer

Q19. Find All Anagrams Problem Statement

Given a string STR and a non-empty string PTR, identify all the starting indices of anagrams of PTR within STR.

Explanation:

An anagram of a string is another string that can...read more

Add your answer

Q20. Reverse the String Problem Statement

You are given a string STR which contains alphabets, numbers, and special characters. Your task is to reverse the string.

Example:

Input:
STR = "abcde"
Output:
"edcba"

Input...read more

Add your answer

Q21. Find the Middle of a Linked List

This problem requires you to return a pointer that references the middle node of a singly linked list.

Explanation:

If the number of elements in the linked list is odd, return t...read more

Add your answer

Q22. Print Permutations - String Problem Statement

Given an input string 'S', you are tasked with finding and returning all possible permutations of the input string.

Input:

The first and only line of input contains...read more
Add your answer

Q23. Binary Pattern Problem Statement

Given an input integer N, your task is to print a binary pattern as follows:

Example:

Input:
N = 4
Output:
1111
000
11
0
Explanation:

The first line contains 'N' 1s. The next line ...read more

Add your answer

Q24. Boundary Traversal of Binary Tree Problem Statement

Given a binary tree consisting of integers, your task is to provide the boundary nodes of this tree in an anti-clockwise direction, starting with the root nod...read more

Add your answer

Q25. Nth Fibonacci Number Problem Statement

Calculate the Nth term in the Fibonacci sequence, where the sequence is defined as follows: F(n) = F(n-1) + F(n-2), with initial conditions F(1) = F(2) = 1.

Input:

The inp...read more
Add your answer

Q26. How do you tackle something that you can't find a solution to?

Ans.

When faced with an unsolvable problem, I break it down, research, seek help, experiment, and iterate until a solution is found.

  • Break down the problem into smaller, manageable parts

  • Research and gather information related to the problem

  • Seek help from colleagues, online communities, or experts

  • Experiment with different approaches or solutions

  • Iterate and refine the solution based on feedback and results

View 1 answer

Q27. Reverse a Linked List Iteratively

You are given a singly linked list of integers. The task is to return the head of the reversed linked list.

Example:

Input:
The given linked list is 1 -> 2 -> 3 -> 4 -> NULL.
O...read more
Add your answer

Q28. Uncommon Characters Problem Statement

Given two strings str1 and str2 containing only lowercase alphabets, find the characters that are unique to each string, i.e., characters that occur in only one of the stri...read more

Add your answer

Q29. Discuss a DBMS consisting of college faculty, professors, courses and students.

Ans.

A DBMS for managing college faculty, professors, courses, and students.

  • The DBMS should have tables for faculty, professors, courses, and students.

  • Each table should have appropriate attributes to store relevant information.

  • Relationships can be established between tables using foreign keys.

  • Queries can be used to retrieve information about faculty, professors, courses, and students.

  • The DBMS can be used to track enrollment, grades, and other relevant data.

View 1 answer

Q30. Bubble Sort Problem Statement

Sort the given unsorted array consisting of N non-negative integers in non-decreasing order using the Bubble Sort algorithm.

Input:

The first line contains an integer 'T' represent...read more
Add your answer

Q31. Floyd Warshall Algorithm Problem

You are given a directed weighted graph with 'N' vertices, labeled from 1 to 'N', and 'M' edges. Each edge connects two nodes 'u' and 'v' with a weight 'w', representing the dis...read more

Add your answer

Q32. Subarray Sums I Problem Statement

You are provided with an array of positive integers ARR that represents the strengths of different “jutsus” (ninja techniques). You are also given the strength of the enemy S, ...read more

Add your answer

Q33. Inorder Successor in a Binary Tree

Given a node in an arbitrary binary tree, find its inorder successor. The successor is defined as the node that appears immediately after the given node in the in-order traver...read more

Add your answer

Q34. Rearrange Array: Move Negative Numbers to the Beginning

Given an array ARR consisting of N integers, rearrange the elements such that all negative numbers are located before all positive numbers. The order of e...read more

Add your answer

Q35. Sum of Maximum and Minimum Elements Problem Statement

Given an array ARR of size N, your objective is to determine the sum of the largest and smallest elements within the array.

Follow Up:

Can you achieve the a...read more

Add your answer

Q36. Write code for LCA in Binary Search Tree.

Ans.

The code for finding the Lowest Common Ancestor (LCA) in a Binary Search Tree (BST).

  • Start from the root node and compare it with the given two nodes.

  • If both nodes are smaller than the current node, move to the left subtree.

  • If both nodes are greater than the current node, move to the right subtree.

  • If one node is smaller and the other is greater, then the current node is the LCA.

  • Continue this process until the LCA is found.

Add your answer

Q37. Swap Numbers Without Temporary Variable

Your task is to interchange the values of two numbers given as variables 'X' and 'Y' without using a temporary variable or any additional variable.

Explanation:

You need ...read more

Add your answer

Q38. Design a parking lot? Design should include -Logic Flow Diagram -E-R diagram (very important) -DB tables with relations between them, preferably normalized -Commands for transaction with tables

Ans.

Design a parking lot with Logic Flow Diagram, E-R diagram, DB tables with relations, and commands for transactions.

  • Identify the types of vehicles that will use the parking lot

  • Determine the number of parking spaces needed for each vehicle type

  • Create a flow diagram to show the process of entering and exiting the parking lot

  • Design an E-R diagram to show the relationships between entities such as vehicles, parking spaces, and transactions

  • Normalize the DB tables to reduce redundan...read more

Add your answer

Q39. Given an array, sort the zeroes from non zeros for example Input: 1 2 0 0 7 4 42 0 0 0 6 Output: 1 2 7 4 42 6 0 0 0 0 0

Ans.

Sort an array by moving all zeroes to the end.

  • Iterate through the array and move all non-zero elements to the front.

  • Count the number of zeroes encountered and append them at the end of the array.

  • Use two pointers to swap elements and maintain the order.

View 1 answer

Q40. Right View of Binary Tree

Given a binary tree of integers, your task is to output the right view of the tree.

The right view of a binary tree includes the nodes that are visible when the tree is observed from t...read more

Add your answer

Q41. Given a tree, WAP such that a matrix is generated so that: Tree: 1 / 2 3 | / 4 5 6 Matrix: 0 1 2 3 4 5 6 1 0 1 1 1 1 1 2 0 0 0 1 0 0 3 0 0 0 0 1 1 4 0 0 0 0 0 0 5 0 0 0 0 0 0 6 0 0 0 0 0 0

Ans.

WAP to generate a matrix from a given tree.

  • Create a 2D array to store the matrix

  • Traverse the tree and fill the matrix accordingly

  • Use BFS or DFS to traverse the tree

  • The matrix will be symmetric along the diagonal

Add your answer

Q42. All Prime Numbers Less Than or Equal to N

Given a positive integer N, your task is to return all the prime numbers less than or equal to N.

Note:

1) A prime number is a number that has only two factors: 1 and t...read more
Add your answer

Q43. Minimum Number of Platforms Problem

Your task is to determine the minimum number of platforms required at a railway station so that no train has to wait.

Explanation:

Given two arrays:

  • AT - representing the ar...read more
Add your answer

Q44. Problem: Total Area of Overlapping Rectangles

You are given two rectangles situated on a 2-D coordinate plane, which may overlap. Your task is to compute the total area covered by these rectangles.

Input:
The f...read more
Add your answer

Q45. Remove Duplicates Problem Statement

You are given an array of integers. The task is to remove all duplicate elements and return the array while maintaining the order in which the elements were provided.

Example...read more

Add your answer

Q46. Move Zeroes to End Problem Statement

Given an unsorted array of integers, modify the array such that all the zeroes are moved to the end, while maintaining the order of non-zero elements as they appear original...read more

Add your answer

Q47. Remove Consecutive Duplicates Problem Statement

Given a string S, your task is to recursively remove all consecutive duplicate characters from the string.

Input:

String S

Output:

Output string

Constraints:

  • 1 <...read more
Add your answer

Q48. Write a function to know if the check-box is checked in javascript.

Ans.

Function to check if a checkbox is checked in JavaScript

  • Use the 'checked' property of the checkbox element

  • Access the checkbox element using its ID or class name

  • Return true if checked, false if not checked

View 1 answer

Q49. Middle Node of a Linked List Problem Statement

Given the head node of a singly linked list, return a pointer to the middle node of the linked list. If there are an odd number of nodes, return the middle one. If...read more

Add your answer

Q50. Binary Tree Construction from Parent Array

Construct a binary tree from a given array called parent where the parent-child relationship is determined by (PARENT[i], i), indicating that the parent of node i is g...read more

Add your answer

Q51. Merge Sort Problem Statement

You are given a sequence of numbers, ARR. Your task is to return a sorted sequence of ARR in non-descending order using the Merge Sort algorithm.

Explanation:

The Merge Sort algorit...read more

Add your answer

Q52. Build Max Heap Problem Statement

Given an integer array with N elements, the task is to transform this array into a max binary heap structure.

Explanation:

A max-heap is a complete binary tree where each intern...read more

Add your answer
Q53. What is a virtual function in C++?
Add your answer
Q54. How can you make 3 cuts to divide a round cake into 8 equal pieces?
Add your answer

Q55. DFS Traversal Problem Statement

Given an undirected and disconnected graph G(V, E), where V is the number of vertices and E is the number of edges, the connections between vertices are provided in the 'GRAPH' m...read more

Add your answer

Q56. Shape and Method Overriding Problem Statement

Create a base class called Shape that contains a field named shapeType and a method printMyType.

Implement two derived classes:

  • Square: This class inherits from Sh...read more
Add your answer

Q57. what is the difference between Java and C++?

Ans.

Java is platform-independent and uses automatic memory management, while C++ is faster and allows for more control over memory.

  • Java is compiled to bytecode and runs on a virtual machine, while C++ is compiled to machine code.

  • Java has automatic memory management through garbage collection, while C++ requires manual memory management.

  • Java has a simpler syntax and is easier to learn, while C++ has more complex syntax and is more difficult to master.

  • Java is used for web developme...read more

View 1 answer

Q58. When to use List and Vector of Standard Template Library ?

Ans.

List is preferred when frequent insertion and deletion is required. Vector is preferred when random access is required.

  • List is implemented as a doubly-linked list, allowing for efficient insertion and deletion at any position.

  • Vector is implemented as a dynamic array, allowing for efficient random access.

  • Use List when the number of elements is expected to change frequently and the order of elements matters less.

  • Use Vector when the number of elements is fixed or changes infrequ...read more

Add your answer
Q59. How can you measure 45 minutes using two identical wires?
Add your answer

Q60. Different versions of polymorphism, how to solve the problem of multiple inheritance

Ans.

Polymorphism can be achieved through method overloading, method overriding, and interfaces. Multiple inheritance can be solved using interfaces.

  • Method overloading allows multiple methods with the same name but different parameters

  • Method overriding allows a subclass to provide its own implementation of a method already defined in its superclass

  • Interfaces provide a way to achieve multiple inheritance by allowing a class to implement multiple interfaces

  • Diamond problem in multipl...read more

Add your answer

Q61. What is polymorphism? Explain using a real life example

Ans.

Polymorphism is the ability of an object to take on many forms. It allows objects of different classes to be treated as the same type.

  • Polymorphism allows a single interface to be used for different types of objects.

  • It enables code reusability and flexibility in object-oriented programming.

  • For example, a parent class 'Animal' can have multiple child classes like 'Dog', 'Cat', and 'Bird'. They can all be treated as 'Animal' objects.

  • Each child class can have its own implementati...read more

Add your answer

Q62. Write a query to find name of a player with maximum number of runs in a match on given date and given venue

Ans.

Query to find player with maximum runs in a match on given date and venue

  • Use MAX() function to find maximum runs

  • Join tables for player name, match details and runs scored

  • Filter by given date and venue

  • Order by runs scored and limit to 1 result

Add your answer

Q63. Different types of polymorphism, the diamond problem, and how can it be avoided?

Ans.

Polymorphism refers to the ability of an object to take on many forms. The diamond problem occurs in multiple inheritance.

  • Polymorphism can be achieved through method overloading and method overriding.

  • Method overloading allows multiple methods with the same name but different parameters.

  • Method overriding occurs when a subclass provides a specific implementation of a method already defined in its superclass.

  • The diamond problem arises in languages that support multiple inheritan...read more

Add your answer
Q64. What are the deadlock avoidance schemes?
Add your answer

Q65. How to handle a team and areas of implovement for each team under the managera which is approved by Director

Ans.

To handle a team, identify areas of improvement for each team member and get approval from the Director.

  • Regularly communicate with team members to understand their strengths and weaknesses.

  • Provide constructive feedback and coaching to help team members improve.

  • Set clear goals and expectations for each team member.

  • Encourage collaboration and teamwork within the team.

  • Get approval from the Director before implementing any major changes or improvements.

Add your answer

Q66. What is foreign key? can foreign key be Null?

Ans.

Foreign key is a column in a table that refers to the primary key of another table.

  • It establishes a relationship between two tables.

  • It ensures referential integrity.

  • It can be null, but only if it is defined as nullable.

  • It helps in joining tables.

  • Example: Customer table has a foreign key to the Order table's primary key.

  • Example: Order table's foreign key can be null if the order has not been placed by any customer yet.

Add your answer

Q67. What is normalization? why should we do normalization?

Ans.

Normalization is the process of organizing data in a database to reduce redundancy and improve data integrity.

  • Normalization involves breaking down a database into smaller, more manageable tables.

  • It helps to eliminate data redundancy and inconsistencies.

  • Normalization ensures that each table has a primary key and that data is stored in a logical and consistent manner.

  • It improves data integrity and reduces the likelihood of errors and inconsistencies.

  • Normalization is important f...read more

Add your answer

Q68. Normalized form is better or storing in a single table/ 2 tables is better?

Ans.

Normalized form is better for data consistency and scalability.

  • Normalized form reduces data redundancy and ensures data consistency.

  • Normalized form allows for easier scalability and maintenance.

  • Single table/2 tables may be appropriate for small, simple datasets.

  • Normalized form may require more complex queries to retrieve data.

  • Normalized form may require more storage space due to additional tables.

  • Example: Normalized form for a customer database would have separate tables for ...read more

Add your answer

Q69. What do you mean by Linux? Explain its features.

Ans.

Linux is an open-source operating system known for its stability, security, and flexibility.

  • Linux is a Unix-like operating system that was developed as a free and open-source software.

  • It provides a stable and secure environment for running applications and services.

  • Linux supports a wide range of hardware architectures and has a large community of developers and users.

  • It offers a command-line interface, as well as various graphical user interfaces.

  • Linux is highly customizable ...read more

View 2 more answers

Q70. Puzzle: Four people need to cross a rickety bridge at night. Unfortunately, they have only one torch and the bridge is too dangerous to cross without one. The bridge is only strong enough to support two people...

read more
Ans.

The shortest time needed for all four people to cross the bridge is 17 minutes.

  • First, the 1 min and 2 min person cross the bridge (2 mins).

  • Then, the 1 min person goes back with the torch (1 min).

  • Next, the 7 min and 10 min person cross the bridge (10 mins).

  • Finally, the 2 min person goes back with the torch (2 mins).

  • Total time taken: 2 + 1 + 10 + 2 = 17 minutes.

Add your answer
Q71. What is function overloading?
Add your answer

Q72. Which data structures the candidate is confident in development and why?

Ans.

I am confident in developing arrays, linked lists, and hash tables.

  • Arrays are simple and efficient for storing and accessing data.

  • Linked lists are useful for dynamic data structures and efficient insertion/deletion.

  • Hash tables provide fast access to data with key-value pairs.

Add your answer

Q73. What is Linux Shell? What types of Shells are there in Linux?

Ans.

Linux Shell is a command-line interpreter that allows users to interact with the operating system. There are various types of shells in Linux.

  • Linux Shell is a program that interprets user commands and executes them.

  • It provides a command-line interface for users to interact with the Linux operating system.

  • Shells can be used to run scripts, automate tasks, and manage system resources.

  • Some popular shells in Linux are Bash (Bourne Again SHell), C Shell (csh), Korn Shell (ksh), an...read more

View 1 answer

Q74. Find Minimum and Maximum of an array in only one traversal

Ans.

Find the minimum and maximum values in an array in a single traversal.

  • Initialize min and max variables with the first element of the array

  • Iterate through the array and update min and max if a smaller or larger value is found

  • Return the min and max values

Add your answer

Q75. Why String" class is immutable in Java environment?

Ans.

String class is immutable in Java to ensure security, thread-safety, and performance.

  • Immutable objects are thread-safe as they cannot be modified by multiple threads simultaneously.

  • Immutable objects are also secure as they cannot be modified by malicious code.

  • String pool is possible because of immutability, which improves performance by reducing memory usage.

  • StringBuffer and StringBuilder classes are used for mutable string operations.

Add your answer

Q76. What is C++? Difference between deep and shallow copy?

Ans.

C++ is a programming language. Deep copy creates a new object and copies all values, while shallow copy creates a reference to the original object.

  • C++ is a general-purpose programming language

  • Deep copy creates a new object with its own copy of the data

  • Shallow copy creates a reference to the original object

  • Deep copy is safer but can be slower and consume more memory

  • Shallow copy is faster but can lead to unexpected behavior if the original object is modified

Add your answer

Q77. Use of 'finally' block in Java? When finally" block is not called in which cases?

Ans.

The 'finally' block in Java is used to execute code after try-catch blocks, even if an exception is thrown.

  • The 'finally' block is always executed, regardless of whether an exception is thrown or caught.

  • It is used to release resources like database connections, network connections, etc.

  • If the JVM exits while the try or catch code is being executed, then the 'finally' block may not execute.

  • If the thread executing the try or catch code is interrupted or killed, the 'finally' blo...read more

Add your answer

Q78. Count all pairs of numbers from a list where the ending digit of the ith number equals the starting digit of the jth number. Example [122, 21, 21, 23] should have 5 pairs (122, 21), (122, 21), (122, 23), (21, 1...

read more
Ans.

Count pairs of numbers where ending digit of ith number equals starting digit of jth number.

  • Iterate through each pair of numbers in the list

  • Check if the ending digit of the ith number equals the starting digit of the jth number

  • Increment the count if the condition is met

Add your answer

Q79. Given a chessboard find maximum number of squares present

Ans.

Given a chessboard, find the maximum number of squares present.

  • Start with the smallest square and count all possible squares

  • Use the formula n*(n+1)*(2n+1)/6 to find the total number of squares in an n x n chessboard

  • Add up the squares of all sizes from 1 to n to get the maximum number of squares

  • For example, an 8 x 8 chessboard has 204 squares

View 1 answer
Q80. What is a clustered index?
Add your answer
Q81. What is structure padding?
Add your answer

Q82. Write a program for an operator(=) such that it behaves differently for integer and character

Ans.

The program should differentiate between integers and characters when using the assignment operator (=).

  • Check the data type of the variable before assigning a value.

  • Use conditional statements to perform different actions based on the data type.

  • For integers, assign the value directly. For characters, convert the character to its ASCII value and assign it.

Add your answer

Q83. Can unique key be a primary key?

Ans.

Yes, a unique key can be a primary key.

  • A primary key is a unique identifier for a record in a table.

  • A unique key is a constraint that ensures the values in a column are unique.

  • A unique key can be used as a primary key if it meets the requirements.

  • A primary key cannot have NULL values, while a unique key can have one NULL value.

Add your answer

Q84. You are given 3 boxes containing apples, oranges and apples oranges mixed. All boxes are labeled incorrectly. You can open only 1 box. Find out which box will you open to correctly identify the boxes.

Add your answer

Q85. How to implement queue using stack?

Ans.

Implementing a queue using stack involves using two stacks to simulate the behavior of a queue.

  • Create two stacks, one for enqueue and one for dequeue operations.

  • For enqueue operation, push the element onto the enqueue stack.

  • For dequeue operation, if the dequeue stack is empty, pop all elements from the enqueue stack and push onto the dequeue stack.

  • Pop the top element from the dequeue stack for dequeue operation.

Add your answer
Q86. What is a semaphore?
Add your answer

Q87. If you have 1 million requests how will you manage that

Ans.

I would use load balancing, caching, and scaling techniques to manage the 1 million requests.

  • Implement load balancing to distribute requests evenly across multiple servers.

  • Utilize caching to store frequently accessed data and reduce response times.

  • Scale horizontally by adding more servers to handle the increased load.

  • Optimize code and database queries to improve performance.

  • Monitor system performance and make adjustments as needed.

Add your answer

Q88. Given a chessboard find the maximum number of squares present?

Ans.

The maximum number of squares on a chessboard is 64.

  • The chessboard has 64 squares in total.

  • The number of squares on a chessboard can be calculated using the formula n^2, where n is the number of rows or columns.

  • In this case, n = 8 (8 rows and 8 columns), so the maximum number of squares is 8^2 = 64.

Add your answer

Q89. Find Min and Max of an array in only one traversal

Ans.

To find min and max of an array in one traversal, initialize min and max to first element and compare with rest.

  • Initialize min and max to first element of array

  • Traverse the array and compare each element with min and max

  • Update min and max accordingly

  • Return min and max

Add your answer

Q90. What do you mean by a Process States in Linux?

Ans.

Process states in Linux refer to the different states that a process can be in during its execution.

  • The process states in Linux include running, waiting, sleeping, stopped, and zombie.

  • Running state indicates that the process is currently being executed by the CPU.

  • Waiting state means that the process is waiting for a particular event or resource to become available.

  • Sleeping state occurs when a process voluntarily gives up the CPU and waits for a specific condition to be satisf...read more

View 1 answer

Q91. Find the repeated number in a list of contagious numbers.

Ans.

Find the repeated number in a list of contagious numbers.

  • Iterate through the list and keep track of the numbers seen so far

  • If a number is already seen, it is the repeated number

  • Use a hash set or dictionary to efficiently check for duplicates

  • If the list is sorted, use two pointers to find the repeated number

View 1 answer
Q92. Can you design an ER diagram for an online shopping portal?
Add your answer
Q93. What is the difference between public and private cloud?
Add your answer

Q94. If you are using DMO to migrate a SAP system with sql DB on windows to HANA DB on linux, how the SUM will run? As there is a different SUM for windows and linux, will it use 2 different SUM in this case?

Ans.

SUM will use a single SUM tool for the migration from SQL DB on Windows to HANA DB on Linux.

  • SUM tool is platform-independent and can be used for migrations between different operating systems.

  • The SUM tool will handle the conversion process seamlessly without the need for separate tools for Windows and Linux.

  • The migration process will involve steps to convert the database from SQL to HANA while also transitioning the operating system from Windows to Linux.

Add your answer

Q95. Given a string “I LOVE CODING”, print “CODING LOVE I”

Ans.

The given string needs to be reversed and the words need to be rearranged.

  • Split the string into an array of words

  • Reverse the array

  • Join the array elements with a space in between

Add your answer

Q96. Difference between deep and shallow copy?

Ans.

Deep copy creates a new object with a new memory address, while shallow copy creates a new reference to the same memory address.

  • Deep copy duplicates the object and all its nested objects, while shallow copy only duplicates the top-level object.

  • Deep copy is slower and more memory-intensive than shallow copy.

  • Shallow copy can lead to unexpected behavior if the original object is modified.

  • In Python, deep copy can be achieved using the deepcopy() function from the copy module, whi...read more

Add your answer

Q97. How would you convince the client who is already frustrated with the existing resources

Ans.

I would empathize with the client and offer solutions to address their frustrations.

  • Listen actively to their concerns and acknowledge their frustrations

  • Offer alternative solutions that can improve their current situation

  • Provide examples of successful implementations with similar clients

  • Assure them that their satisfaction is a top priority

  • Collaborate with them to create a customized plan that meets their specific needs

View 1 answer
Q98. What are template classes? Can you write a program for the assignment operator '=' for a template class such that it behaves differently for 'int' and 'char *'?
Add your answer

Q99. Give me a step by step procedure of how will you download an attachment from an email. What are the differences between C and C++?

Ans.

To download an attachment from an email, you need to open the email, locate the attachment, click on it, and then choose the option to download it.

  • Open the email containing the attachment

  • Locate the attachment within the email

  • Click on the attachment to open it

  • Choose the option to download the attachment

  • Save the attachment to your desired location on your device

Add your answer

Q100. What is primary key? unique key?

Ans.

Primary key is a column or set of columns that uniquely identifies each row in a table. Unique key is a constraint that ensures uniqueness of values in a column or set of columns.

  • Primary key is used to enforce data integrity and ensure that each row in a table can be uniquely identified.

  • Unique key is used to ensure that no two rows in a table have the same values in a column or set of columns.

  • Primary key can be a single column or a combination of columns, while unique key can...read more

Add your answer
1
2
3
4

More about working at SAP

Top Rated Large Company - 2024
Top Rated Internet/Product Company - 2024
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos

Interview Process at Axens India

based on 189 interviews
Interview experience
4.3
Good
View more
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Interview Questions from Similar Companies

3.3
 • 308 Interview Questions
3.5
 • 307 Interview Questions
4.3
 • 178 Interview Questions
3.6
 • 160 Interview Questions
4.2
 • 153 Interview Questions
3.7
 • 143 Interview Questions
View all
Top SAP Interview Questions And Answers
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
70 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter