SAP
300+ Axens India Interview Questions and Answers
Q1. Duplicate Integer in Array
Given an array ARR
of size N
, containing each number between 1 and N-1
at least once, identify the single integer that appears twice.
Input:
The first line contains an integer, 'T', r...read more
Q2. Given a 10 digit number, sort the individual digits of the number.
Sort the individual digits of a 10 digit number.
Convert the number to a string to access individual digits
Use a sorting algorithm to sort the digits
Convert the sorted digits back to a number
Q3. Reverse Linked List Problem Statement
Given a singly linked list of integers, return the head of the reversed linked list.
Example:
Initial linked list: 1 -> 2 -> 3 -> 4 -> NULL
Reversed linked list: 4 -> 3 -> 2...read more
Q4. Multilevel Inheritance Implementation
Create a series of classes to demonstrate multilevel inheritance.
Explanation:
Create three classes to illustrate multilevel inheritance.
GrandFather
: This class should ha...read more
Q5. Longest Substring Without Repeating Characters Problem Statement
Given a string S
of length L
, determine the length of the longest substring that contains no repeating characters.
Example:
Input:
"abacb"
Output...read more
Q6. Subset Sum Problem Statement
Given an array of integers, find the sum of all subsets in non-decreasing order of the given array.
Example:
Input:
N = 3, array = [1, 2]
Output:
[0, 1, 2, 3]
Explanation:
The subse...read more
Q7. Overlapping Intervals Problem Statement
You are given the start and end times of 'N' intervals. Write a function to determine if any two intervals overlap.
Note:
If an interval ends at time T and another interv...read more
Q8. Factorial of a Number Problem Statement
You are provided with an integer 'N'. Your task is to calculate and print the factorial of 'N'. The factorial of a number 'N', denoted as N!, is the product of all positi...read more
Q9. Zig-Zag String Problem Statement
Given a string STR
of size N
and an integer M
representing the number of rows in the zig-zag pattern, return the string formed by concatenating all rows when the string STR
is w...read more
Q10. Maximum of All Subarrays of Size k
Given an array of 'N' non-negative integers and an integer 'K', your task is to find the maximum elements for each subarray of size 'K'.
Input:
The first line contains an inte...read more
Q11. Level Order Traversal Problem Statement
Given a binary tree of integers, return the level order traversal of the binary tree.
Input:
The first line contains an integer 'T', representing the number of test cases...read more
Q12. Covid Vaccination Distribution Problem
As the Government ramps up vaccination drives to combat the second wave of Covid-19, you are tasked with helping plan an effective vaccination schedule. Your goal is to ma...read more
Q13. Longest Increasing Subsequence Problem Statement
Given 'N' students standing in a row with specific heights, your task is to find the length of the longest strictly increasing subsequence of their heights, ensu...read more
Q14. Prime Numbers Identification
Given a positive integer N
, your task is to identify all prime numbers less than or equal to N
.
Explanation:
A prime number is a natural number greater than 1 that has no positive d...read more
Q15. Longest Unique Substring Problem Statement
Given a string input of length 'n', your task is to determine the length of the longest substring that contains no repeating characters.
Explanation:
A substring is a ...read more
Q16. LCA of Binary Tree Problem Statement
You are given a binary tree consisting of distinct integers and two nodes, X
and Y
. Your task is to find and return the Lowest Common Ancestor (LCA) of these two nodes.
The ...read more
Q17. Next Permutation Problem Statement
You are given a permutation of 'N' integers. A sequence of 'N' integers is considered a permutation if it includes all integers from 1 to 'N' exactly once. Your task is to rea...read more
Q18. BFS Traversal in a Graph
Given an undirected and disconnected graph G(V, E) where V vertices are numbered from 0 to V-1, and E represents edges, your task is to output the BFS traversal starting from the 0th ve...read more
Q19. Find All Anagrams Problem Statement
Given a string STR and a non-empty string PTR, identify all the starting indices of anagrams of PTR within STR.
Explanation:
An anagram of a string is another string that can...read more
Q20. Reverse the String Problem Statement
You are given a string STR
which contains alphabets, numbers, and special characters. Your task is to reverse the string.
Example:
Input:
STR = "abcde"
Output:
"edcba"
Input...read more
Q21. Find the Middle of a Linked List
This problem requires you to return a pointer that references the middle node of a singly linked list.
Explanation:
If the number of elements in the linked list is odd, return t...read more
Q22. Print Permutations - String Problem Statement
Given an input string 'S', you are tasked with finding and returning all possible permutations of the input string.
Input:
The first and only line of input contains...read more
Q23. Binary Pattern Problem Statement
Given an input integer N
, your task is to print a binary pattern as follows:
Example:
Input:
N = 4
Output:
1111
000
11
0
Explanation:
The first line contains 'N' 1s. The next line ...read more
Q24. Boundary Traversal of Binary Tree Problem Statement
Given a binary tree consisting of integers, your task is to provide the boundary nodes of this tree in an anti-clockwise direction, starting with the root nod...read more
Q25. Nth Fibonacci Number Problem Statement
Calculate the Nth term in the Fibonacci sequence, where the sequence is defined as follows: F(n) = F(n-1) + F(n-2)
, with initial conditions F(1) = F(2) = 1
.
Input:
The inp...read more
Q26. How do you tackle something that you can't find a solution to?
When faced with an unsolvable problem, I break it down, research, seek help, experiment, and iterate until a solution is found.
Break down the problem into smaller, manageable parts
Research and gather information related to the problem
Seek help from colleagues, online communities, or experts
Experiment with different approaches or solutions
Iterate and refine the solution based on feedback and results
Q27. Reverse a Linked List Iteratively
You are given a singly linked list of integers. The task is to return the head of the reversed linked list.
Example:
Input:
The given linked list is 1 -> 2 -> 3 -> 4 -> NULL.
O...read more
Q28. Uncommon Characters Problem Statement
Given two strings str1
and str2
containing only lowercase alphabets, find the characters that are unique to each string, i.e., characters that occur in only one of the stri...read more
Q29. Discuss a DBMS consisting of college faculty, professors, courses and students.
A DBMS for managing college faculty, professors, courses, and students.
The DBMS should have tables for faculty, professors, courses, and students.
Each table should have appropriate attributes to store relevant information.
Relationships can be established between tables using foreign keys.
Queries can be used to retrieve information about faculty, professors, courses, and students.
The DBMS can be used to track enrollment, grades, and other relevant data.
Q30. Bubble Sort Problem Statement
Sort the given unsorted array consisting of N non-negative integers in non-decreasing order using the Bubble Sort algorithm.
Input:
The first line contains an integer 'T' represent...read more
Q31. Floyd Warshall Algorithm Problem
You are given a directed weighted graph with 'N' vertices, labeled from 1 to 'N', and 'M' edges. Each edge connects two nodes 'u' and 'v' with a weight 'w', representing the dis...read more
Q32. Subarray Sums I Problem Statement
You are provided with an array of positive integers ARR
that represents the strengths of different “jutsus” (ninja techniques). You are also given the strength of the enemy S
, ...read more
Q33. Inorder Successor in a Binary Tree
Given a node in an arbitrary binary tree, find its inorder successor. The successor is defined as the node that appears immediately after the given node in the in-order traver...read more
Q34. Rearrange Array: Move Negative Numbers to the Beginning
Given an array ARR
consisting of N
integers, rearrange the elements such that all negative numbers are located before all positive numbers. The order of e...read more
Q35. Sum of Maximum and Minimum Elements Problem Statement
Given an array ARR
of size N
, your objective is to determine the sum of the largest and smallest elements within the array.
Follow Up:
Can you achieve the a...read more
Q36. Write code for LCA in Binary Search Tree.
The code for finding the Lowest Common Ancestor (LCA) in a Binary Search Tree (BST).
Start from the root node and compare it with the given two nodes.
If both nodes are smaller than the current node, move to the left subtree.
If both nodes are greater than the current node, move to the right subtree.
If one node is smaller and the other is greater, then the current node is the LCA.
Continue this process until the LCA is found.
Q37. Swap Numbers Without Temporary Variable
Your task is to interchange the values of two numbers given as variables 'X' and 'Y' without using a temporary variable or any additional variable.
Explanation:
You need ...read more
Q38. Design a parking lot? Design should include -Logic Flow Diagram -E-R diagram (very important) -DB tables with relations between them, preferably normalized -Commands for transaction with tables
Design a parking lot with Logic Flow Diagram, E-R diagram, DB tables with relations, and commands for transactions.
Identify the types of vehicles that will use the parking lot
Determine the number of parking spaces needed for each vehicle type
Create a flow diagram to show the process of entering and exiting the parking lot
Design an E-R diagram to show the relationships between entities such as vehicles, parking spaces, and transactions
Normalize the DB tables to reduce redundan...read more
Q39. Given an array, sort the zeroes from non zeros for example Input: 1 2 0 0 7 4 42 0 0 0 6 Output: 1 2 7 4 42 6 0 0 0 0 0
Sort an array by moving all zeroes to the end.
Iterate through the array and move all non-zero elements to the front.
Count the number of zeroes encountered and append them at the end of the array.
Use two pointers to swap elements and maintain the order.
Q40. Right View of Binary Tree
Given a binary tree of integers, your task is to output the right view of the tree.
The right view of a binary tree includes the nodes that are visible when the tree is observed from t...read more
Q41. Given a tree, WAP such that a matrix is generated so that: Tree: 1 / 2 3 | / 4 5 6 Matrix: 0 1 2 3 4 5 6 1 0 1 1 1 1 1 2 0 0 0 1 0 0 3 0 0 0 0 1 1 4 0 0 0 0 0 0 5 0 0 0 0 0 0 6 0 0 0 0 0 0
WAP to generate a matrix from a given tree.
Create a 2D array to store the matrix
Traverse the tree and fill the matrix accordingly
Use BFS or DFS to traverse the tree
The matrix will be symmetric along the diagonal
Q42. All Prime Numbers Less Than or Equal to N
Given a positive integer N
, your task is to return all the prime numbers less than or equal to N
.
Note:
1) A prime number is a number that has only two factors: 1 and t...read more
Q43. Minimum Number of Platforms Problem
Your task is to determine the minimum number of platforms required at a railway station so that no train has to wait.
Explanation:
Given two arrays:
AT
- representing the ar...read more
Q44. Problem: Total Area of Overlapping Rectangles
You are given two rectangles situated on a 2-D coordinate plane, which may overlap. Your task is to compute the total area covered by these rectangles.
Input:
The f...read more
Q45. Remove Duplicates Problem Statement
You are given an array of integers. The task is to remove all duplicate elements and return the array while maintaining the order in which the elements were provided.
Example...read more
Q46. Move Zeroes to End Problem Statement
Given an unsorted array of integers, modify the array such that all the zeroes are moved to the end, while maintaining the order of non-zero elements as they appear original...read more
Q47. Remove Consecutive Duplicates Problem Statement
Given a string S, your task is to recursively remove all consecutive duplicate characters from the string.
Input:
String S
Output:
Output string
Constraints:
- 1 <...read more
Q48. Write a function to know if the check-box is checked in javascript.
Function to check if a checkbox is checked in JavaScript
Use the 'checked' property of the checkbox element
Access the checkbox element using its ID or class name
Return true if checked, false if not checked
Q49. Middle Node of a Linked List Problem Statement
Given the head node of a singly linked list, return a pointer to the middle node of the linked list. If there are an odd number of nodes, return the middle one. If...read more
Q50. Binary Tree Construction from Parent Array
Construct a binary tree from a given array called parent
where the parent-child relationship is determined by (PARENT[i], i), indicating that the parent of node i is g...read more
Q51. Merge Sort Problem Statement
You are given a sequence of numbers, ARR
. Your task is to return a sorted sequence of ARR
in non-descending order using the Merge Sort algorithm.
Explanation:
The Merge Sort algorit...read more
Q52. Build Max Heap Problem Statement
Given an integer array with N elements, the task is to transform this array into a max binary heap structure.
Explanation:
A max-heap is a complete binary tree where each intern...read more
Q55. DFS Traversal Problem Statement
Given an undirected and disconnected graph G(V, E)
, where V
is the number of vertices and E
is the number of edges, the connections between vertices are provided in the 'GRAPH' m...read more
Q56. Shape and Method Overriding Problem Statement
Create a base class called Shape
that contains a field named shapeType
and a method printMyType
.
Implement two derived classes:
- Square: This class inherits from
Sh...read more
Q57. what is the difference between Java and C++?
Java is platform-independent and uses automatic memory management, while C++ is faster and allows for more control over memory.
Java is compiled to bytecode and runs on a virtual machine, while C++ is compiled to machine code.
Java has automatic memory management through garbage collection, while C++ requires manual memory management.
Java has a simpler syntax and is easier to learn, while C++ has more complex syntax and is more difficult to master.
Java is used for web developme...read more
Q58. When to use List and Vector of Standard Template Library ?
List is preferred when frequent insertion and deletion is required. Vector is preferred when random access is required.
List is implemented as a doubly-linked list, allowing for efficient insertion and deletion at any position.
Vector is implemented as a dynamic array, allowing for efficient random access.
Use List when the number of elements is expected to change frequently and the order of elements matters less.
Use Vector when the number of elements is fixed or changes infrequ...read more
Q60. Different versions of polymorphism, how to solve the problem of multiple inheritance
Polymorphism can be achieved through method overloading, method overriding, and interfaces. Multiple inheritance can be solved using interfaces.
Method overloading allows multiple methods with the same name but different parameters
Method overriding allows a subclass to provide its own implementation of a method already defined in its superclass
Interfaces provide a way to achieve multiple inheritance by allowing a class to implement multiple interfaces
Diamond problem in multipl...read more
Q61. What is polymorphism? Explain using a real life example
Polymorphism is the ability of an object to take on many forms. It allows objects of different classes to be treated as the same type.
Polymorphism allows a single interface to be used for different types of objects.
It enables code reusability and flexibility in object-oriented programming.
For example, a parent class 'Animal' can have multiple child classes like 'Dog', 'Cat', and 'Bird'. They can all be treated as 'Animal' objects.
Each child class can have its own implementati...read more
Q62. Write a query to find name of a player with maximum number of runs in a match on given date and given venue
Query to find player with maximum runs in a match on given date and venue
Use MAX() function to find maximum runs
Join tables for player name, match details and runs scored
Filter by given date and venue
Order by runs scored and limit to 1 result
Q63. Different types of polymorphism, the diamond problem, and how can it be avoided?
Polymorphism refers to the ability of an object to take on many forms. The diamond problem occurs in multiple inheritance.
Polymorphism can be achieved through method overloading and method overriding.
Method overloading allows multiple methods with the same name but different parameters.
Method overriding occurs when a subclass provides a specific implementation of a method already defined in its superclass.
The diamond problem arises in languages that support multiple inheritan...read more
Q65. How to handle a team and areas of implovement for each team under the managera which is approved by Director
To handle a team, identify areas of improvement for each team member and get approval from the Director.
Regularly communicate with team members to understand their strengths and weaknesses.
Provide constructive feedback and coaching to help team members improve.
Set clear goals and expectations for each team member.
Encourage collaboration and teamwork within the team.
Get approval from the Director before implementing any major changes or improvements.
Q66. What is foreign key? can foreign key be Null?
Foreign key is a column in a table that refers to the primary key of another table.
It establishes a relationship between two tables.
It ensures referential integrity.
It can be null, but only if it is defined as nullable.
It helps in joining tables.
Example: Customer table has a foreign key to the Order table's primary key.
Example: Order table's foreign key can be null if the order has not been placed by any customer yet.
Q67. What is normalization? why should we do normalization?
Normalization is the process of organizing data in a database to reduce redundancy and improve data integrity.
Normalization involves breaking down a database into smaller, more manageable tables.
It helps to eliminate data redundancy and inconsistencies.
Normalization ensures that each table has a primary key and that data is stored in a logical and consistent manner.
It improves data integrity and reduces the likelihood of errors and inconsistencies.
Normalization is important f...read more
Q68. Normalized form is better or storing in a single table/ 2 tables is better?
Normalized form is better for data consistency and scalability.
Normalized form reduces data redundancy and ensures data consistency.
Normalized form allows for easier scalability and maintenance.
Single table/2 tables may be appropriate for small, simple datasets.
Normalized form may require more complex queries to retrieve data.
Normalized form may require more storage space due to additional tables.
Example: Normalized form for a customer database would have separate tables for ...read more
Q69. What do you mean by Linux? Explain its features.
Linux is an open-source operating system known for its stability, security, and flexibility.
Linux is a Unix-like operating system that was developed as a free and open-source software.
It provides a stable and secure environment for running applications and services.
Linux supports a wide range of hardware architectures and has a large community of developers and users.
It offers a command-line interface, as well as various graphical user interfaces.
Linux is highly customizable ...read more
Q70. Puzzle: Four people need to cross a rickety bridge at night. Unfortunately, they have only one torch and the bridge is too dangerous to cross without one. The bridge is only strong enough to support two people...
read moreThe shortest time needed for all four people to cross the bridge is 17 minutes.
First, the 1 min and 2 min person cross the bridge (2 mins).
Then, the 1 min person goes back with the torch (1 min).
Next, the 7 min and 10 min person cross the bridge (10 mins).
Finally, the 2 min person goes back with the torch (2 mins).
Total time taken: 2 + 1 + 10 + 2 = 17 minutes.
Q72. Which data structures the candidate is confident in development and why?
I am confident in developing arrays, linked lists, and hash tables.
Arrays are simple and efficient for storing and accessing data.
Linked lists are useful for dynamic data structures and efficient insertion/deletion.
Hash tables provide fast access to data with key-value pairs.
Q73. What is Linux Shell? What types of Shells are there in Linux?
Linux Shell is a command-line interpreter that allows users to interact with the operating system. There are various types of shells in Linux.
Linux Shell is a program that interprets user commands and executes them.
It provides a command-line interface for users to interact with the Linux operating system.
Shells can be used to run scripts, automate tasks, and manage system resources.
Some popular shells in Linux are Bash (Bourne Again SHell), C Shell (csh), Korn Shell (ksh), an...read more
Q74. Find Minimum and Maximum of an array in only one traversal
Find the minimum and maximum values in an array in a single traversal.
Initialize min and max variables with the first element of the array
Iterate through the array and update min and max if a smaller or larger value is found
Return the min and max values
Q75. Why String" class is immutable in Java environment?
String class is immutable in Java to ensure security, thread-safety, and performance.
Immutable objects are thread-safe as they cannot be modified by multiple threads simultaneously.
Immutable objects are also secure as they cannot be modified by malicious code.
String pool is possible because of immutability, which improves performance by reducing memory usage.
StringBuffer and StringBuilder classes are used for mutable string operations.
Q76. What is C++? Difference between deep and shallow copy?
C++ is a programming language. Deep copy creates a new object and copies all values, while shallow copy creates a reference to the original object.
C++ is a general-purpose programming language
Deep copy creates a new object with its own copy of the data
Shallow copy creates a reference to the original object
Deep copy is safer but can be slower and consume more memory
Shallow copy is faster but can lead to unexpected behavior if the original object is modified
Q77. Use of 'finally' block in Java? When finally" block is not called in which cases?
The 'finally' block in Java is used to execute code after try-catch blocks, even if an exception is thrown.
The 'finally' block is always executed, regardless of whether an exception is thrown or caught.
It is used to release resources like database connections, network connections, etc.
If the JVM exits while the try or catch code is being executed, then the 'finally' block may not execute.
If the thread executing the try or catch code is interrupted or killed, the 'finally' blo...read more
Q78. Count all pairs of numbers from a list where the ending digit of the ith number equals the starting digit of the jth number. Example [122, 21, 21, 23] should have 5 pairs (122, 21), (122, 21), (122, 23), (21, 1...
read moreCount pairs of numbers where ending digit of ith number equals starting digit of jth number.
Iterate through each pair of numbers in the list
Check if the ending digit of the ith number equals the starting digit of the jth number
Increment the count if the condition is met
Q79. Given a chessboard find maximum number of squares present
Given a chessboard, find the maximum number of squares present.
Start with the smallest square and count all possible squares
Use the formula n*(n+1)*(2n+1)/6 to find the total number of squares in an n x n chessboard
Add up the squares of all sizes from 1 to n to get the maximum number of squares
For example, an 8 x 8 chessboard has 204 squares
Q82. Write a program for an operator(=) such that it behaves differently for integer and character
The program should differentiate between integers and characters when using the assignment operator (=).
Check the data type of the variable before assigning a value.
Use conditional statements to perform different actions based on the data type.
For integers, assign the value directly. For characters, convert the character to its ASCII value and assign it.
Q83. Can unique key be a primary key?
Yes, a unique key can be a primary key.
A primary key is a unique identifier for a record in a table.
A unique key is a constraint that ensures the values in a column are unique.
A unique key can be used as a primary key if it meets the requirements.
A primary key cannot have NULL values, while a unique key can have one NULL value.
Q84. You are given 3 boxes containing apples, oranges and apples oranges mixed. All boxes are labeled incorrectly. You can open only 1 box. Find out which box will you open to correctly identify the boxes.
Q85. How to implement queue using stack?
Implementing a queue using stack involves using two stacks to simulate the behavior of a queue.
Create two stacks, one for enqueue and one for dequeue operations.
For enqueue operation, push the element onto the enqueue stack.
For dequeue operation, if the dequeue stack is empty, pop all elements from the enqueue stack and push onto the dequeue stack.
Pop the top element from the dequeue stack for dequeue operation.
Q87. If you have 1 million requests how will you manage that
I would use load balancing, caching, and scaling techniques to manage the 1 million requests.
Implement load balancing to distribute requests evenly across multiple servers.
Utilize caching to store frequently accessed data and reduce response times.
Scale horizontally by adding more servers to handle the increased load.
Optimize code and database queries to improve performance.
Monitor system performance and make adjustments as needed.
Q88. Given a chessboard find the maximum number of squares present?
The maximum number of squares on a chessboard is 64.
The chessboard has 64 squares in total.
The number of squares on a chessboard can be calculated using the formula n^2, where n is the number of rows or columns.
In this case, n = 8 (8 rows and 8 columns), so the maximum number of squares is 8^2 = 64.
Q89. Find Min and Max of an array in only one traversal
To find min and max of an array in one traversal, initialize min and max to first element and compare with rest.
Initialize min and max to first element of array
Traverse the array and compare each element with min and max
Update min and max accordingly
Return min and max
Q90. What do you mean by a Process States in Linux?
Process states in Linux refer to the different states that a process can be in during its execution.
The process states in Linux include running, waiting, sleeping, stopped, and zombie.
Running state indicates that the process is currently being executed by the CPU.
Waiting state means that the process is waiting for a particular event or resource to become available.
Sleeping state occurs when a process voluntarily gives up the CPU and waits for a specific condition to be satisf...read more
Q91. Find the repeated number in a list of contagious numbers.
Find the repeated number in a list of contagious numbers.
Iterate through the list and keep track of the numbers seen so far
If a number is already seen, it is the repeated number
Use a hash set or dictionary to efficiently check for duplicates
If the list is sorted, use two pointers to find the repeated number
Q94. If you are using DMO to migrate a SAP system with sql DB on windows to HANA DB on linux, how the SUM will run? As there is a different SUM for windows and linux, will it use 2 different SUM in this case?
SUM will use a single SUM tool for the migration from SQL DB on Windows to HANA DB on Linux.
SUM tool is platform-independent and can be used for migrations between different operating systems.
The SUM tool will handle the conversion process seamlessly without the need for separate tools for Windows and Linux.
The migration process will involve steps to convert the database from SQL to HANA while also transitioning the operating system from Windows to Linux.
Q95. Given a string “I LOVE CODING”, print “CODING LOVE I”
The given string needs to be reversed and the words need to be rearranged.
Split the string into an array of words
Reverse the array
Join the array elements with a space in between
Q96. Difference between deep and shallow copy?
Deep copy creates a new object with a new memory address, while shallow copy creates a new reference to the same memory address.
Deep copy duplicates the object and all its nested objects, while shallow copy only duplicates the top-level object.
Deep copy is slower and more memory-intensive than shallow copy.
Shallow copy can lead to unexpected behavior if the original object is modified.
In Python, deep copy can be achieved using the deepcopy() function from the copy module, whi...read more
Q97. How would you convince the client who is already frustrated with the existing resources
I would empathize with the client and offer solutions to address their frustrations.
Listen actively to their concerns and acknowledge their frustrations
Offer alternative solutions that can improve their current situation
Provide examples of successful implementations with similar clients
Assure them that their satisfaction is a top priority
Collaborate with them to create a customized plan that meets their specific needs
Q99. Give me a step by step procedure of how will you download an attachment from an email. What are the differences between C and C++?
To download an attachment from an email, you need to open the email, locate the attachment, click on it, and then choose the option to download it.
Open the email containing the attachment
Locate the attachment within the email
Click on the attachment to open it
Choose the option to download the attachment
Save the attachment to your desired location on your device
Q100. What is primary key? unique key?
Primary key is a column or set of columns that uniquely identifies each row in a table. Unique key is a constraint that ensures uniqueness of values in a column or set of columns.
Primary key is used to enforce data integrity and ensure that each row in a table can be uniquely identified.
Unique key is used to ensure that no two rows in a table have the same values in a column or set of columns.
Primary key can be a single column or a combination of columns, while unique key can...read more
More about working at SAP
Top HR Questions asked in Axens India
Interview Process at Axens India
Top Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month