i
Skeps
Filter interviews by
Different types of exceptions include checked, unchecked, and errors.
Checked exceptions are checked at compile time and must be handled or declared.
Unchecked exceptions are not checked at compile time and can be handled or not.
Errors are exceptional conditions that are not meant to be caught or handled.
Using multiple catch blocks allows handling different types of exceptions separately, while finally block ensures cleanup code is executed regardless of exception.
Multiple catch blocks can handle different types of exceptions separately
Finally block ensures cleanup code is executed regardless of exception
Example: try { // code that may throw exceptions } catch (ExceptionType1 e) { // handle ExceptionType1 } catch ...
Checked exceptions are checked at compile time, while unchecked exceptions are not.
Checked exceptions must be handled by the code or declared in the method signature using 'throws' keyword.
Unchecked exceptions do not need to be caught or declared in the method signature.
Examples of checked exceptions: IOException, SQLException.
Examples of unchecked exceptions: NullPointerException, ArrayIndexOutOfBoundsException.
Use regular expressions to remove special characters from a string.
Create a regular expression pattern to match special characters
Use the replace() method with the regular expression pattern to remove special characters
Example: str.replace(/[!@#$%^&*()_+]/g, '') will remove !@#$%^&*()_+ from the string
Example of a login scenario in Cucumber with parameters for username and password
Create a feature file with the login scenario
Define the scenario outline with placeholders for username and password
Implement step definitions to pass the parameters in the login steps
Docker is a containerization platform, API status codes indicate the success or failure of a request, deployment processes involve releasing software updates, and Jenkins is a continuous integration tool.
Docker is a platform for developing, shipping, and running applications in containers.
API status codes are used to indicate the success or failure of a request, such as 200 for success and 404 for not found.
Deploy...
Interface in Java is a blueprint of a class that defines a set of methods without implementation.
Interfaces can have abstract methods and constants, but no instance variables.
Classes can implement multiple interfaces but can only extend one class.
Interfaces are used to achieve abstraction and multiple inheritance in Java.
I appeared for an interview in Aug 2024.
Asked simple Questions like
Giving string and remove special characters
Checked exceptions are checked at compile time, while unchecked exceptions are not.
Checked exceptions must be handled by the code or declared in the method signature using 'throws' keyword.
Unchecked exceptions do not need to be caught or declared in the method signature.
Examples of checked exceptions: IOException, SQLException.
Examples of unchecked exceptions: NullPointerException, ArrayIndexOutOfBoundsException.
Interface in Java is a blueprint of a class that defines a set of methods without implementation.
Interfaces can have abstract methods and constants, but no instance variables.
Classes can implement multiple interfaces but can only extend one class.
Interfaces are used to achieve abstraction and multiple inheritance in Java.
Using multiple catch blocks allows handling different types of exceptions separately, while finally block ensures cleanup code is executed regardless of exception.
Multiple catch blocks can handle different types of exceptions separately
Finally block ensures cleanup code is executed regardless of exception
Example: try { // code that may throw exceptions } catch (ExceptionType1 e) { // handle ExceptionType1 } catch (Exce...
Different types of exceptions include checked, unchecked, and errors.
Checked exceptions are checked at compile time and must be handled or declared.
Unchecked exceptions are not checked at compile time and can be handled or not.
Errors are exceptional conditions that are not meant to be caught or handled.
Example of a login scenario in Cucumber with parameters for username and password
Create a feature file with the login scenario
Define the scenario outline with placeholders for username and password
Implement step definitions to pass the parameters in the login steps
Use regular expressions to remove special characters from a string.
Create a regular expression pattern to match special characters
Use the replace() method with the regular expression pattern to remove special characters
Example: str.replace(/[!@#$%^&*()_+]/g, '') will remove !@#$%^&*()_+ from the string
Docker is a containerization platform, API status codes indicate the success or failure of a request, deployment processes involve releasing software updates, and Jenkins is a continuous integration tool.
Docker is a platform for developing, shipping, and running applications in containers.
API status codes are used to indicate the success or failure of a request, such as 200 for success and 404 for not found.
Deployment ...
Top trending discussions
I applied via Recruitment Consulltant and was interviewed in Aug 2023. There were 4 interview rounds.
Verification and validation are two important processes in software testing. Test cases are specific conditions or scenarios to test the functionality of a system. Exploratory testing involves simultaneous learning, test design, and execution.
Verification ensures that the software meets the specifications and requirements, while validation ensures that the software meets the customer's needs.
A test case is a set of con...
Prioritize critical tests, communicate with stakeholders, and document findings for future cycles.
Assess the criticality of the untested features and prioritize them based on risk.
Communicate with the project manager and stakeholders about the incomplete tests and their implications.
Document the tests that were not completed, including reasons and potential impacts on the release.
If possible, run smoke tests to ensure ...
Ensuring tester reports good quality defects by implementing thorough testing processes and clear communication.
Implementing comprehensive test cases to cover all possible scenarios
Utilizing automation tools to increase efficiency and accuracy
Regularly reviewing and verifying reported defects
Providing clear and detailed descriptions of defects found
Communicating effectively with developers to ensure understanding and r...
I utilize various techniques like boundary value analysis, equivalence partitioning, and risk-based testing to develop effective test cases.
Boundary Value Analysis: Testing at the edges of input ranges, e.g., if input is 1-100, test with 0, 1, 100, and 101.
Equivalence Partitioning: Dividing input data into valid and invalid partitions, e.g., for age input, valid: 18-65, invalid: <18 or >65.
Risk-Based Testing: Pri...
Negative testing is a type of testing where the system is tested with invalid inputs to ensure it handles errors properly.
Testing the system with incorrect data or unexpected inputs
Checking how the system responds to invalid user actions
Verifying error messages and handling
Ensuring the system does not crash or behave unexpectedly
I have experience in conducting load testing, stress testing, and scalability testing.
Load testing to assess the system's ability to handle a specific load
Stress testing to evaluate the system's behavior under extreme conditions
Scalability testing to determine the system's ability to scale up or down based on demand
TestNG is a testing framework for Java that supports various types of testing like unit, functional, end-to-end, etc.
TestNG is an open-source testing framework for Java
It supports different types of testing such as unit, functional, end-to-end, etc.
TestNG provides features like annotations, grouping, parameterization, and reporting
It allows parallel execution of test cases and easy configuration through XML files
The command to invoke a browser using Selenium is driver.get("url");
Use the WebDriver object to open a browser window
Use the get() method to navigate to a specific URL
Example: WebDriver driver = new ChromeDriver(); driver.get("https://www.google.com");
To target an element on a website for automation, use unique identifiers like IDs, classes, XPath, or CSS selectors.
Use IDs for unique identification
Use classes for grouping similar elements
Use XPath for complex element targeting
Use CSS selectors for styling-based targeting
Targeting the dynamic element involves identifying and testing components of the software that are subject to change.
Identify areas of the software that are likely to change frequently
Use automation tools to target and test dynamic elements
Implement robust test strategies to handle dynamic changes
Regularly update test cases to accommodate dynamic elements
Utilize data-driven testing to handle variations in dynamic eleme...
Yes, it is possible to automate flash items using automation tools and scripts.
Automation tools like Selenium can be used to automate flash items on web applications.
Flash automation can be achieved by interacting with the flash object using JavaScript.
Automated testing frameworks like TestComplete also support automation of flash elements.
Absolute xpath starts from the root element while relative xpath starts from any element in the DOM.
Absolute xpath starts with a single forward slash (/) and always starts from the root element of the page.
Relative xpath does not start with a forward slash and can start from any element in the DOM.
Absolute xpath is more brittle and prone to breaking if the structure of the page changes.
Relative xpath is more flexible a...
In API testing, we test the functionality, performance, security, and reliability of the API.
Functionality testing to ensure the API works as expected
Performance testing to check the response time and throughput
Security testing to identify vulnerabilities and ensure data protection
Reliability testing to verify the API's stability under different conditions
Payload is the data transmitted in an API request, while request body is a part of the payload containing the actual data being sent.
Payload includes all data sent in an API request, such as headers, parameters, and request body
Request body specifically refers to the part of the payload that contains the actual data being sent
In API testing, it is important to validate both the payload and request body for accuracy
Test case for integration scenario of API testing with main status codes in responses
Test case: Verify that the API response includes the expected data fields and values after integrating with another API
Main status codes: 200 (OK), 201 (Created), 400 (Bad Request), 401 (Unauthorized), 404 (Not Found), 500 (Internal Server Error)
Java program to reverse a string
Create a char array from the input string
Use two pointers to swap characters from start and end of the array
Continue swapping until the pointers meet in the middle
Java program to segregate values from given array of strings
Iterate through each string in the array
Check each character in the string and segregate based on type (alphabet, digit, special character)
Store segregated values in separate arrays or data structures
CAPTCHA works by presenting challenges that are easy for humans to solve but difficult for bots.
CAPTCHA stands for Completely Automated Public Turing test to tell Computers and Humans Apart.
It typically involves distorted text, images, or puzzles that users must solve to prove they are human.
CAPTCHA helps prevent automated bots from accessing websites or creating accounts.
Examples of CAPTCHA include reCAPTCHA, image re...
A search engine works by crawling web pages, indexing content, and ranking results based on relevance.
Crawling: Search engine bots visit web pages and follow links to discover content.
Indexing: The search engine stores information about web pages in a database for quick retrieval.
Ranking: Algorithms analyze the indexed content to determine the relevance of each page to a user's query.
Results: The search engine displays...
Mobile app architecture refers to the structure and design of the app, including components like UI, data storage, networking, and security.
Mobile app architecture typically consists of presentation layer (UI), business logic layer, and data layer.
UI layer handles user interaction and presentation of data, often using frameworks like React Native or Flutter.
Business logic layer contains the core functionality of the ap...
Revenue from OTT apps is generated through various sources such as subscription fees, advertising, in-app purchases, and partnerships.
Subscription fees: Users pay a recurring fee to access premium content or features.
Advertising: OTT apps display ads to generate revenue from advertisers.
In-app purchases: Users can buy virtual goods or upgrades within the app.
Partnerships: OTT apps may partner with other companies for c...
I applied via Recruitment Consultant and was interviewed in Jun 2021. There were 5 interview rounds.
I applied via Referral and was interviewed in Mar 2023. There were 3 interview rounds.
I possess the analytical skills, industry knowledge, and collaborative mindset essential for a successful Business Analyst.
Strong analytical skills: I have experience in data analysis using tools like Excel and SQL, which helped my previous team identify key trends.
Industry knowledge: I have worked in the finance sector, understanding regulatory requirements and market dynamics, which is crucial for informed decision-m...
I applied via LinkedIn and was interviewed in Jan 2024. There was 1 interview round.
DSA questions asked in an interview
posted on 13 May 2024
I applied via Approached by Company and was interviewed in Nov 2023. There were 2 interview rounds.
Contracts review and abstraction
I applied via LinkedIn and was interviewed before May 2022. There were 2 interview rounds.
Python dictionary is implemented using hash tables.
Python dictionary is a collection of key-value pairs.
The keys in a dictionary must be unique and immutable.
The values in a dictionary can be of any data type.
Python dictionary is implemented using hash tables.
Hash tables provide constant time complexity for insertion, deletion and retrieval of elements.
The hash function used in Python dictionary is based on the key's h...
Heap sort is a comparison-based sorting algorithm that uses a binary heap data structure.
It divides the input into a sorted and an unsorted region.
It repeatedly extracts the maximum element from the unsorted region and inserts it into the sorted region.
It has a time complexity of O(n log n) and is not stable.
Example: [8, 5, 3, 1, 9, 6, 0, 7, 4, 2] -> [0, 1, 2, 3, 4, 5, 6, 7, 8, 9]
Sort an array of strings based on a custom filter criteria.
Define the custom filter criteria (e.g., length, alphabetical order).
Use built-in sorting functions with a comparator.
Example: Sort by length: ['apple', 'banana', 'kiwi'] -> ['kiwi', 'apple', 'banana'].
Example: Sort alphabetically: ['banana', 'apple', 'kiwi'] -> ['apple', 'banana', 'kiwi'].
I applied via Indeed and was interviewed before Aug 2023. There were 3 interview rounds.
Core HTML, CSS and JS
JS deep dive and react
Some of the top questions asked at the Skeps Sdet Automation Test Engineer interview -
based on 1 interview experience
Difficulty level
Duration
Software Developer
12
salaries
| ₹11.5 L/yr - ₹19 L/yr |
Software Engineer
7
salaries
| ₹12.2 L/yr - ₹18 L/yr |
Sdet Engineer
5
salaries
| ₹7 L/yr - ₹13 L/yr |
Sdet-I
5
salaries
| ₹12 L/yr - ₹14 L/yr |
Product Manager
5
salaries
| ₹25 L/yr - ₹30 L/yr |
InsanelyGood
Vegrow
Elevate
Pepper Content