Sonata Software
50+ Exponential BPO Interview Questions and Answers
Q1. When to use abstract class and when should we use interfaces in Java?
Abstract classes are used for code reuse and interfaces are used for multiple inheritance and loose coupling.
Abstract classes can have both abstract and non-abstract methods while interfaces can only have abstract methods.
Abstract classes can have constructors while interfaces cannot.
Interfaces are used when a class needs to implement multiple behaviors while abstract classes are used for code reuse.
Interfaces promote loose coupling while abstract classes promote tight coupli...read more
Q2. What is your current CTC and what is your expected CTC?
Current CTC is confidential. Expectation is based on market standards and my experience.
Current CTC is confidential information and not disclosed in interviews.
Expected CTC is based on market standards, industry trends, and my experience.
I am looking for a competitive salary package that aligns with my skills and expertise.
Q3. sorting algorithm to use when 70% of numbers are sorted
Use a modified version of Merge Sort or Tim Sort for efficient sorting when 70% of numbers are already sorted.
Consider using Merge Sort with optimizations for nearly sorted arrays, such as checking for already sorted subarrays before merging.
Tim Sort, a hybrid sorting algorithm derived from Merge Sort and Insertion Sort, is also a good choice for partially sorted arrays.
Both algorithms have a time complexity of O(n log n) in the worst case scenario, making them efficient choi...read more
Q4. What are the challenges you face during implementation
The challenges during implementation include resistance to change, lack of resources, and communication issues.
Resistance to change from employees or stakeholders
Lack of resources such as time, budget, or personnel
Communication issues between team members or with clients
Technical difficulties or unforeseen obstacles
Ensuring the project stays within scope and meets deadlines
Q5. How much hands on development experience you have on .net core?
Q6. What are the applications of Computer Vision?
Computer Vision has applications in various fields such as healthcare, automotive, retail, security, and agriculture.
Healthcare - medical image analysis, surgery assistance
Automotive - autonomous vehicles, driver assistance systems
Retail - facial recognition for personalized shopping experience
Security - surveillance systems, facial recognition for access control
Agriculture - crop monitoring, automated harvesting
Q7. What is sccm and its features? And how can you define its ?
SCCM is a system management tool used for deploying, managing and monitoring software and hardware in an enterprise environment.
SCCM stands for System Center Configuration Manager
It allows for remote management of devices and software deployment
Features include inventory management, software distribution, patch management, and OS deployment
It can be used to manage Windows, Mac, and Linux devices
SCCM integrates with other Microsoft tools like Active Directory and Intune
Q8. ApplicationContext vs BeanFactory
ApplicationContext is a sub-interface of BeanFactory in Spring Framework.
ApplicationContext provides more advanced features like AOP, i18n, event propagation, etc.
BeanFactory is a basic container that provides the fundamental functionality of DI and IOC.
ApplicationContext is preferred over BeanFactory in most cases due to its advanced features.
Example: ApplicationContext can be used to load properties files, whereas BeanFactory cannot.
Example: ApplicationContext can publish a...read more
Q9. Is there any breach in the network?
Yes, there is a breach in the network.
Unusual network traffic patterns
Unauthorized access to sensitive data
Unexpected system behavior or performance issues
Logs indicating suspicious activities
Security alerts or notifications
Q10. How plant will be determine in Sales order
Plants in a sales order are determined based on the customer's requirements, availability, pricing, and shipping logistics.
Plants are determined based on the customer's location and delivery preferences.
Availability of the product at different plant locations is considered.
Pricing and discounts may vary based on the plant from which the product is shipped.
Shipping logistics such as distance, transportation costs, and delivery time also play a role in determining the plant for...read more
Q11. How do you create advanced rule structure?
Creating advanced rule structure involves defining complex conditions and actions.
Start by identifying the specific requirements for the rule structure
Break down the rules into smaller components for easier management
Utilize logical operators such as AND, OR, NOT to create complex conditions
Consider using nested rules for more intricate structures
Test the rule structure thoroughly to ensure it functions as intended
Q12. How many custom dimensions can be created?
The number of custom dimensions that can be created depends on the specific software or platform being used.
The number of custom dimensions allowed may vary between different software or platforms.
Some platforms may have a limit on the total number of custom dimensions that can be created.
Check the documentation or settings of the specific software to determine the maximum number of custom dimensions allowed.
Q13. Have you worked on 3rd party integrations?
Yes, I have experience working on 3rd party integrations in previous projects.
Implemented API integrations with external systems to exchange data seamlessly
Worked on integrating payment gateways for online transactions
Collaborated with vendors to establish connections between systems
Q14. What is the use of CLR, program to reverse a string.
Q15. ArrayList vs LinkedList
ArrayList is better for random access, LinkedList is better for frequent insertion/deletion.
ArrayList uses contiguous memory, LinkedList uses nodes
ArrayList is faster for accessing elements by index
LinkedList is faster for adding or removing elements in the middle of the list
ArrayList is better for small lists, LinkedList is better for large lists
Q16. Caching mechanisms used
Caching mechanisms used
In-memory caching using ConcurrentHashMap or Guava Cache
Distributed caching using Redis or Hazelcast
HTTP caching using ETag or Last-Modified headers
Query caching using Hibernate or JPA
Page caching using Varnish or Squid
Q17. what is virtual destructor in c++
A virtual destructor in C++ is used to ensure that the correct destructor is called when deleting an object through a base class pointer.
Virtual destructors are necessary when deleting an object through a pointer to a base class in order to properly call the derived class destructor.
Without a virtual destructor, only the base class destructor would be called, potentially leading to memory leaks or undefined behavior.
Example: class Base { public: virtual ~Base() {} }; class De...read more
Q18. Internal working of HashMap
HashMap is a data structure that stores key-value pairs and uses hashing to retrieve values quickly.
HashMap uses an array of buckets to store key-value pairs
Each bucket contains a linked list of entries
Hashing is used to determine the index of the bucket where the entry should be stored
If multiple entries have the same hash code, they are stored in the same bucket as a linked list
When retrieving a value, the hash code of the key is used to find the bucket and then the linked ...read more
Q19. How to use VPNs and why?
VPNs are used to create secure and private connections over public networks.
VPNs encrypt data to ensure confidentiality and protect against unauthorized access.
VPNs allow remote access to private networks, enabling users to securely connect to their work network from anywhere.
VPNs can bypass geographical restrictions and censorship, providing access to restricted content.
VPNs can be used to enhance online privacy by masking the user's IP address and location.
Examples of VPN p...read more
Q20. How much data can be processed in AWS Glue
AWS Glue can process petabytes of data per hour
AWS Glue can process petabytes of data per hour, depending on the configuration and resources allocated
It is designed to scale horizontally to handle large volumes of data efficiently
AWS Glue can be used for ETL (Extract, Transform, Load) processes on massive datasets
Q21. What is understanding of ISV and technology verticals
Q22. What are the important steps after creating a legal entity
Important steps after creating a legal entity
Set up the organization hierarchy
Configure financial dimensions
Define chart of accounts
Set up legal entity address and contact information
Configure security roles and permissions
Q23. what is overflow in c++ ?
Overflow in C++ occurs when a value is too large to be stored in the data type, leading to unexpected behavior.
Overflow can happen when adding two large numbers, causing the result to exceed the maximum value that can be stored in the data type.
For example, adding 2147483647 + 1 to an int data type in C++ will result in overflow, wrapping around to -2147483648.
To prevent overflow, it is important to check for potential overflow conditions before performing arithmetic operatio...read more
Q24. What is REG in data Science?
REG in data science stands for Regular Expression. It is a sequence of characters that define a search pattern.
REG is used to search for patterns in text data
It is commonly used for data cleaning and preprocessing tasks
Example: searching for email addresses in a text document using a REG pattern
Q25. Use of transit gateway over vpc peering
Transit gateway is preferred over VPC peering for centralized management and scalability.
Transit gateway allows for centralized management of connectivity between VPCs, making it easier to manage and monitor traffic.
Transit gateway supports transitive routing, allowing for communication between VPCs that are not directly peered.
Transit gateway can scale horizontally to support thousands of VPC connections, whereas VPC peering has limits on the number of connections.
Using tran...read more
Q26. How do you check container logs?
To check container logs, use commands like docker logs or kubectl logs.
Use 'docker logs
' to view logs of a Docker container. Use 'kubectl logs
' to view logs of a Kubernetes pod. Check log files within the container by accessing the container's shell and navigating to the log directory.
Q27. Y is network is moreuseful to users?
A network is more useful to users because it allows for easy communication, access to resources, and sharing of information.
Networks enable users to communicate with each other easily and quickly.
Users can access resources such as files, printers, and applications that are shared on the network.
Information can be easily shared and disseminated among users on the network.
Networks provide a platform for collaboration and teamwork, allowing users to work together on projects.
Use...read more
Q28. What is distribution in spark ?
Distribution in Spark refers to how data is divided across different nodes in a cluster for parallel processing.
Distribution in Spark determines how data is partitioned across different nodes in a cluster
It helps in achieving parallel processing by distributing the workload
Examples of distribution methods in Spark include hash partitioning and range partitioning
Q29. What is ur expected CTC
I would expect a competitive salary based on my experience, skills, and the market standards.
I would like to discuss the salary range for this position based on the responsibilities and expectations.
Considering my qualifications and the industry standards, I anticipate a fair compensation package.
I am open to negotiation and would appreciate a salary that reflects my expertise and contributions.
I believe a mutually beneficial salary package can be determined through further d...read more
Q30. Write a query to join two tables using LINQ
Join two tables using LINQ
Use the join keyword to combine two tables based on a common field
Specify the fields to be joined using the equals keyword
Select the desired fields from both tables using the select keyword
Q31. What does DNS mean?
DNS stands for Domain Name System. It is a decentralized system that translates domain names into IP addresses.
DNS is responsible for resolving domain names to their corresponding IP addresses.
It allows users to access websites and other resources using easy-to-remember domain names instead of numerical IP addresses.
DNS operates through a hierarchical structure of servers, including authoritative DNS servers, recursive DNS servers, and root DNS servers.
It uses various record ...read more
Q32. What is Pricing condition
Pricing condition is a rule or criteria used to determine the price of a product or service.
Pricing conditions can include factors such as quantity discounts, promotional offers, and contract terms.
They are typically set in pricing tables within a company's ERP system.
Pricing conditions are used to calculate the final price that a customer will pay for a product or service.
Examples of pricing conditions include discounts for bulk purchases, special pricing for certain custome...read more
Q33. what is structure of Order
The structure of an Order typically includes customer information, product details, quantity, price, and payment information.
Customer information (name, address, contact details)
Product details (name, description, SKU)
Quantity of each product ordered
Price of each product
Payment information (payment method, total amount)
Order status (pending, shipped, delivered)
Q34. To remove the duplicate elements fromthe array
Use Set data structure to remove duplicate elements from the array.
Create a Set from the array to automatically remove duplicates.
Convert the Set back to an array to get the unique elements.
Example: const array = ['apple', 'banana', 'apple', 'orange'];
Example: const uniqueArray = [...new Set(array)];
Q35. What is devops and how works
DevOps is a software development methodology that combines software development (Dev) with IT operations (Ops) to shorten the systems development life cycle.
DevOps focuses on collaboration, automation, and monitoring throughout the software development lifecycle.
It aims to improve the speed and quality of delivering software applications.
DevOps practices include continuous integration, continuous delivery, and infrastructure as code.
Tools commonly used in DevOps include Jenki...read more
Q36. What is Narrow AI?
Narrow AI refers to AI systems that are designed for a specific task or narrow range of tasks.
Narrow AI is also known as Weak AI.
These AI systems are focused on performing a single task efficiently.
Examples of Narrow AI include virtual assistants like Siri, Alexa, and Google Assistant.
Narrow AI is not capable of general intelligence or understanding complex human emotions.
Q37. Explain about OSI model?
The OSI model is a conceptual framework that standardizes the functions of a communication system into seven layers.
The OSI model stands for Open Systems Interconnection model.
It was developed by the International Organization for Standardization (ISO) in 1984.
The model is divided into seven layers: Physical, Data Link, Network, Transport, Session, Presentation, and Application.
Each layer has specific functions and interacts with adjacent layers to provide end-to-end communic...read more
Q38. What is LoL, indemnity?
LoL stands for Limitation of Liability and indemnity refers to compensation for loss or damage.
LoL is a contractual provision that limits the amount of damages that one party can recover from the other party in case of breach of contract.
Indemnity is a contractual obligation of one party to compensate the other party for loss or damage.
For example, if a company provides indemnity to its employees for any legal expenses incurred while performing their job duties, the company w...read more
Q39. How do you learn devops
Learning DevOps involves a combination of self-study, online courses, hands-on experience, and networking with other professionals.
Take online courses on platforms like Udemy, Coursera, or Pluralsight to learn the fundamentals of DevOps practices and tools.
Practice using DevOps tools in a lab environment or on personal projects to gain hands-on experience.
Attend DevOps meetups, conferences, and webinars to network with other professionals and learn about industry best practic...read more
Q40. How to restartJenkins
To restart Jenkins, you can either use the Jenkins web interface or the command line.
To restart Jenkins using the web interface, navigate to 'Manage Jenkins' > 'Reload Configuration from Disk' > 'Restart'
To restart Jenkins using the command line, you can use the following command: 'sudo systemctl restart jenkins'
Make sure to have the necessary permissions to restart Jenkins
Q41. Implement LinkedList and insert element at last
Implement LinkedList and insert element at last
Create a Node class with data and next pointer
Create a LinkedList class with head and tail pointers
Implement a method in LinkedList class to insert element at the end
Q42. What is spark and pyspark
Spark is a fast and general-purpose cluster computing system, while PySpark is the Python API for Spark.
Spark is a distributed computing system that provides an interface for programming entire clusters with implicit data parallelism and fault tolerance.
PySpark is the Python API for Spark that allows developers to write Spark applications using Python.
Spark and PySpark are commonly used for big data processing, machine learning, and real-time analytics.
Example: Using PySpark ...read more
Q43. Implement binary search
Binary search is a divide and conquer algorithm that efficiently finds the target value in a sorted array.
Start by defining the low and high indices of the array.
Calculate the mid index as (low + high) / 2.
Compare the target value with the value at the mid index and adjust the low and high indices accordingly.
Repeat the process until the target value is found or the low index surpasses the high index.
Q44. On which port .Net runs
The .NET framework does not run on a specific port. It runs on top of the operating system and uses the underlying network protocols.
The .NET framework does not have its own port number.
It relies on the operating system's network stack to handle network communication.
Applications built with .NET can listen on any available port specified by the developer.
For example, a web application built with ASP.NET can listen on port 80 for HTTP traffic.
Q45. What is WCF throttling
WCF throttling is a mechanism to control the number of concurrent requests and resources used by a WCF service.
WCF throttling helps prevent resource exhaustion and performance degradation.
Throttling settings can be configured in the WCF service configuration file.
Throttling parameters include maximum concurrent calls, sessions, and instances.
Examples of throttling settings are maxConcurrentCalls, maxConcurrentSessions, and maxConcurrentInstances.
Q46. Design a linked list
A linked list is a data structure consisting of nodes where each node points to the next node in the sequence.
Nodes contain data and a reference to the next node
Can be singly linked (each node points to the next) or doubly linked (each node points to the next and previous)
Operations include insertion, deletion, traversal, and searching
Example: Node { data: 5, next: Node { data: 10, next: null } }
Q47. Elaborate warehouse process
Warehouse process involves receiving, storing, picking, packing, and shipping goods efficiently.
Receiving: Goods are received from suppliers and checked for accuracy.
Storing: Items are stored in designated locations within the warehouse.
Picking: Orders are picked from the shelves based on customer requirements.
Packing: Items are packed securely for shipping.
Shipping: Orders are shipped to customers using various transportation methods.
Inventory management: Keeping track of st...read more
Q48. what are pros and cons
Pros and cons of a Lead Engineer role
Pros: opportunity to lead and mentor a team, chance to make high-level technical decisions, potential for career growth and advancement
Cons: increased responsibility and pressure, potential for conflicts with team members or stakeholders, need to balance technical and managerial tasks
Q49. Difference between athread and process
A thread is a lightweight process within a process, sharing memory and resources, while a process is a standalone program with its own memory space.
Threads share memory and resources within a process
Processes are standalone programs with their own memory space
Threads are faster to create and terminate than processes
Processes have higher overhead due to separate memory space
Threads are used for multitasking within a program, processes for multitasking between programs
Q50. Difference between sanity and Smoke test
Sanity test is a narrow regression test while Smoke test is a broader test to check if the application is stable enough for further testing.
Sanity test is a quick test to check if the critical functionalities are working after a small change in the code.
Smoke test is a broader test to check if the application is stable enough for further testing.
Sanity test is usually performed by developers while Smoke test is performed by testers.
Sanity test is a subset of regression testin...read more
Q51. Ips and IDS mean?
IPS stands for Intrusion Prevention System and IDS stands for Intrusion Detection System.
IPS is a security device that actively monitors network traffic to prevent malicious activities.
IDS is a security device that passively monitors network traffic to detect potential security breaches.
IPS can block or prevent malicious traffic from entering the network.
IDS can only detect and alert about potential security threats.
Both IPS and IDS play a crucial role in network security to ...read more
Q52. Rotate a 2d matrix by 90 degree
Q53. Explain repository design pattern
Repository design pattern is a structural design pattern that separates the data access logic from the business logic in an application.
It provides a way to access data from a data source without exposing the underlying data access code to the business logic.
It helps in achieving separation of concerns by keeping data access code in a separate layer.
Commonly used in applications where data needs to be accessed from multiple sources like databases, APIs, or files.
Q54. what is microservice
Microservices are a software development technique where an application is composed of small, independent services that communicate over well-defined APIs.
Microservices are small, independent services that work together to form an application
Each microservice is responsible for a specific function or feature
Microservices communicate with each other over well-defined APIs
Microservices can be developed, deployed, and scaled independently
Examples of companies using microservices...read more
Q55. Explain any Riddle and solve.
I am taken from a mine and shut up in a wooden case, from which I am never released, and yet I am used by almost every person.
Answer: Pencil
Taken from a mine refers to graphite, which is used to make pencils
Shut up in a wooden case refers to the wooden casing of a pencil
Used by almost every person refers to the widespread use of pencils
Q56. Mergesort in python
Mergesort is a popular sorting algorithm that uses a divide-and-conquer approach to sort an array.
Divide the array into two halves
Recursively sort each half
Merge the sorted halves back together
Q57. Budgeting Vs Forecasting
Budgeting involves setting financial goals and allocating resources, while forecasting involves predicting future financial outcomes based on current data.
Budgeting is a plan for the future, while forecasting is a prediction of the future.
Budgeting involves setting specific financial targets and allocating resources accordingly.
Forecasting involves analyzing past data and trends to predict future financial outcomes.
Budgeting is more focused on controlling costs and managing e...read more
Q58. Explain Business Processes
Business processes are a series of tasks or activities that organizations perform to achieve a specific goal or outcome.
Business processes involve a series of steps or activities that are interconnected and contribute to achieving a specific objective.
They can be documented using flowcharts, diagrams, or written procedures.
Business processes can be automated using software systems like ERP systems to improve efficiency and accuracy.
Examples include order-to-cash process, proc...read more
Q59. Search key in 2d
Search for a key in a 2D array where rows and columns are sorted in ascending order.
Iterate through each row and column to search for the key
Start from the top right corner or bottom left corner for efficient search
Use binary search within each row or column for faster search
Top HR Questions asked in Exponential BPO
Interview Process at Exponential BPO
Top Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month