Add office photos
Engaged Employer

Synechron

3.5
based on 2.9k Reviews
Video summary
Filter interviews by

200+ Sagility Interview Questions and Answers

Updated 23 Feb 2025
Popular Designations

Q1. What is concurrency and how did you achieved it in your projects ?

Ans.

Concurrency is the ability of a program to execute multiple tasks simultaneously.

  • Achieved through multi-threading or asynchronous programming

  • Requires careful management of shared resources to avoid race conditions

  • Examples include implementing a chat application or processing multiple requests simultaneously

Add your answer

Q2. Types of call in cobol. What is file status 39. What is AICA in CICS. Why do we use cursor in Cobol+db2 program. What are some compiler options. What is the utility for bind. How would you dynamically read a vs...

read more
Ans.

Technical Lead interview questions on COBOL, DB2, and CICS

  • Types of call in COBOL

  • File status 39 indicates end-of-file reached

  • AICA is Abend-AID CICS Abend RSN (Reason) Code

  • Cursor is used to fetch rows from DB2 tables sequentially

  • Compiler options include OPTIMIZE, DEBUG, and LIST

  • BIND utility is used to bind DB2 programs to database

  • Dynamic VSAM file reading can be done using READNEXT function

  • -911 SQLCODE indicates deadlock or timeout error

  • Research organization before interview

  • Int...read more

Add your answer

Q3. find sum of all odd numbers in a list using stream?

Ans.

Using Java stream, find the sum of all odd numbers in a list.

  • Use the filter() method to filter out the odd numbers from the list.

  • Use the mapToInt() method to convert the filtered numbers to integers.

  • Use the sum() method to calculate the sum of the filtered odd numbers.

View 1 answer

Q4. Explain the process of regression testing in detail. Why we do it? When we do it? How we should do it? Explain the strategy to chose regression test suite. What is the current process followed in your project f...

read more
Ans.

Regression testing is the process of retesting a software application to ensure that new code changes have not adversely affected existing functionality.

  • Regression testing is done to ensure that new code changes do not introduce new bugs or break existing functionality.

  • It is typically performed after code changes, bug fixes, or new feature additions.

  • Regression testing should be automated whenever possible to save time and effort.

  • The regression test suite should include a comb...read more

Add your answer
Discover Sagility interview dos and don'ts from real experiences

Q5. Explain the process of test case creating and execution in qtest and how one can check the overall progress of test execution. Based on execution if test report is getting generated, explain that in detail

Ans.

Creating and executing test cases in qTest involves defining test steps, assigning them to testers, executing them, and generating test reports to track progress.

  • Define test cases by specifying test steps, expected results, and assigning them to testers

  • Execute test cases by running them and recording the actual results

  • Track progress by monitoring the status of test cases and overall test execution

  • Generate test reports to analyze test results and identify any issues or trends

  • E...read more

Add your answer

Q6. Explain the usage of that particular design pattern

Ans.

The design pattern is used to solve a specific problem in software development.

  • Design patterns are reusable solutions to common problems in software development.

  • They provide a standard way to solve a problem that can be adapted to different situations.

  • Examples of design patterns include Singleton, Factory, Observer, and Decorator.

  • Using design patterns can improve code quality, maintainability, and scalability.

Add your answer
Are these interview questions helpful?

Q7. What microservices patterns are you aware ? let's assume that there is a microservice based architecture and service A is calling service B which in turn service C. If service b fails, how will you manage trans...

read more
Ans.

Use compensating transactions and distributed tracing for managing transaction and logging in case of service B failure.

  • Implement compensating transactions to rollback changes made by service B in case of failure.

  • Use distributed tracing to track the flow of requests and identify where the failure occurred.

  • Implement retry mechanisms to handle transient failures in service B.

  • Use circuit breakers to prevent cascading failures in the system.

  • Implement centralized logging to captur...read more

Add your answer

Q8. how to remove duplicated form from array list?

Ans.

To remove duplicates from an ArrayList of strings, use a HashSet to store unique elements.

  • Create a HashSet and add all elements from the ArrayList to it.

  • Create a new ArrayList and add all elements from the HashSet to it.

  • The new ArrayList will contain only unique elements.

View 3 more answers
Share interview questions and help millions of jobseekers 🌟

Q9. How do you convert list to arraylist? And vice versa

Ans.

To convert list to arraylist, use ArrayList constructor. To convert arraylist to list, use List constructor.

  • To convert list to arraylist, use ArrayList constructor and pass the list as parameter.

  • To convert arraylist to list, use List constructor and pass the arraylist as parameter.

  • Example: List list = Arrays.asList("one", "two", "three");

  • ArrayList arrayList = new ArrayList<>(list);

  • Example: ArrayList arrayList = new ArrayList<>(Arrays.asList("one", "two", "three"));

  • List list =...read more

Add your answer

Q10. How to create a bug in jira? What all information needs to be entered while raising a defect in jira? What labels , tags to be used. Write all information in detail and explain with an example

Ans.

To create a bug in Jira, enter detailed information like summary, description, priority, assignee, and labels.

  • Enter a clear and concise summary of the bug

  • Provide a detailed description of the bug including steps to reproduce

  • Set the priority level of the bug (e.g. High, Medium, Low)

  • Assign the bug to the appropriate team member

  • Add relevant labels/tags for easy categorization

Add your answer

Q11. 1.what is Core java , spring boot ,micro services ?

Ans.

Core Java is a programming language, Spring Boot is a framework for building web applications, and Microservices is an architectural style for building distributed systems.

  • Core Java is used for developing standalone applications and is the foundation for many other Java frameworks.

  • Spring Boot is a popular framework for building web applications that simplifies the development process.

  • Microservices is an architectural style for building distributed systems where each service i...read more

Add your answer

Q12. Difference between Scenario &amp; Scenario Outline in Cucumber?

Ans.

Scenario is a single test case while Scenario Outline is a template for multiple test cases.

  • Scenario is a single test case that describes a particular behavior of the system

  • Scenario Outline is a template for multiple test cases with placeholders for input values

  • Scenario Outline uses Examples table to provide input values for each test case

  • Scenario Outline reduces code duplication and makes test cases more maintainable

Add your answer

Q13. What is the tool you are currently using for verifying regulatory reports? Explain the process in detail. What things you verify in those reports

Ans.

We use SQL queries and automated testing tools to verify regulatory reports. We validate data accuracy, completeness, and compliance.

  • We use SQL queries to extract data from the database for regulatory reports

  • We use automated testing tools like Selenium or JUnit to validate the reports

  • We verify data accuracy, ensuring that the numbers and information in the reports are correct

  • We check for data completeness, making sure that all required fields are filled out

  • We ensure complianc...read more

Add your answer

Q14. What are functional interfaces? What is the need to have functional interfaces?

Ans.

Functional interfaces are interfaces with only one abstract method. They are used for lambda expressions and method references.

  • Functional interfaces are used for functional programming in Java.

  • They are used for lambda expressions and method references.

  • They have only one abstract method.

  • Examples of functional interfaces are Runnable, Callable, and Comparator.

  • Functional interfaces can be annotated with @FunctionalInterface to ensure they have only one abstract method.

Add your answer

Q15. What are the different types of popups and how do u handle them?

Ans.

Different types of popups and how to handle them

  • Modal popups - require user action before continuing

  • Non-modal popups - can be closed without user action

  • Lightbox popups - overlay on top of the page

  • Sticky popups - remain visible even when scrolling

  • To handle popups, use automation tools like Selenium or manually close them

  • For modal popups, interact with the popup to close or continue

  • For non-modal popups, click the close button or click outside the popup to close

  • For lightbox popu...read more

Add your answer

Q16. How will you design framework, what are the things to consider will designing framework,

Add your answer

Q17. What is priority and severity of a defect? Explain different types. How to chose priority and severity of a defect? Explain everything with example

Ans.

Priority and severity of a defect in database testing, types, how to choose, with examples

  • Priority is the importance of fixing a defect, while severity is the impact of the defect on the system

  • Different types of severity include critical, major, minor, and trivial

  • Different types of priority include high, medium, and low

  • Choosing priority and severity involves considering the impact on users, functionality, and business goals

  • Example: A critical defect that causes data loss woul...read more

Add your answer

Q18. why you are not able to increase / decrease the VM resource?

Ans.

There could be several reasons why I am not able to increase/decrease the VM resource.

  • Insufficient permissions: I may not have the necessary administrative privileges to modify the VM resource settings.

  • Resource limitations: The host server may have reached its resource capacity, preventing any further changes.

  • VMware tools not installed: Without VMware tools installed on the guest OS, resource modifications may not be possible.

  • Resource pool restrictions: The VM may be part of ...read more

View 1 answer

Q19. Explain defect management system and test management system in detail. What tools you are using to manage them in your current project

Ans.

Defect management system tracks and manages defects found during testing, while test management system organizes and controls the testing process.

  • Defect management system involves logging, tracking, prioritizing, and resolving defects identified during testing.

  • Test management system includes test planning, execution, and reporting to ensure testing is carried out effectively.

  • Examples of defect management tools: Jira, Bugzilla, HP ALM.

  • Examples of test management tools: HP ALM,...read more

Add your answer

Q20. How to differentiate sale transaction, ecom transaction and refund transaction.

Ans.

Sale, ecom and refund transactions can be differentiated based on their purpose and flow.

  • Sale transaction is when a customer purchases a product or service at full price.

  • Ecom transaction is when a customer purchases a product or service online.

  • Refund transaction is when a customer returns a product or service and receives a refund.

  • Sale and ecom transactions involve payment, while refund transactions involve returning the payment.

  • Sale and ecom transactions are revenue-generati...read more

Add your answer

Q21. Explain design patterns you know

Ans.

Design patterns are reusable solutions to common software problems.

  • Creational patterns: Singleton, Factory, Abstract Factory

  • Structural patterns: Adapter, Decorator, Facade

  • Behavioral patterns: Observer, Strategy, Command

  • Architectural patterns: Model-View-Controller, Model-View-ViewModel

  • Concurrency patterns: Thread Pool, Producer-Consumer

  • Examples: Singleton ensures only one instance of a class exists, Factory creates objects without exposing the instantiation logic, Observer al...read more

Add your answer

Q22. What is the internal implementation of hashmap? Let's assume that you want to store duplicate keys in the hashmap, how can we achieve the same in hashmap ?

Ans.

HashMap internally uses an array of linked lists to store key-value pairs. To store duplicate keys, we can use a custom implementation of HashMap.

  • HashMap internally uses an array of linked lists to handle collisions.

  • To store duplicate keys, we can create a custom HashMap implementation that allows multiple values for the same key.

  • One approach is to use a HashMap with values as lists, where each key can have multiple values associated with it.

Add your answer

Q23. What are microservices and why it is used for .

Ans.

Microservices are a software architecture pattern where applications are built as a collection of small, loosely coupled services.

  • Microservices allow for modular development and deployment of applications.

  • Each microservice can be developed, deployed, and scaled independently.

  • Microservices communicate with each other through APIs.

  • They promote flexibility, scalability, and fault tolerance.

  • Examples of microservices include Netflix, Amazon, and Uber.

View 1 answer

Q24. How do u decide the priority and severity of your test cases?

Ans.

Priority and severity of test cases are decided based on risk analysis and impact on end-users.

  • Perform risk analysis to identify critical functionalities

  • Assign priority based on business impact and frequency of use

  • Assign severity based on impact on end-users and system functionality

  • Consider dependencies and interrelationships between test cases

  • Re-evaluate priority and severity as needed throughout testing process

Add your answer

Q25. what are the remote console for Dell , HP, Lenovo servers?

Ans.

The remote console for Dell servers is called iDRAC, for HP servers it is called iLO, and for Lenovo servers it is called IMM.

  • Dell servers use iDRAC (Integrated Dell Remote Access Controller) for remote console access.

  • HP servers use iLO (Integrated Lights-Out) for remote console access.

  • Lenovo servers use IMM (Integrated Management Module) for remote console access.

View 1 answer

Q26. What are joins in sql? Write query (for any one join) and explain that query with output

Ans.

Joins in SQL are used to combine rows from two or more tables based on a related column between them.

  • Joins are used to retrieve data from multiple tables based on a related column

  • Common types of joins include INNER JOIN, LEFT JOIN, RIGHT JOIN, and FULL JOIN

  • Example: SELECT * FROM table1 INNER JOIN table2 ON table1.column = table2.column

Add your answer

Q27. How do you handle exceptions in Rest APIs

Ans.

Exceptions in Rest APIs are handled using try-catch blocks and appropriate error responses.

  • Use try-catch blocks to catch exceptions that may occur during API execution.

  • Handle different types of exceptions separately to provide specific error responses.

  • Return appropriate HTTP status codes and error messages in the response.

  • Log the exception details for debugging purposes.

  • Consider using a global exception handler to centralize exception handling logic.

View 1 answer

Q28. How would you use your script to to do regression testing?

Ans.

I would use my script to automate the execution of test cases and compare the results with expected outcomes.

  • Create a test suite with all the test cases to be executed

  • Automate the execution of the test suite using the script

  • Compare the actual results with the expected outcomes

  • Report any discrepancies found during the regression testing

Add your answer

Q29. What is the highest limit of Hashmap?

Ans.

The highest limit of HashMap is Integer.MAX_VALUE, which is 2^31 - 1.

  • The highest limit is determined by the maximum capacity of an array in Java, which is Integer.MAX_VALUE.

  • The default initial capacity of a HashMap is 16, and it automatically increases its capacity as needed.

  • If the number of elements exceeds the maximum capacity, an OutOfMemoryError will be thrown.

View 1 answer

Q30. Automation framework which used in previous org

Ans.

We used a hybrid automation framework which combined data-driven and keyword-driven approaches.

  • The framework was built using Selenium WebDriver and TestNG.

  • It allowed us to write test cases in a modular and reusable manner.

  • We used Excel sheets to store test data and keywords.

  • The framework also had reporting capabilities using ExtentReports.

  • We followed the Page Object Model design pattern for better maintainability.

Add your answer

Q31. How to check reports generated in sql. What are the benefits of doing database testing

Ans.

To check reports generated in SQL, run queries to validate data accuracy. Benefits of database testing include ensuring data integrity and identifying performance issues.

  • Run SQL queries to validate data accuracy in reports

  • Check for data integrity by comparing expected results with actual results

  • Identify performance issues by analyzing query execution times

  • Ensure data consistency across different reports and databases

Add your answer

Q32. What is load balancer? Algorithm explain.

Ans.

A load balancer is a device or software that distributes incoming network traffic across multiple servers to ensure efficient use of resources and prevent overload.

  • Load balancers improve the performance and reliability of applications by distributing traffic evenly across servers.

  • They can be hardware-based or software-based, and can be implemented at different layers of the network stack.

  • Common load balancing algorithms include round-robin, least connections, and IP hash.

  • Exam...read more

Add your answer

Q33. What is web garden and uses of web garden?

Ans.

A web garden is a configuration in which multiple worker processes are used to handle incoming web requests, improving scalability and performance.

  • Web garden is used to improve the scalability and performance of web applications by utilizing multiple worker processes.

  • It can help distribute the load of incoming requests across multiple processes, reducing bottlenecks and improving response times.

  • Web garden can be particularly useful for applications with high traffic or resour...read more

Add your answer

Q34. How do you set specific times to Control -M Batch production jobs?

Ans.

Specific times for Control-M Batch production jobs can be set using scheduling tools within the Control-M application.

  • Use the Control-M application to access the scheduling tools

  • Create job definitions with specific start times

  • Set dependencies between jobs to control the order of execution

  • Utilize calendars to define recurring schedules

  • Monitor job status and make adjustments as needed

Add your answer

Q35. Write code for that design pattern

Ans.

Factory Method Pattern

  • Defines an interface for creating objects, but lets subclasses decide which class to instantiate

  • Encapsulates object creation logic to a separate class

  • Useful when a class can't anticipate the type of objects it needs to create

  • Example: java.util.Calendar.getInstance()

  • Example: javax.xml.parsers.DocumentBuilderFactory.newInstance()

Add your answer

Q36. How do you take a log from Physical Host from remote location?

Ans.

To take a log from a physical host from a remote location, you can use remote access tools like SSH or remote desktop.

  • Use SSH to remotely access the physical host and navigate to the log file location

  • Copy the log file to your local machine using SCP or SFTP

  • Alternatively, use remote desktop to connect to the physical host and access the log file directly

  • Ensure you have the necessary credentials and network connectivity to establish remote access

View 1 answer

Q37. how hashset and hashmap work internally?

Ans.

HashSet and HashMap are both data structures in Java that use hashing to store and retrieve elements.

  • HashSet uses HashMap internally to store its elements as keys with a dummy value.

  • HashMap uses an array of linked lists called buckets to store key-value pairs.

  • Both HashSet and HashMap use the hashCode() method to calculate the hash value of keys.

  • HashSet uses the hash value to determine the bucket where an element should be stored.

  • HashMap uses the hash value to determine the bu...read more

View 1 answer

Q38. Explain Scrum, Sprint review, Scrum event, what does mean by retrospective

Add your answer

Q39. Given a list of numbers and insisted to get the sum of numbers which gives 6

Ans.

Iterate through the list and find pairs of numbers that sum up to 6

  • Iterate through the list and check if the current number + any other number in the list equals 6

  • Store the pairs of numbers that sum up to 6 in a separate list

  • Return the list of pairs

Add your answer

Q40. What is the base24 internal message format.

Ans.

Base24 is an internal message format used in financial transactions.

  • Base24 is a binary-coded decimal (BCD) format.

  • It is used for financial transactions such as ATM withdrawals and credit card payments.

  • Each message is made up of a header, a body, and a trailer.

  • The header contains information about the message, such as the message type and the sender.

  • The body contains the actual data being transmitted.

  • The trailer contains information about the message, such as a checksum to ens...read more

Add your answer

Q41. What is the Singleton pattern ? in how many ways can this pattern be broken ?

Ans.

Singleton pattern ensures a class has only one instance and provides a global point of access to it.

  • Singleton pattern can be implemented by making the constructor private and providing a static method to access the instance.

  • The pattern can be broken by using reflection to access the private constructor and create multiple instances.

  • Another way to break the Singleton pattern is by using multiple class loaders in Java.

  • Thread synchronization issues can also lead to breaking the ...read more

Add your answer

Q42. What is MTI? Please explain the in brief.

Ans.

MTI stands for Machine Translation Interface. It is a software tool used to translate text from one language to another.

  • MTI is used to translate text from one language to another

  • It is a software tool that uses machine learning algorithms to improve translation accuracy

  • MTI is commonly used in the localization industry to translate software and websites

  • Examples of MTI tools include Google Translate and Microsoft Translator

Add your answer

Q43. Do you have any experience in writing user stories for system API definitions?

Ans.

Yes, I have experience in writing user stories for system API definitions.

  • I have written user stories to define the functionality of system APIs

  • I have collaborated with developers and stakeholders to ensure the user stories accurately capture the requirements

  • I have used tools like Jira or Trello to manage and track user stories

Add your answer

Q44. What would your test scenario be for verifying the success of data migration?

Ans.

Test scenario for verifying the success of data migration

  • Verify that all data from the source system has been successfully migrated to the target system

  • Check for any data discrepancies or missing data during the migration process

  • Ensure that data integrity is maintained throughout the migration

  • Validate that all data transformations and mappings have been accurately applied

  • Confirm that the migrated data is accessible and usable in the target system

Add your answer

Q45. What is checked unchecked exceptions?

Ans.

Checked exceptions are exceptions that must be declared in a method's signature or handled using try-catch blocks.

  • Checked exceptions are checked at compile-time.

  • They are typically used for exceptional conditions that can be reasonably recovered from.

  • Examples of checked exceptions in Java include IOException, SQLException, and ClassNotFoundException.

View 1 answer

Q46. What are streams in Java and why are they used?

Ans.

Streams in Java are a sequence of elements that can be processed in parallel or sequentially.

  • Streams are used to perform operations on collections of data in a concise and functional way.

  • They can be used to filter, map, reduce, and sort data.

  • Streams can be processed in parallel to improve performance.

  • Examples of stream methods include filter(), map(), reduce(), and sorted().

Add your answer

Q47. what design pattern are there in java and on which pattern have you worked.

Ans.

Java has several design patterns such as Singleton, Factory, Observer, Decorator, etc.

  • Singleton pattern ensures that only one instance of a class is created

  • Factory pattern provides an interface for creating objects in a superclass, but allows subclasses to alter the type of objects that will be created

  • Observer pattern defines a one-to-many dependency between objects so that when one object changes state, all its dependents are notified and updated automatically

  • Decorator patte...read more

Add your answer

Q48. Write method to display number of objects created for a given class

Ans.

Method to display number of objects created for a given class

  • Create a static variable to keep track of the number of objects created

  • Increment the variable in the class constructor

  • Create a static method to return the number of objects created

  • Call the static method to display the number of objects created

Add your answer

Q49. what is thread pool and how to manage it?

Ans.

Thread pool is a collection of threads that are used to execute tasks concurrently. It helps in reducing the overhead of thread creation.

  • Thread pool manages a fixed number of threads and assigns tasks to them as they become available.

  • It helps in improving the performance of applications by reducing the time taken to create and destroy threads.

  • Thread pool can be managed using various parameters such as the size of the thread pool, the priority of threads, and the maximum numbe...read more

Add your answer

Q50. Ngrx state management, how do you manage state in your current project?

Ans.

I use Ngrx for state management in my current project by defining actions, reducers, effects, and selectors.

  • Define actions to describe user events or interactions

  • Create reducers to specify how state should change in response to actions

  • Implement effects to manage side effects like API calls

  • Use selectors to retrieve specific pieces of state for components

Add your answer

Q51. Why mobile testing is important, how to scroll on phone,Touch Actions class,Selenium4 features,Appium 2.X features, one coding in Java

Ans.

Mobile testing is important for ensuring the functionality and usability of applications on various devices. Techniques like scrolling and touch actions are essential for testing mobile apps.

  • Mobile testing ensures that applications work correctly on different devices and screen sizes.

  • Scrolling on a phone can be done using methods like swipe or scroll actions in automation tools like Appium.

  • The Touch Actions class in Selenium allows for performing complex touch gestures like t...read more

Add your answer

Q52. What are the java8 features

Ans.

Java8 features include lambda expressions, functional interfaces, streams, and default methods.

  • Lambda expressions allow functional programming and simplify code.

  • Functional interfaces enable the use of lambda expressions.

  • Streams provide a way to process collections of data in a functional way.

  • Default methods allow interfaces to have method implementations.

  • Other features include the Date and Time API, Nashorn JavaScript engine, and improved security.

Add your answer

Q53. Data blending, difference between extract and live data source

Ans.

Extract data source is a static snapshot while live data source is real-time data. Data blending combines data from multiple sources.

  • Extract data source is a subset of data from a larger data source that is saved as a static snapshot.

  • Live data source is real-time data that is directly connected to the source system.

  • Data blending combines data from multiple sources to create a unified view.

  • Extract data source is faster for large datasets while live data source provides real-ti...read more

Add your answer

Q54. What is the role of cluster load balancing in Node.js?

Ans.

Cluster load balancing in Node.js helps distribute incoming requests among multiple instances of the application to improve performance and reliability.

  • Cluster load balancing allows Node.js applications to utilize multiple CPU cores efficiently by creating child processes to handle incoming requests.

  • It helps prevent a single instance of the application from becoming overwhelmed with requests, leading to improved performance and reliability.

  • Examples of cluster load balancing t...read more

Add your answer

Q55. What is the CQRS (Command Query Responsibility Segregation) design pattern?

Ans.

CQRS is a design pattern that separates the read and write operations of a system, using different models for each.

  • CQRS separates the responsibility of handling commands (write operations) from queries (read operations).

  • It helps in achieving better scalability, performance, and maintainability by using different models for reads and writes.

  • For example, in a banking application, the write model may handle transactions and account updates, while the read model may handle querie...read more

Add your answer

Q56. What are the advantages of using a microservice architecture?

Ans.

Advantages of using a microservice architecture include scalability, flexibility, fault isolation, and technology diversity.

  • Scalability: Microservices allow for individual components to be scaled independently, leading to better resource utilization.

  • Flexibility: Each microservice can be developed, deployed, and updated independently, allowing for faster innovation and reduced time to market.

  • Fault Isolation: If one microservice fails, it does not bring down the entire system, ...read more

Add your answer

Q57. How have you used oops concepts in your project?

Ans.

I have used OOPs concepts extensively in my project.

  • I have implemented inheritance to reuse code and reduce redundancy.

  • I have used encapsulation to hide implementation details and protect data.

  • I have used polymorphism to create flexible and extensible code.

  • I have used abstraction to simplify complex systems and improve maintainability.

  • For example, I created a base class for database operations and derived classes for specific databases, which allowed me to reuse code and easi...read more

Add your answer

Q58. Why data class require at least one parameter in primary construction?

Ans.

Data class requires at least one parameter in primary constructor to ensure each instance of the class is unique.

  • Primary constructor parameters are used to initialize properties in data class.

  • Data classes are designed to hold data, so having at least one parameter ensures uniqueness of instances.

  • Without parameters, instances of data class would be identical and defeat the purpose of data class.

Add your answer

Q59. What do you understand about Private banking and HNWI

Add your answer

Q60. Explain authorization and authentication in transaction.

Ans.

Authorization and authentication are security measures used in transactions to ensure only authorized users can access and perform actions on the system.

  • Authentication verifies the identity of the user, usually through a username and password.

  • Authorization determines what actions the user is allowed to perform based on their role or permissions.

  • Both are important in ensuring the security and integrity of the system.

  • Examples include logging into a bank account, accessing a sec...read more

Add your answer

Q61. given 2 table and explain o/p a(1,1,1,2,3) b(1,1,3,4,5) innner join left and right and cross join

Ans.

Explanation of inner join, left join, right join, and cross join with given tables a and b.

  • Inner join: Returns only the rows where there is a match in both tables based on the specified condition.

  • Left join: Returns all rows from the left table and the matched rows from the right table. If there is no match, NULL values are returned.

  • Right join: Returns all rows from the right table and the matched rows from the left table. If there is no match, NULL values are returned.

  • Cross j...read more

Add your answer

Q62. Explain test plan in detail Explain software testing life cycle in detail

Ans.

A test plan outlines the scope, approach, resources, and schedule for testing a software application.

  • Identify objectives and scope of testing

  • Define test strategies and methodologies

  • List resources and tools required for testing

  • Specify test environment setup

  • Outline test schedule and milestones

  • Detail test cases and scenarios

  • Include risk assessment and mitigation plans

Add your answer

Q63. Write test cases for uploading a file and explain each scenario

Ans.

Test cases for uploading a file with different scenarios

  • Verify that the file upload button is functional

  • Test uploading a file of maximum allowed size

  • Check for error messages when uploading an unsupported file format

  • Ensure successful upload of different file types (e.g. .txt, .pdf, .docx)

  • Test the behavior when trying to upload a file with the same name as an existing file

Add your answer

Q64. What are the methods for debugging Node.js applications?

Ans.

Methods for debugging Node.js applications include console.log, debugger statement, and using Node.js debugger.

  • Use console.log statements to print out values and debug information

  • Insert debugger statement in code to pause execution and inspect variables

  • Utilize Node.js debugger by running node inspect <filename> to step through code and set breakpoints

Add your answer

Q65. Count the frequency of alphabet in a word using Java?

Ans.

Count the frequency of alphabet in a word using Java.

  • Convert the word to lowercase.

  • Create an array of size 26 to store the frequency of each alphabet.

  • Iterate through the word and increment the corresponding index in the array.

  • Print the frequency of each alphabet.

Add your answer

Q66. 1. Testng framework details 2. Difference btween string and stringbuilder 3. Current project framework details 4. POM

Ans.

Questions related to TestNG, String and StringBuilder, current project framework details, and POM.

  • TestNG is a testing framework for Java

  • String is immutable while StringBuilder is mutable

  • Current project framework details depend on the project

  • POM is a design pattern for creating object repositories

Add your answer

Q67. Hoe to handle batch jobs using Automation?

Ans.

Batch jobs can be handled using automation by creating scripts or using scheduling tools.

  • Create scripts to automate the execution of batch jobs

  • Use scheduling tools to schedule and manage batch jobs

  • Monitor the status and progress of batch jobs

  • Handle errors and exceptions during batch job execution

  • Generate reports and logs for batch job results

View 1 answer

Q68. How many types of lock are there in java and how to achieve multithreading.

Ans.

There are two types of locks in Java - synchronized and ReentrantLock. Multithreading can be achieved by using these locks.

  • Two types of locks in Java are synchronized and ReentrantLock

  • Synchronized keyword can be used to achieve synchronization in Java

  • ReentrantLock provides more flexibility and control over locking mechanisms

  • Example: synchronized block - synchronized(obj) { // code }

  • Example: ReentrantLock - ReentrantLock lock = new ReentrantLock(); lock.lock(); // code; lock.u...read more

Add your answer

Q69. Run time polymorphism vs compile time polymorphism

Ans.

Run time polymorphism is method overriding while compile time polymorphism is method overloading.

  • Compile time polymorphism is resolved at compile time while run time polymorphism is resolved at runtime.

  • Method overloading is an example of compile time polymorphism while method overriding is an example of run time polymorphism.

  • Compile time polymorphism is faster than run time polymorphism as it is resolved at compile time.

  • Run time polymorphism is achieved through inheritance an...read more

Add your answer

Q70. Javascript program solving techniques Angular frameworks Real time examples

Ans.

Javascript program solving techniques and real-time examples using Angular frameworks.

  • Use modular programming to break down complex problems into smaller, more manageable parts.

  • Use debugging tools to identify and fix errors in code.

  • Use event-driven programming to create responsive and interactive user interfaces.

  • Use data binding to keep the view and model in sync.

  • Examples: Creating a real-time chat application using Angular's WebSocket API, implementing a real-time stock tick...read more

Add your answer

Q71. how to implement global search filter

Ans.

Implement global search filter for efficient data retrieval across all fields

  • Utilize a centralized search function to query all relevant fields in the database

  • Implement filters for different data types (text, numbers, dates) to refine search results

  • Include options for advanced search criteria such as boolean operators or wildcards

  • Optimize search performance by indexing frequently searched fields

Add your answer

Q72. How do you troubleshoot agent fluctuations?

Ans.

Troubleshooting agent fluctuations involves analyzing data, identifying potential causes, and implementing solutions.

  • Collect and analyze data on agent performance metrics

  • Identify any patterns or trends in the fluctuations

  • Investigate potential causes such as system issues, training gaps, or workload imbalance

  • Implement solutions such as system updates, additional training, or workload redistribution

  • Monitor the impact of the solutions and adjust as needed

Add your answer

Q73. Explain data warehouse conceprs and used in your current project?

Ans.

Data warehouse is a central repository of data used for reporting and analysis.

  • Data is extracted from various sources and transformed to fit into the warehouse schema.

  • Data is organized into dimensions and facts for efficient querying.

  • Used for business intelligence and decision-making.

  • In my current project, we use a data warehouse to store and analyze customer behavior data.

  • We extract data from our website, mobile app, and CRM system and transform it to fit into our warehouse ...read more

Add your answer

Q74. In API testing in postman when do we get 408 status

Ans.

A 408 status in API testing in Postman is received when the server times out while waiting for a request.

  • 408 status code indicates that the server did not receive a complete request within the time that it was prepared to wait.

  • This can happen if the client takes too long to send the request or if the server is overloaded.

  • It is important to adjust timeout settings in Postman to avoid receiving 408 status codes.

  • Example: If the server expects a request to be completed within 10 ...read more

Add your answer

Q75. What is string and use

Ans.

A string is a sequence of characters. It is used to store and manipulate text.

  • Strings are enclosed in quotes, either single or double.

  • They can be concatenated using the + operator.

  • String methods include length(), indexOf(), and substring().

  • Examples: 'Hello, world!', '1234', 'This is a string.'

View 1 answer

Q76. provide o/p for innerjoin, left join, right join, cross join on a(1,1,1,2,2,3) b(1,1,2,4)

Ans.

Different types of SQL joins with given data sets a and b.

  • Inner join: Returns rows where there is a match in both tables (1,1)

  • Left join: Returns all rows from the left table and the matched rows from the right table (1,1,1,2,2)

  • Right join: Returns all rows from the right table and the matched rows from the left table (1,1,2,4)

  • Cross join: Returns the Cartesian product of the two tables (1,1,1,1,1,2,1,4,1,1,2,1,2,2,1,4,2,1,2,2,2,2,4,3,1,1,3,1,2,3,1,4,3,1,1,3,2,2,3,2,4,3,1,2,3,2,...read more

Add your answer

Q77. How does durability function in ACID databases?

Ans.

Durability ensures that once a transaction is committed, it will persist even in the event of a system failure.

  • Durability guarantees that once a transaction is committed, it will not be lost even in the event of a system crash.

  • This is typically achieved through mechanisms like write-ahead logging and periodic checkpoints.

  • Examples of ACID-compliant databases that ensure durability include PostgreSQL, Oracle, and SQL Server.

Add your answer

Q78. Q1.What is trails Q2.What is Scala object. 3. how to create case class 4.Write a program for Fibonacci Sequence. 45 explain import sample Q6. what is trails

Ans.

A set of questions related to programming concepts and syntax.

  • Trails may refer to a path followed by a program's execution or a set of tutorials for learning a programming language.

  • Scala object is a singleton instance of a class that can be used to hold utility methods or constants.

  • Case classes are immutable classes that are used to hold data.

  • Fibonacci sequence is a series of numbers where each number is the sum of the two preceding ones.

  • Import statement is used to bring exte...read more

Add your answer

Q79. Difference between Futures and Forward, OTC derivatives example

Add your answer

Q80. Would transaction be rolled back if innermost stored procedure throws an error ?

Ans.

Yes, the transaction will be rolled back if the innermost stored procedure throws an error.

  • If an error occurs in the innermost stored procedure, it will cause the entire transaction to be rolled back.

  • This ensures that the database remains in a consistent state.

  • Rolling back the transaction means that any changes made by the stored procedures within the transaction will be undone.

Add your answer

Q81. How to check production issue at app level

Ans.

To check production issues at the app level, one can use logging, monitoring tools, error tracking services, and user feedback.

  • Utilize logging to track errors and events in the application

  • Implement monitoring tools to keep track of performance metrics and system health

  • Use error tracking services like Sentry or Rollbar to receive real-time notifications of issues

  • Collect user feedback through surveys or support tickets to identify and prioritize issues

Add your answer

Q82. give a table teams with only one columns teamname each team play with each other ones

Ans.

Create a table with team names where each team plays with each other once.

  • Create a table teams with column teamname

  • Insert team names into the table

  • Use a combination of team names to represent matches

Add your answer

Q83. What is selenium? What is xpath? What do you mean by annotations is java script? What do you know about java with selenium?

Ans.

Selenium is a tool used for automating web browsers. XPath is a language used for selecting nodes in an XML document.

  • Selenium is used for testing web applications by automating browser actions

  • XPath is used to navigate through elements and attributes in an XML document

  • Annotations in Java are used to provide additional information about code

  • Java with Selenium is used to write test scripts for web applications

Add your answer

Q84. What does mean by Mark to market?

Add your answer

Q85. Publisher consumer using blocking queue Java 8 filters DSA beginner level

Ans.

Implementing publisher consumer using blocking queue in Java 8 with beginner level DSA knowledge

  • BlockingQueue interface in Java provides a thread-safe way to implement producer-consumer pattern

  • Java 8 filters can be used to filter elements from a collection based on a predicate

  • Beginner level DSA knowledge can be used to implement basic data structures like queues

Add your answer

Q86. How we can utilise domain less concept for existing devices.

Ans.

Domainless concept can be utilized for existing devices by implementing edge computing and decentralized networks.

  • Implement edge computing to process data closer to the source, reducing latency and bandwidth usage.

  • Utilize decentralized networks to distribute computing power and storage across multiple devices.

  • Use IoT platforms that support domainless architecture, allowing devices to communicate directly without a central server.

  • Leverage blockchain technology for secure and t...read more

Add your answer

Q87. What is the difference between Hybrid and domainless devices.

Ans.

Hybrid devices combine features of both domain-joined and domainless devices, while domainless devices do not require a domain for management.

  • Hybrid devices can be managed both on-premises and in the cloud, offering flexibility in management options.

  • Domainless devices do not require a domain controller for management, making them easier to deploy in modern workplace environments.

  • Hybrid devices can leverage both traditional Group Policy settings and modern Intune policies for ...read more

Add your answer

Q88. How my knowledge can be useful in future project

Ans.

My knowledge can be useful in future projects by providing valuable insights, identifying opportunities for improvement, and ensuring successful implementation.

  • I have a strong understanding of business processes and can identify areas for optimization and efficiency.

  • I am skilled in data analysis and can provide valuable insights to drive informed decision-making.

  • I have experience in project management and can ensure successful implementation of initiatives.

  • I am proficient in ...read more

Add your answer

Q89. Write a query to identify and remove duplicated from a table.

Ans.

Use a query with GROUP BY and HAVING clause to identify and remove duplicates from a table.

  • Use GROUP BY to group rows with the same values

  • Use HAVING COUNT(*) > 1 to identify duplicates

  • Use DELETE statement to remove duplicates

Add your answer

Q90. What are different ways to Inject services

Ans.

Different ways to inject services in .NET

  • Constructor Injection: Services are injected through a class constructor

  • Property Injection: Services are injected through public properties

  • Method Injection: Services are injected as method parameters

  • Service Locator Pattern: Services are accessed through a central registry

  • DI Containers: Frameworks like Autofac, Unity, or Ninject manage service injection

Add your answer

Q91. Explain framework, collection interface and programming around it, testng, cucumber, rest assured

Ans.

Framework is a structure that provides guidelines for automation testing. Collection interface is a set of classes and interfaces for storing and manipulating data. TestNG, Cucumber, and Rest Assured are popular tools for automation testing.

  • Framework is a reusable set of guidelines, coding standards, concepts, and practices that provide structure for automation testing.

  • Collection interface in Java is a framework that provides a standard way to store and manipulate groups of o...read more

Add your answer

Q92. Present CTC per annum

Ans.

Current CTC is INR 12,00,000 per annum

  • Current CTC is INR 12,00,000 per annum

  • CTC includes salary, bonuses, and other benefits

  • CTC may vary based on performance and company policies

Add your answer

Q93. Expected CTC per annum

Ans.

Expected CTC per annum is negotiable based on the role and responsibilities.

  • CTC can vary based on the company, industry, location, and level of experience.

  • It is important to research the market standards for the specific role before providing a figure.

  • Candidates can mention a range or state that they are open to discussing compensation during the interview process.

Add your answer

Q94. How do transactions work in a database?

Ans.

Transactions in a database ensure that a group of operations are completed successfully or rolled back if any part fails.

  • Transactions help maintain data integrity by ensuring all changes are either committed or rolled back as a single unit.

  • ACID properties (Atomicity, Consistency, Isolation, Durability) are maintained in transactions.

  • Examples of transactions include transferring money between bank accounts or booking a flight ticket.

  • Transactions use locks to prevent concurrent...read more

Add your answer

Q95. How does replication work in a database?

Ans.

Replication in a database involves copying and distributing data across multiple servers to ensure redundancy and availability.

  • Replication involves creating multiple copies of the database on different servers.

  • Changes made to the primary database are then propagated to the replica databases.

  • Replication can be synchronous or asynchronous, with synchronous replication ensuring data consistency but potentially impacting performance.

  • Examples of database replication technologies i...read more

Add your answer

Q96. what is different desired Capabalities in appium?

Ans.

Desired capabilities in Appium are specific settings that are used to customize the behavior of the automation session.

  • Desired capabilities are used to set up the automation environment before the test starts

  • They can include settings such as device name, platform name, platform version, app package, app activity, etc.

  • Desired capabilities are passed as a dictionary or JSON object to the Appium server when initializing a new session

Add your answer

Q97. explain row_number, rank, dense_rank with exmaple ..

Ans.

row_number assigns a unique sequential integer to each row, rank assigns a unique rank to each row with gaps, dense_rank assigns a unique rank to each row without gaps.

  • row_number assigns a unique sequential integer to each row in the result set

  • rank assigns a unique rank to each row in the result set with gaps between ranks

  • dense_rank assigns a unique rank to each row in the result set without any gaps

Add your answer

Q98. departmnet wise highest salary, and then 5 highest salary

Ans.

To find department wise highest salary and then 5 highest salaries, use SQL queries with GROUP BY and ORDER BY clauses.

  • Use SQL query with GROUP BY clause to get department wise highest salary

  • Use ORDER BY clause to get 5 highest salaries overall

Add your answer

Q99. Difference between Arraylist vs linked list interface vs abstract locators

Ans.

Arraylist vs linked list, interface vs abstract, locators

  • ArrayList and LinkedList are both used to store collections of data, but ArrayList is faster for accessing elements while LinkedList is faster for adding or removing elements.

  • Interfaces are used to define a contract for a class to implement, while abstract classes can provide some implementation and cannot be instantiated.

  • Locators are used in test automation to identify web elements on a page, such as ID, name, class, o...read more

Add your answer

Q100. What is sql, how to write a query

Ans.

SQL is a programming language used to manage and manipulate relational databases.

  • SQL stands for Structured Query Language

  • Queries are written to retrieve, insert, update or delete data from a database

  • Basic syntax: SELECT column1, column2 FROM table_name WHERE condition

  • Example: SELECT * FROM customers WHERE city='New York'

  • Other commands include INSERT, UPDATE, DELETE, CREATE, DROP, etc.

Add your answer
1
2
3
Contribute & help others!
Write a review
Share interview
Contribute salary
Add office photos

Interview Process at Sagility

based on 296 interviews
Interview experience
3.8
Good
View more
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Top Interview Questions from Similar Companies

3.6
 • 380 Interview Questions
3.9
 • 284 Interview Questions
3.4
 • 278 Interview Questions
3.6
 • 184 Interview Questions
3.3
 • 142 Interview Questions
3.3
 • 135 Interview Questions
View all
Top Synechron Interview Questions And Answers
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
70 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter